Last year, Dashlane invented “No Phishing Day.” Inspired by National Go Fishing Day, this holiday spotlights ways to avoid getting hooked by scammers. Even our CEO and resident fishing enthusiast, JD Sherman, got in on the fun, demonstrating how he literally phishes fish.
This year, we’re celebrating No Phishing Day with our newly updated free e-book for businesses, Phishing 101. We’re also giving you a few quick tips on avoiding phishing scams, including how a password manager like Dashlane can help prevent you and your business from taking the bait and getting hooked.
In 2021, 83% of U.S. organizations said they experienced a successful phishing attack. This statistic is unsettling, but education and training can help you and your teammates stay off the hook. Check out Phishing 101 for a six-step action plan to implement in your organization.
Password managers like Dashlane know exactly which sites you have credentials for—so if you or someone in your office accidentally ends up on a malicious site disguised to look like one you know, your credentials won’t be autofilled as usual. Even just this slight moment of hesitation might save you from being tricked by “target.corn” instead of “.com” and save your company from a future data breach.
Worried your info may have already been compromised, or just want some extra protection? Turn on 2-factor authentication (2FA) for any and all accounts that accommodate it—especially work accounts with access to sensitive business or customer data. That way, if someone does try to log in with a phished credential, the real account owner will get a text or an email, and the scammer won’t be able to get in. Dashlane has a variety of 2FA options that can work for this purpose, like 2FA by Dashlane and the Authenticator tool in Dashlane Password Manager, and Dashlane Authenticator, a standalone app.
If you (or a colleague) have clicked on a phishing link, react fast. Change the password for that account immediately, and make sure you do the same for any account that shares that password (though we recommend never re-using passwords in the first place if you can help it). If you have your accounts stored in Dashlane, this step is super simple: Open the compromised credential in Dashlane to see how many times it’s been reused, then use our Password Generator to create and store a new complex, randomized password for each affected account.