Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Types of Phishing Attacks

There are several types of phishing cyberattacks such as smishing, whaling and spear phishing. It’s important to understand the different types of phishing attacks there are so you’re able to spot them. Knowing the different types of phishing attacks can make all the difference in keeping your information protected. Continue reading to learn more about the different types of phishing attacks and how you can keep yourself safe from them.

Shielding Critical Infrastructure: Conquering Ransomware with Keeper Security Government Cloud

The Biden Administration’s 35-page National Cybersecurity Strategy released in March 2023 emphasizes the growing importance of cybersecurity for both private companies and federal agencies. The strategy specifically highlights ransomware as a significant concern, particularly in terms of its impact on private companies that collaborate with the federal government or are critical to national security.

What's New at Keeper Security - March 2023

Keeper continues to release new features for consumers, businesses, enterprises and managed service providers. Our latest release includes significant enhancements such as a Business Support Portal for our business customers, multiple vault integration capabilities for Keeper Connection Manager (KCM), a Google Cloud integration with Keeper Secrets Manager (KSM), CAC/PIV integration for agencies and more.

What is a Privacy Policy?

A privacy policy is a statement that companies have on their website that informs users about the collection, processing, protection and use of their private data. Users are often prompted to review and accept privacy policies, but many of them don’t read through these policies because they don’t think it’s necessary. It’s important to read through these policies to know what information is being collected and how it’s being used.

Keeper Announces Automated Password Rotation - Coming Soon

Regular rotation of passwords, keys and privileged credentials is a critical best practice that greatly reduces an organization’s risk of falling victim to cyberattacks. By limiting the lifespan of a password, organizations can reduce the amount of time during which a compromised password may be valid. Password, key and credential rotation – a feature of Privileged Access Management (PAM) – enables organizations to reset privileged credentials on an automated schedule.

Keeper - The Only Enterprise Password Manager to Use Elliptic Curve Cryptography

Keeper’s Enterprise Password Manager is the only solution that uses Elliptic Curve Cryptography (ECC) in its encryption, making it the most secure password management solution available. ECC is a public-key cryptography method based on the mathematics of elliptic curves. First proposed in 1985, it recently rose to prominence with modern cryptography as it provides a higher level of security compared to traditional encryption methods, such as RSA.

KeeperPAM Rotation Demo Teaser

IT Admins and DevOps teams often struggle to protect privileged accounts. Passwords need to be updated regularly and automatically but traditional privileged access management tools have high costs and complex deployments - leaving organizations vulnerable to password-related data breaches and cyberthreats. Introducing Keeper's new automated Password Rotation enhancement to KeeperPAM. Rotation of privileged credentials protects against infrastructure attacks and insider threats while simplifying account management through a unified platform.

Indent and Keeper: Time Limited and Permanent Password Access Available On-Demand

Last year, Keeper Security unveiled One-Time Share, a secure and convenient way for Keeper users to share credentials with anyone, including those that are not Keeper users. Since its launch, many of our customers have grown to rely on One-Time Share, including in cases where they need the ability to set time duration. As a result, we’ve made expanding the options for setting and modifying time-limited access a top priority.