Blog

Doctor holding smartphone symbolizing cybersecurity in healthcare and how to prevent password sharing

Healthcare cybersecurity: How to prevent password sharing

In the high-stakes world of healthcare, where every second counts and patient care is paramount, the temptation to share passwords can seem like a minor shortcut. Professionals in the healthcare industry can find themselves navigating a delicate balance between... Read More

cyber attack incident response plan graphic - blackboard with writing: What's your plan

Incident response: Responding to credential-based cyber-attacks

Credential-based attacks are popular with hackers due to the ease of purchasing compromised passwords online. When credentials are compromised, the potential for significant damage is high, as attackers can gain access to sensitive data, manipulate systems, and move laterally... Read More

The power of love and breached passwords

When analyzing breached passwords from the Specops database, we often turn up some surprising trends and insights. For example, the unexpected prevalence of the word “love” in passwords and its significance across different languages and cultures. We’ll take a... Read More

The future of passwords: Emerging technologies and trends

While some experts keep predicting their demise, the reality is that passwords aren’t going anywhere soon — they remain at the heart of how we secure our digital world. New security tools are emerging, but they’re working alongside passwords, not replacing... Read More

PCI password security checklist

How to build a PCI-compliant password policy

The Payment Card Industry Data Security Standard (PCI DSS) is a set of guidelines designed to protect cardholder data and ensure that organizations handling payment card information maintain a secure environment. Among its many requirements, PCI DSS places significant... Read More