At nFront Security, we believe that providing tips and checklists are a great way for IT Administrators to know if they are forgetting about any important security measures that might have slipped their mind. There is a famous quote that…
Back in April 2014, Stanford University created a password policy which let end-users determine the level of complexity for their own password. Shorter passwords will result in an end-user using more character types and longer passwords will result in an…
Dictionary blacklisting, also known as dictionary checking, is a very important security measure to have in place for passwords. Dictionary checking prevents the use of common passwords like Password, Welcome, and Baseball. We all know these passwords are insecure and…
Rainbow Tables are a very successful method of cracking passwords that are 14 characters or less, and it is one of the top tools used by hackers to steal your information. Your employees may not realize the impact a password…
We completely understand. You had an audit last year and one of your action plans was to create a more secure password policy because employees were using Password1 as their password. Chances are, there are probably numerous words like “summer,”…
A common question from prospective customers who are interested in the nFront Password Filter is that they want to see how the Client works. The nFront Client provides a user-friendly interface for end-users when they need to change their password. When the nFront Client…
Humans are very predictable and unless we are the victim of a substantial data breach, we will probably assume our company's network is safe and we are doing a decent job protecting it. Companies may slide by for years and…
With fine-grained password policies (FGPP), IT Administrators can create multiple different password policies within a single domain. The two enhancements that fine-grained password policies can provide are different password policies and account lockout policies for different sets of users in…
Many times, the worst we think that would happen in the result of a data breach is the damage of a company's reputation and the loss of customer trust. Both of these result in a decline of revenue in addition…