The Criminal Justice Information Services Division (CJIS) is a division of the FBI that provides a number of tools and services to law enforcement agencies around the country. Through systems like the National Crime Information Center (NCIC), Integrated Automated... Read More
Authentication
Specops Authentication enrollment data in Active Directory
The Specops Authentication cloud platform is unique in that user data is stored in the customer’s on-prem Active Directory database. Usernames, passwords, and enrollment data/proofs for the various Identity Services provided by Specops Authentication are stored in the customer’s... Read More
Secure identity verification best practices
Identity verification must consider the level of access being granted, the type of data being accessed, and the action being performed. Read More
How to stop O365 phishing attacks
O365 phishing attacks are are easy - just trick the recipient into giving up their password on a fake login page. Requiring users to authenticate with additional factors is the best way to stop the attack. Read More
Specops uReset and GDPR compliance
With the introduction of Specops uReset (version 8.1 or later) in the Microsoft EU data center, organizations can now choose which instance of Specops uReset they want to use. Specops uReset is a hybrid password reset solution. The cloud... Read More
Comparing Specops Authentication for O365 and Office 365 MFA: An MVP’s Perspective
In this guest post, Microsoft MVP Nick Cavalancia provides a high-level comparison of how Microsoft and Specops implement MFA for O365, and what it means to the security-conscious organization. Read More
Azure MFA outage – is it time to rethink MFA?
Azure Active Directory MFA recently suffered a global outage. Can organizations increase authentication security without disrupting the end-user experience? Read More
Why is a leaked password list so important?
Many of the major breaches come down to one simple (and overlooked) factor: the password. With password reuse, it only takes one compromised password to lead to a company breach. Read More
What you should know about O365 two-factor authentication
Securing the O365 login process can be confusing when you have so many options, some of which are out-of-the-box. Here's what you need to know. Read More
How do I create HITRUST compliant password policies?
The HITRUST CSF clarifies guidelines on security standards for the healthcare industry with specific feature recommendations where the password management system is concerned. Read More









