Automate Password Policy & NIST Password Guidelines

Enable automated password policy enforcement with daily password auditing and customizable remediation. With compromised password detection, custom password dictionary, fuzzy matching with common character substitutions, and continuous ongoing monitoring; enterprises can easily adopt NIST password requirements and eliminate vulnerable passwords in Active Directory. Organizations can adopt NIST password guidelines to screen for weak, commonly-used, expected, and compromised passwords. Then they …

Old Ways vs. New Ways: Employee Password Hardening

Old vs. New Methods for Employee Password Hardening

Employee password hardening: Do not just mitigate bad passwords. Eliminate weak and compromised passwords. Threats to password-based authentication can overwhelm organizations. Because passwords are still the most common way for users to access their account, they invite abuses from bad actors. It is made worse by the security negligence of employees.  But hardening employee passwords can be difficult without introducing significant …

Mid-Sized Firm Cybersecurity

Firm Cybersecurity: Professional Services Firms are Vulnerable Targets

What Can Professional Services Firms Do to Protect Themselves from Cybersecurity Threats? Cybercriminals are frequently targeting mid-sized, service-based businesses such as law firms, accounting firms, and financial services firms at unprecedented rates. While the news is full of stories of high-profile data breaches affecting the likes of Facebook, Google, Marriott, MyFitnessPal, and other prominent companies; this focus on large companies …

Biometric Authentication is Part of the Security Puzzle: https://www.enzoic.com/biometric-authentication-security-puzzle/

Why Biometric Authentication is Just Part of the Security Puzzle

Americans are growing increasingly comfortable with biometrics as a means of confirming their identity, with a recent survey finding 81% of respondents would be receptive to using biometrics in airports. Many consumers are already relying on biometric authentication to log into various online accounts, and companies are taking steps to incorporate biometric capabilities into more devices and systems. As a …

NIST Password Requirements for 2020

3 Key Elements of the NIST Password Requirements for 2020

Reasons Why NIST Password Requirements Should Drive Your Password Strategy in 2020 Despite the doubters claiming that passwords will go the way of overhead projectors, they are still prevalent. They are still the back-up factor for most other authentication solutions and show no sign of extinction because every organization has a password-supported infrastructure in place. Fortunately, NIST has invested time …

NIST Privacy Framework

What the NIST Privacy Framework Means for Password Policy

Now Is Time To Contribute Your Feedback on the NIST Privacy Framework The National Institute of Standards and Technology (NIST) has recently released the preliminary draft of the NIST Privacy Framework: A Tool for Improving Privacy through Enterprise Risk Management. NIST is a non-regulatory agency and science lab that aims to promote innovation by advancing measurement science.   In this …

Enzoic a “Top 10 Most Valuable Cybersecurity Solution Provider” in the CEO Views

Enzoic was selected to be a “Top 10 Most Valuable Cybersecurity Solution Provider in 2019” because of the innovative cybersecurity and fraud prevention products. Enzoic, formerly PasswordPing, provides low user-friction solutions for strong authentication against compromised credential attacks affecting employees, users, and customers. There are two core solutions: Enzoic for Active Directory Enzoic Account Takeover Protection Enzoic for Active Directory: …