Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

August 2023

What Makes a Strong Password?

A strong password is made up of at least 16 characters and contains upper and lower case letters, numbers and symbols. Strong passwords also follow password best practices so they never contain personal information, dictionary words or phrases, and are never reused across multiple accounts. Continue reading to learn why strong passwords are necessary and tips for creating a strong password.

The Most Common Types of Cyberattacks

The most common types of cyberattacks are phishing, variations of password attacks, malware, spoofing, supply chain attacks, DDoS attacks, identity-based attacks, IoT attacks and insider threats. Continue reading to learn more about what these cyberattacks are and how to keep yourself protected from them.

Protecting Local Government Data: Why Password Managers Are Essential

Cyberthreats and ransomware attacks can be crippling for municipalities and county government offices. Local government employees need to access a growing number of systems, applications and databases to perform their duties, while the rise of remote work has drastically increased the attack surface of a typical small government office.

Why Cybersecurity Is So Valuable for Small Businesses

Cybersecurity is extremely valuable for small businesses because it keeps their data secure, improves employee productivity, helps protect their reputation, aids in legal and regulatory compliance, and is cost-effective. Read on to learn more about the value of cybersecurity for small businesses and cybersecurity best practices your business can start implementing today.

What Is Cross-Site Scripting?

Cross-Site Scripting (XSS) is a web security vulnerability that happens when cybercriminals inject client-side scripts into web pages accessible by other users. These scripts compromise the web page and allow cybercriminals to inject malicious scripts into a user’s browser, leading to the exposure of data, session hijacking or manipulation of the web page’s content and functionality.

Top Questions Keeper Received at BlackHat 2023

The Keeper team had an amazing time at the 2023 Black Hat security conference in Las Vegas. We met with partners, prospects, friends, vendors, and of course, our incredible customers. Over the span of two days we talked to thousands of people and collected valuable data on a number of critical topics. In fact, we generated a mountain of data about what cybersecurity professionals want from password and privileged access management solutions.

Keeper 101: Keeper - Gradient PSA Billing Reconciliation

Introducing the Keeper-Gradient MSP integration, the powerful solution for Keeper MSP Admins to gain a high-level view of their entire billing process. With this integration, MSPs can streamline their operations and drive business growth. Let's take a closer look at the features and how to set it up. The Gradient MSP integration currently integrates with the most popular PSAs, including Connectwise Manage, Datto Autotask, BMS by Kaseya, and more.

Keeper 101 - Advanced Reporting & Alerts Module (ARAM)

The Advanced Reporting and Alerts Module (ARAM) tracks over 200 security events across the organization and addresses many password-related cybersecurity auditing, alerting and compliance needs. This module provides insight to assess vulnerabilities related to administrative changes, password reuse, unauthorized access, password stuffing attacks and insider threats.

How To Secure Your Social Media Accounts

Keeping your social media accounts safe is crucial to keeping your sensitive data protected. In this blog, you’ll learn how to strengthen your accounts by using strong and unique passwords, setting up MFA, adjusting your privacy settings and keeping an eye on your account activity. Continue reading to learn more ways you can secure your social media accounts and the common threats social media accounts face.

How To Know if Your Identity Has Been Stolen

Some signs that indicate your identity may have been stolen include seeing charges you didn’t make on your bank account statement, new inquiries on your credit report, an unusual drop in your credit score, credit checks you didn’t initiate, your credentials being posted on the dark web and more. Continue reading to learn more indications that your identity has been stolen and what to do if you’re a victim.

KeeperPAM Report: Deployment During Economic Uncertainty

Keeper Security has released the second part of a series of Privileged Access Management (PAM) research, Privileged Access Management Survey: Deployment Amid Economic Uncertainty, to understand how IT leaders are approaching, deploying and streamlining their PAM solutions. Keeper surveyed over 400 IT leaders globally, focusing on the impact of the global economic downturn on PAM deployments, and what IT leaders are prioritizing in PAM solutions given the current economic climate.

AI can crack your passwords. Here's how Keeper can help.

As AI becomes more advanced, it’s important to consider all the ways AI can be used maliciously by cybercriminals, especially when it comes to cracking passwords. While AI password-cracking techniques aren’t new, they’re becoming more sophisticated and posing a serious threat to your sensitive data. Thankfully, password managers like Keeper Security exist and can help you stay safe from AI-password threats.

What Is Malvertising?

Malvertising–also called malicious advertising–is when cybercriminals use advertisements to infect devices with malware. Malvertising can appear on any advertisement you see online, you don’t necessarily have to be on a malicious website to be a victim of this cyberthreat. When a victim is exposed to a malvertisement, their device and data are at risk of being compromised, even if they don’t interact with the advertisement.

SAML vs OIDC for Password Manager SSO Integration

Single Sign On (SSO) helps organizations improve their security posture while streamlining the employee login experience. Implementing an SSO platform across your organization is almost always a good idea. However, SSO leaves significant security and functionality gaps that organizations need to be aware of and address. SSO doesn’t cover everything. Many websites, applications, and systems are not included in SSO deployments, and each of those presents a cybersecurity risk.

How To Tell if Someone Hacked Your Router

You can tell if someone has hacked your router if you notice that you can’t log into your router’s admin settings, your browser keeps redirecting you or you receive suspicious activity alerts from your internet service provider, among other signs. Continue reading to learn how someone can hack your router and how you can protect your router from getting hacked going forward.

What Is Call Spoofing?

Call spoofing is when someone, usually a scammer or cybercriminal, disguises their caller ID information to hide who they really are. Call spoofing can also spoof the cybercriminal’s location to make it appear as if the call is coming from a specific location. With call spoofing, the caller will pretend to be someone they’re not to convince the individual to provide them with their personal information.

What Are Common Indicators of a Phishing Attempt?

Common indicators of a phishing attempt include warnings from your email service provider, urgent language, threat of dire consequences, too-good-to-be-true offers and more. Continue reading to learn what to look for to spot phishing attempts and how to keep yourself protected.

What Is a Threat Actor?

A threat actor is an individual or group that purposefully exploits weaknesses in computer systems, networks, devices and individuals for their own benefit. There are many different types of threat actors, with each of them having their own motives and skill levels. Some types of threat actors include cybercriminals, insiders, hacktivists and nation-state threat actors. Continue reading to learn what threat actors do, the tactics they use and how to stay safe from them.

Understanding RockYou.txt: A Tool for Security and a Weapon for Hackers

In the realm of cybersecurity, the RockYou.txt wordlist has become a household name. It’s a tool used by security professionals to test the strength of network security. However, like many tools in the digital world, it can also be misused by malicious actors. In this blog post, we’ll delve into the history of RockYou.txt, its uses and how to protect your organization from potential threats associated with it.

What To Do if You Are a Victim of Credit Card Fraud

If you discover you are a victim of credit card fraud, start the recovery process by notifying your credit card issuer, placing a fraud alert on your credit report, freezing your credit and contacting the three major credit bureaus. However, before taking these steps, you should determine if you are in fact a victim of credit card fraud.

How To Prevent Your Instagram from Getting Hacked

Unfortunately, Instagram is a common target for malicious hackers. Cybercriminals hack accounts in order to distribute spam, commit phishing attacks against your followers and steal your data. There were more than 1 million social media account takeovers in 2022, and most of the affected accounts were on Instagram.

What Is a Good Way To Manage Several Passwords at Once?

A good way to manage several passwords at once is by using a password manager. A password manager is a tool that aids users in creating, managing and securely storing all their passwords and sensitive data. Continue reading to learn the importance of managing passwords and how you can manage several passwords at once with a password manager.