Security Tips

Marketers, Here’s How—and Why—You Should Be Managing Your Team’s Passwords
Managing team passwords can be an overwhelming task. So how do you make logins simpler for you and your team and create secure business passwords?

From Maiden Names to School Mascots—The Best Ways to Use Security Questions
Security questions might not be the most effective method of securing access points, but you can learn tips and tricks for making the most of them.

3 Times a Major Tech Company Was Hacked—And What Marketing Teams Can Learn
What can your marketing team learn from the Twitter, Facebook, and Canva data breaches?

Why Your Marketing Team Needs a Password Manager
Our technology and marketing experts use password managers every day. Learn how Dashlane is here to assist you in your technology and security needs.

Uncharted Digital Waters: How Private Are Telehealth Platforms?
Since the start of the pandemic, telehealth platforms have been more necessary than ever. But are they a target for cybercriminals?

3 Strategies to Prevent Breaches and Hacks at Work
Here are the three essential strategies for preventing data breaches and hacks, and other ways to enact damage control.

3 Key Steps to Building a Compliance Training Program
Guest contributor Naya Moss is an IT pro and infosec leader breaking down the basics of creating your own compliance training.

Top 5 Benefits and 3 Challenges of Implementing Identity and Access Management
Cybersecurity risks are on the rise, especially when it comes to data-driven companies. Identity and Access Management (IAM) can help.

How to Get Perfect UX by Setting Up Your Forms for Dashlane
Learn this tiny change you can make to your website for faster and even more reliable Dashlane integration.

What’s Your Number? How to Avoid Port-Out Scams.
Hackers can use your cell phone number for a cyberattack known as a port-out scam. Here’s how they work and how you can protect yourself.