Install one layer of cyber security protection, and suddenly there’s a whole new way bad actors have discovered to penetrate it. Staying on top of the latest password security methods can sometimes feel like one big game of whack-a-mole. The truth is that cybersecurity is an ongoing, ever-evolving practice. Part of that practice is staying up-to-date on all the tactics …
Cyberdemic 2.0?
The 2022 Experian Data Breach Industry report covers the impact of breaches over the past year and turns an eye towards the upcoming months as well, forecasting implications for the continued barrage of cyberattacks. The report covers trends in the digital landscape that have manifested due to natural disasters and gambling sites (leading to more phishing scams), as well as …
ITRC Breach Annual Report: Key Findings
The Identity Theft Resource Center (ITRC) is a nationally recognized nonprofit organization “established to support victims of identity crime.” The recently released Data Breach Annual Report provides statistics and perspectives on cyberattacks. Here’s what organizations need to know: The overall number of data breaches rose a whopping 68 percent in 2021. There were 1,862 individual breaches last year, surpassing 2020’s …
Cutting-Edge Threat Intelligence with Honeypot Networks and Integrative Data Systems
Cybersecurity intelligence is only as valuable as the actions it allows you to take. Especially in the realm of prevention, fast analysis and notification is critical. It’s no secret to threat actors; they know that as soon as data is available or a vulnerability is identified, the window of opportunity for exploitation is closing. As many cybersecurity professionals can confirm, …
The Latest Password Security Methods
Password authentication isn’t going anywhere anytime soon. It’s part of our culture, users and employees are accustomed to it, and many systems depend on the “what you know” layer. Newer technologies like biometrics might work in certain situations, but they won’t replace passwords altogether anytime soon. In our series on password security, we’ve talked about some worrying trends, the myths …
Enzoic’s Threat Research: From Extensive Knowledge to Decisive Action
At Enzoic, we understand the need for threat intelligence that allows both businesses and users to take action to keep themselves safe. Effective threat intelligence for compromised credential screening involves constant evolution, discerning reconnaissance, and real-time analysis and deployment. Unfortunately, most threat intelligence services are vague and laconic, relying on misleading statistics and alarmist reports as veneers for validity. Nearly …
Busting the Myths Surrounding Password-Based Security
People have been relying on password-based security for millennia. The Roman military reportedly used what they called “watchwords” to identify soldiers on patrol. Exclusive groups and guilds used secret passwords to prove membership. The phrase “open sesame” protected hidden treasure in the story of Ali Baba and the Forty Thieves. In more recent times, the world’s first computer passwords were installed …
How The Current Threat Landscape Impacts Authentication Security
Repercussions from the ongoing pandemic are still reverberating through workplaces all over the world. Businesses are racing to catch up with the changes they’ve had to make to accommodate remote workers, digitalization, and new cloud technologies. Many have let their cybersecurity practices fall to the wayside in a rush to evolve with the times. In a report by PwC, 64% …
Cultivating a Cybersecure Culture at Work is Everyone’s Responsibility
Businesses often say that their people are their greatest asset. When it comes to cybersecurity, this statement is truer than you might think. A constantly shifting threat landscape means cybersecurity best practices should be on everyone’s mind, not just your CTO or CISO. When employees of all areas, from new hires to the executive suite, are equipped to understand and …
Think You’re Smarter than a Hacker?
How long do you think it would take for someone to guess your password? Let’s say they knew you well. You’d start with combinations of your pet names and birth date, or where you work and your town. They might spend hours trying combinations, but the likelihood is, they wouldn’t independently be able to guess it. But as research has …