FEATURED BLOG

AI can crack your passwords. Here’s how Keeper can help.

As AI becomes more advanced, it’s important to consider all the ways AI can be used maliciously by cybercriminals, especially when it comes to cracking passwords. While AI password-cracking techniques...

Continue Reading

Search

Latest Keeper Blogs

While support for hardware security keys is not new to Keeper, historically users were required to have a backup Two-Factor Authentication (2FA) option in addition to using a security key. Keeper is excited to announce support for user authentication leveraging only a hardware security key as the 2FA method, without requiring a backup option.  Consumers

Keeper® Now Supports Hardware Security Keys as a Single 2FA Method

Cyber extortion is a category of cybercrime that involves digitally threatening or coercing someone to do something against their will. Cyber extortion typically disables an organization’s operations or exposes an entity’s valuable assets such as confidential data, intellectual property or infrastructure systems. A cybercriminal will then threaten organizations or individuals to pay a ransom to

What Is Cyber Extortion?

Some of the most common types of password attacks include password cracking, password spraying, dictionary attacks, credential stuffing, brute force and rainbow table attacks. The better your password habits are, the less susceptible you are to password attacks. Keeper’s Password Management Report found that only 25% of respondents use strong, unique passwords for every account

Types of Password Attacks

Hackers want stolen medical records to commit identity theft, use the stolen data as a ransom, sell it on the dark web or impersonate the victim to receive medical services. Medical records are valuable to cybercriminals as they allow cybercriminals to commit fraud and go undetected longer than they can with other Personally Identifiable Information

Why Do Hackers Want Medical Records?

The Internet of Things (IoT) refers to the network of physical objects – “things” – that connect and share data with the internet, other IoT devices and the cloud. IoT devices are often embedded with sensors, software and other technologies to exchange data with other devices and systems when connected to the internet. IoT devices

What Is the Internet of Things (IoT)?

Keeper Security is excited to introduce Granular Sharing Enforcements for all products in the Keeper® platform. This feature, an extension of Keeper’s robust existing sharing policies, enables administrators to apply detailed restrictions for record creation and sharing to user roles. By doing so, Keeper Admins can easily enforce the principle of least privilege and simplify

Keeper Security Introduces Granular Sharing Enforcements

Online shopping has allowed buyers to find bargains and conveniently purchase from retailers all over the world. However, cybercriminals take advantage of the anonymity of online shopping to scam online buyers. If you get scammed while shopping online, you need to contact your credit card issuer, freeze your credit, change any compromised passwords, contact the

What To Do if You Get Scammed While Shopping Online

Do you know what your employees are downloading? In a perfect world, all of the IT systems and software used by an organization would be explicitly approved by the IT department. In reality, your network is closer to the wild west.  Whether it’s design software for quick touch-up tasks, a cloud-based service to transfer heavy

What Is Shadow IT and How Can Organizations Eliminate It?

Yes, passkeys are phishing-resistant because they are built on the WebAuthn standard which is an authentication standard that uses public key cryptography to authenticate a user’s identity before they’re able to log in to their account.  Continue reading to learn more about what makes passkeys phishing-resistant, plus the additional benefits of signing in to your

Are Passkeys Phishing-Resistant?

If your online accounts keep getting hacked, you should scan your computer for malware, update your account passwords, enable MFA, check your account’s settings for suspicious changes, change your account’s security questions and place a fraud alert on your credit report.  Continue reading to learn the signs that point to your online account being hacked,

What To Do if Your Online Accounts Keep Getting Hacked

Digital identity refers to the collection of data that represents an entity online. Digital identity can represent users, organizations or electronic devices and consists of their accounts, credentials, certificates, behaviors and usage patterns. In Identity Access Management (IAM), digital identity is needed to authenticate a user and authorize their permissions to access sensitive data. Digital

What Is Digital Identity?

The main differences between a worm and a virus are how they spread and how they are activated. Worms spread automatically to devices through a network by self-replicating, whereas viruses spread by attaching themselves to files or programs. Worms don’t need human interaction to activate and infect a device, whereas viruses do.  Continue reading to

Computer Worm vs Virus: What’s the Difference?

Antivirus software has been around for decades and you might be wondering if you still need it. The answer is yes, you still need antivirus software to protect your internet-connected devices. In the past, antivirus software was necessary to browse the internet safely. However, devices have improved their security measures recently, making antivirus software seem

Do You Still Need Antivirus Software?

Password managers help you manage streaming apps by storing the login credentials for each of those apps in a secure digital vault. With more people streaming movies and TV shows on apps like Netflix and Hulu, and streaming music on apps like Spotify, more passwords are being created for all of those different streaming service

How To Manage Your Streaming Apps With a Password Manager

A Trojan horse, or Trojan, is a type of malware that disguises itself as legitimate software or files to infiltrate a system. Trojan horses are one of the most common types of malware – making it crucial to learn what it is and how you can keep your devices safe from becoming infected with Trojans. 

What Is a Trojan Horse? Virus or Malware?

Common cybersecurity vulnerabilities that cybercriminals can exploit include weak credentials, lack of data encryption, misconfigurations, out-of-date software and zero days. These vulnerabilities often lead to cyber attacks that bypass an organization’s security measures and steal confidential data. Organizations need to identify and mitigate these vulnerabilities to prevent security breaches. Continue reading to learn more about

Common Types of Cybersecurity Vulnerabilities

The main difference between authentication and authorization is that authentication verifies a user’s identity while authorization grants users the right to access resources. Both play an important role in protecting your confidential data from security breaches. You should be implementing authentication and authorization to protect your organization from unauthorized access. Continue reading to learn more

Authentication vs Authorization: What’s the Difference?

A credit card skimmer is a device that is attached to an actual card reader by a threat actor. Skimmers are commonly used by cybercriminals at non-bank ATMs and at gas station fuel pumps. Most skimmers installed at fuel pumps are placed outside of the view of the station administrator. Threat actors use skimmers to

What Is a Credit Card Skimmer and How Can I Spot One?

Keeper Security’s dedication to protecting user data permeates everything we do. Keeper® holds the longest standing SOC 2 and ISO 27001 certifications in the industry. Keeper is GDPR compliant, CCPA compliant, as well as FedRAMP and StateRAMP Authorized. Our commitment to securing our customers’ data is why Keeper has proactive safeguards in place to protect

How Keeper Protects Against Filling Credentials in Malicious Apps

A One-time password is an automatically generated numeric code that can only be used once. One-time passwords are used to authenticate users before they can access an account or system and are often used as a form of Multi-Factor Authentication (MFA) to add additional verification factors to an account. Many companies, such as financial institutions,

What Is a One-Time Password (OTP)?

What’s Trending