Data breach
![](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2023%2F01%2FBlogheader_Frederic-SecureData.png&w=3840&q=75)
Putting Security First: How Dashlane Protects Your Data
Learn how Dashlane’s security culture and zero-knowledge architecture are set up to best protect your data.
![](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2023%2F07%2FX-of-the-most-common-ways-hackers-steal-passwords_header-image-01.png&w=3840&q=75)
8 of the Most Common Ways Hackers Steal Passwords
How do hackers get passwords? As hacking tactics like spyware, phishing, and man-in-the-middle attacks evolve, protection methods improve.
![](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2023%2F07%2Fhow-to-prevent-and-respond-to-data-breaches_header.png&w=3840&q=75)
How To Prevent and Respond to Data Breaches
Discover how data breaches occur, how to prevent a data breach with best practices and tools, and the steps to recovery after an incident.
![](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2023%2F07%2FWhat-many-recent-data-breaches-have-in-common_-header-option-2.png&w=3840&q=75)
What Many Recent Data Breaches Have in Common
What are the common causes of data breaches? Most can be traced to human factors like weak passwords and social engineering attacks.
![](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2023%2F05%2FSEO-Blog-Header_14_blue.png&w=3840&q=75)
8 Hacker Protection Tips To Keep Your Online Accounts Safe
Hackers continue to develop tactics that put your data and devices at risk, but a few basic hacker protection tips can significantly reduce your risk.
![](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2023%2F03%2FBlog_Header_4_Password_Habits_at_Risk_1600x900.jpg&w=3840&q=75)
4 Password Habits That Put Your Organization at Risk
Learn how password managers make it easy to establish best practices and help employees take control of their cybersecurity.
![](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2023%2F02%2FSEO-Blog-Header_25_blue.png&w=3840&q=75)
A Guide to Protecting Passwords from Hackers
Hacking tactics including phishing, scamming, and brute-force attacks can be counteracted by protecting passwords with a password manager.
![](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2023%2F01%2Fblogheader_TwitterEmailLeak.png&w=3840&q=75)
Twitter’s 200 Million-User Email Leak: What to Know and How to Protect Your Info
Here’s what Twitter’s significant security breach means for 200 million users and what you can do if you were affected.
![](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2023%2F01%2FSEO-Blog-Header_20_orange.png&w=3840&q=75)
Are Password Managers Safe for Businesses?
You may wonder, “Are password managers safe?” Yes, independent password managers are a safe and effective way to improve business security.
![Photo of a team of three people](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2017%2F01%2FDashlaneBusinessTrial_BlogHeader_1600x900.png&w=3840&q=75)
3 Billion Reasons Your Small Business Needs a Password Manager
Unfortunately, it only takes one wrong click to expose sensitive customer data. Just ask Yahoo. Learn why a password manager can help.