It’s Data Privacy Day! Or how it was earlier created, communicated, and celebrated as – Data Protection Day. Let’s stick with the latter in honour of the origin, shall we? 🙂
As you usher in a new year, you may find there already are thousands who are rooting for you. More specifically, your data.
Password Safe is aware of this exploit and concludes that our software is NOT AFFECTED by this vulnerability. No action is required for customers using our supported software versions 8.10 or higher. Another library used by Password Safe is the Log4js or Log4 Java Script. It has no relation with Log4j or Log4 Java and is NOT affected by the vulnerability.
You may find it to be reassuring to have someone look over you. But when it comes to security, shoulder surfing is not something you or your company would ever want. Password masking has become an indispensable aspect of data security. Passwords can be covertly created, stored, used, and shared with team members without revealing them.
From Kaseya to Solarwinds to TeamViewer, it's not news that the risk of cyberattacks in the networked world is growing. What is new, however, is that more and more enterprise software cloud providers are becoming the focus of cybercriminals. Read the following post to learn how you can reduce the risk of cloud attacks.
In addition to the established self-hosted usage model, Password Safe is now also available as a managed service! In this article you can read about the advantages of Password Safe MSP.
In Germany, the role of the Chief Information Security Officer (CISO) is being seen more and more frequently. In this article, you'll find out what challenges CISOs face and how they can best overcome them.
Today we are very pleased to present you the new version 8.13 of Password Safe. In this article you will learn which new features and improvements the version has in store for you and how they will help you in your daily work with Password Safe.
The IT security situation in Germany is tense. In 2019 alone, the Federal Criminal Police Office recorded over 100,000 reported cyberattacks in Germany, and the number of unreported cases is probably much higher. To understand how companies and private individuals can protect themselves, you first need to understand what the different types of hacker attacks are.
"Data breach", "Data leak", "Your password has been compromised". Not only do nightmarish scenarios play out in your head when you hear these words, but you inevitably wonder: what's the right thing to do now? In this post, you'll learn how to find out if your passwords have been compromised, and if they have - what to do about it.