Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Cybersecurity

, , ,

The Exploitation of Privileged Accounts 

The flow of data breaches and ransomware attacks are relentless. Read the four most common ways attackers compromise privileged accounts.

Read More

How Data and Analytics Can Assist with Cybersecurity

Cybersecurity is a field where a vast amount of data is ready to be queried. The data must be properly mined to deliver on its promise.

Read More

,

Back to School Means More Cyber Concerns

Cyberattacks continue to rise, threatening the educational sector. Read why educational institutions being targeted and what to do.

Read More

,

How Stolen Credentials and Ransomware are a Simultaneous Threat

Stolen credentials remain the Achilles’ heel of the threat landscape. Defending against them must be prioritized in every security posture.

Read More

, , ,

Bolstering AD Password Policies

To defend against many types of attacks (brute force, credential stuffing & password spraying), AD password policies need to be bolstered.

Read More

,

How Weak Passwords Lead to Ransomware Attacks

Prevent ransomware attacks by building layers of defense into your cybersecurity strategy to mitigate the fallout of an infiltration.

Read More

, , , ,

Back to Basics: IDSA Trends in 2022 are all about Preventable Cyber Incidents

DSA report reveals that 96% of respondents think they could have prevented a breach by focusing on identity security.

Read More

, , ,

Active Directory is an Active Vulnerability 

Breaches and malware attacks are frequently increasing, but organizations that use Active Directory are failing to bolster their security.

Read More

, , ,

The Biggest Takeaway from the 2022 Verizon DBIR

DBIR: Compromised credentials are a main area of concern. The impact grows as both ransomware and supply chain attacks impact every industry.

Read More