Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Password Tips

, ,

What’s behind PCI’s New MFA Requirements?

Many have implemented MFA ahead of the new PCI requirement. Let's look at PCI's multi-factor implementation guidance that highlights some considerations, particularly around passwords that may otherwise be overlooked.

Read More

,

The Magician’s Handkerchief of Password Reuse

Why using the same password can compromise your online security, as Mike shares a personal account of the risks and lessons learned.

Read More

, ,

Massive Equifax Data Breach Puts Consumers at Risk for Identity Theft and Compromised Accounts

Equifax announced a massive data breach that exposes affected consumers to an increased risk of identity theft and compromised accounts.

Read More

,

Can Passwords Really Be Replaced?

We will continue to see passwords for a long time due to the many unique characteristics not found in other authentication methods.

Read More

, ,

Evolving Password-Based Security to Fight Compromised Credentials Attacks

Cybercriminal tactics have evolved, so organizations must evolve their password-based security against compromised credential attacks.

Read More

, ,

Why NIST Compromised Credential Checking Matters for Security

Learn why NIST requires compromised credential checking and how it improves password security under 800-63B.

Read More

,

Users Suck at Passwords. Help Them.

How many of your users are using insecure and compromised passwords? You may have a standard password strength meter on your site so you may think that your users have secure passwords. Think again. Password strength meters and password complexity requirements are simply not enough.

Read More