Office 365 is a hot target for attacks. Protecting organizational data in Office 365 comes down to preventing various attacks designed to gain access to user accounts. Read More
Authentication
Using Firefox Enterprise GPO’s to Enable Windows Integrated Authentication to Specops Websites
Mozilla recently launched Firefox 60, which now includes official support for configuration via Active Directory Group Policies. For customers using Specops uReset, Specops Authentication, or Specops Password Reset, this means you can now set up your Firefox users to... Read More
O365 attacks continue exploiting your weakest link
With more than 120 million active users, Office (O365) is a frontrunner in the cloud service popularity contest. Consequently, its users are equally popular with hackers. For IT pros, storing data in the cloud means a bigger attack surface,... Read More
Security questions – authenticating with your worst kept secrets
Knowledge based authentication (KBA) is a form of identity verification that asks users to answer a “secret” to prove their identity before accessing a system. Passwords and security questions are the most common forms of KBA. Their familiarity means... Read More
Why choose 3rd party MFA for O365?
The adoption of SaaS services requires organizations to house user data in the cloud. Without the right strategy in place, this can mean user management and authentication processes – outside the confines of IT. Take the move to O365,... Read More
Step up your security game with dynamic MFA
Multi-factor authentication (MFA) requires authentication from independent categories of credentials: something you know (i.e. password), something you have (i.e. Mobile device), and something you are (i.e. Fingerprint). MFA enhances security when accessing resources on SaaS applications, and even during... Read More
The father of password rules is sorry for wasting your time
Do you ever wonder why you have to add an uppercase letter or an exclamation point when you create a password? You can thank Bill Burr for that. In 2003, Bill Burr wrote password security guidelines for National Institute... Read More
Credential stuffing – the password breach aftermath
RIP Passwords – the 2017 Data Breach Industry Forecast by Experian anticipates your demise. Until then, experts are predicting “aftershock” breaches. In 2016, there were 1,093 security incidents involving loss of sensitive data, and three billion credentials stolen worldwide.... Read More
Password Strength Meters – more harm than good?
Fact one, passwords are here to stay, at least for the near future. Fact two, users have not gotten any better at making them stronger, or using additional factors during authentication. To help users with this seemingly impossible task,... Read More
“123456” and “password” continue to be the most commonly used passwords, when will people learn?
Teampassword published a list of the top 25 most common passwords of 2016. Your policy may not allow weak passwords such as 123456 or password, but even if the password complexity requirement is enabled in the standard Windows Password... Read More