Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Featured Post

Into the future: what might cybersecurity look like in 2023?

As we enter into 2023, cybersecurity must be at the forefront of our minds. With hackers becoming increasingly sophisticated in their techniques and the number of endpoints growing exponentially due to the explosion in the number of connected devices, it is critical that over the next 12 months we consolidate our efforts to stay one step ahead of the threats.

Why Small Businesses Need a Password Manager

Small business owners often have to wear many hats to keep their businesses up and running. As these businesses move forward and grow in size, not only do the responsibilities build up, but so does the risk of cybercrime. For small businesses, a password manager is essential as it guarantees secure password sharing, simplifies onboarding and offboarding employees and more.

What Is an Incident Response Plan?

An incident response plan assigns responsibilities and lists procedures to follow if an event such as a breach were to occur. Having a plan put in place to handle cybersecurity incidents at your business can aid your business in identifying when a cyberattack is taking place, how to clean up the mess that an attack leaves and prevent an attack from happening again. Read on to learn why an incident response plan is needed, incidents that require response plans and more.

The Future of Passkeys with Keeper Security

Did you forget your password…again? Wouldn’t it be great if you never had to deal with passwords ever again? Well, we’ve got great news for you! Meet the passkey, a brand-new passwordless technology built on industry standards by the World Wide Web Consortium (W3C) and the FIDO Alliance and backed by Apple, Google and Microsoft. Read on to find out what you need to know about passkeys – and all about how Keeper is planning to support them in 2023.

How to Prevent Credential Stuffing Attacks

Credential stuffing is on the rise. The number of annual credential spill incidents nearly doubled between 2016 and 2020, according to the F5 Labs 2021 Credential Stuffing Report. Organizations need to be wary of sophisticated attackers or risk becoming a victim of a credential stuffing attack. As one of the most common account takeover techniques, your team must be equipped with the knowledge necessary to prevent this from happening.

What Is Cyber Insurance?

Cyber insurance is a specialized insurance policy that was created to protect businesses from the losses that can occur as a result of cyber attacks. The size of your business does not matter when it comes to needing cyber insurance, and it shouldn’t be your only priority when it comes to your business’s cybersecurity. Read on to learn more about cyber insurance coverage and its cost.

What to Look for in a Password Manager

Using unique passwords is one of the best practices for securing online accounts, but trying to memorize dozens of passwords across all your applications is nearly impossible. A password manager helps to protect access to online accounts by securely storing credentials. In this article, we discuss the features and benefits of a reliable password manager and how they work.

Top Myths About Password Security

A study by Google reveals that about 75% of Americans feel frustrated about passwords, so it’s easy to understand why people would adhere to common “guides” about password security. You need to be careful about misinformation and what counts as good password hygiene. In this blog, we discuss nine popular myths and misconceptions about password security, the right approach to password security and the importance of deploying password managers.