password lifecycle

The Lifecycle of a Password

Securing Passwords from Create to Retire Organizations are in a non-stop battle to protect their network and meet data security responsibilities in the face of ever-increasing cyberattacks. A key challenge is ensuring that users create secure passwords. Four out of five hacking breaches involve unsafe password practices. In this current threat environment, passwords must exclude passwords exposed in previous data …

trusting passwords

Trusting Passwords: Best Practices for Threat-Proofing Credentials

“Open, Sesame!”Upon reflection it’s easy to see that passwords have an incredibly long history: from shibboleths to military codes, they’ve been used in many situations to preserve privacy and identity. With the creation of computing technology, passwords became ubiquitous, and were codified in the digital world as strings of characters—numbers, letters, and symbols. Much like their historical counterparts, they were …

Digital Home Security: How to stay safe while the world works from home

Digital Home Security: How to stay safe while the world works from home

Working from home used to seem something of a luxury, reserved for those whose work might not rely on customer interaction or face to face meetings. But since April of this year, the number of people working from home has dramatically increased, due to the risks associated with COVID-19. This trend has spanned most major sectors of the industry—education, healthcare, …

Dos and Don'ts of password security

The Updated Do’s and Don’ts of Password Security

When it comes to passwords, individual habits and organizational policies vary widely—unfortunately, the pattern is one of weakness. But organizational online security can be immediately improved by the implementation of a few key principles. Stronger passwords mean that users are keeping themselves safer online—and if users are safer online, it results in your organization staying safer as well. Updated NIST …

Questions to ask when considering compromised password monitoring providers: https://www.enzoic.com/questions-to-ask-compromised-password-monitoring-vendors/

Questions to Ask Compromised Password Monitoring Vendors

Organizations using Active Directory must update their password policies to block and detect compromised passwords, but comparing password monitoring vendors in this area can sometimes be challenging. Often, organizations are not sure how to compare vendors and are not sure what questions should be asked when working with password monitoring vendors. By asking the right questions, you can pick the …

Passwords in the Age of IoT: While the IoT brings a number of efficiencies and conveniences, it also can represent a security vulnerability. Here are some tips!

Passwords in the Age of IoT

Connected devices are becoming increasingly prevalent in the home, at the office, and everywhere in between. With 2020 widely predicted to see the arrival of mainstream 5G adoption, we can only expect the popularity of smart IoT products to grow. While the IoT certainly brings a number of efficiencies and conveniences, it also can represent a significant security vulnerability. As …

password hashing

Hashing: What You Need to Know About Storing Passwords

Cybersecurity isn’t always a battle to keep hackers out at all costs. Sometimes it’s actually about making the costs just not worth the effort. This is particularly true when it comes to how passwords are stored on your server. Let’s take a look at how to make it more unreasonably costly to the hacker who just compromised the server that …

Keep Employees Safe

Cybersecurity During a Pandemic – And What You Can Do To Keep Employees Safe

As the world struggles to navigate the coronavirus new normal there is one community eager to take advantage of this crisis: hackers. As Enzoic’s COO, Josh Horwitz, put it in a recent article for Electronic Health Reporter, “With scams ranging the gamut from a coronavirus tracker that installs malware onto visitors’ devices to takeover of teleconferencing software to fraudulent company …

Root Passwords

Root Passwords: The Root of Password Problems

The average online user has over 90 accounts between personal and work accounts that require a password. That is a daunting number of unique passwords to memorize. In an effort to remember their passwords, most users will select common “root” words with easily guessable variations. These root passwords become predictable passwords when one becomes compromised. Password Expiration Policies The situation …