Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Keeper

What Is Pharming in Cybersecurity?

Pharming in cybersecurity is a type of cyberattack that redirects website traffic from a legitimate site to a spoofed site, or fake site, with the intent of stealing sensitive information such as passwords and credit cards. These fake sites look almost identical to legitimate sites and can be difficult to spot – but not impossible. Continue reading to learn how to identify a pharming attack and protect yourself from it.

What Is a Password Breach?

A password breach is when a cybercriminal has your password and is able to use it to get into your account. Password breaches can occur due to social engineering and insider threats, but most often, weak password habits are the culprit. Keep reading to learn more about how passwords get breached, what can happen if your passwords are breached and how to prevent password breaches from happening.

Why this ADHD/time management coach recommends Keeper

Psychotherapist and ADHD/time management coach Julia Vladimirskiy with Let it Go Consulting shares her personal story about being hacked and why she now recommends Keeper Password Manager to all her clients. It’s made a powerful difference in her life and can remove the stress of having to remember passwords from yours too.

What Is IoT Security?

Internet of Things (IoT) security protects IoT devices and the networks to which they connect from cyberattacks. IoT devices can include anything that connects to your internet including doorbell cameras, baby monitors, smart bulbs and thermostats. This presents a cybersecurity risk because anything that can connect to your internet is at risk of being hacked.

What Is an Attack Surface?

An attack surface refers to all the possible points, also called attack vectors, where cybercriminals can access a system and steal data. When an attack surface is small, it’s easier to manage and protect, making it essential to reduce your attack surface as much as possible. Continue reading to learn more about attack surfaces and how you can reduce your organization’s attack surface by following a few of our tips.

Are Phishing and Social Engineering the Same?

No, phishing and social engineering are not the same. Phishing is a subset of social engineering, meaning phishing attacks are a form of social engineering, but not all social engineering is considered phishing. Read on to learn more about what differentiates phishing from social engineering and how to protect yourself from both.

What Makes a Strong Password?

A strong password is made up of at least 16 characters and contains upper and lower case letters, numbers and symbols. Strong passwords also follow password best practices so they never contain personal information, dictionary words or phrases, and are never reused across multiple accounts. Continue reading to learn why strong passwords are necessary and tips for creating a strong password.