Enzoic CEO Michael Greene had a recent session with CyberEd. CyberEd.io provides the latest discussions on cybersecurity topics straight from industry leaders for the security practitioner on-the-go. Here is a quick summary of that session. Strong Authentication Hindering the User Experience Numerous options exist for strong authentication, but most involve introducing some form of friction into the user experience. User …
NIST 800-171: Change of Characters in Passwords
Cybersecurity risks are a concern for every business, including the Federal government. Until the introduction of NIST 800-171, there was not a consistent approach between government agencies on how data should be handled, safeguarded, and disposed of. This caused a myriad of headaches, including security concerns, when information needed to be shared. After several high profile incidents culminating in the …
Microsoft Highlights The Risk of Stolen Passwords
Microsoft has just announced that a staggering 44 million accounts were vulnerable to account takeover due to the use of compromised or stolen passwords. This news comes on the back of the recent Disney+ launch, where password reuse resulted in cybercriminals taking over user accounts. There is mounting evidence that despite repeated warnings, users are still flying blind, and companies …
Enzoic Customer Profile: IDShield
Identity Theft Protection: A Crucial Consideration in Today’s Heightened Environment Why IDShield Partners with Enzoic for Comprehensive Identity Theft Protection for Our Customers. By Guest Blogger: Allen Spence, Director, IDShield Product Leadership, LegalShield According to the Identity Theft Resource Center, there were over 1,200 reported breaches last year alone, which exposed over 400 million records. And as Time’s Patrick Lucas …
Old vs. New Methods for Employee Password Hardening
Employee password hardening: Do not just mitigate bad passwords. Eliminate weak and compromised passwords. Threats to password-based authentication can overwhelm organizations. Because passwords are still the most common way for users to access their account, they invite abuses from bad actors. It is made worse by the security negligence of employees. But hardening employee passwords can be difficult without introducing significant …
Shop Safely This Cyber Monday
Use Safe Passwords, Avoid Public Wifi and Other Tips for Safe Shopping on Cyber Monday, Dec 2nd, 2019 According to Deloitte’s Annual Holiday Survey of Consumers, shoppers of all age groups are more likely to shop on Cyber Monday than on Black Friday. Given the ubiquitous nature of retail apps and social shopping opportunities, it’s easy to see why people …
Disney and the Password Reuse Problem
Disney+ Launch: A whole new world of excellent content, the same password reuse problem Consumers and critics alike have long clamored for the Disney+ streaming service, however, its recent launch has once again exposed the risks with password reuse. Even a mega-brand like Disney has password risks. An investigation found that less than 48 hours after launch, thousands of exposed …
Login Friction: Diminish the Risk, Not the User Experience
The Authentication Situation. How Can Companies Evaluate Risk without Impacting the User Experience? According to Riskified, losses from account takeover increased 122% from 2016 to 2017 and grew by 164% in 2018. This percentage is expected to be even higher by the end of 2019. In this environment, it is critical that companies find a way to secure credentials. At …
Firm Cybersecurity: Professional Services Firms are Vulnerable Targets
What Can Professional Services Firms Do to Protect Themselves from Cybersecurity Threats? Cybercriminals are frequently targeting mid-sized, service-based businesses such as law firms, accounting firms, and financial services firms at unprecedented rates. While the news is full of stories of high-profile data breaches affecting the likes of Facebook, Google, Marriott, MyFitnessPal, and other prominent companies; this focus on large companies …
Automate Password Policy & NIST Password Guidelines
Enable automated password policy enforcement with daily password auditing and customizable remediation. With compromised password detection, custom password dictionary, fuzzy matching with common character substitutions, and continuous ongoing monitoring; enterprises can easily adopt NIST password requirements and eliminate vulnerable passwords in Active Directory. Organizations can adopt NIST password standards to screen for weak, commonly-used, expected, and compromised passwords. Then they …