Category: Administrator Best Practices

New Report Reveals Increased Cybersecurity Risks for Companies Around the World

New Report Reveals Increased Cybersecurity Risks for Companies Around the World

Eight months or more into the COVID-19 pandemic, organizations worldwide are still struggling to adjust their cybersecurity protocols to a world where remote work is the norm, not the exception. Reflecting this new normal, the Ponemon Institute has released the results of Cybersecurity in the Remote Work Era: A Global […]

Take Control of Your Passwords to Defend Against Data Breaches

Take Control of Your Passwords to Defend Against Data Breaches

A few weeks ago a new data breach was in the news and unlike many breaches, it wasn’t due to any nefarious activity – it came about because of lax security practices. In this case, social media influencer data broker Social Data left a database of almost 235 million social […]

6 Reasons Why Organizations Need a Business Password Manager

6 Reasons Why Organizations Need a Business Password Manager

Weak or compromised passwords cause about 80% of successful data breaches, yet many organizations still don’t mandate that their employees use a password manager. Some companies tell employees to use a password manager, but let them pick their own solutions, resulting in a lack of consistency, visibility, and centralized administration […]

Why You Need Identity & Access Management

Why You Need Identity & Access Management

Last week, Twitter was victimized by a highly organized social engineering attack that compromised 36 mostly high-profile accounts, including those belonging to Elon Musk, Barack Obama, Jeff Bezos, and Bill Gates. After gaining control of the accounts, cybercriminals used them to promote a cryptocurrency scam that netted over $120,000 in […]

The Account Transfer Process

The Account Transfer Process

Most organizations are constantly expanding and contracting their user base, hence the onboarding and the offboarding process is mission-critical to ensuring both effective productivity and the security of your organization. Staff who leave can wreak havoc, either on purpose or inadvertently, through the lockout or misuse of critical company systems […]

Keeper Announces Team-to-Role Mapping, Allowing IT Admins to Manage Role-Based Policies

Keeper Announces Team-to-Role Mapping, Allowing IT Admins to Manage Role-Based Policies

Keeper is pleased to announce that our business solutions now support team-to-role mapping, which will allow organizations to use their existing identity provider to assign users directly into teams that can be assigned custom roles. This will save time, improve policy consistency, reduce errors, and make it easier for administrators […]

Keeper Desktop Vault Now Offers Passwordless Login with Windows Hello

Keeper Desktop Vault Now Offers Passwordless Login with Windows Hello

Keeper is pleased to announce an updated version of Keeper Desktop App that incorporates a major new productivity enhancement: Windows Hello, a biometrics-based technology that allows users to authenticate and log in to their Windows devices using a fingerprint or facial recognition. How it works Windows Hello works with Windows […]

5 Tips for Enterprise Cybersecurity in Uncertain Times

5 Tips for Enterprise Cybersecurity in Uncertain Times

During times of upheaval, it’s easy for cybersecurity to get lost in the fray, but cybersecurity is a fundamental part of business continuity. Additionally, cybercriminals take advantage of major events to launch cyberattacks, hoping that information technology and security teams are overworked or distracted. Here are 5 tips to keep […]

10 Tips to Ensure Cybersecurity While Your Employees Work from Home

10 Tips to Ensure Cybersecurity While Your Employees Work from Home

In an effort to stem the novel coronavirus pandemic, organizations from Google to Condé Nast to the State of Alaska are ordering or “encouraging” their employees to work from home, or are in the process of preparing for a massive exodus of their on-premise workforce. Accommodating a sudden rise in […]

Roar Into the ’20s with These 5 Cybersecurity Tips

Roar Into the ’20s with These 5 Cybersecurity Tips

The ’20s are here — again! Things are a bit different in 2020 than they were in 1920. We don’t have flying cars yet, but they will be driving themselves around soon. Newspapers and radio have given way to mobile apps and podcasts and criminals can now steal sensitive files […]