Policy and Best Practices
Resources Blog

Policy and Best Practices

Keep up to date with the latest offensive security news, knowledge, and resources.
Introducing the Ahead of the Breach Podcast!
Sep 05, 2024

Introducing the Ahead of the Breach Podcast!

Sprocket's Ahead of the Breach Podcast is now LIVE! Join Casey Cammilleri as he interviews guests to explore innovative strategies, identify emerging trends, and share actionable takeaways to help security leaders stay ahead.
Network penetration testing: what is it and why do you need it?
Jun 08, 2023

Network penetration testing: what is it and why do you need it?

How your business will benefit from network penetration testing and why it’s important to conduct annual testing.
How to Share Passwords and Backups Securely Posthumously
Sep 29, 2022

How to Share Passwords and Backups Securely Posthumously

A tutorial on how to build a secure, distributed, and multiple authorization backup method to recovery your digital life.
Fix Cleartext Password Issues in Your Organization
Jul 21, 2021

Fix Cleartext Password Issues in Your Organization

The key to our engagements often and unfortunately involve the discovery of credentials on internal network file shares. We’re going to show you how we find cleartext password storage problems and how to address them.
Fourteen good reasons to require 14-character passwords
Jun 15, 2021

Fourteen good reasons to require 14-character passwords

Password. Password123. Yea, you’ve seen them all when it comes to bad passwords. It comes standard when managing IT security. But while your organization likely requires special characters, uppercase letters and even a number or two, if you don’t require longer passwords you’re not taking one of the most important steps to protect your network.
Preventing Social Engineering Breaches
Oct 05, 2020

Preventing Social Engineering Breaches

It’s pretty common for companies to bundle social engineering into their penetration testing programs. But when the report shows up, you may find you’re surprised and frustrated at the rate of employees clicking links to open malicious documents. How were my employees so easily manipulated? And why didn’t anyone on the IT staff catch this? Don’t sweat it. Happens to...
1 2 3 4 5