News

music notes and password security

Defending Your Network from RockYou2021 

In June 2021, a large data dump was posted to a popular internet hacking forum. This dataset was termed “rockyou2021,” named after the popular password brute-force wordlist known as Rockyou.txt.   Media and Twitter alike were abuzz with what to... Read More

masked password credential attacker

Pipeline Cybersecurity Initiative best practices

There is no question that ransomware attacks are on the rise.  They present what is arguably the most dangerous risk to businesses today when looking at the cybersecurity threat landscape. Recently, a ransomware attack impacted the Colonial Pipeline, one of the largest fuel... Read More

finger on scale

Service account security best practices

There are number of privileges and roles granted to Windows users. However, it’s often necessary to restrict roles to specialized accounts called service accounts. These Active Directory (AD) accounts have deeper access to OS infrastructure, making them both handier and higher-priority... Read More

How to meet password requirements for PSN compliance

If you’re applying for a Public Services Network (PSN) compliance certificate, you will need to demonstrate your commitment to security and password protection. In this article we define these requirements and offer some valuable advice and solutions to help... Read More

NIST password standards

What is NIST guidance on password managers?

Today’s end-users are juggling many sets of credentials for accessing critical business resources. To prevent users from writing-down, reusing, or selecting weak but memorable passwords, businesses are turning to password managers. A password manager is an encrypted database used for storing, retrieving, and generating passwords. Enterprise password managers not only improve password security, but also simplify password management... Read More

specops software logo

Specops Software Survey: 48% of Businesses Do not Use a User Verification Policy for Password Reset Calls to IT Service Desks

Specops Software survey highlights social engineering vulnerabilities among IT service help desks.  48% of organizations do not have a user verification policy in place for incoming calls to IT service desks, according to Specops Software, the leading provider of password management and authentication solutions. The information was uncovered as part of Specops Software’s survey of more than 200 IT leaders from the private and public sectors... Read More