X

Category: Access Control

Want to pump up your IT security? Strengthen your account management practices

If your company doesn't get a good handle on its account management practices, your IT security will suffer as a…

Song remains the same: FBI gunning for encryption backdoor

The FBI has a new director, but it is singing the same old song. The bureau wants an encryption backdoor…

No two ways about it: Your business needs two-factor authentication

Even complex passwords don’t cut it anymore — security has to be multidimensional. This is why your business must use…

Should you follow the latest recommendations from NIST?

The usefulness of periodic password expiration is a hot topic in the cybersecurity world. Read on to learn about its…

BYOD policy: Who controls your smartphone?

You bought your phone, you pay the bills, so you get to decide how to use it, right? Not quite.…

Microsoft Modern Keyboard brings Microsoft Hello functionality

Microsoft Modern Keyboard allows you to use Windows Hello’s fingerprint sign-in feature to securely access your Windows devices.

AD FS deep dive: Your comprehensive FAQ guide

AD FS makes it easy to create and manage the access for user accounts between partners. We have answered all…

GDPR: Data Protection Impact Assessment

Since the last data protection directive (EU) of 1995, the way in which data is processed has evolved drastically. Up…

Drones - Another threat to security

The IoT is happening all around us. One such notable elaboration in this area is drones. Drones, also referred to…

Video: Finding Active Directory Users That Have Never Logged In

This video explains how to identify Active Directory users that have never logged in.