Active Directory Lite

Need Help Auditing for Compromised Passwords?

Password audits have become more difficult. New data breaches expose credentials every day. These are quickly fed into hackers’ cracking dictionaries, changing which passwords you need to keep out. Verizon’s DBIR found 81% of data breaches were caused by compromised, weak, and reused passwords. Traditional algorithmic complexity rules are no longer considered a key factor in password strength. NIST password …

Time to Prioritize Passwords

Time to Prioritize Passwords

Despite proclamations that passwords are going the way of the Dodo, they are still a fundamental part of our digital lives. However, they remain a weak link in our approach to cybersecurity and it’s time for us all to rethink how we create and use passwords to protect our identities from cybercriminals. So, we want to take this opportunity to …

Solving the Compromised Credentials Conundrum

Solving the Compromised Credentials Conundrum

Today is World Password Day and organizations are unfortunately still reliant on archaic password strategies that put the onus on users to create and remember numerous complex and constantly changing password strings. It’s no wonder that this approach is an abject failure. Enterprises need to take steps to address the password problem and ensure that only strong, unique and uncompromised …

password reuse

8 Scary Statistics about the Password Reuse Problem

As we rapidly move everything online in response to the global pandemic, this has put passwords front and center again. With the latest Marriott breach, it’s like groundhog day when it comes to passwords with both organizations and users failing to take the necessary measures to step up their password hygiene. Passwords remain a weak link and are the source …

Ensuring Security in the Coronavirus Remote Working Era: https://www.enzoic.com/security-in-the-coronavirus-remote-working-era/

Ensuring Security in the Coronavirus Remote Working Era

Working from home has become the new reality for organizations of all industries and sizes as the nation struggles to contain the coronavirus pandemic. As companies contemplate an indefinite period of remote work and virtual interactions, it’s essential that they not overlook a critical variable: ensuring online security. Security while remote working adds a whole new layer of complexity. As …

NIST Password Standard Compliance

Introducing 1-Click NIST Password Standard Compliance & More

Introducing one-click NIST password standard compliance, user reporting which outlines users who are using compromised passwords, and root password detection to prevent users from using root passwords. Microsoft’s Active Directory is used widely across companies and industries throughout the world and unfortunately, it is one of the key targets for bad actors. Many organizations are adopting the use of password …

The High Cost of Password Expiration Policies

The High Cost of Password Expiration Policies

For many cybersecurity professionals, one of the more surprising ideas to come out of 2019 is the recommendation to drop forced password expiration policies. Forced password expiration policies have been around for many years now and are a widespread element of cybersecurity frameworks within organizations across the world over. However, we’re now being told they may not be necessary. Password …

Old Ways vs. New Ways: Employee Password Hardening: https://www.enzoic.com/employee-password-hardening/

Old vs. New Methods for Employee Password Hardening

Employee password hardening: Do not just mitigate bad passwords. Eliminate weak and compromised passwords. Threats to password-based authentication can overwhelm organizations. Because passwords are still the most common way for users to access their account, they invite abuses from bad actors. It is made worse by the security negligence of employees.  But hardening employee passwords can be difficult without introducing significant …

7 Password Problems Solved by Enzoic Password Policy Enforcement

7 Password Problems Solved by Enzoic Password Policy Enforcement

There are many excellent password policy enforcement tools built into Active Directory. But the out-of-the-box AD functionality does not meet all the password standards and new password policy recommendations from NIST and other regulatory organizations. What can organizations do regarding password policy enforcement to increase security and decrease user friction, cost-effectively? The perfect storm of weak passwords More than 21 …