Blog

Security at the Helpdesk

IT departments have always invested heavily in making sure that their systems are able to positively confirm user identities prior to granting users access to sensitive resources. Not surprisingly, there are any number of mechanisms available for authenticating users.... Read More

Active directory default password

How to find default passwords in Active Directory

What causes identical or default passwords in Active Directory, and how can you find them? A lot of organizations script the creation of new user accounts to standardize, simplify, and speed up the process. Unfortunately, this can also leave... Read More

How to manage Active Directory password requirements

Password policies are a foundational element of any organization’s security posture, especially in environments managed by Active Directory (AD). These policies help ensure that user credentials meet baseline complexity requirements, reducing the risk of unauthorized access. However, understanding and... Read More

Resetting the clock on Active Directory password expiration

I recently worked with a customer who was implementing Specops Password Policy with Length-Based password aging. Usually we see customers use this to extend their maximum password age, for example: the current Active Directory maximum password age is 90 days;... Read More

Device encryption and compliance

Most companies want to protect data at rest on devices that are susceptible to theft. This will ensure that the data is inaccessible even if the hard drive is removed and replaced in another machine. Yet, lost and stolen... Read More

desktop screen with lock on it

Common mistakes with endpoint encryption

Endpoint encryption is one of the cornerstones to securing data but it can introduce new challenges which can result in costly mistakes. Encryption is the process of changing information to make it unreadable without a proper authentication key. Administrators... Read More