How to use Keeper’s New Version 11 Features

by , on

We are excited to introduce our latest version 11 with new features that improve both ease-of-use and additional product capabilities. The update introduces Version History, Identity & Payment Info, KeeperFill for Native Desktop Apps, a Password Importer, and Emergency Access. Each solves a customer problem from minimizing the hassle of collecting all passwords to providing an estate planning tool. Details on setting up the new features:

 

Version History

Easily audit the Who, What, and When for each record stored in your Keeper Vault. View dates records were modified, revert to a previous version or permanently delete it from your desktop vault.

 

  1. Log into your Keeper Desktop Vault  
  2. Select the record you would like to track the history of
  3. Click Options
  4. Select Record History to view each password modification

 

Identity & Payments

 

Quickly scan and upload credit and debit card information as a new record within your vault.

 

To add payment information from your Keeper Desktop Vault:

 

  1. Log into your vault on any platform
  2. Click +Create New
  3. Select Payment Card
  4. Add your payment details

 

To add payment information from your Keeper App:

 

  1. Log into your Keeper App
  2. Click the icon on the top left corner to reveal the Keeper menu
  3. Select Identity & Payment
  4. Click either Identity or Payment to create a record

 

Your payment details and billing information will then be available to autofill when making online purchases.

 

KeeperFill™ for Native Desktop Apps

 

Seamlessly fill passwords and data across any native desktop application for Mac and Windows using hotkeys. To enable:

 

    1. Log into your Keeper Desktop Vault  

 

  • Click More (located in the top right corner)
  • Go to Settings
  • Select KeeperFill  
  • Click Setup

 

Password Importer

 

Collect all existing passwords stored in browsers and other password products with ease. Keeper automated the retrieval process and provides step-by-step instructions.

 

  1. Log into your Keeper Desktop Vault  
  2. Click More
  3. Select Import
  4. Choose the format you would like to import and follow the upload instructions

 

iPhone X + Face ID

 

Effortlessly log into your iPhone X with Face ID. To enable Face ID:

 

  1. Log into your Keeper App
  2. Go to DNA
  3. Click Face ID
  4. Switch Face ID to ON in the top right corner. The button will turn green once on.
  5. You will then be prompted to hit Enable through a popup

 

Emergency Access

 

Ensuring access to online accounts and services in the event of an accident or death is an emerging digital problem. This new functionality grants access to an account for up to five trusted family members or friends in the event of an emergency. Access is granted after a specified wait period defined by the customer. To enable Emergency Access:

 

  1. Log into your Keeper Desktop Vault  
  2. Click Account in the top right corner
  3. Select Manage under Account Emergency Access
  4. Add up to 5 email addresses of trusted individuals
  5. Set a Delay Access time frame
  6. Click Send

All Keeper users are eligible for this upgrade. Certain features are only available to Keeper Unlimited and Keeper Family customers. Not yet a Keeper Unlimited customer? Click here to download now. For more information on any of these features, please contact Keeper Support.

Keeper with Android Accessibility and Autofill

by , on

 

Recently, Google notified some application developers who utilize Android’s “Accessibility Services” framework to make changes to their apps. It’s important to note that Keeper’s proprietary autofill feature known as KeeperFill®, is not affected by this issue.

We work closely with Google to build features and capabilities using the latest Android tools available to developers. Beginning with Android O, Keeper is migrating to the new Android Autofill API instead of relying on the Accessibility API.

Today, Google announced more information to its developer community about the Autofill API project which Keeper is a major part of. The link to their blog is below:

https://android-developers.googleblog.com/2017/11/getting-your-android-app-ready-for.html

In addition to using the Android Autofill API, Keeper will continue utilizing Accessibility Services for certain devices (and earlier versions of the Android operating system) and for use cases in which Google Autofill is not yet compatible.

To see Android O with Keeper in action, click here.

Keeper for Android is already available for download on Android O. If you have any questions, please contact support@keepersecurity.com.

Thank you.

Hackers are Scarier than the Most Frightening Horror Movie

by , on

 

Pennywise, the nefarious clown from the movie, It, has the power to take the form of your greatest fear. Guess what, so do hackers.

In honor of Halloween, or should we say “Hackoween,” we here at Keeper Security compiled a list of top horror films and how today’s hackers are even scarier (and more real). We also added a bit of advice on how to keep them at bay to protect yourself and your loved ones.

When it comes to the question of trick or treat, we prefer treats! Now let’s get to the bloodbath, shall we?

 

Hacker horror story #1 – The call is coming from inside the house!

In 1979 the movie, When a Stranger Calls, terrified countless parents and babysitters across America when the murderer in the movie called an unsuspecting heroine and simply asked, “Have you checked the kids?” The young woman calls the police and is told in no uncertain terms, “We’ve traced the call. It’s coming from inside the house.”

The 2017 State of SMB Cybersecurity Report, sponsored by Keeper Security and conducted by the Ponemon Institute, found that the greatest single threat to a business was their own employees with 54% of IT professionals pointing the finger at negligent employees as the main cause of a cybersecurity breach. The same idea can be applied to your own family, considering hackers are constantly trying to trick you and your loved ones into clicking malicious links via phishing scams.

Have you ever talked to your spouse and kids about safe online practices? How to identify an email scam? Did you know that kids are 35 times more likely to be a victim of identity theft than an adult? Does your family utilize a password manager to create and store unique, high strength passwords for every login? It’s time to pull out the pumpkin pie and have a serious family conversation about cyber safety around the kitchen table.

 

Hacker horror story #2 –  “I can basically pretend to be you. Right now, I am you.”

In 1992, Jennifer Jason Leigh scared the bejesus out of Bridget Fonda and anyone else considering sharing their apartment with a total stranger in the roommate from hell horror classic, Single White Female. Leigh begins to take on the characteristics and personality of Fonda throughout the movie in an attempt to replace her life with her own. Even cutting her locks to mimic the bowl cut, carrot top hairstyle only Fonda could pull off. Talk about frightening!

Identity theft is a real thing in the digital world and becoming an increasingly popular way for hackers to make money. With the alarming amount of data breaches over the past few years, such as the recent Equifax data breach where cyberthieves reportedly stole the personally identifiable information (PII) of more than 143 million Americans, hackers are cashing in by selling your information over the Dark Web where buyers are applying for lines of credit and threatening to lock citizens out of their accounts unless they pay up.

Keeper Security teamed up with the CBS Evening News for a recent segment on identity theft and how much your information is worth on the Dark Web. IT specialist Art Damiao’s nightmare began when a hacker called him after breaking into his personal email. Here’s the voicemail he left…

“Hello Mr. Damiao, you will not get your email address back, you will need to contact me and give me the amount of $300 via bitcoin. I also have your Social Security number, your driver’s license number, front and back. I can basically pretend to be you right now. I am you.”

Have you checked to see if your email address and password have been compromised? You can find out here. Experts recommend freezing your credit and sign up to receive notification if any applications for credit have been taken out in your name. Carrot top bowl haircut or not, this is terrifying stuff!

 

Hacker horror story #3 – You are trapped with nowhere to go.

The Saw movie franchise has proven to be a wildly popular horror movie formula. A serial killer traps victims in a sadistic trap and forces them to complete perverse puzzles to get out or face a terrible death. Hackers have their own version of this agonizing technique. It’s called ransomware.

In May of 2017, the WannaCry ransomware attack hit more than one million computers worldwide encrypting vital files on the machines it infected and made them inoperable until the victims agreed to pay a ransom. The attack knocked out operations at hospitals, major corporations, law firms, medical devices and even infected traffic cameras on stop lights. This year, more than 51% of small and mid-sized businesses reported experiencing a ransomware attack within the past 12 months. Even more frightening for consumers is that 58% of ransomware infections targeted them.

Ransomware is often transmitted by email or web pop-ups. Cautious online behavior can help prevent the malware from infecting you. Experts recommend you update your software, install anti-virus software, be wary of suspicious emails and pop-ups, and to create backups of your data.  Learn more about how to protect yourself from ransomware attacks here.

 

Hacker horror story #4 – The monster that lurks and never seems to die.

Ransomware is one type of malware that infects your computer. Most malware stays hidden, lurking in the background, to spy on you and collect vital data. Like the iconic 1978 movie character Michael from Halloween, malware hides in the background to terrorize you and never seems to die.

Much like Jamie Lee Curtis’ character, Laurie Strode, it is important to first detect and identify your stalker. Have you experienced unusual behavior in your system, such as slowdowns, crashing, or repeated error messages? Do you have an increasing number of pop-up ads on your screen? How about any new toolbars or icons you don’t remember installing? These are all good signs that you have been compromised.

If you think your computer has been infected with malware stop using the computer for shopping, banking or any other uses that involve passwords and other PII. Verify that your security software is running and is current. Again, much like Laurie Strode, it may require help from a professional. In the case of Halloween, it came in the form of Dr. Samuel Loomis played by the incomparable, Donald Pleasence. In your case, it should probably be an Information Technology (IT) professional.  

 

Hacker horror story #5 – Ghosts in the machine.

In 1982, moviegoers around the world learned to fear their own TV sets when five-year-old actress, Heather O’Rourke, creepily stared into the white noise of the Freed family’s television set then turned to her family to announce, “they’re here.” With those two words Poltergeist instantly became a box-office movie blockbuster sensation.

The Internet of Things (IoT) is the interconnection via the Internet of computing devices embedded into everyday objects, enabling them to send and receive data. Some examples include Nest thermostats, connected toys, security systems, refrigerators and even coffeemakers. By 2020, technology analyst firm, Gartner, predicts there will be more than 20 billion IoT devices.

The proliferation of IoT will bring convenience to many people’s lives but the interconnectivity comes at a price. Hackers now have several ways to invade your home or business through your tech devices. And even more frightening, as technology takes over the toy world a growing target for hackers is children.

Have you purchased IoT toys and devices for your home? If so, does the device have a default password? Ensure that you protect the devices with strong, unique passwords and demand manufacturers share the information they collect from the device. Particularly, if they are collecting full names, addresses and phone numbers of registrars.

Click here to find out how to protect your family against hacks on the hottest holiday IoT gifts.

Everybody loves a good horror story but not when it’s about them. Let’s work together to keep them where they belong, in the movies. Happy Halloween!

 

Not yet a customer?  Download Keeper Password Manager and Digital Vault now.

G2 Crowd Announces Keeper as the Leader in Best Password Management Software

by , on

We are thrilled to announce that Keeper was chosen by G2 Crowd, the leading user-review-based enterprise software review website, as the leader in best password management software on the G2 Crowd Grid® for Password Management.

The scoring is calculated by a proprietary algorithm that factors in real-user satisfaction ratings from a number of results-related review questions. G2 Crowd software buyers can compare products according to their scores to streamline the buying process and quickly identity the products that produce the best results based on the experiences of their peers.

G2 Crowd’s mission is to provide the insights business professionals need to gain confidence in their buying decisions and become more successful in their jobs. Their review platform leverages more than 225,000 independent and authenticated user reviews read by nearly 900,000 buyers each month.

Keeper scored most “likely to recommend,” and received the highest score when it came to the question, “Which Password Management Software has the Best ROI?” Check out this link with the list of Password Management software products based on Results. https://www.g2crowd.com/categories/password-management/top/results

The G2 Crowd rated Keeper with 5 stars from 117 reviews. Keeper was the only password manager to be rated with 5 stars. You can read the reviews by clicking this link: https://www.g2crowd.com/products/keeper-716bcba8-054e-444f-8878-72372e3609e0/reviews

Thanks to the G2 Crowd for sharing their recommendations of Keeper! We are continually working to deliver you the latest and greatest tools to create and store unique, high-strength passwords in an encrypted, digital vault. You can find out what’s new with Keeper, including KeeperFill for Native Desktop Apps, Identity & Payment Info, Emergency Access, and Record History, by visiting our website: https://keepersecurity.com/whats-new.html

Not yet a customer? Download Keeper Password Manager and Digital Vault now.

Q&A: The Hectic, Semi-Mysterious and Rewarding Life of a Software Engineer

by , on

Ibrahim Landouar leads a life of perpetual change and dynamism. As the Senior Software Engineer and Team Lead at Keeper, he works daily at balancing all aspects of his exciting, ultra-busy work and personal life.

Q: What does a software engineer do exactly?

A: Developing a software solution involves a series of steps and processes, including gathering requirements, designing the software, developing or coding the software, testing it, releasing it, then maintaining and improving it. Some engineers specialize in certain steps, particularly in very large projects. At Keeper, I am involved in every step, each of which is very important to the next step.

Q: Why is that?

A: Consider requirements gathering, the first step. If you don’t do a really good job of getting the actual requirements right and knowing what it is the customer truly wants, then all the subsequent steps and development will not solve the problem the person has. I have a consulting background so I try hard to talk in business terms when gathering requirements from a business-focused individual and then I can switch to more tech-talk when speaking to an engineer or software specialist. I also am fluent in three languages – English, French and Arabic and I speak some German. I feel this helps me listen more intently and carefully when talking to my customers about project requirements.

Q: What in your background prepared you for this kind of work?

A: I got my engineering degree in France as I considered a research career versus say a career in industry. After that I got a master’s degree in security and simultaneously got an MBA. That really opened my eyes to the whole business side of a professional life. I than began my career working in eBanking, leveraging my security training then moved to the U.S. and worked as a consultant developing and consulting on solutions for the Java platform. Moving to Keeper then seemed like a perfect fit for me, as I was looking for a security-oriented firm where software was the main focus, not a side business.

Q: What communications and other tools do software engineers typically use to get their jobs done?

A: We develop solutions with requirements set by the CEO and several others in our Chicago office, so fluid communications are vital between them and our engineers in California. We have a lot of live face-to-face communications when possible, but also use video chat and Skype to enhance our discussions. However the Slack team communications tool is very important to us and getting more so all the time. We use it extensively to communicate via chat groups; we use it to create interactive product channels with our tech teams. This may sound biased, but Keeper is an important solution I use every day. It allows me to securely share passwords with anyone on my team and do so with all the security we need to keep hackers away.

Q: How do you stay current in such a dynamic technology world?

A: I attend conferences as much as my schedule will permit, but these days you can use different technologies that allow you to view conference sessions remotely on YouTube. I’ll then experiment with some of the information and knowledge I gain. You must do this because technology is simply moving too fast virtually every day.

Q: What is the hardest, most enjoyable and most challenging aspects of your job?

A: Well the most challenging can also be the most rewarding, and that is having to get certain projects done on very short release schedules, which can happen anywhere. An aggressive schedule can make a software engineer’s life very hectic and challenging but at the same time in adds that extra measure of excitement and energy. I admit there are times I can live without it! Also in a smaller company like ours, at times I have to drop everything I am doing to pitch in to help solve a crisis, like an important server that goes down. And as far as the most rewarding aspect of my work, it would be seeing the immediate result of what we do, such as seeing the new features we build getting great user reception or watching revenues tick up.

Q: What do you see as trends that will most greatly impact the work of software engineers?

A: No doubt the movement to cloud-based solutions and away from on-premises solutions will affect almost everything we do. We leverage the cloud extensively here at Keeper. If the power goes down in our entire Chicago office, we lose nothing because everything is in the cloud. Also security in general is going to continue to rise in importance. Hackers are gaining fresh research and knowledge every day, and gaining more perspective and momentum. A strong, comprehensive security system is vital. When it comes to passwords, I just cannot see why companies, especially small and mid-sized organizations, shouldn’t have a password management system. Storing and then sharing passwords on spreadsheets or using the same passwords for different devices and sites is an open invitation to attackers.

Q: What advice would you give to anyone considering a career as a software engineer?

A: Understand that this job like any other isn’t roses all the time. On occasions it can seem you are doing things repetitively, especially when building improvements to an existing a solution. But the reward can come when you figure out an automated solution. It just won’t happen the first day. Also you need to be a person willing to continually invest in your career because you cannot stop learning and researching to keep up with the tremendous rate of change. Attend conferences. Learn to network. If you stop, you’ll be left behind.

Q: What do you do in your limited spare time?

A: I try hard to balance my mental and physical lives, so I play soccer in a league. If there is any frustration or things I need to get out, that is where that happens. I also have three kids, all six years old and under. So I am a pretty busy guy!

Interested in a career in cybersecurity? Keeper Security is hiring!

7 Tips for Keeping Kids Safe Online for #CyberAware Month

by , on

tips-for-keeping-kids-safe-online

For National #CyberAware month, we are offering 50% off the Keeper Family Plan with code “NSCAM”.

Click here – hurry, this deal will end soon!

Today’s youth are often called “digital natives” because they are so comfortable with living online. But much as we may admire their proficiency with their devices, we shouldn’t forget that security is probably not top of mind.

Innocent young minds don’t grasp the concept of identity theft or understand the consequences of a ransom attack. In recognition of National Cyber Security Awareness Month, here are some things you can do to keep them – and your entire family – safe.

Keep family computers in an open area. This allows you to monitor what’s on the screen and to check back on activity later. In particular, keep an eye on chat sessions, which is where predators lurk.

Be sure security software is installed and updated. At the very least, you need anti-malware and anti-spyware packages. A password manager is also a good idea for creating and saving passwords that can’t easily be compromised by hackers.

Give children their own accounts on shared computers. This enables you to limit the software they can access and to define unique controls on each account.

Don’t permit kids to download and install software without your oversight. Free software downloads are a primarily medium for spreading spyware.

Use parental controls in web browsers. These enable you to block unsafe sites, disable potentially malicious scripts and review browsing history to see what your kids have been doing when you weren’t watching. Here is a good guide to implementing parental controls in major browsers.

Have a talk. Remind kids of a few basic protections. Never click on unknown links. Never open email attachments. Never respond to chat messages from people they don’t know. Never “friend” strangers. Don’t bully others and alert parents if they suspect they are the targets of a bully.

Have logins to kids’ social accounts such as Facebook, Snapchat and anywhere else private conversations go on. This not only enables you to keep an eye on what they’re doing but to spot malicious activity by others that’s directed at them.

For additional protection you can install activity monitoring software that keeps detailed records of everything that happens on your computer. Examples include Cyber Patrol, Cybersitter, Net Nanny and SpyAgent. But if you follow the advice above, you probably don’t need additional protection.

Above all, stress to your children that your monitoring and cautionary steps are for their protection. Even if they don’t understand the risks that are out there online, they know that you have their best interests in mind.

Were You One of the 3 billion Users Compromised in the Yahoo Breach? Probably…

by , on

 

Yahoo’s new parent company, Verizon, reported this week that all 3 billion user accounts were likely compromised in the 2013 data breach. Previously, the company reported that the breach affected 500 million and then changed that number to one billion. Information that was stolen includes names, phone numbers, and dates of birth, passwords and answers to security questions.

The breach doesn’t just affect your Yahoo account. This information is called Personally Identifiable Information (PII) and can be used to reset current passwords, apply for credit and loans, and even open up new accounts in your name.  If you had a Yahoo account in 2013 here’s what you need to do.

 

Check your online accounts

Take some time to browse your online accounts to ensure none have been compromised or had unusual activity. You may want to change your security questions and answers, too. Yahoo has invalidated their unencrypted security questions and answers but if you use the same security questions for other sites you will have to change those yourself.

 

Change your passwords

If your password was stolen in the 2013 breach it is likely that you have used that password for other logins. Keeper conducted a detailed survey of 1,000 smartphone users to determine how they protect their devices and sensitive data. Our findings indicated that password reuse across different applications is frequent, average password strength for mobile applications and websites is low and that most users rarely changed passwords.

Reuse of the same password across multiple applications is quite common, with nearly 84% of users telling us that they access at least two different applications or websites with the same credentials. We commend the 16% who said they never engage in this practice. On the other hand, the 24% who reuse passwords across five or more applications are playing with fire.

Change your passwords now and use unique password for each login.

 

Enable Two-Factor Authentication

Using Two-Factor Authentication, or 2FA, links your online account to a physical device, such as your phone, which makes it more difficult for a hacker to login to your account from a remote location. When you activate 2FA and attempt to login you will receive a verification code to your device and be required to enter it before gaining entrance.

 

Don’t Click Suspicious Links

Hackers will capitalize on this breach by attempting to send you unsolicited communications that ask you for personal information, refer you to a web page asking for personal information, and even appear to originate from Yahoo. Avoid clicking links or downloading attachments from suspicious emails.

 

Even though this breach happened in 2013 it is important to follow these steps. The fallout from the Yahoo breach will be felt for a long time so being proactive helps eliminate any risks to your future digital life.

Not yet a customer?  Download Keeper Password Manager and Digital Vault now.

Use Apple’s Facial Recognition to Log into Keeper Password Manager

by , on

Keeper gives our iOS customers another reason to smile. Apple users can utilize the latest facial recognition feature to log into their Keeper Vault, much like they already can with Touch ID.

We have integrated with Apple’s latest feature to provide a secure and convenient way to authenticate your identity. Here are some answers to questions you may have when using facial recognition.

How does it work?

Facial recognition on the new iPhone X is intended as a safe, secure way of quickly unlocking the phone without even touching it. Keeper iPhone users first need to let the phone map a 3D image of their face to be stored as an identity factor. After it is stored users simply have to look into the screen of the phone to activate it. It’s as simple as saying “cheese.”

Is it safe?

The data of your facial features never leaves the phone. Apple states that it is stored in a secure part of the device and even Apple cannot see it. While your phone is turned on, it is constantly monitoring to see if anything strange is happening, say, someone is trying to trick the phone by using a photograph of you to unlock it. Since your facial features are mapped with 3D technology this trick wouldn’t work.

Apple does not recommend to use the feature if you are a twin or under the age of 13. Find out why here.

What if my face changes?

The feature also adds to its representation of your face over time. For example, if you start to wear glasses and then look at the phone to login it might not initially recognize you, but once you get into the phone with your password, it will add the image of you with the glasses on to identify you for future logins.

Do I still need my password?

Yes. In the case your phone doesn’t acknowledge your facial features you will still need your passcode to override the feature for login. Customers can always switch to using only a high-strength, memorized password if they prefer.

Applying Face ID gives Apple users a faster and smarter version of Touch ID. We are constantly working with new and innovative technology to provide you with a seamless Keeper experience.

To find out more, please click here.

 

Not yet a customer?  Download Keeper Password Manager and Digital Vault now.

Keeper Nominated as a Finalist for the 2017 Merrick Momentum Award

by , on

 

We here at Keeper Security are honored to be nominated as finalists for the 2017 Merrick Momentum Award! The awards, held November 2nd, 2017 at the Hyatt Regency Hotel in Chicago, honor the best and brightest of Chicago’s tech community.

The Momentum Award, hosted by Chicagoland Entrepreneurial Center for the benefit of 1871, recognizes companies that are on track to become Chicago’s next brightest stars. The Chicagoland Entrepreneurial Center (CEC) is a non-profit organization that supports entrepreneurs on their path to building high-growth, sustainable businesses that serve as a platform for economic development and civic leadership. Past recipients of the Momentum Award include Avant, kCura, Braintree, GrubHub and most recently, @properties. This is great company to keep for Keeper!

Nomination for this award is the culmination of our teamwork and commitment to driving growth and delivering innovation to our most important asset – our customer. Thank you for being a part of our mission to safeguard the passwords and digital assets of every individual and business. Today Keeper protects more than 11 million consumers and 4,000 businesses.

Wish us luck.

To learn more about the Momentum Award, please visit https://1871.com/momentum-awards/.

Not yet a customer?  Download Keeper Password Manager and Digital Vault now.

Keeper Now Protects Your Digital Legacy and Estate with Emergency Access

by , on

Have you ever worried that your passwords or the important files stored in your Keeper vault might be lost if you become incapacitated, disabled or pass away?

Quite often when someone passes away, family members cannot find passwords to the deceased individual’s bank accounts, email, social media, etc. The Emergency Access feature within Keeper Password Manager and Secure Digital Vault solves this emerging digital problem and makes it an essential estate planning tool.

Keeper’s new Emergency Access feature will allow up to five trusted family members or friends access to your Keeper Account. Access is granted after a specified wait period which you define. Keeper users can add or remove anyone from their Emergency Access and adjust the waiting period for access to the vault. Designating someone an emergency contact requires they also have a Keeper Password Manager Account in order to receive the secure encryption keys and maintain the highest level of privacy.

It’s never easy or comfortable to prepare for the inevitable, but with all of the important transactions and activity we conduct online, it is critical that we help our customers save time and hassle when carrying out final wishes. Emergency Access can be setup to protect and enable access to your digital assets.

To learn more, please click here.

Not yet a customer? Download Keeper Password Manager and Digital Vault now.