Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Deep Web vs Dark Web: What's the Difference?

The main difference between the deep web and the dark web is that the deep web is bigger and used every day by most people without even realizing it. The dark web can only be accessed with the Tor browser and is riskier to access than the deep web. Continue reading to learn more about the differences between the deep and dark web, and how you can keep your information protected from both.

Types of Multi-Factor Authentication (MFA)

The four types of Multi-Factor Authentication (MFA) are knowledge, possession, inherence and location. These authentication types provide a foundation for a number of MFA methods, giving users multiple options for securing their data, ranging from SMS message tokens to hardware security keys. Which method is right for you or your business can depend upon what you have access to and how secure you want to be.

The Three Different Types of Hackers

Hackers fall into one of three general categories: white hat hackers, black hat hackers and gray hat hackers. But these aren’t the only types of hackers that exist. There are also red hat hackers, green hat hackers, blue hat hackers and more. Read on to learn more about the types of hackers and what makes them different from one another.

Can Someone Access the Passwords Saved in My Browser?

Yes, anyone who has access to your web browser or uses malicious software to hack it will be able to access the passwords saved in your browser. These known security flaws in browser password managers are often ignored because they are convenient to use. However, your passwords are not secure in a browser password manager. Continue reading to learn more about the risks of using browser password managers and what you should use instead.

Can WiFi See What You Search on Incognito?

Yes, your WiFi provider – also called an Internet Service Provider (ISP) – can see what you search and what sites you visit, even when you’re in incognito mode. The owner of the router will also be able to see what you search in the router logs. Incognito mode only prevents your site visits from being saved to your browser history. Read on to learn more about how incognito mode works and who can see your search history.

Keeper and Brigantia Super-Charge Partnership With MSP Workshop Event

Keeper Security partnered with Brigantia almost three years ago to focus on growing our business in the UK and Ireland MSP markets. It was an honour to re-join forces for a productive afternoon in London for an informative workshop with current partners. Brigantia’s Sales Director, Angus Shaw, and Keeper Security’s Global Channel Director, John Andrews, led the charge, with Padraigh Conway, our Lead EMEA Sales Engineer, providing detailed best practices sessions.

How Cybercriminals Are Using AI for Cyberattacks

Cybercriminals are using AI to carry out various cyberattacks including password cracking, phishing emails, impersonation and deepfakes. It’s important you understand how cybercriminals are using AI to their advantage so you can better protect yourself and family, as well as your accounts and data. Continue reading to learn about AI-enabled cyberattacks and what you can do to keep yourself safe.

How To Check If an Email Attachment Is Safe

Cybercriminals often use phishing emails to get you to click on malicious links or attachments. Clicking on these scams can trigger a malware infection that places all your sensitive data at risk of becoming compromised. Before deciding to click on an attachment, you should make sure it’s safe to open.

What Is Personally Identifiable Information (PII)?

Personally Identifiable Information (PII) is any data that can identify a specific individual. Data like your Social Security number allows you to open credit cards, get a loan and more. It’s also data that is vital to keep secure in order to protect your identity and assets. Read on to learn more about what types of information qualify as personally identifiable information and how to protect it from cybercriminals.

GigaOm Names Keeper Enterprise Password Manager The Overall Leader

Keeper Security’s Enterprise Password Management (EPM) solution has been recognized as the Overall Leader in password management by the analyst firm GigaOm in their 2023 Radar Report for Password Management. GigaOm has named Keeper as the overall leader for two years in a row. This designation comes on the heels of similar recognition by G2, CHIP and the Global Infosec Awards, among others.