Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Keeper

Common Types of Cybersecurity Vulnerabilities

Common cybersecurity vulnerabilities that cybercriminals can exploit include weak credentials, lack of data encryption, misconfigurations, out-of-date software and zero days. These vulnerabilities often lead to cyber attacks that bypass an organization’s security measures and steal confidential data. Organizations need to identify and mitigate these vulnerabilities to prevent security breaches.

Authentication vs Authorization: What's the Difference?

The main difference between authentication and authorization is that authentication verifies a user’s identity while authorization grants users the right to access resources. Both play an important role in protecting your confidential data from security breaches. You should be implementing authentication and authorization to protect your organization from unauthorized access.

What Is a Credit Card Skimmer and How Can I Spot One?

A credit card skimmer is a device that is attached to an actual card reader by a threat actor. Skimmers are commonly used by cybercriminals at non-bank ATMs and at gas station fuel pumps. Most skimmers installed at fuel pumps are placed outside of the view of the station administrator. Threat actors use skimmers to scan the information on a victim’s debit or credit card so they can commit credit card fraud or create counterfeit cards to sell on the dark web.

How Keeper Protects Against Filling Credentials in Malicious Apps

Keeper Security’s dedication to protecting user data permeates everything we do. Keeper® holds the longest standing SOC 2 and ISO 27001 certifications in the industry. Keeper is GDPR compliant, CCPA compliant, as well as FedRAMP and StateRAMP Authorized. Our commitment to securing our customers’ data is why Keeper has proactive safeguards in place to protect our customers against automatically filling credentials into untrusted applications or websites.

How to Manage Passkeys

A passkey is a cryptographic key that can be used to log in to accounts without you ever having to enter a password. Passkeys can also be used as a second form of authentication for online accounts. Passwords aren’t going away anytime soon, so if you plan to start using passkeys now or in the future investing in a password manager will allow you to create, store and use both your passkeys and passwords– simply and securely.

What Is a One-Time Password (OTP)?

A One-time password is an automatically generated numeric code that can only be used once. One-time passwords are used to authenticate users before they can access an account or system and are often used as a form of Multi-Factor Authentication (MFA) to add additional verification factors to an account. Many companies, such as financial institutions, send their users one-time passwords to verify their identity before they grant them access to sensitive accounts and information.

What To Do if You Click on a Phishing Link

If you click on a phishing link you should immediately disconnect your device from the internet, scan your device using antivirus software and keep a lookout for suspicious activity and transactions on your online accounts. Continue reading to learn what a phishing link is, what could happen if you click on a phishing link and how to avoid clicking malicious links.

Passwords Suck! Going Passwordless With Passkeys, SSO and Biometrics

Passwords suck. We all hate creating passwords. We hate remembering them. They can be stolen. Billions of them are available on the Dark Web. Passkeys are more secure than passwords, however, passkeys stored with platforms like Google and Apple cannot be easily shared from one platform to another. This prevents teams from sharing access. Adrien Julienne from Keeper Security hosts Ricky White, Director of Technology and Operations at The Migus Group to learn how organizations can move to a passwordless future with passkeys, SSO and biometrics.

What Is an Email Account Takeover Attack?

An email account takeover is a type of account takeover attack in which a cybercriminal gains unauthorized access to a user’s email account. Cybercriminals can gain access by stealing your email’s login credentials or finding them on the dark web. When a cybercriminal has gained access to your email account, they can lock you out of your account, monitor your activity, access your sensitive information, take over other accounts and impersonate you.

2023 Keeper Retrospective: A Year of Growth, Innovation and Appreciation

As we conclude a record-breaking year of growth at Keeper Security, I believe it’s important to take time to reflect on our achievements and appreciate the people who helped make 2023 a special year. Keeper experienced a transformative period of growth, innovation and strategic expansion that helped solidify our position as a leading force in cybersecurity.