The Collection #1 data set includes more than 1 billion unique combinations of email addresses and passwords. The latest addition to Specops Breached Password Protection includes more than 21 million passwords from the leak. Read More
Why you should consider cyber insurance
As security breaches continue to grow, businesses should operate under the assumption that they will be breached. A cyber insurance policy protects businesses against the costs associated with law suits, investigations, and downtime. Read More
O365 attacks continue exploiting your weakest link
With more than 120 million active users, Office (O365) is a frontrunner in the cloud service popularity contest. Consequently, its users are equally popular with hackers. For IT pros, storing data in the cloud means a bigger attack surface,... Read More
What breach disclosure requirements mean for your organization
Following a data breach incident, organizations following compliance standards, such as HIPAA, need to follow certain data breach notification requirements. This post will summarize some of these requirements, as well as regional-specific disclosure responsibilities. For the purposes of this... Read More
3 steps to take after a security breach
For a long time now, Specops has been advising organizations on how to protect their network and data against common security threats. We’ve managed to cover everything from sophisticated social engineering tactics, to the simple phishing email. Along the... Read More
Credential stuffing – the password breach aftermath
RIP Passwords – the 2017 Data Breach Industry Forecast by Experian anticipates your demise. Until then, experts are predicting “aftershock” breaches. In 2016, there were 1,093 security incidents involving loss of sensitive data, and three billion credentials stolen worldwide.... Read More
What the password quiz taught us
In celebration of World Password Day we ran a password quiz that presented participants with five pairs of passwords, and asked them to pick out the stronger one from each pair. The results? Only 12% of participants answered all... Read More
Password Strength Meters – more harm than good?
Fact one, passwords are here to stay, at least for the near future. Fact two, users have not gotten any better at making them stronger, or using additional factors during authentication. To help users with this seemingly impossible task,... Read More
Secure privileged accounts and keep business secrets where they belong
What did the breaches at Target, JPMorgan Chase, and Anthem have in common? They stemmed from a violation of privileged access. Those with privileged access own the proverbial keys to the kingdom – elevated permissions, and access to sensitive... Read More
Your password: separating the weak from the strong
You are probably familiar with the basics of password security: Complexity is a necessity; and length equals strength. If you have a social media or email account, chances are your password meets their minimum length and/or complexity requirements. But,... Read More