Keeper Security Expands Offices to Europe to Provide Business Cybersecurity Solutions

by , on

We’re growing!

Delighted to announce that Keeper Security just opened its first  European office in Cork, Ireland this week to answer the demand for business cybersecurity solutions in the EMEA market. The new office will staff 50 employees over the next two years, adding a boon to the city’s tech sector and building on Cork’s reputation as a cybersecurity hub in Europe.

Director of Sales, John Maher, will be leading the team to support our business customers overseas. He is working hard to choose the best team and provide the right environment to significantly grow the business into Europe in 2018.

If you are a business in Europe and need password management and digital vault solutions, we are ready to assist you. You can find out more by visiting this link to the IDA Ireland press release.

Not yet a Keeper business customer? Click here to find out more.

Update for Keeper Browser Extension 11.4.4

by , on

On Dec 8, Keeper released a major new browser extension update (Version 11.3) that introduced several new features and improvements to the user experience, including improved form filling and automation features.

Yesterday (Dec 14), Tavis Ormandy (a highly-respected security researcher at Google) contacted us about a potential vulnerability in our browser extension update. This potential vulnerability requires a Keeper user to be lured to a malicious website while logged into the browser extension, and then fakes user input by using a clickjacking and/or malicious code injection technique to execute privileged code within the browser extension.

To resolve this issue, we removed the “Add to Existing” flow and have taken additional steps to prevent this potential vulnerability in the future. Even though no customers were adversely affected by this potential vulnerability, we take all reported security issues, vulnerabilities and bug reports seriously. The security and protection of customer information and data is our top priority at Keeper. From the time we were notified of this issue, we resolved it and issued an automatic extension update to our customers within 24 hours.

All customers running Keeper’s browser extension on Edge, Chrome and Firefox have already received Version 11.4.4 (or newer version) through their respective web browser extension update process. Customers using the Safari extension can manually update to version 11.4.4 (or newer) by visiting Keeper’s download page. No reports of any customers affected by this bug have been reported to Keeper. Mobile Apps and Desktop Apps were not affected and do not require updates.

Please contact us at with any questions about this security update. For general help, please contact us at

Thank you for staying protected with Keeper.

Keeper Security Gives Back with ChiTech Food Drive

by , on

Excited to announce that Keeper Security has joined forces with other top Chicago Tech companies to give back to the Chicagoland community. The fourth annual #ChiTechFoodDrive provides much needed fresh fruits, vegetables, dairy products and protein via the Greater Chicago Food Depository to our 812,000 neighbors in Cook County, including 1 in 6 children, who face food insecurity on a daily basis.

This 100% digital campaign provides 3 meals for every $1 donated, creating an instant positive impact on the community. In a few short days, the team at Keeper has helped donate 1,096 meals. So far the combined efforts of all the participating companies have achieved 44% of the food drive goal of 90,000 meals for the holiday season.

100% of our donations are used to purchase food for our neighbors in need. Plus, Keeper Security will match every $1 donated via the Keeper Team to double the results!

If you are interested in contributing as a “Friend of Keeper” to this great cause, please click here. You can also visit The Food Drive ends Friday, December 8.

Happy and healthy holidays to all of our friends from Keeper!

Key Takeaways From The Gartner IAM Summit

by , on

Password solutions a core element of IAM strategies today

Attendees at the recent Gartner Identity & Access Management Summit were treated to a first-hand look into a rapidly emerging industry segment widely considered a bulwark against the surging threat of global cybercrime. And as Summit visitors saw, the threat environment is a hyper-dynamic one that necessitates a multi-layered approach to securing digital assets against the constant threat of attacks.

As was explained at the Summit, Gartner defines identity and access management solutions as tools that manage digital identity and access rights across multiple systems. The tools accomplish this business-critical function in today’s highly distributed computing environments by aggregating and correlating identity and access rights data to enhance control over user access. Such aggregated data serves as the basis for what Gartner sees as the core identity and access management functions, which include:

  •   Identity lifecycle and entitlements management
  •   Access requests
  •   Workflow orchestration
  •   Fulfillment via audited provisioning and service tickets
  •   Reporting and analytics
  •   Role and policy management
  •   Auditing

Multi-layered IAM

The important work of regulating user access historically has involved not one but several layers and methods of authentication, including the use of passwords. Passwords properly used and managed are highly effective at limiting attacks and their resulting damage. In fact one major study found that a stunning 81% of hacking-related breaches leveraged either stolen and/or weak passwords. Seen this way, password protection remain a vital part of any comprehensive identity and access management solution.

Passwords are also a routine, widely accepted element of two-and even three-factor authentication strategies favored by an increasing number of organizations, as passwords combine something that is known (or easily managed by a comprehensive password management solution) along with things like a smartphone, facial recognition, iris scanning or fingerprint sensors. It is this multi-factor authentication, grounded in judicious password hygiene and best practices, that gives assurances that the correct users are accessing the correct systems and data.

Safety in numbers

A lot of the buzz at the Keeper Security booth at the Summit revolved around the growing imperative of multifactor authentication. In fact, in most mid-to-large sized organizations, multifactor authentication is already the norm, and is increasingly being mandated and adopted in SMBs as well.

Keeper is a member of The FIDO Alliance, and several other members of the organization were present and active at the Summit. FIDO is an industry consortium launched to address the lack of interoperability among strong authentication devices and the problems users face creating and remembering multiple usernames and passwords.

With its comprehensive password management solution, Keeper makes remembering complex, bulletproof passwords a thing of the past. Not only that, but Keeper integrates with any other authentication solution, ensuring that the documented protection capabilities of strong passwords are part of any multifactor strategy. The multi-factor authentication solutions of Duo Security and Yubico are just two of the many solutions with which Keeper seamlessly integrates.

For Keeper customers seeking a one-vendor multi-factor solution, Keeper offers Keeper DNA. This solution uses connected devices you already own to create a unique profile serving as a second factor–along with strong passwords–to verify your identity and allow successful logins.

IoT at center stage

The Internet of Things also took center stage at the Summit and around the coffee klatches. Reliable estimates hold that there will be some 8.4 billion IoT devices in use by the end of 2017, up a full 31% over last year. And most all of these devices arrive fresh from the manufacturers with pre-set passwords, often no more complicated than 123456.

At various Summit sessions and gatherings, we learned the following:

  •   In business already IoT devices are generating tidal volumes of data, often including sensitive personal data. Protecting that personal data is of paramount importance.
  •   Identity management best practices, which certainly include passwords front and center, apply to IoT devices as well as to their users.
  •   Question: Can your current identity and access management solution properly manage IoT devices?
  •   Attacks against IoT devices are mounting. And why not? With so many equipped with factory pre-set passwords, they are soft targets.

According to Gartner, identity and access management solutions will become an integral part of every comprehensive IoT strategy. In other words, IoT platforms need to support IAM solutions. And as we have noted, these solutions today come with a heavy dose of comprehensive password management.

IAM is red hot

One indisputable fact emerging from the Summit is that identity and access management is a rapidly ascending market segment and an essential element of any organization’s cyber security strategy. Analytics leader Research and Markets values the global IAM market at nearly $25 billion within five years. IDC notes that “the IAM market will continue to be a leader in the security products space, with a strong growth rate.”

Just remember: Passwords today are a central element of a successful IAM strategy.

Survey Says: IoT Toys High On Holiday Wish Lists, But Security Not So Much

by , on



Internet-connected toys as well as voice-controlled devices top the wish lists of consumers looking to fill their stockings with so-called Internet of Things (IoT) devices this holiday season.

However, security of these inherently non-secure devices is taking something of a back seat to the growing enthusiasm to own them, according to a recent survey of more than 1,000 US adults.

The survey, conducted this November by Keeper Security, found that nearly three in four millennials in the 25-34 age range are not even aware that these devices arrive from most manufacturers with simple, pre-set default passwords. Some 65% of these millennials, who are the most active buyers of IoT devices, are not aware of the rising tide of concern around IoT device security. And the same percent – 65% – of millennials say they don’t take evaluation of security of IoT devices seriously.

Security alarms sound

“These findings should set off concerns regarding the overall security of IoT devices, given the huge growth numbers expected for this hot device segment,” says Darren Guccione, CEO and co-founder of Keeper security.

Reliable estimates hold that there will be some 8.4 billion IoT devices in use by the end of 2017, up a full 31% over last year. At that time consumer applications will represent 63% of total IoT applications, including ‘things’ like smart TVs, remote controlled thermostats; home security systems; streaming security cameras; remotely accessed auto sensors; fitness monitors, and of course internet connected toys.

Other key findings in the IoT consumer survey include:

  •   Nearly a quarter or 243 of those surveyed already own at least one IoT device. Of these 61% own 1-2 devices; 25% own 3-5 devices; and nearly 9% own 10 or more.
  •   More than one in five (21.6%) of Internet connected devices are abandoned because their owners forgot their passwords.
  •   One third of millennials (ages 25-34) who plan to purchase IoT devices this holiday season plan to purchase Internet connected toys and games.
  •   Half of millennials who own IoT devices neglect to change the pre-set passwords on those devices. Only 8% of these people use a password manager, many of which are free of charge. Overall about 11% of those who own IoT devices use a password manager. Respondents planning to purchase voice controlled IoT devices and wearable devices such as fitness monitors are more likely to choose using a password manager.
  •   Of the 142 consumers sampled that plan on buying one or more IoT devices this holiday season, a quarter will spend less than $100, mostly on toys; by contrast nearly half of those owning 10 or more IoT devices plan on spending $500 or more, often on security systems.
  •   Nearly 53% of IoT devices respondents intend to purchase are toys; 23.6% are wearable devices; 22.4% are home security devices; and 22.4 are other home devices such as thermostats or vacuums.

The survey also found very little difference between men and women when it comes to IoT device ownership, although more men than women today own six or more IoT devices.

Not just any toy

Be they toys or sensors, poorly secured IoT devices can become a gateway to cyber disaster. A year ago hackers using a simple technique easily broke into more than 100,000 IoT devices, including security cameras, baby monitors, and others. They created a large botnet—a centrally controlled, infected network of internet-connected devices. They then used the botnet to launch a distributed denial-of-service attack on a major Internet backbone company, rendering millions of people and businesses without service.

Also, according to the 10th annual Verizon Data Breach Investigations report, 81% of hacking related breaches involved stolen or weak passwords.

Passwords key to IoT security

Given that most IoT devices arrive with simple, factory-preset passwords, the single most important security measure to take with a new device is to change the password. And this should be done using commonly accepted password best practices, including the following:

  •   Consider downloading and using a free password manager. These simple to use solutions randomly generate tough-to-hack passwords for all devices (or Websites for that matter), and you the user do not need to remember them.
  •   Never share your passwords with other individuals.
  •   Don’t use the same passwords on different devices.
  •   Never use your network name as a password.
  •   Avoid using words in passwords that can be found in a dictionary.
  •   Never write down and store passwords in plain view.

“Hackers and cyber-thieves usually follow the path of least resistance to break in,” Keeper’s Guccione says. “Our data in this survey clearly shows an ongoing lack of attention to detail and good password hygiene as it relates to IoT devices. Hackers know that, and consumers need to be aware that they know.”

Meet Keeper Version 11 – Our Best Update Ever!

by , on

We are excited to introduce our latest Keeper Password Manager version 11 with new powerful capabilities and features that improve ease-of-use. The update introduces Record History, Identity & Payments, KeeperFill for Native Desktop Apps, Automatic Password Importer, Emergency Access, and improved Browser Extension Autofill capabilities for your desktop.

Record History

Keeper now provides the ability to view and restore previous versions of your records at any time. This includes passwords, files and any other information stored in your vault.  To access Record History, login to Keeper Desktop or the Web Vault and click on “Options” from the record detail screen.

Deleted records are now moved into the “Trash bin” where they can be recovered at any time, until the trash bin is emptied.

Identity & Payments

You can now securely scan and store identity, address, and credit card information in your vault to quickly auto-fill forms online. Keeper Desktop, Web Vault, iOS, and Android are now updated with this capability.  Click on “Identity & Payments” from your desktop or mobile app menu to add and update your information.  Once you have entered your identity and payment information, you can then autofill this information from any KeeperFill platform.

On Keeper Desktop and Web Vault:

On Mobile:

KeeperFill Browser Extension for Chrome, Safari, Firefox, Edge:

KeeperFill™ for Native Desktop Apps

KeeperFill for Apps is a powerful and easy-to-use autofill feature that makes signing into your favorite desktop applications a breeze across both Mac and Windows. To enable, click “More” from Keeper Desktop, go to “Settings” and select “KeeperFill.”  Then define the hotkeys you would like to use to automatically fill your logins. 

Password Importer

Get started quickly with Keeper by using our Password Importer to collect all existing passwords stored in Chrome, IE, Edge and Firefox. Keeper automates the retrieval process and provides step-by-step instructions. Keeper also supports importing passwords from other password managers and formats.  To access this feature, click on “Import” from Keeper Desktop.

Emergency Access

Ensuring access to online accounts and services in the event of an accident or death is an emerging digital problem. This new functionality grants access to an account for up to five trusted family members or friends in the event of an emergency. Access is granted after a specified wait period defined by the customer. To enable Emergency Access, click “Account” from Keeper Desktop and select “Account Emergency Access.”

Browser Extension Auto-Fill

Our Browser Extensions are a powerful time-saving tool when on the web using your Mac or PC.  The Version 11 updates to our Chrome, Edge, Firefox, and Safari extensions enable advanced prompting for autofill, login, submit, save, and changing passwords. Our new “hover” feature provides an elegant experience by only showing the Keeper lock indicators when the cursor is near the form field.

KeeperFill is completely customizable. Visit the “Settings” screen to enhance your user experience and control the auto fill and save behavior.


Ready to enhance your password manager experience? Existing Keeper Desktop version 10 users may auto-update to version 11. To download Keeper Desktop version 11 or Keeper browser extensions, click here.

For more information on any of these features, please contact Keeper Support.


Keeper with Android Accessibility and Autofill

by , on


Recently, Google notified some application developers who utilize Android’s “Accessibility Services” framework to make changes to their apps. It’s important to note that Keeper’s proprietary autofill feature known as KeeperFill®, is not affected by this issue.

We work closely with Google to build features and capabilities using the latest Android tools available to developers. Beginning with Android O, Keeper is migrating to the new Android Autofill API instead of relying on the Accessibility API.

Today, Google announced more information to its developer community about the Autofill API project which Keeper is a major part of. The link to their blog is below:

In addition to using the Android Autofill API, Keeper will continue utilizing Accessibility Services for certain devices (and earlier versions of the Android operating system) and for use cases in which Google Autofill is not yet compatible.

To see Android O with Keeper in action, click here.

Keeper for Android is already available for download on Android O. If you have any questions, please contact

Thank you.

Hackers are Scarier than the Most Frightening Horror Movie

by , on


Pennywise, the nefarious clown from the movie, It, has the power to take the form of your greatest fear. Guess what, so do hackers.

In honor of Halloween, or should we say “Hackoween,” we here at Keeper Security compiled a list of top horror films and how today’s hackers are even scarier (and more real). We also added a bit of advice on how to keep them at bay to protect yourself and your loved ones.

When it comes to the question of trick or treat, we prefer treats! Now let’s get to the bloodbath, shall we?


Hacker horror story #1 – The call is coming from inside the house!

In 1979 the movie, When a Stranger Calls, terrified countless parents and babysitters across America when the murderer in the movie called an unsuspecting heroine and simply asked, “Have you checked the kids?” The young woman calls the police and is told in no uncertain terms, “We’ve traced the call. It’s coming from inside the house.”

The 2017 State of SMB Cybersecurity Report, sponsored by Keeper Security and conducted by the Ponemon Institute, found that the greatest single threat to a business was their own employees with 54% of IT professionals pointing the finger at negligent employees as the main cause of a cybersecurity breach. The same idea can be applied to your own family, considering hackers are constantly trying to trick you and your loved ones into clicking malicious links via phishing scams.

Have you ever talked to your spouse and kids about safe online practices? How to identify an email scam? Did you know that kids are 35 times more likely to be a victim of identity theft than an adult? Does your family utilize a password manager to create and store unique, high strength passwords for every login? It’s time to pull out the pumpkin pie and have a serious family conversation about cyber safety around the kitchen table.


Hacker horror story #2 –  “I can basically pretend to be you. Right now, I am you.”

In 1992, Jennifer Jason Leigh scared the bejesus out of Bridget Fonda and anyone else considering sharing their apartment with a total stranger in the roommate from hell horror classic, Single White Female. Leigh begins to take on the characteristics and personality of Fonda throughout the movie in an attempt to replace her life with her own. Even cutting her locks to mimic the bowl cut, carrot top hairstyle only Fonda could pull off. Talk about frightening!

Identity theft is a real thing in the digital world and becoming an increasingly popular way for hackers to make money. With the alarming amount of data breaches over the past few years, such as the recent Equifax data breach where cyberthieves reportedly stole the personally identifiable information (PII) of more than 143 million Americans, hackers are cashing in by selling your information over the Dark Web where buyers are applying for lines of credit and threatening to lock citizens out of their accounts unless they pay up.

Keeper Security teamed up with the CBS Evening News for a recent segment on identity theft and how much your information is worth on the Dark Web. IT specialist Art Damiao’s nightmare began when a hacker called him after breaking into his personal email. Here’s the voicemail he left…

“Hello Mr. Damiao, you will not get your email address back, you will need to contact me and give me the amount of $300 via bitcoin. I also have your Social Security number, your driver’s license number, front and back. I can basically pretend to be you right now. I am you.”

Have you checked to see if your email address and password have been compromised? You can find out here. Experts recommend freezing your credit and sign up to receive notification if any applications for credit have been taken out in your name. Carrot top bowl haircut or not, this is terrifying stuff!


Hacker horror story #3 – You are trapped with nowhere to go.

The Saw movie franchise has proven to be a wildly popular horror movie formula. A serial killer traps victims in a sadistic trap and forces them to complete perverse puzzles to get out or face a terrible death. Hackers have their own version of this agonizing technique. It’s called ransomware.

In May of 2017, the WannaCry ransomware attack hit more than one million computers worldwide encrypting vital files on the machines it infected and made them inoperable until the victims agreed to pay a ransom. The attack knocked out operations at hospitals, major corporations, law firms, medical devices and even infected traffic cameras on stop lights. This year, more than 51% of small and mid-sized businesses reported experiencing a ransomware attack within the past 12 months. Even more frightening for consumers is that 58% of ransomware infections targeted them.

Ransomware is often transmitted by email or web pop-ups. Cautious online behavior can help prevent the malware from infecting you. Experts recommend you update your software, install anti-virus software, be wary of suspicious emails and pop-ups, and to create backups of your data.  Learn more about how to protect yourself from ransomware attacks here.


Hacker horror story #4 – The monster that lurks and never seems to die.

Ransomware is one type of malware that infects your computer. Most malware stays hidden, lurking in the background, to spy on you and collect vital data. Like the iconic 1978 movie character Michael from Halloween, malware hides in the background to terrorize you and never seems to die.

Much like Jamie Lee Curtis’ character, Laurie Strode, it is important to first detect and identify your stalker. Have you experienced unusual behavior in your system, such as slowdowns, crashing, or repeated error messages? Do you have an increasing number of pop-up ads on your screen? How about any new toolbars or icons you don’t remember installing? These are all good signs that you have been compromised.

If you think your computer has been infected with malware stop using the computer for shopping, banking or any other uses that involve passwords and other PII. Verify that your security software is running and is current. Again, much like Laurie Strode, it may require help from a professional. In the case of Halloween, it came in the form of Dr. Samuel Loomis played by the incomparable, Donald Pleasence. In your case, it should probably be an Information Technology (IT) professional.  


Hacker horror story #5 – Ghosts in the machine.

In 1982, moviegoers around the world learned to fear their own TV sets when five-year-old actress, Heather O’Rourke, creepily stared into the white noise of the Freed family’s television set then turned to her family to announce, “they’re here.” With those two words Poltergeist instantly became a box-office movie blockbuster sensation.

The Internet of Things (IoT) is the interconnection via the Internet of computing devices embedded into everyday objects, enabling them to send and receive data. Some examples include Nest thermostats, connected toys, security systems, refrigerators and even coffeemakers. By 2020, technology analyst firm, Gartner, predicts there will be more than 20 billion IoT devices.

The proliferation of IoT will bring convenience to many people’s lives but the interconnectivity comes at a price. Hackers now have several ways to invade your home or business through your tech devices. And even more frightening, as technology takes over the toy world a growing target for hackers is children.

Have you purchased IoT toys and devices for your home? If so, does the device have a default password? Ensure that you protect the devices with strong, unique passwords and demand manufacturers share the information they collect from the device. Particularly, if they are collecting full names, addresses and phone numbers of registrars.

Click here to find out how to protect your family against hacks on the hottest holiday IoT gifts.

Everybody loves a good horror story but not when it’s about them. Let’s work together to keep them where they belong, in the movies. Happy Halloween!


Not yet a customer?  Download Keeper Password Manager and Digital Vault now.

G2 Crowd Announces Keeper as the Leader in Best Password Management Software

by , on

We are thrilled to announce that Keeper was chosen by G2 Crowd, the leading user-review-based enterprise software review website, as the leader in best password management software on the G2 Crowd Grid® for Password Management.

The scoring is calculated by a proprietary algorithm that factors in real-user satisfaction ratings from a number of results-related review questions. G2 Crowd software buyers can compare products according to their scores to streamline the buying process and quickly identity the products that produce the best results based on the experiences of their peers.

G2 Crowd’s mission is to provide the insights business professionals need to gain confidence in their buying decisions and become more successful in their jobs. Their review platform leverages more than 225,000 independent and authenticated user reviews read by nearly 900,000 buyers each month.

Keeper scored most “likely to recommend,” and received the highest score when it came to the question, “Which Password Management Software has the Best ROI?” Check out this link with the list of Password Management software products based on Results.

The G2 Crowd rated Keeper with 5 stars from 117 reviews. Keeper was the only password manager to be rated with 5 stars. You can read the reviews by clicking this link:

Thanks to the G2 Crowd for sharing their recommendations of Keeper! We are continually working to deliver you the latest and greatest tools to create and store unique, high-strength passwords in an encrypted, digital vault. You can find out what’s new with Keeper, including KeeperFill for Native Desktop Apps, Identity & Payment Info, Emergency Access, and Record History, by visiting our website:

Not yet a customer? Download Keeper Password Manager and Digital Vault now.

Q&A: The Hectic, Semi-Mysterious and Rewarding Life of a Software Engineer

by , on

Ibrahim Landouar leads a life of perpetual change and dynamism. As the Senior Software Engineer and Team Lead at Keeper, he works daily at balancing all aspects of his exciting, ultra-busy work and personal life.

Q: What does a software engineer do exactly?

A: Developing a software solution involves a series of steps and processes, including gathering requirements, designing the software, developing or coding the software, testing it, releasing it, then maintaining and improving it. Some engineers specialize in certain steps, particularly in very large projects. At Keeper, I am involved in every step, each of which is very important to the next step.

Q: Why is that?

A: Consider requirements gathering, the first step. If you don’t do a really good job of getting the actual requirements right and knowing what it is the customer truly wants, then all the subsequent steps and development will not solve the problem the person has. I have a consulting background so I try hard to talk in business terms when gathering requirements from a business-focused individual and then I can switch to more tech-talk when speaking to an engineer or software specialist. I also am fluent in three languages – English, French and Arabic and I speak some German. I feel this helps me listen more intently and carefully when talking to my customers about project requirements.

Q: What in your background prepared you for this kind of work?

A: I got my engineering degree in France as I considered a research career versus say a career in industry. After that I got a master’s degree in security and simultaneously got an MBA. That really opened my eyes to the whole business side of a professional life. I than began my career working in eBanking, leveraging my security training then moved to the U.S. and worked as a consultant developing and consulting on solutions for the Java platform. Moving to Keeper then seemed like a perfect fit for me, as I was looking for a security-oriented firm where software was the main focus, not a side business.

Q: What communications and other tools do software engineers typically use to get their jobs done?

A: We develop solutions with requirements set by the CEO and several others in our Chicago office, so fluid communications are vital between them and our engineers in California. We have a lot of live face-to-face communications when possible, but also use video chat and Skype to enhance our discussions. However the Slack team communications tool is very important to us and getting more so all the time. We use it extensively to communicate via chat groups; we use it to create interactive product channels with our tech teams. This may sound biased, but Keeper is an important solution I use every day. It allows me to securely share passwords with anyone on my team and do so with all the security we need to keep hackers away.

Q: How do you stay current in such a dynamic technology world?

A: I attend conferences as much as my schedule will permit, but these days you can use different technologies that allow you to view conference sessions remotely on YouTube. I’ll then experiment with some of the information and knowledge I gain. You must do this because technology is simply moving too fast virtually every day.

Q: What is the hardest, most enjoyable and most challenging aspects of your job?

A: Well the most challenging can also be the most rewarding, and that is having to get certain projects done on very short release schedules, which can happen anywhere. An aggressive schedule can make a software engineer’s life very hectic and challenging but at the same time in adds that extra measure of excitement and energy. I admit there are times I can live without it! Also in a smaller company like ours, at times I have to drop everything I am doing to pitch in to help solve a crisis, like an important server that goes down. And as far as the most rewarding aspect of my work, it would be seeing the immediate result of what we do, such as seeing the new features we build getting great user reception or watching revenues tick up.

Q: What do you see as trends that will most greatly impact the work of software engineers?

A: No doubt the movement to cloud-based solutions and away from on-premises solutions will affect almost everything we do. We leverage the cloud extensively here at Keeper. If the power goes down in our entire Chicago office, we lose nothing because everything is in the cloud. Also security in general is going to continue to rise in importance. Hackers are gaining fresh research and knowledge every day, and gaining more perspective and momentum. A strong, comprehensive security system is vital. When it comes to passwords, I just cannot see why companies, especially small and mid-sized organizations, shouldn’t have a password management system. Storing and then sharing passwords on spreadsheets or using the same passwords for different devices and sites is an open invitation to attackers.

Q: What advice would you give to anyone considering a career as a software engineer?

A: Understand that this job like any other isn’t roses all the time. On occasions it can seem you are doing things repetitively, especially when building improvements to an existing a solution. But the reward can come when you figure out an automated solution. It just won’t happen the first day. Also you need to be a person willing to continually invest in your career because you cannot stop learning and researching to keep up with the tremendous rate of change. Attend conferences. Learn to network. If you stop, you’ll be left behind.

Q: What do you do in your limited spare time?

A: I try hard to balance my mental and physical lives, so I play soccer in a league. If there is any frustration or things I need to get out, that is where that happens. I also have three kids, all six years old and under. So I am a pretty busy guy!

Interested in a career in cybersecurity? Keeper Security is hiring!