Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Password Security

, ,

How CJIS Evolved Password Policy Requirements

The CJIS Security Policy is regularly updated to evolving industry best practices. The June 2019 update introduced a new policy option for passwords.

Read More

, ,

Good, Better, Best: Using Multi-Factor Authentication Effectively

Multi-factor authentication (MFA) is useful, but not a failsafe strategy for user authentication. Read to learn more.

Read More

, ,

State of Password Security: Response Required

Read why organizations need to react urgently to the state of password security, according to data from 451 Research.

Read More

, , ,

Root Passwords: The Root of Password Problems

Root Passwords: Most users will select common “root” words and just modify them with easily guessable variations. Here is what you can do about it.

Read More

,

Rethinking Digital Hygiene

Digital hygiene is important to prevent your accounts from being compromised and to protect your online identity. Read our tips in this short blog!

Read More

, , ,

Privacy Regulation in a Connected IoT World

Privacy Regulation in a Connected World: New California legislation is a1st step for privacy regulation; but IoT regulation should be expanded. Here is why.

Read More

,

Old vs. New Methods for Employee Password Hardening

Eliminate weak and compromised passwords. Do not just mitigate it! Harden employee passwords with daily compromised password screening in Active Directory.

Read More

, ,

Eliminating the Burden of Periodic Password Reset

NIST 800-63b password guidelines can improve user's experience with passwords, including the guideline to stop forcing periodic password resets for users.

Read More

, , ,

Credential Stuffing Attacks vs. Brute Force Attacks

Credential stuffing & brute force attacks use very different methods to accomplish account takeover. This article outlines what they are, how they operate and how to handle them.

Read More