Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

, ,

Cyberattacks on Municipalities and How to Defend Against Them

Cyberattacks continue to have a massive economic impact on local and state branches of governments across the U.S.

Read More

, ,

How to Strengthen Password Policies to Stay Compliant with GDPR

Why strong password policies are important and looking at some specifics that can be applied to an organization's password policy to help meet GDPR.

Read More

, , , ,

Password Spraying and Credential Stuffing: Developing Active Defense

Hackers frequently use password spraying and credential stuffing as attack methods. Are you prepared to take an active stance of defense?

Read More

, ,

Rules for Effective Password Protection

Eight of the most effective ways for any organization to improve their password protection policies. Adopt good password hygiene practices.

Read More

, , ,

Password Spraying: How Common Passwords Threaten Your Organization

Proactive steps to mitigate password spray attacks and other credential-based attacks to protect your client and employee accounts.

Read More

, ,

Throwing Light on the Dark Web

Read what the dark web really is and how you can prevent compromised credentials from being the downfall of your company.

Read More

, ,

The Cyber Trove of the Healthcare Industry

Each day, healthcare organizations get threat actors banging at their digital doors on a hunt for sensitive information. Get protection.

Read More

, , ,

The Benefits of Specialization in Threat Intelligence Research

Early threat detection and identifying effective procedures to rectify problems are two goals within threat intelligence.

Read More

,

A Chronic Illness: Why the Healthcare Industry Needs an Update

The HIMSS survey data makes a strong case that healthcare organizations should increase budgets for enhancing cybersecurity.

Read More