Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Cybersecurity

, , ,

Privacy Regulation in a Connected IoT World

Privacy Regulation in a Connected World: New California legislation is a1st step for privacy regulation; but IoT regulation should be expanded. Here is why.

Read More

Pwned Passwords: The Epicenter of Your Cybersecurity Storm

Pwned Passwords + Password Reuse = Perfect Storm. Because of password reuse, exposed passwords are a threat to every org. Learn how to mitigate that threat.

Read More

Rethinking Your Digital Identity

Rethinking Your Digital Identity in 2020. It is all about security and privacy. But you also must keep your digital accounts safe by not reusing passwords.

Read More

7 Cybersecurity Predictions for 2020

2020 Cybersecurity Predictions: It will be another exciting year for cybersecurity with elections, deep fakes, IoT, acquisitions, and passwords. Read more!

Read More

Tips to Protect Your Small Business From Cyberattacks

Small Business Cyberattacks: The impact of cyberattacks on a small business can be crippling. A robust cybersecurity policy is essential. Read our tips!

Read More

, ,

Enzoic Customer Profile: IDShield

IDShield is an Enzoic customer. They needed compromised credential screening and password monitoring for their clients. Here is how they use Enzoic.

Read More

, ,

Disney and the Password Reuse Problem

The Disney+ Launch: A whole new world of content, the same password reuse problem. Organizations need to screen for compromised credentials.

Read More

,

Professional Services Firms are Vulnerable Targets

Cybersecurity is crucial for mid-sized law firms, accounting firms, and financial services firms as attacks are increasing each year. What can firms do?

Read More

Why Biometric Authentication is Just Part of the Security Puzzle

Why Biometric Authentication is Just a Piece of the Security Puzzle. Biometrics are easy to use but should be used with another factor.

Read More