Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Cybersecurity

,

Credential Vulnerabilities Most Likely Breach Culprit: Verizon DBIR

Over 80% of hacking-related breaches involved the use of lost or stolen credentials. We analyzed the findings and uncovered some additional data points.

Read More

CISO Survival Guide: Balancing Digital Transformation and Security

Digital transformation is the largest driver of new technology projects. How do you balance digital transformation and security? Read these tips!

Read More

,

Auditing for Compromised Passwords

A free password audit solution, Enzoic for Active Directory Lite, helps organizations quantify their risk from unsafe passwords in just a few minutes.

Read More

,

8 Scary Statistics about the Password Reuse Problem

Passwords remain a source of many cybersecurity vulnerabilities. Here are some statistics that show the magnitude of the password reuse problem.

Read More

Gone Phishing: Coronavirus Scams in Action

Scammers are leveraging the COVID-19 pandemic to steal your money or your personal information. Here are some highlights of prominent examples.

Read More

, ,

Cybersecurity During a Pandemic – And What You Can Do To Keep Employees Safe

Educating employees on the threat the pandemic may pose to their personal data. Here are tips to help them keep this information safe.

Read More

, , ,

Specialized Threat Intelligence: Breach Data to Defensive Solution

To provide the most effective defense, our compromised credential database is continuously updated to defend against credential stuffing attacks

Read More

, , ,

Privacy Regulation in a Connected IoT World

Privacy Regulation in a Connected World: New California legislation is a1st step for privacy regulation; but IoT regulation should be expanded. Here is why.

Read More

Pwned Passwords: The Epicenter of Your Cybersecurity Storm

Pwned Passwords + Password Reuse = Perfect Storm. Because of password reuse, exposed passwords are a threat to every org. Learn how to mitigate that threat.

Read More