Security
![](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2021%2F08%2FPhishing_Ciara_BlogHeader_1600x900.png&w=3840&q=75)
Create a Culture of Cybersecurity: Teach Employees to “Catch a Phish”
At the end of the day, negative emotions won’t help you build an effective culture of cybersecurity awareness. HR departments should make it their goal to nurture a blame-free, empowering security culture where all employees feel they are contributing to a shared goal.
![Human-Centric Security](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2021%2F08%2FNayaMoss_BlogHeader2_1600x900.png&w=3840&q=75)
What Is a Human-Centric Security Culture?
IT pro and infosec leader Naya Moss breaks down the basics of human-centric cybersecurity.
![](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2021%2F07%2F0706_Biometrics.png&w=3840&q=75)
Fast & Secure: Unlock Dashlane With Biometrics on Chromium Browsers
If you get locked out of Dashlane after closing your Chromium browser, you’ll now be able to unlock the app with your fingerprint instead of typing your Master Password.
![A green and blue background with three blue slanted rectangles in the middle. A white Dashlane logo is overlaid on top.](/_next/image?url=%2Fimages%2Fblog-post-default.webp&w=3840&q=75)
Toothbrushes and Digital Hygiene
Do you brush your teeth? Yes, this article is going to be about dental hygiene and toothbrushes… …as a metaphor to talk about digital hygiene. As a kid, you learn from your parents that it is important to brush your teeth twice a day, to floss and avoid eating too much candy. If you do not do […]
![A green and blue background with three blue slanted rectangles in the middle. A white Dashlane logo is overlaid on top.](/_next/image?url=%2Fimages%2Fblog-post-default.webp&w=3840&q=75)
How We Think About Security at Dashlane
Security is about keeping all of us safe. First and foremost our customers, obviously. But also our employees and our company (including our shareholders). There are 2 additional important considerations related to this part of Dashlane’s mission: Security is hard Let’s start with a given: Security is hard. And perfect security is impossible. One day, […]
![](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2020%2F01%2FGS_Tax-Protect-Identity-Article.jpg&w=3840&q=75)
Keeping Your Personal Info Safe While Filing Taxes Online
There’s nothing like that feeling of relief once you’ve finished filing your taxes, and e-filing services like TurboTax and H&R Block definitely ease the pain of getting to the finish line. During tax season however, the IRS warns consumers to avoid common tax scams—from unscrupulous return preparers to phishing emails and websites. So when submitting […]
![](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2020%2F01%2FGS_ProtecttheKids.jpg&w=3840&q=75)
A Parent’s Guide to App Permissions: Keeping the Kids Safe and Secure
A recent New York Times investigation revealed the extent to which even children’s locations are tracked by the devices they carry and apps they download. While location tracking is hard to avoid completely, there are definitive steps you can take to keep your kids’ data as private as possible. Here we’ll outline how to find […]
![A green and blue background with three blue slanted rectangles in the middle. A white Dashlane logo is overlaid on top.](/_next/image?url=%2Fimages%2Fblog-post-default.webp&w=3840&q=75)
Here’s Why You Shouldn’t Miss Next Year’s dotSecurity Conference
A few weeks ago, we had the opportunity to attend and sponsor the 2017 dotSecurity–a great conference for developers about security, of course! We chose to sponsor the conference because: We are a security company. We love dotConferences! dotConferences organizes technical conferences in Paris for an international audience and was inspired by the quality and format […]
![A green and blue background with three blue slanted rectangles in the middle. A white Dashlane logo is overlaid on top.](/_next/image?url=%2Fimages%2Fblog-post-default.webp&w=3840&q=75)
Everything You Need to Know about WannaCry Ransomware and How to Keep Your Accounts Safe
Updated: 5/30/2017 [Update] A massive ransomware attack affected thousands of schools, hospitals, and other organizations in more than 150 countries. In a recent blog post, researchers at Kryptos Logic argue that approximately 727,000 unique IP addresses were WannaCry victims and “that the real number of affected systems, by assessing the sinkhole data, is in the millions, […]
![A green and blue background with three blue slanted rectangles in the middle. A white Dashlane logo is overlaid on top.](/_next/image?url=%2Fimages%2Fblog-post-default.webp&w=3840&q=75)
7 Features You Need in a Team Password Manager
A team password manager is a useful tool for any small business that wants to boost security while helping employees to manage their passwords more effectively. However, not all business password managers are created equal. Here are seven features to look for when choosing a team password manager for your small business: 1. Usability A team […]
![A green and blue background with three blue slanted rectangles in the middle. A white Dashlane logo is overlaid on top.](/_next/image?url=%2Fimages%2Fblog-post-default.webp&w=3840&q=75)
Naughty or Nice? Here’s How to Tell If an E-Commerce Website is Legit
We all want to find the sweetest deal on best name-brand clothes, sleek new toys, and the hottest tech gadgets on the market. But do you really know if that online shopping website is just selling you a bag of coal? According to Forbes, retailers are projecting that online fraud attempts will increase 43 percent […]
![A green and blue background with three blue slanted rectangles in the middle. A white Dashlane logo is overlaid on top.](/_next/image?url=%2Fimages%2Fblog-post-default.webp&w=3840&q=75)
What is the Internet of Things and How Safe Is It?
Back in prehistoric times, cave people must have gazed at a fire with wonder while thinking, “Is it safe?” The answer, of course, was “It depends.” Safety precautions are necessary for every new tool. Today, if you use any kind of digital technology connected via wireless technology to the Internet, including cell phones, computers, pet […]