Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Cybersecurity

, , ,

The Reality of Compromised Credentials

OWASP calls out “Credential Cracking” and "Credential Stuffing" as top-level terms related to credentials. Read to learn about the terms.

Read More

, ,

How The Current Threat Landscape Impacts Authentication Security

One of the biggest challenges: Installing security & privacy measures to mitigate the threats to new technologies & remote capabilities.

Read More

,

Cultivating a Cybersecure Culture at Work

A constantly shifting threat landscape means cybersecurity best practices should be on everyone’s mind, not just your CTO or CISO.

Read More

, ,

Think You’re Smarter than a Hacker?

Hackers aren’t sitting around guessing. They are using computing power, combined with lists of passwords and sets of compromised credentials.

Read More

, , ,

What Does It Take to Be Secure with Multi-Factor Authentication?

Passwords, nearly a universal factor in every MFA solution, need to be fortified against risks that come from password reuse & data breaches.

Read More

, , ,

Reimagining Ransomware Responses

Ransomware attacks can have a devastating impact on companies. How can we collectively prepare for and respond? What’s more effective than ‘paying up’?

Read More

, , ,

To Pay Up or Not Pay Up

Ransomware attacks have increase and the number of institutions paying ransoms has increased. Should organizations stop paying ransoms?

Read More

, ,

Solving the Password Problem in Education

The education sector is a prime target for credential attacks and password reuse. Read how our solution has enabled Higher Ed to reduce the risk.

Read More

, ,

All Signs Point to Breaches: How Cyber Hygiene is Shaping Up

Data from the first quarter of 2021 showed an increased frequency of data breaches and compromised personal information.

Read More