Specops Software Blog

Password Reset Registration

SSPR registration guide

The benefits of using a self-service password reset (SSPR) solution can be quantified by the number of reduced password-related calls to the IT service desk. For many organizations, this means significant cost savings. Gartner Research estimates that each password... Read More

scam warning shown on laptop

£36m lost to fraud and cyber crime in 2020

In 2019, an estimated 1.94 billion people purchased goods or services online – and that number is growing year-on-year. However, those shopping online must be wary when making any online purchases, as our latest research has found that £36,262,000 has... Read More

Specops supports PingID to secure password resets

Stockholm, November 17, 2020 – Specops Software released an update to its Specops Authentication platform today. The platform secures password resets, password changes, and encryption key recovery with multi-factor authentication (MFA). The introduction of PingID authentication advances security for... Read More

How to audit password changes in AD

Windows Server provides native tools for changing user passwords and auditing password changes in AD. However, they are somewhat lacking. Third-party tools such as Specops uReset can make the process easier and more secure. ADUC There are two main... Read More

How to unlock active directory account lockouts

There is no question that one of the most common tasks that helpdesk and IT admins carry out on a daily basis is user account management.  Specifically, triaging user account issues in an Active Directory domain environment takes a... Read More

The most searched for programming languages around the world

As the employment market becomes more competitive, self-taught skills and experience have become increasingly valuable across the globe, and programming languages are no exception. In fact, our latest research found that thousands of individuals are looking to teach themselves... Read More

coding with lock

Understanding the Cybersecurity Maturity Model Certification (CMMC)

Long-standing information security best practices, frameworks, and regulations are a reliable means for ensuring that networks are resilient, and information remains secure. Still, oftentimes organizations and individuals will have their own interpretation of such security practices but that may... Read More