Enzoic

A Tale of Two Password Protection Approaches

Static Vs. Dynamic Hardly a day goes by without news of passwords being exposed in a third-party data breach. Once…

3 months ago

Enzoic Wins Colorado Companies to Watch 2020

Out of nearly a thousand nominated companies, Enzoic was recently named a winner of the 2020 Colorado Companies to Watch…

3 months ago

The Skinny on Password Attacks

Thousands of Canadian citizens are at risk of identity fraud after cybercriminals used stolen credentials to access government services including…

4 months ago

Good, Better, Best: Using Multi-factor Authentication Effectively

Multi-factor authentication (MFA) is useful, but not a failsafe strategy for user authentication. The purpose of identity and access management…

4 months ago

LastPass taps Enzoic for Dark Web Monitoring

Enzoic’s Dark Web Monitoring services are now being embedded into the new LastPass Security Dashboard. The new capabilities provide early…

5 months ago

From Stolen Credentials to Full Network Compromise

How Hackers Are Actually Using Exposed Passwords to Infiltrate Active Directory Recent reports like the Verizon DBIR have noted that…

5 months ago

Trusting Passwords: Best Practices for Threat-Proofing Credentials

“Open, Sesame!”Upon reflection it’s easy to see that passwords have an incredibly long history: from shibboleths to military codes, they’ve…

5 months ago

Response Required

Why organizations need to react urgently to the state of password security, according to data from 451 Research In a…

6 months ago

Tips for Protecting Your Password and Personal Data

This list is a combination of proactive steps you can take, as well as activities you should avoid for protecting…

6 months ago

The Threat of Compromised Passwords

Over time passwords have become a ubiquitous part of our digital activities. They’re something we expect to create and manage…

6 months ago