Breaches & Alerts
Data & Culture
Internet Safety 101
Product News & Tips
Visit Our Site
Uncharted Digital Waters: How Private Are Telehealth Platforms?
Since the start of the pandemic, telehealth platforms have been more necessary than ever. But are they a target for cybercriminals?
3 Strategies to Prevent Breaches and Hacks at Work
Here are the three essential strategies for preventing data breaches and hacks, and other ways to enact damage control.
3 Key Steps to Building a Compliance Training Program
Guest contributor Naya Moss is an IT pro and infosec leader breaking down the basics of creating your own compliance training.
What’s Your Number? How to Avoid Port-Out Scams.
Hackers can use your cell phone number for a cyberattack known as a port-out scam. Here’s how they work and how you can protect yourself.
What to Do If Your Company’s Been Hacked or Breached
When it comes to hacks or breaches at your business, the quicker you act, the better. Here’s everything you need to do if you experience...
Executive Order on Cybersecurity Names Password Managers Critical Software—What It Means for Your Business
After a recent executive order on cybersecurity, federal government now views password managers as critical to endpoint security—and you should, too.
Create a Culture of Cybersecurity: Teach Employees to “Catch a Phish”
At the end of the day, negative emotions won’t help you build an effective culture of cybersecurity awareness. HR departments should make it their goal...
What Is a Human-Centric Security Culture?
IT pro and infosec leader Naya Moss breaks down the basics of human-centric cybersecurity.
The 7 Steps of a Cyberattack—And How to Prevent Them
Here, we break down the anatomy of cyberattacks and compare outcomes between companies with and without security solutions in place.
Cybersecurity Journalist Nicole Perlroth on How to Protect Your Data Amid a Global Cyber Arms Race
The New York Times journalist and author of "This Is How They Tell Me The World Ends" shares her predictions for the future and life-saving...
6 Cybersecurity Threats That Lead to Business Breaches and Hacks
These are the most common threats to look out for so your company can prevent cybersecurity incidents.
The 3 Most Important Aspects of Company Cybersecurity
When it comes to cybersecurity in business, the 3 most important aspects are employees, tech, and processes.
Recent Wave of Cyberattacks Proves No Industry Immune
When it comes to hacking, industry immunity is a myth, and no government agency is too obscure. Protect your business by setting up a password...
The 4 Security Personalities You’ll Meet At Work
There are four main ways employees approach cybersecurity. Here’s what you can expect from each approach.
This Is How You Build a Security-First Culture at Your Company
For IT admins, keeping tabs on employee passwords can seem daunting, but Dashlane has the tools to make it simple. Once you’ve identified weak passwords...
Why Employees Shouldn’t Let Browsers Save Their Passwords
Allowing browsers to save passwords is a temptation for many employees, but there is a safer and simpler way: using an independent password management app.
Is Your Work Laptop Secure?
Nowadays, where does your kitchen table end and your desk begin? When does your morning routine end and your first hour on the clock begin?...
New Attacks Targeting Remote Workers, Recent CISA Analysis Reveals
The shift to remote work has forced companies to change how they think about their security. CISA recently published a report highlighting an increase in...
Why SSO and a Password Manager Are the Perfect Pair
Salt and pepper. Peanut butter and jelly. Monday morning and a big pot of fresh coffee. Some things are just better together—like single sign-on and...
How Secure Are Your Cybersecurity Tools?
Keeping your business secure as risks grow is no easy feat. But despite spending more money on security, many organizations don’t have full confidence in...
5 Flawless Ways to Launch a Password Manager in Your Company
You’ve found the perfect password manager. Here’s how to implement it company-wide and do away with ineffective password solutions for good.
5 Quick Tricks to Improve Your Online Security in 5 Minutes
Cybersecurity is an issue that impacts every business and individual, and depends on strong technology systems combined with intelligent habits. But where to begin? It...