Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

, , ,

How Entra Password Protection Identifies a “Bad” Password

Relying on Microsoft’s Entra Password Protection feature to keep weak and compromised passwords out can leave your users and data at risk.

Read More

, , ,

Digital Spring Cleaning: Tips for a More Secure Active Directory

One of the most critical aspects of digital spring cleaning is to tidy up your password hygiene to prevent unauthorized access to accounts and sensitive data in your environment. Here are several steps for organizations.

Read More

,

Five Cyber Trends to Watch For

Over the last few years, the digital landscape has been threatened, and violently disrupted, by cyberattacks. Here are 5 trends to consider.

Read More

, ,

3 Things Businesses Need to Know About Safely Employing Contractors

Many organizations are turning to consultants and external groups for help, but this approach can be risky for an organization's security. Here are 3 steps to mitigate risk.

Read More

, ,

4 Reasons Why Data Breaches Keep Happening to Organizations

Data breaches have become more frequent and destructive. Why are organizations repeatedly falling victim? It spans everything from common user habits to stolen device use.

Read More

CRA Cybersecurity Year in Review Report

The 2022 Cybersecurity Year in Review Report from CRA covers seven categories. Read about some broad patterns that emerged.

Read More

, ,

Safer Internet Day 2023: Four Priorities

For Safer Internet Day, reflect on the biggest changes and refocus your efforts on how businesses can make the internet a safer place. Here are four categories to tune into this year.

Read More

,

Four Tips for Companies During Data Privacy Week

Data Privacy Week: help citizens understand they can manage their data & help organizations understand the importance to respect users’ data.

Read More

, , , ,

Why You Need Continuous Password Monitoring for True Protection

Some free password policy tools out there tout password protection without actively monitoring if user credentials become compromised.

Read More