Empower students to reset their passwords by themselves

Back to school Active Directory password management blues are a huge problem. If you’re an IT administrator at an educational institution, you know exactly what we’re talking about. At...

ADSelfService Plus 2 min read Read

Secure workstations by monitoring and alerting membership changes on Local Administrators Group, Part 1

Imagine you’re an admin in a company that prides itself on its security practices, which includes using firewalls, IDP systems, and IPS systems. You have...

Active Directory 2 min read Read

Why password blacklisting is so important, and how to do it in Active Directory

Passwords are still the most popular authentication method used to grant users access to critical business resources. According to the 2017 State of Authentication Report, more than half of US companies use only passwords...

ADSelfService Plus 2 min read Read

Auditing and securing Active Directory webinar series

With the number of data breaches increasing by the day, enterprises need to closely evaluate their security infrastructure. Protecting systems and critical data, averting potential...

Active Directory 1 min read Read

Who’s responsible for the data held in Office 365? 

Microsoft Exchange Online allows users to communicate and work from anywhere at anytime without having to dedicate resources to maintain an on-premises Exchange environment. While Microsoft focuses on maintaining continual uptime, organizations are still responsible for backing...

RecoveryManager Plus 1 min read Read

Strengthen your first line of defense against hackers

Passwords are the first line of defense between a hacker and your data. A decade ago, a password alone may have kept your data secure, but today, that’s no...

ADSelfService Plus 2 min read Read

Webinar: Learn a simple three-step approach to tackling threats

Technology has a lot to offer, from streamlining your business processes to protecting your network, but with all the advantages comes the risk of cyberthreats. Cybercriminals are always developing new...

Log360 1 min read Read

Tighten Windows security with two-factor authentication

A few decades ago, organizations were content knowing their network resources were password protected. With the increasing number of security breaches and digital crime, being password...

ADSelfService Plus 2 min read Read