Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Cybersecurity

, ,

Account Takeover Defined

Account Takeover (known as ATO) is a type of identity theft where a bad actor gains unauthorized access to an online account belonging to someone else.

Read More

, , , ,

Corporate Account Takeover: What It Is, and What To Do

Corporate Account Takeover (CATO) is an organization-specific identity theft where cybercriminals steal employee passwords to gain access.

Read More

, ,

Data Breaches are a Cumulative Threat

the frequency of data breaches has climbed, along with the number of users impacted. Read why being in multiple breaches matter.

Read More

, ,

Should Your Business Prevent Leetspeak in Passwords?

What is leetspeak and how it leaves businesses vulnerable to attack. Start screening for common and compromised passwords.

Read More

, , ,

Tackling Cybersecurity Vulnerabilities in School Systems  

School IT leaders are facing a number of cybersecurity challenges that have emerged as education becomes more connected.

Read More

,

West-Mark Partnership with Enzoic Wins Award For  “Identity Management Project of the Year – SMB” 

Identity Defined Security Alliance’s recognized Enzoic’s customer West-Mark for eliminating compromised credentials.

Read More

, ,

Time to Lock Down Identity Management Strategies

Identity Management Day is a chance to bring information about identity management to organizations. Here are updated best practices.

Read More

, ,

Cybersecurity Challenges in Supply Chain Logistics

Supply chain issues have established themselves regularly in the headlines. Ocean freight shipping has fallen victim to several cyberattacks.

Read More

, , ,

A White House Cybersecurity Document

As tensions between the US and Russia escalate, organizations need to act fast to shore up digital defenses.

Read More