Breaches & Alerts
Data & Culture
Internet Safety 101
Visit Our Site
Workplace security best practices and recent news
Size Doesn’t Matter: Cybercriminals Target Small & Mid-Size Businesses
Although major data breaches make headlines, smaller companies are at a larger risk. Yahoo. Equifax. Marriott. High-profile data breaches involving hundreds of millions of users...
Security Management Terms Explained: A Cybersecurity Glossary
Make sure your entire team is on the same page when it comes to cybersecurity. Acronyms and buzzwords frequently pop up in conversations among IT...
Secure Executive Support for Password Management Tool Adoption
Find out how to bring corporate leadership onboard with modern security. Convincing leadership to make changes for the organization you work for requires hefty effort...
Reduce Employee Involvement in Cybercriminal Activity
Use encryption the right way and keep employees vigilant. Ask any IT professional to describe who their cybersecurity policy defends against, and they will likely...
Password Security Breaches: Biggest Concern for IT Leaders
Password security exploits are among the easiest for cybercriminals. The password security breach. It’s the simplest exploit in the book. The first thing any cybercriminal...
Data Breach E-Book: How to Empower Employees and Protect Your Business
Are you worried about a data breach at your organization? You should be. But you should also be able to rest easy knowing you put...
Security + Convenience: Why Your Business Needs a Password Manager
Data breach! The phrase itself is enough to make even the most seasoned IT or security professional cringe. Hackers who exploit weaknesses in your security...
Data Breaches and Weak Passwords: A Love Story
Data breaches and malware attacks make headlines every day – and huge, household names are no longer the sole target. Small and mid-sized businesses are...
AI Enters the Business World – How Will it Impact Your Cybersecurity?
Artificial Intelligence, in all of its forms, is here to stay. Any process a machine takes over can be considered AI. In this case, we'll...
Dashlane Business: Our 5 Key Principles
Dashlane Business was inspired by a steady and growing chorus of requests: "I love Dashlane—but I wish all my employees could have the simpler, safer web...
Phishing: 5 Methods That Can Harm Your Business
Phishing attacks are difficult threats for IT and Security professionals to eliminate because existing methods continue to evolve in order to disrupt businesses of every...
Shadow IT: How to Mitigate Risks with a Password Manager
Shadow IT is inevitable. With the consumerization of IT and the proliferation of cloud applications, maintaining control over your organization’s security is becoming increasingly difficult....
Phishing Statistics: What Every Business Needs to Know
Phishing attacks are on the rise, and they're more sophisticated than ever. The reason these types of attacks are on the rise is because they're...
What’s the Best Password Manager for Your Business? Ask a U.S. Bank (Part II)
What's the best password manager for your business? In Part I, a U.S. bank laid out the blueprint for those wondering whether their business needs...
Why Does Your Business Need a Password Manager? Ask a U.S. Bank (Part I)
Why does your business need a password manager? A password manager is the best way to help your business: Eliminate password reuse Improve employee security...
PAM vs SSO vs Password Manager: Which is Best for Your Business?
Whether you're seeking a PAM (Privileged Access Management), SSO (Single Sign-On), or password management solution for your business, read this short guide to ensure you...
How a Password Manager Helps Prevent a Data Breach
A password manager is the best first line of defense against a data breach. By encouraging and enabling employees to change their poor security and...
Year of the Hack (Again)
2017 can easily be called the year of the hack. From HBO and Equifax, to the Pentagon and the Republican Party, it seems like no...
Cyber Security Awareness Training: How to Improve Employee Behavior
Employees are your first line of defense. Unfortunately, they're also the weakest link in your network security. It's your job to improve your first line...
How to Conduct an Internal Security Audit in Five Simple, Inexpensive Steps
Conducting an internal security audit is a great way to get your company on the right track towards protecting against a data breach and other costly...
Insider Threat 2018 Report: Is Your Business Vulnerable to an Insider Threat?
Crowd Research Partners, in association with Dashlane, recently published their annual Insider Threat Report. The results are dramatic — 90% of organizations are vulnerable to...
2018 Cybersecurity Forecast: How Artificial Intelligence Can Help Hackers Breach Your Business Passwords
81% of data breaches leverage a stolen or weak password. Artificial intelligence and machine learning are making it easier for criminals to identify these passwords quickly, putting...
Data Breach Statistics 2018 Forecast: Everything You Need to Know
When it comes to your business experiencing a data breach, the question is more when than if. [What were 2018's biggest data breaches? We listed...
2018 Cybersecurity Forecast: How To Protect Your Business From a Data Breach in 3 Simple, Inexpensive Steps
Data breaches are on the rise going into 2018, and they are wreaking havoc on businesses across the globe. There are three simple, inexpensive steps...