Guides

Post-Infection Remediation Guide
Post-Infection Remediation is SpyCloud’s new, critical addition to malware infection response. This guide goes in-depth on how to stop malware exposures from becoming full-blown ransomware incidents.

Infected User Response Guide
Handy guide to decipher what it means when employee or consumer information appears on a botnet log, and how to contact infected users with an action plan.

Best Practices for Notifying Consumers of a Third-Party Data Breach
When your consumers’ passwords appear in a third-party breach, the language you use to notify them that their passwords must be reset requires careful consideration.

Considerations for Choosing an Account Takeover Security Solution
Our guide includes a 20-item checklist of topics to discuss with each ATO prevention vendor you’re evaluating.

Credential-Stealing Malware: Remediation Guide for Government Security Teams
Download our guide to learn what swift actions government agencies can take to prevent employees’ and consumers’ data from being siphoned by keylogger malware.

CISO’s Guide to Surviving a Data Breach
Get advice from CISOs who have been through worst-case scenarios: breaches that exposed customer data. Their experience will help you better prepare your own breach prevention and response plans.

Best Practices for Implementing NIST Password Guidelines
Aligning your enterprise’s password policy with the latest guidelines from NIST can help encourage better password habits and reduce the risk of account takeover.

Simplify NIST Password Guidelines with SpyCloud Active Directory Guardian
Read this solution brief to understand the benefits of using SpyCloud to align with NIST password guidelines.

Understanding the Latest NIST Password Guidelines
Over the years, security professionals have learned surprising lessons about how password policies affect user behavior.