FEATURED BLOG

AI can crack your passwords. Here’s how Keeper can help.

As AI becomes more advanced, it’s important to consider all the ways AI can be used maliciously by cybercriminals, especially when it comes to cracking passwords. While AI password-cracking techniques...

Continue Reading

Search

Latest Keeper Blogs

The Biden Administration’s 35-page National Cybersecurity Strategy released in March 2023 emphasizes the growing importance of cybersecurity for both private companies and federal agencies. The strategy specifically highlights ransomware as a significant concern, particularly in terms of its impact on private companies that collaborate with the federal government or are critical to national security. The

Shielding Critical Infrastructure: Conquering Ransomware with Keeper Security Government Cloud

A privacy policy is a statement that companies have on their website that informs users about the collection, processing, protection and use of their private data. Users are often prompted to review and accept privacy policies, but many of them don’t read through these policies because they don’t think it’s necessary. It’s important to read

What is a Privacy Policy?

Regular rotation of passwords, keys and privileged credentials is a critical best practice that greatly reduces an organization’s risk of falling victim to cyber attacks. By limiting the lifespan of a password, organizations can reduce the amount of time during which a compromised password may be valid. Password, key and credential rotation – a feature

Keeper Announces Automated Password Rotation

Keeper’s Enterprise Password Manager is the only solution that uses Elliptic Curve Cryptography (ECC) in its encryption, making it the most secure password management solution available. ECC is a public-key cryptography method based on the mathematics of elliptic curves. First proposed in 1985, it recently rose to prominence with modern cryptography as it provides a

Keeper – The Only Enterprise Password Manager to Use Elliptic Curve Cryptography

A dark web alert is a notification you receive when your personal information, such as your passwords, have been found on the dark web. Without a dark web alert, you won’t know when your personal information is posted on the dark web which is a threat to your identity and online security.  Continue reading to

What is a Dark Web Alert?

No, it is not safe to store your credit card information online, including on merchant websites or web browsers. The only way to ensure your credit card information is stored safely is if you keep it in an encrypted vault.  Read on to learn more about the risks of storing your credit card information online

Is it Safe to Store Credit Card Information Online?

The United States Department of Defense (DoD) discovered in February that one of its servers had been sharing U.S. military emails openly on the internet for over two weeks without anyone noticing. This vulnerability affected U.S. Special Operations Command and other DoD customers. Shockingly, plain-text email conversations were exposed and accessible to anyone who knew

Human Error Results in Leaked SF-86 Forms

It’s important to keep your software up to date because updates enhance existing features, patch security flaws, add new security features, fix bug issues and improve performance for devices. Continue reading to learn more about software updates and how you can check if your software is up to date. What Are Software Updates? Software updates

The Importance of Keeping Software Up to Date

Scam calls are phone calls you may receive that are unsolicited, spoofed and claim to be from someone or a company they’re not. For example, you may receive a phone call claiming to be law enforcement and while the caller ID and location may match a legitimate police department, it has been spoofed to look

What Are Scam Calls and How Can I Stop Them?

The Technology Modernization Fund’s (TMF) latest awards targeting cybersecurity, zero trust, and classified cloud highlight the increasing importance of modernizing the federal government’s IT infrastructure to combat emerging cybersecurity threats. The TMF was authorized by the Modernizing Government Technology Act of 2017 and is an investment program that gives agencies an additional way to deliver

Securing the Public Sector: How to Modernize ICAM Solutions

You can protect your online privacy by being aware of and cleaning your digital footprint; using strong, unique passwords for each of your accounts; not oversharing on social media; reading privacy policies carefully and more. Continue reading to learn more about online privacy and the steps you can take to protect yours.  What is Online

How to Protect Your Online Privacy 

Updated on October 13, 2023. Antivirus software is a program you install on a laptop or computer that prevents, detects and removes known viruses and malware before they’re able to infect the devices. Malware is a type of malicious software that cybercriminals sneakily install on devices so they can spy on users and steal their

What Is Antivirus Software?

There are several steps you should take after discovering your identity has been stolen such as getting a copy of your credit reports, contacting your credit card issuers and banks, reporting the theft to the FTC and placing a security freeze on your credit.  Read on to learn more about identity theft and what you

What to Do If Your Identity Is Stolen

The C-Suite and other senior executives are frequently the targets of cyber attacks. As the most visible members of an organization, executives have access to sensitive information, influence inside the organization and a public platform, making them valuable targets for cybercriminals. Organizations of all sizes need to actively reduce risk for senior management. Simple actions

How Executives Can Stay Safe From Cyber Attacks

You shouldn’t turn off your Two-Factor Authentication (2FA) because it removes the extra layer of security it adds to your account, making it easier for cybercriminals to compromise it. Keep on reading to learn why 2FA should be left enabled for your online accounts and why it should be added to your accounts if it

Why You Shouldn’t Turn Off 2FA

Updated on October 23, 2023. You can tell if a website is legitimate by using Google’s Transparency Report, examining the overall look of the website, double-checking the website address for inconsistencies, checking the website’s domain age and doing a background check on the company. Continue reading to learn how to tell if a website is

How To Tell if a Website Is Legitimate

You’ve done the research. You know you need a secure way to create, store and protect your passwords and you’ve chosen Keeper as your personal password manager. But which plan is right for you? Figuring out which Keeper personal plan is right for you is easy. To find the best Keeper Password Manager plan, let’s

Which Keeper Password Manager Plan is Best for Me?

You can stay safe online during tax season by using strong and unique passwords for your accounts, backing up all your sensitive data and files, not using public WiFi when filing and more. Continue reading to learn more about staying safe online when filing your taxes and the importance of doing so. What Is Tax

How to Stay Safe Online During Tax Season

Encryption technology is vital to securely sharing information over the internet. An estimated 1.145 trillion MB of data is created every day, and encryption prevents sensitive information from being intercepted, read or altered by the wrong recipients.  Not sure what encryption is or how it works? Keep reading to learn more about data encryption, its

What is Encryption? How It Works and Its Benefits

What’s Trending