Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Data Breaches

, , ,

Unchanging Undercurrents in the 2023 Verizon DBIR

The 2023 Verizon DBIR reveals that stolen credentials topped the list of nefarious activities by cybercriminals. Read how organizations can stay one step ahead of cybercriminals.

Read More

, ,

Twin to Win: Security Pros and Cons of Digital Twins

Digital twins have become an increasingly popular technology. However, potential security concerns need to be addressed sooner rather than later.

Read More

, , ,

Protecting Personally Identifiable Information in an Increasingly Connected World

Sensitive personal information is highly sought after by cybercriminals. As identity theft incidents continue to rise, organizations need effective solutions to protect PII.

Read More

, ,

Insider Threats are Accelerating Faster Than Our Defenses

Insider attacks are on the rise, negatively impacting data security, business operations, brand image, revenue growth, and more.

Read More

, , , ,

Audit Passwords in Your Environment

Scanning for security gaps in Active Directory is an essential step in mitigating the risk of a potential breach. Run a password audit.

Read More

, ,

Criminal Uses for ChatGPT: A Versatile New Tool for Hackers

ChatGPT has captured our attention and sparked much debate, but has it also become a useful tool in the hands of cybercriminals?

Read More

, , ,

*Updated!* Best Practices for Identity Management in 2023  

Identity Management Day is a great chance to seek out new ways we can reduce the impact of threat actors, and secure our digital identities.

Read More

, , , ,

Businesses Need to Revisit Password Policies

Passwords are not going anywhere due to their simplicity and cost. Industries rely on passwords to provide clients and customers access.

Read More

, ,

ATO Attacks: What Organizations Need to Know

Attackers can use compromised credentials to gain unauthorized access to an organization's information, leading to ATO attacks.

Read More