Today, the Specops research team is sharing the results of their latest findings on the use of Fortune 500 company names in compromised passwords. The release of these findings coincides with the latest addition of over 33.9 million compromised... Read More
Password Policy Management
Authentication service outage or compromise? How to keep your business running
User authentication services for MFA impact many systems running in businesses today. But what happens when that authentication service is down or no longer reliable? Planning for the potential pitfalls and challenges in authentication means that your organization won’t... Read More
Password mask attacks explained: What are they & how do they work?
Credential-based attacks remain one of the most effective techniques used by cybercriminals to breach enterprise networks. In 2024 alone, 88% of web application attacks involved the use of stolen credentials, according to Verizon’s 2025 Data Breach Investigations Report. Among... Read More
How to block common password patterns in Active Directory passwords
Between work and personal accounts, the average person may have dozens of passwords to remember. Strong password hygiene indicates a unique password for each account, but when users have so many passwords to remember, they come up with a... Read More
New in Specops Password Policy 7.7 – Improved Password Expiry Emails and More
Today we’ve released the latest update to our Active Directory password management solution, Specops Password Policy 7.7. This release includes improved intervals for password expiration reminder emails, as well as new functionality for sending test emails and selecting specific... Read More
Service account password rotation
Service accounts are the unseen heroes of your organization’s architecture – they keep critical services running. While most organizations are generally aware of the sensitive nature of service accounts, password practices can still be poor. It is not uncommon... Read More
How to recover from a ransomware attack
It is arguably one of the most dreaded words for any organization today – ransomware. Ransomware can bring a bustling, thriving, profitable business to its knees in hours. The aftermath can lead to a ripple effect of lost revenue,... Read More
Understanding UK’s National Cyber Security Strategy to Achieve Cyber Resilience in 2022
UK government data shows that within the last year cyber-attacks against UK businesses are becoming more frequent. Today almost one in three businesses state they experience breaches or attacks at least once a week. In light of the increased... Read More
SolarWinds hack explained: Weak password “solarwinds123” cause of SolarWinds Hack
When you look at many of the high-profile breaches that have taken place in recent years, many of them had a common denominator – weak or compromised passwords. Weak passwords are easily compromised and can lead to significant breach... Read More
Common ransomware attack types: How they work & tips for prevention
Think of ransomware attacks as a form of digital kidnapping. Cybercriminals use encryption to lock you out of your files or devices, effectively holding them hostage until a ransom is paid. Like traditional kidnappers, their primary motive is financial... Read More