IDSA report reveals that 96% of respondents think they could have prevented a breach by focusing on identity security The Identity Defined Security Alliance (IDSA), a nonprofit that helps organizations reduce risk by providing education and best practices, just released a report on current trends in the state of identity management. The research provides insight on how over 500 contemporary …
The Biggest Takeaway from the 2022 Verizon DBIR
The annual Verizon Data Breach Investigations Report (DBIR) contains several useful security insights. Reflecting on another year where cybersecurity attacks have frequently starred in news headlines, the 2022 DBIR confirms a lot of what professionals already know: cyber attacks continue to increase in frequency, and organizations of all sizes need to bolster their defensive postures in order to stay safe. …
Username & Password Pairs: Why Banning Just Passwords Isn’t Enough
Password blacklists are receiving considerable attention. It’s clear why: weak and compromised passwords are a factor in nearly all hacking-related cybersecurity breaches. Best practices from NIST require organizations to disallow the use of any common and compromised passwords. And several cyber security companies offer password blacklists for this purpose. But authentication requires a username and password combination, so shouldn’t we …
West-Mark Partnership with Enzoic Wins Award For “Identity Management Project of the Year – SMB”
Identity Defined Security Alliance’s “Identity Management Project of the Year – SMB” recognized Enzoic’s customer West-Mark for the results of an initiative that eliminated compromised credentials from their environment. West-Mark, an ISO 9001 certified manufacturer of trucks and trailers, is an essential supplier for the US Department of Defense and the United States military. However, their high-stakes position in the …
A White House Cybersecurity Document Provides Guidance for All Industries
As tensions between the US and Russia escalate, organizations need to act fast to shore up digital defenses In a just-released briefing from the White House, titled “Act Now to Protect Against Potential Cyberattacks,” authorities urged government facilities, healthcare organizations, and companies of all types, to lock down their digital systems–urgently. Intelligence indicates that Russia may be exploring …
Enzoic Expands Automated Credentials Monitoring in Active Directory
Solution Now Continuously Screens for Both Unsafe Passwords and Compromised Full Credentials Reducing the Risk of a Cyberattack Boulder, CO – March 2, 2022 – Enzoic, a leading provider of compromised credential screening solutions, today released the latest version of Enzoic for Active Directory. The solution prevents users from choosing weak or previously exposed passwords by screening them at their …
Threats to the Healthcare Industry
Budget limitations, phishing attacks, and ransomware continue to threaten the healthcare industry, according to the 2021 HIMSS report The 2021 HIMSS Healthcare Cybersecurity Survey provides insight into the state of healthcare cybersecurity. This year, the report may serve as a chance for IT teams to inform their organizations that they are still in need of a cybersecurity overhaul. Too Many …
Businesses Have an Important Part to Play in Building a Safer Internet
How your company can protect users, clients, and your own networks this Safer Internet Day This year, Safer Internet Day (this Tuesday, February 8th) is a chance to check in with your current practices and tighten up your defenses for 2022. The theme for Safer Internet Day 2022 is “Together for a better internet”. This is a great perspective to …
Data Privacy Day: Five Defensive Strategies for Businesses
Data Privacy Day is a chance for businesses to engage with their customers and clients in a way that builds trust, inspires customer loyalty, and enhances the business’s reputation. When an organization demonstrates that they care about protecting consumers’ privacy–they are in effect letting clients know that their information, data, and choices are safe with the business. In 2022, this …
Cutting-Edge Threat Intelligence with Honeypot Networks and Integrative Data Systems
Cybersecurity intelligence is only as valuable as the actions it allows you to take. Especially in the realm of prevention, fast analysis and notification is critical. It’s no secret to threat actors; they know that as soon as data is available or a vulnerability is identified, the window of opportunity for exploitation is closing. As many cybersecurity professionals can confirm, …