Finders Keepers, Losers Weepers

by , on

You know that gut wrenching feeling of tapping each of your pockets or ruffling through your bag and not being able to find your Smartphone? Whether you leave it on a bus, in the back of a cab, at the library or a party, it’s devastating when we can’t find our phones. Losing something as easily replaceable as a cellphone shouldn’t seem like such a big deal. However the way we utilize our phones for accessing private information such as online banking, business accounts and all of our social media platforms, losing your phone can be detrimental. Our minds are filled with “what-ifs” about all the different palms our phones could fall into and whether or not that person, or another, snooped through our valuable and private data.

Symantec recently completed a study to find out how often and what data on a lost Smartphone is accessed. Their study called “Honey Stick Project” involved releasing 50 “lost” smartphones after they had been made capable of tracking what happened once the phones were found. Unfortunately their findings are not what we want to see.

The numbers below represent what was accessed from a found phone. You know that wallet you found on the sidewalk, did you look inside the cash fold, or go straight to the license to return it to it’s owner? A large chunk (57% to be exact) are guilty of accessing your password information on your “lost” phone.

Smartphone owners, beware! Take control of your private information by getting Keeper now!

Using Keeper on your Smartphone allows you to be confident in knowing your private information is safe. Keeper’s military-grade 128-AES bit encryption stores your private information and passwords securely all the time. It also creates riskless passwords and logs you into websites. New versions of Keeper have been released on all mobile device platforms including iPhone, iPod, iPad, Windows Phone and BlackBerry.

Go to for more information!

A Step Forward with Online Privacy

by , on

Google’s new privacy policy that’s now unified across all platforms went into full effect on March 1. Google has been notifying its users through pop-ups. In their video, Google called their unification as “tidying up”, which also means more than just consolidating a privacy policy across all their platforms. This consolidation is more user-friendly with less for users to read and keep track of. However, the privacy policy also states that Google is able to collect information from users as they operate all of Google’s free services such as Youtube, Search, Gmail, Google+, Maps and more. This will assist Google to streamline ads specifically chosen to market to you based on the information they’ve collected from your usage.

To some, this seems detrimental, even though Google shares how beneficial the updated privacy policy will be. Once signed in, users will be treated like one user instead of several, across all platforms, combining all information and making google searches geared specifically toward them.

Some critics view the updated policy as Google “trampling on people’s privacy rights in it’s relentless way to sell more ads.” Even top European regulators claim the privacy policy violates European data protection laws. Regardless, there are mixed reviews on whether or not Google’s updated Privacy Policy really makes that big of a difference.

How do you feel about Google’s new privacy policy? Give us your response through a comment below, or Facebook or Tweet us. We’d loveto hear your opinion!

Keeper’s Privacy Policy can be found here.

When Enough is Enough

by , on

As technology blossoms, the ability to track user content and collect personal data has become easier.  In fact, just recently two major companies, such as Apple and Google were a part of separate disputes that involved collecting Internet user data.  Yesterday, the Obama Administration announced the Consumer Privacy Bill of Rights as an effort to assist consumers with stronger data privacy.

President Obama made a statement from the White House, “American consumers can’t wait any longer for clear rules of the road that ensure their personal information is safe online,” continuing on with, “As the Internet evolves, consumer trust is essential for the continued growth of the digital economy. That’s why an online privacy Bill of Rights is so important.  For businesses to succeed online, consumers must feel secure. By following this blueprint, companies, consumer advocates and policymakers can help protect consumers and ensure the Internet remains a platform for innovation and economic growth.”

The Consumer Privacy Bill of Rights can be found here.  Obama is encouraging companies to adopt these standards that are currently voluntary.  The Federal Trade Commission will monitor companies who choose to follow the guidelines for any violations.  But what does that mean for the companies who decide to not abide by the Bill of Rights?  And will this these guidelines be enough to safeguard our information?

Another way you can control certain aspects of your online privacy is by using Keeper, one of the world’s most downloaded password security and management applications.  Keeper uses military grade 128-bit AES encryption to keep your valuable data safe.  These days we have a plethora of login credentials that unlock our most private information, and using Keeper will make sure that none of that information ends up in the wrong hands.

To watch a cool one minute video about how Keeper can protect you, click here.

Upgrade Keeper Desktop Now!

by , on

Keeping your private information safe and secure is our number one priority.  We also strive to make sure that you’re a happy and satisfied Keeper user and can easily navigate throughout your account.  With this in mind, we decided it was time to take step forward with Keeper and just the other day launched an updated version of Keeper Desktop!  Both Windows and Mac 10.4+ have been updated. Don’t worry about changing to the new version either–upgrades from the previous to the new version of Keeper Desktop software won’t erase any of your information.

“Our latest release of Keeper Desktop for Windows and Mac 10.4+ included several upgrades to make the user experience even better.  We optimized graphics for higher resolution displays, made the user interface more intuitive and greatly increased the speed from the prior version.   Most importantly, our latest version of Keeper makes sync’g to the Cloud Security Vault and the user’s devices more seamless,” said Darren Guccione, CEO and Co-founder.

The new, updated version of Keeper is super fast, and easy to use.  Cosmetic changes make Keeper more user-friendly.  Additional themes allow users more options to personalize their account to their liking.  New color icons pop out to easily direct you to what you need, and in the lower right corner you’ll find a new icon with a question mark, that will allow you to access the Quick Start Guide, which is available at all times.

Current customers received an in-app notification to upgrade to the latest version. In case you have been too busy to do so, here is how to upgrade: Go to, click ‘Download’ at the top, then download now, then choose your platform. It’s a simple as that–and as secure as you want!

You Can Rely On Keeper

by , on

We don’t want to believe it could happen to us, but theft happens to people and in places we would never expect.  There’s also those accidents where we leave our belongings in places and they aren’t there when we return.  When something as valuable to us as our cellphone or laptop that holds all of our private information is taken or misplaced, our world is turned upside down.

But with Keeper’s self-destruct function, you don’t have to worry.  If you ever leave your device on the bus, or it is unfortunately stolen, don’t fret over your private information being taken along with it.   All of your information is safe behind your master password.   After five unlucky attempts to break in, Keeper will self-destruct and wipe out all of your content you’ve stored in your Keeper account. The good news is if you’ve backed up your data to Keeper’s Cloud Security Vault ™, it’s all safe in there.

(Instructions on how to Backup and Restore your Keeper account data)

When it’s time to access your information from a new device, it might seem cumbersome to try to remember all of your user names and passwords after relying on Keeper for so long to do the work. However, if your information is backed up to Keeper’s Cloud and Security Vault, you can quickly restore all of your data from there.

Keeper makes your life more secure and simple. Even MSNBC is talking about it

You’re Only as Strong as Your Master Password

by , on

We put everything online.  It’s convenient for work and our personal lives.  Our confidential information is being stored and our lives are being shared, and all of it is safe and secure behind our passwords.  Regardless of the unspeakable amount of combinations that your password could be, breaches of security still happen.  Our reputations can be destroyed and our identities can be stolen.  This is something that most people don’t worry about or realize how much of a problem it is until they fall victim.  And, it happens more than we realize.  More than a quarter billion people have had their information stolen or lost in the past three years due to security breach. But it’s not just your neighbor, cousin or random person riding the bus that ends up with their information stolen. It happens to everyone: large companies and corporations, universities, and even health data. Just recently, was hacked and 24 million customers names, addresses, phone numbers, the last four digits of their credit card number and even encrypted passwords were made available to the cyber criminal.  Unfortunately this is not the only, nor the smallest breach of security this year.   Hackers feed on your information and identity, and are constantly discovering new ways to get inside your data.   Anyone can become a victim, which is why it’s important that you create a strong password.

Creating strong passwords for the numerous login credentials that we need for online banking, credit cards, email accounts, social media and beyond, tends to be overwhelming.  This is why we make our strategy transparent for ourselves.  We create simple passwords that include our names, our spouses and children’s names, phone numbers, our hometowns and any other effortless thing that we’ll never forget.  And on top of it all, when it’s time to create new login credentials, we opt to reuse passwords.  It’s simple and convenient.  But not just for us, for hackers too.

So what are your options?  You don’t want to be toting around sticky notes listing off your passwords.  You don’t want to share this information with anyone, and you definitely don’t want to be reusing old passwords.  What can you do to make sure your login information is manageable to you, but most importantly, secure?

You use Keeper.

Keeper takes the hassle out of creating several hack-free passwords for all your login information and guards your data. However, even though Keeper is secured with military grade,128-bit AES encryption it’s still vital that you create a strong master password.

Keeper stores all of your passwords and information behind one master password.  This allows you to only have responsibility for remembering that one single password, instead of the twenty you might have.  Your master password shouldn’t be the same as any other password that you have created, and should never be written down or stored anywhere but your own mind.

Tips for creating a strong master password:

– Length: Make sure your password is at least 8 characters long. The shorter your password, the shorter the amount of time anyone will need to crack your code.

– Unique: Stay away from using a simple word, name, phone number or address that’s available to others.

– Substitution: Try to mix up your letters and numbers to spell out certain things. Instead of using Hello!IamJodine as your password, try H3ll0!I@mJ0d1n3.

– Variety: Always use a combination of letters (upper and lower), numbers, and symbols.

If you need help remembering your strong password, create an acronym.

The State of Mobile Security: 2012

by , on

The new year brings many of the same challenges that Callpod has long ago recognized in mobile device security. Security risks with corporate mobile devices continue to rise as the use of tablets in professional environments demand an increase in security measures. Experts recognize that the key to security within mobile devices lies in encryption–as secure as you make the information within your mobile device. If it is ever lost or stolen why take the risk of leaving any data vulnerable before you can institute a remote wipe of your smartphone, tablet or laptop if you can keep your information safe within the vault of encryption, accessible only to you? By backing up your data to the cloud with Keeper, your sensitive data–the keys to the most important facets of your life–will always be accessible, safeguarded as well as anything can be in this day and age.

Welcome to the future. We hope that you never learn the hard way why we’ve designed our software to protect you the way it does, from every angle  of attack. Most likely you’ll have read the facts and prepared yourself and your mobile device for using your technology the way it was meant to be used, but with ultimate security.

More Reasons to Encrypt Your Information

by , on

A report on the security vulnerabilities of Android phones was recently released by North Carolina State University, highlighting reasons for encrypting your most important information as you enter it into your phone.

Keeper continues to work even through possible security breaches, viruses and malware–if someone is in your phone, Keeper still guards your data like a vault. The only way to access your info is by providing your master password–without this no one can get your data.

If your phone does become targeted by malicious users and is breached, Keeper still takes care of you. If you backed up to the cloud, in the end you’d have lost nothing.


"UK Companies Don’t Encrypt Enough, Says Survey"

by , on

Insights into encryption of data in both the private and public sector in the UK:

“Nearly half of UK public and private sector organisations are still risking data breaches, losses and leaks from their portable PCs and devices. While 52 percent of respondents said they used data or device encryption to secure their business laptops, 43 percent said they did not have encryption deployed and a further 5 percent admitted they didn’t know if encryption was in use,” said Check Point Software Technologies in a statement announcing its survey results.