Specops Software Blog

Specops introduces Secure Service Desk

Verify user identity at the service desk before unlocking accounts and resetting passwords. Secure Service Desk is a tool that can tell you if callers are who they say they are. Read More

ransomware attack on laptop

Impact and cost of ransomware attacks

Sophos, a global leader in cybersecurity, revealed in its survey “The State of Ransomware 2021” that the average total cost of recovery from a ransomware attack has more than doubled in a year, increasing from $761,106 in 2020 to... Read More

Specops Password Policy comparison and price

In the market for a third-party password policy solution? If an audit has revealed poor password practices, you may look to Microsoft Fine-Grained Password Policy (FGPP) for additional flexibility over default domain password settings. Unfortunately, FGPP still lacks a... Read More

numbers dripping down with lock in the background

ICO’s take on password security

The UK has officially entered the Brexit transition period until the end of 2020, during which the GDPR will continue to apply. There are three possible outcomes after the transition period: the UK exits transition with no EU trade... Read More

three random words

How to make three random words secure

When the National Cyber Security Centre (NCSC) started promoting three random words as passwords, the general public had practical advice that was easy to follow. While it is extremely valuable to provide sound advice for choosing passwords, the perceived... Read More

reset cached domain password

Reset the cached domain password for remote workers

Due to the global pandemic crisis users are working remotely more than ever. For IT departments, this has meant more time supporting these users. Support calls lower user productivity for users, and strain service desk resources. To ensure business... Read More

Windows password recovery tool

Password reset best practices for self-service

Security is an essential part of almost everything we do with technology today. We unlock devices, sign in to websites, and routinely find ourselves verifying our identity, whether we’re online for work, or personal time. In a business setting,... Read More