Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

April 2023

What is a Cyberattack?

A cyberattack is an attack on computers, networks or systems by cybercriminals in an attempt to steal or access sensitive information. The information stolen during an attack can also open the door to other types of cyberattacks such as social engineering scams. Continue reading to learn more about cyberattacks and what you can do to protect yourself against them, both in your personal life and at your workplace.

Eliminating Secrets Sprawl: Keeper Secrets Manager Named an Overall Leader in KuppingerCole's 2023 Report

KuppingerCole Analysts AG, a global information-security analyst firm, named Keeper Security a leader in its 2023 Leadership Compass – Secrets Management report based on product strength, market presence and innovation. Specifically designed to fully manage and protect an organization’s cloud infrastructure with zero-trust and zero-knowledge security, Keeper Secrets Manager (KSM) was rated as a top performer in the following categories.

What is the Most Secure Way to Store Cryptocurrency?

The best and most secure way to store cryptocurrency private keys, passwords and mnemonic phrases is in a password manager. A password manager encrypts all data, making it a secure option for storing what you need to access your cryptocurrency without it getting into the wrong hands. Read on to learn more about cryptocurrency and what you can do to better protect yours.

Introducing 24-Word Recovery Phrases - The Most Secure Recovery Method

Keeper Security continually invests in new, more robust technologies to counter emerging threats. That’s why Keeper is upgrading our account recovery process via a new and more secure 24-word “recovery phrase” feature, replacing the current user-customizable security question-and-answer recovery method.

What is Password Sharing?

You may be hearing about password sharing more often these days as Netflix cracks down on users sharing logins with anyone outside their household. The new rule has been met with strong opposition by those who share streaming logins with friends and family. For many, password sharing has become the norm when it comes to streaming services. Password sharing refers to the act of sharing login credentials with other people so they also have access to your account.

Vault Recovery Phrase

Keeper maintains the most security certifications in the industry and is committed to continually evolving our security methods in order to protect your data. As a result, we are upgrading our account recovery system with a new recovery phrase method. A recovery phrase is a simple, auto-generated set of 24-words that can be used to restore access to your Keeper Vault in the event you forget your Master Password.

Password Management is Critical to Your Cybersecurity Strategy

From generating strong passwords to monitoring the security policies and practices of a company, password managers are powerful solutions that defend companies against cyberthreats and improve employee productivity. Continue reading to learn more about why password management is critical to every organization’s cybersecurity strategy.

Closing the Cybersecurity Front Door: Addressing the Federal Government's Security Gaps

The Office of Inspector General (OIG) recently evaluated the Department of Commerce’s (DOC) cybersecurity program, uncovering critical failures that exposed the DOC to potential risks. Specific issues included the use of default passwords for administrative accounts, compromising over 100,000 pieces of personal identifiable information (PII).

What is SIM Swapping?

SIM swapping is when a cybercriminal impersonates someone in order to convince a mobile carrier to activate a new SIM card. These bad actors use social engineering tactics, claiming “their phone” was supposedly lost, stolen or damaged, when in reality, it was never their phone to begin with. When a cybercriminal successfully SIM swaps, they can more easily steal someone’s identity because they can now receive their text messages and phone calls.

Password Security Best Practices for Businesses

Organizations spend billions of dollars on cybersecurity tools and consultants each year. Beyond traditional tools like firewalls, antivirus software, and System Information and Event Management (SIEM), it is easy to get caught up in sophisticated threat detection using artificial intelligence, machine learning, user behavior and analytics.

Understanding and Preventing Ransomware Attacks

Understanding ransomware attacks is the first step in being able to prevent them from successfully targeting an organization. To prevent ransomware attacks, organizations must have strong security protocols in place such as performing regular system backups and training employees to avoid social engineering scams, among other measures. Continue reading to learn more about ransomware attacks and what organizations can do to stay protected against this type of attack.

Choosing The Right IAM Solution For Your Business

Password security plays a fundamental role in Identity and Access Management (IAM). The easiest way for cybercriminals to breach an enterprise network is to obtain a set of legitimate login credentials. This allows them to bypass firewalls, intrusion detection systems and other technical security solutions. Once inside, they can remain undetected for extended periods of time.

Introducing Keeper's UI Refresh

The Keeper you know and love is getting a fresh, updated look, with a friendlier, accessible and more intuitive experience. Keeper’s new user interface offers clearer distinctions between elements as well as enhanced clarity and navigation – all improving usability in order for our users to take full advantage of Keeper’s powerful features.

How to Protect Your Company's Social Media Passwords From Cybercriminals

All businesses, regardless of size or industry, are potential targets for cybercriminals. As businesses become more aware of the importance of password security in preventing data breaches, they focus on the most obvious areas of weakness, such as employee email accounts and network passwords. However, social media passwords present unique security challenges that organizations may be ill-prepared to handle.

What is Search Engine Phishing?

Search engine phishing, also known as SEO poisoning, is when cybercriminals use search engine optimization to appear as the top results on a search engine in an attempt to lead searchers to a spoofed website. The spoofed website is made to look like a legitimate site so that those who click on it proceed to log into their accounts like usual.

Strengthening CJIS Compliance with Keeper Security: Protecting State Agencies and Law Enforcement

In November 2022, the Criminal Justice Information Services (CJIS) division of the FBI updated its cybersecurity policy, impacting state agencies, police departments, and other organizations that handle Criminal Justice Information (CJI). The updated policy poses challenges for organizations, especially smaller ones, to maintain compliance due to limited resources, lack of expertise and the policy’s complexity.

G2 Names Keeper a Leader in Password Management for Spring 2023

G2, a business-to-business (B2B) software site, released its Spring 2023 report on password management. The report is based on aggregated ratings from users on G2 and a comparison with other reviews for similar products. Keeper Security was rated as a leader in the Enterprise, Mid-market and Small Business categories. G2 users also named Keeper as a Leader in Europe, Best Usability and a Momentum Leader, along with other recognitions in the Password Manager category.

Keeper Unveils New UI for a More Intuitive Customer Experience

The Keeper Vault has an updated look with modern styling for a friendlier and more intuitive user experience. In addition, Keeper’s upgraded User Interface (UI) offers clearer distinctions between elements, as well as enhanced clarity and navigation, improving usability and accessibility.

Choosing the Right Keeper Plan for Your Business

Increased security risks, heightened compliance regulations, distributed workforces and personnel turnover all create password-related challenges that have prompted organizations across the globe to improve their cybersecurity posture. To this day, stolen and weak passwords are the leading cause of data breaches, yet most organizations have no visibility, security or control over their users’ passwords, credentials and secrets.

Three Ways VPNs Make Remote Access Less Secure

Virtual private networks (VPNs) were introduced roughly two decades ago with the idea that creating an encrypted tunnel directly from a computer device to a network would provide secure access to company resources and communications from remote locations. VPN performance was notoriously sluggish, and they were difficult and time consuming for IT to administer, but at least the appliances were secure. Or so people thought.

LastPass Import Using Single Sign On (SSO) or Federated Login

Migrating your users from LastPass to Keeper is simple and secure. All information stored in LastPass, including passwords, folders, subfolders, custom fields and notes can be moved to Keeper with just a few clicks. Lastpass users who are using Single Sign-On (SSO) or a Federated Authentication Platform such as Okta, Azure and Google, can import credentials, secrets and other data directly into Keeper using our Desktop Application. Our automated import tool now supports both Master Password and federated SSO login methods.

Types of Phishing Attacks

There are several types of phishing cyberattacks such as smishing, whaling and spear phishing. It’s important to understand the different types of phishing attacks there are so you’re able to spot them. Knowing the different types of phishing attacks can make all the difference in keeping your information protected. Continue reading to learn more about the different types of phishing attacks and how you can keep yourself safe from them.

Shielding Critical Infrastructure: Conquering Ransomware with Keeper Security Government Cloud

The Biden Administration’s 35-page National Cybersecurity Strategy released in March 2023 emphasizes the growing importance of cybersecurity for both private companies and federal agencies. The strategy specifically highlights ransomware as a significant concern, particularly in terms of its impact on private companies that collaborate with the federal government or are critical to national security.

What's New at Keeper Security - March 2023

Keeper continues to release new features for consumers, businesses, enterprises and managed service providers. Our latest release includes significant enhancements such as a Business Support Portal for our business customers, multiple vault integration capabilities for Keeper Connection Manager (KCM), a Google Cloud integration with Keeper Secrets Manager (KSM), CAC/PIV integration for agencies and more.