Allen Spence, Director of Product Leadership at IDShield

Enzoic Customer Profile: IDShield

Identity Theft Protection: A Crucial Consideration in Today’s Heightened Environment Why IDShield Partners with Enzoic for Comprehensive Identity Theft Protection for Our Customers. By Guest Blogger: Allen Spence, Director, IDShield Product Leadership, LegalShield According to the Identity Theft Resource Center, there were over 1,200 reported breaches last year alone, which exposed over 400 million records. And as Time’s Patrick Lucas …

Automate Password Policy & NIST Password Guidelines

Enable automated password policy enforcement with daily password auditing and customizable remediation. With compromised password detection, custom password dictionary, fuzzy matching with common character substitutions, and continuous ongoing monitoring; enterprises can easily adopt NIST password requirements and eliminate vulnerable passwords in Active Directory. Organizations can adopt NIST password guidelines to screen for weak, commonly-used, expected, and compromised passwords. Then they …

7 Cybersecurity Predictions for 2020: https://www.enzoic.com/7-cybersecurity-predictions-for-2020/

7 Cybersecurity Predictions for 2020

2020 will be another interesting year for Cybersecurity, here are our predictions as we kick off a new year. We have entered a new decade with many innovations expected to come to fruition. However, when it comes to cybersecurity, the challenges encountered in the 2010s will remain, with high profile breaches and attacks continuing at a relentless pace. From deep …

HITRUST & Password Policy: https://www.enzoic.com/hitrust-password/

HITRUST & PASSWORDS: 7 Important Password Policies for HITRUST

Our recommended healthcare password policies that complement and support HITRUST. Since its founding in 2007, HITRUST (Health Information Trust Alliance) champions programs that safeguard sensitive information and manage information risk for global organizations across all industries. HITRUST works with privacy, information security, and risk management leaders from the public and private sectors, to develop common risk and compliance management frameworks, …

Cybersecurity Trends to Watch in 2020: https://www.enzoic.com/cybersecurity-trends-2020/

Cybersecurity Trends to Watch in 2020

Cybersecurity and infosec are constantly evolving. Today, organizations are doing everything in their power to harden their defenses, protect their internal networks, and secure data from increasing internal and external threats. The need to be ahead of bad actors causes new cybersecurity trends to emerge every year. The following 2020 cybersecurity trends are important ones to watch. #1: Automation for …

Small Business Cyberattacks

Tips to Protect Your Small Business From Cyberattacks in 2020

There’s a dangerous misconception that cyberattacks only affect large organizations. The majority (66%) of business leaders at small to medium-sized businesses (SMBs) don’t believe they will fall victim to a cyberattack, according to Keeper Security’s 2019 SMB Cyberthreat Study. Small businesses are prime targets for cyberattacks. According to Hiscox’s 2018 report titled Small Business Cyber Risk, 47% of small businesses …

Enzoic CEO, Michael Greene was recently in CyberEd.

CyberEd Magazine Session with Enzoic CEO Michael Greene

Enzoic CEO Michael Greene had a recent session with CyberEd. CyberEd.io provides the latest discussions on cybersecurity topics straight from industry leaders for the security practitioner on-the-go. Here is a quick summary of that session. Strong Authentication Hindering the User Experience Numerous options exist for strong authentication, but most involve introducing some form of friction into the user experience. User …

NIST 800-171: Change of Characters in Passwords

NIST 800-171: Change of Characters in Passwords

Cybersecurity risks are a concern for every business, including the Federal government. Until the introduction of NIST 800-171, there was not a consistent approach between government agencies on how data should be handled, safeguarded, and disposed of. This caused a myriad of headaches, including security concerns, when information needed to be shared. After several high profile incidents culminating in the …