Breaches & Alerts
Data & Culture
Internet Safety 101
Product News & Tips
Visit Our Site
The Importance of End-User Experience in Selecting Password Management Tools
IT leaders need to prioritize the end-user experience when it comes to security software. It’s a well-known fact that an organization’s security chain is only...
Sharing Passwords Through Slack Is Risky
Make sure your employees know how to identify a secure channel for password sharing. Securely sharing a password is no easy task. Organizations that enforce...
How to Spot a Phishing Scam
Sometimes it's obvious. That message from a Nigerian prince requesting you wire $2,000? Ok, probably not going to fall for that one. If the CEO...
Size Doesn’t Matter: Cybercriminals Target Small & Mid-Size Businesses
Although major data breaches make headlines, smaller companies are at a larger risk. Yahoo. Equifax. Marriott. High-profile data breaches involving hundreds of millions of users...
Security Management Terms Explained: A Cybersecurity Glossary
Make sure your entire team is on the same page when it comes to cybersecurity. Acronyms and buzzwords frequently pop up in conversations among IT...
Secure Executive Support for Password Management Tool Adoption
Find out how to bring corporate leadership onboard with modern security. Convincing leadership to make changes for the organization you work for requires hefty effort...
What If Dashlane Gets Hacked?
It's the number one question we're asked. We get it—you want to know how storing all your passwords and personal information in one place is...
Reduce Employee Involvement in Cybercriminal Activity
Use encryption the right way and keep employees vigilant. Ask any IT professional to describe who their cybersecurity policy defends against, and they will likely...
Password Security Breaches: Biggest Concern for IT Leaders
Password security exploits are among the easiest for cybercriminals. The password security breach. It’s the simplest exploit in the book. The first thing any cybercriminal...
What Is Encryption?
Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. It can be used to...
How to View & Delete Saved Passwords in Chrome, Edge, Firefox & Safari
Are you realizing that saving passwords in your browser isn't super secure? In this post, we'll show you how to view and delete saved passwords...
How to Fight Back Against “Zombie Accounts”
There was a great segment on Monday morning's Halloween-themed Good Morning America where host Becky Worley explained to viewers the dangers of "zombie accounts"—old, forgotten,...
Stop Using Login With Facebook Immediately—Here’s Why
Facebook was hacked, and now everyone is scrambling to understand why it happened, who was responsible, and most importantly, what it means for the potentially...
World Password Day: How to Improve Your Passwords
May 4th was World Password Day (#WorldPasswordDay). It's a global initiative originated by Intel and championed by Dashlane to tackle the number 1 problem in...
What Is a Hack vs. What Is a Data Breach: Cybersecurity 101
"What is a hack, exactly? And what's the difference between a hack and a data breach?" Given the frequency with which hacks and data breaches...
Data Breach E-Book: How to Empower Employees and Protect Your Business
Are you worried about a data breach at your organization? You should be. But you should also be able to rest easy knowing you put...
Delete Facebook? How it Impacts Secure Logins to Thousands of Sites
By now, you’ve probably heard about the Delete Facebook movement. Stemming from the alleged misuse of data from over 50 million user accounts (update: 87 million user...
Security + Convenience: Why Your Business Needs a Password Manager
Data breach! The phrase itself is enough to make even the most seasoned IT or security professional cringe. Hackers who exploit weaknesses in your security...
Data Breaches and Weak Passwords: A Love Story
Data breaches and malware attacks make headlines every day – and huge, household names are no longer the sole target. Small and mid-sized businesses are...
The Complete Guide to Finding Long-Lost Passwords Hiding Anywhere
Before I began using Dashlane, I used to stash my passwords everywhere, from random pieces of paper to the deepest corners of my computer to my sock...
AI Enters the Business World – How Will it Impact Your Cybersecurity?
Artificial Intelligence, in all of its forms, is here to stay. Any process a machine takes over can be considered AI. In this case, we'll...
Dashlane Business: Our 5 Key Principles
Dashlane Business was inspired by a steady and growing chorus of requests: "I love Dashlane—but I wish all my employees could have the simpler, safer web...
Phishing: 5 Methods That Can Harm Your Business
Phishing attacks are difficult threats for IT and Security professionals to eliminate because existing methods continue to evolve in order to disrupt businesses of every...
Shadow IT: How to Mitigate Risks with a Password Manager
Shadow IT is inevitable. With the consumerization of IT and the proliferation of cloud applications, maintaining control over your organization’s security is becoming increasingly difficult....