Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Keeper

Double Extortion Ransomware: What It Is and How To Avoid It

Double extortion ransomware is a type of cyber attack in which cybercriminals steal sensitive data and encrypt it. Then, cybercriminals threaten to release the stolen data unless the victim pays a ransom. The additional threat of exfiltration makes this type of cyber attack particularly damaging for organizations, as they face the risk of sensitive data being exposed to the public or sold on the dark web.

The Most Recent Malware Attacks on Companies in 2024

2024 has been quite the year for malware attacks. So far this year, major companies like Change Healthcare, Ticketmaster, Ascension Hospital, ABN AMRO and CDK Global have all been affected by malware attacks. Keep reading to learn more about each of these major malware attacks and how your company can protect itself from malware attacks.

Can Someone Hack My Home WiFi?

Yes, it is possible for someone to hack your home WiFi. This can occur if you have a weak WiFi password, if you fail to update your router’s software or through a method called Domain Name Server (DNS) hijacking. Continue reading to learn how your home WiFi can be compromised, the signs of a hacked WiFi router, the steps to take if you get hacked and effective measures to prevent your home WiFi from getting hacked.

How Does Child Identity Theft Happen?

Child identity theft can happen in many different ways, such as by family members, data breaches, compromised online accounts or even sensitive documents being stolen. According to a Carnegie Mellon CyLab study, children are 51 times more likely to fall victim to identity theft than adults. Child identity theft happens when an individual uses a minor’s sensitive information to open lines of credit, get loans or steal benefits under the minor’s name.

BYOD Security Best Practices

Bring Your Own Device, better known as BYOD, is when employees can use their personal devices on a company’s network to complete their work tasks. Companies sometimes prefer their employees to use their own devices because they save money on providing technology and resources. Despite this financial benefit, companies should recognize the security risks BYOD can bring to their employees and organizations.

How To Educate Children About Online Password Safety

According to data from the Pew Research Center, over 33% of parents with children younger than 12 years old say their children started using digital devices before they were five years old. With children gaining access to technology at earlier ages than ever before, it is important to teach your children about online password safety. Password safety refers to the best practices of creating strong passwords and keeping them stored in a safe location.

Venmo Business Account Scams

Some common Venmo business account scams include fake payment invoice scams, overpayment scams, fraudulent Venmo support, business impersonation scams and phishing scams. If you are unfamiliar with Venmo, it is a mobile app used to send and receive money, similar to PayPal, Zelle or Cash App. If you already have a personal profile on Venmo, you can create a business profile to keep track of your transactions and give you more payment methods, including the option to receive tips.

How Much Information Can Someone Get From Your Email Address?

Your email address can reveal a substantial amount of personal information including your full name, phone number, home address, place of work, social media profiles and other online accounts. Keep reading to learn what information someone can get from your email address, whether your identity can be stolen and how to keep your email address safe.

Sharing Passwords via Email? What You Should Do Instead.

If you’re tempted to share a password over email, there are several security risks you should be aware of before doing so. Sending passwords over email is dangerous because emails are unencrypted and can be intercepted by cybercriminals. When data is unencrypted, it could be read or saved by the wrong or malicious recipients. Read on to learn why sending passwords through email is risky and how you can use a password manager to safely share your passwords instead.