Workplace Tips
Workplace security best practices and recent news

Password Management in the Age of Data Privacy
Service providers have to be careful about how they capture user data. The internet will not be secure until every user enjoys guaranteed data privacy. Until this is in place, cybercriminals will continue to outpace their victims. Data privacy laws like Europe’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) are […]

Don’t Fall Victim to Password Mistakes in the Office
Employees often have these five misconceptions when choosing passwords for work. Strong password creation is a necessity in the workplace, yet a vast number of working individuals do not understand what exactly is required to generate a secure password. This is problematic because passwords are the first and last line of defense against unauthorized access. […]

Ensure Password Security for Remote Workers
Balance connectivity and security in your password management policy. How many of your employees share passwords with one another? At first, you might want to say that none of them do. It’s specifically forbidden in your cybersecurity policy, after all. But there’s a big difference between saying something and doing it. According to SurveyMonkey, one-third […]

Password Manager Storage: Cloud vs. Local
Discover the pros and cons of each storage medium for security application. Most people would assume that if you want to keep something safe, you have to keep it nearby. This convention of common sense might not tell the entire story, however. Proximity does not necessarily equal security, as anyone who has accidentally left their […]

The Importance of End-User Experience in Selecting Password Management Tools
IT leaders need to prioritize the end-user experience when it comes to security software. It’s a well-known fact that an organization’s security chain is only as strong as its weakest link. The professional cybercriminals responsible for costly, reputation-damaging data breaches know what to look for when scouting new attack opportunities. The common-sense strategy of striking […]

Sharing Passwords Through Slack Is Risky
Make sure your employees know how to identify a secure channel for password sharing. Securely sharing a password is no easy task. Organizations that enforce strict password policies will often have IT professionals generate random passwords for their employees. This is a good move for password security, but it presents a difficult problem. Once you […]

Size Doesn’t Matter: Cybercriminals Target Small & Mid-Size Businesses
Although major data breaches make headlines, smaller companies are at a larger risk. Yahoo. Equifax. Marriott. High-profile data breaches involving hundreds of millions of users have become regular occurrences, and their frequency is increasing. However, more data breaches happen every day than anyone can reliably count, and it’s because they’re happening to organizations that aren’t […]

Security Management Terms Explained: A Cybersecurity Glossary
Make sure your entire team is on the same page when it comes to cybersecurity. Acronyms and buzzwords frequently pop up in conversations among IT professionals, but the downside of using this industry-specific terminology is that it’s an opportunity for the non-initiated to lose track. Until recently, this has not been much of a problem […]

Secure Executive Support for Password Management Tool Adoption
Find out how to bring corporate leadership onboard with modern security. Convincing leadership to make changes for the organization you work for requires hefty effort – but it’s worth it. Those changes might be what helps your business remain competitive in the long run. In today’s digital-first environment, there are no changes more urgent than […]

Reduce Employee Involvement in Cybercriminal Activity
Use encryption the right way and keep employees vigilant. Ask any IT professional to describe who their cybersecurity policy defends against, and they will likely describe a hacker. The hacker is a smart, opportunistic cybercriminal ready to capitalize on your security weaknesses by using sophisticated technology and nefarious social engineering tactics. And data shows fear […]

Password Security Breaches: Biggest Concern for IT Leaders
Password security exploits are among the easiest for cybercriminals. The password security breach. It’s the simplest exploit in the book. The first thing any cybercriminal does when breaking into a system is try some popular passwords. IT leaders and cybersecurity researchers are routinely amazed to find out just how far hackers can go with nothing […]

Data Breach E-Book: How to Empower Employees and Protect Your Business
Are you worried about a data breach at your organization? You should be. But you should also be able to rest easy knowing you put your organization in the best position to keep sensitive company and customer information protected. One of the core components to a role in IT or Security is the ability to […]