Security Tips

Case Study: How FoodCorps Cultivated and Simplified Their Cybersecurity
Case Study: Learn why U.S. non-profit FoodCorps partnered with Dashlane to simplify login sharing and scale securely.

How to Know if Your Phone Is Hacked
Learn how to know if your phone is hacked, what to do if your phone is hacked, and take steps to protect your device and personal data.

End-to-End Cybersecurity Tips Q&A with Dashlane Chief Product Officer Donald Hasson and Secureframe Manager of Compliance Marc Rubbinaccio
Dashlane’s Chief Product Officer Donald Hasson and Secureframe’s Marc Rubbinaccio answer your top cybersecurity questions.

What Is Credential Stuffing and How Can It Impact You?
What is credential stuffing? It’s a hacking tactic that combines stolen credentials with algorithms to maximize data breach effectiveness.

Stay Safe with QR Codes
Are QR codes safe? QR codes enable consumers and businesses to interact, but not all are safe to scan. Here’s what to look out for.

Putting Security First: How Dashlane Protects Your Data
Learn how Dashlane’s security culture and zero-knowledge architecture are set up to best protect your data.

Why Enterprise SSO Is Not Enough to Secure Your Business
Pairing SSO with a business password manager is the best way to keep your organization protected.

5 Pros & Cons of a Future Without Passwords
The pros and cons of a future without passwords already impact the user experience, security, IT overhead, device dependency, and adoption.

7 Reasons Why 2-Step Verification Is Always Worth the Extra Effort
Is 2-step verification worth it? Using a second knowledge, inheritance, or possession factor for authentication improves security and privacy. Here’s how.

Is iCloud Keychain/Apple Password Manager Safe & Reliable?
Is Apple password manager safe? The iCloud Keychain for Apple users lacks the flexibility and security features of more comprehensive alternatives.