And here at Dashlane we just can’t let a good pun get away, no matter how cheesy. (Or in this case, fishy.) Even our CEO and resident fishing enthusiast, JD Sherman, got in on the fun, demonstrating how he literally phishes fish.
Go Fishing Day? How about No Phishing Day?
So in honor of Go Fishing Day, we’re instead celebrating (and inventing) No Phishing Day by giving you a few quick tips on how to avoid phishing scams, including how a password manager like Dashlane can help prevent you and your business from taking the bait and getting hooked.
Dashlane’s phishing tips
A password manager won’t take the bait
Password managers like Dashlane know exactly which sites you have credentials for—so if you or someone in your office accidentally ends up on a malicious site disguised to look like one you know, the credentials won’t be autofilled as usual. Even just this slight moment of hesitation might save you from being tricked by “target.corn” instead of “.com” and save your company from a future data breach.
Add an extra layer of security
Worried your info may have already been compromised, or just want some extra protection? Turn on two-factor authentication (2FA) for any and all accounts that accommodate it—especially work accounts with access to sensitive business or customer data. That way, if someone does try to log in with a phished credential, the real account owner will get a text or an email, and the scammer won’t be able to get in. Dashlane’s mobile app has a 2FA feature that can work for this purpose, just like Duo or Google Authenticator.
Got caught? React fast.
If you (or a colleague) has clicked on a phishing link, react fast. Change the password for that account immediately, and make sure you do the same for any account that shares that password. (Yes, we know you reuse passwords!) If you have your accounts stored in Dashlane, this step is super simple: Open the compromised credential in Dashlane to see how many times it’s been reused, then use our Password Generator to create and store a new complex, randomized password for each affected account.