Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2023

How to Quickly Change All Passwords

If you don’t already have a password manager, the process of changing all your passwords can be difficult and time consuming. You can quickly change all your passwords by using a password manager like Keeper. While there are many reasons why someone would want to change all of their passwords at once, one of the main reasons could be that they found out one or more of their passwords were compromised.

What's New at Keeper Security - January 2023

We are kicking off 2023 with a number of new features, improvements and security updates to Keeper’s growing line of award-winning security solutions. Keeper prides ourselves in a culture of innovation to continually improve security and functionality for our customers – both businesses and consumers alike.

Tips to Clean Up Your Digital Footprint

Your digital footprint could make or break critical aspects of your life from getting into college to landing a new job. It’s important to clean up your digital footprint so that it doesn’t negatively impact you. You can clean up your digital footprint by deleting any accounts you don’t use anymore, not sharing personal information on social media and by using a password manager. Read on to learn more about digital footprints and what you can do to keep yours clean.

Two-Factor Authentication (2FA) Setup on iOS

Introduction For added security on supported websites and apps, use Keeper to store two-factor authentication codes. When setting up 2FA on a site or app, Keeper for iOS can serve as your time-based one-time password or “TOTP” generator. This video will review how users can easily add a two-factor verification setup code or secret key from a website or app to a new or existing Keeper record.

How Can I Help My Elderly Relatives Remember Passwords?

The best way to help seniors remember passwords is to get them a password manager that is easy to use. Password managers eliminate the need to remember multiple passwords, so they will only have to remember one master password. Continue reading to learn why a password manager is the right option for helping the seniors in your life remember their passwords.

Why DevSecOps Teams Need Secrets Management

Proper IT secrets management is essential to protecting your organization from cyberthreats, particularly in DevOps environments, where common CI/CD pipeline tools such as Jenkins, Ansible, Github Actions, and Azure DevOps use secrets to access databases, SSH servers, HTTPs services and other highly sensitive systems.

How to Protect Your Organization from Pretexting

Pretexting can occur anywhere at any time, so it’s important to understand what it is and ways you can protect employees from it. You can protect your organization from pretexting by not clicking on unsolicited links, not sharing personal information online and by educating employees on pretexting techniques. Read on to learn more about pretexting and the techniques used by cybercriminals to get victims to reveal sensitive information.

Enterprise - Harden Your Systems

We highly recommend Keeper Administrators enable the following security settings. Create two Keeper Administrators in case one account is lost or no longer accessible. Keeper Administrators hold the encryption keys used to access the Admin Console, provision users, manage enforcement policies and perform day to day user administration.

Preparing for Your Digital Afterlife With Secure Password Management

With the average person spending about two and a half hours on social media daily and possibly up to six hours on the internet, there’s no doubt we’ve all built a legacy on the web. Have you ever thought about what happens after you pass away? Will your online presence turn into ghost accounts that are inaccessible to loved ones and susceptible to attackers?

How IT Teams Can Protect Their Organization's Social Media Accounts

Social media managers play a pivotal part in enabling brands to raise awareness and connect with customers online. In that role, they sift through irrelevant and sometimes offensive content to provide prompt support and accurate information on popular platforms like Tik Tok, Twitter, Instagram, LinkedIn and Facebook. Social media is a common entry point for cybercriminals looking to get inside an organization.

Keeper for Teams and Small Business 3 Minute Demo

Introduction Keeper eliminates the pain of having to remember passwords while protecting your business from password-related data breaches and cyberthreats. Keeper stores and protects your website passwords, financial information and other sensitive documents in an encrypted vault. Keeper can generate unique, secure passwords for you that you can unlock with a single Master Password. Keeper makes it easy to login to websites without having to remember passwords ever again.

Keeper Connection Manager Adds New, Next-Gen Features for Zero-Trust Network Access

Keeper Security, the leading provider of zero-trust and zero-knowledge cybersecurity software protecting passwords, secrets and connections, today announced the latest update to its Keeper Connection Manager (KCM), which provides DevOps and IT teams with instant access to RDP, SSH, database and Kubernetes endpoints through a web browser- no VPN required.

Introducing PostgreSQL and Microsoft SQL Server Connectors in Keeper Connection Manager (KCM) 2.11.0

Keeper Connection Manager 2.11.0 introduces new connections with PostgreSQL and Microsoft SQL Server, plus other enhancements noted below. Keeper Connection Manager allows organizations to connect to endpoints without the need for VPN.

How Scammers Exploit Your Email Address

A strong password is necessary to protect yourself from cybercriminals gaining access to your online accounts. But what happens if an unauthorized user manages to access your email address? Keep reading to learn more about some of the top scenarios that may take place if a cyberattacker ever gets a hold of your email address.

Weak vs Strong Passwords: How to Spot the Difference

The safety of your identity, data and online accounts relies heavily on the strength of your passwords, which is why you should be able to tell the difference between weak vs strong passwords. The importance of password security goes far beyond personal safety, as corporate breaches due to compromised credentials affect millions of people and cost billions of dollars each year. In fact, a recent report by Verizon reveals 81% of hacking-related data breaches are due to stolen or weak passwords.

Securing Finance and Accounting Teams from Cyberattacks

Much of an organization’s most critical business and employee data passes through the hands of finance and accounting professionals. It’s one of the main reasons cyberthreats present a significant risk to finance and accounting teams — especially for small accounting firms that are directly responsible for their security.

Self-Hosted vs. Cloud-Based Password Manager

A few customers have asked about the pros and cons of a self-hosted password management solution, such as Bitwarden. Since I have a lot of experience with this topic, I thought I would share some of the key reasons to use a cloud-based password manager like Keeper, instead of a self-hosted password vault.

Is it Safe to Use Unsecured WiFi in Hotels?

No, it is not safe to use unsecured WiFi in hotels. Using any public WiFi network presents a risk to your private information and security. There are many threats that you become vulnerable to on unsecured hotel WiFi such as a man-the-middle attack or malware. Read on to learn more about the risks of using unsecured WiFi in hotels and how you can stay safe if you can’t avoid using it.

Create a Shared Folder

Keeper’s Shared Folders make sharing records with friends and family both easy and secure. Our Shared Folders provide great flexibility with improved User and Record Permission controls. To create a shared folder, click the Create New button and select Shared Folder. Enter a folder name and use the dropdown arrows to set the folder’s default user and record permissions.

Securing Lawyers and In-House Legal Teams from Cyber Risks

Whether they’re part of a law firm or in-house counsel within a company, lawyers handle sensitive information every day. That alone makes them prized targets for cybercriminals. The American Bar Association’s 2021 Technology Survey Report found that 25% of lawyers in the United States have experienced a data breach before.

How Does Keeper Protect Your Data? Security and Transparency.

Keeper Security’s zero-trust and zero-knowledge encryption model ensures that even in a worst case scenario, all of the contents of your Keeper vault would be protected with multiple layers of safeguards and encryption. Keeper has stood by its commitment to protect your most valuable data for more than a decade, through our best-in-class security model and transparent approach to sharing it with the public.

Preventing Cyberattacks Against HR Teams

IT leaders count on Human Resource (HR) departments to be partners in promoting an organizational culture that values security. From setting device usage policies on an employee’s first day to facilitating security training and awareness, HR has an important role to play in the adoption of IT policies. In their day-to-day roles, HR is critical to security in its own right.

How to Stay Compliant with HIPAA Password Requirements

The Health Insurance Portability and Accountability Act (HIPAA) is U.S. legislation that sets national privacy and security standards to protect the privacy of patient health information and prevent data breaches. In addition to doctors, hospitals, other healthcare providers, health insurance companies and “business associates” of healthcare organizations fall under HIPAA regulations.

Preventing Cyberattacks Against Marketing Teams

In promoting a company and its products, marketing oversees critical points of contact between the business and its customers. Marketing teams make sure a company and its products are known in the broader market, gain the interest of potential customers and guide customers through the buying process. Just as importantly, marketing teams promote and steward a company’s brand — one of its most valuable assets.

How to Reduce Your Attack Surface With Secure Password Management

Getting hold of a set of working login credentials is the simplest way for a cybercriminal to breach any network, which is why employee passwords are so highly sought-after by threat actors. Thanks to cloud computing, smart devices, mobility and the rise of remote work, organizations have more people and devices connecting to their networks, from more locations, than ever before.