Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Data Breaches

, , ,

Protecting PII in an Increasingly Connected World

Sensitive personal information is highly sought after by cybercriminals. As identity theft incidents continue to rise, organizations need effective solutions to protect PII.

Read More

, ,

Insider Threats are Accelerating Faster Than Our Defenses

Insider attacks are on the rise, negatively impacting data security, business operations, brand image, revenue growth, and more.

Read More

, , , ,

Audit Passwords in Your Environment

Scanning for security gaps in Active Directory is an essential step in mitigating the risk of a potential breach. Run a password audit.

Read More

, ,

Criminal Uses for ChatGPT: A Versatile New Tool for Hackers

ChatGPT has captured our attention and sparked much debate, but has it also become a useful tool in the hands of cybercriminals?

Read More

, , ,

Identity Management Best Practices

Identity Management Day is a great chance to seek out new ways we can reduce the impact of threat actors, and secure our digital identities.

Read More

, , , ,

Businesses Need to Revisit Password Policies

Passwords are not going anywhere due to their simplicity and cost. Industries rely on passwords to provide clients and customers access.

Read More

, ,

ATO Attacks: What Organizations Need to Know

Attackers can use compromised credentials to gain unauthorized access to an organization's information, leading to ATO attacks.

Read More

,

Five Cyber Trends to Watch For

Over the last few years, the digital landscape has been threatened, and violently disrupted, by cyberattacks. Here are 5 trends to consider.

Read More

, ,

4 Reasons Why Data Breaches Keep Happening to Organizations

Data breaches have become more frequent and destructive. Why are organizations repeatedly falling victim? It spans everything from common user habits to stolen device use.

Read More