Password Tips
A Benchmark for Your Unsafe Passwords
News and warnings about data breaches and leaks abound at the moment, emphasizing the need for increased cybersecurity regardless of the industry. Microsoft’s Active Directory is often the perfect target for bad actors ...
Password Blacklists: Applying the Goldilocks Principle
One of the most effective ways to increase the strength of your network’s security is to screen users’ passwords against a list of dictionary passwords and known compromised passwords. Password vulnerabilities remain ...
Seven Active Directory Security Tips from The Experts
Microsoft Active Directory (AD) allows IT administrators to manage users, data, and applications within their organization’s network. Due to its popularity and importance within companies, AD is a perfect target for ‘bad ...
How CJIS Evolved Password Policy Requirements
The Criminal Justice Information Services (CJIS) is the largest division of the FBI. They’re a hub of state-of-the-art tools and services for law enforcement, national security community partners, and the general public ...
A Tale of Two Password Protection Approaches
Static Vs. Dynamic Hardly a day goes by without news of passwords being exposed in a third-party data breach. Once leaked, these credentials are easily available to other hackers via the Dark ...
The Skinny on Password Attacks
Thousands of Canadian citizens are at risk of identity fraud after cybercriminals used stolen credentials to access government services including COVID-19 relief funds. The source of the breach was a credential stuffing ...
Good, Better, Best: Using Multi-factor Authentication Effectively
Multi-factor authentication (MFA) is useful, but not a failsafe strategy for user authentication. The purpose of identity and access management technology is, generally speaking, to prevent unauthorized users from viewing, stealing, or ...
The Ways to Prevent Password Cracking
Cracking dictionaries are software programs that compile lists of unique words, common passwords, and iterations of common passwords. These words are collected from public domain files from multiple sources and in various ...
Trusting Passwords: Best Practices for Threat-Proofing Credentials
“Open, Sesame!”Upon reflection it’s easy to see that passwords have an incredibly long history: from shibboleths to military codes, they’ve been used in many situations to preserve privacy and identity. With the ...

