Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Password Security

, ,

How CJIS Evolved Password Policy Requirements

The CJIS Security Policy is regularly updated to evolving industry best practices. The June 2019 update introduced a new policy option for passwords.

Read More

, ,

Good, Better, Best: Using Multi-Factor Authentication Effectively

Multi-factor authentication (MFA) is useful, but not a failsafe strategy for user authentication. Read to learn more.

Read More

, ,

State of Password Security: Response Required

Read why organizations need to react urgently to the state of password security, according to data from 451 Research.

Read More

, , ,

8 Scary Statistics about the Password Reuse Problem

Password reuse is fueling account takeovers. Learn 8 shocking stats, how hackers exploit reused credentials, and what you can do to stop it.

Read More

, , ,

Root Passwords: The Root of Password Problems

Root Passwords: Most users will select common “root” words and just modify them with easily guessable variations. Here is what you can do about it.

Read More

, ,

Cracking Dictionaries and the Growing Risk

Cracking Dictionaries: What You Need to Know. What they are. How are they used? How can organizations secure passwords & make them harder to crack.

Read More

,

Rethinking Digital Hygiene

Digital hygiene is important to prevent your accounts from being compromised and to protect your online identity. Read our tips in this short blog!

Read More

, , ,

Privacy Regulation in a Connected IoT World

Privacy Regulation in a Connected World: New California legislation is a1st step for privacy regulation; but IoT regulation should be expanded. Here is why.

Read More

,

Old vs. New Methods for Employee Password Hardening

Eliminate weak and compromised passwords. Do not just mitigate it! Harden employee passwords with daily compromised password screening in Active Directory.

Read More