Guides
Consumer Risk Protection Buyers Guide
Learn how SpyCloud Consumer Risk Protection helps you navigate modern account takeover methods by strengthening account security and reducing risk.
Enterprise Protection Buyers Guide
SpyCloud Enterprise Protection integrates with security tools you’re already using and scales with the threat landscape – backed by analytics
derived from the industry’s largest repository of recaptured data. See how it works.
Post-Infection Remediation Guide
Post-Infection Remediation is SpyCloud’s new, critical addition to malware infection response. This guide goes in-depth on how to stop malware exposures from becoming full-blown ransomware incidents.
Ransomware Prevention Checklist
Ransomware is a top cybersecurity challenge for organizations today. Use this handy checklist to inform your ransomware prevention strategy as attackers evolve their techniques.
Cybercrime Analytics Checklist
Security teams are up against a lot. This checklist will help your team optimize your data so you can use powerful automation to protect against next-gen threats.
Infected User Response Guide
Handy guide to decipher what it means when employee or consumer information appears on a botnet log, and how to contact infected users with an action plan.
Best Practices for Notifying Consumers of a Third-Party Data Breach
When your consumers’ passwords appear in a third-party breach, the language you use to notify them that their passwords must be reset requires careful consideration.
Considerations for Choosing an Account Takeover Security Solution
Our guide includes a 20-item checklist of topics to discuss with each ATO prevention vendor you’re evaluating.
Credential-Stealing Malware: Remediation Guide for Government Security Teams
Download our guide to learn what swift actions government agencies can take to prevent employees’ and consumers’ data from being siphoned by keylogger malware.
CISO’s Guide to Surviving a Data Breach
Get advice from CISOs who have been through worst-case scenarios: breaches that exposed customer data. Their experience will help you better prepare your own breach prevention and response plans.
Best Practices for Implementing NIST Password Guidelines
Aligning your enterprise’s password policy with the latest guidelines from NIST can help encourage better password habits and reduce the risk of account takeover.
Simplify NIST Password Guidelines with SpyCloud Active Directory Guardian
Read this solution brief to understand the benefits of using SpyCloud to align with NIST password guidelines.
Understanding the Latest NIST Password Guidelines
Over the years, security professionals have learned surprising lessons about how password policies affect user behavior.