Skip to main content

RESOURCES

Enzoic Blog

Research, news and updates on cybersecurity and fraud

Viewing Password Tips

, ,

11 Ways Employees Can Be Your Weak Link for Cybersecurity

90% of organizations are likely to be attacked/exposed to attacks through an insider threat, often unintentionally. Read on tips on employee cybersecurity.

Read More

,

GDPR Password Policy: Critical Components

Many businesses are still troubled by GDPR compliance and are confused about how the regulation applies to password policy.

Read More

, ,

Eliminating the Burden of Periodic Password Reset

NIST 800-63b password guidelines can improve user's experience with passwords, including the guideline to stop forcing periodic password resets for users.

Read More

,

What’s behind PCI’s New MFA Requirements?

Many have implemented MFA ahead of the new PCI requirement. Let's look at PCI's multi-factor implementation guidance that highlights some considerations, particularly around passwords that may otherwise be overlooked.

Read More

,

The Magician’s Handkerchief of Password Reuse

Recent research, news and updates on threats and cybersecurity.

Read More

,

Massive Equifax Data Breach Puts Consumers at Risk for Identity Theft and Compromised Accounts

With rapid rate of evolution within technology, why are we still using passwords? The answer lies in the simple, positive attributes of passwords that are not found in other authentication methods: affordable, easy to replace, universally compatibility, privacy safe and no false positive. This closer look highlights the gaps in other methods that will make it hard to get past the password.

Read More

,

Can Passwords Really Be Replaced?

With rapid rate of evolution within technology, why are we still using passwords? The answer lies in the simple, positive attributes of passwords that are not found in other authentication methods: affordable, easy to replace, universally compatibility, privacy safe and no false positive. This closer look highlights the gaps in other methods that will make it hard to get past the password.

Read More

,

Looking Closer at NIST Password Guidelines for Checking Compromised Credentials

NIST suggests passwords should be screened against commonly-used, expected, or compromised passwords. This is intended to ensure passwords are not found in common cracking dictionaries that would make them easy to guess. These checks can occur at account creation and password reset. But then what? How do you know if they are still safe after time?

Read More

,

Users Suck at Passwords. Help Them.

How many of your users are using insecure and compromised passwords? You may have a standard password strength meter on your site so you may think that your users have secure passwords. Think again. Password strength meters and password complexity requirements are simply not enough.

Read More