In this whitepaper, we will scrutinize conventional password best practices, using knowledge attained from Microsoft’s “Password Guidance” whitepaper, and National Institute of Standard and Technology (NIST)’s “Digital Authentication Guideline” publication SP 800-63-3. Next, we will examine the extent to which the new best practices have penetrated compliance and advisory requirements:
the Cyber Essentials scheme
the National Cyber Security Centre (NCSC) – formerly CESG
Finally, we’ll create a strategy for future-proofing policies, while continuing to meet today’s compliance requirements.
Specops Key Recovery is a self-service solution for unlocking computers encrypted and managed by Symantec Endpoint Encryption. A user who is locked out at the pre-boot authentication screen can use Specops Key Recovery to unlock their computer, without calling the helpdesk. For added security, users can be verified with multi-factor authentication. Download this datasheet for…
With billions of credentials circulating the Dark web, it’s important to block all compromised passwords to prevent credential stuffing and other types of password attacks. Learn how you can block all weak passwords using a continuously updated list of leaked passwords and dictionaries.
The Specops Authentication for O365 demo video highlights the administrator and user interface of the solution. It includes a walk-through of the dynamic multi-factor authentication engine, which helps secure authentication to O365.