In mid-2025, cybersecurity researchers disclosed what became one of the largest credential compilations ever recorded: approximately 19 billion username-and-password pairs, aggregated from thousands of data breaches spanning more than a decade. The dataset, circulated on dark web forums, represents an extraordinary concentration of compromised credentials, and a stark warning for any organisation that relies on passwords to protect sensitive information.
Nineteen billion is not a number that registers easily. To put it in context, the global population is approximately eight billion. This means there are more than two compromised credentials for every person on Earth. While many of these are duplicates or outdated, the sheer volume guarantees that a significant proportion remain valid, particularly where users have reused passwords across multiple services.
The implications for businesses are immediate. If your employees use the same password for their personal email, a social media account, and your document management system, a breach at any one of those services puts your organisation at risk. Credential stuffing attacks, where attackers systematically try stolen username-password combinations against other services, are automated, fast, and alarmingly effective.
Your document management system is one of the most valuable targets in your organisation. It contains contracts, financial records, HR files, intellectual property, client data, and compliance documentation. A successful breach does not just expose one file; it potentially exposes everything.
Consider what an attacker could do with access to your document repository:
The document management system is not a peripheral system. It is central to operations, and it must be protected accordingly.
The single most effective step any organisation can take is to implement multi-factor authentication (MFA). MFA requires users to provide two or more verification factors to gain access: something they know (a password), something they have (a phone or hardware token), or something they are (a fingerprint or facial recognition).
With MFA enabled, a stolen password alone is not enough to gain access. Even if an attacker has a valid username and password from the 19-billion credential dump, they cannot log in without the second factor. DocFlow supports MFA as standard, and we strongly recommend that every organisation enables it for all users, not just administrators.
MFA is critical, but it does not eliminate the need for good password practices. Organisations should enforce:
Even with strong authentication, defence in depth requires encryption. If an attacker somehow gains access to the underlying storage, encrypted files remain unreadable. DocFlow encrypts all documents at rest using AES-256 and all data in transit using TLS 1.3. Encryption keys are managed separately from the data they protect, ensuring that no single point of compromise can expose your documents.
Security is not an add-on at DocFlow; it is the foundation. Here is how the platform protects your documents:
The 19-billion password leak is not an abstract threat. It is a dataset that attackers are actively using. Here are the steps every organisation should take immediately:
Passwords are a known weak point. The 19-billion leak simply makes the scale of that weakness undeniable. The organisations that act now, implementing MFA, encrypting their data, and choosing platforms built with security at their core, will be the ones that avoid becoming the next headline.
See how DocFlow can streamline your workflows, strengthen compliance and unlock AI-powered insights for your organisation.