Latest Posts

Password fatigue is a phenomenon that can lead to some pretty costly decisions. We're about to get into the particulars of what it is, why it matters, and how to avoid it. Before we do, however, it's important to understand how big of a problem it is. About two-thirds of the
Read More

Password. Qwerty. 123456. What do these three phrases share? They're the top hacked passwords of 2020 in the United States. These passwords are popular because they're quick to type and easy to remember. Who doesn't want easy passwords to remember? With so many services requiring password-protected accounts, it feels impossible to remember them
Read More

 Did you know that billions of personal records are stolen all across the world every year? This number may seem absurd to you, but it's very accurate. This is why keeping your passwords secure is very important! But passwords can be hard to manage, especially if you have multiple accounts with
Read More

  If you’re on a website and creating an account for something so you can come back later, or check out with an order, have you ever seen the options for “Sign In With Facebook” or “Sign In With Google” as an option? Instead of typing out your email address and
Read More

Secure cloud data tips: Protect your information with effective online storage strategies.

How to Protect Your Information While Using the Cloud

Are you an individual or business wondering whether a password is enough to protect your sensitive information? Perhaps you use a free storage solution like Google Drive or pay for premium space on a service like Dropbox. Have you considered how secure your data is while using the cloud? A recent Facebook data leak was just reported, highlighting the vulnerability of personal information on the internet. Although 500 million users’ data was posted online, it doesn’t appear that they were notified of the breach. If you want to safeguard your accounts and files, then you need to take control. We’re going to show you what actions to take to secure maximum protection in the cloud. We’ll talk about backups, updates, encryption, and password protection. Read on! Good Housekeeping Cloud storage eliminates the need for large internal hard disks. You also benefit from not having to carry around bulky external backup drives. Backing up in the cloud is an excellent idea because if a fire destroyed your computer, your data would still be safe. What would happen if a fire destroyed a cloud server that housed your data though? You shouldn’t rely on a cloud service alone to protect you from a natural disaster or data hack. Many tech experts recommend maintaining three copies of your data in case your backup copy fails too. A perfect scenario is to use local storage, offline storage (at a different location), and also a cloud clone. Remember that you may also find yourself in situations where you don’t have internet or cell coverage. This is a good reason to not rely solely on the cloud for accessing your files. Ensure that your operating system and software all have the latest security patches installed. Try to use the most current versions and updates too, and be wary of any programs that are no longer supported. This is because legacy software often has vulnerabilities that remain unfixed. If your operating system is not using a good built-in firewall with anti-virus and spyware protection, look to a trusted third-party solution. Also, remember to shut down your computer or log out when you aren’t using it, and don’t sign into accounts using a public computer or network. Use Encryption You should try to avoid putting your most private data in the cloud, whenever possible. This is one of the best ways to mitigate your risk. Think twice before putting sensitive information in online storage, especially if you don’t use it very often. In situations where you must use cloud storage for private data, such as with cloud backups, you should use encryption. When you encrypt your data, even if cybercriminals can intercept it, they aren’t able to read it. This also prevents unauthorized eyes from viewing it, such as service providers and administrators. It’s also much more secure to encrypt data during the upload and download process. Look for a cloud service that provides this extra peace of mind. You can even encrypt the data yourself first, in addition to benefitting from cloud encryption. Multiple encryption levels mean that data has been encrypted once, and then encrypted again further times. The algorithm used can be the same or different. When using two different encryption vendors, both would need to fail for your data to be compromised. This adds extra layers of security, which is always beneficial. Password Protection The strength of your password matters and that goes for all of them. The more sensitive the information in your account, the stronger your password should be. Simple passwords are at fault in a large proportion of hacks, so have yours be between 8 and 15 characters (more is better). Don’t use any personal information within the password. This could allow it to be cracked more easily. Mix up numbers with letters, upper with lower case, and use special characters. Have a separate password for each login and change them routinely. Use two-factor authentication (2FA) everywhere it’s supported. Even if your password is cracked, hackers won’t be able to access your files. This is because 2FA allows you to get an authorization code sent to your phone. When you tie your cloud account to a physical device, cyber criminals can’t get in it. For added security, ensure that you have a backup phone or device registered for 2FA. You need this in place in case of an emergency, where you can’t access your phone for some reason. Use a Password Manager The ease of use and flexibility of accessing data via the internet does introduce risks. You must take precautions to ensure that your information stays private and secure. Are you someone who easily forgets passwords? Perhaps you don’t want to have to deal with the endless cycle of updating them on every account? With password management software, you can take the headache out of staying secure in the cloud. We offer personal or family solutions, as well as business, government, and MSP options. Our team password manager (or password vault) can even protect a 50 person business. If you need multi-factor authentication (MFA) and more security features, we have enterprise password management. This is our best password manager when you need to give contactors and partners access with a single sign-on. Identity theft protection is included, as well as our cloud encryption. What’s more, a secure password manager can even add 2FA to accounts that don’t have this functionality! One of the great benefits of our online password manager is that you can choose how you authenticate. We provide photo login, facial ID, fingerprinting, and PIN code- the choice is yours. Using the Cloud We’ve shown that using the cloud is safe as long as you take the necessary precautions. Don’t risk the dangers of a hack daily with weak passwords! Whether you’re an individual, family, or business, we can help. We are a password-less smart identity management solution with millions of trusted users and organizations. We provide secure single sign-on with user-friendly access to all your accounts and applications. Sign up today for free with your email address.

Read More »
Illustration emphasizing password protection with a lock icon and a businessman standing nearby.

The Importance of Keeping Your Passwords Protected

More of our personal data than ever before is now online. This means it is at risk of being stolen or discovered by cyberattacks, leaving us in danger of blackmail, robbery, or identity fraud. Having a secure password is one of the best ways that we can counter these threats, so we must keep our passwords protected in the safest way possible. Let’s take a look at some of the ways our passwords might be at risk and how using software, such as a password vault, can help make us safer online. Password Security Threats A compromised password will allow criminals to access your personal accounts. Strong passwords are essential to keep you safe from most online attacks. In the past, it was simpler to create a strong password that was also memorable and would keep the attackers at bay. Simple tricks like changing a letter for a number to keep the word readable would be enough. However, these days the hackers have become smarter, and this is no longer sufficient to keep your data safe. Let’s look at the average hacker’s toolbox and see how they can access your passwords. Brute Force Attacks These types of attacks have been around for a long time. Hackers use programs to run through every combination of letters and numbers on a system until they find the right password. It works really well on short, uncomplicated passwords. For example, criminals can crack in a password without a unique character in under two minutes. Longer passwords will delay the process, but the password’s complexity will prevent brute force attacks from being possible. Phishing Scammers who use phishing may use various approaches to try and get you to reveal your data. They can approach you by email, text, or phone. It is a common approach on social media where a scammer will pretend to have a personal connection with you. They often pretend to be somebody you will believe would require your data, like a service you may use or an organization you use. They may even pretend to be someone you know. Social Media People reveal a lot about themselves online. Your social media profile probably contains your birth date and even the birthdays of the people closest to you. These are popular (if deeply insecure) passwords, and it only takes a little bit of browsing on your account to crack them. Data Breaches Hackers target big institutions all the time in an attempt to steal their passwords and user information. Once they have infiltrated a smaller, less well-defended organization, they then have email addresses and passwords for thousands of accounts. Rather than remembering numerous passwords, people reuse their account information across multiple accounts. This means that the hacker now has your password for many other services and can access them as well, without your knowledge. Poor Password Management There are many ways you can make it easier for criminals to discover your data. Many of us have bad habits when it comes to keeping our personal data secure. You need to follow some golden rules if you want to keep your personal information as safe as possible from cyber threats. Using the same password for every account is an absolute no-no. Once one copy of your password becomes insecure, then all of your passwords are. You need to have strong, unique passwords for every single account you have. Don’t save your passwords on your phone,  paper, or even in your browser password manager. All of these places are deeply insecure and can be uncovered by the simplest of hacks. Using a secure password manager is the only way to be sure that your password is secured online. It will remember all of your passwords for you and ensure that they are never revealed to anyone when you access your favorite sites. The Importance of Strong Passwords A strong password is essential these days. As mentioned above, hackers can break through most simple passwords with a brute force attack. Changing one letter for one unique character is no longer enough.  The trouble is that remembering strong passwords can be difficult. They are often a nonsensical long combination of numbers, letters, and symbols. Using a tool like a password vault will help with this. These powerful security tools will recall all your passwords for you when you access them. You can have longer, complicated, and less risky passwords and not have to worry about remembering all the characters. Using Two-Factor Authentication Take your security to the next level with two-factor authentication (2FA). If a site offers the opportunity to use 2FA, then you should take it. It adds a step where after entering your password, you will need to enter a code sent either by text or email to your personal devices. This will prevent hackers from simply brute force attacking your accounts with any stolen passwords. The 2FA check will prevent them from accessing the account even if the password has been compromised. Even better is that as the true account holder, you will receive notification that someone is trying to access your account. For this reason, 2FA is essential for online security these days. Enterprise Password Management What about when you are not the only person who needs to access a shared space online? There may be numerous situations where you and a colleague or a third-party contractor need to access a shared server or website. First of all, you should never share passwords between multiple parties. Particularly off-site employees or contractors. It may appear easier to provide account details, but this is deeply insecure and could put your company at risk. Instead, you should use a password manager for the business. Good password management software should provide tools for enterprise password management. You need a team password manager that will allow secure access to the tool but not directly to the passwords themselves. This way, anyone working remotely or as part of a large team could access the services they need without even seeing

Read More »
Illustration of two-factor authentication (2FA) for enhancing account security with a smartphone and user typing on laptop.

How Two Factor Authentication (2FA) Can Keep Your Accounts Safe

Did you know that the biggest data breach in history was the 2014 breach of Yahoo accounts? It is believed that the hackers gained access to the names, phone numbers, password challenge questions and answers, and even recovery email accounts of three billion users. The good news is that account security has improved significantly since then. The trouble is that many of us don’t make use of the extra layers of protection and still just use a simple password to log into all our accounts. At the very least, we should be using two factor authentication 2FA to make our accounts far safer. If you’re not sure what 2FA is or how it works then read on to learn more. What Is Two-Factor Authentication (2FA)? When you sign in to an account using just a password, you’re only using a single method to prove that it’s really you trying to sign in, and not a hacker. The trouble with this method is that if someone gets hold of your password, it’s all too easy for them to sign in to your account. If your password has been exposed in a data breach and you use that same password for multiple accounts, then all of your accounts could be at risk. Two-factor authentication requires that you provide two methods of authentication before you can sign in to your account. That means that if someone doesn’t have the second method of authentication, they can’t access your account, even if they have your password.  How Does It Work? By requiring at least two different methods of authentication, the chance of someone else being able to sign in to your accounts is reduced significantly. For example, if someone has your password, but doesn’t have your phone to generate a login code on an authentication app, then they won’t be able to sign in to your account. There are three main types of authentication that can be used. Knowledge Knowledge-based authentication uses information that (hopefully!) is known only to you. This could be a password, a PIN number, the answers to security questions, a specific swipe pattern on your phone, or other methods. As we have already seen, using these knowledge methods alone is only secure when no one else has the same knowledge. If your password is hacked and posted online, (as is often the case with data breaches) then that private knowledge becomes common knowledge. Possession Possession-based authentication requires you to have possession of a specific item. The most common forms of possession-based authentication make use of the fact that we usually have our phones with us most of the time. By sending a code to a phone, or using a two-factor authentication app that is linked to your specific phone, it means that only the person in possession of your phone would be able to sign in to your account.  There are other forms of possession-based authentication aside from phones, such as ID cards or standalone login code generators. Biometric The third form of authentication is biometric-based authentication. This makes use of the unique features of your own person, which are hard to duplicate or hack. Many of us are accustomed to using biometric-based authentication; you may log in to your mobile phone by using your fingerprint, or your face. There are plenty of other methods of biometric authentication; you can use voice recognition or iris-scanning technology for example. Where Should I Use 2FA? As you can see, by requiring multiple forms of authentication in order to access your accounts, two-factor authentication makes your accounts more secure.  Now that you know how it works, you may be wondering where you should be using it. Well, the short answer is: everywhere possible! The following are the best places to start. Password Managers Probably the first thing you should protect with 2FA is your online password manager. A password manager allows you to save complex passwords for all your accounts with no need for you to remember them all. Since this allows you to use passwords that are much harder to guess or crack, your accounts are already much safer. This is something we would always recommend for businesses; you can look into using a team password manager for enterprise password management. By setting up 2FA for your password manager, your passwords will be even more secure. Email Accounts Email accounts are very popular amongst hackers. Once you hack an account, you can scrape it for useful information to access bank accounts, and even use the account for sending out spam. Most good email accounts will allow you to set up 2FA on your account. Banking Your banking app should offer 2FA but not all of them oblige you to set it up. If you don’t have 2FA on your banking apps, set it up as soon as possible; a password is nowhere near enough protection for your bank account. Shopping Online shopping has been one of the big success stories of the pandemic. The problem is that these accounts usually store your card details for later use. That means if someone can access your Amazon account, for example, they can steal your card details.  Set up 2FA to keep these accounts safe. Social Media Social media accounts are another favorite of hackers. Even Donald Trump’s official Twitter account was hacked, but this may be because he was using the incredibly easy-to-guess password “maga2020!” If the former president had set up 2FA for his Twitter account, the embarrassing hack might not have happened. Say Hello to Passwordless Login Are you looking for a simple way to manage two-factor authentication (2FA) without having to create or remember passwords? If so, we’re here to help. LogMeOnce Password Manager allows you to use award-winning passwordless authentication that has automatic two-factor authentication built-in. LogMeOnce includes multiple passwordless options, including PhotoLogin, Face ID, fingerprint access, and pin codes, as well as password access. LogMeOnce offers single-sign-in to all of your apps and accounts, so you don’t have to worry about trying to remember which

Read More »
Discover 7 benefits of password management software for enhanced security and convenience. Learn more now!

7 Benefits of Using Password Management Software

Many people use passwords that are incredibly easy to break. According to recent statistics, the most common password in the USA is “123456” with “password” also making an appearance.  If you’re using these passwords in either a personal or business capacity, it causes a massive security risk. The solution is a password management software.  To some users, the idea of using a password manager is a little foreign. How do they work, and what advantages do they offer over simply creating your own passwords?  In this guide, we’ll look at some of the impressive benefits that come from using a secure password manager, and why you need to use one. Are you ready to learn more? Then read on! 1. Password Management Software Generates Strong Passwords In contrast to the most easily hacked passwords that we’ve detailed above, a secure password manager can generate very strong passwords in an instant. You can specify the parameters that you want the password to meet, such as length and special characters, and the manager will make an exceptionally strong password for you. Remembering these passwords would be impossible, as they resemble a string of letters, numbers, and special characters. This is where an online password manager comes into work: you don’t need to remember any of them. All you need is one master password. 2. Individual Vaults for Employees All the passwords that your team password manager makes are stored in a secure and encrypted vault. However, no one needs to have access to other people’s passwords, as this opens up a world of other security risks.  The answer is that each employee has separate vaults, as you’ll find on our team password manager software. This also means that the employee can log in to their vault from anywhere to access their passwords. 3. A Variety of Log In Methods What happens if you forget your master password? With our password vault, that’s not an issue. Our PasswordLess authentication features built-in two-factor authentication (2FA), which makes incredible security easy. Employees can access their vaults via password, a PIN, biometrics, and even a selfie. The latter option works by sending the picture to a device that has already been enrolled with LogMeOnce, which can then approve or deny the login request. 4. Easy to Maintain Best Practices Best password practices can be tricky to maintain without a password manager. However, on our team and enterprise password management software, the admin can set certain parameters for everyone’s passwords.  Not only does this ensure that everyone is using strong passwords, but it’s also easy for the admin to delete user profiles as and when necessary. Insider attacks are a big problem for IT security. A disaffected or angry former employee that still has access to your network is a ticking timebomb. When someone leaves the company, your admin can unenroll their devices and delete their profile, which stops them from accessing your network. There’s nothing else that they need to do, and the former employee will be removed from the network forever. 5. Faster Access for Enrolled Employees Many cumulative hours are wasted when employees ponder which one of their passwords they used for this specific app or service. With a password manager, this is removed. Instead of having to remember a password, employees can take a selfie and login in seconds. This means that there are fewer delays in the login process, which means that your employees can get started with their work much faster. Faster log-in means increased productivity for your business in the long run. 6. Easy to Manage Shared Accounts Shared accounts are a security minefield. Let’s say that you need to manage a brand’s social media output: should everyone on your social media team be given the client’s password? The answer is no, as this represents a substantial security risk and infringes upon your client’s privacy. With a password manager, only one person needs to have access to the shared account’s password. Once this is logged, the admin can grant other users access to the social media account without sharing the password.  With this technology, the other users can do their jobs without needing the client’s password, which means that your clients can rest easy, knowing that their passwords are not being shared unnecessarily. 7. Easy to Encrypt Data If you’re using the best password manager or one of the best, then you should know that password managers usually have the capacity to store other types of data too. Passwords are the obvious example, but what about if you need to store payment details? Encryption is necessary, so why not store them in your password vault? Biometrics are another great example of data that can be stored in a password manager’s encrypted vault. In this day and age, encryption is a must. It ensures that you keep your data secure and private, but you shouldn’t have to pay extra for encrpytion software. With a fantastic password manager for business, you’ll no longer have to. Password Management Software Is a Must for Business and Personal Users Password management software is no longer optional: in today’s world, you need a way to come up with highly secure passwords, yet you also need to be able to access them in a flash.  For the best security, the only solution is a password manager. Whether you’re a personal or a business user, our product is for you. If you’d like to learn more about LogMeOnce’s features, take a look around our site. If you have any questions, don’t hesitate to get in touch with us.

Read More »
Illustration of a person contemplating data breach recovery steps with SOS: What to Do After a Data Breach text.

SOS: What to Do After a Data Breach

This year, it’s expected that global cybercrime will inflict at least $6 trillion in United States dollars in damage. About 70% of consumers believe businesses aren’t doing enough to protect their personal information, and with good reason. Even the most protected business could still have a data breach risk, though. If your company suffers a data leak, it’s essential to have a plan in place. Having encryption and an incident response team could reduce the cost of your breach by over $700,000.  Your data breach response plan can make or break the sustainability of your business after a breach. Do you want to learn more about what to do after a data leak?  Keep reading to learn what to do after a data breach. Determine What Was Stolen How sensitive was the information exposed in the leak? Information like street addresses and full names are the least sensitive. Nosy neighbors or coworkers can easily find out those pieces of information by a simple search online. Things like dates of birth, email addresses, and payment card numbers are more sensitive. Credit cards, debit cards, and other charge cards are harder to leak and more costly if stolen. While a stolen email or address quickly results in spam, stole card numbers likely leads to fraudulent charges on those cards.  While you might think a date of birth is useless, when it’s combined with other information like a name, it can be used to falsely verify an identity. Social security numbers, passport numbers, and financial account numbers are considered highly sensitive information. If a hacker gets hold of your name and your social security number, it won’t be difficult for them to pose as you.  As soon as you determine precisely what was stolen, you can hopefully lessen and stop any more damage from being done to both you and your customers. Put Out a Fraud Alert You can warn your lenders that you’ve been a fraud victim by initiating an alert. Ask one of the 3 major credit bureaus (Equifax, TransUnion, or Experian) to add a fraud alert to your business’ credit report. Ask your customers to do the same. Doing this will warn lenders that you might be a victim of fraud. Whichever bureau you notify will contact the other 2, and they’ll add alerts to their reports as well. The fraud alert will stay on your report for 90 days, but you can always opt to renew the alert when it expires. Make sure all stolen payment-card numbers are accounted for. Contact the organizations and banks that issued the cards immediately so that they can cancel those cards, reverse any unwarranted charges, and issue new cards. The sooner you call, the better. Hackers typically attempt as many purchases as possible once card numbers have been stolen. Secure Your Operations After a data breach, you must act fast to fix vulnerabilities that led to the data breach. You can start by quickly assembling or hiring a team of experts so that they can perform a comprehensive breach response.  Depending on the size and type of your business, your team might include: Legal Information security Operations Human resources Forensics Information technology Communications Management Investor relations Talk to your legal counsel, too, as they can advise on both state and federal laws potentially implicated by a breach. If there’s a risk for more data loss, take all your equipment offline, but don’t turn off any of your machines until your team conducts a thorough search.  Change Passwords and Credentials If hackers used someone’s credentials to create a breach or cracked an employee’s password, they can continue to steal valuable information until those passwords and credentials are changed. A password management software can help keep your business safe both before and after a breach.  Most hacking-related breaches occur via lost, stolen, or weak passwords. Encourage and enable your employees to change their poor password security and behaviors. Doing so will severely limit your vulnerabilities and strengthen your company’s sensitive data. A secure password manager helps to keep track of passwords across an organization in a safe and efficient manner. It allows employees and other users to create complex, unique passwords for each and every account. The way a password manager works is by keeping user information safe behind a master password. This password, created by the user, shouldn’t be shared or stored anywhere. Other components of a secure password manager are: Ability to securely share passwords Provides secure log-ins to every website Ability to securely auto-fill personal information Instant security alerts if and when a site suffers a breach Cross-device syncing Faster access to data Encourages strong password behavior Stay Alert and Notify After a data breach, you must notify the appropriate parties. You must notify other affected businesses, any affected individuals, and law enforcement. Ask your legal team what your legal requirements are, and make sure to stay compliant. If the breach involved electronic health information, for example, you must notify the FTC. In some cases, you have to notify the media too. If you’re covered by the HIPAA Breach Notification Rule, you have to notify the Secretary of the U.S. Department of Health and Human Services. Stay aware, eliminate any vulnerabilities, and continue to check for potential new ones regularly. You Must Act Quickly After a Data Breach If your company falls victim to a data breach, it can be overwhelming trying to figure out what to do and how to act. However, the more quickly you act, the better chance you have at saving sensitive information and preventing huge monetary losses as a result of the breach. Talk with your legal team to ensure you notify the appropriate people. Stay alert and eliminate any vulnerabilities. Change passwords and credentials immediately, particularly for areas that suffered a data leak. Hire a team of experts so that you ensure your business doesn’t suffer any additional breaches down the road. Are you ready to strengthen the security of your business by utilizing efficient password management software? Contact us to get

Read More »
Team discussing features of a password manager, with graphs and laptops, highlighting security and collaboration.

The 6 Key Features of Any Team Password Manager

In 2020 one ransomware attack alone caused chaos at over 400 hospitals in the U.S. and U.K., affecting the healthcare system for weeks and costing tens of millions of dollars. Maybe you don’t think your business will be the victim of a cybercrime, but businesses of all sizes are susceptible. Small businesses account for 28% of data breaches. So how can you protect your business? One way is with a password manager. But not all password managers are created equal. Here are six key features you should look for in a team password manager. 1. Easy on and off Boarding Depending on your work environment, you may want to add some temporary members to your team. Maybe you require the work of some contractors for a few months, but need to revoke their access after that time. You will want to be able to easily off-board team members too. The same goes for employees who are no longer working at the company. You don’t want those employees to have access to projects they shouldn’t have access to. This is especially true if it’s a disgruntled employee. Can your business survive the fallout of data theft from a disgruntled employee?  2. Security and Strong Encryption It should go without saying, but you need a secure password manager. It should have a variety of different security options that can be customized to your industry or workplace.  It should also use strong encryption, such as AES. AES stands for Advanced Encryption Standard. As the name suggests, it’s a very secure way of encrypting data.  AES comes in a few different standards:: 128, 192, and 256 bit. The strongest of these is AES 256 bit encryption. This means that the “key” that turns the encrypted data into unencrypted data is a string of 256 0s or 1s.  It’s extremely hard to brute force AES 25 encryption. A hacker would have to try and guess every possible combination until they found the right password.  That’s the kind of strong security you need in your password management software.   3. Strong Password Generation A good password manager will have a strong password generation option. Without users, users will be tempted to create their own passwords.  This could lead to them either re-using passwords used for other accounts, or them creating weak passwords (i.e. jsmith1234).  A good password manager will get employers in the habit of creating secure passwords via a password generator. It should be able to generate an 8+ character password that includes numbers, special characters, and a mix of upper and lower case letters.  The process of generating a secure password should be simple. Otherwise, employees may fall back on bad password creation habits. 4. Two-Factor Authentication (2fa) Two-factor authentication, or 2FA, is an additional security layer that requires the user to verify their password along with an additional piece of information.  This could be as simple as an SMS (text) message sent to their phone, that includes a special code that the user needs to input before they can access their work. This is an OTP or one-time password. Like the name suggests, the system will deliver a new randomly generated code to the user via SMS every time they log on.  A similar method involves using a security code or taken from an app. An OTP may be generated via an app, but may only be valid for a short amount of time, preventing anyone from logging in using that code if they miss the short window during which it is valid. Other methods of 2FA could include fingerprint identification, retina scans, email message, or voice recognition. In some instances, a physical USB token may even be used, requiring the user to physically possess the token in order to log on. 5. Global Coverage Across Multiple Devices For companies with offices in more than one country, you will need to make sure your password manager is supported globally. If your password manager doesn’t support multiple languages it might not be worth using.  Likewise, your password manager shouldn’t just be for traditional desktops or laptops, but for mobile devices as well. It should serve you wherever you go, on any device.  The same goes for operating systems. You need to find a password manager that will support Android, Windows, Mac, Linux, and any other operating systems (OSes) in use. This is especially important if employees are working outside of the office often, as they may not be using the same OS they would be if they were working on site. 6. Easy, Transparent Pricing When it comes to pricing a good team password manager pricing should be transparent. You shouldn’t have to jump through hoops or spend forever digging around online just to find pricing information.  You also need to look for a password manager with different tiered pricing options. Your organization may not need all the features of an enterprise solution. So why pay extra for features you won’t use?  A good password manager will offer a free trial. Try it out for yourself for a few days and see if it’s the right fit for your organization. If it is, then transitioning to a paid version should be simple. The Best Team Password Manager If you’re struggling to find a team password manager that has all of these features and more, then you haven’t tried LogMeOnce. Whether you’re looking for personal or business or enterprise password management, LogMeOnce offers an easy, affordable password manager solution. No credit card is required. Try LogMeOnce free for 14 days, and see the benefits of a password manager for yourself. Don’t wait until it’s too late-protect your business today.

Read More »
Group of people with text: 6 Signs It's Time to Invest in a Team Password Manager, blue background.

6 Signs It’s Time to Invest in a Team Password Manager

About 60 percent of small businesses that experience a hack or data breach end up closing within six months. Hacks of any size can devastate both small and large businesses if appropriate security measures are not put in place. Here are the 6 biggest signs that it is time for your company to invest in a team password manager.  1. Your Company Has Been Hacked You need to invest in a team password manager if your company has experienced a hack. Even if the hack originated through a bug or other backdoor method, the hackers most likely had access to the passwords of your organization. Even with this being said, some employees do not change their passwords following a hack or data breach. They think that because none of their information was stolen, their accounts are still secure.  That is not the case.  Hackers can save passwords to use in a later data breach. Or, they might try your same password in a different program, social media account, or bank account.  A password manager can customize all your passwords for each website for you so you do not have to go from website to website changing each of your passwords.   Another great feature of having an online password manager is that it will continually monitor the web for any comprised websites. If a website has experienced a hack, the password manager will alert you.  You can then safely change your password to avoid any possible future data breach.  2. You Need Stronger Passwords Weak passwords account for nearly 50 percent of data breaches. In fact, “password,” 12345678,” and “password123” ranked among the most commonly used passwords.  The key to protecting your company’s data from future data breaches is having strong passwords. Strong passwords are a huge roadblock to hackers, phishers, and social engineers from getting into your company’s system.  One of the main benefits of purchasing a team password manager for your enterprise systems is that it will generate a strong, hard-to-crack password for you. The password manager will then store it for you, so you do not need to write it down or save it on a device.  3.You Have Difficulty Remembering Passwords As mentioned above, strong passwords are one of the key elements to protecting your employees and company data from potential breaches and hacks. However, employees do not like to create complicated and hard-to-guess passwords for fear of forgetting.  Employees and individuals tend to use the same, easy to guess password for a variety of different logins and websites.  A team password manager will not only remember a new and uniquely strong password for each website and program you use, but it will store them for you.  You only need to remember one password in order to access your programs.  4. You Use a Variety of Devices In our very connected world, individuals and businesses are using a record number of digital devices. No longer is business only done on a desktop computer.  People now require laptops, desktops, smartphones, tablets, watches, e-readers, and more. Sometimes, businesses require employees to have more than one.  It can be tricky to have employees remember a variety of different passwords for a variety of different devices. Even if an employee has a great memory, they can get logged out when they switch back and forth between devices.  A team password manager can help streamline passwords among a variety of devices so you no longer have to constantly worry about getting kicked off a website when you sign in from another device.  5. You Want the Speed and Ease of a Team Password Manager Another benefit of purchasing a team password manager is how it makes the log-in process easier and speedier. It can make logging into different platforms and programs seamless.  Even if someone writes down all their passwords (which is a poor operational security practice), it can still take time for them to find the correct password and enter it in.  In our fast-paced business world, there is no need to be fumbling around trying to find and enter in passwords when there is a solution available. A password manager will instantly log you into a website without wasting even a second.  It takes all the work out of entering and typing in a password so you can get right to work.  6. You Want to Maintain Better Access to Enterprise Systems Another benefit of purchasing an enterprise password management system is that is strengthens security to different parts of your company. A password manager allows you or other managers to maintain better controls over which employees can access certain systems.  This can be very helpful when you have new employees starting and you do not want to grant them immediate access to sensitive systems. It is also helpful when an employee leaves your company. You can immediately terminate their passwords so that they can no longer have access to critical logins.  Reach Out Today to Invest in a Team Password Manager The world is becoming increasingly digitized as more and more normal daily activities move online, like banking, shopping, healthcare, and more. This presents an all-around threat to data.  Protecting your online data should be a priority for not just individuals, but large and small companies as well.  If you are looking for either a team password manager for a small business, or need an enterprise solution, there is no more time to wait. Reach out to us here at LogMeOnce. We are a password management organization trusted to maintain password security from everyone from the United States Secret Service to BMW to the Mayo Clinic.  Contact us today to learn how our password managers can benefit you and your company today. 

Read More »
Woman with laptop on website header about weak passwords risks.

Lock and Key: Understanding the Risks of a Weak Password

A weak password can cost $445 billion. That’s how much hacks cost globally last year. Weak passwords can cost you profits, repair costs, confidential information, and public trust. It’s hard for some individuals or organizations to take password protection seriously. Many of us prefer simple combinations, like our middle name or 123456. There are so many things to remember these days, and a different password for each site is far too much to add to the list. Different solutions, such as multi-factor authentication or biometric security, have been posited over the years. However, solutions are costly. What Are the Risks of A Weak Password? You may have been told to cup your hand over the machine when inputting your PIN after making a purchase. This prevents someone from looking over your shoulder and seeing it.  The same is true for passwords. If yours is simple, it’s like watching someone log into their phone. After seeing them do it once or twice, you can easily guess what their password is. Once someone gains access to your device, accounts, or password manager, it’s hard to come back from that. Keyloggers also mimic the same process, but with a higher degree of accuracy. They store every single keypress made on the device. Sometimes, a keylogger may be installed already if you’re using a work device. Or, a hacker may install one on your machine. This gives them access to every bit of confidential information you type. Weak passwords can expose confidential information. This is a risk in your personal life because your home address can be known, bank accounts can be wiped clean, your credit score could be ruined, and more. It’s a massive violation of privacy that can wreak havoc on your personal and financial life. It’s also a safety risk. Many accounts, such as with businesses that you’ve shopped online with, have your home address stored with that account. If a hacker finds your home address, what can they do with it? If a hacker can see you’ve purchased a lot of expensive items recently, they may target your home in a robbery. Often, digital safety can have a real impact on personal safety as well! Combating Weak Passwords One of the primary ways to protect your passwords is by reducing human error with a password vault. Often, hacks are facilitated by trust, gullibility, and a rush to get things done. People sometimes make snap decisions at the moment that they wouldn’t have made if given more time. For instance, one-third of hacks last year was accomplished by phishing. For instance, you may receive an email from your bank that looks legitimate. You click on the link, which takes you to your bank account’s log-in page. Then, you’re prompted to input your username and password to view your account. This seems like a normal process to access your account, right?  Just like that, a hacker can gain access to your bank account. By looking more closely at the email, you might have seen that a few words were misspelled. The logo was off. These are tiny cues but are often symptoms that something is indeed amiss. However, human vigilance can only go so far when it comes to password protection. There’s a better way when it comes to password storage and management. Investing in Password Protection Strong passwords are everything, and the definition of ‘strong’ has altered a lot as the digital world has grown. For instance, a strong password used to include a capital letter and a number. Now, it’s so much more complicated than that. Take a keyboard smash password, for example: J-0!eiohRWe5/-! As far as passwords go, it contains capital letters, special characters, numbers, and nothing particular or personally identifying. It’s perfect, right? There’s only one issue: you might never remember it. That’s where a password manager comes in. There is password management software that can be installed on your devices. But for the sake of discussion, some web browsers come with built-in password management. Google Chrome, for instance, has this capability. When you type up a new password, a pop-up will ask if you want Google to save it. If you select yes, your information will be stored. When you want to view your passwords, you can go to your Google account. Then, you’ll need to type in your device’s password so that you can see passwords associated with each account. Use a Password Vault As you can see, there is one fatal flaw with this approach. If someone figures out one single password, they suddenly have access to all of your passwords. This can be a fatal blow to your security, especially if your device password is easy to figure out. The best password manager has layers of security. Sometimes this equals multi-factor authentication and biometric security levels. When it comes to protecting your password, a layered Swiss cheese approach is everything. Investing in password vault software is be a good idea. It mimics the idea of writing your passwords down on a piece of paper and storing it inside a locked, fireproof box. The best software combines two-factor authentication, auto-login and auto-generator password capabilities, and file/password sharing. This approach combines security and convenience in a way that makes your life easier. Changing up the game is also important when it comes to security. One popular security measure is to require users to change logins regularly. This will prevent old logins from presenting vulnerability after years of repeated sign-ins. With LogMeOnce, you can select the device you’d like to regularly update sign-ins on. Then, you can customize how you’d like to do this. Whether you want to change it hourly, or whether you prefer to do it on every other sign-in attempt, we’ve got you covered. Invest In Your Security Passwords are a key part of your security system, whether you’re trying to protect your personal finances or an entire organization from the risks of a weak password. With LogMeOnce, you can do that in a

Read More »
Illustration showcasing text Biggest Hacker Attacks in History on blue background with LogMeOnce logo.

Biggest Hacker Attacks in History

The recent SolarWinds data breach was one of the biggest hacker attacks in recent memory. The attack compromised local, state, and federal government agencies as well as many big tech companies.  By better understanding the history of cyber attacks, we can see how they have developed over time and how to better protect against them. The landscape of the internet has changed dramatically over the last few decades. And hackers and cybersecurity firms have been updating their systems to match these shifts. But what are some of the biggest hacker attacks in history? Keep on reading and we’ll walk you through the worst cyber attacks that you need to know about.  The Morris Worm (1988) The first computer worm to be transmitted through the internet was created by Robert Tappan Morris. At the time, Morris was a student at Cornell University. He made the worm not to harm any devices but to measure the size of the internet. However, that’s not how things turned out. The worm ended up encountering a serious error and it morphed into a virus. The worm replicated very quickly and started to infect other computers, causing them to shut down.  In total, thousands of computers were affected, which made up most of the internet at that time. The Morris worm ended up causing tens of millions of dollars in damage.  MafiaBoy (2000) Michael Calce, also known as MafiaBoy, was just a regular high school student in Canada who suddenly reached notoriety at the turn of the century. He unleashed a DDoS attack on many high-profile commercial sites, including Yahoo, eBay, CNN, and Amazon. It’s estimated that MafiaBoy caused more than $1 billion in damage. Michael was later arrested. However, because he was a minor, he was only sentenced to eight months in open custody. This means that his actions and movements were restricted. The court also limited his online access. Since then, Calce has worked as a columnist and even wrote a memoir.  Google China Attack (2009) At the end of 2009, Google’s headquarters in China found a security breach. They suspected that the Chinese government was behind the attack. Hackers were able to gain access to multiple corporate servers at Google and they stole intellectual property too. Google claimed that the attack was done to target human rights activists in China.  As the company did more research, they found that the Gmail accounts of users from Europe, China, and the United States had all been accessed without permission. Many of those emails belonged to human rights activists.  As a response to the attack, Google moved their servers to Hong Kong in 2010.  NASA and DoD Hack (1999)  In 1999, Jonathan James was only fifteen years old. However, he still managed to penetrate the computers of the US Department of Defense. He then installed a “backdoor” on the department’s servers.  This let James intercept thousands of internal emails from various governmental organizations. He even got the usernames and passwords for various military networks. With this stolen data, James was able to steal some software from Nasa. This forced the agency to shut its systems for several weeks, causing tens of thousands of dollars in lost productivity. NASA claimed that the software was worth nearly $2 million and was used to support the physical environment at the International Space Station, including control of the humidity and temperature.  Hacks like these show just how important it is for companies to keep their passwords safe and protected.  Because he was so young, James was given a light sentence after he was arrested. In 2008, he was accused of conspiring with other hackers to steal credit card information.   Porsche Radio Hack (1990) In 1990, the radio station LA KIIS FM was holding a competition where they were offering a Porsche 944 S2 to the 102nd caller. Kevin Poulsen was able to guarantee his success by hacking into the phone network and stopping anyone else from calling the radio station’s phone number. He ended up winning the Porsche. However, law enforcement caught onto his scheme and sentenced him to five years in prison. Poulsen would go on to become the senior editor for IT security publication, Wired News. SolarWinds Hack (2020) In 2020, a major cyber attack by a foreign group penetrated thousands of organizations around the world, including various parts of the American government. This attack is viewed as one of the worst cyber-spy attacks ever inflicted upon the United States. The attack lasted nearly nine months before it was put to a stop. Microsoft, the European Parliament, the UK government, and NATO were also affected by the data breaches.  The hack started around March 2020. The hackers exploited software from VMware, SolarWinds, and Microsoft. Flaws in these systems allowed the hackers to access emails and other sensitive documents. They were even able to perform federated authentication and gain access to all kinds of data.  The hackers were able to install Trojan horses into updates from various tech companies. When an update was initiated by a user, the malware would then be able to gain access to the computer system it was installed on.  The damage is estimated to cost around $90 million. The Importance of Knowing About the Biggest Hacker Attacks in History Hopefully, after reading the above article, you now feel that you have a better understanding of some of the biggest hacker attacks in history. As we can see, hacker attacks have the ability to compromise vital systems and cause a lot of technological and financial damage. By understanding the history of these attacks, we can better appreciate the need for protecting data. If you’re looking to protect your computing systems, then contact us today and see what we can do for you!

Read More »
Discover Why Your Business Needs a Password Manager - LogMeOnce Graphic with Checklist Illustration

Why You Need a Business Password Manager

In the U.S., data breaches cost companies over $8 million yearly on average. Plus, with more and more businesses going digital, don’t be surprised if the figure shoots to $10 million in the coming years. Security is always a key concern for businesses dealing with super-sensitive data. Fortunately, you don’t need an entire IT team to protect sensitive data from breaches. Protecting company information can be as simple as installing a business password manager. This is software that enables users to create, store, and manage their passwords across multiple platforms. A password manager is an excellent alternative to writing passwords in a notebook or on sticky notes. With password managers, you can store all your essential passwords and sidestep data breaches. You also don’t have to worry about forgetting passwords or memorizing them every day. All you have to do is remember a single password. If you’ve been having data security concerns or trouble keeping up with your password, then a password manager can be the answer to all your problems. Keep reading as we look at why password managers are so crucial for businesses. Let’s get right into it. You Can Create Stronger Passwords You need strong and complicated passwords to protect sensitive company data. Simple, short passwords are easily predictable, easy to guess, and pose many dangers to your data security and business. On the other hand, long and complicated passwords are hard to remember. With password managers, you can generate long and complicated passwords without having to worry about forgetting them. That way, you can use strong passwords that even password generators can’t crack. With that in mind, here are a few tips to keep in mind when creating your passwords: Use both small and capitalized characters Use a combination of letters, numbers, and symbols Avoid using special dates like birthdays for your password Make your password as long as possible These are a few tips you should keep in mind when creating your passwords. Alternatively, you can use passphrases instead of passwords. These are just like passwords but instead, use a string of words and not a combination of characters. Faster Access to Data Most people use a single password for every access point. Seems sensible, but it might not be such a good idea, especially for business accounts. That’s because hackers can get the keys to the entire kingdom just by having that one password. You can opt for multiple passwords, but you’ll probably have a hard time remembering all of them. That’s why most people write down passwords in their notebooks. While it works, it leads to a lot of time wastage when you have to fumble through your notebooks to get to your passwords. With a password manager, accessing your login credentials is as simples as a click of the mouse button. What’s more, the software automatically creates login credentials for different access points to save even more time. Seamless Account Sharing Most businesses use shared accounts for their various business operations. Managing shared accounts is one of the most challenging jobs a business owner could have.  Password managers allow one person to manage the password to apps used by multiple personnel without sharing the password. This ensures ultimate data security, even with shared accounts. Remember, shared accounts are vulnerable to breaches because data security depends on many people. A password manager allows for hassle-free management of shared accounts and login credentials of multiple users. Some password managers even allow you to keep track of user activity. They Do More Than Store Passwords Password managers do more than store passwords and login credentials. The software might come bundled with other security features that might prove useful for your company. Some password managers have multi-factor authentication that adds extra security layers for robust data security. With some business password managers, you can even have secure access to credit card information, and others allow you to monitor user activity. You Don’t Need a Good Memory You should update your password every once in a while, to always be a few steps ahead of hackers. However, remembering the frequently changing passwords can be difficult even with a good memory. That’s why most people choose to write down their passwords on paper. The good thing with password managers is that you don’t have to scratch your head to remember multiple passwords. You can store all your passwords securely with a password manager. All you have to do is remember a single password. You Don’t Compromise Your Online Security Most browsers allow you to save your login credentials for faster access to your online accounts. While the feature is great for user experience, it compromises your browsing security. Instead of storing your login credentials on the browser, you can use a business password manager. That way, keeping online information secure is possible, especially if you share devices with employees. Also, do your best not to store your passwords on the browser. Doing so makes you susceptible to unauthorized access. Protects Against Phishing Attacks Phishing attacks have become more rampant in recent years. Phishing is an easy way for hackers to get your login credentials. The worst part is that sometimes you won’t even know it until it’s too late. Phishing involves using phishing software that can mimic existing apps and websites to get your login credentials. Using a business password manager is one way to sidestep such attacks. That’s because, unlike other apps, password managers can block phishing software. If you don’t want your business to be a victim of phishing attacks, then use a password manager for all your passwords. Also, remember to remain extra cautious of suspicious login screens  Get a Business Password Manager Today The security of your company’s data lies solely in your hands. That’s why you should consider getting a business password manager today and safeguard your company’s data. Most password managers have tutorials on how to use the software to make it easier to use. With the plethora of business password

Read More »

Search

Category

Protect your passwords, for FREE

How convenient can passwords be? Download LogMeOnce Password Manager for FREE now and be more secure than ever.

Copyright © 2011-2025 LogMeOnce. All rights reserved.