u/IngenuityencePeg

A lot of breaches seem to happen because credentials were already exposed somewhere earlier, sometimes long before anyone notices.

With employees using the same passwords across multiple services, it feels like this is an ongoing issue rather than a single event.

Additionally, how are security teams even supposed to manage this across so many accounts? Are there platforms or tools that continuously detect exposed credentials?

reddit.com
u/IngenuityencePeg — 17 days ago

From a management perspective, I’m trying to understand how companies deal with the risk of employee credentials being exposed outside their systems, especially with password reuse and third-party services.

It seems like this kind of issue can go unnoticed for a long time and isn’t always visible to internal security controls, even in organizations with solid IT practices.

How do managers or teams typically approach this kind of risk in practice? Are there tools or platforms that continuously detect exposed credentials and reduce the risk?

reddit.com
u/IngenuityencePeg — 18 days ago

It feels like credential exposure is not a one-time problem anymore, since new compromised databases and dumps keep appearing over time.

Even if a company is secure internally, employee passwords can still show up elsewhere due to reuse or third-party breaches.

I’m curious how organizations realistically manage this kind of continuous risk across large teams and systems.

Are there platforms or tools that continuously detect exposed credentials and help prevent it?

Update I was suggested Breach by offseq, which is a tool that focus on monitoring exposed credentials and catching new ones early.

Anyone here have experience with this similar platforms?

reddit.com
u/IngenuityencePeg — 19 days ago

It seems like exposed employee credentials keep showing up in external databases over time, especially due to password reuse and third-party service breaches.

Even with security controls in place, it feels difficult to stay ahead when new data keeps surfacing across different sources.

How do security teams continuously monitor and respond to this kind of exposure risk across large organizations?

reddit.com
u/IngenuityencePeg — 19 days ago

I’ve been using TeamViewer and AnyDesk mainly to access my home PC when I’m away.

Recently I started getting those “commercial use suspected” messages, along with random session limits and disconnects, even though I’m literally just connecting to my own machine.

It’s gotten to the point where sessions feel unreliable, like you can’t stay connected long enough to actually get anything done without being interrupted.

I get that they need to monetize, but flagging normal personal use like this just breaks the experience.

At this point I’m honestly just trying to find something that doesn’t randomly cut me off mid-session.

Has anyone else run into this? What did you end up switching to?

reddit.com
u/IngenuityencePeg — 19 days ago

I’ve been using TeamViewer and AnyDesk mainly to access my home PC when I’m away.

Recently I started getting those “commercial use suspected” messages, along with random session limits and disconnects, even though I’m literally just connecting to my own machine.

It’s gotten to the point where sessions feel unreliable, like you can’t stay connected long enough to actually get anything done without being interrupted.

I get that they need to monetize, but flagging normal personal use like this just breaks the experience.

At this point I’m honestly just trying to find something that doesn’t randomly cut me off mid-session.

Has anyone else run into this? What did you end up switching to?

reddit.com
u/IngenuityencePeg — 19 days ago