Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Password Security

, , ,

Root Passwords: The Root of Password Problems

Root Passwords: Most users will select common “root” words and just modify them with easily guessable variations. Here is what you can do about it.

Read More

, ,

Cracking Dictionaries and the Growing Risk

Cracking Dictionaries: What You Need to Know. What they are. How are they used? How can organizations secure passwords & make them harder to crack.

Read More

,

Rethinking Digital Hygiene

Digital hygiene is important to prevent your accounts from being compromised and to protect your online identity. Read our tips in this short blog!

Read More

, , ,

Privacy Regulation in a Connected IoT World

Privacy Regulation in a Connected World: New California legislation is a1st step for privacy regulation; but IoT regulation should be expanded. Here is why.

Read More

,

Old vs. New Methods for Employee Password Hardening

Eliminate weak and compromised passwords. Do not just mitigate it! Harden employee passwords with daily compromised password screening in Active Directory.

Read More

, ,

Eliminating the Burden of Periodic Password Reset

NIST 800-63b password guidelines can improve user's experience with passwords, including the guideline to stop forcing periodic password resets for users.

Read More

, , ,

Credential Stuffing Attacks vs. Brute Force Attacks

Credential stuffing & brute force attacks use very different methods to accomplish account takeover. This article outlines what they are, how they operate and how to handle them.

Read More

, , , ,

A Guide to Law Firm Cybersecurity Risks & Ethical Compliance

Law firms are frequently targeted by hackers but the ABA's Formal Opinion 483 will guide law firm cybersecurity policy to protect firms and their clients.

Read More

, ,

Evolving Password-Based Security to Fight Compromised Credentials Attacks

The continued barrage of reports about data breaches and account hijacking, make it painfully clear that the way organizations are managing password-based security is missing something. When we look at how cybercriminal tactics have evolved, and how compromised credential attacks have impacted these methods, one answer to the problem of the password becomes clear.

Read More