FEATURED BLOG

AI can crack your passwords. Here’s how Keeper can help.

As AI becomes more advanced, it’s important to consider all the ways AI can be used maliciously by cybercriminals, especially when it comes to cracking passwords. While AI password-cracking techniques...

Continue Reading

Search

Latest Keeper Blogs

The European Union (EU) General Data Protection Regulation (GDPR) turns five this year. While the law spawned many imitators, most notably the California Consumer Privacy Act (CCPA), the GDPR remains the world’s most comprehensive, far-reaching data privacy law to date. It gave European citizens a wide swath of new data privacy rights, while placing significant

What the GDPR Means for Your Organization

Have you ever checked on your passwords and noticed a warning that they’ve been compromised? One compromised password can put all your credentials at risk, but how does this happen? Your passwords may be showing as compromised due to a breach, poor password practices or for other reasons. Read on to learn more about compromised

How Passwords Get Compromised

Dark web monitoring is an important tool that gives businesses and people insight into what information about them is available on the dark web. A dark web monitoring tool works by scanning thousands of websites, searching for your credentials and Personally Identifiable Information (PII). However, not all dark web monitoring tools and services are built

Why BreachWatch is the Best Dark Web Monitoring Tool

We are kicking off 2023 with a number of new features, improvements and security updates to Keeper’s growing line of award-winning security solutions. Keeper prides ourselves in a culture of innovation to continually improve security and functionality for our customers – both businesses and consumers alike. The Keeper browser extension received a significant upgrade with

What’s New With Keeper | January 2023

If you don’t already have a password manager, the process of changing all your passwords can be difficult and time consuming. You can quickly change all your passwords by using a password manager like Keeper. While there are many reasons why someone would want to change all of their passwords at once, one of the

How to Quickly Change All Passwords

Your digital footprint could make or break critical aspects of your life from getting into college to landing a new job. It’s important to reduce your digital footprint so that it doesn’t negatively impact you. You can clean up your digital footprint by deleting any accounts you don’t use anymore, not sharing personal information on

How To Reduce Your Digital Footprint

The best way to help seniors remember passwords is to get them a password manager that is easy to use. Password managers eliminate the need to remember multiple passwords, so they will only have to remember one master password.  Continue reading to learn why a password manager is the right option for helping the seniors

How Can I Help My Elderly Relatives Remember Passwords?

Proper IT secrets management is essential to protecting your organization from cyber threats, particularly in DevOps environments, where common CI/CD pipeline tools such as Jenkins, Ansible, Github Actions, and Azure DevOps use secrets to access databases, SSH servers, HTTPs services and other highly sensitive systems.  Despite the critical importance of secrets management, Keeper’s 2022 Cybersecurity

Why DevSecOps Teams Need Secrets Management

Pretexting can occur anywhere at any time, so it’s important to understand what it is and ways you can protect employees from it. You can protect your organization from pretexting by not clicking on unsolicited links, not sharing personal information online and by educating employees on pretexting techniques.   Read on to learn more about pretexting

How to Protect Your Organization from Pretexting

Updated on February 7, 2024. You need to protect yourself from doxxing attacks as they can lead to physical harm, damaged reputation and identity theft. You can protect yourself from being doxxed by using a password manager, cleaning up your digital footprint, using a VPN, not oversharing on social media and removing yourself from people

How To Protect Yourself From Doxxing

With the average person spending about two and a half hours on social media daily and possibly up to six hours on the internet, there’s no doubt we’ve all built a legacy on the web.  Have you ever thought about what happens after you pass away?  Will your online presence turn into ghost accounts that

Preparing for Your Digital Afterlife With Secure Password Management

Social media managers play a pivotal part in enabling brands to raise awareness and connect with customers online. In that role, they sift through irrelevant and sometimes offensive content to provide prompt support and accurate information on popular platforms like Tik Tok, Twitter, Instagram, LinkedIn and Facebook. Social media is a common entry point for

How IT Teams Can Protect Their Organization’s Social Media Accounts

Keeper Connection Manager 2.11.0 introduces new connections with PostgreSQL and Microsoft SQL Server, plus other enhancements noted below. Keeper Connection Manager allows organizations to connect to endpoints without the need for VPN. What is Keeper Connection Manager? Securely manage your remote desktop connections from anywhere – no VPN required. Keeper Connection Manager (KCM) provides DevOps

Introducing PostgreSQL and Microsoft SQL Server Connectors in Keeper Connection Manager (KCM) 2.11.0

Updated on January 8, 2024. If a scammer knows just your email address, they can send you phishing emails, access your accounts, steal your personal information and use it for email spoofing. With just your email address, cybercriminals can gain unauthorized access to your personal information. Continue reading to learn more about how scammers use

How Can Scammers Use Your Email Address?

Updated on November 17, 2023. The main difference between a weak and strong password is that a weak password can be easily compromised by a cybercriminal, whereas a strong password cannot be easily guessed or cracked by anyone, making it the best option for securing your online accounts.  Continue reading to learn the difference between

Weak vs Strong Passwords: How to Spot the Difference

A few customers have asked about the pros and cons of a self-hosted password management solution, such as Bitwarden. Since I have a lot of experience with this topic, I thought I would share some of the key reasons to use a cloud-based password manager like Keeper, instead of a self-hosted password vault. Pros of

Self-Hosted vs. Cloud-Based Password Manager

Much of an organization’s most critical business and employee data passes through the hands of finance and accounting professionals. It’s one of the main reasons cyber threats present a significant risk to finance and accounting teams — especially for small accounting firms that are directly responsible for their security. In this blog, we’ll take a

Securing Finance and Accounting Teams from Cyber Attacks

No, it is not safe to use unsecured WiFi in hotels. Using any public WiFi network presents a risk to your private information and security. There are many threats that you become vulnerable to on unsecured hotel WiFi such as a man-the-middle attack or malware.  Read on to learn more about the risks of using

Is it Safe to Use Unsecured WiFi in Hotels?

Keeper Security’s zero-trust and zero-knowledge encryption model ensures that even in a worst case scenario, all of the contents of your Keeper vault would be protected with multiple layers of safeguards and encryption. Keeper has stood by its commitment to protect your most valuable data for more than a decade, through our best-in-class security model

How Does Keeper Protect Your Data? Security and Transparency.

Whether they’re part of a law firm or in-house counsel within a company, lawyers handle sensitive information every day.  That alone makes them prized targets for cybercriminals. The American Bar Association’s 2021 Technology Survey Report found that 25% of lawyers in the United States have experienced a data breach before. And for those lawyers working

Securing Lawyers and In-House Legal Teams from Cyber Risks

What’s Trending