Traditional cybersecurity practices often work to obstruct users rather than help them. In this article, we explore this phenomenon and ways to refocus on user-centered security.
Over the past few decades, securing remote access has become monumentally more complex. Remote work, with all of its benefits, has also furthered the threats of shadow IT and unauthorized remote access.
Tl;dr: This blog discusses IDC’s 2024 study, “The Future of Access Management: Identity Security Requirements for a Modern Application Access Approach.” The study identifies the biggest challenges facing security leaders today, especially those exacerbated by hybrid work. Below are IDC’s findings as well as downloadable checklists that security practitioners can use to address the security gaps in their organizations.
At 1Password, our mission has always been clear: to provide robust, human-centric security solutions that meet the needs of today’s businesses. Cybersecurity threats are evolving daily so it’s never been more important for businesses to have reliable, user-friendly solutions.
You’ve probably heard or read the advice: ‘Turn on multi-factor authentication (MFA) everywhere it’s offered.’ After all, it’s a great way to add an extra layer of protection to your online accounts.
In this article, we discuss how admins can programmatically access Spotlight using a utility called osquery, and we demonstrate useful queries you can run to find evidence of compromise in your organization.
In this blog, we summarize the results of a fall 2022 survey of IT, helpdesk, and security professionals about how their companies protect sensitive data.
Based on our commitment to making 1Password a helpful, intuitive, and easy-to-use password manager, we’ve focused on enhancing even more key features, all thanks to your feedback.
It’s a concern for families everywhere: keeping kids safe online. For parents with teenagers, there’s the added complication of trying to balance a child’s safety with their right to privacy. But is online safety just families’ problem?
A smooth and well-structured onboarding process can encourage strong security habits for your team. And the way you introduce 1Password sets the stage for how your entire organization will use it. Follow our tips and strategies to build an unbreakable foundation that’s baked right into your company’s overall security strategy.