passwordless

It’s Passwords, All the Way Down

We seem enamored with the idea of a ‘passwordless’ society. Not just because it would be an indicator of secure networks, but because trying to keep track of tens of unique, complex passwords is not ideal. There has been plenty of industry and media buzz around the concept of passwordless authentication strategies. Particular attention is paid to strategies like biometrics—which …

AI

Can AI be Used to Mitigate Human Error?

Each month that passes, the cybersecurity industry continues to struggle with new hacking techniques, rapidly evolving threats, and how to communicate the severity of the issues to organizations. One problem that can’t necessarily be solved by cybersecurity professionals is the broad category of ‘human error’. In his IT Toolbox article, Josh Horwitz (COO of Enzoic) discusses whether or not Artificial …

e-learning

Attacks on Digital Learning

How School Districts can defend themselves from increased cyberattacks. While there are changes for each generation of students to experience, it’s safe to say that the impact of the pandemic on the scholastic world in 2020 was dramatic and immediate. The transition from in-person classes to web-based learning was startling for everyone, but especially K-12 students because of the rigid …

Social Engineering Tactics

How Social Engineering Tactics Can Crack Multi-factor Authentication

Multi-factor authentication (MFA) is one of many tools in your cybersecurity toolbox. Strong MFA will form layers of security between bad actors and your data systems and accounts. But if you’re relying on MFA to guard your system from cyber threats alone, you could be more at risk than you realize. MFA can be powerful protection, but it isn’t infallible. …

Municipalities

Cyberattacks on Municipalities & How to Defend Against Them

Cyberattacks continue to have a massive economic impact on local and state branches of governments across the U.S. When sectors of government are breached, the credibility of their institutions is jeopardized, leading to a negative cycle of resource allocation. When focusing on municipalities, it’s particularly easy to see how detrimental the impact can be.  A Perfect Target Municipalities are ideal …

active defense (1)

Developing Active Defense from Password Spraying & Credential Stuffing

Microsoft Active Directory (AD) is ubiquitous across the corporate landscape; you probably use it to authorize access at almost every level. Due to its popularity and importance, AD is a perfect target for cyber attacks. Hackers frequently use password spraying and credential stuffing as attack methods, especially against AD. With many traditional password ‘best practices’ being outdated, are you prepared …

dark web

Throwing Light on the Dark Web

As recent reviews have shown, upwards of 80% of hacking-related attacks involve compromised credentials. Threat actors can target individuals and companies through many different types of cyber attacks, but where does their information come from in the first place?  It’s easy to find lists of usernames and passwords, sometimes for free, but more often for sale online. In fact, according …