Social engineering: Mind the identity verification gap

Billions of personal data records are up for sale on the Dark Web as data breaches continue to occur at an alarming rate. According to Risk Based Security’s 2019 Midyear Data Breach report, there was a 54% increase in data breaches in the first half of… Continue reading Social engineering: Mind the identity verification gap

Review: Specops Key Recovery

Mobile device use continues to grow, while an increasingly mobile and remote workforce depends heavily on laptops. To secure those devices, organizations need to implement client-side security controls. One of the more pressing risks linked to the use … Continue reading Review: Specops Key Recovery

Active Directory password reset best practices

Password change and password reset are terms that are often used interchangeably. However, they are not the same. A user will perform a password change when they remember their existing password, and a password reset when they have forgotten it. The tw… Continue reading Active Directory password reset best practices

Blocking compromised passwords from the Collection leak

It all started with Collection #1, a monster breach dubbed as the biggest data dump in history with its 773 million unique email addresses, and 22 million unique passwords. The exposed data was a compilation of previous thefts (Yahoo, Linked, Dropbox),… Continue reading Blocking compromised passwords from the Collection leak

Find out what your peers are saying about Office 365 MFA

Specops Software ran a global survey that gauged satisfaction with Office 365 MFA among other O365 adoption initiatives. Not surprisingly, most respondents are not satisfied with Microsoft’s O365 MFA options. Additionally the majority have taken a hybr… Continue reading Find out what your peers are saying about Office 365 MFA

Review: Specops Password Policy

All who work in the information security industry agree that passwords are one of the worst security nightmares of the modern information security age. Having weak passwords – even as part of a multi-factor authentication scheme – degrades … Continue reading Review: Specops Password Policy

Don’t let attackers worm their way in: Increase password security

Passwords are inherently the weakest form of authentication, yet they remain the most prevalent. Many organizations realize that moving beyond this single point of vulnerability is required but replacing passwords or adding multi-factor authentication … Continue reading Don’t let attackers worm their way in: Increase password security