Dashlane
Introducing the Dashlane Status Page
We’re excited to announce the Dashlane Status Page. This page represents our commitment to transparency—one of Dashlane’s core values—and to reliability, which is a critical component of our users’ experience. Dashlane is a truly global product, serving nearly 10 million customers and over 7,000 businesses in 150 countries across platforms and devices. We know that […]
Twitter Asks 330 Million Users to Change Their Password—What Happened?
Yesterday, Twitter disclosed a bug that left 330 million user passwords exposed in plaintext in an internal log. Twitter has been adamant that there has thus far been no breach or evidence of misuse; rather, a bug in their system meant that someone could have accessed those passwords. Any scenario where user passwords are stored in […]
Dashlane Will Be at RSA 2018
Dashlane will be at the RSA conference next week in San Francisco. Will you? The RSA conference is an information security event that connects attendees with industry leaders and innovative technologies (like Dashlane!) and delivers the latest trends and strategies to information security professionals like you. Conference Details Where: Moscone Center, San Francisco, CA When: […]
What Is a Hack vs. What Is a Data Breach: Cybersecurity 101
“What is a hack, exactly? And what’s the difference between a hack and a data breach?” Given the frequency with which hacks and data breaches occur, we get asked these questions a lot. You’ll see many mainstream media outlets using these words interchangeably. Though the two sometimes overlap, there are some key differences between them […]
Data Breach E-Book: How to Empower Employees and Protect Your Business
Are you worried about a data breach at your organization? You should be. But you should also be able to rest easy knowing you put your organization in the best position to keep sensitive company and customer information protected. One of the core components to a role in IT or Security is the ability to […]
Delete Facebook? How it Impacts Secure Logins to Thousands of Sites
By now, you’ve probably heard about the Delete Facebook movement. Stemming from the alleged misuse of data from over 50 million user accounts (update: 87 million user accounts) by a firm called Cambridge Analytica during the 2016 presidential election, Facebook users have been deleting accounts as a way of showing that they want to control their data. Whether […]
Security + Convenience: Why Your Business Needs a Password Manager
Data breach! The phrase itself is enough to make even the most seasoned IT or security professional cringe. Hackers who exploit weaknesses in your security represent one of the most nefarious dangers to your business, employees, and clients. These aren’t over-exaggerated claims, either. World famous businessman, Warren Buffet, stated that cyber crimes were the number one problem with […]
Dashlane Offers Free Password Protection to Political Campaigns and Elected Officials
Dashlane is providing campaign workers free Dashlane Premium to protect their sensitive data and accounts during the campaign cycle. Dashlane Premium will provide these teams with a robust first line of defense against an ever-growing list of cybersecurity threats. [To redeem the offer, please go to the bottom of this post and click the link […]
Data Breaches and Weak Passwords: A Love Story
Data breaches and malware attacks make headlines every day – and huge, household names are no longer the sole target. Small and mid-sized businesses are increasingly being targeted by cyber criminals and hackers who seek to exploit the brand for their own purposes. Tracking down and eliminating sources of risk can help prevent data theft […]
AI Enters the Business World – How Will it Impact Your Cybersecurity?
Artificial Intelligence, in all of its forms, is here to stay. Any process a machine takes over can be considered AI. In this case, we’ll talk largely about the personal assistant functions which users activate using voice commands. Things like Siri and Alexa offer their users the chance to have a personal assistant perform the tedious jobs of looking […]
Phishing: 5 Methods That Can Harm Your Business
Phishing attacks are difficult threats for IT and Security professionals to eliminate because existing methods continue to evolve in order to disrupt businesses of every size. Attacks typically don’t target seasoned security professionals — instead, criminals are focusing their efforts on the largely negligent employee base, or on specific individuals within a business who tend […]
Shadow IT: How to Mitigate Risks with a Password Manager
Shadow IT is inevitable. With the consumerization of IT and the proliferation of cloud applications, maintaining control over your organization’s security is becoming increasingly difficult. Unless you’re willing to slow employee productivity to a halt by demanding IT approval of every software and cloud application used for work, as well as all personal devices used […]