As organizations move data to the cloud, strong password policies have never been more important. Here is how to use the on-premises Active Directory to enforce password complexity in O365. Read More
Authentication
Specops Authentication enrollment data in Active Directory
The Specops Authentication cloud platform is unique in that user data is stored in the customer’s on-prem Active Directory database. Usernames, passwords, and enrollment data/proofs for the various Identity Services provided by Specops Authentication are stored in the customer’s... Read More
Specops Authentication Client and Duo Authentication for Windows Login
The Specops Authentication Client provides enhancements to the Windows logon experience by wrapping the built-in Windows credential provider (GINA). This includes allowing users to reset their passwords from the login screen, as well as enhancing the feedback users receive... Read More
How to stop O365 phishing attacks
O365 phishing attacks are are easy - just trick the recipient into giving up their password on a fake login page. Requiring users to authenticate with additional factors is the best way to stop the attack. Read More
Specops uReset and GDPR compliance
With the introduction of Specops uReset (version 8.1 or later) in the Microsoft EU data center, organizations can now choose which instance of Specops uReset they want to use. Specops uReset is a hybrid password reset solution. The cloud... Read More
Comparing Specops Authentication for O365 and Office 365 MFA: An MVP’s Perspective
In this guest post, Microsoft MVP Nick Cavalancia provides a high-level comparison of how Microsoft and Specops implement MFA for O365, and what it means to the security-conscious organization. Read More
Azure MFA outage – is it time to rethink MFA?
Azure Active Directory MFA recently suffered a global outage. Can organizations increase authentication security without disrupting the end-user experience? Read More
Why is a leaked password list so important?
Many of the major breaches come down to one simple (and overlooked) factor: the password. With password reuse, it only takes one compromised password to lead to a company breach. Read More
What you should know about O365 two-factor authentication
Securing the O365 login process can be confusing when you have so many options, some of which are out-of-the-box. Here's what you need to know. Read More
How do I create HITRUST compliant password policies?
The HITRUST CSF clarifies guidelines on security standards for the healthcare industry with specific feature recommendations where the password management system is concerned. Read More