Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

, , ,

Credential Stuffing Attacks vs. Brute Force Attacks

Credential stuffing and brute force attacks are different threats. Understand how they work and how to defend against both.

Read More

, , , ,

A Guide to Law Firm Cybersecurity Risks & Ethical Compliance

Law firms are frequently targeted by hackers but the ABA's Formal Opinion 483 will guide law firm cybersecurity policy to protect firms and their clients.

Read More

,

Cyberattacks in Higher Ed

As high-profile attacks continue to make headlines, higher education IT departments must prioritize their budgets and personnel deployment to maintain effective security measures and heighten incident response.

Read More

PasswordPing Enters a New Era as Enzoic

PasswordPing an innovative credential screening and cybersecurity company, formally announced today that it has changed it name to Enzoic.

Read More

Strong Authentication vs. User Experience

All enterprises balance their need for strong authentication security against a frictionless user login process.  How some solutions can help that balance.

Read More

Facebook Password Security Fail

Facebook accidentally stores "hundreds of millions" user passwords in plaintext and around 20,000 Facebook employees had access to view these passwords.

Read More

, ,

FTC Creates De-Facto Legal Requirements for Credential Stuffing & Account Takeover

The FTC is sending a strong message that businesses will no longer be able to play the victim-card. Instead, they are responsible for protecting their customers from credential stuffing and account takeover.

Read More

, ,

What’s behind PCI’s New MFA Requirements?

Many have implemented MFA ahead of the new PCI requirement. Let's look at PCI's multi-factor implementation guidance that highlights some considerations, particularly around passwords that may otherwise be overlooked.

Read More

The Outsized Risk From Small Data Breaches

There is a continuous stream of small data breaches that make no headlines but present outsized risks to individuals and organizations.

Read More

,

The Magician’s Handkerchief of Password Reuse

Why using the same password can compromise your online security, as Mike shares a personal account of the risks and lessons learned.

Read More

, ,

Massive Equifax Data Breach Puts Consumers at Risk for Identity Theft and Compromised Accounts

Equifax announced a massive data breach that exposes affected consumers to an increased risk of identity theft and compromised accounts.

Read More

,

Can Passwords Really Be Replaced?

We will continue to see passwords for a long time due to the many unique characteristics not found in other authentication methods.

Read More