Security Tips

Can You Trust Your Web Browser With Your Passwords?
Learn about the advantages and drawbacks of letting your browser store your passwords. Google Chrome, Firefox, and Safari allow users to store their passwords using a built-in password manager. Some browsers will even generate random passwords for users and remember them on their own. This is undoubtedly a useful feature created to meet popular demand. […]

Password Management in the Age of Data Privacy
Service providers have to be careful about how they capture user data. The internet will not be secure until every user enjoys guaranteed data privacy. Until this is in place, cybercriminals will continue to outpace their victims. Data privacy laws like Europe’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) are […]

Don’t Fall Victim to Password Mistakes in the Office
Employees often have these five misconceptions when choosing passwords for work. Strong password creation is a necessity in the workplace, yet a vast number of working individuals do not understand what exactly is required to generate a secure password. This is problematic because passwords are the first and last line of defense against unauthorized access. […]

Ensure Password Security for Remote Workers
Balance connectivity and security in your password management policy. How many of your employees share passwords with one another? At first, you might want to say that none of them do. It’s specifically forbidden in your cybersecurity policy, after all. But there’s a big difference between saying something and doing it. According to SurveyMonkey, one-third […]

Password Manager Storage: Cloud vs. Local
Discover the pros and cons of each storage medium for security application. Most people would assume that if you want to keep something safe, you have to keep it nearby. This convention of common sense might not tell the entire story, however. Proximity does not necessarily equal security, as anyone who has accidentally left their […]

7 Tips for Staying Safe Online During the Holiday Season
Every year the holidays bring an online shopping rush, and while you’re tracking and tackling all those flash discounts and “today only” sales, fraudsters are equally busy taking advantage of the seasonal gift-buying craze. Luckily, there are ways to shop online that mitigate a lot of the risks associated with sharing and storing your sensitive […]

The Importance of End-User Experience in Selecting Password Management Tools
IT leaders need to prioritize the end-user experience when it comes to security software. It’s a well-known fact that an organization’s security chain is only as strong as its weakest link. The professional cybercriminals responsible for costly, reputation-damaging data breaches know what to look for when scouting new attack opportunities. The common-sense strategy of striking […]

Sharing Passwords Through Slack Is Risky
Make sure your employees know how to identify a secure channel for password sharing. Securely sharing a password is no easy task. Organizations that enforce strict password policies will often have IT professionals generate random passwords for their employees. This is a good move for password security, but it presents a difficult problem. Once you […]

How to Spot a Phishing Scam
Sometimes it’s obvious. That message from a Nigerian prince requesting you wire $2,000? Ok, probably not going to fall for that one. If the CEO of your company asks for your credit card information via email? Something is definitely off. But often phishing is harder to spot. Phishing is a common scheme in which someone […]

Size Doesn’t Matter: Cybercriminals Target Small & Mid-Size Businesses
Although major data breaches make headlines, smaller companies are at a larger risk. Yahoo. Equifax. Marriott. High-profile data breaches involving hundreds of millions of users have become regular occurrences, and their frequency is increasing. However, more data breaches happen every day than anyone can reliably count, and it’s because they’re happening to organizations that aren’t […]

Security Management Terms Explained: A Cybersecurity Glossary
Make sure your entire team is on the same page when it comes to cybersecurity. Acronyms and buzzwords frequently pop up in conversations among IT professionals, but the downside of using this industry-specific terminology is that it’s an opportunity for the non-initiated to lose track. Until recently, this has not been much of a problem […]

Secure Executive Support for Password Management Tool Adoption
Find out how to bring corporate leadership onboard with modern security. Convincing leadership to make changes for the organization you work for requires hefty effort – but it’s worth it. Those changes might be what helps your business remain competitive in the long run. In today’s digital-first environment, there are no changes more urgent than […]