Tag: password management

September 20, 2020

Improve Security in a Flash with a Strong Password Manager

Sell more Dark Web monitoring with these free tools to bring home the real danger of the Dark Web to your clients (and get a quick brush up yourself)!

Read More
password sharing is a data breach danger
August 11, 2020

Password Sharing is a Data Breach Danger

Password sharing isn’t a convenience – it’s a data breach danger. See how it puts your data and systems at risk and how to quickly put a stop to it

Read More
Password security statistics represented by an old fashioned lock and key
July 13, 2020

10 Facts About Passwords to See Before You Make Another One

These 10 password security statistics clearly show why relying on a password to secure your data in 2020 is just as dangerous like relying on an old lock to secure your door.

Read More
a gold pocket watch is depicted on a one dollar bill
April 23, 2020

Solutions for 3 Urgent CISO Priorities

Welcome to the new remote-work world. CISOs may have accounted for upgrades and increases in cyberattacks in their 2020 planning, but no one accounted for COVID-19. Here are 3 urgent priorities that CISOs must address in the wake of COVID-19 and fast solutions to get them checked off your list.

Read More
A baby blue background features a sleek laptop with a bright pink pop up box springing out of it with asterisks and a lock to indicate a secure login.
April 21, 2020

Boost Remote Security and Ease Everyone’s Stress With This Tool

More technology brings more tools for work and entertainment – and more logins to remember. Everyone has too many these days, causing endless trouble for both users and techs. This phenomenon leads to endemic password reuse, weak passwords, and password mishandling. How can SMBs solve this problem? By making logins a one-stop-shop.

Read More
April 07, 2020

Introducing Next-Level Secure Identity & Access Management With Passly

Get the first look at Passly, our new Secure Identity and Access Management solution that’s perfectly suited for today’s mobile workforce, featuring Secure Password Management, Single Sign-On, Multi-Factor Authentication and more!

Read More
A cartoon male hacker reaches through a monitor to steal a folder
April 03, 2020

New Marriott Breach Underlines the Importance of Login Security

Bad actors were bad news for Marriott this week, as they once again reported a huge data breach. Over 5.2 million guest records were snatched by cybercriminals in January 2020. Their vehicle for entry? Employee login credentials.

Read More
February 25, 2020

Consumers Are Skeptical About Biometric Data Security: How Companies Can Respond

In 2014, Apple’s introduction of the iPhone 6 was more than just an exciting iteration of its flagship product – it was the launch of Touch ID. This blockbuster device ushered in a new era of widespread biometric data use for the layman. Fingerprints had replaced passcodes as device gatekeepers, charged with protecting the most important, sensitive information.

Read More
February 18, 2020

Six Similarities Between GDPR & US Regulatory Requirements

As companies collect and store more and more personal information, they face data privacy risks on many fronts. Increasingly, they are being held accountable for protecting their customers’ digital privacy. New regulations, led by Europe’s General Data Protection Regulation (GDPR) in 2018, are quickly becoming normative in countries around the world. In total, 58% of all countries have some form of privacy regulations on the books, and another 10% are drafting legislation.

Read More
February 10, 2020

The NY SHIELD Act is Almost Here: How to Stay Compliant

Data privacy regulations are quickly becoming par for the course in countries around the world, each one bringing new, nuanced responsibilities for companies to follow. While Europe’s expansive General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA) have made most of the headlines, we are just months away from the latest privacy regulation, New York’s “Stop Hacks and Improve Electronic Data Security (SHIELD) Act.”

Read More

Please fill in the form below to subscribe to our blog