Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Keeper

Vault Recovery Phrase

Keeper maintains the most security certifications in the industry and is committed to continually evolving our security methods in order to protect your data. As a result, we are upgrading our account recovery system with a new recovery phrase method. A recovery phrase is a simple, auto-generated set of 24-words that can be used to restore access to your Keeper Vault in the event you forget your Master Password.

Introducing 24-Word Recovery Phrases - The Most Secure Recovery Method

Keeper Security continually invests in new, more robust technologies to counter emerging threats. That’s why Keeper is upgrading our account recovery process via a new and more secure 24-word “recovery phrase” feature, replacing the current user-customizable security question-and-answer recovery method.

What is Password Sharing?

You may be hearing about password sharing more often these days as Netflix cracks down on users sharing logins with anyone outside their household. The new rule has been met with strong opposition by those who share streaming logins with friends and family. For many, password sharing has become the norm when it comes to streaming services. Password sharing refers to the act of sharing login credentials with other people so they also have access to your account.

Password Management is Critical to Your Cybersecurity Strategy

From generating strong passwords to monitoring the security policies and practices of a company, password managers are powerful solutions that defend companies against cyberthreats and improve employee productivity. Continue reading to learn more about why password management is critical to every organization’s cybersecurity strategy.

Closing the Cybersecurity Front Door: Addressing the Federal Government's Security Gaps

The Office of Inspector General (OIG) recently evaluated the Department of Commerce’s (DOC) cybersecurity program, uncovering critical failures that exposed the DOC to potential risks. Specific issues included the use of default passwords for administrative accounts, compromising over 100,000 pieces of personal identifiable information (PII).

What is SIM Swapping?

SIM swapping is when a cybercriminal impersonates someone in order to convince a mobile carrier to activate a new SIM card. These bad actors use social engineering tactics, claiming “their phone” was supposedly lost, stolen or damaged, when in reality, it was never their phone to begin with. When a cybercriminal successfully SIM swaps, they can more easily steal someone’s identity because they can now receive their text messages and phone calls.

Password Security Best Practices for Businesses

Organizations spend billions of dollars on cybersecurity tools and consultants each year. Beyond traditional tools like firewalls, antivirus software, and System Information and Event Management (SIEM), it is easy to get caught up in sophisticated threat detection using artificial intelligence, machine learning, user behavior and analytics.

Understanding and Preventing Ransomware Attacks

Understanding ransomware attacks is the first step in being able to prevent them from successfully targeting an organization. To prevent ransomware attacks, organizations must have strong security protocols in place such as performing regular system backups and training employees to avoid social engineering scams, among other measures. Continue reading to learn more about ransomware attacks and what organizations can do to stay protected against this type of attack.