Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Password Management

Types of Password Attacks

Some of the most common types of password attacks include password cracking, password spraying, dictionary attacks, credential stuffing, brute force and rainbow table attacks. The better your password habits are, the less susceptible you are to password attacks. Keeper’s Password Management Report found that only 25% of respondents use strong, unique passwords for every account – meaning that 75% of respondents place their accounts at risk of being compromised due to weak passwords.

What Is the Internet of Things (IoT)?

The Internet of Things (IoT) refers to the network of physical objects – “things” – that connect and share data with the internet, other IoT devices and the cloud. IoT devices are often embedded with sensors, software and other technologies to exchange data with other devices and systems when connected to the internet. IoT devices include smart home devices like doorbell cameras and light bulbs.

Why Do Hackers Want Medical Records?

Hackers want stolen medical records to commit identity theft, use the stolen data as a ransom, sell it on the dark web or impersonate the victim to receive medical services. Medical records are valuable to cybercriminals as they allow cybercriminals to commit fraud and go undetected longer than they can with other Personally Identifiable Information (PII).

Keeper Security Introduces Granular Sharing Enforcements

Keeper Security is excited to introduce Granular Sharing Enforcements for all products in the Keeper® platform. This feature, an extension of Keeper’s robust existing sharing policies, enables administrators to apply detailed restrictions for record creation and sharing to user roles. By doing so, Keeper Admins can easily enforce the principle of least privilege and simplify compliance.

What To Do if You Get Scammed While Shopping Online

Online shopping has allowed buyers to find bargains and conveniently purchase from retailers all over the world. However, cybercriminals take advantage of the anonymity of online shopping to scam online buyers. If you get scammed while shopping online, you need to contact your credit card issuer, freeze your credit, change any compromised passwords, contact the online marketplace and report the scam to the FTC.

Are Passkeys Phishing-Resistant?

Yes, passkeys are phishing-resistant because they are built on the WebAuthn standard which is an authentication standard that uses public key cryptography to authenticate a user’s identity before they’re able to log in to their account. Continue reading to learn more about what makes passkeys phishing-resistant, plus the additional benefits of signing in to your accounts with passkeys over passwords.

What To Do if Your Online Accounts Keep Getting Hacked

If your online accounts keep getting hacked, you should scan your computer for malware, update your account passwords, enable MFA, check your account’s settings for suspicious changes, change your account’s security questions and place a fraud alert on your credit report. Continue reading to learn the signs that point to your online account being hacked, steps to take when your account is hacked and how to prevent your account from being hacked again.

What Is Digital Identity?

Digital identity refers to the collection of data that represents an entity online. Digital identity can represent users, organizations or electronic devices and consists of their accounts, credentials, certificates, behaviors and usage patterns. In Identity Access Management (IAM), digital identity is needed to authenticate a user and authorize their permissions to access sensitive data.