Install one layer of cyber security protection, and suddenly there’s a whole new way bad actors have discovered to penetrate it. Staying on top of the latest password security methods can sometimes feel like one big game of whack-a-mole. The truth is that cybersecurity is an ongoing, ever-evolving practice. Part of that practice is staying up-to-date on all the tactics …
Businesses Have an Important Part to Play in Building a Safer Internet
How your company can protect users, clients, and your own networks this Safer Internet Day This year, Safer Internet Day (this Tuesday, February 8th) is a chance to check in with your current practices and tighten up your defenses for 2022. The theme for Safer Internet Day 2022 is “Together for a better internet”. This is a great perspective to …
Data Privacy Day: Five Defensive Strategies for Businesses
Data Privacy Day is a chance for businesses to engage with their customers and clients in a way that builds trust, inspires customer loyalty, and enhances the business’s reputation. When an organization demonstrates that they care about protecting consumers’ privacy–they are in effect letting clients know that their information, data, and choices are safe with the business. In 2022, this …
MSPs and MSSPs: 6 Password Management Tips
The majority of users, whether new employees or CEOs, don’t realize that even if their password meets complexity requirements, it doesn’t mean it’s secure. In fact, many common password policies are overdue for an update, as for several years now cybercriminals have been taking advantage of these password policy weaknesses. These issues are compounded by password reuse—a very common user …
Cutting-Edge Threat Intelligence with Honeypot Networks and Integrative Data Systems
Cybersecurity intelligence is only as valuable as the actions it allows you to take. Especially in the realm of prevention, fast analysis and notification is critical. It’s no secret to threat actors; they know that as soon as data is available or a vulnerability is identified, the window of opportunity for exploitation is closing. As many cybersecurity professionals can confirm, …
Top Cybersecurity Issues to Watch Out For in 2022
One of the most challenging aspects of cybersecurity is preparedness. With technology, user habits, and attack styles changing over the past few years and showing no sign of slowing down, cyberattacks seem like a never-ending onslaught. As we start 2022, organizations need to do their best and prepare for future incidents. Auditing and evaluating the state of their internal security …
The City of Keizer Enhances Cybersecurity by Eliminating Compromised Passwords
The City of Keizer is a beautiful community in the Willamette Valley of Oregon. The city offers an ideal environment, delivering a range of services to citizens, from parks and public works to police protection. However, even from its earliest days, there have been hazards to overcome. As a settlement in the 1800s, floods forced the community to rebuild on …
How Enzoic is helping West-Mark comply with NIST Password Guidelines
West-Mark is an ISO 9001 certified manufacturer of trucks and trailers based in the western United States. Their high-quality manufacturing process helped them become an essential supplier for the US Department of Defense and the United States military. However, being in this part of the nation’s supply chain makes West-Mark a potential target for cybercriminals. To manage the risk, West-Mark …
One Size Does Not Fit All
How Small and Mid-Sized Businesses are Faring in the Cybersecurity Landscape When threat actors are on the prowl for lucrative plans, they search for many types of data. Some focus on bank details or credit card numbers, while others zero in on medical information or other personal details. But according to the Verizon Data Breach Investigations Report (DBIR), credentials—typically pairs …
The Latest Password Security Methods
Password authentication isn’t going anywhere anytime soon. It’s part of our culture, users and employees are accustomed to it, and many systems depend on the “what you know” layer. Newer technologies like biometrics might work in certain situations, but they won’t replace passwords altogether anytime soon. In our series on password security, we’ve talked about some worrying trends, the myths …