active defense (1)

Developing Active Defense from Password Spraying & Credential Stuffing

Microsoft Active Directory (AD) is ubiquitous across the corporate landscape; you probably use it to authorize access at almost every level. Due to its popularity and importance, AD is a perfect target for cyber attacks. Hackers frequently use password spraying and credential stuffing as attack methods, especially against AD. With many traditional password ‘best practices’ being outdated, are you prepared …

password hack

Pride and Passwords: Top Hacking Methods & How to Prevent Them

Cybersecurity is becoming a pressing issue for IT professionals in all fields. There are headlines every week about data breaches of all sizes and the attacks themselves come from many angles. This article details the password attack methods hackers frequently used against enterprises and provides solutions as to how your business can prevent damage or breaches. 1. Dictionary Attacks A …

The Skinny on Password Attacks

The Skinny on Password Attacks

Thousands of Canadian citizens are at risk of identity fraud after cybercriminals used stolen credentials to access government services including COVID-19 relief funds. The source of the breach was a credential stuffing attack utilizing logins exposed in a prior breach. This is the latest example in a steady stream of data breaches driven by poor password practices. The Verizon DBIR …

Enterprise Security Magazine’s Top 10 Identity and Access Management Solution Providers – 2019

Enzoic Part of Enterprise Security Magazine’s Top 10 Identity and Access Management Solution Providers for 2019

Enzoic is proud to be part of Enterprise Security Magazine’s Top 10 Identity and Access Management Solution Providers for 2019.  Enzoic was selected to be part of this exclusive list because of the uniqueness of the technology along with the low-friction way the product helps prevent account takeover and fraud. In the past decade, over 10 billion records have been …