Password auditing guide
Stay ahead of today’s threats and secure your future


The conversation surrounding privacy and data protection has shifted from the data room to the boardroom. Cyber attacks occur through varied sources, but interestingly, stolen credentials are involved in 44.7% of all data breaches.
Strong password policies are an effective cybersecurity measure. This guide from Specops provides an overview of the key steps required to eliminate risky passwords. It also shares a free tool to help you start your password audit journey.
Here’s what you’ll learn:
- The most common ways criminals exploit weak passwords
- The type of database attackers want to get their hands
- Three steps to stronger password security
Download now
Provided by Specops
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Dell Technologies Global Partner Summit 2025 – all the news and updates live from Las Vegas
Keep up to date with all the news and announcements from the annual Dell Technologies Global Partner Summit in Las Vegas
-
Jensen Huang joins Dell Technologies World virtually to talk servers and AI factories
Nvidia CEO virtually joined Michael Dell for the opening keynote of the 2025 conference to talk through a host of AI and server announcements
-
Cyber attacks are costing UK firms billions every year – ransom payments, staff overtime, and lost business are crippling victims
News New research from ESET shows the cost of cyber attacks against UK businesses is surging, with many victims struggling to remediate breaches.
-
Scattered Spider: Who are the alleged hackers behind the M&S cyber attack?
News The Scattered Spider group has been highly active in recent years
-
5 Steps to Prioritize Based on Risk with Snyk
-
Beyond the Vulnerability Backlog: Building Risk-Based AppSec Programs
-
Why the Fastest Technology Companies choose Snyk Cheat Sheet
-
6 steps to a stronger security posture through automation
-
Ransomware attacks are rising — but quiet payouts could mean there's more than actually reported
News Ransomware attacks continue to climb, but they may be even higher than official figures show as companies choose to quietly pay to make such incidents go away.
-
Hackers are using Zoom’s remote control feature to infect devices with malware
News Security experts have issued an alert over a new social engineering campaign using Zoom’s remote control features to take over victim devices.