Stanford Password Policy Explained

Back in April 2014, Stanford University created a password policy which let end-users determine the level of complexity for their own password. Shorter passwords will result in an end-user using more character types and longer passwords will result in an end-user using fewer character types. Here is the breakdown of the Stanford Password Policy: 8-11 […]

Read more

How does the nFront Password Filter Client work?

A common question from prospective customers who are interested in the nFront Password Filter is that they want to see how the Client works. The nFront Client provides a user-friendly interface for end-users when they need to change their password. When the nFront Client appears, the end-user’s password policy will display on the screen with a custom strength meter. […]

Read more

How To Smoothly Implement A Strong Password Policy

Changing your company’s password policy can create a high level of apprehension for the IT department as well as management, especially when the password policy will become more restrictive for end-users. Your company’s management team will have the primary concern of how to deploy a new software tool effectively to the entire network. While your […]

Read more

NCSC Password Guidance and Recommendations

The NCSC (National Cyber Security Centre) provided guidance for Systems Administrators to simplify their approach to passwords. This guidance is not mandatory, but rather recommendations to eliminate the risk of breaches due to weak passwords on a company network. Furthermore, NCSC’s guidance is intended to reduce the daunting task of users having to recall complex […]

Read more

NIST Password Compliance and New Password Rules

First of all, who or what is NIST? NIST stands for the National Institute of Standards and Technology. This organization is a non-regulatory agency of the United States Department of Commerce who provides security standards and guidelines for companies to meet the requirements of the Federal Information Security Management Act (FISMA) through cost effective programs. […]

Read more

The NEW GDPR Compliance Overview

First, what is GDPR and am I affected by the new compliance regulations? GDPR is the new General Data Protection Regulation that was adopted by the European Union (EU) in April 2016 and will be enforceable starting May 2018. The new GDPR compliance applies to everyone who provides goods and/or services to citizens in the […]

Read more

Cyberattacks Force Businesses To Shut Down

Many times, the worst we think that would happen in the result of a data breach is the damage of a company’s reputation and the loss of customer trust. Both of these result in a decline of revenue in addition to the amount it will cost to rectify the data breach. According to IBM’s Cost […]

Read more

Why You Don’t Need A Password Manager

OneLogin announced on May 31, 2017, that their company was hacked between the hours of 2:00 am to 9:00 am PST. No big deal, right? Wrong. OneLogin is an online service that lets users manage their multiple different logins and passwords with a single sign-on (SSO). Essentially, OneLogin is a password manager that entices customers […]

Read more

Say Goodbye To Windows Hello

What is Windows Hello? Windows Hello, according to Microsoft, is a more personal way to authenticate your computer using either your face, fingerprint, or iris. The technology is equipped with the Surface Book, Surface Pro 4, and some PCs. For example, you will hold your head still in front of your computer’s camera and it […]

Read more

We Support Carnegie Mellon University’s Password Research

Carnegie Mellon University released a study in 2013 called “Measuring Password Guessability for an Entire University.” CMU has over 25,000 faculty, staff, and students with a single-sign-on password. With this research study, CMU wanted to analyze how guessable the passwords would be in a password attack by standard password cracking tools and algorithms. A standard […]

Read more