Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

, , ,

What the NIST Privacy Framework Means for Password Policy

Learn about the pivotal role of the NIST Privacy Framework. Fortify organizational privacy protocols and mitigate security risks effectively.

Read More

CEO Views: Valuable Cybersecurity Solution Provider

Enzoic was selected because of it's innovative cybersecurity and fraud prevention products.

Read More

7 Password Problems Solved by Password Policy Enforcement

Organizations need password policy enforcement that screens for compromised passwords daily and follows NIST password guidelines. Here are some tips!

Read More

,

Protecting Loyalty Accounts and Rewards Programs

Many companies are lax in protecting loyalty accounts from account takeover attacks and fraud. And it hurts them financially. Here are some tips!

Read More

, ,

Are PSD2 SCA Options Too Narrow in Scope?

On 09/14, PSD2 SCA requirements were introduced in the EU. It will help protect customers but why did they not consider lower-customer-friction options?

Read More

,

New Jersey Data Breach Notification Law

As of Sept 1st, 2019, businesses based in New Jersey are now required to notify impacted users of online account information exposed in a data breach.

Read More

,

8 Ways to Mitigate Credential Stuffing Attacks

There is no one way to mitigate all credential stuffing attacks but a layered approach can reduce risk without negatively impacting the user experience.

Read More

,

Enzoic Continues to Grow

Enzoic, a leading provider of compromised credential screening solutions, recently announced that Kim Jacobson has joined as a Director of Marketing.

Read More

, ,

11 Ways Employees Can Be Your Weak Link for Cybersecurity

90% of organizations are likely to be attacked/exposed to attacks through an insider threat, often unintentionally. Read on tips on employee cybersecurity.

Read More