Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

, , ,

The Benefits of Specialization in Threat Intelligence Research

Early threat detection and identifying effective procedures to rectify problems are two goals within threat intelligence.

Read More

,

A Chronic Illness: Why the Healthcare Industry Needs an Update

The HIMSS survey data makes a strong case that healthcare organizations should increase budgets for enhancing cybersecurity.

Read More

, ,

Pride and Passwords: Top Hacking Methods & How to Prevent Them

The password attack methods hackers frequently used against enterprises and how your business can prevent damage or breaches.

Read More

, ,

Cybersecurity and What’s Not Working from Home

Read what cybersecurity issues and trends are in store for us in 2021 as remote work likely remains popular.

Read More

,

Digitizing the Voting Process: From Paper to Passwords

There are many reasons to modernize the voting process, but transitioning from analog to digital in a security-sensitive environment is not easy.

Read More

, , ,

Benefits of NIST Guidelines in Real-World Solutions

NIST password guidelines have real-world applications in every organization. Here's what you can do to stop your passwords from being compromised.

Read More

, , , ,

A Benchmark for Your Unsafe Passwords

Read just how big the problem of compromised credentials may be for a company like yours and to provide a benchmark based on Enzoic’s audit.

Read More

,

How Biometrics Measure Up and Why They Aren’t the Cure-All for Cybersecurity

The biometrics industry is expanding rapidly. Consider the following when exploring the possibilities of biometric security use.

Read More

, ,

Enzoic and OneLogin Partner to Prevent Cyber Attacks Caused By Compromised Passwords

The collaboration will see Enzoic’s credentials screening service integrated into OneLogin’s SmartFactor Authentication product.

Read More