Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

How Weak Passwords Lead to Ransomware Attacks

Prevent ransomware attacks by building layers of defense into your cybersecurity strategy to mitigate the fallout of an infiltration.

Read More

Viewing All Blogs

,

Don’t Brush Off the Toothbrush Story

The toothbrush story serves as an important reminder that IoT devices remain a sought-after hacker target.

Read More

, , ,

Don’t Forget About Credential Security in Active Directory

Active Directory is a rich repository of data like financial information, addresses, and other PII. It is exactly what many cybercriminals are after.

Read More

, , ,

Super Bowl of Passwords: Chiefs vs. 49ers in the Battle of Cybersecurity

Sports-related passwords are pretty common. With Super Bowl LVIII around the corner, check out the most common 49ers and Chiefs passwords.

Read More

, ,

The 2023 Data Breach Report and the 2024 Data Breach Industry Forecast

Key findings from the "2023 Data Breach Report" from ITRC and the "2024 Data Breach Industry Forecast" by Experian.

Read More

, , ,

4 Key Takeaways from the BlackBerry Global Threat Intelligence Report

The BlackBerry Global Threat Intelligence Report covers the ransomware landscape, specific attack patterns & summarizes actionable intelligence.

Read More

, , ,

We’ll See Escalating Threats From the Software Supply Chain

A partnership to help customers in the fight against software supply chain attacks and act at the first sign of compromise.

Read More

, , ,

Enzoic for AD Lite Data Shows Increase in Crucial Risk Factors

The analysis from over 8 million user accounts scanned by Enzoic reveals nearly 15% (1.2MM) of accounts were found to be using unsafe passwords.

Read More

, ,

The Cracks in Microsoft’s Entra ID

Microsoft's Entra ID, previously known as Azure Active Directory Password Protection might not be enough to protect your passwords.

Read More

, ,

Taylor Swift’s Influence on Cybersecurity

Taylor Swift inadvertently influenced the world of authentication. Here are the top 10 most common Taylor Swift passwords.

Read More