Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

October 2023

Compromised Online Account: What It Is and How To Prevent It

A compromised account is an account that has been accessed without the owner’s permission. Compromised accounts can happen for a variety of reasons including public data breaches, using weak passwords, failure to enable Multi-Factor Authentication (MFA) on online accounts, falling for phishing scams or having malware unknowingly installed on your device. Continue reading to learn more about compromised accounts and tips to prevent your accounts from being compromised.

Using a Password Manager When Changing iPhones

You should use a password manager when upgrading to a new iPhone because it will make transferring all your account credentials more seamless and you’ll be able to update any weak passwords, making your accounts more secure. Although Apple provides a built-in password manager, iCloud Keychain is not as safe as using a dedicated password manager. A password manager offers more security and convenience to store, manage and share your personal information.

Debit Card vs Credit Card: Which Is More Secure Online?

Although both debit and credit cards provide easy methods of payment, credit cards have better fraud protection which makes them more secure to use online. Credit card fraud can easily happen through security breaches or cyberattacks that steal your payment card information. It’s important to use the most secure payment method to protect yourself from the damaging effects of credit card fraud.

Work-From-Home Job Scams You Should Know About

Some common Work-From-Home (WFH) job scams you should be aware of include reshipping job scams, MLM job scams, job placement service scams, envelope stuffing and data entry job scams. Continue reading to learn about the most common work-from-home scams you should be aware of, the signs that point to a work-from-home job scam and how to avoid becoming a victim.

How To Protect Your Financial Accounts Online

You can protect your financial accounts online by using strong passwords, updating your software, avoiding suspicious links and attachments, reducing your digital footprint and turning on financial alerts. Protecting your financial information is important to prevent identity theft and credit card fraud from happening to you. Identity theft can be emotionally draining and leave you financially bankrupt.

Enforcing Least Privilege Mitigates Identity Provider Takeover Attacks

Single Sign-On (SSO) solutions are designed to provide seamless access to important resources for employers and contractors at millions of organizations worldwide. By enabling only one point of access for all the applications a user needs to perform their job, SSO has become ubiquitous for enterprises to streamline operations.

What Is an Exploit Kit?

An exploit kit is a toolkit that cybercriminals use to attack the security vulnerabilities of a system or device to distribute malware. An exploit is a bit of code that takes advantage of security vulnerabilities found within software and hardware. Cybercriminals collect these bits of code and compile them into a kit that can target multiple security vulnerabilities at once, and secretly install malware on devices.

How To Secure Remote Desktop Protocol

Remote work has increased the usage of Remote Desktop Protocol. However, Remote Desktop Protocol connections can have many vulnerabilities if not properly secured. The best way to secure Remote Desktop Protocol connections is by creating strong login credentials and using a secure network. This will help protect your company from cyberattacks that could compromise sensitive data.

Secure Software Supply Chain by Signing Git Commits With Keeper

The modern threat landscape is constantly changing and the software supply chain has become a common target for cybercriminals. Cyberthreats have become a headache for overworked developers and DevOps teams as they face tight deadlines, limited staffing resources and the added burden of ensuring that their code does only what it is intended to do and is free of bugs and malware.

Can You Get Hacked by Replying to a Scam Text?

No, you cannot get hacked by replying to a scam text, but you can get hacked from a scam text if you click on a malicious link the scammer sends you. According to the Federal Trade Commission (FTC), Americans lost a total of $330 million from scam texts in 2022, making scam texts a serious threat to your online security. Continue reading to learn how to spot scam texts and the common scam text tactics that scammers use.

Passkey vs Password: What's the Difference?

There are several ways in which passkeys are different from passwords in terms of how they are created, how they are filled into websites and how they are secured. Passwords are user-generated whereas passkeys are automatically generated using public key cryptography. Unlike passwords, passkeys are a new type of digital credential that is phishing-resistant and can’t be easily compromised. However, only a few websites currently support passkeys.

Secure Password and File Sharing for Federal and State Courts

U.S. court employees need to access dozens of systems and applications in order to complete their duties. These employees may also have access to Personally Identifiable Information (PII), which must be securely stored and managed with strict access controls. Court systems need a way for employees to easily and securely access systems, and share passwords and files among teams.

How To Detect Man-in-the-Middle Attacks

It is notoriously difficult to detect a man-in-the-middle attack. However, these attacks do have some subtle signs, including landing on obviously fake websites and your internet connection mysteriously becoming unreliable. Additionally, man-in-the-middle attacks often happen on open, unencrypted public networks, so it’s very important to be aware of your online environment at all times.

How to Transition to a Fully Passwordless Environment With Keeper, Passkeys and SSO

Passwordless authentication is a security method that allows a user to gain access to a system without entering a traditional password. Instead, it relies on alternative means of verification, such as biometric data (like fingerprints or facial recognition), hardware tokens or one-time codes sent to a trusted device.

Common Venmo Scams To Avoid

Common Venmo scams include phishing scams, offers of fake prizes and cash rewards, fake payments and more. The more aware you are of common Venmo scams, the better you can avoid falling for them and losing money. Continue reading to learn some of Venmo’s most common scams, what to do if you’re scammed on Venmo and how to stay safe when using Venmo.

Why the Public Sector Needs Cyber Insurance

Cyberthreats and ransomware attacks can be crippling for public sector organizations. The cost of ransomware attacks in government often runs into the millions of dollars, which mostly stems from downtime and recovery (or in some cases, paying the ransom). A Sophos’ 2023 “State of Ransomware” report noted that in 2023 the K-12 education sector has seen the highest ransomware attack rate of any industry, with 80% of schools reporting a ransomware attack.

How To Spot a Catfish Online

As people use social media and dating apps to connect with others, they risk falling victim to catfishing scams. However, catfishing can be easily spotted when looking for signs such as a request for money and a newly made account. It is best to know these signs to avoid any financial loss, data leaks or mental and emotional strain. Continue reading to learn more about what catfishing is, how dangerous it can be, the signs to look out for, how to deal with it and how to avoid it in the future.

Beware of Fake iPhone 15 Upgrade Emails

With the new iPhone 15 release, scammers are taking advantage by impersonating mobile carriers or Apple support, claiming their target is eligible for a free or discounted iPhone upgrade. The scammer’s goal is to get their target to provide personal and financial information which is then used to attempt identity theft or make unauthorized charges. Read on to learn what signs to look out for and what to do if you fall victim to this iPhone 15 scam.

Webinar - The 3 Essential Tools To Protect Workers in Remote Environments

With relaxed in-office requirements in the wake of the COVID-19 pandemic, many firms have maintained a hybrid work model. However, home networks and personal devices may have weaker security measures compared to corporate networks and devices. There are 3 essential tools to protect workers in remote environments and it’s as easy as making guacamole.

Can You Get a Virus From Visiting a Website?

Yes, you can get a virus by visiting a website, however, it’s extremely rare. Getting a virus from visiting a website is possible through exploit kits and drive-by downloads. There are several cybersecurity precautions you can take to mitigate the damage a virus can cause in the event that you visit a compromised website.

451 Spotlights Keeper Security for Cloud-Native Approach and Focused Vision

Keeper Security’s Privileged Access Management (PAM) solution, KeeperPAM™, has been featured by 451 Research, a technology research firm that provides an unbiased view of opportunities and risks across the enterprise technology landscape. The 451 Research group is part of S&P Global Market Intelligence.

How To Send Your Social Security Number Safely

The safest way to send your Social Security number (SSN) is by using a password manager. A password manager is a tool used to keep passwords and other sensitive data secure at all times. A little-known benefit to password managers is that in addition to generating and storing strong passwords, they also aid users in securely sending sensitive information such as Social Security numbers, MFA codes, home deeds, identification cards and more.

What Is a Watering Hole Attack?

A watering hole attack is a type of cyberattack in which a threat actor targets an organization by hacking a website often visited by an employee in order to infect the employee’s device with malware. Once the device of one employee is infected, the threat actor targets other members of the organization and steals their confidential information.

How To Protect Against Phishing

Phishing is a malicious attempt to trick you into revealing sensitive information such as passwords, credit card numbers or personal details. Cybercriminals often disguise themselves as familiar and trustworthy individuals or companies, making it crucial to be vigilant. Learn more about creating strong passwords and protecting yourself on line with Keeper.