It is arguably one of the most dreaded words for any organization today – ransomware. Ransomware can bring a bustling, thriving, profitable business to its knees in hours. The aftermath can lead to a ripple effect of lost revenue,... Read More
Specops Software Blog
Understanding UK’s National Cyber Security Strategy to Achieve Cyber Resilience in 2022
UK government data shows that within the last year cyber-attacks against UK businesses are becoming more frequent. Today almost one in three businesses state they experience breaches or attacks at least once a week. In light of the increased... Read More
Active Directory and domain controller security best practices
Windows Servers in the environment housing the Active Directory Domain Services (AD DS) role are some of the most sought-after targets for attackers today. It is because Active Directory contains the credential store for all the user and computer... Read More
SolarWinds hack explained: Weak password “solarwinds123” cause of SolarWinds Hack
When you look at many of the high-profile breaches that have taken place in recent years, many of them had a common denominator – weak or compromised passwords. Weak passwords are easily compromised and can lead to significant breach... Read More
Ransomware attack types: Ransomware Attacks 101 – from Wannacry to Darkside
Think of ransomware attacks as virtual kidnapping. Ransomware actors use encryption to hold your devices’ functions and files hostage or lock you out of your system. Then they request a ransom for its release. These actors are mostly motivated... Read More
7 top trends in cybersecurity for 2022
Cybersecurity has become a critical priority for businesses as they now navigate current threats in 2022. Many trends in cybersecurity are emerging as companies continue to make adjustments due to the threat landscape. The stakes could not be higher... Read More
Family Educational Rights and Privacy Act (FERPA) and Cybersecurity
Most have heard of HIPAA, GPDR, and other compliance regulations and best practices that govern data privacy and security for healthcare, personally identifiable information, and other forms of sensitive data. However, when it comes to educational institutions, the Family... Read More
Popular work-related services fail to prevent leaked passwords
Preventing the use of weak and leaked password within an enterprise environment is a manageable task, but what about other services where employees share business-critical data in order to do their work? The researchers at Specops Software investigated the... Read More
Cyber risk management platform Outpost24 joins forces with international investment firm Vitruvian Partners for further global expansion
Stockholm – 13 July 2022: Outpost24 (“Outpost24” or the “Company”), a leading innovator in identifying and managing cybersecurity threats and vulnerabilities, today announced it has partnered with Vitruvian Partners (“Vitruvian”) to power the Company’s next phase of growth. The new... Read More
Vulnerability testing vs. Penetration testing
With the wide range of growing cybersecurity threats creating risks for businesses today, organizations must be proactive in their approach to cybersecurity. The days of reactive security and waiting for cybersecurity incidents are over. The sheer scope, scale, and... Read More