Password-related breaches are on the list of the most popular attacks along with malware infection and social engineering. According to Verizon, almost 80% of all the breaches are connected with compromised credentials or weak passwords. While it’s a generally... Read More
Specops Software Blog
Finding Active Directory passwords set to never expire
Passwords set to never expire can be a security vulnerability for your network. Some regulatory bodies require passwords to expire every 90 days, while others recommend setting passwords to never expire – as long as other protocols are in... Read More
The Most Common Football Team Names Found in Breached Passwords
STOCKHOLM – If the Superbowl winner could be predicted by breached password lists, the Los Angeles Rams would be this season’s winner. Today, Specops Software released an update to the Breached Password Protection list and of a recent analysis of sports-related compromised passwords. “With the NFL season beginning in the... Read More
Active Directory weak password checker
One of the most important things that system administrators can do to keep their network resources secure is to require users to use strong passwords. After all, long and complex passwords are far less prone to being breached than... Read More
Password policy enforcement
One of the most critical things that organizations must do in order to ensure the security of their user accounts is to establish a strong password policy, and then ensure that the policy is being enforced. The Windows operating... Read More
SSPR registration challenges & solutions
As most organizations today are settling into providing remote work solutions to employees, common service desk tasks can become even more challenging for help desk professionals. This can include password resets, forgotten passwords, locked accounts, and other issues related... Read More
Security at the Helpdesk
IT departments have always invested heavily in making sure that their systems are able to positively confirm user identities prior to granting users access to sensitive resources. Not surprisingly, there are any number of mechanisms available for authenticating users.... Read More
How to find default passwords in Active Directory
What causes identical or default passwords in Active Directory, and how can you find them? A lot of organizations script the creation of new user accounts to standardize, simplify, and speed up the process. Unfortunately, this can also leave... Read More
How to check password complexity requirements in Active Directory
Active Directory password policies are not always what they seem – often there are discrepancies on settings such as password length, password complexity, maximum password age, or long-forgotten Fine-Grained Password Policies configured in the domain. In this blog post we... Read More
The Sectors Experiencing the Most Cyber-Attack Threats While Working from Home, Revealed
Which sectors are experiencing the largest number of cybercrime threats whilst working from home? To do this, we analysed 2,043 different businesses to find out which sectors are most “at risk.” Read More