FEATURED BLOG

AI can crack your passwords. Here’s how Keeper can help.

As AI becomes more advanced, it’s important to consider all the ways AI can be used maliciously by cybercriminals, especially when it comes to cracking passwords. While AI password-cracking techniques...

Continue Reading

Latest Keeper Blogs

Search engine phishing, also known as SEO poisoning, is when cybercriminals use search engine optimization to appear as the top results on a search engine in an attempt to lead searchers to a spoofed website. The spoofed website is made to look like a legitimate site so that those who click on it proceed to

What is Search Engine Phishing?

In November 2022, the Criminal Justice Information Services (CJIS) division of the FBI updated its cybersecurity policy, impacting state agencies, police departments, and other organizations that handle Criminal Justice Information (CJI). The updated policy poses challenges for organizations, especially smaller ones, to maintain compliance due to limited resources, lack of expertise and the policy’s complexity.

Strengthening CJIS Compliance with Keeper Security: Protecting State Agencies and Law Enforcement

The Keeper Vault has an updated look with modern styling for a friendlier and more intuitive user experience. In addition, Keeper’s upgraded User Interface (UI) offers clearer distinctions between elements, as well as enhanced clarity and navigation, improving usability and accessibility. What’s New in Keeper Vault 16.9.0 Intuitive User Interface Keeper’s streamlined interface includes fewer

Keeper Unveils New UI for a More Intuitive Customer Experience

G2, a business-to-business (B2B) software site, released its Spring 2023 report on password management. The report is based on aggregated ratings from users on G2 and a comparison with other reviews for similar products. Keeper Security was rated as a leader in the Enterprise, Mid-market and Small Business categories. G2 users also named Keeper as

G2 Names Keeper a Leader in Password Management for Spring 2023 

Increased security risks, heightened compliance regulations, distributed workforces and personnel turnover all create password-related challenges that have prompted organizations across the globe to improve their cybersecurity posture. To this day, stolen and weak passwords are the leading cause of data breaches, yet most organizations have no visibility, security or control over their users’ passwords, credentials

Choosing the Right Keeper Plan for Your Business

Virtual private networks (VPNs) were introduced roughly two decades ago with the idea that creating an encrypted tunnel directly from a computer device to a network would provide secure access to company resources and communications from remote locations.  VPN performance was notoriously sluggish, and they were difficult and time consuming for IT to administer, but

Three Ways VPNs Make Remote Access Less Secure

There are several types of phishing cyber attacks such as smishing, whaling and spear phishing. It’s important to understand the different types of phishing attacks there are so you’re able to spot them. Knowing the different types of phishing attacks can make all the difference in keeping your information protected.  Continue reading to learn more

Types of Phishing Attacks

Organisations across the UK and Ireland must take precautions to protect their systems to reduce their risk of cyber attack. Ransomware Is a Growing Threat for UK and Ireland Organisations The past year has seen a staggering increase in cyber attacks across the UK and Ireland. Cybercriminals are taking advantage of the increased reliance on

A State of Siege: Cyber Attacks Soar Across the UK and Ireland

Keeper continues to release new features for consumers, businesses, enterprises and managed service providers. Our latest release includes significant enhancements such as a Business Support Portal for our business customers, multiple vault integration capabilities for Keeper Connection Manager (KCM), a Google Cloud integration with Keeper Secrets Manager (KSM), CAC/PIV integration for agencies and more. Business

What’s New With Keeper | March 2023

The Biden Administration’s 35-page National Cybersecurity Strategy released in March 2023 emphasizes the growing importance of cybersecurity for both private companies and federal agencies. The strategy specifically highlights ransomware as a significant concern, particularly in terms of its impact on private companies that collaborate with the federal government or are critical to national security. The

Shielding Critical Infrastructure: Conquering Ransomware with Keeper Security Government Cloud

A privacy policy is a statement that companies have on their website that informs users about the collection, processing, protection and use of their private data. Users are often prompted to review and accept privacy policies, but many of them don’t read through these policies because they don’t think it’s necessary. It’s important to read

What is a Privacy Policy?

Regular rotation of passwords, keys and privileged credentials is a critical best practice that greatly reduces an organization’s risk of falling victim to cyber attacks. By limiting the lifespan of a password, organizations can reduce the amount of time during which a compromised password may be valid. Password, key and credential rotation – a feature

Keeper Announces Automated Password Rotation

Keeper’s Enterprise Password Manager is the only solution that uses Elliptic Curve Cryptography (ECC) in its encryption, making it the most secure password management solution available. ECC is a public-key cryptography method based on the mathematics of elliptic curves. First proposed in 1985, it recently rose to prominence with modern cryptography as it provides a

Keeper – The Only Enterprise Password Manager to Use Elliptic Curve Cryptography

A dark web alert is a notification you receive when your personal information, such as your passwords, have been found on the dark web. Without a dark web alert, you won’t know when your personal information is posted on the dark web which is a threat to your identity and online security.  Continue reading to

What is a Dark Web Alert?

No, it is not safe to store your credit card information online, including on merchant websites or web browsers. The only way to ensure your credit card information is stored safely is if you keep it in an encrypted vault.  Read on to learn more about the risks of storing your credit card information online

Is it Safe to Store Credit Card Information Online?

The United States Department of Defense (DoD) discovered in February that one of its servers had been sharing U.S. military emails openly on the internet for over two weeks without anyone noticing. This vulnerability affected U.S. Special Operations Command and other DoD customers. Shockingly, plain-text email conversations were exposed and accessible to anyone who knew

Human Error Results in Leaked SF-86 Forms

It’s important to keep your software up to date because updates enhance existing features, patch security flaws, add new security features, fix bug issues and improve performance for devices. Continue reading to learn more about software updates and how you can check if your software is up to date. What Are Software Updates? Software updates

The Importance of Keeping Software Up to Date

Scam calls are phone calls you may receive that are unsolicited, spoofed and claim to be from someone or a company they’re not. For example, you may receive a phone call claiming to be law enforcement and while the caller ID and location may match a legitimate police department, it has been spoofed to look

What Are Scam Calls and How Can I Stop Them?

The Technology Modernization Fund’s (TMF) latest awards targeting cybersecurity, zero trust, and classified cloud highlight the increasing importance of modernizing the federal government’s IT infrastructure to combat emerging cybersecurity threats. The TMF was authorized by the Modernizing Government Technology Act of 2017 and is an investment program that gives agencies an additional way to deliver

Securing the Public Sector: How to Modernize ICAM Solutions

What’s Trending