Colonial Pipeline. SolarWinds. Marks & Spencer. Change Healthcare. Every one of these started the same
way: an attacker obtained a credential that a human knew. The industry response — longer passwords, MFA,
awareness training — leaves the fundamental vulnerability intact. The user still holds the
credential. Anything in human hands can be extracted.
MyCena addresses this at the source. The organisation generates every credential centrally and injects it
invisibly at login. Users access every system normally — they simply never see, never know, and never hold the
credential. There is nothing to phish, share, or steal.
Colonial Pipeline — 2021
$4.4M
A single VPN password on the dark web. 45% of East Coast fuel supply shut for 6
days. National emergency declared.
Entry point: compromised VPN credential
Change Healthcare — 2024
$2.5B
Stolen Citrix credential, no MFA. Nine days inside. 190 million patient records
exposed. 94% of US medical practices impacted.
Entry point: stolen remote access credential
Marks & Spencer — 2025
£300M+
Credential access led to ransomware across retail and supply chain systems. Online
operations suspended. Shares fell 15%.
Entry point: compromised employee credential
The founding insight
“In the physical world, no employer asks an employee to manufacture their own office key.
So why do we ask them to do exactly that in the digital world — every day, for every system?”
— Julia O’Toole, Co-CEO, MyCena Security