Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Password Tips

, ,

Findings on Exposed Passwords in Active Directory

Password security and exposed passwords in Active Directory still matter because weak and compromised passwords lead to data breaches.

Read More

, , , , ,

What is Session Hijacking?

Session hijacking is a prevalent and dangerous attack method to illicitly gain access and then take control of user accounts and systems.

Read More

, , , , ,

What Makes a Password Weak or Strong?

The crucial differences between weak and strong passwords. We will also provide practical tips on how to bolster your online security.

Read More

, , , , ,

How MSPs and Resellers Should Approach Cybersecurity

What are the threats facing credential security? How partners can take steps to prevent their clients from falling victim to them?

Read More

, ,

5 Tips for Securing Your Active Directory

As enterprises move to the cloud or a hybrid environment, it’s easy to neglect updates, patches, and evolving password policies.

Read More

, , ,

Don’t Forget About Credential Security in Active Directory

Active Directory is a rich repository of data like financial information, addresses, and other PII. It is exactly what many cybercriminals are after.

Read More

, , ,

Super Bowl of Passwords: Chiefs vs. 49ers in the Battle of Cybersecurity

Sports-related passwords are pretty common. With Super Bowl LVIII around the corner, check out the most common 49ers and Chiefs passwords.

Read More

, ,

Taylor Swift’s Influence on Cybersecurity

Taylor Swift inadvertently influenced the world of authentication. Here are the top 10 most common Taylor Swift passwords.

Read More