Security Tips
Don’t Fall Victim to Password Mistakes in the Office
Employees often have these five misconceptions when choosing passwords for work. Strong password creation is a necessity in the workplace, yet a vast number of working individuals do not understand what exactly is required to generate a secure password. This is problematic because passwords are the first and last line of defense against unauthorized access. […]
Ensure Password Security for Remote Workers
Balance connectivity and security in your password management policy. How many of your employees share passwords with one another? At first, you might want to say that none of them do. It’s specifically forbidden in your cybersecurity policy, after all. But there’s a big difference between saying something and doing it. According to SurveyMonkey, one-third […]
Password Manager Storage: Cloud vs. Local
Discover the pros and cons of each storage medium for security application. Most people would assume that if you want to keep something safe, you have to keep it nearby. This convention of common sense might not tell the entire story, however. Proximity does not necessarily equal security, as anyone who has accidentally left their […]
7 Tips for Staying Safe Online During the Holiday Season
Every year the holidays bring an online shopping rush, and while you’re tracking and tackling all those flash discounts and “today only” sales, fraudsters are equally busy taking advantage of the seasonal gift-buying craze. Luckily, there are ways to shop online that mitigate a lot of the risks associated with sharing and storing your sensitive […]
The Importance of End-User Experience in Selecting Password Management Tools
IT leaders need to prioritize the end-user experience when it comes to security software. It’s a well-known fact that an organization’s security chain is only as strong as its weakest link. The professional cybercriminals responsible for costly, reputation-damaging data breaches know what to look for when scouting new attack opportunities. The common-sense strategy of striking […]
Sharing Passwords Through Slack Is Risky
Make sure your employees know how to identify a secure channel for password sharing. Securely sharing a password is no easy task. Organizations that enforce strict password policies will often have IT professionals generate random passwords for their employees. This is a good move for password security, but it presents a difficult problem. Once you […]
How to Spot a Phishing Scam
Sometimes it’s obvious. That message from a Nigerian prince requesting you wire $2,000? Ok, probably not going to fall for that one. If the CEO of your company asks for your credit card information via email? Something is definitely off. But often phishing is harder to spot. Phishing is a common scheme in which someone […]
Size Doesn’t Matter: Cybercriminals Target Small & Mid-Size Businesses
Although major data breaches make headlines, smaller companies are at a larger risk. Yahoo. Equifax. Marriott. High-profile data breaches involving hundreds of millions of users have become regular occurrences, and their frequency is increasing. However, more data breaches happen every day than anyone can reliably count, and it’s because they’re happening to organizations that aren’t […]
Security Management Terms Explained: A Cybersecurity Glossary
Make sure your entire team is on the same page when it comes to cybersecurity. Acronyms and buzzwords frequently pop up in conversations among IT professionals, but the downside of using this industry-specific terminology is that it’s an opportunity for the non-initiated to lose track. Until recently, this has not been much of a problem […]
Secure Executive Support for Password Management Tool Adoption
Find out how to bring corporate leadership onboard with modern security. Convincing leadership to make changes for the organization you work for requires hefty effort – but it’s worth it. Those changes might be what helps your business remain competitive in the long run. In today’s digital-first environment, there are no changes more urgent than […]
What If Dashlane Gets Hacked?
If Dashlane were ever hacked, your information would still be safe thanks to encryption. Here’s why.
Reduce Employee Involvement in Cybercriminal Activity
Use encryption the right way and keep employees vigilant. Ask any IT professional to describe who their cybersecurity policy defends against, and they will likely describe a hacker. The hacker is a smart, opportunistic cybercriminal ready to capitalize on your security weaknesses by using sophisticated technology and nefarious social engineering tactics. And data shows fear […]