The Weak Password Report 2022
The Weak Password Report 2022 Password attacks are on the rise because passwords themselves are very vulnerable to attack. What specifically makes them vulnerable? This year’s Weak Password Report takes…
The Weak Password Report 2022 Password attacks are on the rise because passwords themselves are very vulnerable to attack. What specifically makes them vulnerable? This year’s Weak Password Report takes…
To illustrate how essential IT systems are to the proper functioning of the business, system administrators should use a number of metrics to communicate key KPIs with non-technical leadership. This…
Active Directory user accounts can get locked out due to a number of reasons, especially when working remotely. Windows systems can cache credentials for users. Yet, cached credentials causing account…
Batman or Spiderman? Superman or Thor? Flash or Falcon? The infatuation with and intense debate over Marvel and DC superhero and villain supremacy among comic book aficionados is a year-round…
Specops Software survey highlights social engineering vulnerabilities among IT service help desks. 48% of organizations do not have a user verification policy in place for incoming calls to IT service…
When we think about increased IT support efficiency, we might think of faster and/or cheaper IT service desk operations. But now, post-pandemic, or what is being called “the new normal”,…
Digital transformation is about improving your digital footprint, digitalizing processes and most importantly – changing your company culture. The preparation for – and execution of – transformation is critical which…
Purple Fox is malware that was first discovered in 2018 but has seen a recent rise in proliferation as hackers take advantage of a new attack method: weak passwords used…