Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

,

Tips for Protecting Your Password and Personal Data

A list of steps you can take and activities you should avoid for protecting your password & personal data. Get the "do nots" and "dos" of cybersecurity.

Read More

,

The Updated Do’s and Don’ts of Password Security

The new Do’s and Don’ts for password policies. Organizational online security can be immediately improved by the implementation of a few key principles.

Read More

,

Credential Vulnerabilities Most Likely Breach Culprit: Verizon DBIR

Over 80% of hacking-related breaches involved the use of lost or stolen credentials. We analyzed the findings and uncovered some additional data points.

Read More

,

The Threat of Compromised Passwords

Compromised passwords are considered one of the weakest elements in cybersecurity. Why they are such a threat? What can organizations can do about them?

Read More

,

Questions to Ask Compromised Password Monitoring Vendors

Active Directory password monitoring can help mitigate ATO, but some vendors can introduce risk. Here are 20 questions to ask password monitoring vendors.

Read More

Passwords in the Age of IoT

Passwords & IoT: While the IoT brings a number of efficiencies and conveniences, it also can represent a security vulnerability. Here are some tips!

Read More

The New DIBBS Password Format Explained

This is a brief summary of the new DIBBS (DLA Internet Bid Board System) password format changes and the rationale behind some of these changes.

Read More

CISO Survival Guide: Balancing Digital Transformation and Security

Digital transformation is the largest driver of new technology projects. How do you balance digital transformation and security? Read these tips!

Read More

Hashing: What You Need to Know About Storing Passwords

Password hashing adds a layer of security making it more costly to the hacker who just compromised the server that holds user passwords.

Read More