{"id":1218,"date":"2025-11-10T13:27:07","date_gmt":"2025-11-10T13:27:07","guid":{"rendered":"https:\/\/products.resplit.hr\/?p=1218"},"modified":"2025-11-10T13:27:09","modified_gmt":"2025-11-10T13:27:09","slug":"password-security-2025","status":"publish","type":"post","link":"https:\/\/products.resplit.hr\/hr\/2025\/11\/10\/password-security-2025\/","title":{"rendered":"Password security 2025: what we can learn from the Louvre incident"},"content":{"rendered":"<p>Password security 2025 is at the core of this story and the Louvre incident is the most striking reminder of how basics still decide outcomes. In October 2025, the Louvre faced one of the most surreal and expensive security failures in modern history, still the real issue went far beyond the physical heist. A group of thieves stole priceless royal jewels, but the real shock wasn\u2019t the heist itself.<\/p>\n\n\n\n<p>In fact, the real shock came from the discovery that part of the museum\u2019s CCTV system was protected with a single, painfully simple password: <br><strong>\u201cLouvre\u201d.<\/strong><\/p>\n\n\n\n<p>It was one word with no numbers, no symbols and no additional security layers.<\/p>\n\n\n\n<p>In 2025, the era of AI-driven threat detection, biometrics and Zero Trust architectures, the world\u2019s most famous museum lost millions because someone didn\u2019t bother to change a default password.<\/p>\n\n\n\n<p>And that\u2019s the lesson:<br><strong>even the most advanced systems collapse when the basics are ignored.<\/strong><\/p>\n\n\n\n<p>Furthermore, this isn\u2019t just a museum\u2019s problem. It\u2019s a problem for every company building software, storing client data, deploying cloud services and running internal tools.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What technically went wrong (and why it matters)<\/strong><\/h2>\n\n\n\n<p>Cybersecurity analysts highlighted several issues behind the scenes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>a critical segment of the CCTV system used a trivial, guessable password<\/li>\n\n\n\n<li>outdated firmware and postponed security patches<\/li>\n\n\n\n<li>lack of proper access segmentation<\/li>\n\n\n\n<li>absence of MFA on administrative accounts<\/li>\n\n\n\n<li>disconnected physical and digital security procedures<\/li>\n\n\n\n<li>no active monitoring for unusual login patterns<\/li>\n<\/ul>\n\n\n\n<p>In short:<br><strong>the attack didn\u2019t require sophisticated hacking. The door was already open.<\/strong><\/p>\n\n\n\n<p>This is what security experts call <em>a low-hanging fruit attack<\/em>.<\/p>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><em>Back in our earlier article, we explained the basics of strong passwords and this Louvre incident shows why those fundamentals still matter in password security 2025.<\/em><\/summary>\n<p><a href=\"https:\/\/resplitcowork.com\/passwords\/\">The Most Common Passwords in 2024: Are Yours on the List?<\/a><\/p>\n<\/details>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why password security 2025 matters for software companies<\/strong><\/h2>\n\n\n\n<p>Because modern software development environments are more complex and more exposed than ever.<\/p>\n\n\n\n<p>We rely on:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>cloud infrastructure<\/li>\n\n\n\n<li>remote access<\/li>\n\n\n\n<li>APIs and integrations<\/li>\n\n\n\n<li>internal dashboards<\/li>\n\n\n\n<li>CI\/CD pipelines<\/li>\n\n\n\n<li>microservices<\/li>\n\n\n\n<li>IoT devices<\/li>\n\n\n\n<li>development vs production environments<\/li>\n<\/ul>\n\n\n\n<p>Therefore, every one of these is a potential entry point.<\/p>\n\n\n\n<p>In reality, most cyber incidents don\u2019t start with genius-level hacking; they start with weak passwords, leaked tokens and shared admin accounts.<\/p>\n\n\n\n<p>In fact, the Louvre incident is just a high-profile reminder.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What MFA actually is (and why you need it everywhere)<\/strong><\/h2>\n\n\n\n<p>MFA (Multi-Factor Authentication) means verifying identity using <strong>two or more<\/strong> of the following:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Something you know<\/strong><br>Password, PIN<\/li>\n\n\n\n<li><strong>Something you have<\/strong><br>Phone, security key, code-generating app<\/li>\n\n\n\n<li><strong>Something you are<\/strong><br>Biometric authentication (fingerprint, face, iris)<\/li>\n<\/ol>\n\n\n\n<p>A typical MFA login:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>you enter your password<\/li>\n\n\n\n<li>your phone generates a one-time 6-digit code<\/li>\n\n\n\n<li>you approve the login<\/li>\n<\/ul>\n\n\n\n<p>Even if someone guesses or steals your password, <strong>MFA blocks the intruder<\/strong>.<\/p>\n\n\n\n<p>If MFA had been active at the Louvre:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>login attempts would have triggered alerts<\/li>\n\n\n\n<li>attackers wouldn\u2019t have been able to disable the cameras<\/li>\n\n\n\n<li>unauthorized access would have been denied instantly<\/li>\n<\/ul>\n\n\n\n<p>It wouldn\u2019t stop the physical heist, but it would stop the digital parts that made it possible.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Password security 2025: the non-negotiable minimum<\/strong><\/h2>\n\n\n\n<p>Here\u2019s the <em>bare minimum<\/em> for organizations in 2025:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Unique passwords for every system<\/strong><br>Therefore, using one password everywhere turns a single leak into a full compromise.<\/li>\n\n\n\n<li><strong>A company-wide password manager<\/strong><br>Bitwarden, 1Password, Dashlane&#8230; Pick one, enforce it. For example, a shared password manager reduces weak or reused passwords across the team.<\/li>\n\n\n\n<li><strong>Regular rotation for critical accounts<\/strong><br>Admin and service accounts should rotate at least twice a year.<\/li>\n\n\n\n<li><strong>Role-Based Access Control (RBAC)<\/strong><br>Not everyone needs admin.<br>Not everyone needs production access.<br>Not everyone needs everything. <br>Moreover, RBAC prevents privilege creep and limits the blast radius of a compromised account.<\/li>\n\n\n\n<li><strong>Zero Trust as a philosophy<\/strong><br>Don\u2019t assume anything is safe.<br>Every identity, device and request must be verified.<br>In other words, Zero Trust treats every access request as potentially risky.<\/li>\n\n\n\n<li><strong>Segment internal access<\/strong><br>If one compromised account can reach all systems, that\u2019s not a setup. That\u2019s a liability. <br>As a result, segmentation isolates incidents before they spread.<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How password security 2025 affects modern software development<\/strong><\/h2>\n\n\n\n<p>Software development teams work with:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>git repositories<\/li>\n\n\n\n<li>deploy keys<\/li>\n\n\n\n<li>API tokens<\/li>\n\n\n\n<li>CI\/CD secrets<\/li>\n\n\n\n<li>staging\/production databases<\/li>\n\n\n\n<li>cloud access credentials<\/li>\n\n\n\n<li>internal dev tools<\/li>\n<\/ul>\n\n\n\n<p>And the most common security failures happen because:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>passwords or tokens leak into public repos<\/li>\n\n\n\n<li>default admin accounts are never changed<\/li>\n\n\n\n<li>MFA is disabled \u201cbecause it\u2019s annoying\u201d<\/li>\n\n\n\n<li>production and staging share the same credentials<\/li>\n\n\n\n<li>Wi-Fi networks aren\u2019t segmented<\/li>\n\n\n\n<li>shared accounts are used \u201cjust for convenience\u201d<\/li>\n<\/ul>\n\n\n\n<p>In other words:<br><strong>if the world\u2019s biggest museum can fall because of a weak password, so can any software team that treats security as an afterthought.<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How to protect your organization (without slowing down your team)<\/strong><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Enable MFA everywhere<\/strong><br>E-mail, dashboards, servers, cloud, repos&#8230; Everywhere.<br>As a result, MFA adds an essential layer of protection even when passwords fail.<\/li>\n\n\n\n<li><strong>Segment access by roles<\/strong><br>Developers don\u2019t need access to accounting.<br>Admins don\u2019t always need access to production.<br>Limit everything by necessity.<\/li>\n\n\n\n<li><strong>Harden your systems<\/strong><br>disable default ports<br>limit login attempts<br>implement firewalls and IDS\/IPS<br>separate production from staging<\/li>\n\n\n\n<li><strong>Security audits and pentests<\/strong><br>At least once per year. More if handling sensitive data.<\/li>\n\n\n\n<li><strong>Conduct regular access reviews<\/strong><br>Every offboarded employee should lose access the same day.<br>Not \u201cnext week\u201d.<\/li>\n\n\n\n<li><strong>Mandatory password manager for the whole team<\/strong><br>One tool. One policy. No excuses.<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The Louvre gave us a warning. We should listen<\/strong><\/h2>\n\n\n\n<p>The 2025 Louvre password incident is more than a bizarre headline.<br>It\u2019s proof that:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>security failures often start with the simplest oversight<\/li>\n\n\n\n<li>MFA is no longer optional<\/li>\n\n\n\n<li>password hygiene is still the foundation of protection<\/li>\n\n\n\n<li>Zero Trust isn\u2019t a trend, it\u2019s survival<\/li>\n\n\n\n<li>password security 2025 is a business-critical priority<\/li>\n<\/ul>\n\n\n\n<p>As a result, between a protected system and a multimillion-euro disaster, sometimes the only difference is one single password.<\/p>\n\n\n\n<p>One.<br>Single.<br>Password.<\/p>\n\n\n\n<p>So make sure yours isn\u2019t \u201cLouvre&#8221;.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>In addition, for more insights on software, cybersecurity and digital best practices, explore other articles on our <a href=\"https:\/\/products.resplit.hr\/hr\/business-software-blog\/\">blog<\/a>.<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Password security 2025 is at the core of this story and the Louvre incident is the most striking reminder of how basics still decide outcomes. In October 2025, the Louvre faced one of the most surreal and expensive security failures in modern history, still the real issue went far beyond the physical heist. A group [&hellip;]<\/p>","protected":false},"author":1,"featured_media":1219,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[25],"tags":[35,34,36],"class_list":["post-1218","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","tag-louvre","tag-password-security","tag-software"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Password security 2025 and Louvre incident - Products Re.Split<\/title>\n<meta name=\"description\" content=\"Password security 2025 explained through the Louvre incident. Learn what went wrong and how software teams can protect their systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/products.resplit.hr\/hr\/2025\/11\/10\/password-security-2025\/\" \/>\n<meta property=\"og:locale\" content=\"hr_HR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Password security 2025 and Louvre incident - Products Re.Split\" \/>\n<meta property=\"og:description\" content=\"Password security 2025 explained through the Louvre incident. Learn what went wrong and how software teams can protect their systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/products.resplit.hr\/hr\/2025\/11\/10\/password-security-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"Products Re.Split\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-10T13:27:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-10T13:27:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/products.resplit.hr\/wp-content\/uploads\/2025\/11\/Jedna-lozinka.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2240\" \/>\n\t<meta property=\"og:image:height\" content=\"1260\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Napisao\/la\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Procijenjeno vrijeme \u010ditanja\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuta\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/products.resplit.hr\/2025\/11\/10\/password-security-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/products.resplit.hr\/2025\/11\/10\/password-security-2025\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/products.resplit.hr\/#\/schema\/person\/3e26325a18d60be6ec97fd0862c665dc\"},\"headline\":\"Password security 2025: what we can learn from the Louvre incident\",\"datePublished\":\"2025-11-10T13:27:07+00:00\",\"dateModified\":\"2025-11-10T13:27:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/products.resplit.hr\/2025\/11\/10\/password-security-2025\/\"},\"wordCount\":1004,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/products.resplit.hr\/#organization\"},\"image\":{\"@id\":\"https:\/\/products.resplit.hr\/2025\/11\/10\/password-security-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/products.resplit.hr\/wp-content\/uploads\/2025\/11\/Jedna-lozinka.png\",\"keywords\":[\"louvre\",\"password security\",\"software\"],\"articleSection\":[\"English\"],\"inLanguage\":\"hr\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/products.resplit.hr\/2025\/11\/10\/password-security-2025\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/products.resplit.hr\/2025\/11\/10\/password-security-2025\/\",\"url\":\"https:\/\/products.resplit.hr\/2025\/11\/10\/password-security-2025\/\",\"name\":\"Password security 2025 and Louvre incident - Products Re.Split\",\"isPartOf\":{\"@id\":\"https:\/\/products.resplit.hr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/products.resplit.hr\/2025\/11\/10\/password-security-2025\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/products.resplit.hr\/2025\/11\/10\/password-security-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/products.resplit.hr\/wp-content\/uploads\/2025\/11\/Jedna-lozinka.png\",\"datePublished\":\"2025-11-10T13:27:07+00:00\",\"dateModified\":\"2025-11-10T13:27:09+00:00\",\"description\":\"Password security 2025 explained through the Louvre incident. Learn what went wrong and how software teams can protect their systems.\",\"breadcrumb\":{\"@id\":\"https:\/\/products.resplit.hr\/2025\/11\/10\/password-security-2025\/#breadcrumb\"},\"inLanguage\":\"hr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/products.resplit.hr\/2025\/11\/10\/password-security-2025\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hr\",\"@id\":\"https:\/\/products.resplit.hr\/2025\/11\/10\/password-security-2025\/#primaryimage\",\"url\":\"https:\/\/products.resplit.hr\/wp-content\/uploads\/2025\/11\/Jedna-lozinka.png\",\"contentUrl\":\"https:\/\/products.resplit.hr\/wp-content\/uploads\/2025\/11\/Jedna-lozinka.png\",\"width\":2240,\"height\":1260,\"caption\":\"Louvre pyramid at night with the text \u201cOne password. A million problems.\u201d and Re.Split logo displayed on the image, highlighting password security 2025.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/products.resplit.hr\/2025\/11\/10\/password-security-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/products.resplit.hr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"English\",\"item\":\"https:\/\/products.resplit.hr\/category\/english\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Password security 2025: what we can learn from the Louvre incident\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/products.resplit.hr\/#website\",\"url\":\"https:\/\/products.resplit.hr\/\",\"name\":\"Products Re.Split\",\"description\":\"Products Re.Split\",\"publisher\":{\"@id\":\"https:\/\/products.resplit.hr\/#organization\"},\"alternateName\":\"resplit\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/products.resplit.hr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hr\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/products.resplit.hr\/#organization\",\"name\":\"Products Re.Split\",\"alternateName\":\"TechResources\",\"url\":\"https:\/\/products.resplit.hr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hr\",\"@id\":\"https:\/\/products.resplit.hr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/products.resplit.hr\/wp-content\/uploads\/2024\/05\/cropped-ReSizedLogo-2.png\",\"contentUrl\":\"https:\/\/products.resplit.hr\/wp-content\/uploads\/2024\/05\/cropped-ReSizedLogo-2.png\",\"width\":512,\"height\":512,\"caption\":\"Products Re.Split\"},\"image\":{\"@id\":\"https:\/\/products.resplit.hr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/resplit\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/products.resplit.hr\/#\/schema\/person\/3e26325a18d60be6ec97fd0862c665dc\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hr\",\"@id\":\"https:\/\/products.resplit.hr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d63d0cd141b3cefc77e81fc870f01ab1eb7a6a10acfcff12bfac2c5528103734?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d63d0cd141b3cefc77e81fc870f01ab1eb7a6a10acfcff12bfac2c5528103734?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/reproducts.resplit.hr\/wp\"],\"url\":\"https:\/\/products.resplit.hr\/hr\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Password security 2025 and Louvre incident - Products Re.Split","description":"Password security 2025 explained through the Louvre incident. Learn what went wrong and how software teams can protect their systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/products.resplit.hr\/hr\/2025\/11\/10\/password-security-2025\/","og_locale":"hr_HR","og_type":"article","og_title":"Password security 2025 and Louvre incident - Products Re.Split","og_description":"Password security 2025 explained through the Louvre incident. Learn what went wrong and how software teams can protect their systems.","og_url":"https:\/\/products.resplit.hr\/hr\/2025\/11\/10\/password-security-2025\/","og_site_name":"Products Re.Split","article_published_time":"2025-11-10T13:27:07+00:00","article_modified_time":"2025-11-10T13:27:09+00:00","og_image":[{"width":2240,"height":1260,"url":"https:\/\/products.resplit.hr\/wp-content\/uploads\/2025\/11\/Jedna-lozinka.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Napisao\/la":"admin","Procijenjeno vrijeme \u010ditanja":"5 minuta"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/products.resplit.hr\/2025\/11\/10\/password-security-2025\/#article","isPartOf":{"@id":"https:\/\/products.resplit.hr\/2025\/11\/10\/password-security-2025\/"},"author":{"name":"admin","@id":"https:\/\/products.resplit.hr\/#\/schema\/person\/3e26325a18d60be6ec97fd0862c665dc"},"headline":"Password security 2025: what we can learn from the Louvre incident","datePublished":"2025-11-10T13:27:07+00:00","dateModified":"2025-11-10T13:27:09+00:00","mainEntityOfPage":{"@id":"https:\/\/products.resplit.hr\/2025\/11\/10\/password-security-2025\/"},"wordCount":1004,"commentCount":0,"publisher":{"@id":"https:\/\/products.resplit.hr\/#organization"},"image":{"@id":"https:\/\/products.resplit.hr\/2025\/11\/10\/password-security-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/products.resplit.hr\/wp-content\/uploads\/2025\/11\/Jedna-lozinka.png","keywords":["louvre","password security","software"],"articleSection":["English"],"inLanguage":"hr","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/products.resplit.hr\/2025\/11\/10\/password-security-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/products.resplit.hr\/2025\/11\/10\/password-security-2025\/","url":"https:\/\/products.resplit.hr\/2025\/11\/10\/password-security-2025\/","name":"Password security 2025 and Louvre incident - Products Re.Split","isPartOf":{"@id":"https:\/\/products.resplit.hr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/products.resplit.hr\/2025\/11\/10\/password-security-2025\/#primaryimage"},"image":{"@id":"https:\/\/products.resplit.hr\/2025\/11\/10\/password-security-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/products.resplit.hr\/wp-content\/uploads\/2025\/11\/Jedna-lozinka.png","datePublished":"2025-11-10T13:27:07+00:00","dateModified":"2025-11-10T13:27:09+00:00","description":"Password security 2025 explained through the Louvre incident. Learn what went wrong and how software teams can protect their systems.","breadcrumb":{"@id":"https:\/\/products.resplit.hr\/2025\/11\/10\/password-security-2025\/#breadcrumb"},"inLanguage":"hr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/products.resplit.hr\/2025\/11\/10\/password-security-2025\/"]}]},{"@type":"ImageObject","inLanguage":"hr","@id":"https:\/\/products.resplit.hr\/2025\/11\/10\/password-security-2025\/#primaryimage","url":"https:\/\/products.resplit.hr\/wp-content\/uploads\/2025\/11\/Jedna-lozinka.png","contentUrl":"https:\/\/products.resplit.hr\/wp-content\/uploads\/2025\/11\/Jedna-lozinka.png","width":2240,"height":1260,"caption":"Louvre pyramid at night with the text \u201cOne password. A million problems.\u201d and Re.Split logo displayed on the image, highlighting password security 2025."},{"@type":"BreadcrumbList","@id":"https:\/\/products.resplit.hr\/2025\/11\/10\/password-security-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/products.resplit.hr\/"},{"@type":"ListItem","position":2,"name":"English","item":"https:\/\/products.resplit.hr\/category\/english\/"},{"@type":"ListItem","position":3,"name":"Password security 2025: what we can learn from the Louvre incident"}]},{"@type":"WebSite","@id":"https:\/\/products.resplit.hr\/#website","url":"https:\/\/products.resplit.hr\/","name":"Products Re.Split","description":"Products Re.Split","publisher":{"@id":"https:\/\/products.resplit.hr\/#organization"},"alternateName":"resplit","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/products.resplit.hr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hr"},{"@type":"Organization","@id":"https:\/\/products.resplit.hr\/#organization","name":"Products Re.Split","alternateName":"TechResources","url":"https:\/\/products.resplit.hr\/","logo":{"@type":"ImageObject","inLanguage":"hr","@id":"https:\/\/products.resplit.hr\/#\/schema\/logo\/image\/","url":"https:\/\/products.resplit.hr\/wp-content\/uploads\/2024\/05\/cropped-ReSizedLogo-2.png","contentUrl":"https:\/\/products.resplit.hr\/wp-content\/uploads\/2024\/05\/cropped-ReSizedLogo-2.png","width":512,"height":512,"caption":"Products Re.Split"},"image":{"@id":"https:\/\/products.resplit.hr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/resplit\/"]},{"@type":"Person","@id":"https:\/\/products.resplit.hr\/#\/schema\/person\/3e26325a18d60be6ec97fd0862c665dc","name":"admin","image":{"@type":"ImageObject","inLanguage":"hr","@id":"https:\/\/products.resplit.hr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d63d0cd141b3cefc77e81fc870f01ab1eb7a6a10acfcff12bfac2c5528103734?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d63d0cd141b3cefc77e81fc870f01ab1eb7a6a10acfcff12bfac2c5528103734?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/reproducts.resplit.hr\/wp"],"url":"https:\/\/products.resplit.hr\/hr\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/products.resplit.hr\/hr\/wp-json\/wp\/v2\/posts\/1218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/products.resplit.hr\/hr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/products.resplit.hr\/hr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/products.resplit.hr\/hr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/products.resplit.hr\/hr\/wp-json\/wp\/v2\/comments?post=1218"}],"version-history":[{"count":2,"href":"https:\/\/products.resplit.hr\/hr\/wp-json\/wp\/v2\/posts\/1218\/revisions"}],"predecessor-version":[{"id":1221,"href":"https:\/\/products.resplit.hr\/hr\/wp-json\/wp\/v2\/posts\/1218\/revisions\/1221"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/products.resplit.hr\/hr\/wp-json\/wp\/v2\/media\/1219"}],"wp:attachment":[{"href":"https:\/\/products.resplit.hr\/hr\/wp-json\/wp\/v2\/media?parent=1218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/products.resplit.hr\/hr\/wp-json\/wp\/v2\/categories?post=1218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/products.resplit.hr\/hr\/wp-json\/wp\/v2\/tags?post=1218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}