X

Category: Access Control

No two ways about it: Your business needs two-factor authentication

Even complex passwords don’t cut it anymore — security has to be multidimensional. This is…

Should you follow the latest recommendations from NIST?

The usefulness of periodic password expiration is a hot topic in the cybersecurity world. Read…

BYOD policy: Who controls your smartphone?

You bought your phone, you pay the bills, so you get to decide how to…

Microsoft Modern Keyboard brings Microsoft Hello functionality

Microsoft Modern Keyboard allows you to use Windows Hello’s fingerprint sign-in feature to securely access…

AD FS deep dive: Your comprehensive FAQ guide

AD FS makes it easy to create and manage the access for user accounts between…

GDPR: Data Protection Impact Assessment

Since the last data protection directive (EU) of 1995, the way in which data is…

Drones – Another threat to security

The IoT is happening all around us. One such notable elaboration in this area is…

Video: Finding Active Directory Users That Have Never Logged In

This video explains how to identify Active Directory users that have never logged in.

Video: Random Passwords for New Users

This video explains how to setup random passwords for new users in AD.

Video: Granting Elevated Privileges to users in Active Directory – Part 2

This is the second video in two-part series demonstrating the process of granting elevated privileges…