Cybersecurity Lessons From 3 Public Breaches

December 11, 2024 at 10:59AM In the first half of 2024, over 9,000 cyber incidents occurred, highlighting cybersecurity as a business priority. CEOs emphasize security investments but remain concerned about effective threat mitigation. Key lessons include the importance of strong password policies, limitations of multifactor authentication, and addressing human errors to enhance overall cybersecurity resilience. … Read more

How to Plan a New (and Improved!) Password Policy for Real-World Security Challenges

December 4, 2024 at 05:54AM Organizations often struggle with ineffective password policies that are either too rigid or too lax. A well-balanced policy must be compliant, based on real data, enforceable, and clearly communicated. Regular audits and updates are essential to address security needs while ensuring usability, ultimately strengthening an organization’s overall security posture. ### … Read more

How Hybrid Password Attacks Work and How to Defend Against Them

October 11, 2024 at 07:39AM Threat actors use hybrid password attacks, combining techniques like brute force and dictionary methods to enhance their effectiveness in stealing credentials. To defend against these attacks, organizations should implement multi-factor authentication, require longer passwords, prevent weak patterns, and audit for compromised passwords through tools like Specops Password Policy. ### Meeting … Read more

Why your password policy should include a custom dictionary wordlist

October 3, 2024 at 10:15PM Custom dictionaries are essential for strengthening password security. They block the use of common words, industry and organization-specific terms, and easily guessable patterns, adding an extra layer of defense against targeted attacks. Integrating custom dictionaries with tools like Specops Password Policy enhances Active Directory password security and reduces the risk … Read more

Why your password policy should include a custom dictionary

October 3, 2024 at 10:39AM Weak and easily guessable passwords can leave organizations vulnerable to cyber threats. Integrating a custom dictionary into password policies can protect against targeted attacks, brute force methods, and industry-specific vulnerabilities. Specops Password Policy enables seamless integration of custom dictionaries into Active Directory, bolstering overall password security and compliance with industry … Read more

Point of entry: Why hackers target stolen credentials for initial access

August 6, 2024 at 10:19AM Increased incidents of stolen credentials have been giving rise to a thriving market for brokering initial access. Stolen credentials are commonly obtained through social engineering and malware, leading to a 24% increase in breaches. Various methods including brute force attacks are used to steal credentials, posing a major threat. Cybersecurity … Read more

End-user cybersecurity errors that can cost you millions

July 22, 2024 at 10:39AM In today’s fast-paced organizations, end-users’ seemingly harmless actions may lead to catastrophic cybersecurity incidents. Human error accounts for 95% of incidents, costing an average of USD 4.45 million globally. Common missteps include allowing unauthorized device access, misdelivery of sensitive information, password reuse, exposing remote interfaces, and misusing privileged accounts. Strict … Read more

How SMBs can lower their risk of cyberattacks and data breaches

January 30, 2024 at 11:28AM The Akira ransomware group is targeting small to medium-sized businesses (SMBs), with ransom demands ranging from $200,000 to over $4 million. SMBs are attractive targets for cybercriminals due to their limited resources and as entry points to larger enterprises. The average cost to recover from a data breach for SMBs … Read more