Security Tips

How a Travel Agency Fixed Their Password Problems and Built a Culture of Security
KHM Travel needed a safe, secure way to manage and share passwords. Dashlane saved them time and delivered peace of mind.

How To Wipe Your Work Computer
Here’s how to ensure your device is clear of personal data before giving it back to your company. Try as I might to keep my personal and work life separate, the two overlap, specifically when it comes to my work computer. Throughout the day, not only do I have the impulse to browse non-work-related sites […]

Is TikTok Safe for Kids?
Home to many a dance challenge, TikTok is social currency for Gen-Z. Here’s everything parents should know about the wildly trendy app that most of us are too old for.

Which Apps Actually Need Location Permissions?
In the great pantheon of things our phones know about us, our location data is arguably the most sensitive (ill-advised bathroom selfies notwithstanding). The idea that some faceless company might be tracking our every move is objectively scary. While some apps require access to your location to perform their base functions, others seemingly ask for […]

Browser Window Mayhem: How I Tackled My Tab Problem Once and for All
There are an infinite number of ways to organize your bookmarks, of course, but this should get you off to a very tidy start.

Almost 30 Million LiveJournal Accounts Compromised, Sold on Dark Web
In 2014, LiveJournal suffered a security breach, which compromised 26+ million user credentials. The breach was not reported, and it appears these credentials have been circulating ever since.

Everything You Need to Turn Your Home Into an Office
Here are ways we can improve our WFH setups to make our temporary offices simpler and more enjoyable.

Not Just For Secret Agents and Celebrities: Phone Encryption Explained
The easiest way to think of encryption is that it takes the information on your phone and it translates it into a secret code.

What Is the Dark Web?
While the dark web is not all bad, its anonymous nature makes it a great place to buy and sell personal info stolen from data breaches and hacks.

What the Hack Is Phishing?
A lump grew in my throat. I’d been conned. More specifically, I’d been phished. And it had nothing to do with the band.

Always Change Your Passwords After a Breach
Even though 91% of people understand it’s a bad idea, 59% still reuse their passwords. This means your compromised passwords are likely being used elsewhere.

5 Quick Tricks to Improve Your Online Security in 5 Minutes
Cybersecurity is an issue that impacts every business and individual, and depends on strong technology systems combined with intelligent habits. But where to begin? It can feel pretty overwhelming. Here’s a list of 5 quick things you can do in 5 minutes or less to instantly improve your online security. 1. Update your web browser […]