FEATURED BLOG

AI can crack your passwords. Here’s how Keeper can help.

As AI becomes more advanced, it’s important to consider all the ways AI can be used maliciously by cybercriminals, especially when it comes to cracking passwords. While AI password-cracking techniques...

Continue Reading

Search

Latest Keeper Blogs

If you click on a phishing link you should immediately disconnect your device from the internet, scan your device using antivirus software and keep a lookout for suspicious activity and transactions on your online accounts.  Continue reading to learn what a phishing link is, what could happen if you click on a phishing link and

What To Do if You Click on a Phishing Link

As we conclude a record-breaking year of growth at Keeper Security,  I believe it’s important to take time to reflect on our achievements and appreciate the people who helped make 2023 a special year. Keeper experienced a transformative period of growth, innovation and strategic expansion that helped solidify our position as a leading force in

2023 Keeper Retrospective: A Year of Growth, Innovation and Appreciation

An email account takeover is a type of account takeover attack in which a cybercriminal gains unauthorized access to a user’s email account. Cybercriminals can gain access by stealing your email’s login credentials or finding them on the dark web. When a cybercriminal has gained access to your email account, they can lock you out

What Is an Email Account Takeover Attack?

You can run a penetration test by following the five stages: preparation, reconnaissance, penetration, reporting and remediation. Penetration tests are important to help protect an organization from security breaches and data leaks. Cybercriminals are always looking for vulnerabilities within an organization’s system to steal their sensitive data. Penetration testing helps organizations identify security vulnerabilities to

How To Run a Penetration Test

This month we have a number of new feature enhancements and product updates to share with you, including Dark Mode for Android, thoughtful setting enhancements across the Keeper vault and browser extension, as well as improvements to our AWS CLI credential process with Keeper’s Secrets Manager (KSM). Continue reading to learn more. Experience Keeper for

What’s New With Keeper | December 2023

The North American Electric Reliability Corporation’s Critical Infrastructure Protection (NERC CIP) standards are a comprehensive set of requirements that ensure the security and reliability of the North American power grid.  These standards address both the physical security and cybersecurity of the bulk electric system, mandating measures to protect critical assets from potential threats. The increasing

How Does a PAM Solution Help Organizations Meet CIP Cyber Security Standards?

Organizations can protect their enterprise database from privilege abuse by implementing the Principle of Least Privilege (PoLP), following a zero-trust security approach and investing in a Privileged Access Management (PAM) solution. Continue reading to learn what privilege abuse is, the risks of privilege abuse in an organization and how to prevent it.  What Is Privilege

How To Protect an Enterprise Database From Privilege Abuse

Ransomware as a Service (RaaS) is a business model in which cybercriminals develop and sell ransomware to buyers known as affiliates who use it to execute ransomware attacks. Ransomware is a type of malware that prevents users from accessing their data or devices by encrypting them and locking users out until a ransom is paid. 

What Is Ransomware as a Service?

Dark web scans, also known as data breach scans, are scans that let you know if your personal information, such as your email and login credentials, is on the dark web. There are several free and paid dark web scans available online to use and each of them works differently.  Continue reading to learn what

What Are Dark Web Scans?

You can tell your smart TV has been hacked if you notice unusual activity on your smart TV, strange popup windows, changed privacy and security settings, slow performance and unauthorized access to your accounts. Surprisingly, smart TVs can get hacked just like any other Internet of Things (IoT) device that connects to the internet. Cybercriminals

How To Know if Your Smart TV Was Hacked and What To Do 

QR code phishing, most commonly referred to as “quishing,” is a type of phishing attack that tricks users into scanning QR codes to steal personal information such as login credentials or credit card numbers. When a user scans a QR code created for a quishing attack, they are taken to a malicious website that either

What Is Quishing?

If your credit card information is on the dark web you need to immediately contact your credit card issuer, monitor your online accounts for any suspicious activity or transactions, check your credit report and place a fraud alert on your credit report as an extra precaution.  Continue reading to learn how your credit card information

What To Do if Your Credit Card Information Is on the Dark Web

An identity-based attack is a type of cyber attack that targets and compromises the digital identity of individuals and organizations. In this type of attack, a cybercriminal tries to steal, alter and misuse an individual’s identity-related information such as their login credentials, domain names, personal data or digital certificates.  These types of attacks take advantage

What Are Identity-Based Attacks?

You should place a fraud alert if you believe you are a victim of fraud or may become one, if you are a victim of identity theft or if you want to prevent your identity from being stolen. You don’t necessarily have to be a victim of fraud to place a fraud alert, you can

When Should I Place a Fraud Alert?

Keeper Security has released the third part of its series on Privileged Access Management (PAM) research, the Keeper Security Insight Report: Cloud-Based Privileged Access Management, to determine what IT leaders are seeking in a PAM solution and the benefits of moving away from traditional, on-premises platforms. Keeper® commissioned an independent research firm to survey 400

Keeper Security Report: Organizations Seek Cloud Advantages in PAM Solutions

You can avoid social media identity theft by setting strict privacy settings, securing your social media accounts with strong passwords, vetting every friend and follower request, keeping an eye out for phishing attempts and limiting what you share on social media. With almost every person having at least one social media account, cybercriminals are leveraging

How To Avoid Social Media Identity Theft

Organizations rely on Keeper Security to store more than just passwords, passkeys and other credentials. Keeper’s Secure File Storage solution enables users to securely store and share files, photos, documents and more.  From the Keeper Admin Console, administrators can configure the Account Transfer Policy which enable the contents of one user’s vault to be transferred

Secure File Transfers With Keeper®

Keeper Connection Manager (KCM) provides teams with instant remote access capabilities via a secure session, directly from a web browser. Gartner identifies several core Privileged Access Management (PAM) capabilities including monitoring and auditing, as well as privilege elevation and delegation. KCM provides Privileged Account Session Management (PASM) with support for RDP and SSH desktop protocols,

Keeper® Streamlines Auditing and Session Recording for Modern Zero-Trust Security

Email spoofing is a type of cyber threat where a cybercriminal sends emails to potential victims using fake sender addresses. Email spoofing works by forging a sender address to make it seem as though it’s coming from a legitimate person or company. Email spoofing is a tactic typically used by cybercriminals when carrying out phishing

What Is Email Spoofing and How Does It Work?

Some of the different types of online scams you need to look out for are phishing scams, catfishing, job offer scams and online shopping scams. These online scams try to trick you into giving up your personal information, which scammers will use for malicious purposes. You need to learn how to recognize the different types

The Types of Online Scams

What’s Trending