User authentication services for MFA impact many systems running in businesses today. But what happens when that authentication service is down or no longer reliable? Planning for the potential pitfalls and challenges in authentication means that your organization won’t... Read More
Password Policy Management
What are password mask attacks?
Mask attacks are a targeted brute-force technique used by bad actors to crack passwords. Traditional brute-force attacks systematically try every possible combination of letters, numbers, and symbols to guess a target password. With mask attacks, the goal is to... Read More
How to block common patterns in Active Directory passwords
Between work and personal accounts, the average person may have dozens of passwords to remember. Strong password hygiene indicates a unique password for each account, but when users have so many passwords to remember, they come up with a... Read More
New in Specops Password Policy 7.7 – Improved Password Expiry Emails and More
Today we’ve released the latest update to our Active Directory password management solution, Specops Password Policy 7.7. This release includes improved intervals for password expiration reminder emails, as well as new functionality for sending test emails and selecting specific... Read More
Service account password rotation
Service accounts are the unseen heroes of your organization’s architecture – they keep critical services running. While most organizations are generally aware of the sensitive nature of service accounts, password practices can still be poor. It is not uncommon... Read More
How to recover from a ransomware attack
It is arguably one of the most dreaded words for any organization today – ransomware. Ransomware can bring a bustling, thriving, profitable business to its knees in hours. The aftermath can lead to a ripple effect of lost revenue,... Read More
Understanding UK’s National Cyber Security Strategy to Achieve Cyber Resilience in 2022
UK government data shows that within the last year cyber-attacks against UK businesses are becoming more frequent. Today almost one in three businesses state they experience breaches or attacks at least once a week. In light of the increased... Read More
SolarWinds hack explained: Weak password “solarwinds123” cause of SolarWinds Hack
When you look at many of the high-profile breaches that have taken place in recent years, many of them had a common denominator – weak or compromised passwords. Weak passwords are easily compromised and can lead to significant breach... Read More
Ransomware attack types: Ransomware Attacks 101 – from Wannacry to Darkside
Think of ransomware attacks as virtual kidnapping. Ransomware actors use encryption to hold your devices’ functions and files hostage or lock you out of your system. Then they request a ransom for its release. These actors are mostly motivated... Read More
7 top trends in cybersecurity for 2022
Cybersecurity has become a critical priority for businesses as they now navigate current threats in 2022. Many trends in cybersecurity are emerging as companies continue to make adjustments due to the threat landscape. The stakes could not be higher... Read More