Many small businesses don’t have the budget to hire cybersecurity experts or the resources to implement enterprise-grade security systems. GreenLoop IT Solutions, a managed service provider that brings premium IT support and consulting services to small and medium businesses, is revealing how they are addressing this challenge by leveraging Bitwarden to manage and protect all their clients’ passwords. By offering this valuable and easy-to-use security solution, GreenLoop ensures that all of their clients’ information is accessible when needed and kept safe from malicious actors.
Passwordless authentication in general means authenticating a user identity without requiring a password. Moving from a password-dependent workplace to a passwordless one requires taking into consideration the work habits of your user communities – employees, executives and senior leadership, and mobile or remote workers. For enterprises seeking to adopt passwordless, IT leaders from across the industry are recommending steps you can take today that will set your business up for success in the future.
Enjoying this update? Subscribe today.
Receive the latest product updates, hand-picked articles, community highlights, and more.
Princeton University researchers released a study detailing the password policies of 120 of the most popular English-language websites in the world, including Google, Twitch, Yahoo, and Canva. For the study, the researchers reverse-engineered each website’s password policies to determine if they were following established best practices for creating stronger and more secure passwords. Check out the results to uncover which of the top 120 websites are following these best practices to protect your private information (and which are not).
We hear about data breaches all the time, but have you ever wondered if you've been a victim? The truth is, most of us have. It's important to know where your information has been exposed to malicious actors so that you can take appropriate action. The Bitwarden Data Breach Report can help you uncover the truth of whether your email address has ever been compromised.
As more healthcare providers move to electronic records and other technologies, it's imperative for patient medical information to be protected. If you're using Bitwarden to store your electronic Protected Health Information, rest assured that Bitwarden is HIPAA compliant and, as an end-to-end encrypted platform, cannot view or decrypt patient records or any data in your vault. Learn more about the value of choosing a HIPAA-compliant password manager by visiting our blog.
The ability to securely share passwords was one of the most requested features since Bitwarden began . Password sharing has many applications both in your personal life and workplace. If you are a business, you may have hundreds of logins that need to be securely shared with users across teams and departments, each in their own unique way. Learn how you can use Bitwarden to securely share passwords with friends, family members, clients, or colleagues.
Whether due to the unfortunate rise of data breaches, geopolitical conflict, or policy developments with privacy implications, internet users should have the tools to create a secure and private online profile. Fortunately, there are simple ways to better protect yourself online that do not require technical expertise. Follow these seven easy steps to strengthen the security and privacy of your online experience.
The community plays an important role in contributing to a world free of breaches and hacks. Big shoutout and thank you to the following Bitwarden community members that contributed to the upcoming August 2022 release:
Browser: suppress user-select for most interface elements
Desktop: suppress user-select for most interface elements
Use correct icon for checked/unchecked boolean
Opera GX Autofill Support on Android
Add support for iodé Browser
Settings option to allow screen capture on Android
Follow the Bitwarden Community on Twitter, a community space within Twitter to get updates and chat with other like-minded security enthusiasts.
That’s it for now. Let us know what you think about this newsletter including potential topics you’d like to see.
Until next time,