ASD password policy

ASD password policy best practices

Australian businesses are juggling as many as 85 different passwords. To take greater control of their password security, they must look to the Australian Cyber Security Centre (ACSC) for guidance. The ACSC is the nation’s leading agency on cyber security. The ACSC is hosted by the Australian Signals... Read More

CJIS Password Policy

CJIS Password Policy Requirements

The CJIS Password Policy requirements include maintaining a list of “banned passwords” with values known to be commonly used, expected, or compromised. Read More

Password length best practices

A long password is a strong password, however it’s still not any good if it contains your username or other easily guessable words. This blog explains how you can enforce password length alongside other best practices. Read More

How to enforce password history in Active Directory

The “Enforce password history” setting in Active Directory is used to determine the number of unique passwords a user must use before they can use an old password again. This is an important setting because password reuse is a... Read More

What is a password dictionary attack?

A password dictionary attack is a brute-force hacking method used to break into a password-protected computer or server by systematically entering every word in a dictionary as a password. Read More

lösenord problem

Cyber Essentials Password Policy

Passwords play an important role in the Cyber Essentials scheme. If you are planning for Cyber Essentials accreditation, you will need to make sure your password policy is up to the challenge. Read More

How to audit network passwords

The quality of your security program comes down to the core element of passwords. Uncovering its weaknesses involves more than annual password audits. Read More