In a world where life has become increasingly virtual, a concept of protecting consumers’ data under the law – data sovereignty – was created. An increasing number of businesses sell their services and products online, for which they collect personal data of customers, like email, credit card information, address, phone number, etc. Data sovereignty laws […]
How a Password Manager App Can Help Prevent Password Theft
Did you know that 51% of people use the same passwords for work and personal accounts? While it makes remembering the password easier, it also makes it that much easier for the hacker to obtain all your information. With technological evolution, hackers have also updated their skills to steal information. They use tricks like phishing […]
Spear Phishing: What Is It? And How to Mitigate the Risks?
Spear phishing may sound like an artisanal way of hunting fish, but it is far from it. It is one of the most commonly used cyberattack methods, with 65% of known criminal groups using it to steal confidential information. It’s a highly targeted and personal cyberattack that seems to come from a trusted source in […]
Enpass Information Security Management System is now ISO 27001 certified!
At Enpass, our mission is to secure the digital worlds of individuals, families and businesses. Putting customer privacy and security first, we never store user data on our servers – instead we give people the choice of where they store their passwords, logins and other information – locally on their devices, or in their trusted […]
Why businesses should implement password management solutions
In today’s digital-first world, the risk of data breaches is continuing to rise. In 2021 there were 5258 reported breaches of which 61% were password and credentials related and the average cost of a data breach was US$ 4.2 million. Companies have implemented SSO to help protect their organizations from breaches, but what about all […]
How password managers are closing 3 enterprise security gaps
The onset of Covid-19 turned the workplace as we knew it upside down. IT departments were forced to adapt very quickly to the new way of working from home and deploy remote systems to enable employees to connect securely and easily. While equipping employees with the tools they needed to work remotely has enabled businesses […]





