Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

,

Get Involved in Cybersecurity Now

Here are three straightforward tips small and mid-sized companies could do that would greatly impact their cybersecurity defensive stance.

Read More

, ,

Cracking Multi-Factor Authentication on the Cheap

Having MFA associated with your phone number feels comforting, but it’s also plagued by hackers looking for new methods of attack.

Read More

,

COVID Tracing Apps. Mask Up, Digitally.

The emergence of more coronavirus tracing apps brings some serious security challenges. Items are already being sold on the dark web.

Read More

, , ,

It’s Passwords, All the Way Down

A passwordless system is really a mirage. When you dig deeper, these solutions are still reliant on passwords. Read to find out more.

Read More

Can AI be Used to Mitigate Human Error?

What is meant by human error? What mistakes are users making, and what is the impact on the greater security of their networks or companies?

Read More

, ,

Attacks on Digital Learning

The educational sector is well on its way to becoming a ‘prime target’ for cyberattacks. Read how school districts can defend themselves.

Read More

, , ,

How Social Engineering Tactics Can Crack Multi-factor Authentication

MFA security vulnerabilities. How scammers wield social engineering techniques against MFA and what you can do to defend your systems.

Read More

, ,

Cyberattacks on Municipalities and How to Defend Against Them

Cyberattacks continue to have a massive economic impact on local and state branches of governments across the U.S.

Read More

, ,

How to Strengthen Password Policies to Stay Compliant with GDPR

Why strong password policies are important and looking at some specifics that can be applied to an organization's password policy to help meet GDPR.

Read More