Password Palpitations — The Ongoing Threat of LM Hashing
How do we protect sensitive information from prying eyes on our computers and networks? The simple answer is to deploy controls to monitor and restrict the transfer or viewing of sensitive data on those shared resources.