The Most Common Football Team Names Found in Breached Passwords

STOCKHOLM – If the Superbowl winner could be predicted by breached password lists, the Los Angeles Rams would be this season’s winner. Today, Specops Software released an update to the Breached Password Protection list (formerly the Password Blacklist) and of a recent analysis of sports-related compromised passwords.   “With the NFL season... Read More

Specops Password Policy comparison and price

In the market for a third-party password policy solution? If an audit has revealed poor password practices, you may look to Microsoft Fine-Grained Password Policy (FGPP) for additional flexibility over default domain password settings. Unfortunately, FGPP still lacks a... Read More

How to configure password expiration notifications

When it comes to notifying users that their passwords are going to expire soon, more communication is always better. Users do not enjoy the password change process; keeping them informed as to when their password will expire is a great... Read More

PCI compliance requirements in the UK

In 2018, criminals successfully stole £1.2 billion through fraud and scams. Now more than ever, businesses that processes cardholder data look to the Payment Card Industry Data Security Standard (PCI DSS) for security recommendations. PCI DSS is a set... Read More

NIST password standards

NIST Password Standards

The National Institute of Standards and Technology (NIST) sets the information security standards for federal agencies. Through its Special Publication (SP) 800-series, NIST helps organizations meet regulatory compliance requirements such as HIPAA, and SOX. The recent update to the... Read More

ASD password policy

ASD password policy best practices

Australian businesses are juggling as many as 85 different passwords. To take greater control of their password security, they must look to the Australian Cyber Security Centre (ACSC) for guidance. The ACSC is the nation’s leading agency on cyber security. The ACSC is hosted by the Australian Signals... Read More

CJIS Password Policy

CJIS Password Policy Requirements

The CJIS Password Policy requirements include maintaining a list of “banned passwords” with values known to be commonly used, expected, or compromised. Read More

Password length best practices

A long password is a strong password, however it’s still not any good if it contains your username or other easily guessable words. This blog explains how you can enforce password length alongside other best practices. Read More