Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

, , ,

Root Passwords: The Root of Password Problems

Root Passwords: Most users will select common “root” words and just modify them with easily guessable variations. Here is what you can do about it.

Read More

Cracking Dictionaries

Cracking Dictionaries: What You Need to Know. What they are. How are they used? How can organizations secure passwords & make them harder to crack.

Read More

, , ,

Password Blacklists: Do They Provide Enough Protection?

Password blacklists can lack some of the most common passwords. Here are some of the things you should consider for protection.

Read More

, ,

Recommendations For HIPAA Password Compliance

What is HIPAA password compliance, and how can healthcare organizations comply with these authentication guidelines.

Read More

Password Rotation Policies: The Pros and Cons

The Pros and Cons of Password Rotation Policies: Why Password Rotation Policies May No Longer Be Fit-For-Purpose In the Digital Age.

Read More

, ,

Introducing 1-Click NIST Password Standard Compliance & More

Introducing 1-Click NIST Password Standard Compliance, Compromised User Reporting, and "Root" Password Detection in Active Directory.

Read More

,

What is Exposed Password Screening?

Exposed password screening is the process of checking currently used passwords against passwords that have been exposed in a publicly known data breach.

Read More

,

Rethinking Digital Hygiene

Digital hygiene is important to prevent your accounts from being compromised and to protect your online identity. Read our tips in this short blog!

Read More

,

Preventing Context-Specific Passwords in Active Directory

Context-Specific Passwords: Organizations can prevent their users from using context-specific passwords (like the local NFL Team) in Active Directory. How?

Read More