The Benefits and Drawbacks of Password Complexity Rules

In recent years, cybersecurity experts have called into question the usefulness of password complexity rules. Password complexity rules have existed in some form since the internet and email became mainstream. They have since become a common feature in… Continue reading The Benefits and Drawbacks of Password Complexity Rules

The Pros and Cons of Password Rotation Policies

Why Password Rotation Policies May No Longer Be Fit-For-Purpose In the Digital Age Forced password resets have been a common feature of password policies for a long time and are still widely used. However, Microsoft and the NIST password guidelines, re… Continue reading The Pros and Cons of Password Rotation Policies

Preventing Common Passwords in Active Directory

Preventing common passwords in Active Directory is critical for protecting sensitive employee, user, and customer accounts. Why Should Organizations Screen for Regularly-Used Passwords? Many employees use weak passwords and are completely unaware of it… Continue reading Preventing Common Passwords in Active Directory

Blocking Expected and Similar Passwords in Active Directory

Most employees will create or reuse passwords that are expected or similar to previous passwords. This can be expected passwords in the form of a root password that gets changed by just a few characters or even just capitalization. Once again, attacker… Continue reading Blocking Expected and Similar Passwords in Active Directory

Blocking Expected and Similar Passwords in Active Directory

Most employees will create or reuse passwords that are expected or similar to previous passwords. This can be expected passwords in the form of a root password that gets changed by just a few characters or even just capitalization. Once again, attacker… Continue reading Blocking Expected and Similar Passwords in Active Directory

Privacy Regulation in a Connected IoT World

The need for increased technology regulation is a hot topic, as concerns continue to grow about the risks from deepfakes to machines going rogue. Our connected world appears fraught with problems that make more legislation seem inevitable if we are to … Continue reading Privacy Regulation in a Connected IoT World