Password auditing guide

Password auditing guide
(Image credit: Specops)

The conversation surrounding privacy and data protection has shifted from the data room to the boardroom. Cyber attacks occur through varied sources, but interestingly, stolen credentials are involved in 44.7% of all data breaches.

Strong password policies are an effective cybersecurity measure. This guide from Specops provides an overview of the key steps required to eliminate risky passwords. It also shares a free tool to help you start your password audit journey.

 Here’s what you’ll learn: 

  • The most common ways criminals exploit weak passwords
  • The type of database attackers want to get their hands 
  • Three steps to stronger password security

Download now

Provided by Specops 

ITPro

ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.

For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.