Biometrics Measure Up

How Biometrics Measure Up and Why They Aren’t the Cure-All for Cybersecurity

Each month there seems to be more news of data breaches, both large and small. As these events continue to increase in frequency, organizations are learning that they must engage, and rapidly, with new security measures. Companies are now turning their attention from password policies to biometric authentication solutions, without thinking every ramification through. The biometrics industry is expanding rapidly, …

Cybersecurity Breakthrough Award 2020

Enzoic Wins “Fraud Prevention Innovation of the Year” Award in 2020 CyberSecurity Breakthrough Awards Program

After intensive review of over 3,700 nominations, Enzoic was chosen as a winner of the 2020 CyberSecurity Breakthrough award program. They were recognized specifically with the ‘Fraud Prevention Innovation Award’. CyberSecurity Breakthrough is a leading independent market intelligence organization that recognizes the top companies, technologies and products in the global information security market. Enzoic sits alongside winners in other cyber …

The Skinny on Password Attacks

The Skinny on Password Attacks

Thousands of Canadian citizens are at risk of identity fraud after cybercriminals used stolen credentials to access government services including COVID-19 relief funds. The source of the breach was a credential stuffing attack utilizing logins exposed in a prior breach. This is the latest example in a steady stream of data breaches driven by poor password practices. The Verizon DBIR …

From Stolen Credentials to Full Network Compromise

From Stolen Credentials to Full Network Compromise

How Hackers Are Actually Using Exposed Passwords to Infiltrate Active Directory Recent reports like the Verizon DBIR have noted that stolen credentials are often the foothold that attackers use to compromise networks and systems. A simple phishing or credential stuffing attack becomes the entry point for a much larger enterprise, like data theft, ransomware, or system hijacking. This is rather …

Digital Home Security: How to stay safe while the world works from home

Digital Home Security: How to stay safe while the world works from home

Working from home used to seem something of a luxury, reserved for those whose work might not rely on customer interaction or face to face meetings. But since April of this year, the number of people working from home has dramatically increased, due to the risks associated with COVID-19. This trend has spanned most major sectors of the industry—education, healthcare, …

CISO Survival Guide: How to Balance Digital Transformation and Security https://www.enzoic.com/digital-transformation-and-security/

CISO Survival Guide: Balancing Digital Transformation and Security

According to an IDC report, global digital transformation spending reached $1.8 trillion in 2019—up nearly 18% from 2018. What’s more, the firm expects digital transformation investments to total more than $6 trillion over the next for years, with the study’s authors noting, “Digital transformation is quickly becoming the largest driver of new technology investments and projects among businesses.” But how …

Active Directory Lite

Need Help Auditing for Compromised Passwords?

Password audits have become more difficult. New data breaches expose credentials every day. These are quickly fed into hackers’ cracking dictionaries, changing which passwords you need to keep out. Verizon’s DBIR found 81% of data breaches were caused by compromised, weak, and reused passwords. Traditional algorithmic complexity rules are no longer considered a key factor in password strength. NIST password …