Security Tips

Protect Your Data When a Third-Party Website Gets Hacked
Learn how to quarantine compromised data when a trusted partner is attacked. When a high-profile data breach occurs, people aren’t necessarily worried about the company that suffered the breach. Instead, they’re concern is for the end-users of that company’s systems. Those users,customers and employees,are the ones whose sensitive data is at risk. A data breach […]

Can You Trust DNA Companies With Your Data?
It’s pretty remarkable that DNA tests are a normal part of life in the 21st century. For a reasonable fee you can learn all about your ancestry and genetic traits. Of course, mailing saliva to a tech startup so they can analyze your DNA also sounds like a dystopian sci-fi movie. How safe is it […]

Finding My Trail of Logins With Facebook Was a Security Wake-Up Call
Disorganization runs in my family. My dad once lost his car keys by mysteriously leaving them in the fridge, and I misplaced 12 (!) student IDs over four years at college. For someone like me, using Facebook to log in to apps and websites has been a no-brainer for the past few years. I can […]

Keeping Your Personal Info Safe While Filing Taxes Online
There’s nothing like that feeling of relief once you’ve finished filing your taxes, and e-filing services like TurboTax and H&R Block definitely ease the pain of getting to the finish line. During tax season however, the IRS warns consumers to avoid common tax scams—from unscrupulous return preparers to phishing emails and websites. So when submitting […]

You Should Get a Password Manager
Creating unique passwords guarantees that when an account is breached, no other accounts are affected. The human brain, however, was not built to remember hundreds of passwords.

Security Conferences Provide Great Benefits for Business Leaders
Decision-makers need to be up-to-date on the latest cybersecurity risks. Trade shows are an important part of almost every industry. These events provide crucial networking support for smaller businesses while exposing exhibitors to potential customers. Most executives and small-to-midsize business (SMB) leaders attend their industry’s conferences and trade shows to identify the most pressing developments […]

A Parent’s Guide to App Permissions: Keeping the Kids Safe and Secure
A recent New York Times investigation revealed the extent to which even children’s locations are tracked by the devices they carry and apps they download. While location tracking is hard to avoid completely, there are definitive steps you can take to keep your kids’ data as private as possible. Here we’ll outline how to find […]

Telecom’s New Passwordless Login System Raises Questions
ZenKey US carriers are making a foray into the world of passwords and digital identity, joining major tech players like Apple and Google. Verizon, AT&T, T-Mobile, and Sprint have teamed up on the release of a single sign-on service for smartphones called ZenKey (formerly Project Verify). ZenKey looks to replace your passwords with a “unique […]

How to Stop Reusing Passwords for Good
Resetting bad password habits can be a bit of a process. Luckily, Dashlane will help you at every step of the way. Here’s how.

What the Hack Is 2FA?
Adding two-factor authentication to your accounts means that even if someone managed to get your email and password, they wouldn’t be able to log in.

As Elections Near, Trouble Brews for SMB Security
Many SMB executives feel they are prime targets for foreign attackers who wish to wage cyber war and breach national security. In the current climate, cybersecurity attacks are considerable stressors and remain at the forefront of everyone’s mind. When looking at the small- and midsize-business (SMB) world, in particular, there’s always a concern about keeping […]

Think Beyond IT When Assessing Cybersecurity Risks
Hackers don’t limit themselves to technical exploits—and neither should you. Despite the implications of its name, cybersecurity is more than just an IT issue. Some hackers are infamous for using technical wizardry to find and exploit vulnerabilities in business systems, but the vast majority use far more modest methods. Why go through the trouble of […]