Why you should consider cyber insurance

As security breaches continue to grow, businesses should operate under the assumption that they will be breached. A cyber insurance policy protects businesses against the costs associated with law suits, investigations, and downtime. Read More

O365 attacks continue exploiting your weakest link

With more than 120 million active users, Office (O365) is a frontrunner in the cloud service popularity contest. Consequently, its users are equally popular with hackers. For IT pros, storing data in the cloud means a bigger attack surface,... Read More

What breach disclosure requirements mean for your organization

Following a data breach incident, organizations following compliance standards, such as HIPAA, need to follow certain data breach notification requirements. This post will summarize some of these requirements, as well as regional-specific disclosure responsibilities. For the purposes of this... Read More

Top data breaches in 2015

3 steps to take after a security breach

For a long time now, Specops has been advising organizations on how to protect their network and data against common security threats. We’ve managed to cover everything from sophisticated social engineering tactics, to the simple phishing email. Along the... Read More

Credential stuffing – the password breach aftermath

RIP Passwords – the 2017 Data Breach Industry Forecast by Experian anticipates your demise. Until then, experts are predicting “aftershock” breaches. In 2016, there were 1,093 security incidents involving loss of sensitive data, and three billion credentials stolen worldwide.... Read More

specops software logo

What the password quiz taught us

In celebration of World Password Day we ran a password quiz that presented participants with five pairs of passwords, and asked them to pick out the stronger one from each pair. The results? Only 12% of participants answered all... Read More

Password Strength Meters – more harm than good?

Fact one, passwords are here to stay, at least for the near future. Fact two, users have not gotten any better at making them stronger, or using additional factors during authentication. To help users with this seemingly impossible task,... Read More

Your password: separating the weak from the strong

You are probably familiar with the basics of password security: Complexity is a necessity; and length equals strength. If you have a social media or email account, chances are your password meets their minimum length and/or complexity requirements. But,... Read More