Cyber Chief Magazine: Strategies for protecting your data in the cloud Download Now
23 January, 2019 | Matt Middleton-Leal

Top 5 Human Errors that Impact Data Security

Tighter data protection regulations have forced businesses to put data security at the top of their priority list. However most companies still lack a strong cybersecurity culture among their employees. In fact, a recent paper by Osterman Research reports that less than half (42%) of organizations...
16 October, 2018 | Russell Smith

How to Create, Change and Test Passwords Using PowerShell

Automation is the key to streamlining Active Directory management tasks. In this article, I’ll show you how to create, change and test user passwords with PowerShell scripts. Installing the AD PowerShell module Before you can use PowerShell to manage Active Directory, you need to install the...
28 December, 2015 | Richard Muniz

What To Do about Passwords in Your Disaster Recovery Plan

One post thread on Spiceworks caught my eye.  The Spicehead wanted to know what to do about passwords when it came to DR plans.  Was he supposed to put the passwords into it, or just what was he supposed to do with them.  Well, the first thing you don’t want to do is put them in the Disaster...
4 August, 2015 | Sarah Greesonbach

Four Ways to Create Secure Passwords in a Team Environment

Any number of unknowns can threaten the security of your environment, but the leading common denominator in threat scenarios is how your team manages their passwords within your environment. Creating and maintaining secure passwords within a team environment comes with unique challenges. You...
21 April, 2015 | Richard Muniz

Nine Steps to a Better Password Management

Passwords remind me a bit of the Coyote. Not the one that chases the Road Runner, but the one that lives in my native South-West and howls at the moon. No matter how hard humans have tried to get rid of it, it hangs in there, and in most cases, even manages to gain ground back. Why do I compare...
Show more articles