Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

The Benefits and Drawbacks of Password Complexity Rules

The Benefits and Drawbacks of Password Complexity Rules: Should you still use them and why does NIST recommend against them? Learn more about them!

Read More

, , ,

Root Passwords: The Root of Password Problems

Root Passwords: Most users will select common “root” words and just modify them with easily guessable variations. Here is what you can do about it.

Read More

Cracking Dictionaries

Cracking Dictionaries: What You Need to Know. What they are. How are they used? How can organizations secure passwords & make them harder to crack.

Read More

, , ,

Password Blacklists: Do They Provide Enough Protection?

Password blacklists can lack some of the most common passwords. Here are some of the things you should consider for protection.

Read More

, ,

Recommendations For HIPAA Password Compliance

Recommendations For HIPAA Password and Authentication Compliance: What are HIPAA Password Requirements and How To Comply with Them.

Read More

Password Rotation Policies: The Pros and Cons

The Pros and Cons of Password Rotation Policies: Why Password Rotation Policies May No Longer Be Fit-For-Purpose In the Digital Age.

Read More

, ,

Introducing 1-Click NIST Password Standard Compliance & More

Introducing 1-Click NIST Password Standard Compliance, Compromised User Reporting, and "Root" Password Detection in Active Directory.

Read More

,

What is Exposed Password Screening?

Exposed password screening is the process of checking currently used passwords against passwords that have been exposed in a publicly known data breach.

Read More

,

Rethinking Digital Hygiene

Digital hygiene is important to prevent your accounts from being compromised and to protect your online identity. Read our tips in this short blog!

Read More