Blacklist Azure AD

The Risks Azure AD Password Protection Ignores: Compromised and Blacklisted

2022 is shaping up to be an extremely successful year for cybercriminals. Data breaches are accumulating in unprecedented numbers, putting more and more information in the hands of bad actors. Cyberattacks this year have hit big players like Cash App and the Red Cross, as well as smaller companies around the world. Even small data breaches have a part to …

Password Policy

Bolstering AD Password Policies

Presets Aren’t Enough  Let’s keep things real: passwords aren’t going anywhere. And with continued—and increasing—ransomware attacks and data breaches popping up everywhere, an organization’s password policies are crucial to its digital security stance.  According to the 2022 Verizon DBIR, a majority of attacks originate from a single entry point: compromised credentials. Since so many organizations use Active Directory (AD) as …

AD F

Active Directory is an Active Vulnerability 

Many organizations that use Active Directory (AD) are failing to bolster their security postures  Microsoft AD has been around for almost a quarter century, and while many organizations across industries use it, few have adapted to the demand for greater security postures.  Despite the fact that approximately 90% of the Global Fortune 1000 companies use AD, only about a quarter consider security …

full credentials

Enzoic Expands Automated Credentials Monitoring in Active Directory

Solution Now Continuously Screens for Both Unsafe Passwords and Compromised Full Credentials Reducing the Risk of a Cyberattack Boulder, CO – March 2, 2022 – Enzoic, a leading provider of compromised credential screening solutions, today released the latest version of Enzoic for Active Directory. The solution prevents users from choosing weak or previously exposed passwords by screening them at their …

password security

Five Tips for Locking Down Password Security

Taking Action on Active Directory Active Directory (AD) is ubiquitous cross-industry and due to its popularity, cybercriminals have continually targeted it. Therefore, prioritizing safe passwords in AD is crucial. Here are five ways to address the problem. 1. Use the Principle of Least Privilege (POLP) When a network administrator is establishing the levels of access for every user of AD …

data privacy day

Data Privacy Day: Five Defensive Strategies for Businesses

Data Privacy Day is a chance for businesses to engage with their customers and clients in a way that builds trust, inspires customer loyalty, and enhances the business’s reputation.  When an organization demonstrates that they care about protecting consumers’ privacy–they are in effect letting clients know that their information, data, and choices are safe with the business.   In 2022, this …

Keizer Cybersecurity

The City of Keizer Enhances Cybersecurity by Eliminating Compromised Passwords

The City of Keizer is a beautiful community in the Willamette Valley of Oregon. The city offers an ideal environment, delivering a range of services to citizens, from parks and public works to police protection. However, even from its earliest days, there have been hazards to overcome. As a settlement in the 1800s, floods forced the community to rebuild on …

westmark

How Enzoic is helping West-Mark comply with NIST Password Guidelines

West-Mark is an ISO 9001 certified manufacturer of trucks and trailers based in the western United States. Their high-quality manufacturing process helped them become an essential supplier for the US Department of Defense and the United States military. However, being in this part of the nation’s supply chain makes West-Mark a potential target for cybercriminals. To manage the risk, West-Mark …