X

Category: Access Control

Ditching the O365 password for better MFA security

Multi-factor authentication can reduce the effectiveness of stolen credentials, but as long as the password…

Song remains the same: FBI gunning for encryption backdoor

The FBI has a new director, but it is singing the same old song. The…

No two ways about it: Your business needs two-factor authentication

Even complex passwords don’t cut it anymore — security has to be multidimensional. This is…

Should you follow the latest recommendations from NIST?

The usefulness of periodic password expiration is a hot topic in the cybersecurity world. Read…

BYOD policy: Who controls your smartphone?

You bought your phone, you pay the bills, so you get to decide how to…

Microsoft Modern Keyboard brings Microsoft Hello functionality

Microsoft Modern Keyboard allows you to use Windows Hello’s fingerprint sign-in feature to securely access…

AD FS deep dive: Your comprehensive FAQ guide

AD FS makes it easy to create and manage the access for user accounts between…

GDPR: Data Protection Impact Assessment

Since the last data protection directive (EU) of 1995, the way in which data is…

Drones - Another threat to security

The IoT is happening all around us. One such notable elaboration in this area is…

Video: Finding Active Directory Users That Have Never Logged In

This video explains how to identify Active Directory users that have never logged in.