News and warnings about data breaches and leaks abound at the moment, emphasizing the need for increased cybersecurity regardless of the industry. Microsoft’s Active Directory is often the perfect target for bad actors seeking to abuse compromised credentials. Despite the frequency of compromised credentials being the cause of data breaches, most organizations do not know whether their users’ passwords are safe. …
How Biometrics Measure Up and Why They Aren’t the Cure-All for Cybersecurity
Each month there seems to be more news of data breaches, both large and small. As these events continue to increase in frequency, organizations are learning that they must engage, and rapidly, with new security measures. Companies are now turning their attention from password policies to biometric authentication solutions, without thinking every ramification through. The biometrics industry is expanding rapidly, …
Enzoic and OneLogin Partner to Prevent Cyber Attacks Caused By Compromised Passwords
With 80% of hacking-related breaches stemming from compromised credentials, agreement provides OneLogin clients with enhanced security Boulder, CO – Nov 17, 2020 – Enzoic, a leading provider of compromised credential screening solutions, today announced a partnership with OneLogin, a cloud-based identity and access management provider. The collaboration will see Enzoic’s credentials screening service integrated into OneLogin’s SmartFactor Authentication product, ensuring …
Understanding Bot Mitigation Limitations
Malicious bots make up nearly a quarter of all website traffic[1]. These bots are responsible for a whole host of problems, including account takeovers, spreading spam, and price and content scraping. The sheer scale of malicious bots crawling the web is equally alarming and eerie. Detecting bots is increasingly challenging for businesses. It’s estimated that approximately 54% of bots are …
The Health of Security
After experiencing a massive ransomware attack that caused the near-shutdown of 400 sites, the Universal Health Services (UHS) has become the most recent example to highlight the issue of cybersecurity in health care organizations. In a recent statement, UHS revealed that the attack affected acute care facilities and behavioral health hospitals, as well as corporate level systems, and caused UHS …
Password Blacklists: Applying the Goldilocks Principle
One of the most effective ways to increase the strength of your network’s security is to screen users’ passwords against a list of dictionary passwords and known compromised passwords. Password vulnerabilities remain a major entry point for hackers. Over the last few years, password policy has evolved in significant ways. NIST password guidelines now indicate that using a password blacklist …
Enzoic Wins “Fraud Prevention Innovation of the Year” Award in 2020 CyberSecurity Breakthrough Awards Program
After intensive review of over 3,700 nominations, Enzoic was chosen as a winner of the 2020 CyberSecurity Breakthrough award program. They were recognized specifically with the ‘Fraud Prevention Innovation Award’. CyberSecurity Breakthrough is a leading independent market intelligence organization that recognizes the top companies, technologies and products in the global information security market. Enzoic sits alongside winners in other cyber …
Seven Active Directory Security Tips from The Experts
Microsoft Active Directory (AD) allows IT administrators to manage users, data, and applications within their organization’s network. Due to its popularity and importance within companies, AD is a perfect target for ‘bad actors.’ We’ve most likely all seen the massive increase in data breaches over the past few years. There are many attack vectors out there, but compromised credentials are …
How CJIS Evolved Password Policy Requirements
The Criminal Justice Information Services (CJIS) is the largest division of the FBI. They’re a hub of state-of-the-art tools and services for law enforcement, national security community partners, and the general public. The CJIS Security Policy is regularly updated to evolving industry best practices. Their June 2019 update introduced a new policy option for passwords. This option made it easier …
A Tale of Two Password Protection Approaches
Static Vs. Dynamic Hardly a day goes by without news of passwords being exposed in a third-party data breach. Once leaked, these credentials are easily available to other hackers via the Dark Web and, thanks to the rampant problem of password reuse, there are a variety of effective attack methods that allow hackers to obtain access to additional organizations’ systems …