password based security myths

Busting the Myths Surrounding Password-Based Security

People have been relying on password-based security for millennia. The Roman military reportedly used what they called “watchwords” to identify soldiers on patrol. Exclusive groups and guilds used secret passwords to prove membership. The phrase “open sesame” protected hidden treasure in the story of Ali Baba and the Forty Thieves. In more recent times, the world’s first computer passwords were installed …

Approach to Password Security MPA

Enzoic Offers the Motion Picture Association a Premier Approach to Password Security

The Motion Picture Association (MPA) is the leading advocate of the worldwide film, television and streaming industry. Founded in 1922, the company today is championing the growing diversity of filmmakers, safeguarding intellectual property, advancing technological innovation, and supporting trade policies that can further expand the global film and TV marketplace. With operations in North America, Asia Pacific, Latin America and …

credential stuffing

The Reality of Compromised Credentials

Cracked Wide Open Over the past decade, the number of data breaches in almost all industries has skyrocketed. From healthcare to finance, user credentials have become both the tool of cyberattack and one of its primary targets. The 2021 Verizon DBIR report indicated that upwards of 61% of breaches involved leveraged credentials. Communicating clearly about the problem The Open Web Application …

threat landscape

How The Current Threat Landscape Impacts Authentication Security

Repercussions from the ongoing pandemic are still reverberating through workplaces all over the world. Businesses are racing to catch up with the changes they’ve had to make to accommodate remote workers, digitalization, and new cloud technologies. Many have let their cybersecurity practices fall to the wayside in a rush to evolve with the times. In a report by PwC, 64% …

healthcare

Employee Password Security in the Healthcare Sector

The healthcare industry sector is increasingly the target of cybercriminals. According to the Health Insurance Portability and Accountability Act (HIPAA) Journal, over the past eleven years (2009-2020) there have been more than 3,705 healthcare data breaches impacting more than 268 million medical records. Why is this happening, and what can we do to address it? The Culprits Weak and Compromised …

Cybersecure

Cultivating a Cybersecure Culture at Work is Everyone’s Responsibility

Businesses often say that their people are their greatest asset. When it comes to cybersecurity, this statement is truer than you might think. A constantly shifting threat landscape means cybersecurity best practices should be on everyone’s mind, not just your CTO or CISO. When employees of all areas, from new hires to the executive suite, are equipped to understand and …

retail

Retail Me This

As the impacts of the pandemic continue to ripple outwards, hackers are tapping into credential stuffing as an easy way to victimize both companies and individuals. The branching of events is easy to track with the rapid transition to remote work, e-commerce boom, and the millions of new online accounts for everything from grocery delivery to streaming services. The rapidity …

multi-factor authentication

What Does It Take to Be Secure with Multi-Factor Authentication?

In our four-part series investigating the vulnerabilities of multi-factor authentication (MFA), we’ve learned a lot about the methods hackers use to crack these systems. Social engineering, technical hacks, and a mixture of both can all play a role in weakening the authentication factors we depend on to protect our business’s critical data. The truth is that cybersecurity measures can’t be …