Password Policy Management

The Enable Recycle Bin is greyed out after it has been enabled

Password spraying: Attack guide and prevention tips 

The phrase ‘spray and pray’ likely came from the military, used to describe inaccurately firing automatic weapons in the hope that one shot eventually found its mark. It’s now used to describe any scenario where a strategy relies on... Read More

Image of password written on a sticky note

The risk of default passwords: What they are & how to stay safe

Cyberattacks are evolving rapidly. As technology advances, so do the tools and techniques used by hackers, from AI-driven phishing schemes to highly targeted ransomware attacks. But despite this increasing sophistication, many successful breaches still rely on something shockingly simple:... Read More

A padlock resting on a computer keyboard

Password encryption: What is it and how does it work?

As companies rapidly shift towards cloud-based environments, employees find themselves juggling multiple accounts across a variety of platforms, each one most likely safeguarded by a password. These digital keys are often the first (and sometimes only) line of defense... Read More

The Enable Recycle Bin is greyed out after it has been enabled

Password spraying: Attack guide and prevention tips 

The phrase ‘spray and pray’ likely came from the military, used to describe inaccurately firing automatic weapons in the hope that one shot eventually found its mark. It’s now used to describe any scenario where a strategy relies on... Read More

PCI password security checklist

How to build a PCI-compliant password policy

The Payment Card Industry Data Security Standard (PCI DSS) is a set of guidelines designed to protect cardholder data and ensure that organizations handling payment card information maintain a secure environment. Among its many requirements, PCI DSS places significant... Read More

Man works on laptop on password policy strategy

Five strategy recommendations for planning a password policy

An Active Directory full of strong, non-compromised passwords should be an essential cybersecurity goal for every organization. A clearly articulated and enforceable password policy strategy is the best way to put this into practice. However, it’s important to tailor... Read More