Insights from IBM’s 2024 Cost of a Data Breach Report

The cost of a data breach has reached alarming levels. The global average spiked to $4.88 million, a 10% increase over the previous year ...

NYDFS Cybersecurity Regulation: Automated Blocking of Commonly Used Passwords

NYDFS introduced its 2nd amended Cybersecurity Regulation. One requirement is the automated blocking of commonly used passwords ...
ADLite Report

Transforming How MSPs, MSSPs and VARs Protect their Customers

Exposed credentials continue to be a leading cause of data breaches, making it imperative for organizations to revamp their defenses against this type of threat. Active Directory is particularly appealing to attackers; ...

Protect Active Directory Better

Keeping Active Directory out of Hackers’ Cross-Hairs Active Directory is a prime target for threat actors and companies must act now to eliminate it as a threat vector. Here’s why, and how ...
audit passwords AD Lite

Audit Passwords in Your Environment

Scanning for security gaps in Active Directory is an essential step in mitigating the risk of a potential breach. Run a password audit. The post Audit Passwords in Your Environment appeared first ...
451 password authentication

Businesses Need to Revisit Password Policies

Passwords are not going anywhere due to their simplicity and cost. Industries rely on passwords to provide clients and customers access. The post Businesses Need to Revisit Password Policies appeared first on ...

Enzoic Expands Automated Credentials Monitoring in Active Directory

Solution Now Continuously Screens for Both Unsafe Passwords and Compromised Full Credentials Reducing the Risk of a Cyberattack Boulder, CO – March 2, 2022 – Enzoic, a leading provider of compromised credential ...

One Size Does Not Fit All

How Small and Mid-Sized Businesses are Faring in the Cybersecurity Landscape When threat actors are on the prowl for lucrative plans, they search for many types of data. Some focus on bank ...

Blocking Basic Dictionary Words is not Enough

For many organizations, password security comes down to simply implementing blocks on basic dictionary words from being used in the creation of a user’s password. This is not an effective way to ...

Top Five Digital Tips for Thriving in the New Normal

Reports, op-eds, and documentaries point out that many 2020 pandemic-prompted changes are likely here to stay. From contactless takeout food delivery to the widespread adoption of virtual meetings, the disruption of COVID ...

Application Security Check Up