Specops launches self-service encryption key recovery

Stockholm – Specops Software announced today the release of Specops Key Recovery. The solution addresses the common occurrence of encryption device lockouts by enabling users to unlock computers encrypted or managed by Symantec Endpoint Encryption. Rather than calling the... Read More

What is a password dictionary attack?

A password dictionary attack is a brute-force hacking method used to break into a password-protected computer or server by systematically entering every word in a dictionary as a password. Read More

lösenord problem

Cyber Essentials Password Policy

Passwords play an important role in the Cyber Essentials scheme. If you are planning for Cyber Essentials accreditation, you will need to make sure your password policy is up to the challenge. Read More

Self-service adoption best practices

If you have decided to implement a self-service password reset solution, you are one step closer to increasing user productivity, and reducing password management costs. However, rolling out the solution is only half the battle – user adoption is... Read More

How to audit network passwords

The quality of your security program comes down to the core element of passwords. Uncovering its weaknesses involves more than annual password audits. Read More

Passwords are the biggest threat to GDPR compliance

Data protection authorities have imposed their first GDPR fine in Germany after a local chat service exposed 330,000 credentials. What will be the consequence of the Collections leak that impacts 2.2 billion usernames & passwords? Read More

How to stop O365 phishing attacks

O365 phishing attacks are are easy - just trick the recipient into giving up their password on a fake login page. Requiring users to authenticate with additional factors is the best way to stop the attack. Read More