With billions of credentials circulating the Dark web, it’s important to block all compromised passwords to prevent credential stuffing and other types of password attacks. Learn how you can block all weak passwords using a continuously updated list of leaked passwords and dictionaries.
Despite predictions of the ‘death of the password’ more than ten years ago, the use of passwords as a single point of security has continued to rise. To effectively secure sensitive data and user accounts, it is vital that businesses move away from a single point of vulnerability and embrace multi-factor authentication (MFA). Our survey…
This recorded webinar discusses the challenges of blocking weak passwords and presents an innovative solution. Specops Password Policy can be used to: Meet password policy compliance standards such as NHS and NCSC, Blacklist leaked password lists that hackers are using to gain access
The Specops Authentication for O365 demo video highlights the administrator and user interface of the solution. It includes a walk-through of the dynamic multi-factor authentication engine, which helps secure authentication to O365.
Specops Password Policy helps you increase password security in your Microsoft Active Directory environment. You can use Specops Password Policy to enforce password rules, meet compliance requirements and help users select stronger passwords. Download this datasheet for the Specops Password Policy Business Case.
Today’s consumer landscape is filled with endless portals and accounts to manage relationships and interactions with businesses. Whether they are shopping for shoes or sharing documents for work, they all need credentials to access these services. As the digital presence for businesses continues to grow, so do the demands on user authentication. However, securely authenticating…
Specops Password Blacklist is a hosted service comprised of more than 1 billion leaked passwords including the haveibeenpwned list. Download this datasheet to see how Specops Password Blacklist can increase authentication security.
Passwords, and the users who apply their own passwords, are often the weakest link in any security infrastructure. From using simple, easily cracked passwords to the classic step of writing them down on a sticky note, getting your users to adhere to stronger password policies will go a long way toward protecting your organization. During…
If you are new to penetration testing, it can seem overwhelming and stressful. But, it does not have to be that way. With the right expectations, it can even be a straightforward and beneficial exercise. This whitepaper will provide an overview of the four phases of penetration testing, along with best practice recommendations to walk you…