Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Password Tips

Hashing: What You Need to Know About Storing Passwords

Password hashing adds a layer of security making it more costly to the hacker who just compromised the server that holds user passwords.

Read More

, ,

Cybersecurity During a Pandemic – And What You Can Do To Keep Employees Safe

Educating employees on the threat the pandemic may pose to their personal data. Here are tips to help them keep this information safe.

Read More

, ,

Ensuring Security in the Coronavirus Remote Working Era

Ensuring Security in the Coronavirus Remote Working Era: watch for phishing, secure the password, partition wifi networks, and more helpful tips for SMBs!

Read More

, , ,

Root Passwords: The Root of Password Problems

Root Passwords: Most users will select common “root” words and just modify them with easily guessable variations. Here is what you can do about it.

Read More

, , ,

Password Blacklists: Do They Provide Enough Protection?

Password blacklists can lack some of the most common passwords. Here are some of the things you should consider for protection.

Read More

,

What is Exposed Password Screening?

Exposed password screening is the process of checking currently used passwords against passwords that have been exposed in a publicly known data breach.

Read More

,

Rethinking Digital Hygiene

Digital hygiene is important to prevent your accounts from being compromised and to protect your online identity. Read our tips in this short blog!

Read More

,

Preventing Context-Specific Passwords in Active Directory

Context-Specific Passwords: Organizations can prevent their users from using context-specific passwords (like the local NFL Team) in Active Directory. How?

Read More

,

Blocking Expected and Similar Passwords in Active Directory

Expected and Similar Passwords: Employees will create passwords that are expected or similar to previous passwords. Here is what you should block in AD.

Read More