NIST Password Guidelines
How to Solve the Password Problem
Enzoic | | Active Directory, all posts, brute-force attack, Cybersecurity, dbir, NIST Password Guidelines, Password Policy, Password Security, password spraying, Password Tips
An Overhaul in Password Security Passwords aren’t going anywhere. Despite the buzz that biometrics and MFA are holistic solutions, passwords are a ubiquitous, crucial layer for authentication—and they’re low-cost and simple, too. That’s ...
Password Reuse is Putting MSP’s at Risk
Enzoic | | all posts, compromised credentials, cyber hygiene, MSPs, NIST Password Guidelines, Password Security, Password Tips
Password hygiene is a huge priority for Managed Service Providers Every organization is at risk for cyber attack, but MSPs have emerged as a top target. This is because threat actors can ...
Bolstering AD Password Policies
Enzoic | | Active Directory, Active Directory passwords, all posts, Cybersecurity, NIST Password Guidelines, Password Policy, Password Security, Periodic Password Resets
Presets Aren’t Enough Let’s keep things real: passwords aren’t going anywhere. And with continued—and increasing—ransomware attacks and data breaches popping up everywhere, an organization’s password policies are crucial to its digital security ...
The Latest Password Security Methods
Enzoic | | all posts, Common Passwords, compromised credentials, Compromised Password Screening, Cybersecurity, Data breaches, MFA, NIST 800-63, NIST 800-63b, NIST Password Guidelines, password reuse, Password Security, Password Tips
Password authentication isn’t going anywhere anytime soon. It’s part of our culture, users and employees are accustomed to it, and many systems depend on the “what you know” layer. Newer technologies like ...
Busting the Myths Surrounding Password-Based Security
Enzoic | | all posts, brute-force attack, Cracking Dictionaries, Cybersecurity, cybersecurity solution, Data breaches, Forced Periodic Password Resets, MFA, NIST Password Guidelines, password cracking, Password Security, Strong Authentication
People have been relying on password-based security for millennia. The Roman military reportedly used what they called “watchwords” to identify soldiers on patrol. Exclusive groups and guilds used secret passwords to prove ...
From NIST Guidelines to Real-World Solutions?
There is no evidence to suggest that data breaches will become less frequent or less serious in 2021. In fact, as more of the population now works from how the risks are ...
Password Blacklists: Applying the Goldilocks Principle
Enzoic | | NIST 800-63, NIST Password Guidelines, Password Blacklists, password cracking, Password Tips
One of the most effective ways to increase the strength of your network’s security is to screen users’ passwords against a list of dictionary passwords and known compromised passwords. Password vulnerabilities remain ...
From Stolen Credentials to Full Network Compromise
Enzoic | | compromised credentials, Cybersecurity, Data breaches, NIST 800-63, NIST Password Guidelines, passwords, SMB Cybersecurity
How Hackers Are Actually Using Exposed Passwords to Infiltrate Active Directory Recent reports like the Verizon DBIR have noted that stolen credentials are often the foothold that attackers use to compromise networks ...
Response Required
Enzoic | | Active Directory, compromised credentials, Continuous Password Protection, NIST 800-63, NIST Password Guidelines, Password Security, passwords, Strong Authentication
Why organizations need to react urgently to the state of password security, according to data from 451 Research In a recent brief titled “Love ‘em or Hate ‘em, Passwords Are Here to ...
A Brief Summary of NIST Password Guidelines
National Institute of Standards and Technology (NIST) has been substantially revising its password guidelines since 2017. Previous recommendations have been changed, including combining symbols, letters, and numeric to create complex passwords; changing ...