Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Data Breaches

, , , ,

Audit Passwords in Your Environment

Scanning for security gaps in Active Directory is an essential step in mitigating the risk of a potential breach. Run a password audit.

Read More

, ,

Criminal Uses for ChatGPT: A Versatile New Tool for Hackers

ChatGPT has captured our attention and sparked much debate, but has it also become a useful tool in the hands of cybercriminals?

Read More

, , ,

Identity Management Best Practices

Identity Management Day is a great chance to seek out new ways we can reduce the impact of threat actors, and secure our digital identities.

Read More

, , , ,

Businesses Need to Revisit Password Policies

Passwords are not going anywhere due to their simplicity and cost. Industries rely on passwords to provide clients and customers access.

Read More

, ,

ATO Attacks: What Organizations Need to Know

Attackers can use compromised credentials to gain unauthorized access to an organization's information, leading to ATO attacks.

Read More

,

Five Cyber Trends to Watch For

Over the last few years, the digital landscape has been threatened, and violently disrupted, by cyberattacks. Here are 5 trends to consider.

Read More

, ,

4 Reasons Why Data Breaches Keep Happening to Organizations

Data breaches have become more frequent and destructive. Why are organizations repeatedly falling victim? It spans everything from common user habits to stolen device use.

Read More

,

Four Tips for Companies During Data Privacy Week

Data Privacy Week: help citizens understand they can manage their data & help organizations understand the importance to respect users’ data.

Read More

,

How Stolen Credentials and Ransomware are a Simultaneous Threat

Stolen credentials remain the Achilles’ heel of the threat landscape. Defending against them must be prioritized in every security posture.

Read More