One of the most effective ways to increase the strength of your network’s security is to screen users’ passwords against a list of dictionary passwords and known compromised passwords. Password vulnerabilities remain a major entry point for hackers. Over the last few years, password policy has evolved in significant ways. NIST password guidelines now indicate that using a password blacklist …
Enzoic Wins “Fraud Prevention Innovation of the Year” Award in 2020 CyberSecurity Breakthrough Awards Program
After intensive review of over 3,700 nominations, Enzoic was chosen as a winner of the 2020 CyberSecurity Breakthrough award program. They were recognized specifically with the ‘Fraud Prevention Innovation Award’. CyberSecurity Breakthrough is a leading independent market intelligence organization that recognizes the top companies, technologies and products in the global information security market. Enzoic sits alongside winners in other cyber …
Seven Active Directory Security Tips from The Experts
Microsoft Active Directory (AD) allows IT administrators to manage users, data, and applications within their organization’s network. Due to its popularity and importance within companies, AD is a perfect target for ‘bad actors.’ We’ve most likely all seen the massive increase in data breaches over the past few years. There are many attack vectors out there, but compromised credentials are …
How CJIS Evolved Password Policy Requirements
The Criminal Justice Information Services (CJIS) is the largest division of the FBI. They’re a hub of state-of-the-art tools and services for law enforcement, national security community partners, and the general public. The CJIS Security Policy is regularly updated to evolving industry best practices. Their June 2019 update introduced a new policy option for passwords. This option made it easier …
A Tale of Two Password Protection Approaches
Static Vs. Dynamic Hardly a day goes by without news of passwords being exposed in a third-party data breach. Once leaked, these credentials are easily available to other hackers via the Dark Web and, thanks to the rampant problem of password reuse, there are a variety of effective attack methods that allow hackers to obtain access to additional organizations’ systems …
Enzoic Wins Colorado Companies to Watch 2020
Out of nearly a thousand nominated companies, Enzoic was recently named a winner of the 2020 Colorado Companies to Watch (CCTW). This competitive annual award recognizes companies that “are critical job creators, innovators, and drivers of [the] economy” in the state of Colorado. CCTW is a unique program, sponsored by the Bank of America, that acknowledges 50 high-performing second stage …
The Skinny on Password Attacks
Thousands of Canadian citizens are at risk of identity fraud after cybercriminals used stolen credentials to access government services including COVID-19 relief funds. The source of the breach was a credential stuffing attack utilizing logins exposed in a prior breach. This is the latest example in a steady stream of data breaches driven by poor password practices. The Verizon DBIR …
Good, Better, Best: Using Multi-factor Authentication Effectively
Multi-factor authentication (MFA) is useful, but not a failsafe strategy for user authentication. The purpose of identity and access management technology is, generally speaking, to prevent unauthorized users from viewing, stealing, or manipulating data, whether a corporate network, or a celebrity Twitter account. As most users know, the dangers of the internet are ever shifting, and it’s important to stay …
The Ways to Prevent Password Cracking
Cracking dictionaries are software programs that compile lists of unique words, common passwords, and iterations of common passwords. These words are collected from public domain files from multiple sources and in various formats. With cracking dictionaries, hackers narrow the universe of possible passwords to try. Instead of a brute force attack that tries every possible character combination, the hacker can …
LastPass taps Enzoic for Dark Web Monitoring
Enzoic’s Dark Web Monitoring services are now being embedded into the new LastPass Security Dashboard. The new capabilities provide early warning of increased risk of identity theft and other cybersecurity vulnerabilities. A recent LastPass survey found 86% of people don’t have any way to know if their personal information has been exposed on the dark web. Enzoic’s dedicated threat researchers …