Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

,

What is Exposed Password Screening?

Exposed password screening is the process of checking currently used passwords against passwords that have been exposed in a publicly known data breach.

Read More

,

Rethinking Digital Hygiene

Digital hygiene is important to prevent your accounts from being compromised and to protect your online identity. Read our tips in this short blog!

Read More

,

Preventing Context-Specific Passwords in Active Directory

Context-Specific Passwords: Organizations can prevent their users from using context-specific passwords (like the local NFL Team) in Active Directory. How?

Read More

Preventing Common Passwords in Active Directory

Preventing common passwords in active directory is critical for protecting sensitive employee accounts. Here is why and how organizations can automate it.

Read More

Forced Periodic Password Resets by the Numbers

Forced periodic password resets are widely used throughout the world. But now some security experts are changing perspective on them. Here is why.

Read More

,

Blocking Expected and Similar Passwords in Active Directory

Expected and Similar Passwords: Employees will create passwords that are expected or similar to previous passwords. Here is what you should block in AD.

Read More

, , ,

Privacy Regulation in a Connected IoT World

Privacy Regulation in a Connected World: New California legislation is a1st step for privacy regulation; but IoT regulation should be expanded. Here is why.

Read More

, , , ,

HIPAA & Employee Password Policies

Hospitals and healthcare providers comply with HIPAA to keep stakeholders secure. But how should employee password policy be handled in light of HIPAA?

Read More

Pwned Passwords: The Epicenter of Your Cybersecurity Storm

Pwned Passwords + Password Reuse = Perfect Storm. Because of password reuse, exposed passwords are a threat to every org. Learn how to mitigate that threat.

Read More