It’s time to put cybersecurity on the curriculum. Multiple reports show the same thing – we need to manage more and more security threats, but companies are not prepared. Large companies are worried, according to a new report from... Read More
CEO series: Close your cybersecurity gap with a simple approach
The biggest breaches are caused by the smallest vulnerabilities. My challenge to you is to do something today to mitigate 80 percent of your security risk. Read More
3 steps to take after a security breach
For a long time now, Specops has been advising organizations on how to protect their network and data against common security threats. We’ve managed to cover everything from sophisticated social engineering tactics, to the simple phishing email. Along the... Read More
Weighted identities are the future of MFA
There’s a new sheriff in town Allow me to embellish – how else can you describe the sense of security one feels when the words Multi-Factor Authentication (MFA) are uttered. With data breaches, system failures, and identity theft thickening... Read More
Credential stuffing – the password breach aftermath
RIP Passwords – the 2017 Data Breach Industry Forecast by Experian anticipates your demise. Until then, experts are predicting “aftershock” breaches. In 2016, there were 1,093 security incidents involving loss of sensitive data, and three billion credentials stolen worldwide.... Read More
“123456” and “password” continue to be the most commonly used passwords, when will people learn?
Here is a list of the top 25 most common passwords of 2016. Your policy may not allow weak passwords such as 123456 or password, but even if the password complexity requirement is enabled in the standard Windows Password... Read More