Cybersecurity Tips

open lock on loose keyboard buttons

Hackers’ 5 top password cracking techniques

Cyber-attacks come in many forms and continue to evolve, but there’s one tried and trusted unauthorized entry method that’s stood the test of time – cracking a user’s password. Despite this, too many organizations still rely on outdated advice... Read More

red lock with white cross - cybersecurity in NHS

NHS cybersecurity experts talk passwords and Specops

NHS organizations have a challenge on their hands when it comes to cybersecurity. They have to defend sprawling, heterogeneous IT environments against relentless cyber‑threats, all while keeping their number one priority in mind: patient care. On a recent Specops... Read More

Image of password written on a sticky note

The risk of default passwords: What they are & how to stay safe

Cyberattacks are evolving rapidly. As technology advances, so do the tools and techniques used by hackers, from AI-driven phishing schemes to highly targeted ransomware attacks. But despite this increasing sophistication, many successful breaches still rely on something shockingly simple:... Read More

Silhouette of a man standing in front of a screen of colored lights

Man-in-the-Middle (MITM) attack guide & defense tips

Imagine you’re overseeing your organization’s network security when suddenly you notice an unusual traffic pattern: packets flowing through a server that shouldn’t be there. What you’re witnessing could be a Man-in-the-Middle (MITM) attack in action, where an adversary stealthily... Read More

Image of a sim card

SIM-swap fraud: Scam prevention guide 

SIM-swapping is quickly becoming a favorite form of attack for cybercriminals. According to the National Fraud Database, SIM-swap fraud jumped by over 1,000% in 2024. Hackers port a victim’s number onto a rogue SIM, so they can intercept SMS-based... Read More

A padlock resting on a computer keyboard

Password encryption: What is it and how does it work?

As companies rapidly shift towards cloud-based environments, employees find themselves juggling multiple accounts across a variety of platforms, each one most likely safeguarded by a password. These digital keys are often the first (and sometimes only) line of defense... Read More

Grey dragon head on door

DragonForce: Inside the Ransomware-as-a-Service group

​The popularity of Software-as-a-Service (SaaS) has exploded over the past decade. The benefits for organizations are obvious – SaaS is scalable, cost-effective, and doesn’t need complex installation or maintenance. Gartner expects global spending on SaaS to reach $3 billion... Read More