Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing MFA

, ,

Research on Compromised Credentials

Stolen credentials are an easy doorway into an organization's systems, and standard password policies aren’t keeping attackers out.

Read More

, , ,

MFA Vulnerabilities, ATO, and the Importance of Password Security

The Microsoft 2024 Digital Defense Report exposes a hard truth—old-school password attacks are prevalent and effective.

Read More

, , , , ,

What is Session Hijacking?

Session hijacking is a prevalent and dangerous attack method to illicitly gain access and then take control of user accounts and systems.

Read More

, , , ,

Debunking MFA Myths: How to Stay Secure

MFA is not invincible. The persistence of compromised credentials as an entry vector for data breaches is a testament to this vulnerability.

Read More

, , ,

CISA: The Risk of MFA Without Improving Password Security

CISA alert helps cybersecurity professionals understand that MFA alone is insufficient. Make sure to secure each authentication layer.

Read More

, , , ,

CISA Adds Single-Factor Authentication to List of Bad Practices

The Cybersecurity and Infrastructure Security Agency (CISA) announced adding single-factor authentication to their list of Bad Practices.

Read More

, , ,

What Does It Take to Be Secure with Multi-Factor Authentication?

Passwords, nearly a universal factor in every MFA solution, need to be fortified against risks that come from password reuse & data breaches.

Read More

, , ,

Mixing It Up – Defending Against a Blended MFA Attack

Take a proactive approach to protect each layer in your MFA solution. Don't be susceptible to being hacked.

Read More