cybersecurity terms
![Camera focusing on keyboard](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2020%2F02%2FKeylogging.png&w=3840&q=75)
What Is Keylogging?
Imagine your keyboard gossiping behind your back, spilling your deepest, darkest, and most embarrassing secrets to the world.
![](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2022%2F04%2FEnterpriseSSO_BlogHeader_1600x900.png&w=3840&q=75)
Why Enterprise SSO Is Not Enough to Secure Your Business
Pairing SSO with a business password manager is the best way to keep your organization protected.
![Sharing passwords](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2021%2F01%2FSharing-Passwords-with-Partner_v1.png&w=3840&q=75)
What You Can Learn About Cybersecurity From Snooping on Your Crush Online
We may not be proud of it, but most of us have creeped on a crush or ex online when curiosity got the best of us. Here’s how to turn it into a lesson rather than—like your therapist told you— an unhealthy waste of time.
![""](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2021%2F02%2FTargeting-Remote-Workers_v1.png&w=3840&q=75)
New Attacks Targeting Remote Workers, Recent CISA Analysis Reveals
The shift to remote work has forced companies to change how they think about their security. CISA recently published a report highlighting an increase in successful phishing attacks exploiting cybersecurity weaknesses of remote and distributed teams.
![Phishing attempt with fishing lure](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2020%2F03%2Fphishing_new.png&w=3840&q=75)
What the Hack Is Phishing?
A lump grew in my throat. I’d been conned. More specifically, I’d been phished. And it had nothing to do with the band.
![Juice jacking USB devices](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2020%2F02%2Fjuicejacking.png&w=3840&q=75)
What the Hack Is Juice Jacking?
What might be the only thing more frustrating than getting juice jacked? Being the first documented case of it.
![Laptop experiencing a brute force attack](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2020%2F02%2Fbruteforceattack.png&w=3840&q=75)
What the Hack Is a Brute Force Attack?
Brute-force attacks are like when you spend five minutes jamming the wrong key into your front door, hoping it might finally work.