Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Account Takeover

, , , ,

CISA Warns of Compromised Microsoft Accounts

The directive is known as Emergency Directive 24-02 addresses the risk of compromised Microsoft accounts for federal agencies & corporations.

Read More

, , , , ,

What is Session Hijacking?

Session hijacking is a prevalent and dangerous attack method to illicitly gain access and then take control of user accounts and systems.

Read More

, , , , ,

What Makes a Password Weak or Strong?

The crucial differences between weak and strong passwords. We will also provide practical tips on how to bolster your online security.

Read More

, , , ,

Debunking MFA Myths: How to Stay Secure

MFA is not invincible. The persistence of compromised credentials as an entry vector for data breaches is a testament to this vulnerability.

Read More

, , , , ,

Insights from 2023’s Cost of a Data Breach Report

The average cost of a data breach in 2023 jumped to $4.45 million, marking a 15% increase over the past three years according to IBM's report.

Read More

, , , ,

A Guide to GDPR Compliance

Ensure GDPR Compliance and Protect Your Organization from Costly Penalties. Learn the key steps to take when handling EU citizens' data in the event of a data breach.

Read More

, ,

ATO Attacks: What Organizations Need to Know

Attackers can use compromised credentials to gain unauthorized access to an organization's information, leading to ATO attacks.

Read More

, , , ,

Back to Basics: IDSA Trends in 2022 are all about Preventable Cyber Incidents

DSA report reveals that 96% of respondents think they could have prevented a breach by focusing on identity security.

Read More

, , ,

The Biggest Takeaway from the 2022 Verizon DBIR

DBIR: Compromised credentials are a main area of concern. The impact grows as both ransomware and supply chain attacks impact every industry.

Read More