Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Password Security

,

Rethinking Digital Hygiene

Digital hygiene is important to prevent your accounts from being compromised and to protect your online identity. Read our tips in this short blog!

Read More

, , ,

Privacy Regulation in a Connected IoT World

Privacy Regulation in a Connected World: New California legislation is a1st step for privacy regulation; but IoT regulation should be expanded. Here is why.

Read More

, ,

Eliminating the Burden of Periodic Password Reset

NIST 800-63b password guidelines can improve user's experience with passwords, including the guideline to stop forcing periodic password resets for users.

Read More

, , , ,

A Guide to Law Firm Cybersecurity Risks & Ethical Compliance

Law firms are frequently targeted by hackers but the ABA's Formal Opinion 483 will guide law firm cybersecurity policy to protect firms and their clients.

Read More

,

Evolving Password Based Security to Fight Compromised Credentials Attacks

The continued barrage of reports about data breaches and account hijacking, make it painfully clear that the way organizations are managing password-based security is missing something. When we look at how cybercriminal tactics have evolved, and how compromised credential attacks have impacted these methods, one answer to the problem of the password becomes clear.

Read More

,

Users Suck at Passwords. Help Them.

How many of your users are using insecure and compromised passwords? You may have a standard password strength meter on your site so you may think that your users have secure passwords. Think again. Password strength meters and password complexity requirements are simply not enough.

Read More

, , ,

What the Heck is “Credential Stuffing”?

Billions of user credentials (usernames and passwords) have been exposed publicly over the last few years. The natural question that comes up is “what do cybercriminals do with these stolen credentials?”

Read More