Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

June 2023

How Can I Use PAM to Satisfy Cyber Insurance Requirements?

Privileged Access Management (PAM) enables organizations to address core controls needed to qualify for many cyber insurance policies. It’s important for organizations to be insured and mitigate the potential impact of a breach, and PAM is a critical part of any risk management strategy. In this blog, we’ll take a look at how organizations can satisfy common cyber insurance requirements with PAM, and the security benefits doing so offers.

Autofill with KeeperFill

KeeperFill is Keeper’s powerful, autofilling browser extension. Once you download KeeperFill, you can conveniently autofill your logins, passwords, passkeys and save new records that you create to your Keeper Vault. KeeperFill is available for every web browser including: Chrome, Firefox, Safari, Edge, Opera, Brave and any other Chromium-based browser. KeeperFill Browser Extension User Guide: docs.keeper.io/user-guides/browser-extensions.

Cyberstalking vs Cyberbullying vs Cyber Harassment: What's the Difference?

According to Pew Research, 41% of Americans have experienced some form of online harassment – and the severity of incidents has been getting worse over time. Understanding what different types of online harassment look like, and what behaviors harassers engage in, can help you recognize and address it. Keep reading to learn about the different types of online harassment, consequences of online harassment and how to avoid becoming a target.

Deep Web vs Dark Web: What's the Difference?

The main difference between the deep web and the dark web is that the deep web is bigger and used every day by most people without even realizing it. The dark web can only be accessed with the Tor browser and is riskier to access than the deep web. Continue reading to learn more about the differences between the deep and dark web, and how you can keep your information protected from both.

Types of Multi-Factor Authentication (MFA)

The four types of Multi-Factor Authentication (MFA) are knowledge, possession, inherence and location. These authentication types provide a foundation for a number of MFA methods, giving users multiple options for securing their data, ranging from SMS message tokens to hardware security keys. Which method is right for you or your business can depend upon what you have access to and how secure you want to be.

The Three Different Types of Hackers

Hackers fall into one of three general categories: white hat hackers, black hat hackers and gray hat hackers. But these aren’t the only types of hackers that exist. There are also red hat hackers, green hat hackers, blue hat hackers and more. Read on to learn more about the types of hackers and what makes them different from one another.

Can Someone Access the Passwords Saved in My Browser?

Yes, anyone who has access to your web browser or uses malicious software to hack it will be able to access the passwords saved in your browser. These known security flaws in browser password managers are often ignored because they are convenient to use. However, your passwords are not secure in a browser password manager. Continue reading to learn more about the risks of using browser password managers and what you should use instead.

Keeper and Brigantia Super-Charge Partnership With MSP Workshop Event

Keeper Security partnered with Brigantia almost three years ago to focus on growing our business in the UK and Ireland MSP markets. It was an honour to re-join forces for a productive afternoon in London for an informative workshop with current partners. Brigantia’s Sales Director, Angus Shaw, and Keeper Security’s Global Channel Director, John Andrews, led the charge, with Padraigh Conway, our Lead EMEA Sales Engineer, providing detailed best practices sessions.

Can WiFi See What You Search on Incognito?

Yes, your WiFi provider – also called an Internet Service Provider (ISP) – can see what you search and what sites you visit, even when you’re in incognito mode. The owner of the router will also be able to see what you search in the router logs. Incognito mode only prevents your site visits from being saved to your browser history. Read on to learn more about how incognito mode works and who can see your search history.

How Cybercriminals Are Using AI for Cyberattacks

Cybercriminals are using AI to carry out various cyberattacks including password cracking, phishing emails, impersonation and deepfakes. It’s important you understand how cybercriminals are using AI to their advantage so you can better protect yourself and family, as well as your accounts and data. Continue reading to learn about AI-enabled cyberattacks and what you can do to keep yourself safe.

How To Check If an Email Attachment Is Safe

Cybercriminals often use phishing emails to get you to click on malicious links or attachments. Clicking on these scams can trigger a malware infection that places all your sensitive data at risk of becoming compromised. Before deciding to click on an attachment, you should make sure it’s safe to open.

What Is Personally Identifiable Information (PII)?

Personally Identifiable Information (PII) is any data that can identify a specific individual. Data like your Social Security number allows you to open credit cards, get a loan and more. It’s also data that is vital to keep secure in order to protect your identity and assets. Read on to learn more about what types of information qualify as personally identifiable information and how to protect it from cybercriminals.

GigaOm Names Keeper Enterprise Password Manager The Overall Leader

Keeper Security’s Enterprise Password Management (EPM) solution has been recognized as the Overall Leader in password management by the analyst firm GigaOm in their 2023 Radar Report for Password Management. GigaOm has named Keeper as the overall leader for two years in a row. This designation comes on the heels of similar recognition by G2, CHIP and the Global Infosec Awards, among others.

How Do Hackers Steal Passwords?

Hackers steal your passwords through a variety of methods including data breaches, password cracking, guessing, physical theft and malware. This can have serious consequences, especially if the hackers gain access to your accounts, but there are ways to protect yourself. Read on to learn more about how hackers steal passwords and how to prevent them from gaining access to your accounts.

How to Keep Your Data Safe Online

There are risks associated with providing your confidential information online, but it’s necessary in a modern world that requires Personally Identifiable Information (PII) to create accounts, purchase goods online, complete your taxes or receive a paycheck. Your data could become vulnerable through no fault of your own. Data breaches are common, and your account information could get leaked. If your data is intercepted by threat actors, it could be sold to cybercriminals on the dark web.

KeeperPam Overview

KeeperPAM was created to fully protect perimeterless and multi-cloud environments with just the features you need. Keeper's patented PAM solution enables organizations to achieve complete visibility, security, control and reporting across every privileged user on every device in your organization. The platform enables zero-trust and zero-knowledge security and compliance by unifying three integral products into one SaaS platform with limited IT staff required.

Smishing vs. Vishing: What's the Difference?

The main difference between smishing and vishing is that smishing is a phishing attack that uses SMS text message as the contact method and vishing uses voice calls as the contact method. Research conducted by the FBI’s Internet Crime Complaint Center (IC3) found that phishing, including vishing and smishing, is the most prevalent cyberthreat in the U.S. The report found that in 2022, 300,497 people reported falling victim to phishing, resulting in reported losses totaling up to $52,089,159.

How to Stay Safe While Online Gaming

To stay safe while playing online video games, you should follow cyber hygiene best practices to protect your anonymity. Best practices include using strong passwords, using a VPN and keeping your software updated. Read our eleven recommendations for keeping sensitive information secure and protecting yourself while playing online games.

What is Elliptic Curve Cryptography?

Elliptic Curve Cryptography (ECC) is a form of public-key cryptography that is based on the mathematics of elliptic curves. It provides a secure way to perform cryptographic operations such as key exchange, digital signatures and encryption. ECC is an alternative to Rivest-Shamir-Adleman (RSA) encryption, which was first released in 1977. Continue reading to learn more about elliptic curve cryptography and why it’s considered the most secure form of encryption.

Keeper Wins Prestigious CHIP Test of Password Managers

Keeper Security has been named “Test Winner” in a group test of leading password managers conducted by CHIP Magazine, a leading consumer technology publication in Germany. In the current edition CHIP 06/2023, the CHIP test center reviewed Keeper’s Personal Password Manager in a comparative test of 10 password management solutions. Keeper was awarded first place with an overall rating of “Sehr Gut” (Very Good) and a score of 1.1 (1.0 is a perfect score).

Types of Threats Privileged Accounts Face

There are many cybersecurity threats privileged accounts face including phishing, insider threats, malware and brute force attacks. When privileged accounts aren’t managed or secured properly, all of an organization’s sensitive data is vulnerable to being successfully targeted by threat actors. Continue reading to learn how and why cybercriminals target privileged accounts and how organizations can keep their most critical accounts safe.

Enterprise End User SSO Login

Your Keeper vault is easy to create, simple to use, and you’ll be up and running in just minutes. You can create and access your Keeper vault by either logging in directly from Keeper via an email invitation from your Keeper Administrator or from your SSO provider dashboard. You may have received an email from your organization's Keeper Administrator inviting you to create a Keeper account with a subject line that reads: "Action Required - Instructions for Your Keeper Security Account".

What Is a Pretexting Attack?

A pretexting attack is a type of social engineering attack where the threat actor persuades their target into revealing sensitive information or sending them money by making up a story, hence the word “pretext.” Pretexting attacks can come in many different forms including a phone call, text message, email or even in person.

What To Do if a Scammer Has Your Email Address

If a scammer knows your email address, you should be extra-vigilant about phishing, and secure all your accounts with strong passwords and Multi-Factor Authentication (MFA). If you suspect a scammer has gained access to your email account, you should take steps with your email provider to secure your account and let all your contacts know you have been hacked. Read on to learn more details about what a scammer can do with your email address and how to protect your account.