While IT administrators often innately understand the cost of not addressing a cybersecurity project, it can be hard to get non-IT management to understand why certain projects should be prioritized. In their July 2018 survey, Spiceworks and AT&T found... Read More
Specops Password Policy comparison and price
In the market for a third-party password policy solution? If an audit has revealed poor password practices, you may look to Microsoft Fine-Grained Password Policy (FGPP) for additional flexibility over default domain password settings. Unfortunately, FGPP still lacks a... Read More
NIST Password Standards
The National Institute of Standards and Technology (NIST) sets the information security standards for federal agencies. Through its Special Publication (SP) 800-series, NIST helps organizations meet regulatory compliance requirements such as HIPAA, and SOX. The recent update to the... Read More
How to enforce password history in Active Directory
The “Enforce password history” setting in Active Directory is used to determine the number of unique passwords a user must use before they can use an old password again. This is an important setting because password reuse is a... Read More
How to change user passwords in Active Directory
We often get asked how our self-service solution changes passwords on a user account in Active Directory. It’s a more interesting question than it sounds as there are many processes at work here, and many ways to do it.... Read More
Specops Authentication Client and Duo Authentication for Windows Login
The Specops Authentication Client provides enhancements to the Windows logon experience by wrapping the built-in Windows credential provider (GINA). This includes allowing users to reset their passwords from the login screen, as well as enhancing the feedback users receive... Read More
How to audit network passwords
The quality of your security program comes down to the core element of passwords. Uncovering its weaknesses involves more than annual password audits. Read More
Best practice tips for your password policy
Many organizations have yet to craft an effective password policy - the policy says one thing, but something very different is taking place on the network. Is your current approach to passwords adequate? Read More
Password security services distinguish successful MSPs from the generalists
As MSPs detach from price-based competition, they must also find a way to improve their service offering. A specialization concerned with securing passwords separates successful MSPs from the generalists. Read More
Why is a leaked password list so important?
Many of the major breaches come down to one simple (and overlooked) factor: the password. With password reuse, it only takes one compromised password to lead to a company breach. Read More