Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

, ,

Addressing Authentication Issues Within IoT

IoT has a great technological impact, but unless organizations can implement better cybersecurity, they are all at risk.

Read More

, , ,

Enzoic’s Threat Research: From Extensive Knowledge to Decisive Action

Effective threat intelligence for compromised credential screening involves discerning reconnaissance and real-time analysis and deployment.

Read More

, , , ,

The City of Prescott Utilizes Automated Password Security to Protect Employees from ATO

The City of Prescott wanted an automated and reliable method to assess and enforce password security in their organization.

Read More

, , ,

How Cybercriminals Hack “Encrypted” Passwords

Businesses employ one-way encryption using hashing to protect passwords. Unfortunately, one-way hash functions are not enough.

Read More

, ,

Healthcare Industry: Cybersecurity Vulnerabilities and How to Treat Them

There is a dangerous undercurrent running beneath many of the new healthcare-related technologies: cybercrime. Read how to protect against it.

Read More

,

How an SEC Ruling Will Affect Financial Service Firms

A recent SEC ruling could inform future cybersecurity cases. How financial investment firms must secure their users’ personal accounts.

Read More

, , , ,

CISA Adds Single-Factor Authentication to List of Bad Practices

The Cybersecurity and Infrastructure Security Agency (CISA) announced adding single-factor authentication to their list of Bad Practices.

Read More

, , , ,

The City of Paso Robles Taps Enzoic for Password Peace of Mind

Protecting city resources from a cyberattack is of critical importance. Enzoic helped modernize its approach to password management.

Read More

, , ,

Busting the Myths Surrounding Password-Based Security

Myths surrounding password usage and set the record straight on the best practices businesses should adopt for proper password protocols.

Read More