Our Active Directory best practices address security vulnerabilities in your organization, and serve as barriers for attackers. Read More
Specops Software Blog
What causes BitLocker Recovery Mode?
This blog will look at the root causes of BitLocker Recovery Mode, and how you can mitigate its impact on the helpdesk with self-service key recovery. Read More
How to enforce password complexity in O365?
As organizations move data to the cloud, strong password policies have never been more important. Here is how to use the on-premises Active Directory to enforce password complexity in O365. Read More
CEO Series: Everyone has leaked passwords – vital software is here
I can promise you that there are leaked passwords in your organization. As you are aware, this makes it easier for hackers to carryout criminal attacks – 80 percent of data breaches are related to passwords. How do I... Read More
Specops Software acquired by Monterro
Stockholm, August 21, 2019 – Specops Software is excited to announce that the equity investment firm, Monterro has become the majority owner of Specops Software. Specops Software and Monterro jointly see the acquisition as a great opportunity for accelerated... Read More
Unencrypted biometrics reveal massive risk
Security researchers gained access to more than 27.8 million records, including fingerprints, facial recognition data, usernames and passwords, in the mostly unencrypted and unhashed Biostar 2 database. Biostar 2 is a web-based biometrics locking system used for physical security... Read More
CJIS Password Policy Requirements
The CJIS Password Policy requirements include maintaining a list of “banned passwords” with values known to be commonly used, expected, or compromised. Read More
GDPR encryption requirements
Encryption is a necessary component of an organization’s security policy. The GDPR encryption requirements consistently call for "appropriate technical" and "organizational measures." Read More
Password length best practices
A long password is a strong password, however it’s still not any good if it contains your username or other easily guessable words. This blog explains how you can enforce password length alongside other best practices. Read More
What is full-disk encryption?
In today’s threat landscape, encryption is a necessary component of an organization’s security policy. Encryption is the process of changing information to make it unreadable by anyone except those possessing special knowledge (commonly referred to as a secret key) that allows them to change the... Read More