Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Cybersecurity

,

How Biometrics Measure Up and Why They Aren’t the Cure-All for Cybersecurity

The biometrics industry is expanding rapidly. Consider the following when exploring the possibilities of biometric security use.

Read More

, ,

Enzoic and OneLogin Partner to Prevent Cyber Attacks Caused By Compromised Passwords

The collaboration will see Enzoic’s credentials screening service integrated into OneLogin’s SmartFactor Authentication product.

Read More

, , ,

Enzoic Wins “Fraud Prevention Innovation of the Year” Award in 2020 CyberSecurity Breakthrough Awards Program

Enzoic is proud to receive the Fraud Prevention Innovation Award. Recognizing our team & the innovative nature of our solution.

Read More

, , ,

Enzoic Wins Colorado Companies to Watch 2020

Enzoic is honored to be named a winner of the 2020 Colorado Companies to Watch for our dedication, care, and influence as a growing business.

Read More

,

The Skinny on Password Attacks

Password attacks are rampant and poor password policy remains a threat. Get an overview of three of the most common ways it happens.

Read More

LastPass taps Enzoic for Dark Web Monitoring

Enzoic’s Dark Web Monitoring services are now being embedded into the new LastPass Security Dashboard. Read about what the new capabilities provide.

Read More

, ,

From Stolen Credentials to Full Network Compromise

How hackers are actually using exposed passwords to infiltrate Active Directory? Stolen credentials are often what the attackers use to compromise networks.

Read More

, ,

Digital Home Security

The number of people working from home has dramatically increased and this trend has spanned most major sectors of industry and it’s happened fast.

Read More

,

Tips for Protecting Your Password and Personal Data

A list of steps you can take and activities you should avoid for protecting your password & personal data. Get the "do nots" and "dos" of cybersecurity.

Read More