Security Tips

Size Doesn’t Matter: Cybercriminals Target Small & Mid-Size Businesses
Although major data breaches make headlines, smaller companies are at a larger risk. Yahoo. Equifax. Marriott. High-profile data breaches involving hundreds of millions of users have become regular occurrences, and their frequency is increasing. However, more data breaches happen every day than anyone can reliably count, and it’s because they’re happening to organizations that aren’t […]

Security Management Terms Explained: A Cybersecurity Glossary
Make sure your entire team is on the same page when it comes to cybersecurity. Acronyms and buzzwords frequently pop up in conversations among IT professionals, but the downside of using this industry-specific terminology is that it’s an opportunity for the non-initiated to lose track. Until recently, this has not been much of a problem […]

Secure Executive Support for Password Management Tool Adoption
Find out how to bring corporate leadership onboard with modern security. Convincing leadership to make changes for the organization you work for requires hefty effort – but it’s worth it. Those changes might be what helps your business remain competitive in the long run. In today’s digital-first environment, there are no changes more urgent than […]

What If Dashlane Gets Hacked?
If Dashlane were ever hacked, your information would still be safe thanks to encryption. Here’s why.

Reduce Employee Involvement in Cybercriminal Activity
Use encryption the right way and keep employees vigilant. Ask any IT professional to describe who their cybersecurity policy defends against, and they will likely describe a hacker. The hacker is a smart, opportunistic cybercriminal ready to capitalize on your security weaknesses by using sophisticated technology and nefarious social engineering tactics. And data shows fear […]

Password Security Breaches: Biggest Concern for IT Leaders
Password security exploits are among the easiest for cybercriminals. The password security breach. It’s the simplest exploit in the book. The first thing any cybercriminal does when breaking into a system is try some popular passwords. IT leaders and cybersecurity researchers are routinely amazed to find out just how far hackers can go with nothing […]

What Is Encryption?
Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. It can be used to transform data that you send across the internet into a format which is only readable when in possession of a decryption key, which provides the code to decipher the encryption. […]

How to View & Delete Saved Passwords in Chrome, Edge, Firefox & Safari
Are you realizing that saving passwords in your browser isn’t super secure? In this post, we’ll show you how to view and delete saved passwords in Chrome, Edge, Firefox, and Safari.

How to Fight Back Against “Zombie Accounts”
There was a great segment on Monday morning’s Halloween-themed Good Morning America where host Becky Worley explained to viewers the dangers of “zombie accounts”—old, forgotten, or compromised online accounts that can come back to haunt you. As Worley puts it: “Zombie accounts” sounds like some creepy horror show. But there is a real danger here. […]

Stop Using Login With Facebook Immediately—Here’s Why
Facebook was hacked, and now everyone is scrambling to understand why it happened, who was responsible, and most importantly, what it means for the potentially 90 million affected users. What’s become clear is that Facebook’s unprecedented access to user data across at least 8 million websites—via the ever-present Login With Facebook option—puts each of Facebook’s 2 billion-plus […]

World Password Day: How to Improve Your Passwords
May 4th was World Password Day (#WorldPasswordDay). It’s a global initiative originated by Intel and championed by Dashlane to tackle the number 1 problem in the digital world—passwords. As one of the leading password managers in the industry, we wanted to take this time make an international public service announcement: World, we have a password problem. […]

What Is a Hack vs. What Is a Data Breach: Cybersecurity 101
“What is a hack, exactly? And what’s the difference between a hack and a data breach?” Given the frequency with which hacks and data breaches occur, we get asked these questions a lot. You’ll see many mainstream media outlets using these words interchangeably. Though the two sometimes overlap, there are some key differences between them […]