Eight months or more into the COVID-19 pandemic, organizations worldwide are still struggling to adjust their cybersecurity protocols to a world where remote work is the norm, not the exception. Reflecting this new normal, the Ponemon Institute has released the results of Cybersecurity in the Remote Work Era: A Global Risk Report. The report, commissioned
October is National Cybersecurity Awareness Month, and this year, things are quite different. The manner in which all of us live and work have been markedly changed by the COVID-19 pandemic. Reflecting this new normal, the Ponemon Institute has released the results of Cybersecurity in the Remote Work Era: A Global Risk Report. The report,
The entire world may still contend with the pandemic, but cybercriminals have certainly not been resting. In fact, the upheaval in everyone’s’ day-to-day lives and the way business has been conducted in 2020 has provided a target-rich environment for both nefarious actors and mischief-makers. On the relatively benign side of things, people have crashed Zoom
Historically, most organizations used a “castle and moat” model to ensure network security. Users and devices inside the network perimeter were trusted by default, while those outside of it were not. This was a logical approach when most or all equipment and employees were on-prem, ensuring a clearly defined network perimeter. Then, cloud computing and
National Cybersecurity Awareness Month (NCSAM), which occurs every October, is an important annual event where government and industry leaders work together to increase awareness of cybersecurity best practices. This year, NCSAM has taken on even greater importance due to the COVID-19 pandemic. Suddenly and with little warning, companies were forced to accelerate their digital transformations
Over the weekend, Universal Health Services (UHS), which operates over 400 healthcare facilities, was struck by one of the largest ransomware attacks in U.S. history that left multiple facilities without access to computer and phone systems. A data breach can bring a healthcare organization to its knees from a financial perspective. According to the University
There are many rumors swirling around Apple’s upcoming release of the iPhone 12, including just when consumers will be able to purchase the new devices. However, one thing is certain. If you download the Keeper password manager right now, migrating all of your passwords to your new device will be easy-peasy. Here are five reasons
A few weeks ago a new data breach was in the news and unlike many breaches, it wasn’t due to any nefarious activity – it came about because of lax security practices. In this case, social media influencer data broker Social Data left a database of almost 235 million social media profiles exposed online with
Over the past decade, cloud computing, mobility, and the Internet of Things rendered the concept of the enterprise network perimeter moot. In 2020, the COVID-19 pandemic did something quite similar to the concept of the office environment. Workplaces don’t necessarily involve on-premise offices and desks anymore; workforces are distributed between employer locations and remote settings.
Small, local governments have become the target of choice for ransomware, according to a study cited by TechRepublic. Over the past 12 months, 45% of global ransomware attacks targeted local governments and municipalities. Further, the study found that 41% of ransomware attacks were combined with data breaches, indicating a rise in double extortion, a technique
In many households, back-to-school looks very different this year. Instead of backpacks and new clothes, students need laptops and webcams. Instead of working on their handwriting, kids are learning how to navigate online learning systems and use video conferencing apps. School safety looks a lot different, too. Cybercriminals have been attacking schools, and students, for
Today, we are excited to share the news that we just closed a $60 million, minority investment by global private equity and venture capital firm Insight Partners. This is Keeper’s first outside equity raise since the company’s inception. We are also welcoming Thomas Krane, Principal at Insight Partners, to our Board of Directors. As the
The HITRUST CSF is a prescriptive set of controls designed to meet the requirements of multiple regulations and standards, including HIPAA, NIST, PCI DSS, and the ISO/IEC 27000-series. Organizations in the healthcare industry, and other sectors that handle sensitive information, use the HITRUST CSF as a comprehensive and flexible framework to ensure data security and
Updated on May 16, 2023. Organizations worldwide have increased their use of self-employed freelancers and private contractors. There are now 73.3 million freelancers working in the U.S. alone. However, one of the most critical challenges to this working relationship is security – specifically, properly and securely managing contractor passwords used to access internal systems. In
On July 10, 2023, the EU-US Data Privacy Framework (DPF) became effective, 2023, and the European Commission adopted an Adequacy Decision relating to the DPF. The DPF replaces the EU-US Privacy Shield as the framework for facilitating transfers of personal data from the EU to participating organizations in the United States. We recognize that our
Last week, Twitter was victimized by a highly organized social engineering attack that compromised 36 mostly high-profile accounts, including those belonging to Elon Musk, Barack Obama, Jeff Bezos, and Bill Gates. After gaining control of the accounts, cybercriminals used them to promote a cryptocurrency scam that netted over $120,000 in untraceable bitcoin payments before Twitter
Keeper is excited to announce that we were rated the leading enterprise password manager by Keeper users on G2, the world’s top business solutions review website, in its Summer 2020 Grid Password Manager Report. Keeper was also recognized as a Password Manager Leader in the Mid-Market and Small Business categories and as a Leader in
At one time, the line between managed service providers (MSPs) and managed security service providers (MSSPs) was distinct. Businesses hired MSPs to keep their IT infrastructure up and running, and they hired MSSPs to keep their systems secure. However, as cyber attacks grew more frequent, costly, and complex, businesses began demanding more out of their
Remote work may be here to stay, but reports of the demise of the office environment have likely been greatly exaggerated. Many employees will keep working from home even after local governments allow their organizations to reopen, but many will also return to their office, at least part-time. A few months ago, when organizations suddenly
With pretty much every website and app either requiring or aggressively pushing visitors to sign up for a user account, consumers accumulate accounts very quickly. A survey by Digital Guardian found that 70% of consumers have over 10 password-protected online accounts, and 30% have “too many to count.” Over time, the typical consumer stops using