Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Cybersecurity

, , ,

Password Hygiene: Due for a Cleaning

We need to modernize our approach to password hygiene as soon as possible. Get the Newest, Data-Driven Recommendations.

Read More

, , ,

Demystifying RockYou2021

The RockYou2021 breached password list. Many articles have been published, but some reported information is misleading.

Read More

, , , ,

Lessons from the Colonial Pipeline Breach

One of the largest, most economically devastating ransomware attacks occurred and details of the attack are starting to become clearer.

Read More

, , ,

Mixing It Up – Defending Against a Blended MFA Attack

Take a proactive approach to protect each layer in your MFA solution. Don't be susceptible to being hacked.

Read More

, ,

Planning to Prevent Account Takeover

Read how compromised passwords fit in with other major areas of security planning to prevent data breaches.

Read More

, , ,

Hacking MFA the Technical Way and How to Guard Against These Attacks

Read the ways hackers gain unauthorized access via technical methods to overcome MFA security. Start protecting your business today.

Read More

, ,

Top Five Digital Tips for Thriving in the New Normal

To survive and thrive, companies need to adjust their security strategies. Get the top five tips for any organization’s cybersecurity.

Read More

,

Get Involved in Cybersecurity Now

Here are three straightforward tips small and mid-sized companies could do that would greatly impact their cybersecurity defensive stance.

Read More

, ,

Cracking Multi-Factor Authentication on the Cheap

Having MFA associated with your phone number feels comforting, but it’s also plagued by hackers looking for new methods of attack.

Read More