fbpx
mobile header

Wishing to ditch your password manager?

LogMeOnce will credit you for any remaining time on your current bill. See the comparison table...

Latest Posts

Take a moment to consider how many passwords you have online. Sure, there are the primary three or four that you use every day, but how many sites have you created accounts on? Online shopping, accounts associated with work, apps required for package delivery, and more are all things that
Read More

4.88 billion people from around the world use the internet on a regular basis. This might be for work, online banking, shopping, or streaming entertainment services. Every single one of these activities involves logging into a private account and for this, you'll need a password!  Unfortunately, having a big online presence
Read More

Are you frustrated because you can't remember all of your passwords? It can be challenging to get things done on your digital devices when you constantly find yourself stuck and looking for another password.  Thankfully there are several things you can do that will help you to know how to remember passwords.
Read More

The internet is starting to look like the Wild West. In January 2021, a breach at Microsoft left more than 280 million customer records unprotected. Data breaches are costing millions of dollars to deal with, and they're growing more expensive as time passes.  Many people think that data breaches are the
Read More

Scheduled Login to Ensure Account Access Only During Working Hours

Cybersecurity has always been an important subject. Today, it is more important than ever as we constantly see news about some major internet theft or hacks where a lot of people lost their money or personal information. Furthermore, today we have more companies using computers during their everyday work. Not only that they work on their computers, but all of their bank accounts and business data are stored on computers which means that keeping them unprotected could pose a great liability. This is why businesses are looking to protecting their IT assets as best as possible to avoid unwanted setbacks or even the complete destruction of their operations. Today, we are going to talk about Scheduled Login security protocol which helps businesses keep track of who accesses important accounts and regulates who is allowed to do it. Allow account login only when you want to In modern business, people use various cloud-based software solutions, online tools, and websites where they have accounts and where they have to log in to use them. With scheduled login protection, you can keep all of your accounts in check and protect them from any unauthorized access. Simply put, scheduled login allows you to designate the period in which you can log into a certain account. All of the accounts can be scheduled differently, according to when you usually use them. This means that you can rest assured that nobody will be able to login to your account outside of the time period that you scheduled. You will no longer have to worry if someone accessed your account while you are away from work and when you are not using it. This kind of system protects people from accessing accounts even when they are using your computer or trying to get into your account from another device. Logging in outside of scheduled times Although it is generally a good idea to calculate your logins properly so that you always want to log in during the “green” period, it will sometimes be impossible. Sometimes, you will have to log in to your accounts at unpredicted times because something is urgent or you missed something while at work. Don’t be worried, as there are a lot of customization options that you can use so that this doesn’t present a problem. When you try to log in outside of your login schedule, you will be able to do it only if you are logging in from the same IP address as your last login, and with the same device. This way, there is no further verification required. However, if you are trying to do this with some other device, you will need further verification. This can include further questions that need to be answered and that you’ve previously set. You will also get an SMS message to your phone that you or someone else is trying to log in during the “red” period. Logins can be customized individually We use various websites while at work for different reasons. In most cases, we have organized timelines in which we use certain pages. Similarly to these timelines, you should also schedule account logins. When you enable a scheduled login in LogMeOnce, you will get an additional option where you can customize login and logout options. You can setup a scheduled time and if logins are allowed. It is also possible to add tolerance periods before and after your scheduled login time. These period are just in case your schedule varies from time to time so that you don’t get into the red zone yourself. You account can be customized to the exact minute and date when you want to be able to log in next time. Additional protection features When setting up your accounts on LogMeOnce, you can adjust websites separately and enable or disable your scheduled login features. All of these things allow you to create more layers of security and make it difficult for hackers to access your accounts. They don’t know your schedules and even if they know your passwords and account usernames, it will be very difficult for them to log in. If they try to do this, you will also be informed through your mobile device. This is a great security system that allows professionals to keep tabs on all of their accounts and designate their security system to their liking. If you are in need of this kind of security, going for the scheduled login is definitely right.

Read More »
Secure-Drive-An-Unbreakable-Cloud-Storage-Solution

Secure Drive: An Unbreakable Cloud Storage Solution

Cloud storage solutions are something that almost every person nowadays uses, whether they are business owners who need to keep a lot of files and sensitive business information in a secure place or individuals who simply want to save their documents and photos someplace where they won’t lose them. Whichever the reason for using cloud storage, you certainly want one that will keep your data safe and secure at all times, so that you don’t have to worry about it being lost, stolen or misused. One of the best cloud storage solutions currently available is the unbreakable LogMeOnce Secure Drive. What Is LogMeOnce Secure Drive? LogMeOnce Secure Drive is one of the two encrypted storage options provided by LogMeOnce, an online password manager with two-factor authentication (2FA) for adding an extra layer of security to your devices. The Secure Drive encrypts any kind of file, quite similar Google Drive, Dropbox, OneDrive and other cloud storage services. You can easily attach your files to Secure Notes and Apps in the Secure Drive and move them between your devices and the cloud, as well as create folders to organize everything you upload. You can store all kinds of files in the LogMeOnce Secure Drive, from your photos, images, and videos to documents. The moment you upload any kind of file, they will automatically be encrypted using AES (Advanced Encryption Standard) 256 encryption, including the names of your files and all the data. How does it actually work? First, you need to create an account with LogMeOnce, after which you can choose the desired storage and start using the drive. When you want to upload a file to the Secure Drive, you will be asked to provide your password and AES key, so the file will instantly be encrypted right there on your desktop browser. Then, the file is uploaded the encrypted file to the cloud. Whenever you want to access the cloud and view your data, as well as upload or download it, you can do so only with your own password and AES key. No one else has access to your AES key, so no one can access your encrypted data without your authorization. Are There Any Limitations to File Size and Storage? Every file you upload to the LogMeOnce Secure Drive can have the maximum size of 100 MB. When it comes to the Drive’s Secure Notes and Apps, you can upload 5 files to each. Concerning the amount of storage, LogMeOnce provides you with 1 MB of default file storage if you choose the Premium Free edition. If you choose the Professional edition, you get 5 MB of file storage, whereas you will receive 10 GB of file storage if you go for the Ultimate edition. If you want to, you can always purchase additional storage, which goes from 50 GB to 250 GB, or more. How Secure Is Your Data in LogMeOnce Secure Drive? If you choose LogMeOnce Secure Drive, you can be absolutely sure that all your data will always be safe and secure in the cloud. This is precisely because only you hold the encryption key, so one can access your files. Even LogMeOnce has no access to your encryption key and, hence, cannot view or use your data. What’s more, LogMeOnce password manager has multiple security features to further protect your account and data from unauthorized access. It protects your account and effectively secures authentication with the use of the following technologies: PasswordLess Login (PhotoLogin, Fingerprint, PIN) Mugshot Scheduled Login Account Freeze Password Shock How Much Does It Cost? As previously mentioned, you can use LogMeOnce Secure Drive for free if you choose the Premium Free edition, but you would get only 1 MB of file storage. If you want larger storage, there are several pricing options to choose from: Professional edition: 5 MB – $1/month Ultimate edition: 10 GB – $9.96/year 20 GB – $19.99/year 50 GB – $39.99/year Why Choose LogMeOnce Secure Drive?  The most obvious reason for choosing LogMeOnce Secure Drive is the fact that you can encrypt your data with your own password and your AES key. You don’t need to worry about someone else having access to your AES key, because no one but you knows it. As opposed to other cloud storage services, LogMeOnce Secure Drive automatically encrypts your files while you are uploading them to the cloud. Both the encryption and decryption processes are performed on-the-fly, right there on your device, so neither LogMeOnce nor anyone else can have any knowledge of your credentials. All that LogMeOnce does is handle your encrypted files, that is, stores them securely in the cloud. The company employs high-level security practices to protect your data, that is, it employs AES 256-bit key length and SSL endpoints using the HTTPS protocol for secure communication over a computer network.  How to Use LogMeOnce Secure Drive?  Once you log into your LogMeOnce Secure Drive account, you have two options: Upload files and create New Folder and upload files. In order to upload files, simply click on the Upload button and select files to drag and drop. The same goes for creating a new folder: click on the New Folder button and choose the files that you want to upload, also by dragging and dropping them into the folder. If you’re looking for an unbreakable cloud storage solution to keep your files and documents protected at all times, LogMeOnce Secure Drive is definitely your way to go, so check it out, choose your desired storage amount and finally have a peace of mind, knowing that only you can access your personal or business data.

Read More »
4-Ways-to-Use-Account-Freeze-to-Improve-Online-Safety

4 Ways to Use Account Freeze to Improve Online Safety

If you have never been a victim of a cyber attack, then you’re one of the lucky ones. As technology develops, the number of options for cybercriminals grows. Your data can be protected, but only if you take certain precautions. In the following article, you can read about problematic situations and common vulnerabilities. It’s imperative that you learn how to protect yourself. Act If You Notice Anything Suspicious Whenever you notice unusual problems on your mobile device/PC, you should be suspicious. The majority of us are quite careless and inconsiderate when it comes to our private data. We feel that we are safe with our easy-to-remember passwords and usernames. However, the fact that you’re this thrusting and naïve makes it only easier for intruders to snoop around and collect your data. Therefore, you should observe the functionality of your device/PC. If you notice that the sound is off but you can hear some unfamiliar noise, or if your screen is flickering oddly, someone else might be using your phone or tablet. If you notice unusual activity in your online activities or email. In these situations, you shouldn’t think that you’re paranoid – it’s better to be safe than sorry. So, freeze your accounts until you are completely sure that your online account is safe to use. Be Careful When Using Public Wifi Most people like the convenience of having free Wifi somewhere. However, there are many dangers you should be familiar with. First of all, there could be cybercriminals lurking; their activity has been growing with each year. These criminals get notified whenever a new connection is made. Your conversations, transactions, or browsing history might not be private when you’re using an internet connection that’s available to a wide audience. Secondly, your connection might not be encrypted. Encryption is there to allow safe, private browsing. When a licensed IT professional controls your internet connection – in your home or your office for example – you’re safe from anyone who would misuse your data. However, this is something you shouldn’t count on when using a public connection. If you ever noticed that your device is experiencing glitches after you have used a public Wi-Fi, chances are that you have problems with malware. A criminal can “infect” your device by attacking its vulnerable spots and thus weaken your device so that they can misuse it afterward. Finally, just because a Wifi’s name seems to be legit, it doesn’t mean that it really is. For example, if you’re in a park and you see an open connection that carries the name of that location, there’s a chance that it’s fake. Cybercriminals are clever enough to play with names to give you a false sense of safety. For all of these reasons, you should freeze your accounts when you want to connect to a public Wifi. Protect Your Data While Traveling Tourists are an easy target for experienced criminals both online or on the streets. Considering the fact that small devices are easy to steal, sell, and transport, you need to take certain precautions to protect your devices from being stolen. For starters, you should lock your phone with a password. In case your device gets stolen, that password can buy you some time. Furthermore, tourists are relaxed. Most of them don’t take the necessary precautions and it’s understandable why – you’re finally on your vacation and you want to unwind and have fun. Criminals can and will take advantage of this fact. In addition, you can never be fully confident in your internet connection. Like we discussed, criminals can develop rouge Wifi connections that look legit. To secure your accounts and so that you don’t have to think about these problems while on your holiday, you should freeze your accounts for the duration of the entire vacation. Select the Most Suitable Option You can choose among different types of freeze options and find the most suitable one for your situation. If you feel suspicious for any reason, you can simply freeze all your accounts indefinitely – until you decide to unfreeze them again. When you think that there’s an unwelcome party eavesdropping and going through your private information, this might be the best option for you. You have enough time to pay a visit to an IT professional and have them check your phone. You also have the “until Date & Time” freeze option, which is perfect for traveling. You should put in your return date, and your accounts will unfreeze when you get back to the safety of your home. Furthermore, you can freeze out all other devices except your own. You can do the same with your IP address and thus disable access to anyone who’s attempting to intrude your privacy.   With a simple action, such as freezing your accounts at the right moment, you can save yourself from a lot of trouble. Now that you’re familiar with situations that criminals are likely to misuse and ways to protect your information, you are finally in charge of your own safety.

Read More »
Password-Shock-A-Way-to-Get-Back-at-Nosy-Hackers

Introducing Password Shock: A Way to Get Back at Nosy Hackers

For a long time, common people were only able to try and defend themselves against cyber attacks. These attacks have become exponentially more ruthless over the past years. Just remember the WannaCry debacle and the chaos it wrecked across the online landscape. The team behind LogMeOnce, the easy-to-use password management software, has come up with a solution to help people give cybercriminals a taste of their own medicine. This feature is called Password SHOCK, and it packs some serious hacker repellant power. Let us bring this game-changing feature closer to you. Here are some Password Shock basics that you should know of.   What is Password Shock Password SHOCK is a brand new LogMeOnce feature and was developed with the latest cybersecurity threats in mind. In essence, password SHOCK enhances your defenses. The users who have it running will immediately receive a “Hack Alert” the moment someone tries to hijack their account. The alert comes regardless of the device the hacker is using to find out your password. At the same time, hackers are in for a treat as well. In fact, users of LogMeOnce have several options at their disposal. They can set up the Password SHOCK to do numerous things with the hackers mobile device. Imagine the face of the sneaky hackers when their phone starts vibrating, playing loud music, flashing morse code, shaking the image on the screen, or starts turning the LED flashlight on and off. Users can easily adjust for how long they wish the SHOCK treatment to last and the intruders won’t get it the first time they try to get the password on your LogMeOnce account or your mobile phone. First, they get a polite notification that you are aware of their ill intents and that they should stop what they are doing. If they don’t, the SHOCK treatment kicks in to deter them. Using Password SHOCK is Easy Password SHOCK is designed as an automated feature, which makes it really easy to use. What does this mean? Once you have enabled and set up Password SHOCK, you can lay back and relax knowing that your security is tight and that you don’t have to do anything else. In fact, this feature will send automated responses and automatically trigger actions on the hacker’s device. This is an easy and convenient way get the “I’m serious about my security and my password!” message out there. After the SHOCK treatment, there is no intruder that will continue to bother you any time soon, if not at ever again. In any case, Password SHOCK will get you one step closer to getting rid of nosy hackers for good. Another great thing to know about this feature is that it is easy to use and set up. You are basically just a few clicks away from getting top notch security for your online assets – online accounts and credit card information. Here is how you can test it and put it to use yourself.   Enabling Password SHOCK Regardless of whether you’ve already used the LogMeOnce password manager or not, using the Password SHOCK is straightforward. Once you are logged in to your LogMeOnce account, all you have to do is click on the Smart Menu, select the “Security” section and click on the Password Shock button. This action will bring up the intuitive Password SHOCK configuration screen. If you don’t have the time to mess with the configuration, you can use the default settings and Password SHOCK will take care of your security business for you. Want to see what awaits the hackers who decide to pick on you? Click on the “Test Drive” button, sit back, and enjoy. On the other hand, if you are tech-savvy with your online security software, you can fine-tune Password SHOCK to your own liking. To do this, you have to click on “Advanced Configurations”. This will bring up a detailed configuration panel. In this configuration panel you can set up restriction for unknown devices, restriction for known devices (this option is quite useful if your phone gets lost or stolen), and actions to be performed on the hacker’s device for each unauthorized login attempt.   Account Freeze – Password SHOCK Silent Partner When you access the Password SHOCK panel, you will see the Account Freeze button right next to the one that enables or disables Password SHOCK. The team behind LogMeOnce has decided to help the users by adding a bonus feature and put more control in their hands. Account Freeze is an excellent follow up for Password SHOCK. When users get alerts about suspicious activity on their account, they can trigger the Account Freeze to prevent anyone from getting access to their online assets. Users can specify how long the freeze will hold and which device has to be used to get the account unfrozen. While the Account Freeze is in place, all the login attempts and hacker’s metadata are still tracked and recorded. Password SHOCK is an amazingly powerful feature that extends the functionality of renowned password management software – LogMeOnce. While it provides an increased level of security, it remains an easy-to-use feature. And if we may add, a feature which is unique in this cyber warfare, because it allows users to fight back and make preemptive strikes against hackers.

Read More »
SecueNotes

Keeping Secure Notes without Any Worries

In today’s digital age, all of our most valuable and private information can easily be compromised. The majority of us, especially business people, are required to have many different online accounts and thus dozens of unique passwords which need to be remembered or written somewhere. It has become a well-known fact that our passwords can be cracked by hackers with little or no effort, who then gain access to our most private info. Moreover, carrying a notebook with you wherever you go with important stuff written in it might seem a bit annoying and complex, particularly when you need to write a note on the go, or skim through numerous pages to find what you need. Luckily, you no longer have to be bothered by endless sticky notes, carrying a notebook, or worrying if you have lost papers with some insightful business-related million-dollar ideas, to-do lists or financial details written on them, as there is a powerful tool known as secure notes that will help you take care of all that. So let us focus on what this tool can do for you, which features it offers and how it can make your life easier! What are secure notes? This is a tool which allows you to store all of your top-secret numbers or most important ideas related to your business and keep them safe from hackers. Secure notes enable users to store their important private information in the safest way possible. They are described as a personal digital notepad which is protected by a password and can be accessed only by you anywhere and anytime. A fully encrypted secure notes tool allows you to protect things listed in following categories: notes, personal journal entries, contacts, tasks and to-dos, credentials and reminders. You can also store and protect bank account numbers, passport numbers, Wi-Fi passwords, safe combinations, and any other numbers or info that might be of a high value to you. Your data and your private thoughts will remain only yours, as they are stored the way they are in your memory. Secure notes will serve you as the quickest way to prioritize, brainstorm, estimate and turn your visions into plans, which is extremely important if you are in a business environment. They have an ability to support almost any metadata or process that you can think of. Some of the features that you should look for in a tool before making your choice are: custom sorting of your notes, easy search, backups (such as Dropbox, Google Drive, SD card backup options), the ability to share notes via email or sms, password, pin or secret question options for security, easy usability, etc. Moreover, you should make sure that your tool offers you the option to backup and export your notes in different formats such as: Word documents, PDF, markdown or plaintext. When it comes to the appearance of your secure notes app, simplicity is always advised. Some apps tend to follow the “more is more” principle and offer menus, options and features that are way too complex. This is not such a good idea, as users want to find their notes effortlessly. That is why the focus should be put on a simple design and simple note-taking. How to create a strong password? Now that you have a more clear insight into what benefits secure notes can provide you with, it is important to come up with a good password to ensure maximum security of your data and we will give you some tips on how to achieve that. Most people are usually quite bad with creating strong passwords, as they usually decide on using some random words or phrases. Instead, you should aim at creating long and unconnected strings which are difficult to be guessed by both people and computers. First of all, it is advisable for your password to be quite long. There are hacking programs that can run through huge databases of the most common passwords or random character combinations. The solution for that is creating a long string of plain words. However, you should also include some numbers, capital letters or special characters, as the majority of hackers use “dictionary attacks” to figure out regular words. It is also important avoid using the exact same plain words which everyone else does or some personally meaningful phrases, words or lines. There are websites that can help you check if your password is long enough. Moreover, you should not reuse your password on different accounts. Your secure notes password should be completely unique and password manager websites can help you come up with the best idea and remember it for you. The best secure notes apps There are many options to choose from and almost all of them have some similar characteristics, however, it is important to be familiar with each and every tool to be able to decide what most suits your needs. LogMeOnce Secure Notes uses AES encryption and provides you with easy and quick access with the use of either a password or a secret question. In conclusion, if you are a person who needs to store some highly crucial data with the highest level of security, or simply have the need to avoid using numerous notebooks, sticky notes or papers, secure notes are just the thing for you!

Read More »
Remember-Password

4 Ways to Avoid Having to Remember Your Password

If you have several online accounts, then you know how hard it can be to remember all those passwords. Especially if you are using strong ones. Is there a solution? I know what you might be thinking; I’ve been there myself – create one very strong password and use it on all accounts. But wouldn’t it also mean that if one of your accounts gets compromised, all others will be too? There are much better ways to play the remember password game.   There are much more convenient ways to avoid remembering your passwords than this one. Your passwords are the last line of defense between cybercriminals and your data. They definitely deserve your attention. This is why we have put together a list of the best ways to store your passwords without ever having to remember with which account they go with. Let Your Browser Remember Passwords for You All of the most used browsers have a form filler and password manager built in. This includes Google Chrome, Mozilla Firefox, Opera, Microsoft Edge, and Safari. For instance, if you sign in to Google Chrome with your credentials, Chrome will by default start storing your passwords. The password manager functionality of other popular browsers is pretty much similar to this one.   If you have problems remembering your passwords for online accounts, this is the easiest thing you can do. Every time you enter your login name and password, the browser will ask you if you want it to remember the password for that website/account. The next time you try to access that account, you will be automatically logged in.   Is this practice to be trusted? You probably know that all Internet browsers send back some data to the manufacturers. It would be scandalous if it was discovered that they are “stealing” passwords of their users. In any case, there is no hard proof that they are doing it or not doing it. In the end, you have to decide whether you want to place your trust in their hands. Keep in mind that anyone with access to your computer will be able to see and access your accounts. Use a Password Manager A password manager is a software solution that you can use to keep your account names and passwords stored in a secure fashion. Password managers are cloud-based which means that your data will be stored on their servers. These servers are behind powerful firewalls and antivirus systems we mere mortals can only dream about.   In order to use a password manager, you will have to create an account and install a designated browser plugin. This plugin will extend your browser functionality and allow you to store your passwords on the go. The best solutions from this software category is LogMeOnce. While the purpose of this software is the same, they are not all the same. For instance, LogMeOnce offers access to an excessive number of features that can help you avoid to remember your password but also protect your phone, increase productivity, and use a selfie as two-factor authentication.   Password managers are quite handy because they can help you to store your credit card info so that you can purchase it online in a faster and more secure fashion.   How secure are they? Again, as with Internet browsers, you will have to make a decision because you will be placing your trust and data into someone else’s hands. So, make sure to do your research, because some of the password manager vendors have been hacked in the past. Create Your Documentation Another way to avoid having to remember your password is to create an Excel spreadsheet. While this practice may slow you down when you want to log in fast, you may find it more secure. The data will be on your hard drive or memory stick and the only thing you will have to worry about is getting your data damaged or lost due to unforeseen circumstances.   Why did I say Excel, when there are other options? I don’t want to force my opinion on you and suggest that you should buy the Microsoft Office suite. But if you already have it.   The downside to this practice is that it will significantly slow you down as you will have to look for your credentials on the go, and if you get your file lost or damaged, you can say goodbye to your passwords. So make sure to regularly update it and keep the backup on a memory stick. It is also not sure to save and manage your passwords using a ]spreadsheet. Buy a Simple Ledger In the end, you can go all out in CIA/KGB style and buy a simple ledger that you will always keep by your side. Writing down your account names and passwords is generally not a bad idea until it proves otherwise. Ledgers easily get misplaced and stolen. Keep in mind that security experts don’t recommend writing down your passwords. But if this practice is more attractive than the ones mentioned above, go for it; just make sure to spice it up with a few tricks.   These 4 ways will help you avoid having to remember passwords for any of your accounts. Some of them are safer than others. We only recommend using LogmeOnce Password Manager to protect, secure and manage your passwords easily. The other options are not secure.  

Read More »
Your-Security-Wish-List-for-2018

Your Security Wish List for 2018

New Years has come and gone. You have probably already made your New Years’ Resolutions by now. Maybe one of yours is to wake up earlier each morning, or lose weight, quit smoking, or give up chocolate. But what probably isn’t on your New Years’ Resolutions list is to improve your security. Security should always be taken seriously. Even if you are diligent about changing your passwords often and/or encrypting your files, the sad truth is this isn’t a perfect world and mistakes can happen. But what happens when those mistakes cost you everything? Check out this site to learn more about the security predictions for 2018. Well, 2018 is going to be the year you turn it all around. But where do you start? First, imagine your ideal, secure world. What would your best security practices look like? Here are the top features things that should be on your security wish list this year. 1. A password manager to secure and store ALL my passwords. Having a password manager can make your life so much easier…and secure. Import all your passwords into a password manager and automatically log in to all your favorite sites—saving you time, money, and increasing security. Learn more about the top password managers here. 2. Automatic password changer. Do you forget to change your password when it’s time? Or worse…do you remember to change your password then forget it the very next day? Use an automatic password changer to change your passwords—and manage and store them—all for you. A good password changer can save users an average of the 283 minutes that it takes to change 100 passwords! 3. Data detective. Hire your own data detective to watch your files, your system, and your devices and easily keep hackers away. Catch your hacker in the act by snapping their picture and obtaining their identification and IP address the minute they hack into your system. How? Visit here to learn more about MugShot technology. 4. Authentication that is actually authentic. Regardless of whether you are a consumer or enterprise, you can benefit from two-factor authentication (2FA). Let’s go back to security basics here for a second. Security measures and controls of the past only contained one level. Now, in an effort to boost security, there are now two levels. This improved level of security is known as two-factor authentication (2FA). This means that users will need two pieces of identification. Now, that’s security that is truly authentic. 5. Password dialer. Do you run out of passwords to use? Do you know what makes a password secure? The answer is NOT special characters, but randomness and length. A password dialer can create secure and unique passwords on the fly…putting maximum security in the palm of your hands. Literally. Get Thinking About Security in 2018… You don’t have to settle for low quality or inefficient but expensive security controls in 2018. If the above points are on your wish list, then your wishes have come true! These features are available now…and so much more! Read more about the top features of using a password manager here. Visit LogmeOnce today to learn more about security management basics, how to reduce your risk of a cyber attack or other security events, and even how we can help you to create a fun user experience while improving your security.

Read More »
LogMeOnce-Mugshot-The-Feature-that-Snaps-Photos-of-Phone-Thieves

LogMeOnce Mugshot: The Feature that Snaps Photos of Phone Thieves

In most countries in the world, the authorities are hopeless when it comes to phone theft. Whatever it is that you keep in your smart pocket bank – family photos or intellectual property or sensitive business data – there’s very little (if anything at all) that they can do to prevent unauthorized access. And, it’s not only you who trust your phone with invaluable life data. Statista reports that 2.1 billion of global population use smartphone devices, which means that criminal acts that endanger user privacy and aim towards identity theft don’t only concern you or me, but are also a matter of public security. LogMeOnce has a convenient solution. This is the story of Mugshot, a simple digital feature that does more than your police officer. How Mugshot Changes the Face of Data Security Let’s start from the beginning. The early days were all about pet name passwords. With the advent of social media, they became too easy to crack. Home addresses, anniversary dates, and dictionary words often used by unsavvy internet goers and logophiles are still the winning lottery tickets for hackers and identity thieves worldwide. Then, we were introduced to the world of two-factor authentication, fingerprint identification, and other extra layers of security. For those who knew how to properly use them, they worked well. For others, they were less effective. In order to prevent unauthorized access, we had to be really smart. In 2014, law enforcement agencies started using mobile face recognition to identify suspects in the field. As both a much-needed tech solution and an existing smartphone trend, facial recognition was finally adopted for public use. We can now unlock our devices and apps by snapping a selfie. This is where Mugshot enters the scene. LogMeOnce a dedicated data security company does a lot more. What it actually does falls under personal and enterprise password and identity management, but certainly goes beyond the realms of what’s available on the market. You might know it for its outstanding Password Management Suite. Mugshot is only an update on this comprehensive package, and as a separate feature stands side by side with a password manager with multiple login options and a passwordless photo login. Together, they can be managed via a centralized dashboard, on both desktops and mobile phones. Why Mugshot changes the face of data security as we know it? Well, because it combines different approaches for preventing unauthorized access, adding one security layer on top of another. The feature takes cues from traditional face recognition apps, but takes them to a whole different level. How Does LogMeOnce Mugshot Work, Exactly? LogMeOnce Mugshot is a clever mixture of image collection, internet monitoring software, login monitoring software, and a smartphone remote location tracker. It is “like an alarm system for your digital property,” explains Kevin Shahbazi, LogMeOnce CEO. “The technology creates a digital fence around your account to detract hackers from entering. For those hackers willing to hop the “fence,” an alarm is set off and action is taken so users can have a clear understanding of who is hacking them and where the threats are coming from.” In practice, it works like this: Your phone gets stolen or someone has unauthorized access to it. The thief manages to unlock the phone, and tries to access LogMeOnce app. The thief finds out that the app is locked, and starts snooping around for passwords. Your LogMeOnce account is the next thing on the thief’s list. As they try to access it without a master password, the account registers failed login attempts and, in the thief tries to access your account on Windows/Mac/Linux, asks the thief to install the browser extension or mobile app. The thief downloads the software, thus granting it to use their webcam and record their GPS data. They make another wrong password attempt, and Mugshot immediately takes their photo, video, audio, GPS location, IP address, date and time stamp and much more. The feature then sends this digital fingerprint of the intruder to you and accessible in your account. Is Mugshot Effective? In terms of data security, this seems like a brilliant solution. But, does it really work? Is Mugshot effective enough to prevent unauthorized access? Mugshot is, in fact, effective. This feature actually notifies the intruder that software may take a photo of them after it’s downloaded and installed as an extension or a mobile app. It gives a warning to the intruder to stay away from users account and hence discourages the intruder to attach user account. In an already cited interview for Digital Trends, Kevin Shahbazi was asked the same question. “We are notifying users that this is not an easy target” he responded. “So, if you want to hack, then you need to put on a ski mask, sunglasses, and figure out how to mask your IP address and GEO data. With such deterrence, the majority of hackers are filtered out and move on to another user who is not protected by LogMeOnce”. This is true. If an intruder wants to access the protected content within your phone, and has been performing similar data theft activities for a while, they’ll probably be experienced and shrewd enough to know that this is simply too much of a hurdle. A smart criminal would have to ask – why go into all that trouble when there’s always an easier, less risky target? Meanwhile, those with less deductive power are falling into Mugshot’s trap every day. As an example of how effective this feature is, LogMeOnce has published a Philippines-based case study, along with a redacted copy of the report sent to the (almost) victimized user. The intruder’s photo is there, and so is their IP address and precise GPS location. Mugshot truly is the best solution for preventing unauthorized access. If you are not sure or have not tried it, Go ahead and sign up for a Free account or enable your Mugshot feature. I certainly did, and for that, I’m no longer lulled

Read More »
Keep-password-Safe

10 Things to Do in Order to Keep Your Password Safe Even If Your Phone Is Stolen

10 Things to Do in Order to Keep Your Password Safe Even If Your Phone Is Stolen Yes, You need to Keep your Password Safe! From sensitive business documents and credit card PINs to personal diaries and photographs, we tend to have our entire life data stored on our smartphones. In order to keep it safe, we use firewalls and two-factor authentications, encryption and backups. But however sophisticated they are, all the internet protection methods in the world couldn’t prevent the terrible consequences of physical theft. Luckily, the following 10 things can. Here’s how to keep passwords safe even if your phone gets stolen. 1. It All Starts with Choosing the Strongest Password Strong, complex passwords are the best defense mechanism against online data theft, but they also keep the contents of your phone safe and secured in case your device gets lost or stolen. The importance of choosing the unbreachable one can’t be overstressed, and should never be overlooked. Of course, this applies to both your cell phone password, and those you use for protecting individual apps. Not only do they make it nearly impossible for cybercriminals to hack into your device, but they also make it harder for offline thieves to access the sensitive information stored on your phone. ● Creating Uncrackable Passwords When creating unbreachable passwords, the general rule of thumb is to avoid words, phrases, and numbers that can be easily found on your social media accounts. Birthdays and pet names, street addresses and anniversary dates, social security numbers and phone digits are all pretty weak choices. To keep passwords secure, choose a phrase that has a meaning only to you. Use as many characters as you can – the stronger passwords are 15-30 characters long – and make them a combo of symbols, numbers and uppercase and lowercase letters. Instead of passwords, think of them as passphrases. The beauty of it is that you don’t have to remember any of them. You can let your password manager do that job for you. If you cannot decide for yourself, there’s a myriad of tools that can help you. For complex passwords, consider using an online password generator. LogMeOnce password manager has builtin password calculators that estimate the approximate time hackers and thieves need to crack the password. 2. Never Use the Same Password More than Once We’re all guilty of it, especially when we don’t use password managers, but have dozens of passwords for dozens of different accounts. Instead of memorizing them all, we then decide to use the same one for multiple log-ins. Password duplication makes your information very vulnerable, so stop doing it. 3. Don’t Write Your Passwords Down To keep password safe, regardless of how long, strong and complex it is, never write it down. Storing passwords in Excel is just as risky and dangerous. Password managers are simply the safest way to store passwords – with them, you need to memorize a single master password and with LogMeOnce you can go PasswordLess, and that’s pretty easy. 4. Put Your Trust in Password Managers All the best ones are incredibly convenient and easy to use, not to mention that a password manager of any kind is a more reliable solution than keeping your passwords written on paper or saved in Excel. While some of them you can use for free, others require a fee that still won’t break your bank. A handful of these trustworthy tools go beyond providing the best way to store passwords offline and online alike. LogMeOnce is the most feature-rich product on the market, as it offers an abundance of choices for device management, double-factor authentications, and even selfie log-ins. 5. Use LogMeOnce’s Mugshot Still, one interesting feature deserves to be mentioned separately. Mugshot, is nothing less than a perfect little aid in cases of phone theft. As a thief tries to access the device, the app connects to both front and rear camera and snaps photos of the wrongdoer, sending them to your LogMeOnce online dashboard along with the IP address and the device’s GPS location. Handy, right? 6. Keep Your Phone Locked This one should go without saying, but we’ll point it out just in case. As soon as you get a new device, be that a smartphone or a tablet, set up a hard-to-crack password and enable device lock (turn screen off) at all times. If this is for some reason inconvenient for you, adjust the phone’s settings to automatically lock the device after a period of inactivity. 7. If Your Phone Supports Touch ID, Enable It Apple devices are no longer the only ones that offer a technologically advanced fingerprint security. Make sure to check whether or not your phone has it too, and to enable it if it does. There’s plenty of ways to save passwords securely, but when it comes to thefts, nothing beats touch ID. 8. Learn How to Track Your Phone in Advance You can acquire a separate device tracker! Only LogMeOnce password manager includes this powerful feature. 9. Enable Device-Wiping Device-wiping is closely connected to remote tracking, and some smartphone manufacturers offer them. LogMeOnce has it too, which can’t be said about any other password managers. It’s a simple but powerful feature, allowing you to erase data from the phone if it winds up in the wrong hands. 10. Acquire Wireless Proximity Alarm System Taken together, all of the aforementioned features will be just enough to keep your passwords safe in the unfortunate case of theft. In an ideal scenario, however, the thief wouldn’t be able to steal your phone in the first place. If something can help you protect it, it’s the wireless proximity alarm system. This alarm is both a gadget and an app, and is one way to keep your device, passwords, and data safe from stealing. The moment your phone gets even a step further than the pre-set distance limit from the alarm gadget – typically held on a key ring – the app will let

Read More »
How-to-Use-PasswordLess-Login-4

5 Common Browser Security Habits That Can Expose You to Threats

Ever since the Safer Internet Day back in 2004, Internet security experts have been advising people on how to improve their online and browser security and how to adopt safe surfing habits. The primary intention of this “event” was to raise awareness on online threats and to help people understand that building the Internet safer is everyone’s responsibility. People find surfing the web a source of fun and enjoyment. At the same time, they don’t pay that much attention to their online security and the risks they are exposing themselves to. On the other hand, threats are very real, and you should definitely do something about them. This is why we give you 5 common browsing habits that can expose you to security threats. Avoid them, and enjoy safer and more convenient Internet browsing. Using the Same Password An average digital consumer had 3 accounts back in 2012. Today, this figure has risen to a staggering 7. This means that an average Internet user has to use and remember 7 passwords. It has become too hard to remember passwords for dozens of websites that require registration. No wonder that the most popular passwords are “123456” and “qwerty”. Nobody says that you should remember all of your passwords by heart. This is why password manager software was developed. You should definitely abandon your poor password habits and give the password manager a try. You will only need to remember a single password while the login process on your online accounts will become automated. Not Paying Attention to Browser Updates The companies that developed the Internet browsers are very well aware of the latest security threats. This is why they quite often release updates to patch the security holes and protect the privacy and improve security of their users. Sadly, people regularly disregard update push notification thus severely compromising browser security. If you are using Google Chrome, then you don’t have to worry as it company handles the updates automatically in the background. For the rest of you, make sure to update your browser whenever the update notification pops up. The updates will take care of security vulnerabilities but also improve user experience by patching memory leaks and tuning up performance bottlenecks. Fortunately, LogMeOnce automatically checks for browser updates every time you log in, and if needed, it will ask you to update before you can proceed. This also applies to the plugins you are using. The plugins may also pose a threat to your security so make sure to regularly check the plugin management page in your browser and to regularly update them. The latest versions are always the most secure to use. Disregarding the Scripts This may come as a surprise for you but a majority of websites that you use on a daily basis run their code on your computer. This code is JavaScript and web developers commonly use it to improve your browsing experience. But you should also know that JavaScript is very powerful and some people use it to write malicious code that can compromise your privacy as well as security. The first ones in the line of shared responsibility are web developers who have to do everything in their power to keep their website clean and secure for browsing. On the other hand, you should keep your browser updated and perform regular scans for malware. In addition, you can install browser plugins that will enable you to turn the JavaScript on the website you visit on and off. Accepting “Cookies” Like They are the Actual Ones Since websites that use cookies are instructed by law to inform their users that they are using cookies, chances are that you’ve already heard about them. But do you know what they are? And why are they regulated by law in many countries? Cookies are files issued by a website and they reside on your computer. They are used to store numerous information ranging from your browser type and online habits to your account info and location. You should not fall into despair because cookies cannot hack the data you have on your drive. They can only store the data that is inside your browser. If you want to work on your cookie privacy policy, you will have to decide which website you trust enough to allow it to issue cookies to your device. Since meddling with user information in any way goes under the privacy issue, all website have to inform users that they are using cookies. In addition, they have to put their Privacy Policy online so that you can read it and decide whether you want their cookies or not. If you would like a more private browsing experience, you can always start using one of the most secure browsers. Clicking on the Suspicious Links Links make our lives much easier and people with malicious intent play this card rather often. Clicking on a suspicious links can get you in real trouble and severely compromise your browser security. It can get you on websites filled with malware code or make you exposed to ransomware that encrypts all of your data. The rule of the thumb is not to open any links that you receive unless you have specifically asked for them. This especially applies to links that you receive via email. Hackers quite often use emails to send phishing links to people in order to hijack their online accounts. If you see any important notifications in your Inbox that contain a link, it is better not to click on it but to directly go to the website you have registered the account on and to check what’s going on. Malicious and suspicious links may also be hidden in the flashy, attractive and sometimes provocative banners. Such as those “You’ve won $1,000,000. Click Here to Claim your Reward!” or “We’ve Detected Virus on Your Device. Click Here to Clean It!”. You can catch our drift. Make sure you don’t fall for this oldest trick in the book.

Read More »

Search

Category

Protect your passwords, for FREE

How convenient can passwords be? Download LogMeOnce Password Manager for FREE now and be more secure than ever.

Copyright © 2011-2024 LogMeOnce. All rights reserved.