Breaches & Alerts
Data & Culture
Internet Safety 101
Visit Our Site
Delete Facebook? How it Impacts Secure Logins to Thousands of Sites
By now, you’ve probably heard about the Delete Facebook movement. Stemming from the alleged misuse of data from over 50 million user accounts (update: 87 million user...
Security + Convenience: Why Your Business Needs a Password Manager
Data breach! The phrase itself is enough to make even the most seasoned IT or security professional cringe. Hackers who exploit weaknesses in your security...
Data Breaches and Weak Passwords: A Love Story
Data breaches and malware attacks make headlines every day – and huge, household names are no longer the sole target. Small and mid-sized businesses are...
The Complete Guide to Finding Long-Lost Passwords Hiding Anywhere
Before I began using Dashlane, I used to stash my passwords everywhere, from random pieces of paper to the deepest corners of my computer to my sock...
AI Enters the Business World – How Will it Impact Your Cybersecurity?
Artificial Intelligence, in all of its forms, is here to stay. Any process a machine takes over can be considered AI. In this case, we'll...
Dashlane Business: Our 5 Key Principles
Dashlane Business was inspired by a steady and growing chorus of requests: "I love Dashlane—but I wish all my employees could have the simpler, safer web...
Phishing: 5 Methods That Can Harm Your Business
Phishing attacks are difficult threats for IT and Security professionals to eliminate because existing methods continue to evolve in order to disrupt businesses of every...
Shadow IT: How to Mitigate Risks with a Password Manager
Shadow IT is inevitable. With the consumerization of IT and the proliferation of cloud applications, maintaining control over your organization’s security is becoming increasingly difficult....
Phishing Statistics: What Every Business Needs to Know
Phishing attacks are on the rise, and they're more sophisticated than ever. The reason these types of attacks are on the rise is because they're...
5 Steps to Check ‘Secure My Passwords’ Off Your Resolution List
With each coming year, we make a list of overwhelming resolutions but tend to skip the part where we map out a feasible strategy to...
What’s the Best Password Manager for Your Business? Ask a U.S. Bank (Part II)
What's the best password manager for your business? In Part I, a U.S. bank laid out the blueprint for those wondering whether their business needs...
Why Does Your Business Need a Password Manager? Ask a U.S. Bank (Part I)
Why does your business need a password manager? A password manager is the best way to help your business: Eliminate password reuse Improve employee security...
PAM vs SSO vs Password Manager: Which is Best for Your Business?
Whether you're seeking a PAM (Privileged Access Management), SSO (Single Sign-On), or password management solution for your business, read this short guide to ensure you...
How a Password Manager Helps Prevent a Data Breach
A password manager is the best first line of defense against a data breach. By encouraging and enabling employees to change their poor security and...
Year of the Hack (Again)
2017 can easily be called the year of the hack. From HBO and Equifax, to the Pentagon and the Republican Party, it seems like no...
Cyber Security Awareness Training: How to Improve Employee Behavior
Employees are your first line of defense. Unfortunately, they're also the weakest link in your network security. It's your job to improve your first line...
How to Conduct an Internal Security Audit in Five Simple, Inexpensive Steps
Conducting an internal security audit is a great way to get your company on the right track towards protecting against a data breach and other costly...
Insider Threat 2018 Report: Is Your Business Vulnerable to an Insider Threat?
Crowd Research Partners, in association with Dashlane, recently published their annual Insider Threat Report. The results are dramatic — 90% of organizations are vulnerable to...
2018 Cybersecurity Forecast: How Artificial Intelligence Can Help Hackers Breach Your Business Passwords
81% of data breaches leverage a stolen or weak password. Artificial intelligence and machine learning are making it easier for criminals to identify these passwords quickly, putting...
Data Breach Statistics 2018 Forecast: Everything You Need to Know
When it comes to your business experiencing a data breach, the question is more when than if. [What were 2018's biggest data breaches? We listed...
2018 Cybersecurity Forecast: How To Protect Your Business From a Data Breach in 3 Simple, Inexpensive Steps
Data breaches are on the rise going into 2018, and they are wreaking havoc on businesses across the globe. There are three simple, inexpensive steps...
A Windows User’s Guide to Built-In U2F Authentication
Today, we’re excited to announce that Dashlane is collaborating with Intel to bring built-in Universal Second Factor (U2F) support to Dashlane’s password manager for Windows...
7 Last-Minute Gifts for SysAdmin Day
System Administrator Appreciation Day (SysAdmin Day) is tomorrow! Wait, you totally forgot about it, didn't you? It's okay! Unfortunately, this unofficial holiday is not as...
Passwords For Sale: Employees Would Sell Their Work Credentials for Next to Nothing
Whether you know it or not, your business has a serious security problem. The cause has nothing to do with malware or state-sponsored cyber attacks---it...