Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

April 2024

The Benefits of Using Keeper as Your Password Manager

Using Keeper Password Manager can prevent you from getting hacked. It also secures your most important data and takes the pain away from remembering multiple passwords. Continue reading to learn more about Keeper Password Manager and the benefits it offers for personal and business use.

Keeper Security Forges Cybersecurity Partnership With Williams Racing

Keeper is excited to announce a new multi-year partnership with Williams Racing, uniting two organizations driven by innovation, cutting-edge technology, excellence and high-speed performance. In a sport where milliseconds can determine victory, protecting sensitive data is paramount. Williams Racing understands this necessity, making the partnership with Keeper Security a natural fit.

Keeper Webinar: Building a Robust Governance, Risk & Compliance Framework: Challenges & Solutions

IT Compliance doesn't have to be chaotic. Join Teresa Rothaar, Keeper Security's Governance Risk & Compliance Senior Analyst, in this webinar for ActualTech Media on the challenges and solutions to build a robust GRC framework. Keeper helps every organization get full visibility and control over employee password strength, credential sharing, permissions, zero-trust network access and dark web exposure, strengthening auditing and compliance for HIPAA, PCI DSS, SOX, GDPR, CCPA and more.

What Are Zero Standing Privileges?

Zero Standing Privileges (ZSP) is a Privileged Access Management (PAM) strategy in which organizations limit access to sensitive data by removing all permanent user access. It requires users to request specific access to resources needed to complete a task. However, instead of granting users continuous access, ZSP will grant them temporary access until the task is complete.

How Organizations Can Prevent Credential Theft

Credential theft is one of the most common methods used by cybercriminals to gain unauthorized access to an organization, according to Verizon’s 2023 Data Breach Investigations Report. Credential theft places organizations at a greater risk of data breaches, so steps must be taken to prevent it.

How Password Managers Protect You From Cyber Attacks

Cybercriminals use a variety of cyber attacks to steal your sensitive information. However, a password manager can help prevent you from falling victim to them. Password managers protect your sensitive information from being stolen by unauthorized users by ensuring that your passwords are strong and unique. They also protect your sensitive information from getting stolen by using autofill features and encryption.

What Is Security Posture?

Security posture refers to the overall strength of an organization’s cybersecurity. It measures how an organization’s mechanisms, policies, procedures and operations respond to and defend against cyber threats. Continue reading to learn more about security posture, why your organization’s security posture is important, how to assess it and how to improve it.

How To Protect Your HubSpot Account With a Password Manager

All of your accounts, including your HubSpot account, are at risk of being hacked if they’re not properly secured. A password manager can help protect your HubSpot account by aiding you in creating strong passwords and passphrases, generating and storing 2FA codes, helping you identify fake websites and sending you dark web alerts.

Password Manager for IT Teams

Without a password manager, it’s difficult for IT administrators to have visibility and control over employee password practices. This gap places organizations at a greater risk of suffering password-related cyber attacks which can lead to a devastating data breach. Keeper Password Manager helps IT teams gain complete visibility and control over employee passwords while providing them with best-in-class security, and enabling better collaboration and productivity between team members.

How to Share a Keeper Record on Android

Keeper’s Android mobile app makes it easy to securely share records with friends and family. To share a record with another Keeper user, select the record from your vault and tap Share, then Share with User. Enter the user's email address or select it from the dropdown, then use the toggle buttons to choose what permissions the user will receive such as: “Can Edit”, “Can Share” and "Make Owner". If you do not enable any permissions, the user will have “view only” access. Upon tapping Save, the user will receive an email notifying them that you have shared a record.

What Is Ciphertext?

Ciphertext refers to data that is encrypted and unreadable. The only way to read encrypted data is by decrypting it using an encryption key. Since ciphertext can’t be read without providing the encryption key, it’s the best way to protect your sensitive data from prying eyes and unauthorized access. Continue reading to learn more about ciphertext and the important role it plays in cybersecurity.

Keeper Simplifies Logins With a Passphrase Generator

Keeper Security is pleased to announce that passphrases are now supported in the Keeper Vault. Passphrases provide a highly secure yet easy-to-remember approach to logins for all users, and can be both generated and stored with Keeper. Keeper’s passphrase generator is a new option within its existing password generator. Users and admins will have the choice of which generator they would like to use or enforce for their organization.

How To Prevent Brute Force Attacks

Brute force attacks are one of the most common methods used by cybercriminals to steal credentials from organizations. To prevent brute force attacks, organizations need to enforce the use of strong and unique passwords, invest in a business password manager, require employees to enable MFA, monitor and limit login attempts, implement passwordless authentication and delete inactive accounts.

Six Ways To Prevent Privilege Escalation Attacks

Organizations need to prevent privilege escalation attacks to protect their sensitive data from unauthorized access. To prevent privilege escalation attacks, organizations should implement least privilege access, follow password security best practices, enforce Multi-Factor Authentication (MFA), keep software up to date, monitor network traffic and regularly run penetration tests.

How to Install Keeper Commander CLI

Keeper Commander is a command-line and SDK interface to Keeper® Password Manager. Commander can be used to access and control your Keeper vault, perform administrative functions (such as end-user onboarding and data import/export), run reports and create custom automations. Keeper Commander is an open source project with contributions from Keeper's engineering team and partners. Keeper recommends installing Commander using the binary installation. On the Commander Github page, the current commander build is always available via the releases link.

Keeper 101 - How to Autofill Passwords and Forms With KeeperFill

Introduction KeeperFill is Keeper’s powerful, autofilling feature that works across all devices, allowing you to automatically and securely enter your usernames, passwords, passkeys, 2FA codes and more. I KeeperFill is available for every web browser including: Chrome, Firefox, Safari, Edge, Opera, Brave and any other Chromium-based browser.

Keeper 101 - How to Change Passwords Using Keeper

Long, randomly generated passwords that are created for each of your account logins help protect you from cybertheft and account takeover. This video will review KeeperFill’s password change feature using the password generator, which makes the process of changing high-risk passwords easy and secure. To begin, be sure you’ve installed our KeeperFill Browser Extension.

Keeper for Teams and Small Business 3 Minute Demo

Keeper eliminates the pain of having to remember passwords while protecting your business from password-related data breaches and cyberthreats. This video will demonstrate all that Keeper has to offer your small business and provide you with step-by-step instructions to get your team up and running in no time. If you're looking for an Enterprise demo with SSO and advanced capabilities, make sure to check out Keeper Enterprise.

How To Create a Positive Digital Footprint

Your digital footprint is the trail of data you leave behind online. It’s important to have a positive digital footprint to maintain your relationships, help you in all your personal and professional endeavors, and keep cybercriminals at bay. To create a positive digital footprint, you need to remove any negative posts, post positive content, think before you post, and interact with others with respect and kindness.

DevOps Security Challenges and Best Practices

Some of the challenges when adopting DevOps security, also known as DevSecOps, are placing too much focus on tools rather than processes, cultural resistance, weak access controls and poor secrets management. While implementing DevOps security comes with its challenges, there are several best practices organizations can follow to make its implementation as effective and seamless as possible, including proper change management, combating secrets sprawl and following the principle of least privilege.

How to Transfer a Keeper Account

Learn how to transfer a Keeper Account in less than 2 minutes with our step-by-step guide. When an employee leaves the organization, an administrator with the proper permissions can transfer a user's vault to another user. Account Transfer is an optional feature that should be configured during the initial deployment phase of the Keeper rollout. A successful transfer requires that the users have logged in at least once prior to the transfer action.

What Are the Five Pillars of Zero-Trust Security?

The zero trust maturity model is a Cybersecurity and Infrastructure Security Agency (CISA) initiative to help achieve a modern approach of zero trust through the implementation of five pillars with cross-cutting capabilities. The five pillars of zero-trust security are identity, device, network, application and workload and data.

Implicit Trust vs Explicit Trust in Access Management

While trust plays an important role in access management, not all types of trust are created equal. When it comes to access management, there are two types of trust to pay close attention to, implicit trust and explicit trust. Let’s go over what these types of trust are in access management and how they differentiate from one another.

Keeper Protects From Stolen Credentials With Secure Time-Limited Access

The security concept known as “Privilege Creep” occurs when an individual accumulates access rights over time, retaining entry to systems and data beyond the completion of a specific task or the need for such access. This gradual accumulation of unnecessary privileges within an organization not only complicates the management of access rights but also magnifies the potential for security breaches, data theft and misuse of information.

Seven Best Practices for Privileged Access Management

Privileged Access Management (PAM) protects an organization’s most critical systems and accounts from unauthorized access, making it important to have a good PAM strategy in place. Some of the best practices to develop a good PAM strategy include implementing least privilege access, monitoring privileged accounts, adopting password security best practices, requiring multi-factor authentication and auditing privileges regularly.

Eight Common Attack Vectors Organizations Need To Be Aware Of

An attack vector, also known as a threat vector, is a way for cybercriminals to gain access to an organization’s network or system. Some common types of attack vectors that organizations need to defend against include weak and compromised credentials, social engineering attacks, insider threats, unpatched software, lack of encryption and misconfigurations. Organizations must identify all of the potential attack vectors and protect their network against them to avoid security breaches.

How To Securely Manage Database Access for Remote Users

The best way to securely manage database access for remote users is by using a Privileged Access Management (PAM) solution. PAM solutions provide full visibility and control over database access to prevent privilege misuse, reducing the likelihood of an insider threat harming your organization.

Introducing Time-Limited Access

As an enhancement to Keeper’s secure sharing capabilities, Time-Limited Access allows you to securely share credentials or secrets with other Keeper users on a temporary basis, automatically revoking access at a specified time. Time-Limited Access prevents long standing privileges and ensures that information is removed from the recipient’s vault, greatly reducing the risk of unauthorized access. Time-Limited Access brings several key benefits to users and administrators.

How KeeperFill Protects You From Spoofing Attacks

Spoofing attacks are a common cyber attack that tricks people into revealing their login credentials by pretending to be a legitimate business website. Password managers, like Keeper Password Manager, have an autofill feature that can help protect against this type of attack. If you land on a spoofed website, Keeper’s autofill feature, KeeperFill®, will not fill in your login credentials if the URL stored in your password vault does not match the website you’re on.

Passkey Support Across KeeperFill, iOS and Android

Keeper is excited to announce that it now supports passkeys for mobile platforms on iOS and Android. This update extends passkey management functionality in the Keeper Vault beyond our earlier launch of Keeper browser extension support for Chrome, Firefox, Edge, Brave and Safari. A passkey is a cryptographic key that lets users log in to accounts without having to enter a password. Passkeys have seen rapid adoption since their introduction in 2022 and Keeper is proud to enable their use across devices, bringing users a more secure and streamlined authentication experience.

Keeper 102 - How to Set Biometric Login in Keeper on iOS

Biometric login, especially when paired with Keeper, is a time saving, convenient feature that allows you to login to Keeper with biometrics such as “Face ID”. To enable biometric login, navigate to the Settings screen in the Keeper app and toggle “Biometric Login”, “on”. Next time you want to log in to Keeper, simply tap the Face ID icon to initiate face recognition. Please note, Face ID must be configured in your device's settings before using it to login to Keeper.

Why You Should Use a Password Manager in 2024

You should use a password manager in 2024 because a password manager protects your login credentials and keeps your online data safe. Password managers do more than just protect and store passwords; they also store your passkeys, generate new, strong passwords, and let you store and securely share important documents such as medical records, identification cards, credit cards and more. Continue reading to learn why using a password manager is important in 2024 and the risks associated with not using one.