Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

, ,

Pride and Passwords: Top Hacking Methods & How to Prevent Them

The password attack methods hackers frequently used against enterprises and how your business can prevent damage or breaches.

Read More

, ,

Cybersecurity and What’s Not Working from Home

Read what cybersecurity issues and trends are in store for us in 2021 as remote work likely remains popular.

Read More

,

Digitizing the Voting Process: From Paper to Passwords

There are many reasons to modernize the voting process, but transitioning from analog to digital in a security-sensitive environment is not easy.

Read More

, , ,

Benefits of NIST Guidelines in Real-World Solutions

NIST password guidelines have real-world applications in every organization. Here's what you can do to stop your passwords from being compromised.

Read More

, , , ,

A Benchmark for Your Unsafe Passwords

Read just how big the problem of compromised credentials may be for a company like yours and to provide a benchmark based on Enzoic’s audit.

Read More

,

How Biometrics Measure Up and Why They Aren’t the Cure-All for Cybersecurity

The biometrics industry is expanding rapidly. Consider the following when exploring the possibilities of biometric security use.

Read More

,

Enzoic and OneLogin Partner to Prevent Cyber Attacks Caused By Compromised Passwords

The collaboration will see Enzoic’s credentials screening service integrated into OneLogin’s SmartFactor Authentication product.

Read More

, ,

Understanding Bot Mitigation Limitations

Take a look at the limitations of bot mitigation and read where compromised credential screening can be highly complementary.

Read More

,

The Health of Security

Healthcare organizations are a prime target. Here are six tips that healthcare institutions can take to increase the effectiveness of their security.

Read More