THE WEAK PASSWORD REPORT 2022 Password attacks are on the rise because passwords themselves are very vulnerable to attack. What specifically makes them vulnerable? This year’s Weak Password Report takes a look at both the human side and the tech side of why...
Purple Fox is malware that was first discovered in 2018 but has seen a recent rise in proliferation as hackers take advantage of a new attack method: weak passwords used over the SMB protocol. SMB (Server Message Block) is a protocol (mainly) used by Windows computers...
Digital transformation is about improving your digital footprint, digitalizing processes and most importantly – changing your company culture. The preparation for – and execution of – transformation is critical which means setting both clear goals and defining an...
When we think about increased IT support efficiency, we might think of faster and/or cheaper IT service desk operations. But now, post-pandemic, or what is being called “the new normal”, there’s a hunger for “better, faster, and cheaper” IT support. This recognizes...
Specops Software survey highlights social engineering vulnerabilities among IT service help desks. 48% of organizations do not have a user verification policy in place for incoming calls to IT service desks, according to Specops Software, the leading provider of...
Batman or Spiderman? Superman or Thor? Flash or Falcon? The infatuation with and intense debate over Marvel and DC superhero and villain supremacy among comic book aficionados is a year-round musing, but always intensifies during the months when the latest movie hits...