Workplace Tips
Workplace security best practices and recent news

What to Do If Your Company’s Been Hacked or Breached
When it comes to hacks or breaches at your business, the quicker you act, the better. Here’s everything you need to do if you experience a company data breach.

Executive Order on Cybersecurity Names Password Managers Critical Software—What It Means for Your Business
After a recent executive order on cybersecurity, federal government now views password managers as critical to endpoint security—and you should, too.

Create a Culture of Cybersecurity: Teach Employees to “Catch a Phish”
At the end of the day, negative emotions won’t help you build an effective culture of cybersecurity awareness. HR departments should make it their goal to nurture a blame-free, empowering security culture where all employees feel they are contributing to a shared goal.

What Is a Human-Centric Security Culture?
IT pro and infosec leader Naya Moss breaks down the basics of human-centric cybersecurity.

Cybersecurity Journalist Nicole Perlroth on How to Protect Your Data Amid a Global Cyber Arms Race
The New York Times journalist and author of “This Is How They Tell Me The World Ends” shares her predictions for the future and life-saving cybersecurity tips.

Highlights From Our First Business Customer Town Hall
We shared a look at some of our product plans and recent enhancements, including a demo of our new machine learning autofill.

6 Cybersecurity Threats That Lead to Business Breaches and Hacks
These are the most common threats to look out for so your company can prevent cybersecurity incidents.

The 3 Most Important Aspects of Company Cybersecurity
When it comes to cybersecurity in business, the 3 most important aspects are employees, tech, and processes.

Data Breach or Hack? Know the Difference.
We tend to use the terms interchangeably, but it’s important to know how to protect your company against both types of cyberattacks.

The 4 Security Personalities You’ll Meet At Work
There are four main ways employees approach cybersecurity. Here’s what you can expect from each approach.
