FEATURED BLOG

AI can crack your passwords. Here’s how Keeper can help.

As AI becomes more advanced, it’s important to consider all the ways AI can be used maliciously by cybercriminals, especially when it comes to cracking passwords. While AI password-cracking techniques...

Continue Reading

Search

Latest Keeper Blogs

A credit card skimmer is a device that is attached to an actual card reader by a threat actor. Skimmers are commonly used by cybercriminals at non-bank ATMs and at gas station fuel pumps. Most skimmers installed at fuel pumps are placed outside of the view of the station administrator. Threat actors use skimmers to

What Is a Credit Card Skimmer and How Can I Spot One?

Keeper Security’s dedication to protecting user data permeates everything we do. Keeper® holds the longest standing SOC 2 and ISO 27001 certifications in the industry. Keeper is GDPR compliant, CCPA compliant, as well as FedRAMP and StateRAMP Authorized. Our commitment to securing our customers’ data is why Keeper has proactive safeguards in place to protect

How Keeper Protects Against Filling Credentials in Malicious Apps

A One-time password is an automatically generated numeric code that can only be used once. One-time passwords are used to authenticate users before they can access an account or system and are often used as a form of Multi-Factor Authentication (MFA) to add additional verification factors to an account. Many companies, such as financial institutions,

What Is a One-Time Password (OTP)?

If you click on a phishing link you should immediately disconnect your device from the internet, scan your device using antivirus software and keep a lookout for suspicious activity and transactions on your online accounts.  Continue reading to learn what a phishing link is, what could happen if you click on a phishing link and

What To Do if You Click on a Phishing Link

As we conclude a record-breaking year of growth at Keeper Security,  I believe it’s important to take time to reflect on our achievements and appreciate the people who helped make 2023 a special year. Keeper experienced a transformative period of growth, innovation and strategic expansion that helped solidify our position as a leading force in

2023 Keeper Retrospective: A Year of Growth, Innovation and Appreciation

An email account takeover is a type of account takeover attack in which a cybercriminal gains unauthorized access to a user’s email account. Cybercriminals can gain access by stealing your email’s login credentials or finding them on the dark web. When a cybercriminal has gained access to your email account, they can lock you out

What Is an Email Account Takeover Attack?

You can run a penetration test by following the five stages: preparation, reconnaissance, penetration, reporting and remediation. Penetration tests are important to help protect an organization from security breaches and data leaks. Cybercriminals are always looking for vulnerabilities within an organization’s system to steal their sensitive data. Penetration testing helps organizations identify security vulnerabilities to

How To Run a Penetration Test

This month we have a number of new feature enhancements and product updates to share with you, including Dark Mode for Android, thoughtful setting enhancements across the Keeper vault and browser extension, as well as improvements to our AWS CLI credential process with Keeper’s Secrets Manager (KSM). Continue reading to learn more. Experience Keeper for

What’s New With Keeper | December 2023

The North American Electric Reliability Corporation’s Critical Infrastructure Protection (NERC CIP) standards are a comprehensive set of requirements that ensure the security and reliability of the North American power grid.  These standards address both the physical security and cybersecurity of the bulk electric system, mandating measures to protect critical assets from potential threats. The increasing

How Does a PAM Solution Help Organizations Meet CIP Cyber Security Standards?

Organizations can protect their enterprise database from privilege abuse by implementing the Principle of Least Privilege (PoLP), following a zero-trust security approach and investing in a Privileged Access Management (PAM) solution. Continue reading to learn what privilege abuse is, the risks of privilege abuse in an organization and how to prevent it.  What Is Privilege

How To Protect an Enterprise Database From Privilege Abuse

Ransomware as a Service (RaaS) is a business model in which cybercriminals develop and sell ransomware to buyers known as affiliates who use it to execute ransomware attacks. Ransomware is a type of malware that prevents users from accessing their data or devices by encrypting them and locking users out until a ransom is paid. 

What Is Ransomware as a Service?

Dark web scans, also known as data breach scans, are scans that let you know if your personal information, such as your email and login credentials, is on the dark web. There are several free and paid dark web scans available online to use and each of them works differently.  Continue reading to learn what

What Are Dark Web Scans?

You can tell your smart TV has been hacked if you notice unusual activity on your smart TV, strange popup windows, changed privacy and security settings, slow performance and unauthorized access to your accounts. Surprisingly, smart TVs can get hacked just like any other Internet of Things (IoT) device that connects to the internet. Cybercriminals

How To Know if Your Smart TV Was Hacked and What To Do 

QR code phishing, most commonly referred to as “quishing,” is a type of phishing attack that tricks users into scanning QR codes to steal personal information such as login credentials or credit card numbers. When a user scans a QR code created for a quishing attack, they are taken to a malicious website that either

What Is Quishing?

If your credit card information is on the dark web you need to immediately contact your credit card issuer, monitor your online accounts for any suspicious activity or transactions, check your credit report and place a fraud alert on your credit report as an extra precaution.  Continue reading to learn how your credit card information

What To Do if Your Credit Card Information Is on the Dark Web

An identity-based attack is a type of cyber attack that targets and compromises the digital identity of individuals and organizations. In this type of attack, a cybercriminal tries to steal, alter and misuse an individual’s identity-related information such as their login credentials, domain names, personal data or digital certificates.  These types of attacks take advantage

What Are Identity-Based Attacks?

You should place a fraud alert if you believe you are a victim of fraud or may become one, if you are a victim of identity theft or if you want to prevent your identity from being stolen. You don’t necessarily have to be a victim of fraud to place a fraud alert, you can

When Should I Place a Fraud Alert?

Keeper Security has released the third part of its series on Privileged Access Management (PAM) research, the Keeper Security Insight Report: Cloud-Based Privileged Access Management, to determine what IT leaders are seeking in a PAM solution and the benefits of moving away from traditional, on-premises platforms. Keeper® commissioned an independent research firm to survey 400

Keeper Security Report: Organizations Seek Cloud Advantages in PAM Solutions

You can avoid social media identity theft by setting strict privacy settings, securing your social media accounts with strong passwords, vetting every friend and follower request, keeping an eye out for phishing attempts and limiting what you share on social media. With almost every person having at least one social media account, cybercriminals are leveraging

How To Avoid Social Media Identity Theft

Organizations rely on Keeper Security to store more than just passwords, passkeys and other credentials. Keeper’s Secure File Storage solution enables users to securely store and share files, photos, documents and more.  From the Keeper Admin Console, administrators can configure the Account Transfer Policy which enable the contents of one user’s vault to be transferred

Secure File Transfers With Keeper®

What’s Trending