

Bleeping Computer
How to boost Security with Self-Service Password Resets
Learn more from Specops Software about the benefits of self-service password resets and ways to accomplish this with on-premises Active Directory.
Bleeping Computer
Learn more from Specops Software about the benefits of self-service password resets and ways to accomplish this with on-premises Active Directory.
Bleeping Computer
Resetting the passwords for thousands of people after a ransomware attack is challenging, to say the least, for any IT team. Learn more from Specops Software on why organizations are forced into mass password resets and how to make the process manageable.
Bleeping Computer
More and more attacks are occurring via browser extensions or user-profile installations of tools. Learn more about these attacks from Specops Software and what you can do to protect yourself.
Bleeping Computer
Biometric authentication is often thought of as nearly impossible to steal or fake. Not only are there ways around biometric authentication, but not all biometric methods are created equal.
Bleeping Computer
The heavy responsibility of securing organizations against cyber-attacks can be overwhelming for security professionals. There are concrete solutions to IT burnout that your organization should implement as soon as possible to mitigate the risks of burnout.
The Hacker News
Don't skimp on security planning! A secure user authentication method is crucial now more than ever.
Bleeping Computer
Research states that the average help desk labor cost for a single password reset is about $70. With this cost, what can an organization do to lessen the impact of password resets?
Bleeping Computer
A common threat targeting businesses is MFA fatigue attacks—a technique where a cybercriminal attempts to gain access to a corporate network by bombarding a user with MFA prompts. This article includes some measures you can implement to prevent these types of attacks.
Bleeping Computer
A strong account lockout policy is one of the most effective tools for stopping brute force authentication attempts on Windows domains. Learn how to add one to your organization's Windows Active Directory.
The Hacker News
The Essential Eight strategies are designed specifically for use on Windows networks.
Bleeping Computer
As important as end user training and message filtering may be, there is a third method that tip the odds in their favor. Because phishing attacks often come disguised as password reset emails, it is important to handle password resets in a way that makes it obvious that email messages are not part of the password reset process.