Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

How Weak Passwords Lead to Ransomware Attacks

Prevent ransomware attacks by building layers of defense into your cybersecurity strategy to mitigate the fallout of an infiltration.

Read More

Viewing All Blogs

, , , ,

CISA Warns of Compromised Microsoft Accounts

The directive is known as Emergency Directive 24-02 addresses the risk of compromised Microsoft accounts for federal agencies & corporations.

Read More

, ,

Findings on Exposed Passwords in Active Directory

Password security and exposed passwords in Active Directory still matter because weak and compromised passwords lead to data breaches.

Read More

, , , , ,

What is Session Hijacking?

Session hijacking is a prevalent and dangerous attack method to illicitly gain access and then take control of user accounts and systems.

Read More

, , , , ,

What Makes a Password Weak or Strong?

The crucial differences between weak and strong passwords. We will also provide practical tips on how to bolster your online security.

Read More

, , ,

Strong Passwords: A Keystone of Cybersecurity for Water and Wastewater Infrastructure

The White House put out an official letter warning of severe cyberattacks directed at water and wastewater infrastructure across the country.

Read More

,

Millions Impacted in Mass Passcode Reset of AT&T Accounts

AT&T has initiated a mass reset of millions of customer account passcodes following a reported data breach.

Read More

, ,

Guarding Education: The Impact of Compromised Credentials

The education sector has increasingly become a target for cybercriminals seeking to exploit vulnerabilities and gain unauthorized access to sensitive information.

Read More

, , , , ,

How MSPs and Resellers Should Approach Cybersecurity

What are the threats facing credential security? How partners can take steps to prevent their clients from falling victim to them?

Read More

,

Charting a Course for Cybersecurity

The cybersecurity arena is poised for continual challenges. Given the tactics we saw last year, here are some anticipated patterns likely to emerge.

Read More