It’s finally time to unplug and unwind during your summer vacation! While you pack your swimsuit, sunscreen, and Hawaiian tops, don’t forget to add some security precautions on your checklist. Here are some quick tips from travel experts on how to protect your identity and your devices while on vacation this summer.Continue Reading →
As we add new members to the Dashlane team, we’ve introduced two new tools, inspired from the Scaled Agile Framework (SAFe) framework–an Agile development framework that allows an enterprise to move towards adopting lean-agile practices. I believe that these two tools are critical to scaling your team’s agile development: 1. A Portfolio of projects: Each project we do is
Continue Reading →
Identity theft is a crime in which a criminal acquires and uses someone’s personal information to impersonate someone else, usually for financial gain.
I’m sure you already knew that, yet many of us are still convinced that we’ll never become targets or victims of a cyber attack. With advancing security measures protecting our most sensitive information, we feel safe texting friends account passwords, emailing financial documents that contain your Social Security Number, and storing credit card information on e-commerce websites. Continue Reading →
As I’ve come to learn, being cautious online is incredibly important for women who are more active on social media, and who, as early as the year 2000, were found to have surpassed men in Internet usage. But it seems like every time I turn around, I see a news story about a major online security breach; passwords were hacked, information is stolen, and sensitive data is compromised.
But this shouldn’t deter me from updating my status on Facebook, shopping online for a new dress, or searching for a new job opportunity. Therefore, I’ve put together a list of nine tips I’ve learned to help other savvy women (like you!) stay safe when using the Internet.
Continue Reading →
Phishing is a common scheme in which a cyber criminal lures in a user with the intent to steal the recipient’s sensitive information, such as credit card information, usernames and email addresses, and social security numbers.Continue Reading →