The National Institute of Standards and Technology (NIST) sets the information security standards for federal agencies. Through its Special Publication (SP) 800-series, NIST helps organizations meet regulatory compliance requirements such as HIPAA, and SOX. The recent update to the... Read More
Specops Software Blog
Using Group Policy to configure BitLocker
How to use Group Policy to configure BitLocker. This is useful for organizations with a compliance mandate to enable encryption for all endpoint devices. Read More
Checking for Pwned Passwords in Active Directory
If you are trying to fulfill a regulation requirement like that of NIST, you might find yourself tasked with attempting to set up your Active Directory environment to check for leaked passwords against an external password deny list. For... Read More
UK sectors investing the most and least on cyber security in 2018-19
Cyber Security in 2019 In today’s digitally driven economy, IT security has become a central issue for organisations of all sizes. Understandably so, given how a cyber-attack/breach can compromise critical business functions within seconds and leave reputation as well... Read More
Setting up BitLocker for Windows 10
BitLocker allows Windows users to encrypt hard drives to keep data secure. Here's how to enable BitLocker encryption on a Windows 10 computer. Read More
CEO Series: If you’re going to work here, you’d better lock your computer
I’m on the train to Gothenburg. There’s a man sitting next to me, hard at work on his computer. All of a sudden he does something that happens far too often. The man goes to the restaurant to buy... Read More
How to stop different types of password attacks
What makes users and organizations vulnerable to password attacks? In this blog, you will find the most common password attacks along with recommendations that can strengthen password security. Read More
ASD password policy best practices
Australian businesses are juggling as many as 85 different passwords. To take greater control of their password security, they must look to the Australian Cyber Security Centre (ACSC) for guidance. The ACSC is the nation’s leading agency on cyber security. The ACSC is hosted by the Australian Signals... Read More
CEO Series: A nudge in the right direction
The price tag for cyberattacks is only getting higher. The average total cost of a data breach is now USD 3.92 million, according to the 2019 Cost of a Data Breach Report. Is it fair to expect all employees... Read More
Active Directory security best practices
Our Active Directory best practices address security vulnerabilities in your organization, and serve as barriers for attackers. Read More