Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is SIM Swapping?

SIM swapping is when a cybercriminal impersonates someone in order to convince a mobile carrier to activate a new SIM card. These bad actors use social engineering tactics, claiming “their phone” was supposedly lost, stolen or damaged, when in reality, it was never their phone to begin with. When a cybercriminal successfully SIM swaps, they can more easily steal someone’s identity because they can now receive their text messages and phone calls.

Password Security Best Practices for Businesses

Organizations spend billions of dollars on cybersecurity tools and consultants each year. Beyond traditional tools like firewalls, antivirus software, and System Information and Event Management (SIEM), it is easy to get caught up in sophisticated threat detection using artificial intelligence, machine learning, user behavior and analytics.

Random but Memorable - Episode 10.6: Show Smart Passkey Support

Is this really the 'death of passwords'? ��🔤 Steve Won, Chief Product Officer at 1Password, jumps into the deep end on today's show. Tune in, as we cover all things passwordless, passkeys, and how 1Password is leading the way to a passwordless future. We also lift the lid on all the latest security news in Watchtower Weekly, and reveal the iconic Random but Memorable game you voted to bring back in our listener poll! 🥁🗳️

Understanding and Preventing Ransomware Attacks

Understanding ransomware attacks is the first step in being able to prevent them from successfully targeting an organization. To prevent ransomware attacks, organizations must have strong security protocols in place such as performing regular system backups and training employees to avoid social engineering scams, among other measures. Continue reading to learn more about ransomware attacks and what organizations can do to stay protected against this type of attack.

Choosing The Right IAM Solution For Your Business

Password security plays a fundamental role in Identity and Access Management (IAM). The easiest way for cybercriminals to breach an enterprise network is to obtain a set of legitimate login credentials. This allows them to bypass firewalls, intrusion detection systems and other technical security solutions. Once inside, they can remain undetected for extended periods of time.

Introducing Keeper's UI Refresh

The Keeper you know and love is getting a fresh, updated look, with a friendlier, accessible and more intuitive experience. Keeper’s new user interface offers clearer distinctions between elements as well as enhanced clarity and navigation – all improving usability in order for our users to take full advantage of Keeper’s powerful features.

How to Protect Your Company's Social Media Passwords From Cybercriminals

All businesses, regardless of size or industry, are potential targets for cybercriminals. As businesses become more aware of the importance of password security in preventing data breaches, they focus on the most obvious areas of weakness, such as employee email accounts and network passwords. However, social media passwords present unique security challenges that organizations may be ill-prepared to handle.