Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Cybersecurity

,

How Stolen Credentials and Ransomware are a Simultaneous Threat

Stolen credentials remain the Achilles’ heel of the threat landscape. Defending against them must be prioritized in every security posture.

Read More

, , ,

Bolstering AD Password Policies

To defend against many types of attacks (brute force, credential stuffing & password spraying), AD password policies need to be bolstered.

Read More

,

How Weak Passwords Lead to Ransomware Attacks

Prevent ransomware attacks by building layers of defense into your cybersecurity strategy to mitigate the fallout of an infiltration.

Read More

, , , ,

Back to Basics: IDSA Trends in 2022 are all about Preventable Cyber Incidents

DSA report reveals that 96% of respondents think they could have prevented a breach by focusing on identity security.

Read More

, , ,

Active Directory is an Active Vulnerability 

Breaches and malware attacks are frequently increasing, but organizations that use Active Directory are failing to bolster their security.

Read More

, , ,

The Biggest Takeaway from the 2022 Verizon DBIR

DBIR: Compromised credentials are a main area of concern. The impact grows as both ransomware and supply chain attacks impact every industry.

Read More

, , , ,

Username and Password Pairs

Screen against compromised username & password pairs since compromised passwords are in nearly all hacking-related cybersecurity breaches

Read More

, ,

Intuitive ATO Protection

Intuitive ATO Protection starts by eliminating the reuse of compromised credentials on your site, to prevent credential stuffing, account takeover & fraud.

Read More

, , ,

Credential Stuffing Explained

Credential stuffing is a cybercrime technique where an attacker uses automated scripts to try each credential against a target web site.

Read More