G2 Crowd Announces Keeper as the Leader in Best Password Management Software

by , on

We are thrilled to announce that Keeper was chosen by G2 Crowd, the leading user-review-based enterprise software review website, as the leader in best password management software on the G2 Crowd Grid® for Password Management.

The scoring is calculated by a proprietary algorithm that factors in real-user satisfaction ratings from a number of results-related review questions. G2 Crowd software buyers can compare products according to their scores to streamline the buying process and quickly identity the products that produce the best results based on the experiences of their peers.

G2 Crowd’s mission is to provide the insights business professionals need to gain confidence in their buying decisions and become more successful in their jobs. Their review platform leverages more than 225,000 independent and authenticated user reviews read by nearly 900,000 buyers each month.

Keeper scored most “likely to recommend,” and received the highest score when it came to the question, “Which Password Management Software has the Best ROI?” Check out this link with the list of Password Management software products based on Results. https://www.g2crowd.com/categories/password-management/top/results

The G2 Crowd rated Keeper with 5 stars from 117 reviews. Keeper was the only password manager to be rated with 5 stars. You can read the reviews by clicking this link: https://www.g2crowd.com/products/keeper-716bcba8-054e-444f-8878-72372e3609e0/reviews

Thanks to the G2 Crowd for sharing their recommendations of Keeper! We are continually working to deliver you the latest and greatest tools to create and store unique, high-strength passwords in an encrypted, digital vault. You can find out what’s new with Keeper, including KeeperFill for Native Desktop Apps, Identity & Payment Info, Emergency Access, and Record History, by visiting our website: https://keepersecurity.com/whats-new.html

Not yet a customer? Download Keeper Password Manager and Digital Vault now.

Q&A: The Hectic, Semi-Mysterious and Rewarding Life of a Software Engineer

by , on

Ibrahim Landouar leads a life of perpetual change and dynamism. As the Senior Software Engineer and Team Lead at Keeper, he works daily at balancing all aspects of his exciting, ultra-busy work and personal life.

Q: What does a software engineer do exactly?

A: Developing a software solution involves a series of steps and processes, including gathering requirements, designing the software, developing or coding the software, testing it, releasing it, then maintaining and improving it. Some engineers specialize in certain steps, particularly in very large projects. At Keeper, I am involved in every step, each of which is very important to the next step.

Q: Why is that?

A: Consider requirements gathering, the first step. If you don’t do a really good job of getting the actual requirements right and knowing what it is the customer truly wants, then all the subsequent steps and development will not solve the problem the person has. I have a consulting background so I try hard to talk in business terms when gathering requirements from a business-focused individual and then I can switch to more tech-talk when speaking to an engineer or software specialist. I also am fluent in three languages – English, French and Arabic and I speak some German. I feel this helps me listen more intently and carefully when talking to my customers about project requirements.

Q: What in your background prepared you for this kind of work?

A: I got my engineering degree in France as I considered a research career versus say a career in industry. After that I got a master’s degree in security and simultaneously got an MBA. That really opened my eyes to the whole business side of a professional life. I than began my career working in eBanking, leveraging my security training then moved to the U.S. and worked as a consultant developing and consulting on solutions for the Java platform. Moving to Keeper then seemed like a perfect fit for me, as I was looking for a security-oriented firm where software was the main focus, not a side business.

Q: What communications and other tools do software engineers typically use to get their jobs done?

A: We develop solutions with requirements set by the CEO and several others in our Chicago office, so fluid communications are vital between them and our engineers in California. We have a lot of live face-to-face communications when possible, but also use video chat and Skype to enhance our discussions. However the Slack team communications tool is very important to us and getting more so all the time. We use it extensively to communicate via chat groups; we use it to create interactive product channels with our tech teams. This may sound biased, but Keeper is an important solution I use every day. It allows me to securely share passwords with anyone on my team and do so with all the security we need to keep hackers away.

Q: How do you stay current in such a dynamic technology world?

A: I attend conferences as much as my schedule will permit, but these days you can use different technologies that allow you to view conference sessions remotely on YouTube. I’ll then experiment with some of the information and knowledge I gain. You must do this because technology is simply moving too fast virtually every day.

Q: What is the hardest, most enjoyable and most challenging aspects of your job?

A: Well the most challenging can also be the most rewarding, and that is having to get certain projects done on very short release schedules, which can happen anywhere. An aggressive schedule can make a software engineer’s life very hectic and challenging but at the same time in adds that extra measure of excitement and energy. I admit there are times I can live without it! Also in a smaller company like ours, at times I have to drop everything I am doing to pitch in to help solve a crisis, like an important server that goes down. And as far as the most rewarding aspect of my work, it would be seeing the immediate result of what we do, such as seeing the new features we build getting great user reception or watching revenues tick up.

Q: What do you see as trends that will most greatly impact the work of software engineers?

A: No doubt the movement to cloud-based solutions and away from on-premises solutions will affect almost everything we do. We leverage the cloud extensively here at Keeper. If the power goes down in our entire Chicago office, we lose nothing because everything is in the cloud. Also security in general is going to continue to rise in importance. Hackers are gaining fresh research and knowledge every day, and gaining more perspective and momentum. A strong, comprehensive security system is vital. When it comes to passwords, I just cannot see why companies, especially small and mid-sized organizations, shouldn’t have a password management system. Storing and then sharing passwords on spreadsheets or using the same passwords for different devices and sites is an open invitation to attackers.

Q: What advice would you give to anyone considering a career as a software engineer?

A: Understand that this job like any other isn’t roses all the time. On occasions it can seem you are doing things repetitively, especially when building improvements to an existing a solution. But the reward can come when you figure out an automated solution. It just won’t happen the first day. Also you need to be a person willing to continually invest in your career because you cannot stop learning and researching to keep up with the tremendous rate of change. Attend conferences. Learn to network. If you stop, you’ll be left behind.

Q: What do you do in your limited spare time?

A: I try hard to balance my mental and physical lives, so I play soccer in a league. If there is any frustration or things I need to get out, that is where that happens. I also have three kids, all six years old and under. So I am a pretty busy guy!

Interested in a career in cybersecurity? Keeper Security is hiring!

7 Tips for Keeping Kids Safe Online for #CyberAware Month

by , on


For National #CyberAware month, we are offering 50% off the Keeper Family Plan with code “NSCAM”.

Click here – hurry, this deal will end soon!

Today’s youth are often called “digital natives” because they are so comfortable with living online. But much as we may admire their proficiency with their devices, we shouldn’t forget that security is probably not top of mind.

Innocent young minds don’t grasp the concept of identity theft or understand the consequences of a ransom attack. In recognition of National Cyber Security Awareness Month, here are some things you can do to keep them – and your entire family – safe.

Keep family computers in an open area. This allows you to monitor what’s on the screen and to check back on activity later. In particular, keep an eye on chat sessions, which is where predators lurk.

Be sure security software is installed and updated. At the very least, you need anti-malware and anti-spyware packages. A password manager is also a good idea for creating and saving passwords that can’t easily be compromised by hackers.

Give children their own accounts on shared computers. This enables you to limit the software they can access and to define unique controls on each account.

Don’t permit kids to download and install software without your oversight. Free software downloads are a primarily medium for spreading spyware.

Use parental controls in web browsers. These enable you to block unsafe sites, disable potentially malicious scripts and review browsing history to see what your kids have been doing when you weren’t watching. Here is a good guide to implementing parental controls in major browsers.

Have a talk. Remind kids of a few basic protections. Never click on unknown links. Never open email attachments. Never respond to chat messages from people they don’t know. Never “friend” strangers. Don’t bully others and alert parents if they suspect they are the targets of a bully.

Have logins to kids’ social accounts such as Facebook, Snapchat and anywhere else private conversations go on. This not only enables you to keep an eye on what they’re doing but to spot malicious activity by others that’s directed at them.

For additional protection you can install activity monitoring software that keeps detailed records of everything that happens on your computer. Examples include Cyber Patrol, Cybersitter, Net Nanny and SpyAgent. But if you follow the advice above, you probably don’t need additional protection.

Above all, stress to your children that your monitoring and cautionary steps are for their protection. Even if they don’t understand the risks that are out there online, they know that you have their best interests in mind.

Were You One of the 3 billion Users Compromised in the Yahoo Breach? Probably…

by , on


Yahoo’s new parent company, Verizon, reported this week that all 3 billion user accounts were likely compromised in the 2013 data breach. Previously, the company reported that the breach affected 500 million and then changed that number to one billion. Information that was stolen includes names, phone numbers, and dates of birth, passwords and answers to security questions.

The breach doesn’t just affect your Yahoo account. This information is called Personally Identifiable Information (PII) and can be used to reset current passwords, apply for credit and loans, and even open up new accounts in your name.  If you had a Yahoo account in 2013 here’s what you need to do.


Check your online accounts

Take some time to browse your online accounts to ensure none have been compromised or had unusual activity. You may want to change your security questions and answers, too. Yahoo has invalidated their unencrypted security questions and answers but if you use the same security questions for other sites you will have to change those yourself.


Change your passwords

If your password was stolen in the 2013 breach it is likely that you have used that password for other logins. Keeper conducted a detailed survey of 1,000 smartphone users to determine how they protect their devices and sensitive data. Our findings indicated that password reuse across different applications is frequent, average password strength for mobile applications and websites is low and that most users rarely changed passwords.

Reuse of the same password across multiple applications is quite common, with nearly 84% of users telling us that they access at least two different applications or websites with the same credentials. We commend the 16% who said they never engage in this practice. On the other hand, the 24% who reuse passwords across five or more applications are playing with fire.

Change your passwords now and use unique password for each login.


Enable Two-Factor Authentication

Using Two-Factor Authentication, or 2FA, links your online account to a physical device, such as your phone, which makes it more difficult for a hacker to login to your account from a remote location. When you activate 2FA and attempt to login you will receive a verification code to your device and be required to enter it before gaining entrance.


Don’t Click Suspicious Links

Hackers will capitalize on this breach by attempting to send you unsolicited communications that ask you for personal information, refer you to a web page asking for personal information, and even appear to originate from Yahoo. Avoid clicking links or downloading attachments from suspicious emails.


Even though this breach happened in 2013 it is important to follow these steps. The fallout from the Yahoo breach will be felt for a long time so being proactive helps eliminate any risks to your future digital life.

Not yet a customer?  Download Keeper Password Manager and Digital Vault now.

Use Apple’s Facial Recognition to Log into Keeper Password Manager

by , on

Keeper gives our iOS customers another reason to smile. Apple users can utilize the latest facial recognition feature to log into their Keeper Vault, much like they already can with Touch ID.

We have integrated with Apple’s latest feature to provide a secure and convenient way to authenticate your identity. Here are some answers to questions you may have when using facial recognition.

How does it work?

Facial recognition on the new iPhone X is intended as a safe, secure way of quickly unlocking the phone without even touching it. Keeper iPhone users first need to let the phone map a 3D image of their face to be stored as an identity factor. After it is stored users simply have to look into the screen of the phone to activate it. It’s as simple as saying “cheese.”

Is it safe?

The data of your facial features never leaves the phone. Apple states that it is stored in a secure part of the device and even Apple cannot see it. While your phone is turned on, it is constantly monitoring to see if anything strange is happening, say, someone is trying to trick the phone by using a photograph of you to unlock it. Since your facial features are mapped with 3D technology this trick wouldn’t work.

Apple does not recommend to use the feature if you are a twin or under the age of 13. Find out why here.

What if my face changes?

The feature also adds to its representation of your face over time. For example, if you start to wear glasses and then look at the phone to login it might not initially recognize you, but once you get into the phone with your password, it will add the image of you with the glasses on to identify you for future logins.

Do I still need my password?

Yes. In the case your phone doesn’t acknowledge your facial features you will still need your passcode to override the feature for login. Customers can always switch to using only a high-strength, memorized password if they prefer.

Applying Face ID gives Apple users a faster and smarter version of Touch ID. We are constantly working with new and innovative technology to provide you with a seamless Keeper experience.

To find out more, please click here.


Not yet a customer?  Download Keeper Password Manager and Digital Vault now.

Keeper Nominated as a Finalist for the 2017 Merrick Momentum Award

by , on


We here at Keeper Security are honored to be nominated as finalists for the 2017 Merrick Momentum Award! The awards, held November 2nd, 2017 at the Hyatt Regency Hotel in Chicago, honor the best and brightest of Chicago’s tech community.

The Momentum Award, hosted by Chicagoland Entrepreneurial Center for the benefit of 1871, recognizes companies that are on track to become Chicago’s next brightest stars. The Chicagoland Entrepreneurial Center (CEC) is a non-profit organization that supports entrepreneurs on their path to building high-growth, sustainable businesses that serve as a platform for economic development and civic leadership. Past recipients of the Momentum Award include Avant, kCura, Braintree, GrubHub and most recently, @properties. This is great company to keep for Keeper!

Nomination for this award is the culmination of our teamwork and commitment to driving growth and delivering innovation to our most important asset – our customer. Thank you for being a part of our mission to safeguard the passwords and digital assets of every individual and business. Today Keeper protects more than 11 million consumers and 4,000 businesses.

Wish us luck.

To learn more about the Momentum Award, please visit https://1871.com/momentum-awards/.

Not yet a customer?  Download Keeper Password Manager and Digital Vault now.

Keeper Now Protects Your Digital Legacy and Estate with Emergency Access

by , on

Have you ever worried that your passwords or the important files stored in your Keeper vault might be lost if you become incapacitated, disabled or pass away?

Quite often when someone passes away, family members cannot find passwords to the deceased individual’s bank accounts, email, social media, etc. The Emergency Access feature within Keeper Password Manager and Secure Digital Vault solves this emerging digital problem and makes it an essential estate planning tool.

Keeper’s new Emergency Access feature will allow up to five trusted family members or friends access to your Keeper Account. Access is granted after a specified wait period which you define. Keeper users can add or remove anyone from their Emergency Access and adjust the waiting period for access to the vault. Designating someone an emergency contact requires they also have a Keeper Password Manager Account in order to receive the secure encryption keys and maintain the highest level of privacy.

It’s never easy or comfortable to prepare for the inevitable, but with all of the important transactions and activity we conduct online, it is critical that we help our customers save time and hassle when carrying out final wishes. Emergency Access can be setup to protect and enable access to your digital assets.

To learn more, please click here.

Not yet a customer? Download Keeper Password Manager and Digital Vault now.

Track Changes to Passwords, Files, and Account Details with Keeper’s New Record History

by , on

Record History puts you in the driver’s seat. You now have a valuable audit tool to track the Who, What, and When for each of your Keeper records. Stop wasting time trying to locate old account details, certificates, or asking team members if they made a change.

  • Have you ever forgotten if you changed a password?
  • Have you ever needed a prior password to verify account ownership?
  • Have you needed to locate an old account number?
  • Have you wondered if a team member made a mistake updating a record?
  • Do you need to find old SSH, VPN, or web site certificates?

Worry no more as Keeper has a solution. You can view the date the record was modified, revert to a previous version of the record or permanently delete it from your vault. For existing Keeper customers, Record History is retroactive to May 2017. More details about Record History:

Click Record History near the top right of your screen next to the edit icon to find out the latest version of your Keeper file and who last edited it. It will also show you every previous version of that record back to when it was created. Here’s what it looks like…

You can check any past version to retrieve or verify information or see exactly what fields were changed. You now have access to prior usernames, passwords, notes, or even previous digital certificate values, web site keys, or anything you store in your Vault.

The versions are listed by date and time so you can easily see when changes were made to the file. Here are some other great tips to master this latest feature:

To view your Record History:

  1. Login to your Keeper vault.
  2. Click on existing record.
  3. Once you’re in the record, click on the “clock” icon in the upper right corner of the record.
  4. Any changes you made will be visible under “Record History.”

To restore a record under Record History:

  1. Click on existing record.
  2. Once you’re in the record, click on the “clock” icon in the upper right corner of the record.
  3. Any edits you made will be visible under “Record History.”
  4. Click on “Last Modified” for the version you want to “Restore.”
  5. Select “Restore” in the top right corner to replace the current record with the previous record.

To delete a record:

  1. Click on existing record.
  2. Once you’re in the record, click on the “trash can” icon.
  3. You’ll be asked to confirm the record’s deletion.
  4. Select “Ok.”
  5. Any deleted records will be listed under “Deleted Records.”
  6. Under “Deleted Records”, you can restore deleted records or permanently delete them.

Our Keeper Development Team is already benefiting from this new feature and we hope you will as well. You have the power!

Not yet a customer? Download Keeper Password Manager and Digital Vault now.

Join our September 20th Live Webinar on the 2017 State of SMB Cybersecurity

by , on

2017 State of SMB Cybersecurity

We are excited to announce a free webinar on September 20th at 1 pm CST for small and mid-sized businesses (SMBs) with exclusive access to research from the 2017 State of SMB Cybersecurity Report. The presentation is chock-full of information on how trends have shifted and concrete recommendations to safeguard your business.

Cybersecurity has become an area of increasing concern for SMBs as costs associated with attacks continue to climb. To help uncover the current state of SMB cybersecurity, Keeper Security teamed up with the Ponemon Institute to survey 1000 SMB IT leaders.

The results unveiled that SMBs are a huge target for hackers and that many businesses are lacking in proper security coverage.

During this webcast, you’ll learn:

1. The single greatest cyber threat your business faces right now.
2. How much a security breach could cost your business.
3. Simple solutions to protect your company, customers and employees.
4. Tips on how to create and manage secure BYOD and IoT policies.

Emceed by Rieva Lesonsky, prolific editor of Small Biz Daily, and co-hosted by Dr. Larry Ponemon, Founder of the Ponemon Institute and Darren Guccione, CEO of Keeper Security, this webinar will arm you with the latest and greatest information you need to create a strong cybersecurity position for your business.

Click here to sign up!

Pssst, Pass The Word: Password Security for Students Is Easy. Help get their school year off to a safe digital start!

by , on


Summer’s looming end signals the beginning of another school year, which should also heighten parental concerns about their kids’ cyber safety. With near ubiquitous access to everything and anything on the Internet via smartphones, tablets and laptops, students become prime targets for hackers that know these users tend to be more carefree and less security conscious than adult users.

Thus the burden of helping kids maximize security online falls to their parents, to some degree – not unlike in helping children manage other aspects of their lives today. Very often children use networks as well as devices that are shared with parents and caretakers. This makes them fair game for hackers not only seeking to access the kids’ devices, but also gain access to the private data and files of others. This article focuses on a common, highly effective tip and technique for keeping hackers at bay.

Passwords, passwords, passwords

When it comes to helping secure your children’s digital life, so much can be accomplished with some of the simplest techniques, and many of them revolve around proper use and application of passwords. Why? For one thing, the hackers know full well that weak passwords are often the norm. Small wonder then that in one major survey, nearly two-thirds (63%) of confirmed data breaches involve weak, default, or stolen passwords.

The weak password problem is just a problem for consumers either. As shown in yet another major study, nearly six in 10 of companies surveyed have no visibility into employees’ password practices. These include use of unique or strong passwords and sharing of passwords with co-workers. Not only that, but the study also found that even if an organization has password policies, 65% do not strictly enforce them. So it’s small wonder that 60% of employees use the same password for everything.

What all this means is that hackers realize that weak passwords are common everywhere, and therefore they have raised their game at cracking them.

What to do about passwords?
The common wisdom forever has been to make passwords as awkward and cumbersome as you can remember, inserting weird characters, numbers, upper and lower case letters, and so one. But the man who put those recommendations forward a decade ago now has changed his mind, as outlined in this recent article in the Wall Street Journal. He claims now that overly complex passwords can actually limit overall use because people cannot remember them. And certainly a student’s mind, crammed with all sorts of other details, cannot remember any better necessarily.

There is a way parents can intervene to ensure password security without limiting their children’s desire to live digitally 24/7. And that is to download and use a password management system, and then demonstrate its great ease of use to their children before returning to school. Some of the best ones are free of charge for individuals. Other versions are available for nominal charges for entire families.

How do they work?
What do these easy-to-use solutions do and how do they work? A good password manager will create, retrieve, apply and then even keep track of long, complex, highly secure, random and most of all different passwords across all your children’s different accounts, including all their social media accounts. In doing so these password managers not only protect your children, but also in the case of shared networks and devices protect your PINs, credit-card numbers, answers to security questions, and so on. In fact the passwords are so complex and can change so often that cracking them is nearly impossible, or at least so difficult that hackers will likely just move on to easier targets.
All your students have to do is remember one single password, much as they do now. That will unlock the password manager’s ‘vault’ where their unique passwords are kept and taken out when your children log into any online service or site. It literally is that easy.
Using password managers doesn’t mean your children shouldn’t use other measures, such as two-factor authentication, which means they need two different steps to get on line or to access online sites. But they can virtually assure you that our students are safe from the most common of all hacker techniques, namely stealing and compromising passwords in an attempt to unlock a world of trouble, aggravation and even worse on your students.

What else?
There is of course an entirely different range of security measures that parents must ensure once their student children are actually on line, and there is no shortage of excellent articles available discussing specific techniques for doing so. However when so much in terms of student cyber security can be accomplished with such a minimum effort and with such simplicity, downloading and using a password manager may be the single best tip for parents seeking peace of mind as the new school year begins.