Survey Says: IoT Toys High On Holiday Wish Lists, But Security Not So Much

by , on

 

 

Internet-connected toys as well as voice-controlled devices top the wish lists of consumers looking to fill their stockings with so-called Internet of Things (IoT) devices this holiday season.

However, security of these inherently non-secure devices is taking something of a back seat to the growing enthusiasm to own them, according to a recent survey of more than 1,000 US adults.

The survey, conducted this November by Keeper Security, found that nearly three in four millennials in the 25-34 age range are not even aware that these devices arrive from most manufacturers with simple, pre-set default passwords. Some 65% of these millennials, who are the most active buyers of IoT devices, are not aware of the rising tide of concern around IoT device security. And the same percent – 65% – of millennials say they don’t take evaluation of security of IoT devices seriously.

Security alarms sound

“These findings should set off concerns regarding the overall security of IoT devices, given the huge growth numbers expected for this hot device segment,” says Darren Guccione, CEO and co-founder of Keeper security.

Reliable estimates hold that there will be some 8.4 billion IoT devices in use by the end of 2017, up a full 31% over last year. At that time consumer applications will represent 63% of total IoT applications, including ‘things’ like smart TVs, remote controlled thermostats; home security systems; streaming security cameras; remotely accessed auto sensors; fitness monitors, and of course internet connected toys.

Other key findings in the IoT consumer survey include:

  •   Nearly a quarter or 243 of those surveyed already own at least one IoT device. Of these 61% own 1-2 devices; 25% own 3-5 devices; and nearly 9% own 10 or more.
  •   More than one in five (21.6%) of Internet connected devices are abandoned because their owners forgot their passwords.
  •   One third of millennials (ages 25-34) who plan to purchase IoT devices this holiday season plan to purchase Internet connected toys and games.
  •   Half of millennials who own IoT devices neglect to change the pre-set passwords on those devices. Only 8% of these people use a password manager, many of which are free of charge. Overall about 11% of those who own IoT devices use a password manager. Respondents planning to purchase voice controlled IoT devices and wearable devices such as fitness monitors are more likely to choose using a password manager.
  •   Of the 142 consumers sampled that plan on buying one or more IoT devices this holiday season, a quarter will spend less than $100, mostly on toys; by contrast nearly half of those owning 10 or more IoT devices plan on spending $500 or more, often on security systems.
  •   Nearly 53% of IoT devices respondents intend to purchase are toys; 23.6% are wearable devices; 22.4% are home security devices; and 22.4 are other home devices such as thermostats or vacuums.

The survey also found very little difference between men and women when it comes to IoT device ownership, although more men than women today own six or more IoT devices.

Not just any toy

Be they toys or sensors, poorly secured IoT devices can become a gateway to cyber disaster. A year ago hackers using a simple technique easily broke into more than 100,000 IoT devices, including security cameras, baby monitors, and others. They created a large botnet—a centrally controlled, infected network of internet-connected devices. They then used the botnet to launch a distributed denial-of-service attack on a major Internet backbone company, rendering millions of people and businesses without service.

Also, according to the 10th annual Verizon Data Breach Investigations report, 81% of hacking related breaches involved stolen or weak passwords.

Passwords key to IoT security

Given that most IoT devices arrive with simple, factory-preset passwords, the single most important security measure to take with a new device is to change the password. And this should be done using commonly accepted password best practices, including the following:

  •   Consider downloading and using a free password manager. These simple to use solutions randomly generate tough-to-hack passwords for all devices (or Websites for that matter), and you the user do not need to remember them.
  •   Never share your passwords with other individuals.
  •   Don’t use the same passwords on different devices.
  •   Never use your network name as a password.
  •   Avoid using words in passwords that can be found in a dictionary.
  •   Never write down and store passwords in plain view.

“Hackers and cyber-thieves usually follow the path of least resistance to break in,” Keeper’s Guccione says. “Our data in this survey clearly shows an ongoing lack of attention to detail and good password hygiene as it relates to IoT devices. Hackers know that, and consumers need to be aware that they know.”

Meet Keeper Version 11 – Our Best Update Ever!

by , on

We are excited to introduce our latest Keeper Password Manager version 11 with new powerful capabilities and features that improve ease-of-use. The update introduces Record History, Identity & Payments, KeeperFill for Native Desktop Apps, Automatic Password Importer, Emergency Access, and improved Browser Extension Autofill capabilities for your desktop.

Record History

Keeper now provides the ability to view and restore previous versions of your records at any time. This includes passwords, files and any other information stored in your vault.  To access Record History, login to Keeper Desktop or the Web Vault and click on “Options” from the record detail screen.

Deleted records are now moved into the “Trash bin” where they can be recovered at any time, until the trash bin is emptied.

Identity & Payments

You can now securely scan and store identity, address, and credit card information in your vault to quickly auto-fill forms online. Keeper Desktop, Web Vault, iOS, and Android are now updated with this capability.  Click on “Identity & Payments” from your desktop or mobile app menu to add and update your information.  Once you have entered your identity and payment information, you can then autofill this information from any KeeperFill platform.

On Keeper Desktop and Web Vault:

On Mobile:

KeeperFill Browser Extension for Chrome, Safari, Firefox, Edge:

KeeperFill™ for Native Desktop Apps

KeeperFill for Apps is a powerful and easy-to-use autofill feature that makes signing into your favorite desktop applications a breeze across both Mac and Windows. To enable, click “More” from Keeper Desktop, go to “Settings” and select “KeeperFill.”  Then define the hotkeys you would like to use to automatically fill your logins. 

Password Importer

Get started quickly with Keeper by using our Password Importer to collect all existing passwords stored in Chrome, IE, Edge and Firefox. Keeper automates the retrieval process and provides step-by-step instructions. Keeper also supports importing passwords from other password managers and formats.  To access this feature, click on “Import” from Keeper Desktop.

Emergency Access

Ensuring access to online accounts and services in the event of an accident or death is an emerging digital problem. This new functionality grants access to an account for up to five trusted family members or friends in the event of an emergency. Access is granted after a specified wait period defined by the customer. To enable Emergency Access, click “Account” from Keeper Desktop and select “Account Emergency Access.”

Browser Extension Auto-Fill

Our Browser Extensions are a powerful time-saving tool when on the web using your Mac or PC.  The Version 11 updates to our Chrome, Edge, Firefox, and Safari extensions enable advanced prompting for autofill, login, submit, save, and changing passwords. Our new “hover” feature provides an elegant experience by only showing the Keeper lock indicators when the cursor is near the form field.

KeeperFill is completely customizable. Visit the “Settings” screen to enhance your user experience and control the auto fill and save behavior.

 

Ready to enhance your password manager experience? Existing Keeper Desktop version 10 users may auto-update to version 11. To download Keeper Desktop version 11 or Keeper browser extensions, click here.

For more information on any of these features, please contact Keeper Support.

 

Keeper with Android Accessibility and Autofill

by , on

 

Recently, Google notified some application developers who utilize Android’s “Accessibility Services” framework to make changes to their apps. It’s important to note that Keeper’s proprietary autofill feature known as KeeperFill®, is not affected by this issue.

We work closely with Google to build features and capabilities using the latest Android tools available to developers. Beginning with Android O, Keeper is migrating to the new Android Autofill API instead of relying on the Accessibility API.

Today, Google announced more information to its developer community about the Autofill API project which Keeper is a major part of. The link to their blog is below:

https://android-developers.googleblog.com/2017/11/getting-your-android-app-ready-for.html

In addition to using the Android Autofill API, Keeper will continue utilizing Accessibility Services for certain devices (and earlier versions of the Android operating system) and for use cases in which Google Autofill is not yet compatible.

To see Android O with Keeper in action, click here.

Keeper for Android is already available for download on Android O. If you have any questions, please contact support@keepersecurity.com.

Thank you.

Hackers are Scarier than the Most Frightening Horror Movie

by , on

 

Pennywise, the nefarious clown from the movie, It, has the power to take the form of your greatest fear. Guess what, so do hackers.

In honor of Halloween, or should we say “Hackoween,” we here at Keeper Security compiled a list of top horror films and how today’s hackers are even scarier (and more real). We also added a bit of advice on how to keep them at bay to protect yourself and your loved ones.

When it comes to the question of trick or treat, we prefer treats! Now let’s get to the bloodbath, shall we?

 

Hacker horror story #1 – The call is coming from inside the house!

In 1979 the movie, When a Stranger Calls, terrified countless parents and babysitters across America when the murderer in the movie called an unsuspecting heroine and simply asked, “Have you checked the kids?” The young woman calls the police and is told in no uncertain terms, “We’ve traced the call. It’s coming from inside the house.”

The 2017 State of SMB Cybersecurity Report, sponsored by Keeper Security and conducted by the Ponemon Institute, found that the greatest single threat to a business was their own employees with 54% of IT professionals pointing the finger at negligent employees as the main cause of a cybersecurity breach. The same idea can be applied to your own family, considering hackers are constantly trying to trick you and your loved ones into clicking malicious links via phishing scams.

Have you ever talked to your spouse and kids about safe online practices? How to identify an email scam? Did you know that kids are 35 times more likely to be a victim of identity theft than an adult? Does your family utilize a password manager to create and store unique, high strength passwords for every login? It’s time to pull out the pumpkin pie and have a serious family conversation about cyber safety around the kitchen table.

 

Hacker horror story #2 –  “I can basically pretend to be you. Right now, I am you.”

In 1992, Jennifer Jason Leigh scared the bejesus out of Bridget Fonda and anyone else considering sharing their apartment with a total stranger in the roommate from hell horror classic, Single White Female. Leigh begins to take on the characteristics and personality of Fonda throughout the movie in an attempt to replace her life with her own. Even cutting her locks to mimic the bowl cut, carrot top hairstyle only Fonda could pull off. Talk about frightening!

Identity theft is a real thing in the digital world and becoming an increasingly popular way for hackers to make money. With the alarming amount of data breaches over the past few years, such as the recent Equifax data breach where cyberthieves reportedly stole the personally identifiable information (PII) of more than 143 million Americans, hackers are cashing in by selling your information over the Dark Web where buyers are applying for lines of credit and threatening to lock citizens out of their accounts unless they pay up.

Keeper Security teamed up with the CBS Evening News for a recent segment on identity theft and how much your information is worth on the Dark Web. IT specialist Art Damiao’s nightmare began when a hacker called him after breaking into his personal email. Here’s the voicemail he left…

“Hello Mr. Damiao, you will not get your email address back, you will need to contact me and give me the amount of $300 via bitcoin. I also have your Social Security number, your driver’s license number, front and back. I can basically pretend to be you right now. I am you.”

Have you checked to see if your email address and password have been compromised? You can find out here. Experts recommend freezing your credit and sign up to receive notification if any applications for credit have been taken out in your name. Carrot top bowl haircut or not, this is terrifying stuff!

 

Hacker horror story #3 – You are trapped with nowhere to go.

The Saw movie franchise has proven to be a wildly popular horror movie formula. A serial killer traps victims in a sadistic trap and forces them to complete perverse puzzles to get out or face a terrible death. Hackers have their own version of this agonizing technique. It’s called ransomware.

In May of 2017, the WannaCry ransomware attack hit more than one million computers worldwide encrypting vital files on the machines it infected and made them inoperable until the victims agreed to pay a ransom. The attack knocked out operations at hospitals, major corporations, law firms, medical devices and even infected traffic cameras on stop lights. This year, more than 51% of small and mid-sized businesses reported experiencing a ransomware attack within the past 12 months. Even more frightening for consumers is that 58% of ransomware infections targeted them.

Ransomware is often transmitted by email or web pop-ups. Cautious online behavior can help prevent the malware from infecting you. Experts recommend you update your software, install anti-virus software, be wary of suspicious emails and pop-ups, and to create backups of your data.  Learn more about how to protect yourself from ransomware attacks here.

 

Hacker horror story #4 – The monster that lurks and never seems to die.

Ransomware is one type of malware that infects your computer. Most malware stays hidden, lurking in the background, to spy on you and collect vital data. Like the iconic 1978 movie character Michael from Halloween, malware hides in the background to terrorize you and never seems to die.

Much like Jamie Lee Curtis’ character, Laurie Strode, it is important to first detect and identify your stalker. Have you experienced unusual behavior in your system, such as slowdowns, crashing, or repeated error messages? Do you have an increasing number of pop-up ads on your screen? How about any new toolbars or icons you don’t remember installing? These are all good signs that you have been compromised.

If you think your computer has been infected with malware stop using the computer for shopping, banking or any other uses that involve passwords and other PII. Verify that your security software is running and is current. Again, much like Laurie Strode, it may require help from a professional. In the case of Halloween, it came in the form of Dr. Samuel Loomis played by the incomparable, Donald Pleasence. In your case, it should probably be an Information Technology (IT) professional.  

 

Hacker horror story #5 – Ghosts in the machine.

In 1982, moviegoers around the world learned to fear their own TV sets when five-year-old actress, Heather O’Rourke, creepily stared into the white noise of the Freed family’s television set then turned to her family to announce, “they’re here.” With those two words Poltergeist instantly became a box-office movie blockbuster sensation.

The Internet of Things (IoT) is the interconnection via the Internet of computing devices embedded into everyday objects, enabling them to send and receive data. Some examples include Nest thermostats, connected toys, security systems, refrigerators and even coffeemakers. By 2020, technology analyst firm, Gartner, predicts there will be more than 20 billion IoT devices.

The proliferation of IoT will bring convenience to many people’s lives but the interconnectivity comes at a price. Hackers now have several ways to invade your home or business through your tech devices. And even more frightening, as technology takes over the toy world a growing target for hackers is children.

Have you purchased IoT toys and devices for your home? If so, does the device have a default password? Ensure that you protect the devices with strong, unique passwords and demand manufacturers share the information they collect from the device. Particularly, if they are collecting full names, addresses and phone numbers of registrars.

Click here to find out how to protect your family against hacks on the hottest holiday IoT gifts.

Everybody loves a good horror story but not when it’s about them. Let’s work together to keep them where they belong, in the movies. Happy Halloween!

 

Not yet a customer?  Download Keeper Password Manager and Digital Vault now.

G2 Crowd Announces Keeper as the Leader in Best Password Management Software

by , on

We are thrilled to announce that Keeper was chosen by G2 Crowd, the leading user-review-based enterprise software review website, as the leader in best password management software on the G2 Crowd Grid® for Password Management.

The scoring is calculated by a proprietary algorithm that factors in real-user satisfaction ratings from a number of results-related review questions. G2 Crowd software buyers can compare products according to their scores to streamline the buying process and quickly identity the products that produce the best results based on the experiences of their peers.

G2 Crowd’s mission is to provide the insights business professionals need to gain confidence in their buying decisions and become more successful in their jobs. Their review platform leverages more than 225,000 independent and authenticated user reviews read by nearly 900,000 buyers each month.

Keeper scored most “likely to recommend,” and received the highest score when it came to the question, “Which Password Management Software has the Best ROI?” Check out this link with the list of Password Management software products based on Results. https://www.g2crowd.com/categories/password-management/top/results

The G2 Crowd rated Keeper with 5 stars from 117 reviews. Keeper was the only password manager to be rated with 5 stars. You can read the reviews by clicking this link: https://www.g2crowd.com/products/keeper-716bcba8-054e-444f-8878-72372e3609e0/reviews

Thanks to the G2 Crowd for sharing their recommendations of Keeper! We are continually working to deliver you the latest and greatest tools to create and store unique, high-strength passwords in an encrypted, digital vault. You can find out what’s new with Keeper, including KeeperFill for Native Desktop Apps, Identity & Payment Info, Emergency Access, and Record History, by visiting our website: https://keepersecurity.com/whats-new.html

Not yet a customer? Download Keeper Password Manager and Digital Vault now.

Q&A: The Hectic, Semi-Mysterious and Rewarding Life of a Software Engineer

by , on

Ibrahim Landouar leads a life of perpetual change and dynamism. As the Senior Software Engineer and Team Lead at Keeper, he works daily at balancing all aspects of his exciting, ultra-busy work and personal life.

Q: What does a software engineer do exactly?

A: Developing a software solution involves a series of steps and processes, including gathering requirements, designing the software, developing or coding the software, testing it, releasing it, then maintaining and improving it. Some engineers specialize in certain steps, particularly in very large projects. At Keeper, I am involved in every step, each of which is very important to the next step.

Q: Why is that?

A: Consider requirements gathering, the first step. If you don’t do a really good job of getting the actual requirements right and knowing what it is the customer truly wants, then all the subsequent steps and development will not solve the problem the person has. I have a consulting background so I try hard to talk in business terms when gathering requirements from a business-focused individual and then I can switch to more tech-talk when speaking to an engineer or software specialist. I also am fluent in three languages – English, French and Arabic and I speak some German. I feel this helps me listen more intently and carefully when talking to my customers about project requirements.

Q: What in your background prepared you for this kind of work?

A: I got my engineering degree in France as I considered a research career versus say a career in industry. After that I got a master’s degree in security and simultaneously got an MBA. That really opened my eyes to the whole business side of a professional life. I than began my career working in eBanking, leveraging my security training then moved to the U.S. and worked as a consultant developing and consulting on solutions for the Java platform. Moving to Keeper then seemed like a perfect fit for me, as I was looking for a security-oriented firm where software was the main focus, not a side business.

Q: What communications and other tools do software engineers typically use to get their jobs done?

A: We develop solutions with requirements set by the CEO and several others in our Chicago office, so fluid communications are vital between them and our engineers in California. We have a lot of live face-to-face communications when possible, but also use video chat and Skype to enhance our discussions. However the Slack team communications tool is very important to us and getting more so all the time. We use it extensively to communicate via chat groups; we use it to create interactive product channels with our tech teams. This may sound biased, but Keeper is an important solution I use every day. It allows me to securely share passwords with anyone on my team and do so with all the security we need to keep hackers away.

Q: How do you stay current in such a dynamic technology world?

A: I attend conferences as much as my schedule will permit, but these days you can use different technologies that allow you to view conference sessions remotely on YouTube. I’ll then experiment with some of the information and knowledge I gain. You must do this because technology is simply moving too fast virtually every day.

Q: What is the hardest, most enjoyable and most challenging aspects of your job?

A: Well the most challenging can also be the most rewarding, and that is having to get certain projects done on very short release schedules, which can happen anywhere. An aggressive schedule can make a software engineer’s life very hectic and challenging but at the same time in adds that extra measure of excitement and energy. I admit there are times I can live without it! Also in a smaller company like ours, at times I have to drop everything I am doing to pitch in to help solve a crisis, like an important server that goes down. And as far as the most rewarding aspect of my work, it would be seeing the immediate result of what we do, such as seeing the new features we build getting great user reception or watching revenues tick up.

Q: What do you see as trends that will most greatly impact the work of software engineers?

A: No doubt the movement to cloud-based solutions and away from on-premises solutions will affect almost everything we do. We leverage the cloud extensively here at Keeper. If the power goes down in our entire Chicago office, we lose nothing because everything is in the cloud. Also security in general is going to continue to rise in importance. Hackers are gaining fresh research and knowledge every day, and gaining more perspective and momentum. A strong, comprehensive security system is vital. When it comes to passwords, I just cannot see why companies, especially small and mid-sized organizations, shouldn’t have a password management system. Storing and then sharing passwords on spreadsheets or using the same passwords for different devices and sites is an open invitation to attackers.

Q: What advice would you give to anyone considering a career as a software engineer?

A: Understand that this job like any other isn’t roses all the time. On occasions it can seem you are doing things repetitively, especially when building improvements to an existing a solution. But the reward can come when you figure out an automated solution. It just won’t happen the first day. Also you need to be a person willing to continually invest in your career because you cannot stop learning and researching to keep up with the tremendous rate of change. Attend conferences. Learn to network. If you stop, you’ll be left behind.

Q: What do you do in your limited spare time?

A: I try hard to balance my mental and physical lives, so I play soccer in a league. If there is any frustration or things I need to get out, that is where that happens. I also have three kids, all six years old and under. So I am a pretty busy guy!

Interested in a career in cybersecurity? Keeper Security is hiring!

7 Tips for Keeping Kids Safe Online for #CyberAware Month

by , on

tips-for-keeping-kids-safe-online

For National #CyberAware month, we are offering 50% off the Keeper Family Plan with code “NSCAM”.

Click here – hurry, this deal will end soon!

Today’s youth are often called “digital natives” because they are so comfortable with living online. But much as we may admire their proficiency with their devices, we shouldn’t forget that security is probably not top of mind.

Innocent young minds don’t grasp the concept of identity theft or understand the consequences of a ransom attack. In recognition of National Cyber Security Awareness Month, here are some things you can do to keep them – and your entire family – safe.

Keep family computers in an open area. This allows you to monitor what’s on the screen and to check back on activity later. In particular, keep an eye on chat sessions, which is where predators lurk.

Be sure security software is installed and updated. At the very least, you need anti-malware and anti-spyware packages. A password manager is also a good idea for creating and saving passwords that can’t easily be compromised by hackers.

Give children their own accounts on shared computers. This enables you to limit the software they can access and to define unique controls on each account.

Don’t permit kids to download and install software without your oversight. Free software downloads are a primarily medium for spreading spyware.

Use parental controls in web browsers. These enable you to block unsafe sites, disable potentially malicious scripts and review browsing history to see what your kids have been doing when you weren’t watching. Here is a good guide to implementing parental controls in major browsers.

Have a talk. Remind kids of a few basic protections. Never click on unknown links. Never open email attachments. Never respond to chat messages from people they don’t know. Never “friend” strangers. Don’t bully others and alert parents if they suspect they are the targets of a bully.

Have logins to kids’ social accounts such as Facebook, Snapchat and anywhere else private conversations go on. This not only enables you to keep an eye on what they’re doing but to spot malicious activity by others that’s directed at them.

For additional protection you can install activity monitoring software that keeps detailed records of everything that happens on your computer. Examples include Cyber Patrol, Cybersitter, Net Nanny and SpyAgent. But if you follow the advice above, you probably don’t need additional protection.

Above all, stress to your children that your monitoring and cautionary steps are for their protection. Even if they don’t understand the risks that are out there online, they know that you have their best interests in mind.

Were You One of the 3 billion Users Compromised in the Yahoo Breach? Probably…

by , on

 

Yahoo’s new parent company, Verizon, reported this week that all 3 billion user accounts were likely compromised in the 2013 data breach. Previously, the company reported that the breach affected 500 million and then changed that number to one billion. Information that was stolen includes names, phone numbers, and dates of birth, passwords and answers to security questions.

The breach doesn’t just affect your Yahoo account. This information is called Personally Identifiable Information (PII) and can be used to reset current passwords, apply for credit and loans, and even open up new accounts in your name.  If you had a Yahoo account in 2013 here’s what you need to do.

 

Check your online accounts

Take some time to browse your online accounts to ensure none have been compromised or had unusual activity. You may want to change your security questions and answers, too. Yahoo has invalidated their unencrypted security questions and answers but if you use the same security questions for other sites you will have to change those yourself.

 

Change your passwords

If your password was stolen in the 2013 breach it is likely that you have used that password for other logins. Keeper conducted a detailed survey of 1,000 smartphone users to determine how they protect their devices and sensitive data. Our findings indicated that password reuse across different applications is frequent, average password strength for mobile applications and websites is low and that most users rarely changed passwords.

Reuse of the same password across multiple applications is quite common, with nearly 84% of users telling us that they access at least two different applications or websites with the same credentials. We commend the 16% who said they never engage in this practice. On the other hand, the 24% who reuse passwords across five or more applications are playing with fire.

Change your passwords now and use unique password for each login.

 

Enable Two-Factor Authentication

Using Two-Factor Authentication, or 2FA, links your online account to a physical device, such as your phone, which makes it more difficult for a hacker to login to your account from a remote location. When you activate 2FA and attempt to login you will receive a verification code to your device and be required to enter it before gaining entrance.

 

Don’t Click Suspicious Links

Hackers will capitalize on this breach by attempting to send you unsolicited communications that ask you for personal information, refer you to a web page asking for personal information, and even appear to originate from Yahoo. Avoid clicking links or downloading attachments from suspicious emails.

 

Even though this breach happened in 2013 it is important to follow these steps. The fallout from the Yahoo breach will be felt for a long time so being proactive helps eliminate any risks to your future digital life.

Not yet a customer?  Download Keeper Password Manager and Digital Vault now.

Use Apple’s Facial Recognition to Log into Keeper Password Manager

by , on

Keeper gives our iOS customers another reason to smile. Apple users can utilize the latest facial recognition feature to log into their Keeper Vault, much like they already can with Touch ID.

We have integrated with Apple’s latest feature to provide a secure and convenient way to authenticate your identity. Here are some answers to questions you may have when using facial recognition.

How does it work?

Facial recognition on the new iPhone X is intended as a safe, secure way of quickly unlocking the phone without even touching it. Keeper iPhone users first need to let the phone map a 3D image of their face to be stored as an identity factor. After it is stored users simply have to look into the screen of the phone to activate it. It’s as simple as saying “cheese.”

Is it safe?

The data of your facial features never leaves the phone. Apple states that it is stored in a secure part of the device and even Apple cannot see it. While your phone is turned on, it is constantly monitoring to see if anything strange is happening, say, someone is trying to trick the phone by using a photograph of you to unlock it. Since your facial features are mapped with 3D technology this trick wouldn’t work.

Apple does not recommend to use the feature if you are a twin or under the age of 13. Find out why here.

What if my face changes?

The feature also adds to its representation of your face over time. For example, if you start to wear glasses and then look at the phone to login it might not initially recognize you, but once you get into the phone with your password, it will add the image of you with the glasses on to identify you for future logins.

Do I still need my password?

Yes. In the case your phone doesn’t acknowledge your facial features you will still need your passcode to override the feature for login. Customers can always switch to using only a high-strength, memorized password if they prefer.

Applying Face ID gives Apple users a faster and smarter version of Touch ID. We are constantly working with new and innovative technology to provide you with a seamless Keeper experience.

To find out more, please click here.

 

Not yet a customer?  Download Keeper Password Manager and Digital Vault now.

Keeper Nominated as a Finalist for the 2017 Merrick Momentum Award

by , on

 

We here at Keeper Security are honored to be nominated as finalists for the 2017 Merrick Momentum Award! The awards, held November 2nd, 2017 at the Hyatt Regency Hotel in Chicago, honor the best and brightest of Chicago’s tech community.

The Momentum Award, hosted by Chicagoland Entrepreneurial Center for the benefit of 1871, recognizes companies that are on track to become Chicago’s next brightest stars. The Chicagoland Entrepreneurial Center (CEC) is a non-profit organization that supports entrepreneurs on their path to building high-growth, sustainable businesses that serve as a platform for economic development and civic leadership. Past recipients of the Momentum Award include Avant, kCura, Braintree, GrubHub and most recently, @properties. This is great company to keep for Keeper!

Nomination for this award is the culmination of our teamwork and commitment to driving growth and delivering innovation to our most important asset – our customer. Thank you for being a part of our mission to safeguard the passwords and digital assets of every individual and business. Today Keeper protects more than 11 million consumers and 4,000 businesses.

Wish us luck.

To learn more about the Momentum Award, please visit https://1871.com/momentum-awards/.

Not yet a customer?  Download Keeper Password Manager and Digital Vault now.