Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

, , ,

How Cybercriminals Hack “Encrypted” Passwords

Businesses employ one-way encryption using hashing to protect passwords. Unfortunately, one-way hash functions are not enough.

Read More

, ,

Healthcare Industry: Cybersecurity Vulnerabilities and How to Treat Them

There is a dangerous undercurrent running beneath many of the new healthcare-related technologies: cybercrime. Read how to protect against it.

Read More

,

How an SEC Ruling Will Affect Financial Service Firms

A recent SEC ruling could inform future cybersecurity cases. How financial investment firms must secure their users’ personal accounts.

Read More

, , , ,

CISA Adds Single-Factor Authentication to List of Bad Practices

The Cybersecurity and Infrastructure Security Agency (CISA) announced adding single-factor authentication to their list of Bad Practices.

Read More

, , , ,

The City of Paso Robles Taps Enzoic for Password Peace of Mind

Protecting city resources from a cyberattack is of critical importance. Enzoic helped modernize its approach to password management.

Read More

, , ,

Busting the Myths Surrounding Password-Based Security

Myths surrounding password usage and set the record straight on the best practices businesses should adopt for proper password protocols.

Read More

, , , ,

Enzoic Offers the Motion Picture Association a Premier Approach to Password Security

Protecting against the threat of compromised passwords and password-based attacks is critical for the MPA. See how Enzoic is helping MPA.

Read More

, , ,

The Reality of Compromised Credentials

OWASP calls out “Credential Cracking” and "Credential Stuffing" as top-level terms related to credentials. Read to learn about the terms.

Read More

, ,

How The Current Threat Landscape Impacts Authentication Security

One of the biggest challenges: Installing security & privacy measures to mitigate the threats to new technologies & remote capabilities.

Read More