Security Tips

9 BYOD Security Best Practices for Small and Medium-sized Businesses
SMBs face BYOD security threats like phishing, data leakage, and malware. Learn the top practices to mitigate BYOD security risks.

How to Mitigate BYOD Risks with a Password Manager
BYOD poses cybersecurity risks without the right policies and tools. A password manager can help mitigate BYOD risks.

How Dashlane’s Bug Bounty Program Helps Us Be More Secure
Dashlane’s bug bounty program incentivizes white-hat hackers to identify bugs in our code to improve security.

How Password Reuse Leads to Cybersecurity Vulnerabilities
Password reuse makes you vulnerable to cyberattacks like brute-force attacks or credential stuffing, which prey on password reuse habits.

What To Do If a Scammer Has Access To Your Email Address
A hacked email account can have serious cybersecurity and privacy consequences. Learn what to do if a scammer has your email address.

How to Export Google Chrome Passwords to a CSV
Follow these steps to export Chrome passwords to a CSV file and consider the benefits of a standalone password manager.

11 Cyber Threats To Be Aware of & Defend Against
Cyber threats can come from both inside and outside an organization and are mitigated through the use of cybersecurity policies and tools.

Digital Identity 101: Everything You Need to Know
Digital identity is making 100 years of physical ID verification obsolete by encompassing cybersecurity practices into online identification.

The 7 Steps of a Cyberattack
Here, we break down the anatomy of cyberattacks and compare outcomes between companies with and without security solutions in place.

How to Find & Manage All Your Online Accounts
How can I find all my online accounts? Here’s the best way to recover all old accounts and keep them safe and accessible.