Skip to content
  • Product
    • Business
    • Personal
  • Why Enpass
  • Pricing
  • Resources
    • Blog
    • Forums
    • Support
  • About
  • Contact
Download

Security

News, announcements and security tips from the enpass blog.

  • Home
  • Blog
  • Security
  • Page 3
6-Types-of-Cyber-Security-Attacks-and-How-Can-Enterprises-Safeguard-Against-Them
Security

How Can Enterprises Safeguard Against 6 Types of Cybersecurity Attacks

December 27, 2022

The threat of hackers breaching a firm’s data looms over everyone. With an ever-evolving digital landscape, one must take the necessary provisions. This proves true with every passing year. Cybersecurity attacks happen constantly. Enterprises must safeguard their networks and computer systems against unauthorized access to prevent reputational damage and financial loss.  Understanding Cybersecurity Attacks and […]

Why-is-Data-Sovereignty-Important-Key-Considerations-and-Challenges
Security

What Is Data Sovereignty and the Challenges Surrounding It

December 24, 2022

In a world where life has become increasingly virtual, a concept of protecting consumers’ data under the law – data sovereignty – was created. An increasing number of businesses sell their services and products online, for which they collect personal data of customers, like email, credit card information, address, phone number, etc. Data sovereignty laws […]

4-Ways-Hackers-Steal-Passwords-and-How-a-Password-Manager-App-can-Help-With-It
Security

How a Password Manager App Can Help Prevent Password Theft

December 21, 2022

Did you know that 51% of people use the same passwords for work and personal accounts? While it makes remembering the password easier, it also makes it that much easier for the hacker to obtain all your information. With technological evolution, hackers have also updated their skills to steal information. They use tricks like phishing […]

Spear-phishing-What-is-it-And-How-to-Mitigate-the-Risks
Security

Spear Phishing: What Is It? And How to Mitigate the Risks?

October 24, 2022

Spear phishing may sound like an artisanal way of hunting fish, but it is far from it. It is one of the most commonly used cyberattack methods, with 65% of known criminal groups using it to steal confidential information. It’s a highly targeted and personal cyberattack that seems to come from a trusted source in […]

How password managers are closing 3 enterprise security gaps
Security

How password managers are closing 3 enterprise security gaps

June 14, 2022

The onset of Covid-19 turned the workplace as we knew it upside down. IT departments were forced to adapt very quickly to the new way of working from home and deploy remote systems to enable employees to connect securely and easily. While equipping employees with the tools they needed to work remotely has enabled businesses […]

Shopping Online Tips Enpass
Security

6 tips for a safer online shopping experience

December 7, 2021

More people are shopping online than ever before and billions of dollars are spent every year. But what’s convenient for shoppers and good for businesses, can also be profitable for cybercriminals. While most transactions will be smooth sailing, security on online purchases is not a given.   By taking these simple precautions, you can protect yourself from fraudsters and enjoy the convenience of shopping online with total peace of […]

Posts pagination

Previous 1 2 3 4 … 7 Next

Search

Categories

  • Announcement (34)
  • Browser Extensions (12)
  • Enpass Portable (4)
  • Enpass-Android (15)
  • Enpass-BB (3)
  • Enpass-iOS (14)
  • Enpass-Linux (8)
  • Enpass-Mac (7)
  • Enpass-Windows (18)
  • General (42)
  • How-To (25)
  • Press Releases (1)
  • Security (39)

Recent posts

  • From Password Policy to Practice: Enpass Helps Businesses Get Passwords Strong
  • 16 billion login credentials leaked — including logins for Google, Apple, Facebook, and more. Here’s how Enpass helps you stay safe
  • SEIM Integration
    Enpass Introduces Event Logging and SIEM Integration

Tags

Access Recovery Browser Security Cybersecurity Data breach Data Sovereignty Enpass6 Enpass Business Enpass Enterprise Enpass hub Lastpass passkeys password manager password theft Phishing Security Security Audit Spear Phishing Vault Sharing

Want to receive news and updates?

By subscribing, you agree to our Terms of Use and Privacy Notice. We do not send more than one email a month about the latest news of Enpass, special promotions and sneak peek of future releases.

Connect with us on social media

Explore
  • Business
  • Personal
  • Microsoft 365 Integration
  • Google Workspace Integration
  • Affiliate Program
  • Partners Program
  • Beta Program
  • Students
Features
  • Offline
  • Sync
  • Autofill
  • Passkeys
  • Password Generator
  • Password Audit
  • Import from others
  • Compromised Passwords
Resources
  • Comparison
  • Downloads
  • Security
  • Security Whitepaper
  • Press: Resources
  • Passkeys Catalogue
Company
  • About
  • Privacy Notice
  • Cookie Policy
  • Terms of Use

Copyright © 2025 Enpass Technologies Inc.

  • Terms of Use
  • Privacy Notice