Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Active Directory

The Rise of Smishing

SMS (or text messaging) phishing scams, known as ‘smishing’ have also proved to be an effective strategy for hackers according to the FCC.

Read More

, ,

The Cost of Password Lockouts

Password lockouts and password resets are a top priority for IT staff as passwords remain the core authentication method for many businesses.

Read More

,

Where Should You Go For Cybersecurity Guidelines?

It’s Cybersecurity Awareness Month. Here are cybersecurity guidelines that apply to all industries. Protect clients, employees and customers.

Read More

, , ,

The Risks Entra Password Protection Ignores: Compromised and Blacklisted

Microsoft’s password protection doesn’t check any available lists of compromised passwords or the vast majority of blacklisted passwords.

Read More

, , ,

How to Solve the Password Problem

Get an explanation of the root causes and potential solutions to the password problem.

Read More

, ,

SANS Analyst Program, “Fighting Back Against Compromised Credentials”

A first look white paper written by the SANS outlines the issues surrounding compromised credentials and preventative measures.

Read More

, , ,

The Exploitation of Privileged Accounts 

The flow of data breaches and ransomware attacks are relentless. Read the four most common ways attackers compromise privileged accounts.

Read More

, , ,

Bolstering AD Password Policies

To defend against many types of attacks (brute force, credential stuffing & password spraying), AD password policies need to be bolstered.

Read More

, , , ,

Back to Basics: IDSA Trends in 2022 are all about Preventable Cyber Incidents

DSA report reveals that 96% of respondents think they could have prevented a breach by focusing on identity security.

Read More