How Small and Mid-Sized Businesses are Faring in the Cybersecurity Landscape When threat actors are on the prowl for lucrative plans, they search for many types of data. Some focus on bank details or credit card numbers, while others zero in on medical information or other personal details. But according to the Verizon Data Breach Investigations Report (DBIR), credentials—typically pairs …
Enzoic’s Threat Research: From Extensive Knowledge to Decisive Action
At Enzoic, we understand the need for threat intelligence that allows both businesses and users to take action to keep themselves safe. Effective threat intelligence for compromised credential screening involves constant evolution, discerning reconnaissance, and real-time analysis and deployment. Unfortunately, most threat intelligence services are vague and laconic, relying on misleading statistics and alarmist reports as veneers for validity. Nearly …
Busting the Myths Surrounding Password-Based Security
People have been relying on password-based security for millennia. The Roman military reportedly used what they called “watchwords” to identify soldiers on patrol. Exclusive groups and guilds used secret passwords to prove membership. The phrase “open sesame” protected hidden treasure in the story of Ali Baba and the Forty Thieves. In more recent times, the world’s first computer passwords were installed …
COVID Tracing Apps. Mask Up, Digitally.
Many people are feeling hopeful in many areas about receiving their COVID vaccine. A welcome shift from the uncertainty and confusion of the last year. But there are now new challenges to be faced. Among them, the discussion of requiring a vaccine or immunity passport for individuals to take part in activities like international travel, as well as more minor …
Cybersecurity During a Pandemic – And What You Can Do To Keep Employees Safe
As the world struggles to navigate the coronavirus new normal there is one community eager to take advantage of this crisis: hackers. As Enzoic’s COO, Josh Horwitz, put it in a recent article for Electronic Health Reporter, “With scams ranging the gamut from a coronavirus tracker that installs malware onto visitors’ devices to takeover of teleconferencing software to fraudulent company …
Enzoic a “Top 10 Most Valuable Cybersecurity Solution Provider” in the CEO Views
Enzoic was selected to be a “Top 10 Most Valuable Cybersecurity Solution Provider in 2019” because of the innovative cybersecurity and fraud prevention products. Enzoic, formerly PasswordPing, provides low user-friction solutions for strong authentication against compromised credential attacks affecting employees, users, and customers. There are two core solutions: Enzoic for Active Directory Enzoic Account Takeover Protection Enzoic for Active Directory: …
Enzoic Identified as a Leading Cyber Security Solution Provider
Enzoic has recently been listed in the 10 Leading Cyber Security Solution Providers in Beyond Protection. At any given moment, millions of compromised user credentials – primarily passwords – are circulated across the Internet and Dark Web from past data breaches. Reuse of passwords by users across their online accounts is fertile ground for cybercriminals harvesting username and password combinations …