honeypot

Cutting-Edge Threat Intelligence with Honeypot Networks and Integrative Data Systems

Cybersecurity intelligence is only as valuable as the actions it allows you to take. Especially in the realm of prevention, fast analysis and notification is critical. It’s no secret to threat actors; they know that as soon as data is available or a vulnerability is identified, the window of opportunity for exploitation is closing.  As many cybersecurity professionals can confirm, …

Trends 2022

Top Cybersecurity Issues to Watch Out For in 2022

One of the most challenging aspects of cybersecurity is preparedness. With technology, user habits, and attack styles changing over the past few years and showing no sign of slowing down, cyberattacks seem like a never-ending onslaught. As we start 2022, organizations need to do their best and prepare for future incidents. Auditing and evaluating the state of their internal security …

Keizer Cybersecurity

The City of Keizer Enhances Cybersecurity by Eliminating Compromised Passwords

The City of Keizer is a beautiful community in the Willamette Valley of Oregon. The city offers an ideal environment, delivering a range of services to citizens, from parks and public works to police protection. However, even from its earliest days, there have been hazards to overcome. As a settlement in the 1800s, floods forced the community to rebuild on …

westmark

How Enzoic is helping West-Mark comply with NIST

West-Mark is an ISO 9001 certified manufacturer of trucks and trailers based in the western United States. Their high-quality manufacturing process helped them become an essential supplier for the US Department of Defense and the United States military. However, being in this part of the nation’s supply chain makes West-Mark a potential target for cybercriminals. To manage the risk, West-Mark …

SMB

One Size Does Not Fit All

How Small and Mid-Sized Businesses are Faring in the Cybersecurity Landscape When threat actors are on the prowl for lucrative plans, they search for many types of data. Some focus on bank details or credit card numbers, while others zero in on medical information or other personal details. But according to the Verizon Data Breach Investigations Report (DBIR), credentials—typically pairs …

password security

The Latest Password Security Methods

Password authentication isn’t going anywhere anytime soon. It’s part of our culture, users and employees are accustomed to it, and many systems depend on the “what you know” layer. Newer technologies like biometrics might work in certain situations, but they won’t replace passwords altogether anytime soon. In our series on password security, we’ve talked about some worrying trends, the myths …

paso robles

The City of Paso Robles Taps Enzoic for Password Peace of Mind

The City of Paso Robles, located in San Luis Obispo County, California, is famous for its award-winning wines and relaxed atmosphere. As such, it’s no surprise that the City is a popular tourist destination, with Paso Robles included in Travel and Leisure magazine’s “25 Top Places to Visit for the Holidays” in 2015 and 2016. Located halfway between San Francisco …

password based security myths

Busting the Myths Surrounding Password-Based Security

People have been relying on password-based security for millennia. The Roman military reportedly used what they called “watchwords” to identify soldiers on patrol. Exclusive groups and guilds used secret passwords to prove membership. The phrase “open sesame” protected hidden treasure in the story of Ali Baba and the Forty Thieves. In more recent times, the world’s first computer passwords were installed …