Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Data Breaches

, , ,

Reimagining Ransomware Responses

Ransomware attacks can have a devastating impact on companies. How can we collectively prepare for and respond? What’s more effective than ‘paying up’?

Read More

, , ,

To Pay Up or Not Pay Up

Ransomware attacks have increase and the number of institutions paying ransoms has increased. Should organizations stop paying ransoms?

Read More

, ,

All Signs Point to Breaches: How Cyber Hygiene is Shaping Up

Data from the first quarter of 2021 showed an increased frequency of data breaches and compromised personal information.

Read More

, , , ,

Lessons from the Colonial Pipeline Breach

One of the largest, most economically devastating ransomware attacks occurred and details of the attack are starting to become clearer.

Read More

, , ,

Mixing It Up – Defending Against a Blended MFA Attack

Take a proactive approach to protect each layer in your MFA solution. Don't be susceptible to being hacked.

Read More

,

Blocking Basic Dictionary Words is not Enough

Ways to improve password security that go beyond blocking dictionary words that are worth implementing for organizations.

Read More

, ,

Planning to Prevent Account Takeover

Read how compromised passwords fit in with other major areas of security planning to prevent data breaches.

Read More

, , ,

Hacking MFA the Technical Way and How to Guard Against These Attacks

Read the ways hackers gain unauthorized access via technical methods to overcome MFA security. Start protecting your business today.

Read More

, ,

Cracking Multi-Factor Authentication on the Cheap

Having MFA associated with your phone number feels comforting, but it’s also plagued by hackers looking for new methods of attack.

Read More