Azure Active Directory MFA recently suffered a global outage. Can organizations increase authentication security without disrupting the end-user experience? Read More
Blog
When it comes to cyber security, don’t be like Kanye West
When unlocking his phone in front of a group of cameras, Kanye West punched in his incredibly weak phone passcode: 000000. Read More
Why is a leaked password list so important?
Many of the major breaches come down to one simple (and overlooked) factor: the password. With password reuse, it only takes one compromised password to lead to a company breach. Read More
What you should know about O365 two-factor authentication
Securing the O365 login process can be confusing when you have so many options, some of which are out-of-the-box. Here's what you need to know. Read More
How do I create HITRUST compliant password policies?
The HITRUST CSF clarifies guidelines on security standards for the healthcare industry with specific feature recommendations where the password management system is concerned. Read More
Specops introduces real-time leaked password protection
The release of Specops uReset 8.0 introduces compatibility with Specops Breached Password Protection, enabling real-time feedback if a new password appears on the leaked password list. Read More
Specops secures O365 password resets with MFA
Stockholm, Sweden – November 14, 2018. Specops Software announced today a new release of Specops Authentication for Office 365 (O365). The release introduces self-service password reset functionality by using the common dynamic multi-factor authentication (MFA) engine. The release also introduces... Read More
Protecting your business beyond Cyber Security Awareness Month
Cyber security should always be top of mind for businesses, October is a friendly reminder to take inventory of vulnerabilities, and stay prepared all year round. Read More
How and why the NHS should transform password policy for greater security
The password policy guidance from the NHS doesn't stand a chance against today's attacks. With a single breach opening the door to other systems, the NHS needs to stop users from using vulnerable passwords. Read More
Why you should consider cyber insurance
As security breaches continue to grow, businesses should operate under the assumption that they will be breached. A cyber insurance policy protects businesses against the costs associated with law suits, investigations, and downtime. Read More