Skip to content
  • Product
    • Business
    • Personal
  • Why Enpass
  • Pricing
  • Resources
    • Resource Center
    • Blogs
    • Trust Center
  • Help
    • Support
    • Help Center
    • Forum
  • Contact Us
Download
Top-Reasons-Why-You-Shouldnt-Use-Browser-Password-Manager
Security

Browser Password Managers: Are They Really Secure or Just Convenient?

January 2, 2023

Most of us primarily use web browsers for work and play throughout the day. So why not also entrust it with our passwords? Although it may seem like a safe and convenient place to store passwords, your browser is not entirely trustworthy. People often think they don’t need a password manager because using a free […]

Heres-How-Password-Managers-Tranquilize-the-Threat-of-Phishing
Security

Uncover the Truth About Phishing and How Password Managers Protect You From These Attacks

December 30, 2022

In today’s digital age, it’s no surprise that cyber threats and security risks are on the rise. One of the most widespread cyber attacks is phishing, a social engineering attack targeting unsuspecting users with malicious links or emails. How does Phishing Work? Phishing is a cyber attack that takes place by tricking people into giving […]

6-Types-of-Cyber-Security-Attacks-and-How-Can-Enterprises-Safeguard-Against-Them
Security

How Can Enterprises Safeguard Against 6 Types of Cybersecurity Attacks

December 27, 2022

The threat of hackers breaching a firm’s data looms over everyone. With an ever-evolving digital landscape, one must take the necessary provisions. This proves true with every passing year. Cybersecurity attacks happen constantly. Enterprises must safeguard their networks and computer systems against unauthorized access to prevent reputational damage and financial loss.  Understanding Cybersecurity Attacks and […]

Why-is-Data-Sovereignty-Important-Key-Considerations-and-Challenges
Security

What Is Data Sovereignty and the Challenges Surrounding It

December 24, 2022

In a world where life has become increasingly virtual, a concept of protecting consumers’ data under the law – data sovereignty – was created. An increasing number of businesses sell their services and products online, for which they collect personal data of customers, like email, credit card information, address, phone number, etc. Data sovereignty laws […]

4-Ways-Hackers-Steal-Passwords-and-How-a-Password-Manager-App-can-Help-With-It
Security

How a Password Manager App Can Help Prevent Password Theft

December 21, 2022

Did you know that 51% of people use the same passwords for work and personal accounts? While it makes remembering the password easier, it also makes it that much easier for the hacker to obtain all your information. With technological evolution, hackers have also updated their skills to steal information. They use tricks like phishing […]

Spear-phishing-What-is-it-And-How-to-Mitigate-the-Risks
Security

Spear Phishing: What Is It? And How to Mitigate the Risks?

October 24, 2022

Spear phishing may sound like an artisanal way of hunting fish, but it is far from it. It is one of the most commonly used cyberattack methods, with 65% of known criminal groups using it to steal confidential information. It’s a highly targeted and personal cyberattack that seems to come from a trusted source in […]

Posts pagination

Previous 1 … 4 5 6 … 29 Next

Search

Categories

  • Announcement (34)
  • Browser Extensions (12)
  • Enpass Portable (4)
  • Enpass-Android (15)
  • Enpass-BB (3)
  • Enpass-iOS (14)
  • Enpass-Linux (8)
  • Enpass-Mac (7)
  • Enpass-Windows (18)
  • General (42)
  • How-To (25)
  • Press Releases (1)
  • Security (39)

Recent posts

  • From Password Policy to Practice: Enpass Helps Businesses Get Passwords Strong
  • 16 billion login credentials leaked — including logins for Google, Apple, Facebook, and more. Here’s how Enpass helps you stay safe
  • SEIM Integration
    Enpass Introduces Event Logging and SIEM Integration

Tags

Access Recovery Browser Security Cybersecurity Data breach Data Sovereignty Enpass6 Enpass Business Enpass Enterprise Enpass hub Lastpass passkeys password manager password theft Phishing Security Security Audit Spear Phishing Vault Sharing

Want to receive news and updates?

By subscribing, you agree to our Terms of Use and Privacy Notice. We do not send more than one email a month about the latest news of Enpass, special promotions and sneak peek of future releases.

Connect with us on social media

Explore
  • Business
  • Personal
  • Microsoft 365 Integration
  • Google Workspace Integration
  • Affiliate Program
  • Partners Program
  • Beta Program
  • Students
Features
  • Offline
  • Sync
  • Autofill
  • Passkeys
  • Password Generator
  • Password Audit
  • Import from others
  • Compromised Passwords
Resources
  • Comparison
  • Downloads
  • Security
  • Security Whitepaper
  • Press: Resources
  • Passkeys Catalogue
Company
  • About
  • Privacy Notice
  • Cookie Policy
  • Terms of Use

Copyright © 2025 Enpass Technologies Inc.

  • Terms of Use
  • Privacy Notice