Perimeter-based security models were built for a world where corporate networks had clear boundaries—but that world no longer exists. Modern enterprises operate in hybrid environments with cloud services, remote workforces, and third-party integrations, creating countless entry points for attackers.... Read More
Cybersecurity Tips
Troubleshooting tips for Microsoft Entra (formerly Azure AD) banned password list
Not all implementations of Microsoft Entra Password Protection (formerly Azure AD Password Protection) go smoothly. This blog explores some quirks with the banned password lists, and offers remediation and troubleshooting tips related to banned password list in Microsoft Entra. Understanding the Scoring System Many teams get tripped up when... Read More
Five useful tips on improving password security in your organization
Password-related breaches are on the list of the most popular attacks along with malware infection and social engineering. According to Verizon, almost 80% of all the breaches are connected with compromised credentials or weak passwords. While it’s a generally... Read More
How to find Active Directory passwords set to never expire
Passwords set to never expire can be a security vulnerability for your network. Here is how to to find Active Directory (AD) passwords set to never expire. Some regulatory bodies require passwords to expire every 90 days, while others... Read More
Best practice tips for your password policy
Many organizations have yet to craft an effective password policy - the policy says one thing, but something very different is taking place on the network. Is your current approach to passwords adequate? Read More
4 Steps to Troubleshooting Group Policy
A customer called recently who was having some pretty basic troubles with Specops Deploy. What struck a chord with me was how important the simple, basic steps are in troubleshooting Group Policy. Sure, there is plenty of complex stuff... Read More