Security Tips

7 Features You Need in a Team Password Manager
A team password manager is a useful tool for any small business that wants to boost security while helping employees to manage their passwords more effectively. However, not all business password managers are created equal. Here are seven features to look for when choosing a team password manager for your small business: 1. Usability A team […]

Naughty or Nice? Here’s How to Tell If an E-Commerce Website is Legit
We all want to find the sweetest deal on best name-brand clothes, sleek new toys, and the hottest tech gadgets on the market. But do you really know if that online shopping website is just selling you a bag of coal? According to Forbes, retailers are projecting that online fraud attempts will increase 43 percent […]

Password Managers are a Top Cyber Security Tool for Critical Infrastructure Systems
A cyber security researcher on a jet hacks into flight controls via its in-flight information system. A practical joker cracks the code for programming electronic highway road signs. An organized crime group hides drugs in an ocean shipper’s legitimate cargo and uses hackers to gain data needed to steal the cargo containers in port. […]

What is the Internet of Things and How Safe Is It?
Back in prehistoric times, cave people must have gazed at a fire with wonder while thinking, “Is it safe?” The answer, of course, was “It depends.” Safety precautions are necessary for every new tool. Today, if you use any kind of digital technology connected via wireless technology to the Internet, including cell phones, computers, pet […]

11 Things Employees Won’t Miss After Using a Password Manager
When it comes to passwords, most of your employees believe they are protected by storing countless iterations of username and password combinations in their heads—but with password rules becoming increasingly complex, it’s becoming nearly impossible to rely on memory these days. Faced with multiple complex passwords to remember, employees resort to pen and paper—or worse, […]

5 Things Your New Employees Need to Know About Cyber Security from Week One
If you’re a CEO or IT administrator, you’ll need to spruce up on cyber security training before indoctrinating new hires. If the latest Yahoo data breach proved anything, it’s that today’s cyber threats are terrifyingly real. That said, 2016 has come with a slew of new cyber threats and surprising avenues of danger. If there’s […]

How Employees, Passwords, and Network Vulnerabilities Can Cost Your Business Millions
This summer, IBM and Ponemon Institute published a startling global study on how much data breaches cost businesses per year. With approximately 90 percent of cybersecurity incidents affecting small businesses and 1 in 5 companies having experienced a security breach thus far this year, this study illustrates how three major security vulnerabilities lead data breaches […]

How Do Random Password Generators Work?
A random password generator is a software program, hardware device, or online tool that automatically generates a password using parameters that a user sets, including mixed-case letters, numbers, symbols, pronounceability, length, and strength. There are three kinds of random number generators that help make your new passwords: Pseudorandom number generators True random number generators Cryptographically […]

The Dangers of Workplace Connectivity You Ought to Know
Cloud storage tools, social networks, and chat apps have improved our work and personal lives; allowing real-time connectivity and electronic file sharing from your computer, tablet, or phone. These capabilities have effectively changed the way individuals and businesses operate by encouraging collaboration, storing and sharing data, and improving communication. However, with the benefits of connectivity […]

How to Make “Strong” Passwords Even Stronger for World Password Day
Happy World Password Day! As one of the best password managers in the industry, the Dashlane team is excited to participate in the global celebration to remind consumers and businesses to change and protect their passwords. I’m sure you’re going to read countless blog posts, news articles, infographics, security roundups, and other materials on how […]

A Skeptic’s Guide to Password Managers and Security
You’ve probably seen a free password manager app advertised on tech blogs and magazines, security forums, digital ads, etc. and immediately thought: “That’s a goldmine for hackers!” “Is this thing really safe and secure?” “Why would I put all my passwords in a third-party app?” I hear you! You have every right to learn exactly why you […]

Our Favourite “Password Killers” And Why They Won’t Actually Kill The Password
This new technology will KILL THE PASSWORD. If only we had a dollar every time we heard this phrase…Every time a new technology in the security space crops up, it tends to be the first thing we hear. Let’s take a look at some of the bigger “password killers” and see where they might fall […]