Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Cybersecurity

, , ,

How Social Engineering Tactics Can Crack Multi-factor Authentication

MFA security vulnerabilities. How scammers wield social engineering techniques against MFA and what you can do to defend your systems.

Read More

, ,

Cyberattacks on Municipalities and How to Defend Against Them

Cyberattacks continue to have a massive economic impact on local and state branches of governments across the U.S.

Read More

, , , ,

Password Spraying and Credential Stuffing: Developing Active Defense

Hackers frequently use password spraying and credential stuffing as attack methods. Are you prepared to take an active stance of defense?

Read More

, , ,

Password Spraying: How Common Passwords Threaten Your Organization

Proactive steps to mitigate password spray attacks and other credential-based attacks to protect your client and employee accounts.

Read More

, ,

Throwing Light on the Dark Web

Read what the dark web really is and how you can prevent compromised credentials from being the downfall of your company.

Read More

, ,

The Cyber Trove of the Healthcare Industry

Each day, healthcare organizations get threat actors banging at their digital doors on a hunt for sensitive information. Get protection.

Read More

, , ,

The Benefits of Specialization in Threat Intelligence Research

Early threat detection and identifying effective procedures to rectify problems are two goals within threat intelligence.

Read More

, ,

Cybersecurity and What’s Not Working from Home

Read what cybersecurity issues and trends are in store for us in 2021 as remote work likely remains popular.

Read More

,

Digitizing the Voting Process: From Paper to Passwords

There are many reasons to modernize the voting process, but transitioning from analog to digital in a security-sensitive environment is not easy.

Read More