Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Keeper

What Is Shoulder Surfing?

Have you ever wondered why PIN pads at grocery stores often have a protective shield surrounding the buttons? It’s to prevent an attack called “shoulder surfing.” Shoulder surfing is a method of information theft in which the perpetrator watches the victim from nearby to see any information they type or view on their screens. Keep reading to learn why shoulder surfing is a threat to cybersecurity and how to protect your private information from this form of attack.

How To Remove Your Information From People Search Sites

You can remove your personal information from people search sites by searching your name on Google, gathering a list of people search sites, finding your information on each website, locating the opt-out page and submitting a request to opt-out. Continue reading to learn what people search sites are, detailed steps to removing your information from these sites, and why it’s important to do so.

Introducing Keeper Security Government Cloud for MSPs

Managed Service Providers (MSPs) play a crucial role in delivering reliable and secure IT services to organizations of all sizes and across various industries. With the rise in cyber threats, especially ransomware attacks targeting public sector organizations, the need for robust cybersecurity tools has become paramount.

How To Buy and Sell Safely on Facebook Marketplace

To buy and sell safely on Facebook Marketplace, you should check seller and buyer profiles, meet in a public place when selling or purchasing an item, have a friend or relative accompany you for the exchange of goods, use secure payment methods and more. Continue reading to learn more about Facebook Marketplace scams and how to stay safe from them when selling or buying on the platform.

Protecting Small Businesses From Ransomware Attacks

Weak passwords are responsible for 75% of ransomware attacks, as well as over 80% of data breaches. It’s vital that businesses take proactive steps now to prevent ransomware attacks. Travis Griffith, one of Keeper’s Solutions Engineers, discusses the main cybersecurity challenges for small businesses, how ransomware can affect your operations, and how to protect against it.

How To Know if Your Phone Is Hacked

You can know if your phone is hacked if you experience warning signs such as data usage being higher than normal, new apps you didn’t download, unusual or inappropriate pop-ups and more. Continue reading to learn about the warning signs that indicate your phone has been or is being hacked, and what you can do if you discover your phone has been hacked.

Top Five Password Security Tips

The most important tips for password security include choosing long, complex, unique passwords, not storing them in easy-to-hack places and using a password manager. Unfortunately, most people don’t follow best practices for password security. According to Keeper Security’s 2023 Password Management Report, only 25% of people use strong, unique passwords for all of their accounts. That means 75% of people have insufficient password practices.

Everything You Need To Know About Insider Threats

An insider threat is a cyberthreat that happens within an organization. Insider threats occur when current or former employees, partners, contractors or vendors cause sensitive data and systems to become compromised or steal data for their own malicious purpose. Insider threats can be intentional or unintentional, depending on the goal of the insider and if the insider is working with someone else.