What makes users and organizations vulnerable to password attacks? In this blog, you will find the most common password attacks along with recommendations that can strengthen password security. Read More
Blog
ASD password policy best practices
Australian businesses are juggling as many as 85 different passwords. To take greater control of their password security, they must look to the Australian Cyber Security Centre (ACSC) for guidance. The ACSC is the nation’s leading agency on cyber security. The ACSC is hosted by the Australian Signals... Read More
Top Active Directory security best practices for 2025
Our Active Directory best practices address security vulnerabilities in your organization, and serve as barriers for attackers. Read More
What causes BitLocker Recovery Mode and how to resolve it?
This blog will look at the root causes of BitLocker Recovery Mode, and how you can mitigate its impact on the helpdesk with self-service key recovery. Read More
How to enforce password complexity in O365?
As organizations move data to the cloud, strong password policies have never been more important. Here is how to use the on-premises Active Directory to enforce password complexity in O365. Read More
Specops Software acquired by Monterro
Stockholm, August 21, 2019 – Specops Software is excited to announce that the equity investment firm, Monterro has become the majority owner of Specops Software. Specops Software and Monterro jointly see the acquisition as a great opportunity for accelerated... Read More
Unencrypted biometrics reveal massive risk
Security researchers gained access to more than 27.8 million records, including fingerprints, facial recognition data, usernames and passwords, in the mostly unencrypted and unhashed Biostar 2 database. Biostar 2 is a web-based biometrics locking system used for physical security... Read More
CJIS Password Policy Requirements
The Criminal Justice Information Services Division (CJIS) is a division of the FBI that provides a number of tools and services to law enforcement agencies around the country. It is also the central repository for Criminal Justice Information (CJI),... Read More
GDPR encryption requirements
Encryption is a necessary component of an organization’s security policy. The GDPR encryption requirements consistently call for "appropriate technical" and "organizational measures." Read More
Password length best practices
A long password is a strong password, however it’s still not any good if it contains your username or other easily guessable words. This blog explains how you can enforce password length alongside other best practices. Read More