Breaches & Alerts
Data & Culture
Internet Safety 101
Visit Our Site
The Top 3 Reasons Businesses Get Hacked—and How to Avoid Them
Passwords are the gateway to company data. How do your security practices measure up? Creating a password oftentimes feels like a means to an end....
What Businesses Can Do in Q4 to Get 2021 Off to a Good (and Secure) Start
Like many of us, you’re probably ready to put 2020 behind you. But before you do, don’t miss the opportunity to strengthen your company’s security...
Pitch a Password Manager to Your Boss in 8 Easy Steps
So you want to get a password manager for your company, but your boss—or their boss—is hesitant. Here’s everything you need to know to get the buy-in necessary to implement Dashlane in...
What IT Departments Can Learn From This Summer’s Major Twitter Hack
The more cognizant employees and the general public become about online security risks, the savvier hackers seem to be. As much as we’d like to...
How to Find a Password Manager Your Business Will Love and Employees Will Use
Think of your company’s passwords as baby Yodas—they must be protected at all costs. A password is the most crucial element to keeping your company’s...
Don’t Take the Bait — Password Managers Can Help Shield You From Phishing Attacks
If there were a popularity contest for hacking schemes, phishing would win by a landslide. Most commonly in the form of an email, a phishing...
How to Manage Employee Passwords Across the Business
Call it the password paradox. Passwords were originally developed as a simple way to safeguard sensitive information.
The Best Browser Extensions for Digital Privacy
If eyes are the window to the soul, browsers are the window to, well, everything on the internet. But that window goes both ways—leaving it...
Should I Keep My Venmo Private?
If you want to feel like a private eye, scroll through the feed on your Venmo app. Thanks to Venmo’s social feature, you can see...
Game Over: Your Kids’ Video Game Accounts Might Be at Risk
Video games and gaming have become more popular in the pandemic, but they may pose a threat to kids’ cybersecurity. Here are our tips for...
Wait—Is My Boss Reading My Slack?
With a larger-than-usual percentage of employees working from home, Slack has gained even more prevalence in our work days—and drawn questions about end-user privacy.
College Contact Tracing Apps Are Leaking Student Data
In an effort to keep students and the greater public safe during the pandemic, some colleges forget to factor in students’ privacy.
What Is Credential Stuffing?
How do hackers get their hands on passwords in the first place and how are they then used in credential stuffing attacks? We explain.
How Dashlane Helped KHM Travel Fix their Password Problems and Build a Culture of Security Awareness
KHM Travel needed a safe, secure way to manage and share passwords. Dashlane saved them time and delivered peace of mind.
How To Wipe Your Work Computer
Here’s how to ensure your device is clear of personal data before giving it back to your company. Try as I might to keep my...
Is TikTok Safe for Kids?
Home to many a dance challenge, TikTok is social currency for Gen-Z. Here’s everything parents should know about the wildly trendy app that most of...
Why Do You Need a VPN? Don’t Miss These 3 Key Benefits
Pointing to national security concerns, President Trump's recent executive order threatens to ban TikTok if it's not sold by the Chinese-owned company. Although Microsoft, Twitter,...
Which Apps Actually Need Location Permissions?
In the great pantheon of things our phones know about us, our location data is arguably the most sensitive (ill-advised bathroom selfies notwithstanding). The idea...
Dark Web Monitoring—Your Employees Are Likely Using Compromised Passwords
Think your enterprise password policy is keeping your organization secure from attack? Think again.
How Can I Instill Good Internet Security Habits in My Kids?
Now that many schools are operating virtually, it’s the perfect time to evaluate your kids’ understanding and awareness of digital privacy, and brush up on...
Not Just For Secret Agents and Celebrities: Phone Encryption Explained
The easiest way to think of encryption is that it takes the information on your phone and it translates it into a secret code.
What Is the Dark Web?
While the dark web is not all bad, its anonymous nature makes it a great place to buy and sell personal info stolen from data...
What the Hack Is Phishing?
A lump grew in my throat. I’d been conned. More specifically, I’d been phished. And it had nothing to do with the band.
Always Change Your Passwords After a Breach
Even though 91% of people understand it’s a bad idea, 59% still reuse their passwords. This means your compromised passwords are likely being used elsewhere.