Most Recent Posts

Keep Your Dashlane Account Safe with a Recovery Key
Dashlane now offers simple, secure account recovery for all users who log in with a Master Password.

Best Practices for Web Development to Optimize Website Compatibility with Password Managers
Here are some tips and tricks for optimizing your website’s compatibility with password managers, improving autofill and accessibility.

Black Hat 2023 Review: The Seven Biggest Takeaways and What’s Ahead
The Black Hat 2023 security conference covered the power of AI, passkeys as the future of authentication, and much more.

What Is a Digital Footprint and Why Is It Important?
What’s a digital footprint? It’s the sum of your online activities and, over time, it creates a detailed impression of your identity.

Email Security Best Practices to Protect Your Business
Email security best practices combine cybersecurity tools with training and education to protect businesses from email-related cybercrimes.

How to Protect Yourself From Identity Theft
Learn how to protect yourself from identity theft to avoid dangerous cybercrimes that can impact your credit score, finances, and reputation.

Why a Craft Supplies Retailer Pivoted on Password Management Solutions
Learn why retail company, OOLY, pivoted password management solutions and improved their collaboration.

Stay Secure by Avoiding 7 Common Password Sharing Mistakes
With password sharing almost unavoidable, use secure password sharing methods to prevent password theft, hacking, and data intercepts.

8 of the Most Common Ways Hackers Steal Passwords
How do hackers get passwords? As hacking tactics like spyware, phishing, and man-in-the-middle attacks evolve, protection methods improve.

A Complete Guide to Managing Technology Risk at the Enterprise Level
Technological risk management deploys risk assessments, policies, and technology to protect company systems, processes, and data. Learn more.