Security Tips

How to Run an Effective Phishing Test at Work
Running an effective phishing test at work can be the difference between an employee who clicks on malicious links or attachments and one who reports them. In fact, real-time phishing simulations have proven to double employee awareness retention rates, and yield a near 40% ROI, versus more traditional cybersecurity training tactics, according to a study […]

What the Hack Is Juice Jacking?
What might be the only thing more frustrating than getting juice jacked? Being the first documented case of it.

How To Prepare to Lose Your Phone
The new three inevitabilities in modern life are death, taxes, and losing your phone.

What the Hack Is a VPN?
What a VPN does is make you anonymous, mysterious, private—masking your location and your data and your browsing activity.

If You Think You’ve Been Hacked, Here’s What to Do
Wondering what to do if you’ve been hacked? Time matters. Follow these immediate next steps.

How Safe Is Incognito Mode/Private Browsing, Really?
You might open a new browser window in Incognito Mode and think you’ve just vanished under a cloak of darkness with all your internetting perfectly hidden from the world. Sorry to burst your bubble, pal, but no. The various “private” options web browsers provide are not a panacea for your privacy concerns. In fact, you […]

What the Hack Is a Brute Force Attack?
Brute-force attacks are like when you spend five minutes jamming the wrong key into your front door, hoping it might finally work.

Exploring a Safer Future at RSA 2020
Dashlane is once again heading to the RSA Conference, an information security event that connects attendees with industry leaders and innovative technologies (like Dashlane!). This year, RSA is humanizing the conversation: “When we recognize that cybersecurity is, fundamentally, about people protecting people, the world becomes a better, more secure place.” Dashlane Booth DetailsWhere: Booth #3130, […]

9 Cybersecurity Podcasts Business Leaders Should Listen To
Make sure you’re aware of the latest security trends in your industry. Podcasts have grown from a niche format to a popular and entertaining media platform for millions of people. Taking a conversational approach to complex issues is extremely useful in many fields. It’s no surprise podcasts based on such complex subjects as law, medicine, […]

What the Hack Is a Dead Man’s Switch?
If you want to remember the concept behind dead man’s switch, just think of legendary character actor Joe Morton.

What the Hack Is Malware?
Some viruses are created simply to annoy their hosts. Others scrub your software for data its creators can use or sell for their own gain—and potentially to your detriment.

Do Biometric Technologies Eliminate the Need for Passwords?
Find out if Face ID and Touch ID will make the world move beyond the password. Face ID. Fingerprint biometrics. Access to a device through detection of typical user patterns. Science fiction has taught entire generations of tech entrepreneurs that the future will be password-free. Many security professionals are happy to call every new authentication […]