Vampires and hackers and ghosts, oh my!
There will be all kinds of spooks and monsters out tonight, but even scarier than malevolent spirits? Malevolent software. As we’ve seen, this year has seen a rise in cybercrime of all varieties, targeting the government, the retail sector, and individuals. For a breakdown of cyber attacks in 2014, check out these helpful charts on Hackmageddon.com.
Just as we’ve all been taught about stranger danger and cautionary candy consumption, there are ways to protect yourself from cyber attacks, all year round. Downloading Keeper Backup is the smartest thing you can do to ensure that your passwords, financial information and sensitive documents are safe from creeps and criminals.
Have a safe and spooky Halloween!
In today’s technology-centric world, the word “cybercrime” has become a household term. With more and more of our lives taking place online, criminals are finding ways to prey on the new vulnerabilities that follow technological progress. In this ever-changing landscape, society is in grave need of a skilled and adaptable cybersecurity force. So how do we ensure that individuals, businesses and other organizations who depend on a safe internet are protected?
The answer, it appears, is education–specifically, at a secondary level. According to this article from Identity Theft Resource Center online, more and more colleges and universities are offering degrees in cybersecurity. Programs cater to students with an array of interests and backgrounds, from forensics to business accounting. Because it is a relatively new discipline, students have a great deal of freedom to pursue the areas that interest them. And due to an ever-changing landscape where criminals adapt to new security measures as rapidly as they are implemented, the field is always evolving and exciting.
Here’s to the cybersecurity professionals of tomorrow!
Do you own or manage a business of any size? Then you need Keeper for Groups.
Why? Because it’s the world’s most secure integrated password manager and digital vault. And in today’s BYOD (Bring Your Own Device) environment, password management is the key to your business’s security–and success.
We’ve tailored Keeper for Groups specifically for the needs of all businesses, small or large. The feature we’re most excited about is Keeper Enterprise Bridge. Keeper Enterprise Bridge seamlessly integrates into Microsoft Active Directory to add users to your group in real time. If your company uses Active Directory to manage employee devices and software, the Keeper Bridge provides a simple way to implement Keeper for Groups into the software they are already using. Adding, managing and removing users from your Keeper Group becomes a snap.
Keeper Enterprise Bridge also supports integration with the LDAP protocol. That means that everyone in your Windows server network can easily and instantly become part of your Keeper Group.
If you aren’t a Keeper for Groups customer and want to learn how Keeper can help your company securely manage passwords and private information, contact our sales team and begin your Free Trial today. Our base plan starts at only $299.99 per year.
It’s #NSCAM, Keepies! What is NSCAM, you ask?
It stands for National Cyber Security Awareness Month, and it’s the reason October is our favorite month out of the year. What could be better than 31 days devoted entirely to promoting safety online?
The National Cyber Security Alliance has created a great website just for the occasion, featuring valuable information to help individuals, families and businesses practice safer online habits. Here are some NSCA tips with Keeper tricks to solve them!
NSCA TIP: Secure your accounts. Ask for protection beyond passwords. Many account providers now offer additional ways for you verify who you are before you conduct business on that site.
KEEPER TRICK: Enable Two-Factor Authentication.
NSCA TIP: Make passwords long and strong. Combine capital and lowercase letters with numbers and symbols to create a more secure password.
KEEPER TRICK: Utilize Keeper’s random password generator (the dice next to password fields).
NSCA TIP: Unique account, unique password. Separate passwords for every account helps to thwart cyber criminals.
KEEPER TRICK: Make a new Keeper record for every account, each with its own password.
NSCA TIP: Keep it safe. Everyone can forget a password. Keep a list that’s stored in a safe, secure place away from your computer.
KEEPER TRICK: WIth 256-bit encryption, Two-Factor Authentication and perfect forward secrecy, your Keeper Data Vault is a whole lot more secure than a list on a piece of paper.
NSCA TIP: Back it up. Protect yourself against data loss by making electronic copies of important files, commonly referred to as a backup.
KEEPER TRICK: Backup passwords to the Cloud Security Vault, and store encrypted copies of important documents with Secure File Storage.
The Keeper team loves blogs. Specifically, we love technology blogs. From cutting-edge news about mobile devices to the latest data breaches, we rely on bloggers to keep us up-to-date on what we need to know. But in the enormous sea of blogs out there, which ones do we keep coming back to?
Here’s a list of some of our favorite cybersecurity blogs at the moment (in no particular order):
Krebs On Security:
Former cybersecurity investigative reporter Brian Krebs penned thousands of articles while at the Washington Post. His cybersecurity blog consists of in-depth write-ups in his appealing and informative journalistic style.
WIRED’s Threat Level
A great all-around security resource written by editors from WIRED.com, Threat Level keeps readers up-to-date with security news alerts as well as editorial write-ups.
InformationWeek’s Dark Reading
From the editors of InformationWeek, Dark Reading is a community-oriented site aiming to connect security professionals and enthusiasts through conversation online. This blog is a great place to learn through discu
PCMagazine’s Security Watch
PCMagazine’s Security Watch blog focuses on cybersecurity news. Run by author Neil Rubenking, Security Watch’s content provides readers with an accessible, readable spin on breaking headlines.
TechRepublic’s IT Security
Also geared toward IT and security professionals, TechRepublic’s IT Security blog publishes articles from a variety of authors about security solutions for both businesses and individuals.
Penned by – you guessed it – British security blogger Graham Cluley, this blog provides perspective on cybersecurity, featuring news alerts, educational information and opinion articles.
Which tech blogs do you follow? Let us know in the comments below!
The end of summer brings cooler weather, changing leaves, and a look back at the season’s high-profile cyber attacks. Here is a recap of the breaches you need to know about:
Last month, Home Depot revealed that its systems were infiltrated by malware but only recently did the company admit that the breach occurred as far back as April. For months, a hackers were harvesting customer information through their point-of-sale system, and it is estimated that as many as 56 million payment cards were compromised. That’s even bigger than the Target breach of 2013, which compromised an estimated 40 million cards. According to Home Depot, the malware has now been stopped.
If six months of malicious data theft sounds like a long time, consider the impact of an 18-month attack, such as the one suffered by dozens of Goodwill resale stores across the U.S. The attack used malware to target a third-party payment processor, resulting in the theft of customer credit card data and, so far, 25 instances of credit card fraud.
(Possible) JPMorgan Chase
An investigation was conducted in August regarding a possible compromise of bank account information targeting Chase and possibly one other bank. ABC7 Chicago covered the story and interviewed our very own COO Scott Grossman about password security. His advice?
“Consumers should be better safe than sorry, and that means go in and change your password and don’t make it easy. Don’t make it six characters in lowercase, make it six characters with numbers, letters and symbols.” (Check out Keeper’s Random Password Generator.)
The moral of this never-ending saga: Get Keeper. Keeper can help quickly change old, compromised passwords for new, strong ones, and will encrypt and store them away from prying eyes.
Can you remember the first password that you created?
Was it “password”? A song title? Your dog’s name plus the year you were born?
Second question: Did you use that password for every new account you opened online?
Third question: Do you still use that password anywhere and everywhere on the web today?
It would be nice to think that we’re all more cybersecurity-savvy than we were 10 years ago. But despite what we have heard about password security, many of us continue to use weak passwords across all of our online accounts.
With hacks continuing to increase in strength and numbers, password choice is more important than ever. A strong password is long and complex. A strong password is difficult to remember. A strong password is hard to hack.
However, just like building muscle strength, some people are not willing to expend the effort to beef up their passwords. With Keeper, strengthening your online log-in credentials is a lot easier than lifting weights. In fact, it’s as simple as clicking a button.
Keeper’s Random Password Generator looks like this:
What does it do? It generates good, strong passwords using long, random strings of letters, numbers and characters. Once your password has been generated, Keeper will do the hard part of remembering it for you. Keeper also recommends that you change your password every six months. With just one click, users can easily uphold to this necessary standard thanks to Keeper’s Random Password Generator.
Using Keeper’s Random Password Generator for each and every one of your online accounts is the strongest and simplest way to protect yourself against hackers. Use it!
We’re going to Ireland!
This week, Keeper was selected to attend Web Summit in Dublin, known as Europe’s most prominent technology conference where the world’s greatest venture capital investors, innovators, enthusiasts and tech writers converge.
Keeper was also named a START company, which includes 150 of the world’s highest potential and most disruptive young businesses. As part of the START program, Keeper will meet with investors, media and Web Summit partners from around the world. Other companies that have attended in the past include Uber, Nest, Vine and Stripe.
“Keeper is both honored and flattered to have been selected for Web Summit. We are excited to attend with the amazing companies in the roster,” said Darren Guccione, CEO and Co-Founder of Keeper. “This has been a remarkable year at Keeper with cutting-edge product features and substantial growth. Our debut at Web Summit will allow us to share our technology and ideas in a very special forum. We are looking forward to meeting with other innovative companies, investors and media.”
Keeper’s invitation to Web Summit comes after three groundbreaking releases earlier this awesome year: FastFill™, Secure File Storage and Touch ID Fingerprint Login.
“These features mark Keeper’s launch of biometric authentication, wearable tech integration and rapid access to mobile apps and browsers,” said Craig Lurey, CTO and Co-Founder of Keeper. “Our goal has always been to converge security and convenience to help our users access their most vital information in one ubiquitous vault.”
Web Summit, which will be held from November 3 to 6, 2014, is expected to bring together more than 20,000 attendees from around the world. Check out our Facebook, Twitter and Linkedin pages during the conference for live updates and photos.
We all know the importance of cybersecurity. Your day-to-day routine probably requires the management of numerous passwords and involves countless connections to websites that could pose a hazard to your personal identity. As we’ve seen from recent events, everyone, including well-known celebrities, is vulnerable to an online attack at any time.
But Internet security is not just a personal safety concern these days. It is also an international security issue, and the United States government has taken several steps to treat is as such.
In 2009, President Obama appointed an Executive Branch Cybersecurity Coordinator to oversee cybersecurity at a national level, as part of the Comprehensive National Cybersecurity Initiative (CNCI) enacted by President Bush the year before. The Executive Branch Cybersecurity Coordinator works directly with both state governments and the private sector to create a unified plan of defense against cyber attacks.
The updated CNCI is comprised of 12 initiatives that aim to protect the United States against current threats and to prepare us for threats that may arise in the future. You can read about these initiatives in more detail here.
And of course, it follows that an issue of national security becomes an issue of international concern. NATO leaders are currently holding a summit in Wales where cybersecurity is expected to be a prominent big topic on the table. Allegedly, leaders are expected to endorse a policy explicitly stating that cyberattacks can trigger the alliance’s mutual defense obligations. That’s huge. Stay tuned to Keeper’s Facebook, Twitter and Linkedin pages for updates.
Academy Award-winning actress Jennifer Lawrence didn’t have the best holiday weekend. On Sunday morning, several photos surfaced featuring J. Law in a barely-there bathing suit and a few others in a birthday suit. And, this was not a publicity stunt for the young starlet. Instead, these private shots appear to have been stolen from her cell phone.
The hacker allegedly responsible for the leak has also claimed to be in possession of more than 60 nude selfies of other female celebrities. Later on Sunday, similarly private photos surfaced of Kate Upton, Lea Michele, Ariana Grande, Victoria Justice, Brie Larson, Kirsten Dunst, Becca Tobin, Jessica Brown Findlay, Teresa Palmer, Krysten Ritter, Mary Elizabeth Winstead, Yvonne Strahovski, and McKayla Maroney. According to the Associated Press, the FBI has been made aware of the allegations and is addressing the incident. A spokesperson from Apple also made a statement and said the company was looking into whether any of the celebrities’ iCloud accounts had been tampered with.
There is a simple solution: Use Keeper’s Secure File Storage Feature
Keeper’s new feature, Secure File Storage let’s users take photos on their smartphone while inside their Keeper vault. Photos are never stored in the camera roll of the device or locally on the device. Instead, all private photos, files and videos are instantly encrypted and stored in the user’s private security vault. Users can also securely share files and photos with fellow Keeper users – from vault to vault. Secure File Storage uses the same military-grade encryption and security that has protected our Keeper password manager users for years. Files are encrypted during the upload process and the user holds the encryption key for complete privacy and security. Unfortunately, this is not the case for most cloud storage providers which often lack certain security safeguards against hackers. Keeper is a zero-knowledge security platform which means that only the user has access to their private information.
Don’t wait until you have to learn this lesson the hard way. Simply stated, this hack would never happen with Keeper. Even if a hacker were to steal files from Keeper’s Cloud Security Vault (doubtful by the way), they would be unable to decrypt and view the files. Had these high-profile stars used Keeper, it would have been business-as-usual with with complete and total privacy.