Security Tips

Stay Secure by Avoiding 7 Common Password Sharing Mistakes
With password sharing almost unavoidable, use secure password sharing methods to prevent password theft, hacking, and data intercepts.

8 of the Most Common Ways Hackers Steal Passwords
How do hackers get passwords? As hacking tactics like spyware, phishing, and man-in-the-middle attacks evolve, protection methods improve.

A Complete Guide to Managing Technology Risk at the Enterprise Level
Technological risk management deploys risk assessments, policies, and technology to protect company systems, processes, and data. Learn more.

How To Prevent and Respond to Data Breaches
Discover how data breaches occur, how to prevent a data breach with best practices and tools, and the steps to recovery after an incident.

How a Global Supply Chain Company Made Security Audits a Breeze
See how Allport Cargo Services, a privately held third-party logistics provider, secures & audits passwords with Dashlane.

What Is Password Hashing?
What is password hashing? Discover how it works, the algorithms it uses, and why it’s crucial for data security.

Excel Spreadsheets: How to Password Protect Your Excel Files
Learn how to password-protect Excel files to secure sensitive business data and formulas with our detailed guide.

How to Password Protect Your PDF Files
Learn how to password protect a PDF to improve security and traceability for signed agreements, intellectual property, and other documents.

Next-Level Folder Capabilities & 2 More New Features That Simplify IT Admins’ Lives
Dashlane’s 3 new features, including new folder capabilities, make IT admin’s lives and day-to-day workflows easier.

How To Tell if a Site Is Really Safe To Use: 8 Key Signs
Malware, data intercepts, and lack of privacy are constant internet threats. Follow these tips to help identify if a site is safe to use.