Cloud-based office productivity solutions, including Microsoft 365 (formerly Office 365) and Google Workspace (formerly G Suite), enable remote workers to communicate, collaborate, and work from anywhere. Unfortunately, cybercriminals are using these productivity apps to breach organizational networks. One of the attacks currently making the rounds is a phishing scheme that leverages the automated notifications that
The Sarbanes-Oxley Act (SOX) was passed in 2002 in the wake of a number of major corporate accounting scandals, particularly the Enron scandal. To prevent a situation like Enron from occuring again, SOX mandates checks and balances to ensure the accuracy and transparency of corporate disclosures and to protect enterprise shareholders and the general public
A new report reveals retailers experienced a tremendous loss resulting from account takeovers and stolen or compromised devices over the past 12 months. Keeper Security has examined new challenges for the retail industry as part of its Cybersecurity in the Remote Work Era: A Global Risk Report. With the holiday season quickly approaching, Keeper Security
Updated on March 15, 2024. The best and most secure way to share files with your team while working from home is by using a password manager. A password manager ensures that when employees are sharing files with their team members, they’re always encrypted. Encryption prevents unauthorized individuals from being able to read the data
The COVID-19 pandemic has changed a lot of things about our lives, and the changes hit us at warp speed. Suddenly and practically overnight, we had to shift our entire lives online, from shopping and entertainment to working and studying, and cybercriminals began taking advantage of our increased online presence. Here are five tips to
Updated on April 3, 2023. Dark web monitoring is a process in which a tool is used to scan the dark web and monitor for specific personal information such as your email address or password. This can be done manually or with a dark web monitoring tool that can detect when your credentials are being
Keeper is pleased to announce that we have been recognized as a leader in the 2020 HelpScout Customer Service Awards. In honor of Customer Service Week, which runs from October 5 through October 9, 2020, HelpScout recently highlighted companies in the B2B, B2C, and e-commerce sectors that are going above and beyond to deliver exceptional
Eight months or more into the COVID-19 pandemic, organizations worldwide are still struggling to adjust their cybersecurity protocols to a world where remote work is the norm, not the exception. Reflecting this new normal, the Ponemon Institute has released the results of Cybersecurity in the Remote Work Era: A Global Risk Report. The report, commissioned
October is National Cybersecurity Awareness Month, and this year, things are quite different. The manner in which all of us live and work have been markedly changed by the COVID-19 pandemic. Reflecting this new normal, the Ponemon Institute has released the results of Cybersecurity in the Remote Work Era: A Global Risk Report. The report,
The entire world may still contend with the pandemic, but cybercriminals have certainly not been resting. In fact, the upheaval in everyone’s’ day-to-day lives and the way business has been conducted in 2020 has provided a target-rich environment for both nefarious actors and mischief-makers. On the relatively benign side of things, people have crashed Zoom
Updated on April 9th, 2024. Zero trust and zero knowledge sound similar but they refer to different cybersecurity concepts. The key difference between zero trust and zero knowledge is that zero trust relates to network security while zero knowledge relates to the privacy of data. Both are important in protecting sensitive information from falling into
National Cybersecurity Awareness Month (NCSAM), which occurs every October, is an important annual event where government and industry leaders work together to increase awareness of cybersecurity best practices. This year, NCSAM has taken on even greater importance due to the COVID-19 pandemic. Suddenly and with little warning, companies were forced to accelerate their digital transformations
Over the weekend, Universal Health Services (UHS), which operates over 400 healthcare facilities, was struck by one of the largest ransomware attacks in U.S. history that left multiple facilities without access to computer and phone systems. A data breach can bring a healthcare organization to its knees from a financial perspective. According to the University
There are many rumors swirling around Apple’s upcoming release of the iPhone 12, including just when consumers will be able to purchase the new devices. However, one thing is certain. If you download the Keeper password manager right now, migrating all of your passwords to your new device will be easy-peasy. Here are five reasons
A few weeks ago a new data breach was in the news and unlike many breaches, it wasn’t due to any nefarious activity – it came about because of lax security practices. In this case, social media influencer data broker Social Data left a database of almost 235 million social media profiles exposed online with
Over the past decade, cloud computing, mobility, and the Internet of Things rendered the concept of the enterprise network perimeter moot. In 2020, the COVID-19 pandemic did something quite similar to the concept of the office environment. Workplaces don’t necessarily involve on-premise offices and desks anymore; workforces are distributed between employer locations and remote settings.
Small, local governments have become the target of choice for ransomware, according to a study cited by TechRepublic. Over the past 12 months, 45% of global ransomware attacks targeted local governments and municipalities. Further, the study found that 41% of ransomware attacks were combined with data breaches, indicating a rise in double extortion, a technique
In many households, back-to-school looks very different this year. Instead of backpacks and new clothes, students need laptops and webcams. Instead of working on their handwriting, kids are learning how to navigate online learning systems and use video conferencing apps. School safety looks a lot different, too. Cybercriminals have been attacking schools, and students, for
Today, we are excited to share the news that we just closed a $60 million, minority investment by global private equity and venture capital firm Insight Partners. This is Keeper’s first outside equity raise since the company’s inception. We are also welcoming Thomas Krane, Principal at Insight Partners, to our Board of Directors. As the
The HITRUST CSF is a prescriptive set of controls designed to meet the requirements of multiple regulations and standards, including HIPAA, NIST, PCI DSS, and the ISO/IEC 27000-series. Organizations in the healthcare industry, and other sectors that handle sensitive information, use the HITRUST CSF as a comprehensive and flexible framework to ensure data security and