Breaches & Alerts
Data & Culture
Internet Safety 101
Product News & Tips
Visit Our Site
Workplace security best practices and recent news
Case Study: How ePromos Personalized Their Password Security and Improved Productivity
What happened when one of the fastest-growing promotional products companies in the U.S. realized they had a password problem? They called Dashlane.
Increase Your Law Firm Security by Using a Password Manager
Law offices are a target for hackers. Here’s how a password manager can boost your law firm's security, keep your data safe, and make your...
You Asked, A Hacker Answered: 7 Questions With Rachel Tobac
Social engineering expert and white-hat hacker Rachel Tobac tells us just how cautious we should be online.
Suiting Up for ISO 27001 Certification—Simplified
Infosec leader Naya Moss breaks down the key steps to prepare for a process that can be intimidating to many: ISO 27001 certification for your...
Marketers, Here’s How—and Why—You Should Be Managing Your Team’s Passwords
Managing team passwords can be an overwhelming task. So how do you make logins simpler for you and your team and create secure business passwords?
From Maiden Names to School Mascots—The Best Ways to Use Security Questions
Security questions might not be the most effective method of securing access points, but you can learn tips and tricks for making the most of...
3 Times a Major Tech Company Was Hacked—And What Marketing Teams Can Learn
What can your marketing team learn from the Twitter, Facebook, and Canva data breaches?
Why Your Marketing Team Needs a Password Manager
Our technology and marketing experts use password managers every day. Learn how Dashlane is here to assist you in your technology and security needs.
What Is SSO? Work Simpler With This One Tool
What is SSO? Learn about the tool that can help users streamline their workflow and improve security.
3 Strategies to Prevent Breaches and Hacks at Work
Here are the three essential strategies for preventing data breaches and hacks, and other ways to enact damage control.
3 Key Steps to Building a Compliance Training Program
Guest contributor Naya Moss is an IT pro and infosec leader breaking down the basics of creating your own compliance training.
Top 5 Benefits and 3 Challenges of Implementing Identity and Access Management
Cybersecurity risks are on the rise, especially when it comes to data-driven companies. Identity and Access Management (IAM) can help.
How to Get Perfect UX by Setting Up Your Forms for Dashlane
Learn this tiny change you can make to your website for faster and even more reliable Dashlane integration.
What to Do If Your Company’s Been Hacked or Breached
When it comes to hacks or breaches at your business, the quicker you act, the better. Here’s everything you need to do if you experience...
Executive Order on Cybersecurity Names Password Managers Critical Software—What It Means for Your Business
After a recent executive order on cybersecurity, federal government now views password managers as critical to endpoint security—and you should, too.
Create a Culture of Cybersecurity: Teach Employees to “Catch a Phish”
At the end of the day, negative emotions won’t help you build an effective culture of cybersecurity awareness. HR departments should make it their goal...
What Is a Human-Centric Security Culture?
IT pro and infosec leader Naya Moss breaks down the basics of human-centric cybersecurity.
The 7 Steps of a Cyberattack—And How to Prevent Them
Here, we break down the anatomy of cyberattacks and compare outcomes between companies with and without security solutions in place.
Cybersecurity Journalist Nicole Perlroth on How to Protect Your Data Amid a Global Cyber Arms Race
The New York Times journalist and author of "This Is How They Tell Me The World Ends" shares her predictions for the future and life-saving...
Highlights From Our First Business Customer Town Hall
We shared a look at some of our product plans and recent enhancements, including a demo of our new machine learning autofill.
6 Cybersecurity Threats That Lead to Business Breaches and Hacks
These are the most common threats to look out for so your company can prevent cybersecurity incidents.
The 3 Most Important Aspects of Company Cybersecurity
When it comes to cybersecurity in business, the 3 most important aspects are employees, tech, and processes.
Data Breach or Hack? Know the Difference.
We tend to use the terms interchangeably, but it’s important to know how to protect your company against both types of cyberattacks.
The 4 Security Personalities You’ll Meet At Work
There are four main ways employees approach cybersecurity. Here’s what you can expect from each approach.