Specops Software Blog

Impersonation attacks cybersquatting

What is cybersquatting and how can you protect your brand?

Impersonation fraud is one of the biggest threats facing today’s businesses — and the threat continues to grow. In fact, the US Federal Trade Commission reports that impersonation attacks, which includes misleading domain names (also known as cybersquatting), are increasing... Read More

Specops Software - an Outpost24 company logo

Specops Authentication: What We Added in H2 2023

Support for Kerberos Integrated Authentication, Improved Fatigue Attack Prevention, New Identity Service & More Specops Authentication is our platform that secures self-service key recovery and password resets, changes and account unlocks with multi-factor authentication (MFA), via self-service and/or at... Read More

Microsoft logo on building

Microsoft transitions NTLM to Kerberos in Windows to boost security 

Windows authentication is a process that’s been around for decades. Unsurprisingly, attackers often target this authentication mechanism, preying upon weaknesses and vulnerabilities as they crop up. To help secure Windows authentication, Microsoft recently announced it was deprecating reliance on... Read More

holiday service desk cybersecurity attacks

Holiday season cyber threats: Is your service desk prepared?

Cybercriminals strategically time their attacks for when cyber defenses are most vulnerable. The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have noticed a significant increase in ransomware attacks against US companies during holidays and weekends.... Read More

reports with lock on top

Aligning password policies with cybersecurity KPIs 

As an IT pro, you’re tasked with measuring (and ultimately proving) the value of your cybersecurity investments. But how do you show that your security efforts and expenditures have the desired effect? One way is by aligning your cybersecurity... Read More

Illustration of password reuse. Person holding cell phone in front of open laptop with transparent security icons floating around

Password reuse: A hidden danger you can’t ignore

Reusing passwords is common, despite years of warnings to end users. It’s a problem that’s difficult for IT teams to get a handle on, especially if people are reusing work passwords at home. This means a breach elsewhere can... Read More