Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Password Security

,

The Health of Security

Healthcare organizations are a prime target. Here are six tips that healthcare institutions can take to increase the effectiveness of their security.

Read More

, , ,

Password Blacklists: Applying the Goldilocks Principle

A password blacklist is critical to network security, but companies still struggle with questions about how long & what should be included.

Read More

, ,

How CJIS Evolved Password Policy Requirements

The CJIS Security Policy is regularly updated to evolving industry best practices. The June 2019 update introduced a new policy option for passwords.

Read More

, ,

Good, Better, Best: Using Multi-Factor Authentication Effectively

Multi-factor authentication (MFA) is useful, but not a failsafe strategy for user authentication. Read to learn more.

Read More

, ,

State of Password Security: Response Required

Read why organizations need to react urgently to the state of password security, according to data from 451 Research.

Read More

, , ,

Root Passwords: The Root of Password Problems

Root Passwords: Most users will select common “root” words and just modify them with easily guessable variations. Here is what you can do about it.

Read More

,

Rethinking Digital Hygiene

Digital hygiene is important to prevent your accounts from being compromised and to protect your online identity. Read our tips in this short blog!

Read More

, , ,

Privacy Regulation in a Connected IoT World

Privacy Regulation in a Connected World: New California legislation is a1st step for privacy regulation; but IoT regulation should be expanded. Here is why.

Read More

,

Old vs. New Methods for Employee Password Hardening

Eliminate weak and compromised passwords. Do not just mitigate it! Harden employee passwords with daily compromised password screening in Active Directory.

Read More