News

hacker running away with data

What Happens When You Don’t Secure The Service Desk

Employee password resets make up a big percentage of the tickets that the service desk handles on a daily basis. While a lot can be said for the high costs that are incurred at the help desk for these types of calls, which Forrester estimates cost about $70 per call, more can be... Read More

update cached credentials

Network hardening techniques

The network is the lifeblood of any infrastructure, allowing communication between hardware and services. Protecting one’s network against penetration is essential. Successful attacks can lead to data theft or outages, effectively crippling services, and undermining privacy. These problems are expensive and time consuming... Read More

Specops Software

Apache Log4j Vulnerability – CVE-2021-44228

Apache Software Foundation issued an emergency update for a critical zero-day vulnerability on December 9, 2021. The vulnerability affects open source logging tool Log4j included in almost every Java application. Specops has reviewed our products and there is no... Read More

Specops Software

Password Policy Compliance Report in Specops Password Auditor

Organizations looking to evaluate how well their existing password policies measure up against different compliance standards may benefit from running a free scan with Specops Password Auditor. One of the reports Password Auditor provides is the Password Policy Compliance report.... Read More

hands with gears on top

What is Gramm-Leach Bliley Act (GLBA)?

The Gramm-Leach-Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999, requires financial institutions to explain their information-sharing practices to their customers, and to safeguard sensitive data. The GLBA applies to all companies that offer consumer financial products or services like loans, financial or investment advice, or... Read More

coding with lock

CIS Benchmark Password Policy

With technology constantly evolving, cybersecurity organizations are helping people, businesses, and governments with best practices to protect themselves against emerging threats. The Center for Internet Security (CIS) is one of these advisement groups. The CIS Controls and CIS Benchmarks provide globally recognized best practices for security IT systems and... Read More

hacker stealing password information

Protecting Your Organization Against the Nobelium Attacks

The UK’s National Cyber Security Centre has recently issued guidance to organizations in response to a series of attacks. This guidance was released following a notification in which Microsoft indicated that it had identified new activity tied to an... Read More

finger on scale

What metrics should sysadmins use to show improvement over time?

To illustrate how essential IT systems are to the proper functioning of the business, system administrators should use a number of metrics to communicate key KPIs with non-technical leadership. This can help justify the overall budget of the IT department, as well as the... Read More