How Does Your AD Password Policy Compare to NIST’s Password Recommendations?
End-user passwords are one of the weakest components of your overall security protocols. Most users tend to reuse passwords across work and personal accounts. They may also choose relatively weak…
Some ransomware gangs are going after top execs to pressure companies into paying
Ransomware gangs are prioritizing stealing data from workstations used by executives in the hopes of finding and using valuable information to use in the extortion process. Read more from the…
WhatsApp Will Disable Your Account If You Don’t Agree Sharing Data With Facebook
“Respect for your privacy is coded into our DNA,” opens WhatsApp’s privacy policy. “Since we started WhatsApp, we’ve aspired to build our Services with a set of strong privacy principles…
Google removes Parler app from Play Store
Google cites the lack of content moderation on the platform and “ongoing and urgent public safety threat.” Read more from the Source

