Specops Software Blog

The European Countries Most at Risk of Cyber-Crime

The severity of cyber-breaches has become more and more intense in recent years; as a result, security experts at Specops Software sought to find out which (Western) European countries are the most cyber-insecure for citizens. To find out, Specops... Read More

Election Security Beyond the Voting Booth

A lot of the focus of today’s U.S. election security discussion is about securing the act of voting itself – things like testing machines, adding paper logs, avoiding internet connections for reporting results, etc. However, if you’re just focusing... Read More

How to configure password expiration notifications

When it comes to notifying users that their passwords are going to expire soon, more communication is always better. Users do not enjoy the password change process; keeping them informed as to when their password will expire is a great... Read More

“Love” conquers most in passwords

Stockholm – Specops Software announced today the latest updates to Specops Breached Password Protection, a solution to continuously check if an account in Active Directory is using a leaked password. Analysis reveals the most common words used in password... Read More

PCI compliance requirements in the UK

In 2018, criminals successfully stole £1.4 billion through fraud and scams. Now more than ever, businesses that processes cardholder data look to the Payment Card Industry Data Security Standard (PCI DSS) for security recommendations. PCI DSS is a set... Read More

NIST password standards

NIST password standards and requirements

The National Institute of Standards and Technology (NIST) sets the information security standards for federal agencies. Through its Special Publication (SP) 800-series, NIST helps organizations meet regulatory compliance requirements such as HIPAA, and SOX. The recent update to the... Read More

specops password auditor interface

Checking for Pwned Passwords in Active Directory

If you are trying to fulfill a regulation requirement like that of NIST, you might find yourself tasked with attempting to set up your Active Directory environment to check for leaked passwords against an external password deny list. For... Read More