Password Security
![](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2023%2F10%2FChanges-to-Dashlane-Free-X-off-the-plan-of-your-choice.png&w=3840&q=75)
Updates to Dashlane Free
Starting May 23, 2024, the accounts for Dashlane Free plan users with more than 25 saved passwords will be read-only.
![An illustration of a dark green globe with white lines and a white stylized login input field in the middle. On the left side of the login input field is a gray key, and on the right side is a purple and white fingerprint, indicating that Dashlane protects both traditional passwords and newer passwordless authentication methods like passkeys.](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2024%2F04%2FDashlane-World-Password-Day-2024-Illustration.png&w=3840&q=75)
Celebrating World Password Day: Password Tips and Trends to Protect Your Logins
World Password Day is the perfect time to review password security tips and learn about passwordless authentication.
![](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2021%2F02%2FBlog-header_-SSO-PWM-Perfect-Pair.png&w=3840&q=75)
The Power of Combined Security: Safeguarding Employee Credentials With SSO and a Credential Manager
Learn why your business should consider implementing SSO along with a credential manager to improve security and streamline employee access.
![](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2023%2F10%2FBlog-How-are-passkeys-different-from-passwords.png&w=3840&q=75)
Passkeys vs Passwords: What is the Difference Between Them?
Learn what passkeys are, how they work, and what makes this login method phishing-resistant and safer than passwords.
![](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2023%2F09%2FSEO-Blog-Header_09_blue.png&w=3840&q=75)
7 Ways to Determine if You Have a Strong (or Weak) Password
The strong password definition is clear. It’s easy to determine whether you have a strong or weak password and keep it secure using a password manager.
![](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2023%2F09%2FBlogheader_Rising-trends-of-deepfakes-2.jpg&w=3840&q=75)
Deepfakes Are Getting More Realistic—Here’s What it Means for Online Security
Deepfakes are impacting our security by spreading misinformation and enabling fraud. Protect against deepfakes and other AI-driven cyber attacks.
![](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2023%2F08%2FStay-Secure-by-Avoiding-7-Common-Password-Sharing-Mistakes_header-image.png&w=3840&q=75)
Stay Secure by Avoiding 7 Common Password Sharing Mistakes
With password sharing almost unavoidable, use secure password sharing methods to prevent password theft, hacking, and data intercepts.
![](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2023%2F07%2FWhat-is-password-hashing_-header.png&w=3840&q=75)
What Is Password Hashing?
What is password hashing? Discover how it works, the algorithms it uses, and why it’s crucial for data security.
![](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2023%2F07%2FHeader_Excel-Spreadsheets-How-to-Password-Protect-Your-Excel-Files.png&w=3840&q=75)
Excel Spreadsheets: How to Password Protect Your Excel Files
Learn how to password-protect Excel files to secure sensitive business data and formulas with our detailed guide.
![](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2023%2F06%2FSEO-Blog-Header_20_orange.png&w=3840&q=75)
BYOD Policies for Organizations (4 Examples)
BYOD policies for organizations help address cybersecurity threats, ownership issues, and safety concerns of using personal devices at work.