Encryption is a necessary component of an organization’s security policy. The GDPR encryption requirements consistently call for "appropriate technical" and "organizational measures." Read More
Blog
Password length best practices
A long password is a strong password, however it’s still not any good if it contains your username or other easily guessable words. This blog explains how you can enforce password length alongside other best practices. Read More
What is full-disk encryption?
In today’s threat landscape, encryption is a necessary component of an organization’s security policy. Encryption is the process of changing information to make it unreadable by anyone except those possessing special knowledge (commonly referred to as a secret key) that allows them to change the... Read More
Active directory password audit best practices
This blog describes how you might audit active directory passwords to check that no weak, easy-to-guess, or known leaked passwords are being used in your organization. Read More
Identify and remove leaked passwords
Stockholm, June 25, 2019 – Specops Software announced today a new release of Specops Password Policy. The solution’s downloadable leaked password list with close to one billion passwords, now supports leaked password scanning. The solution enables you to detect... Read More
Self-service encryption key recovery for BitLocker
Stockholm, June 19, 2019 – Specops Software announced today a new release of Specops Key Recovery. The solution now provides self-service key recovery for devices encrypted with BitLocker. This allows users to unlock their devices with multi-factor authentication, without... Read More
Password freeware finds accounts using leaked passwords
Specops Password Auditor (free) can scan Active Directory to find accounts using leaked passwords. Other advancements include reporting on accounts without passwords, and accounts with identical passwords. Read More
How to deploy a MSI package with Group Policy?
Group Policy Software Installation (GPSI) was once hailed as a great incentive for all organizations to upgrade their NT4 domains to Active Directory. It meant that there was no longer a need for those complex application deployment tools, it... Read More
Healthcare encryption standards
Protecting personal health data from unauthorized access is an essential part of HIPAA. Yet, even with stolen devices causing 45% of healthcare data breaches, many health organizations still don’t have encryption measures in place. Read More
Finding users who have not changed their password recently
One of the primary challenges with implementing a new password policy in Active Directory is ensuring users have changed their passwords to be compliant with that new policy. As we cannot view users’ current passwords in plain text to... Read More