The Biggest Takeaway from the 2022 Verizon DBIR

The annual Verizon Data Breach Investigations Report (DBIR) contains several useful security insights. Reflecting on another year where cybersecurity attacks have frequently starred in news headlines, the 2022 DBIR confirms a lot of what professionals already know: cyber attacks continue to increase in frequency, and organizations of all sizes need to bolster their defensive postures in order to stay safe.  …

username & password

Username & Password Pairs: Why Banning Just Passwords Isn’t Enough

Password blacklists are receiving considerable attention. It’s clear why: weak and compromised passwords are a factor in nearly all hacking-related cybersecurity breaches. Best practices from NIST require organizations to disallow the use of any common and compromised passwords. And several cyber security companies offer password blacklists for this purpose. But authentication requires a username and password combination, so shouldn’t we …

Identity Management

West-Mark Partnership with Enzoic Wins Award For  “Identity Management Project of the Year – SMB” 

Identity Defined Security Alliance’s “Identity Management Project of the Year – SMB” recognized Enzoic’s customer West-Mark for the results of an initiative that eliminated compromised credentials from their environment. West-Mark, an ISO 9001 certified manufacturer of trucks and trailers, is an essential supplier for the US Department of Defense and the United States military. However, their high-stakes position in the …

white house

A White House Cybersecurity Document Provides Guidance for All Industries

As tensions between the US and Russia escalate, organizations need to act fast to shore up digital defenses     In a just-released briefing from the White House, titled “Act Now to Protect Against Potential Cyberattacks,” authorities urged government facilities, healthcare organizations, and companies of all types, to lock down their digital systems–urgently. Intelligence indicates that Russia may be exploring …

full credentials

Enzoic Expands Automated Credentials Monitoring in Active Directory

Solution Now Continuously Screens for Both Unsafe Passwords and Compromised Full Credentials Reducing the Risk of a Cyberattack Boulder, CO – March 2, 2022 – Enzoic, a leading provider of compromised credential screening solutions, today released the latest version of Enzoic for Active Directory. The solution prevents users from choosing weak or previously exposed passwords by screening them at their …

healthcare industry HIMSS

Threats to the Healthcare Industry

Budget limitations, phishing attacks, and ransomware continue to threaten the healthcare industry, according to the 2021 HIMSS report  The 2021 HIMSS Healthcare Cybersecurity Survey provides insight into the state of healthcare cybersecurity. This year, the report may serve as a chance for IT teams to inform their organizations that they are still in need of a cybersecurity overhaul.  Too Many …

data privacy day

Data Privacy Day: Five Defensive Strategies for Businesses

Data Privacy Day is a chance for businesses to engage with their customers and clients in a way that builds trust, inspires customer loyalty, and enhances the business’s reputation.  When an organization demonstrates that they care about protecting consumers’ privacy–they are in effect letting clients know that their information, data, and choices are safe with the business.   In 2022, this …

honeypot

Cutting-Edge Threat Intelligence with Honeypot Networks and Integrative Data Systems

Cybersecurity intelligence is only as valuable as the actions it allows you to take. Especially in the realm of prevention, fast analysis and notification is critical. It’s no secret to threat actors; they know that as soon as data is available or a vulnerability is identified, the window of opportunity for exploitation is closing.  As many cybersecurity professionals can confirm, …