Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Data Breaches

, , ,

Hacking MFA the Technical Way and How to Guard Against These Attacks

Read the ways hackers gain unauthorized access via technical methods to overcome MFA security. Start protecting your business today.

Read More

, ,

Cracking Multi-Factor Authentication on the Cheap

Having MFA associated with your phone number feels comforting, but it’s also plagued by hackers looking for new methods of attack.

Read More

, , ,

How Social Engineering Tactics Can Crack Multi-factor Authentication

MFA security vulnerabilities. How scammers wield social engineering techniques against MFA and what you can do to defend your systems.

Read More

, ,

Cyberattacks on Municipalities and How to Defend Against Them

Cyberattacks continue to have a massive economic impact on local and state branches of governments across the U.S.

Read More

, , , ,

Password Spraying and Credential Stuffing: Developing Active Defense

Hackers frequently use password spraying and credential stuffing as attack methods. Are you prepared to take an active stance of defense?

Read More

, , ,

Password Spraying: How Common Passwords Threaten Your Organization

Proactive steps to mitigate password spray attacks and other credential-based attacks to protect your client and employee accounts.

Read More

, ,

Throwing Light on the Dark Web

Read what the dark web really is and how you can prevent compromised credentials from being the downfall of your company.

Read More

, ,

The Cyber Trove of the Healthcare Industry

Each day, healthcare organizations get threat actors banging at their digital doors on a hunt for sensitive information. Get protection.

Read More

,

A Chronic Illness: Why the Healthcare Industry Needs an Update

The HIMSS survey data makes a strong case that healthcare organizations should increase budgets for enhancing cybersecurity.

Read More