Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Data Breaches

, ,

Cracking Multi-Factor Authentication on the Cheap

Having MFA associated with your phone number feels comforting, but it’s also plagued by hackers looking for new methods of attack.

Read More

, , ,

How Social Engineering Tactics Can Crack Multi-factor Authentication

MFA security vulnerabilities. How scammers wield social engineering techniques against MFA and what you can do to defend your systems.

Read More

, ,

Cyberattacks on Municipalities and How to Defend Against Them

Cyberattacks continue to have a massive economic impact on local and state branches of governments across the U.S.

Read More

, , , ,

Password Spraying and Credential Stuffing: Developing Active Defense

Hackers frequently use password spraying and credential stuffing as attack methods. Are you prepared to take an active stance of defense?

Read More

, , ,

Password Spraying: How Common Passwords Threaten Your Organization

Proactive steps to mitigate password spray attacks and other credential-based attacks to protect your client and employee accounts.

Read More

, ,

Throwing Light on the Dark Web

Read what the dark web really is and how you can prevent compromised credentials from being the downfall of your company.

Read More

, ,

The Cyber Trove of the Healthcare Industry

Each day, healthcare organizations get threat actors banging at their digital doors on a hunt for sensitive information. Get protection.

Read More

,

A Chronic Illness: Why the Healthcare Industry Needs an Update

The HIMSS survey data makes a strong case that healthcare organizations should increase budgets for enhancing cybersecurity.

Read More

,

How Biometrics Measure Up and Why They Aren’t the Cure-All for Cybersecurity

The biometrics industry is expanding rapidly. Consider the following when exploring the possibilities of biometric security use.

Read More