Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Regulation and Compliance

, , ,

NIST 800-171: Change of Characters in Passwords

NIST 800-171 guidelines say to enforce minimum password complexity and change of characters when new passwords are created. Here is how you can do it!

Read More

, , ,

Automate Password Policy & NIST Password Guidelines

Enable a quick-to-deploy, automated password policy and daily exposed password screening. Follow NIST password guidelines in Active Directory. Here is how!

Read More

, , ,

What the NIST Privacy Framework Means for Password Policy

Learn about the pivotal role of the NIST Privacy Framework. Fortify organizational privacy protocols and mitigate security risks effectively.

Read More

, ,

Are PSD2 SCA Options Too Narrow in Scope?

On 09/14, PSD2 SCA requirements were introduced in the EU. It will help protect customers but why did they not consider lower-customer-friction options?

Read More

,

New Jersey Data Breach Notification Law

As of Sept 1st, 2019, businesses based in New Jersey are now required to notify impacted users of online account information exposed in a data breach.

Read More

,

GDPR Password Policy: Critical Components

Many businesses are still troubled by GDPR compliance and are confused about how the regulation applies to password policy.

Read More

, ,

Eliminating the Burden of Periodic Password Reset

NIST 800-63b password guidelines can improve user's experience with passwords, including the guideline to stop forcing periodic password resets for users.

Read More

, , , ,

A Guide to Law Firm Cybersecurity Risks & Ethical Compliance

Law firms are frequently targeted by hackers but the ABA's Formal Opinion 483 will guide law firm cybersecurity policy to protect firms and their clients.

Read More

, ,

What’s behind PCI’s New MFA Requirements?

Many have implemented MFA ahead of the new PCI requirement. Let's look at PCI's multi-factor implementation guidance that highlights some considerations, particularly around passwords that may otherwise be overlooked.

Read More