Breaches & Alerts
Data & Culture
Internet Safety 101
Visit Our Site
Workplace security best practices and recent news
Phishing: 5 Methods That Can Harm Your Business
Phishing attacks are difficult threats for IT and Security professionals to eliminate because existing methods continue to evolve in order to disrupt businesses of every...
Shadow IT: How to Mitigate Risks with a Password Manager
Shadow IT is inevitable. With the consumerization of IT and the proliferation of cloud applications, maintaining control over your organization’s security is becoming increasingly difficult....
Phishing Statistics: What Every Business Needs to Know
Phishing attacks are on the rise, and they're more sophisticated than ever. The reason these types of attacks are on the rise is because they're...
What’s the Best Password Manager for Your Business? Ask a U.S. Bank (Part II)
What's the best password manager for your business? In Part I, a U.S. bank laid out the blueprint for those wondering whether their business needs...
Why Does Your Business Need a Password Manager? Ask a U.S. Bank (Part I)
Why does your business need a password manager? A password manager is the best way to help your business: Eliminate password reuse Improve employee security...
PAM vs SSO vs Password Manager: Which is Best for Your Business?
Whether you're seeking a PAM (Privileged Access Management), SSO (Single Sign-On), or password management solution for your business, read this short guide to ensure you...
How a Password Manager Helps Prevent a Data Breach
A password manager is the best first line of defense against a data breach. By encouraging and enabling employees to change their poor security and...
Year of the Hack (Again)
2017 can easily be called the year of the hack. From HBO and Equifax, to the Pentagon and the Republican Party, it seems like no...
Cyber Security Awareness Training: How to Improve Employee Behavior
Employees are your first line of defense. Unfortunately, they're also the weakest link in your network security. It's your job to improve your first line...
How to Conduct an Internal Security Audit in Five Simple, Inexpensive Steps
Conducting an internal security audit is a great way to get your company on the right track towards protecting against a data breach and other costly...
Insider Threat 2018 Report: Is Your Business Vulnerable to an Insider Threat?
Crowd Research Partners, in association with Dashlane, recently published their annual Insider Threat Report. The results are dramatic — 90% of organizations are vulnerable to...
2018 Cybersecurity Forecast: How Artificial Intelligence Can Help Hackers Breach Your Business Passwords
81% of data breaches leverage a stolen or weak password. Artificial intelligence and machine learning are making it easier for criminals to identify these passwords quickly, putting...
Data Breach Statistics 2018 Forecast: Everything You Need to Know
When it comes to your business experiencing a data breach, the question is more when than if. [What were 2018's biggest data breaches? We listed...
2018 Cybersecurity Forecast: How To Protect Your Business From a Data Breach in 3 Simple, Inexpensive Steps
Data breaches are on the rise going into 2018, and they are wreaking havoc on businesses across the globe. There are three simple, inexpensive steps...
7 Last-Minute Gifts for SysAdmin Day
System Administrator Appreciation Day (SysAdmin Day) is tomorrow! Wait, you totally forgot about it, didn't you? It's okay! Unfortunately, this unofficial holiday is not as...
Passwords For Sale: Employees Would Sell Their Work Credentials for Next to Nothing
Whether you know it or not, your business has a serious security problem. The cause has nothing to do with malware or state-sponsored cyber attacks---it...
Cyber Security Awareness Training: Turn Employees into Security Experts
Your business could have world-class firewalls, anti-virus software, and other cyber security programs installed on your network, but that’s still not enough to prevent data...
4 Cyber Threats Targeting Small Businesses in 2017
It’s too dangerous for organizations of all sizes to put the issue of cybersecurity on the backburner in 2017. The National Cyber Security Alliance survey...
7 Features You Need in a Team Password Manager
A team password manager is a useful tool for any small business that wants to boost security while helping employees to manage their passwords more effectively....
68 Million Reasons Why Your Small Business Needs a Password Manager
We could offer you one compelling reason why you need a team password manager for your small business, but why not give you 68,680,741 reasons....
Password Managers are a Top Cyber Security Tool for Critical Infrastructure Systems
A cyber security researcher on a jet hacks into flight controls via its in-flight information system. A practical joker cracks the code for programming electronic...
11 Things Employees Won’t Miss After Using a Password Manager
When it comes to passwords, most of your employees believe they are protected by storing countless iterations of username and password combinations in their heads—but...
5 Things Your New Employees Need to Know About Cyber Security from Week One
If you're a CEO or IT administrator, you'll need to spruce up on cyber security training before indoctrinating new hires. If the latest Yahoo data...
How Employees, Passwords, and Network Vulnerabilities Can Cost Your Business Millions
This summer, IBM and Ponemon Institute published a startling global study on how much data breaches cost businesses per year. With approximately 90 percent of...