Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Cybersecurity

LastPass taps Enzoic for Dark Web Monitoring

Enzoic’s Dark Web Monitoring services are now being embedded into the new LastPass Security Dashboard. Read about what the new capabilities provide.

Read More

, ,

From Stolen Credentials to Full Network Compromise

How hackers are actually using exposed passwords to infiltrate Active Directory? Stolen credentials are often what the attackers use to compromise networks.

Read More

, ,

Digital Home Security

The number of people working from home has dramatically increased and this trend has spanned most major sectors of industry and it’s happened fast.

Read More

,

Tips for Protecting Your Password and Personal Data

A list of steps you can take and activities you should avoid for protecting your password & personal data. Get the "do nots" and "dos" of cybersecurity.

Read More

,

Credential Vulnerabilities Most Likely Breach Culprit: Verizon DBIR

Over 80% of hacking-related breaches involved the use of lost or stolen credentials. We analyzed the findings and uncovered some additional data points.

Read More

CISO Survival Guide: Balancing Digital Transformation and Security

Digital transformation is the largest driver of new technology projects. How do you balance digital transformation and security? Read these tips!

Read More

,

Need Help Auditing for Compromised Passwords?

A free password audit solution, Enzoic for Active Directory Lite, helps organizations quantify their risk from unsafe passwords in just a few minutes.

Read More

,

8 Scary Statistics about the Password Reuse Problem

Passwords remain a source of many cybersecurity vulnerabilities. Here are some statistics that show the magnitude of the password reuse problem.

Read More

Gone Phishing: Coronavirus Scams in Action

Scammers are leveraging the COVID-19 pandemic to steal your money or your personal information. Here are some highlights of prominent examples.

Read More