Source: www.bleepingcomputer.com – Author: Sponsored by Specops Software The Akira ransomware group is targeting small to medium-sized businesses (SMBs) – 80% of its victims, since March 2023, have...
Author: Sponsored by Specops Software
How to secure AD passwords without sacrificing end-user experience – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sponsored by Specops Software Hackers are constantly attempting to steal passwords, with Microsoft tracking 1,287 password attacks every second in 2022. If...
Securing helpdesks from hackers: What we can learn from the MGM breach – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sponsored by Specops Software In the wake of the MGM Resorts service desk hack, it’s clear that organizations need to rethink their...
The password attacks of 2023: Lessons learned and next steps – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sponsored by Specops Software It should take more than eight characters to bring a business to a halt. However, the relentless onslaught...
Are your end-users’ passwords compromised? Here’s how to check. – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sponsored by Specops Software Passwords have long been used as the primary gatekeepers of digital security, yet they can also be a...
How end-user phishing training works (and why it doesn’t) – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sponsored by Specops Software It always takes two for a phishing attack to work – an attacker to send the bait and...
Four common password mistakes hackers love to exploit – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sponsored by Specops Software Our brains are incredibly good at pattern completion – it’s why we see animals in the clouds and...
Back to school security against ransomware attacks on K-12 and colleges – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sponsored by Specops Software A ransomware attack on an educational institution causes more than just class disruption. It can result in lost...
How to manage a mass password reset due to a ransomware attack – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sponsored by Specops Software Interrupted classes, disrupted planning, and postponed events – IT outages have a big impact on modern university life....
The Current State of Business Email Compromise Attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sponsored by Specops Software Business Email Compromise (BEC) poses a growing threat to businesses of all sizes. As BEC attacks have almost...
Ransomware is only getting faster: Six steps to a stronger defense – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sponsored by Specops Software Staying ahead of threat actors is a game of cat and mouse, with attackers often having the upper...
The Genesis Market Takedown – Keep Users Credentials Secure – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sponsored by Specops Software For years, “dark” markets have contained stolen credentials for sale. One of the larger and more notorious markets...
What’s a Double-Blind Password Strategy and When Should It Be Used – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sponsored by Specops Software Password security, like threat actor methods, continues to evolve. As computing power grows, previously best-practice passwords become increasingly...
Ransomware Prevention – Are Meeting Password Security Requirements Enough – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sponsored by Specops Software As ransomware attacks continue to wreak havoc on organizations worldwide, many official standards and regulations have been established...
Top 5 Password Cracking Techniques Used by Hackers – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sponsored by Specops Software One of the biggest security threats is password cracking. Are you an IT system administrator concerned about the...
A ‘!password20231#’ password may not be as complex as you think – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sponsored by Specops Software Modern IT system administrators know the importance of maintaining a strong password policy. In this article, we’ll explore...
The Attacks that can Target your Windows Active Directory
Active Directory is at the center of many attacks as it is still the predominant source of identity and access management in the enterprise. Hackers commonly...
Biometric Authentication Isn’t Bulletproof —Here’s How to Secure It
Biometric authentication is often thought of as nearly impossible to steal or fake, a perfect addition to your cybersecurity arsenal. While it is tough for a...