The severity of cyber-breaches has become more and more intense in recent years; as a result, security experts at Specops Software sought to find out which (Western) European countries are the most cyber-insecure for citizens. To find out, Specops... Read More
Specops Software Blog
Election Security Beyond the Voting Booth
A lot of the focus of today’s U.S. election security discussion is about securing the act of voting itself – things like testing machines, adding paper logs, avoiding internet connections for reporting results, etc. However, if you’re just focusing... Read More
How to configure password expiration notifications
When it comes to notifying users that their passwords are going to expire soon, more communication is always better. Users do not enjoy the password change process; keeping them informed as to when their password will expire is a great... Read More
“Love” conquers most in passwords
Stockholm – Specops Software announced today the latest updates to Specops Breached Password Protection, a solution to continuously check if an account in Active Directory is using a leaked password. Analysis reveals the most common words used in password... Read More
PCI compliance requirements in the UK
In 2018, criminals successfully stole £1.4 billion through fraud and scams. Now more than ever, businesses that processes cardholder data look to the Payment Card Industry Data Security Standard (PCI DSS) for security recommendations. PCI DSS is a set... Read More
NIST password standards and requirements
The National Institute of Standards and Technology (NIST) sets the information security standards for federal agencies. Through its Special Publication (SP) 800-series, NIST helps organizations meet regulatory compliance requirements such as HIPAA, and SOX. The recent update to the... Read More
Using Group Policy to configure BitLocker
How to use Group Policy to configure BitLocker. This is useful for organizations with a compliance mandate to enable encryption for all endpoint devices. Read More
Checking for Pwned Passwords in Active Directory
If you are trying to fulfill a regulation requirement like that of NIST, you might find yourself tasked with attempting to set up your Active Directory environment to check for leaked passwords against an external password deny list. For... Read More
UK sectors investing the most and least on cyber security in 2018-19
Cyber Security in 2019 In today’s digitally driven economy, IT security has become a central issue for organisations of all sizes. Understandably so, given how a cyber-attack/breach can compromise critical business functions within seconds and leave reputation as well... Read More
Setting up BitLocker for Windows 10
BitLocker allows Windows users to encrypt hard drives to keep data secure. Here's how to enable BitLocker encryption on a Windows 10 computer. Read More