Breaches & Alerts
Data & Culture
Internet Safety 101
Product News & Tips
Visit Our Site
Workplace security best practices and recent news
Protect Your Data When a Third-Party Website Gets Hacked
Learn how to quarantine compromised data when a trusted partner is attacked. When a high-profile data breach occurs, people aren’t necessarily worried about the company...
Security Conferences Provide Great Benefits for Business Leaders
Decision-makers need to be up-to-date on the latest cybersecurity risks. Trade shows are an important part of almost every industry. These events provide crucial networking...
As Elections Near, Trouble Brews for SMB Security
Many SMB executives feel they are prime targets for foreign attackers who wish to wage cyber war and breach national security. In the current climate,...
Think Beyond IT When Assessing Cybersecurity Risks
Hackers don’t limit themselves to technical exploits—and neither should you. Despite the implications of its name, cybersecurity is more than just an IT issue. Some...
Can You Trust Your Web Browser With Your Passwords?
Learn about the advantages and drawbacks of letting your browser store your passwords. Google Chrome, Firefox, and Safari allow users to store their passwords using...
Password Management in the Age of Data Privacy
Service providers have to be careful about how they capture user data. The internet will not be secure until every user enjoys guaranteed data privacy....
Don’t Fall Victim to Password Mistakes in the Office
Employees often have these five misconceptions when choosing passwords for work. Strong password creation is a necessity in the workplace, yet a vast number of...
Ensure Password Security for Remote Workers
Balance connectivity and security in your password management policy. How many of your employees share passwords with one another? At first, you might want to...
Password Manager Storage: Cloud vs. Local
Discover the pros and cons of each storage medium for security application. Most people would assume that if you want to keep something safe, you...
The Importance of End-User Experience in Selecting Password Management Tools
IT leaders need to prioritize the end-user experience when it comes to security software. It’s a well-known fact that an organization’s security chain is only...
Sharing Passwords Through Slack Is Risky
Make sure your employees know how to identify a secure channel for password sharing. Securely sharing a password is no easy task. Organizations that enforce...
Size Doesn’t Matter: Cybercriminals Target Small & Mid-Size Businesses
Although major data breaches make headlines, smaller companies are at a larger risk. Yahoo. Equifax. Marriott. High-profile data breaches involving hundreds of millions of users...
Security Management Terms Explained: A Cybersecurity Glossary
Make sure your entire team is on the same page when it comes to cybersecurity. Acronyms and buzzwords frequently pop up in conversations among IT...
Secure Executive Support for Password Management Tool Adoption
Find out how to bring corporate leadership onboard with modern security. Convincing leadership to make changes for the organization you work for requires hefty effort...
Reduce Employee Involvement in Cybercriminal Activity
Use encryption the right way and keep employees vigilant. Ask any IT professional to describe who their cybersecurity policy defends against, and they will likely...
Password Security Breaches: Biggest Concern for IT Leaders
Password security exploits are among the easiest for cybercriminals. The password security breach. It’s the simplest exploit in the book. The first thing any cybercriminal...
Data Breach E-Book: How to Empower Employees and Protect Your Business
Are you worried about a data breach at your organization? You should be. But you should also be able to rest easy knowing you put...
Security + Convenience: Why Your Business Needs a Password Manager
Data breach! The phrase itself is enough to make even the most seasoned IT or security professional cringe. Hackers who exploit weaknesses in your security...
Data Breaches and Weak Passwords: A Love Story
Data breaches and malware attacks make headlines every day – and huge, household names are no longer the sole target. Small and mid-sized businesses are...
AI Enters the Business World – How Will it Impact Your Cybersecurity?
Artificial Intelligence, in all of its forms, is here to stay. Any process a machine takes over can be considered AI. In this case, we'll...
Dashlane Business: Our 5 Key Principles
Dashlane Business was inspired by a steady and growing chorus of requests: "I love Dashlane—but I wish all my employees could have the simpler, safer web...
Phishing: 5 Methods That Can Harm Your Business
Phishing attacks are difficult threats for IT and Security professionals to eliminate because existing methods continue to evolve in order to disrupt businesses of every...
Shadow IT: How to Mitigate Risks with a Password Manager
Shadow IT is inevitable. With the consumerization of IT and the proliferation of cloud applications, maintaining control over your organization’s security is becoming increasingly difficult....
Phishing Statistics: What Every Business Needs to Know
Phishing attacks are on the rise, and they're more sophisticated than ever. The reason these types of attacks are on the rise is because they're...