Breaches & Alerts
Data & Culture
Internet Safety 101
Visit Our Site
As Elections Near, Trouble Brews for SMB Security
Many SMB executives feel they are prime targets for foreign attackers who wish to wage cyber war and breach national security. In the current climate,...
Think Beyond IT When Assessing Cybersecurity Risks
Hackers don’t limit themselves to technical exploits—and neither should you. Despite the implications of its name, cybersecurity is more than just an IT issue. Some...
Can You Trust Your Web Browser With Your Passwords?
Learn about the advantages and drawbacks of letting your browser store your passwords. Google Chrome, Firefox, and Safari allow users to store their passwords using...
Password Management in the Age of Data Privacy
Service providers have to be careful about how they capture user data. The internet will not be secure until every user enjoys guaranteed data privacy....
Don’t Fall Victim to Password Mistakes in the Office
Employees often have these five misconceptions when choosing passwords for work. Strong password creation is a necessity in the workplace, yet a vast number of...
Ensure Password Security for Remote Workers
Balance connectivity and security in your password management policy. How many of your employees share passwords with one another? At first, you might want to...
Password Manager Storage: Cloud vs. Local
Discover the pros and cons of each storage medium for security application. Most people would assume that if you want to keep something safe, you...
7 Tips for Staying Safe Online During the Holiday Season
Every year the holidays bring an online shopping rush, and while you’re tracking and tackling all those flash discounts and “today only” sales, fraudsters are...
The Importance of End-User Experience in Selecting Password Management Tools
IT leaders need to prioritize the end-user experience when it comes to security software. It’s a well-known fact that an organization’s security chain is only...
Sharing Passwords Through Slack Is Risky
Make sure your employees know how to identify a secure channel for password sharing. Securely sharing a password is no easy task. Organizations that enforce...
How to Spot a Phishing Scam
Sometimes it's obvious. That message from a Nigerian prince requesting you wire $2,000? Ok, probably not going to fall for that one. If the CEO...
Size Doesn’t Matter: Cybercriminals Target Small & Mid-Size Businesses
Although major data breaches make headlines, smaller companies are at a larger risk. Yahoo. Equifax. Marriott. High-profile data breaches involving hundreds of millions of users...
Security Management Terms Explained: A Cybersecurity Glossary
Make sure your entire team is on the same page when it comes to cybersecurity. Acronyms and buzzwords frequently pop up in conversations among IT...
Secure Executive Support for Password Management Tool Adoption
Find out how to bring corporate leadership onboard with modern security. Convincing leadership to make changes for the organization you work for requires hefty effort...
What If Dashlane Gets Hacked?
It's the number one question we're asked. We get it—you want to know how storing all your passwords and personal information in one place is...
Reduce Employee Involvement in Cybercriminal Activity
Use encryption the right way and keep employees vigilant. Ask any IT professional to describe who their cybersecurity policy defends against, and they will likely...
Password Security Breaches: Biggest Concern for IT Leaders
Password security exploits are among the easiest for cybercriminals. The password security breach. It’s the simplest exploit in the book. The first thing any cybercriminal...
What Is Encryption?
Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. It can be used to...
View & Delete Saved Passwords: Chrome, Firefox, and Safari
Are you interested in learning more about the saved passwords stored in your browser of choice? In this post, we'll show you how to view...
How to Fight Back Against “Zombie Accounts”
There was a great segment on Monday morning's Halloween-themed Good Morning America where host Becky Worley explained to viewers the dangers of "zombie accounts"—old, forgotten,...
Stop Using Login With Facebook Immediately—Here’s Why
Facebook was hacked, and now everyone is scrambling to understand why it happened, who was responsible, and most importantly, what it means for the potentially...
World Password Day: How to Improve Your Passwords
May 4th was World Password Day (#WorldPasswordDay). It's a global initiative originated by Intel and championed by Dashlane to tackle the number 1 problem in...
What Is a Hack vs. What Is a Data Breach: Cybersecurity 101
"What is a hack, exactly? And what's the difference between a hack and a data breach?" Given the frequency with which hacks and data breaches...
Data Breach E-Book: How to Empower Employees and Protect Your Business
Are you worried about a data breach at your organization? You should be. But you should also be able to rest easy knowing you put...