Continuous Password Protection
Insights from IBM’s 2024 Cost of a Data Breach Report
The cost of a data breach has reached alarming levels. The global average spiked to $4.88 million, a 10% increase over the previous year ...
NYDFS Cybersecurity Regulation: Automated Blocking of Commonly Used Passwords
NYDFS introduced its 2nd amended Cybersecurity Regulation. One requirement is the automated blocking of commonly used passwords ...
Transforming How MSPs, MSSPs and VARs Protect their Customers
Exposed credentials continue to be a leading cause of data breaches, making it imperative for organizations to revamp their defenses against this type of threat. Active Directory is particularly appealing to attackers; ...
Protect Active Directory Better
Keeping Active Directory out of Hackers’ Cross-Hairs Active Directory is a prime target for threat actors and companies must act now to eliminate it as a threat vector. Here’s why, and how ...
Audit Passwords in Your Environment
Scanning for security gaps in Active Directory is an essential step in mitigating the risk of a potential breach. Run a password audit. The post Audit Passwords in Your Environment appeared first ...
Businesses Need to Revisit Password Policies
Passwords are not going anywhere due to their simplicity and cost. Industries rely on passwords to provide clients and customers access. The post Businesses Need to Revisit Password Policies appeared first on ...
Enzoic Expands Automated Credentials Monitoring in Active Directory
Solution Now Continuously Screens for Both Unsafe Passwords and Compromised Full Credentials Reducing the Risk of a Cyberattack Boulder, CO – March 2, 2022 – Enzoic, a leading provider of compromised credential ...
One Size Does Not Fit All
How Small and Mid-Sized Businesses are Faring in the Cybersecurity Landscape When threat actors are on the prowl for lucrative plans, they search for many types of data. Some focus on bank ...
Blocking Basic Dictionary Words is not Enough
For many organizations, password security comes down to simply implementing blocks on basic dictionary words from being used in the creation of a user’s password. This is not an effective way to ...
Top Five Digital Tips for Thriving in the New Normal
Reports, op-eds, and documentaries point out that many 2020 pandemic-prompted changes are likely here to stay. From contactless takeout food delivery to the widespread adoption of virtual meetings, the disruption of COVID ...