West-Mark is an ISO 9001 certified manufacturer of trucks and trailers based in the western United States. Their high-quality manufacturing process helped them become an essential supplier for the US Department of Defense and the United States military. However, being in this part of the nation’s supply chain makes West-Mark a potential target for cybercriminals. To manage the risk, West-Mark …
The Latest Password Security Methods
Password authentication isn’t going anywhere anytime soon. It’s part of our culture, users and employees are accustomed to it, and many systems depend on the “what you know” layer. Newer technologies like biometrics might work in certain situations, but they won’t replace passwords altogether anytime soon. In our series on password security, we’ve talked about some worrying trends, the myths …
The City of Paso Robles Taps Enzoic for Password Peace of Mind
The City of Paso Robles, located in San Luis Obispo County, California, is famous for its award-winning wines and relaxed atmosphere. As such, it’s no surprise that the City is a popular tourist destination, with Paso Robles included in Travel and Leisure magazine’s “25 Top Places to Visit for the Holidays” in 2015 and 2016. Located halfway between San Francisco …
Enzoic Offers the Motion Picture Association a Premier Approach to Password Security
The Motion Picture Association (MPA) is the leading advocate of the worldwide film, television and streaming industry. Founded in 1922, the company today is championing the growing diversity of filmmakers, safeguarding intellectual property, advancing technological innovation, and supporting trade policies that can further expand the global film and TV marketplace. With operations in North America, Asia Pacific, Latin America and …
Employee Password Security in the Healthcare Sector
The healthcare industry sector is increasingly the target of cybercriminals. According to the Health Insurance Portability and Accountability Act (HIPAA) Journal, over the past eleven years (2009-2020) there have been more than 3,705 healthcare data breaches impacting more than 268 million medical records. Why is this happening, and what can we do to address it? The Culprits Weak and Compromised …
Cultivating a Cybersecure Culture at Work is Everyone’s Responsibility
Businesses often say that their people are their greatest asset. When it comes to cybersecurity, this statement is truer than you might think. A constantly shifting threat landscape means cybersecurity best practices should be on everyone’s mind, not just your CTO or CISO. When employees of all areas, from new hires to the executive suite, are equipped to understand and …
What’s Missing from New FINRA Guidance
In a recent release, the Financial Industry Regulatory Authority (FINRA) provided insight into the increasing frequency of occurrences of Account Takeover (ATO) within the financial industry. The report also produced guidance for organizations looking to tighten their cybersecurity, but no direction was provided regarding the growing issue of password hygiene. ATO: What’s really happening? When hackers gain unauthorized access to …
Passwords Security: Past, Present, and Future
The recent report on The State Password Security in the Enterprise reveals several essential findings for system administrators and security professionals alike. First, whether we are happy about it or not, passwords are going to be around for a long time. Second, organizations need to familiarize themselves with current industry recommendations. And third, due to the frequency of cyber-attacks involving …
Benefits of NIST Guidelines in Real-World Solutions
There is no evidence to suggest that data breaches will become less frequent or less serious in 2021. In fact, as more of the population now works from how the risks are increasing. To counter this threat, organizations really need to upgrade their risk management strategy to pinpoint the reasons why and how so many companies and individuals are being …
Password Blacklists: Applying the Goldilocks Principle
One of the most effective ways to increase the strength of your network’s security is to screen users’ passwords against a list of dictionary passwords and known compromised passwords. Password vulnerabilities remain a major entry point for hackers. Over the last few years, password policy has evolved in significant ways. NIST password guidelines now indicate that using a password blacklist …