The password policy guidance from the NHS doesn't stand a chance against today's attacks. With a single breach opening the door to other systems, the NHS needs to stop users from using vulnerable passwords. Read More
Blog
Why you should consider cyber insurance
As security breaches continue to grow, businesses should operate under the assumption that they will be breached. A cyber insurance policy protects businesses against the costs associated with law suits, investigations, and downtime. Read More
Troubleshooting user account permissions – AdminSDHolder
Specops Password Reset, Specops Password Sync, uReset, and Specops Authentication all use low privilege service accounts in Active Directory. When you add an OU or OUs to your management scope, we delegate extremely granular permissions for our service account... Read More
Windows 10 As a Service Imaging (WaaS) with Specops Deploy
Windows 10 Operating Systems have changed and so have the strategic options available to deploy and maintain the operating system in the Enterprise. Imaging has traditionally been used to apply an operating system with a consistent look and feel.... Read More
Pattern-based passwords are not secure – here is how you can block them
Password complexity is believed to increase security, but it can also motivate predictable password patterns. Passwords inspired by adjacent key movements, such as "qwerty" are extremely vulnerable. Read More
MFA vs. 2FA – why the difference matters for your O365 implementation
When it comes to protecting cloud applications such as O365, two-factor authentication (2FA) has some serious limitations. A dynamic MFA solution frees users from passwords, and secures the authentication process. Read More
Leetspeak passwords – predictable and crackable
Leetspeak enables users to create passwords that are easy to remember, and easy crack. By preventing users from utilizing character substitution during password creation, Specops Password Policy can guide users towards stronger passwords. Read More
Why is Office 365 MFA important?
Office 365 is a hot target for attacks. Protecting organizational data in Office 365 comes down to preventing various attacks designed to gain access to user accounts. Read More
Press release: Block 1 billion leaked passwords with Specops Password Policy
IT departments can now use Specops Breached Password Protection, a hosted service with a continuously updated list of leaked passwords, to prevent users from utilizing high-risk passwords. Read More
Copying data from one attribute to another attribute in Active Directory
We often have customers that want to allow their users to use their mobile device as an identity service for our self-service solutions. By default, we use the ‘mobile’ attribute in AD as it automatically enrolls a user into... Read More