Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Active Directory

,

Blocking Expected and Similar Passwords in Active Directory

Expected and Similar Passwords: Employees will create passwords that are expected or similar to previous passwords. Here is what you should block in AD.

Read More

, , , ,

HIPAA & Employee Password Policies

Hospitals and healthcare providers comply with HIPAA to keep stakeholders secure. But how should employee password policy be handled in light of HIPAA?

Read More

The High Cost of Password Expiration Policies

The High Cost of Password Expiration Policies: There are hidden costs that make forced periodic password resets very expensive. Here is why.

Read More

Cybersecurity Trends to Watch in 2020

Cybersecurity Trends to Watch in 2020: 5 key security trends to watch in 2020: Automation for strengthening passwords, zero trust, biometrics, IoT and more!

Read More

, , ,

Employee Password Security for Healthcare Providers

Employee Password Security for Healthcare Providers: How can hospitals & healthcare providers tackle password security?

Read More

,

The Top 15 Worst Passwords

What makes passwords bad? It is not just the words. It is how they are used, what context they are used in and other factors. Learn more!

Read More

CyberEd Magazine Session with Enzoic CEO Michael Greene

CyberEd recently had a session with Enzoic CEO, Michael Greene about credential screening and user experience. Here is a quick summary of that session.

Read More

, , ,

NIST 800-171: Change of Characters in Passwords

NIST 800-171 guidelines say to enforce minimum password complexity and change of characters when new passwords are created. Here is how you can do it!

Read More

,

Microsoft Highlights The Risk of Stolen Passwords

Microsoft found 44 million accounts were vulnerable due to the use of stolen passwords. How can organizations combat password reuse & compromised passwords?

Read More