Blog

Image of Hamilton City Centre

MFA failure costs Hamilton $18m in cyber insurance payout

On February 25th, 2024, a sophisticated ransomware attack struck the City of Hamilton, crippling roughly 80 percent of its network. This included business licensing, property-tax processing, and transit-planning systems. Cybercriminals proceeded to demand an $18.5 million ransom that the... Read More

The Enable Recycle Bin is greyed out after it has been enabled

Password spraying: Attack guide and prevention tips 

The phrase ‘spray and pray’ likely came from the military, used to describe inaccurately firing automatic weapons in the hope that one shot eventually found its mark. It’s now used to describe any scenario where a strategy relies on... Read More

open lock on loose keyboard buttons

Hackers’ 5 top password cracking techniques

Cyber-attacks come in many forms and continue to evolve, but there’s one tried and trusted unauthorized entry method that’s stood the test of time – cracking a user’s password. Despite this, too many organizations still rely on outdated advice... Read More

red lock with white cross - cybersecurity in NHS

NHS cybersecurity experts talk passwords and Specops

NHS organizations have a challenge on their hands when it comes to cybersecurity. They have to defend sprawling, heterogeneous IT environments against relentless cyber‑threats, all while keeping their number one priority in mind: patient care. On a recent Specops... Read More

Specops Software - an Outpost24 company logo

Specops Now Offered Through GuidePoint Security  

This new collaboration offers GuidePoint Security customers access to password management and authentication solutions, which protect business data by blocking weak and compromised passwords and securing user authentication.  Philadelphia, United States   Specops is excited to announce a strategic reseller... Read More

Image of password written on a sticky note

The risk of default passwords: What they are & how to stay safe

Cyberattacks are evolving rapidly. As technology advances, so do the tools and techniques used by hackers, from AI-driven phishing schemes to highly targeted ransomware attacks. But despite this increasing sophistication, many successful breaches still rely on something shockingly simple:... Read More