“You are the weakest link, goodbye!” is one of those game show catchphrases that sticks in your mind, whether you’ve seen the TV show or not.
On the show, eight strangers must work together to answer trivia questions that build a chain of correct answers to increase the team’s prize. A wrong answer breaks the chain, resets the prize amount, and leads to a vote to eliminate the “weakest link.”
Just as an incorrect answer breaks the chain, cyberattacks exploit weak points in the identity chain—trusted systems and users that lack strong protection. Stolen credentials continue to be a primary factor in data breaches, appearing in almost a third (32%) of breaches last year, according to the 2025 Verizon Data Breach Investigations Report. Why? Because it’s easier to exploit human weaknesses than to bypass hardened security systems.
Attackers use tactics like phishing emails and fake websites to trick workforce identities into revealing credentials or downloading malware, and these tactics are growing more sophisticated.
For example, the 2024 Snowflake data breach affected major companies including AT&T, Santander, and Ticketmaster, impacting hundreds of millions of downstream customers. In this breach, the attackers used infostealer malware to harvest employee credentials that had not been rotated and lacked MFA—multi-factor authentication—allowing them to gain access to sensitive personal and financial records.
More recently, Marks & Spencer was breached after hackers phished employees of a third-party contractor and stole login credentials. Once they gained access with the contractor’s credentials, attackers used advanced techniques to impersonate employees and reset their passwords.
Historically, attackers focused their efforts on IT admins with direct access to servers. But data breaches like Snowflake and Marks & Spencer show that privileged access isn’t limited to IT teams. Every employee, contractor, and third-party supplier is a potential entry point if not properly secured.
Workforce identities include employees, contractors, third parties and vendors who have access to workstations, applications, and data within an organization to perform their jobs.
IT admins hold the keys to the kingdom, hence the importance of Privileged Access Management (PAM). However, users of critical business applications, such as ERP, HR, and CRM systems, can easily become “Shadow IT” as SaaS tools are increasingly licensed and managed by application owners rather than IT. Business applications have a wide variety of security roles and structures that are often quite broad and don’t easily align with your other identity management processes.
The users who make up your workforce and the applications they need access to are broad and diverse, making it difficult to protect workforce identities effectively from compromise. Plus, in addition to external threats, you need to protect your organization against internal fraud risk. Here are a few of the challenges organizations face with protecting workforce identities:
Use an enterprise-grade vault to securely store, rotate, and supply credentials to applications. This gives your IT admins oversight over workforce passwords so they can make sure they meet requirements for complexity and length, and takes the burden off business users to remember and manage them.
Once you’ve vaulted business user credentials, you can put those credentials behind an MFA wall. Now you can enforce MFA for your elevated business users when they are logging in to applications with sensitive information, putting another layer of defense in front of potential attackers.
Remove local admin rights from workstations to prevent lateral movement and ransomware attacks. Instead, you can implement just-in-time access to sensitive applications or systems.
Rather than manually provisioning access for workforce identities, adopt an automated Identity Lifecycle Management solution that integrates with your HR system. When employees change roles or leave the organization, this ensures that access that is no longer needed is revoked seamlessly.
Periodic User Access Reviews (UAR) prevent users from accumulating more privilege than is required to perform their job. Segregation of Duties (SoD) is another vital internal control that helps prevent fraud resulting from any one individual from having too much access within a single process—like being able to create a vendor and pay a vendor. Automating access certification campaigns and Segregation of Duties (SoD) analysis helps you to more efficiently close gaps and address compliance requirements.
Run checks for anomalous behavior. By continuously auditing and monitoring workforce identity access, you can identify suspicious activities that could be related to compromised accounts so you can remediate threats in real time.
By taking these recommended measures, you can reduce the risk of compromised accounts by expanding protection beyond your PAM approach to workforce identities with access to sensitive systems and data.
Read more about emerging AI threats impacting workforce identities in Delinea’s 2025 Cybersecurity and the AI Threat Landscape report.
Ensure all your identities are secure: Securing IT admin, workforce, machine, and developer identities