Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

What Is IoT Security?

Internet of Things (IoT) security protects IoT devices and the networks to which they connect from cyberattacks. IoT devices can include anything that connects to your internet including doorbell cameras, baby monitors, smart bulbs and thermostats. This presents a cybersecurity risk because anything that can connect to your internet is at risk of being hacked.

What Is an Attack Surface?

An attack surface refers to all the possible points, also called attack vectors, where cybercriminals can access a system and steal data. When an attack surface is small, it’s easier to manage and protect, making it essential to reduce your attack surface as much as possible. Continue reading to learn more about attack surfaces and how you can reduce your organization’s attack surface by following a few of our tips.

Are Phishing and Social Engineering the Same?

No, phishing and social engineering are not the same. Phishing is a subset of social engineering, meaning phishing attacks are a form of social engineering, but not all social engineering is considered phishing. Read on to learn more about what differentiates phishing from social engineering and how to protect yourself from both.

What Makes a Strong Password?

A strong password is made up of at least 16 characters and contains upper and lower case letters, numbers and symbols. Strong passwords also follow password best practices so they never contain personal information, dictionary words or phrases, and are never reused across multiple accounts. Continue reading to learn why strong passwords are necessary and tips for creating a strong password.

The Most Common Types of Cyberattacks

The most common types of cyberattacks are phishing, variations of password attacks, malware, spoofing, supply chain attacks, DDoS attacks, identity-based attacks, IoT attacks and insider threats. Continue reading to learn more about what these cyberattacks are and how to keep yourself protected from them.

Protecting Local Government Data: Why Password Managers Are Essential

Cyberthreats and ransomware attacks can be crippling for municipalities and county government offices. Local government employees need to access a growing number of systems, applications and databases to perform their duties, while the rise of remote work has drastically increased the attack surface of a typical small government office.

Why Cybersecurity Is So Valuable for Small Businesses

Cybersecurity is extremely valuable for small businesses because it keeps their data secure, improves employee productivity, helps protect their reputation, aids in legal and regulatory compliance, and is cost-effective. Read on to learn more about the value of cybersecurity for small businesses and cybersecurity best practices your business can start implementing today.

Top Questions Keeper Received at BlackHat 2023

The Keeper team had an amazing time at the 2023 Black Hat security conference in Las Vegas. We met with partners, prospects, friends, vendors, and of course, our incredible customers. Over the span of two days we talked to thousands of people and collected valuable data on a number of critical topics. In fact, we generated a mountain of data about what cybersecurity professionals want from password and privileged access management solutions.

What Is Cross-Site Scripting?

Cross-Site Scripting (XSS) is a web security vulnerability that happens when cybercriminals inject client-side scripts into web pages accessible by other users. These scripts compromise the web page and allow cybercriminals to inject malicious scripts into a user’s browser, leading to the exposure of data, session hijacking or manipulation of the web page’s content and functionality.

How To Secure Your Social Media Accounts

Keeping your social media accounts safe is crucial to keeping your sensitive data protected. In this blog, you’ll learn how to strengthen your accounts by using strong and unique passwords, setting up MFA, adjusting your privacy settings and keeping an eye on your account activity. Continue reading to learn more ways you can secure your social media accounts and the common threats social media accounts face.