Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Keeper

How To Implement the Principle of Least Privilege

Organizations should implement the principle of least privilege to protect their sensitive data from unauthorized access. To implement the principle of least privilege, organizations need to define roles and permissions, invest in a Privileged Access Management (PAM) solution, enforce MFA, automatically rotate credentials for privileged accounts, segment networks and regularly audit network privileges.

The Pros and Cons of Using Passphrases

Some of the benefits of using passphrases are that they’re easy to remember, difficult for cybercriminals to crack and they’re considered to be more secure than traditional passwords because of poor password habits. Some of the disadvantages of using passphrases are that some websites and apps may have low character limits, it’s impossible to remember passphrases for every single one of your accounts and they’re still vulnerable to being exposed in public data breaches.

Password Entropy: What It Is and Why It's Important

Password entropy is a measurement of how difficult it would be for a cybercriminal to crack or successfully guess your password. When calculating password entropy, the calculation takes into account how long your password is and the variation of characters you’re using. Character variations include the use of uppercase and lowercase letters, numbers and symbols. Continue reading to learn more about the importance of password entropy and how you can calculate it using the password entropy formula.

Keeper 101 | Enterprise - How to Create Nodes in Keeper Enterprise

Keeper's node architecture scales to any sized organization. At the highest level of our organization structure are nodes. Nodes are used to organize your users into distinct groupings, which can have their own sets of roles, teams, two-factor authentication, enforcement policies and provisioning methods. By default, the top level parent node, or root node is set to your organization name, and all additional nodes are created underneath the Root Node. Smaller organizations may choose to administer Keeper at a single level, meaning no additional nodes are created.

Keeper 101 - How to Create Your Keeper Account

To create your Keeper Account, visit keepersecurity.com and hover your cursor over the “Login” dropdown and select Web Vault, then click Create an Account. Enter your email address and click Next. You will be prompted to set and confirm a master password. Don’t forget your master password! Since this password will unlock all of your other passwords in your Keeper Vault, it is critical that you set a strong master password using upper and lowercase letters, numbers and symbols.

Keeper 101 - How to Create Your Keeper Account on iOS

Signing up for Keeper's iOS mobile app is easy. Simply visit the App Store on your device, search for Keeper, and install “Keeper Password Manager”. Once the download is complete, tap Open to launch Keeper. Tap Create Account to get started. Enter your email address and tap Next. You will be prompted to set and confirm a master password. Don’t forget your master password! Since this password will unlock all of your other passwords in your Keeper Vault, it is critical that you set a strong master password using upper and lowercase letters, numbers and symbols.

Password Spraying vs Credential Stuffing

Password spraying and credential stuffing have a lot in common, but the main difference is in the way the attack is executed. With credential stuffing, the cybercriminal already has a set of verified login credentials, whereas, with password spraying, the cybercriminal has to guess the login credentials by matching a list of usernames with a commonly used password.