Enable automated password policy enforcement with daily password auditing and customizable remediation. With compromised password detection, custom password dictionary, fuzzy matching with common character substitutions, and continuous ongoing monitoring; enterprises can easily adopt NIST password requirements and eliminate vulnerable passwords in Active Directory. Organizations can adopt NIST password standards to screen for weak, commonly-used, expected, and compromised passwords. Then they …
Surprising Password Guidelines from NIST
The US National Institute of Standards and Technology (NIST) just finalized new draft guidelines, completely reversing previous password security recommendations and upending many of the standards and best practices security professionals use when forming policies for their companies.
Pride and Passwords: Top Hacking Methods & How to Prevent Them
Cybersecurity is becoming a pressing issue for IT professionals in all fields. There are headlines every week about data breaches of all sizes and the attacks themselves come from many angles. This article details the password attack methods hackers frequently used against enterprises and provides solutions as to how your business can prevent damage or breaches. 1. Dictionary Attacks A …
Cybersecurity and What’s Not Working from Home
Though 2021 signals positivity, including vaccines for COVID-19, some changes in the workforce due to coronavirus are likely to stick around. Many things are possible from the relative comfort of our own homes, from university lectures to financial consultancy. In the next year, even as we return to some form of immunized normalcy, remote work will likely remain popular. However, …
From Paper to Passwords: Digitizing the Voting Process
2020 has introduced many unique circumstances. It’s shown us that there’s not a lot that can’t be done online, from school to therapy. The usefulness of the digital age has never been more salient. The recent chaos of holding an American presidential election during a pandemic has shone a light on just how beneficial digital voting could be, as well. …
From NIST Guidelines to Real-World Solutions?
There is no evidence to suggest that data breaches will become less frequent or less serious in 2021. In fact, as more of the population now works from how the risks are increasing. To counter this threat, organizations really need to pinpoint the reasons why and how so many companies and individuals are being successfully targeted by hackers. Enzoic has …
A Benchmark for Your Unsafe Passwords
News and warnings about data breaches and leaks abound at the moment, emphasizing the need for increased cybersecurity regardless of the industry. Microsoft’s Active Directory is often the perfect target for bad actors seeking to abuse compromised credentials. Despite the frequency of compromised credentials being the cause of data breaches, most organizations do not know whether their users’ passwords are safe. …
How Biometrics Measure Up and Why They Aren’t the Cure-All for Cybersecurity
Each month there seems to be more news of data breaches, both large and small. As these events continue to increase in frequency, organizations are learning that they must engage, and rapidly, with new security measures. Companies are now turning their attention from password policies to biometric authentication solutions, without thinking every ramification through. The biometrics industry is expanding rapidly, …
Enzoic and OneLogin Partner to Prevent Cyber Attacks Caused By Compromised Passwords
With 80% of hacking-related breaches stemming from compromised credentials, agreement provides OneLogin clients with enhanced security Boulder, CO – Nov 17, 2020 – Enzoic, a leading provider of compromised credential screening solutions, today announced a partnership with OneLogin, a cloud-based identity and access management provider. The collaboration will see Enzoic’s credentials screening service integrated into OneLogin’s SmartFactor Authentication product, ensuring …
Understanding Bot Mitigation Limitations
Malicious bots make up nearly a quarter of all website traffic[1]. These bots are responsible for a whole host of problems, including account takeovers, spreading spam, and price and content scraping. The sheer scale of malicious bots crawling the web is equally alarming and eerie. Detecting bots is increasingly challenging for businesses. It’s estimated that approximately 54% of bots are …
The Health of Security
After experiencing a massive ransomware attack that caused the near-shutdown of 400 sites, the Universal Health Services (UHS) has become the most recent example to highlight the issue of cybersecurity in health care organizations. In a recent statement, UHS revealed that the attack affected acute care facilities and behavioral health hospitals, as well as corporate level systems, and caused UHS …
Password Blacklists: Applying the Goldilocks Principle
One of the most effective ways to increase the strength of your network’s security is to screen users’ passwords against a list of dictionary passwords and known compromised passwords. Password vulnerabilities remain a major entry point for hackers. Over the last few years, password policy has evolved in significant ways. NIST password guidelines now indicate that using a password blacklist …