3. Confidential Information 3
Agenda
1. Welcome!
2. The cybersecurity landscape
3. It’s all about people
4. Cybersecurity doesn’t have to be difficult
5. Q&A and wrapping up
6. Confidential Information 6
Let’s face it…
Threats are everywhere, and
cybercriminals are notoriously adaptable.
Passwords are the path of least resistance
for cybercriminals, whether you’re a large
enterprise company, a small business, or a
nonprofit organization.
Change is the only constant when it comes
to cybercriminals. But a password
management system can help.
8. Confidential Information 8
Password quiz
How many people admitted to reusing
passwords from their personal accounts for
their work accounts?
A. 13%
B. 22%
C. 34%
D. 50%
9. Confidential Information 9
The metrics speak for themselves
In 2022, 82% of
breaches involved
the human element.
63% of people
reuse passwords
for other accounts.
22% of workers
admitted to reusing
passwords from their
personal accounts for
their work accounts.
10. Confidential Information 10
Passwords + sticky notes =
a disaster waiting to happen
In 2018, Hawaii’s Emergency Management Agency
accidentally broadcasted a false missile warning to
islanders, blaming it on an employee who pushed
the wrong button.
Shortly after, however, a newspaper photo came to
light. It showed one of the company’s operations
officers and a sticky note with a legible password in
the background.
There’s no evidence that the photographed
password contributed to the missile alert, but the
agency’s reputation suffered, and its security
practices came into question.
41%
of individuals write
down their passwords
SOURCE: “THE 2020 STATE OF PASSWORD AND AUTHENTICATION
SECURITY BEHAVIORS REPORT,” PONEMON
11. Confidential Information 11
Recent breaches with big impacts,
from big brands to nonprofits
Server or
cybersecurity
breach that could
have been prevented
by building a culture
of cybersecurity
12. Confidential Information 12
Data breach quiz
What percent of successful data breaches
do you think involve stolen or compromised
passwords?
A. 27%
B. 39%
C. 54%
D. 81%
13. Confidential Information 13
Why you need a password manager
Shared networks and cloud computing are
becoming the standard
Databases are rich with a donor’s PII
information
High turnover and volunteer-based support
lead to poor password health
Board members are taking cybersecurity
more seriously
Password managers help you stay secure and
focus on your #1 priority: your mission
81%
of successful data
breaches involve stolen or
compromised passwords
SOURCE: Verizon DBIR, 2019
15. Confidential Information 15
For employees, managing logins for
a multitude of accounts or donors can be
agonizing.
It’s understandable why many will turn to
unsecured methods just to get it over with.
16. Confidential Information 16
Common password pitfalls
Sharing logins among colleagues in
unsecured ways
Using weak, easy-to-hack passwords
Storing passwords in web browsers, sticky
notes, Excel, Google Sheets & Docs, etc.
Reusing personal usernames and
passwords for business
18. Confidential Information 18
Employees want to be part
of the solution
Help them understand their impact
Educate them on best practices
Give them tools to make it easy
79%
of respondents said they take
some personal responsibility for
the organization’s overall security
SOURCE: “THE 2020 STATE OF PASSWORD AND AUTHENTICATION SECURITY BEHAVIORS
REPORT,” PONEMON
19. Confidential Information 19
Password manager must-haves
Simple & easy to use
A password manager that’s simple for
admins and employees to use will
greatly improve adoption rates.
Convenient
Features such as autofill and syncing
across devices aren’t just
convenient—they increase productivity.
Robust security
Look for a password manager that has a
strong track record of security.
SSO integration
Many organizations adopt SSO for better,
safer sharing capabilities.
Dark web monitoring
Make sure the password manager monitors
the criminal underground for your logins and
immediately alerts you to change your
impacted passwords.
Password health
Look for password health features to help
employees understand their habits while
helping admins uncover gaps and take
corrective measures.
20. Confidential Information 20
Worry less about password hygiene. And
focus more on creating meaningful
connections with donors, volunteers, and
partners.
23. Confidential Information 23
Adoption
Ensuring the adoption of a password manager
among the existing people at the organization by
communicating the value to the mission.
Step 1:
24. Confidential Information 24
Acceptance
Onboard anyone new to the organization
immediately to the password manager to ensure
password health in the organization remains strong.
Remember, it only takes one compromised login to start a
breach, just like Hawaii’s Emergency Management Agency!
Step 2:
25. Confidential Information 25
Continuance
Monitor organizational health by utilizing Dark Web
Monitoring and Password Health scores for optimal
protection and success of your mission.
Step 3:
26. Confidential Information 26
Case study:
How NETA gained total password protection
& gave clients and employees peace of mind
In 2020, more people were working virtually than ever, and
security risks were at an all-time high for every organization.
NETA was no exception. Operating across multiple states,
NETA’s employees rely on a hybrid working environment, and
the organization constantly monitors its domain for threats.
While some applications that NETA relies upon require
stronger passwords, their leadership needed to see which
passwords were being reused and how they were being shared.
● Increased its company-wide Password Health
score from 70 to 86 in just three months.
● Ensures that important data is always shared
privately and securely and that authorized
employees can get the access they need
when they need it— even if the original
account owner is out of office.
● Uses unique passwords everywhere and
decreased their fear of breaches. NETA’s
clients and employees can rest assured that
information is always safe and secure.
Source: NETA Case Study
With Dashlane, NETA:
27. Confidential Information 27
Case study:
How VillageReach built a culture of
cybersecurity with Dashlane
VillageReach is a nonprofit with an inspiring mission to drive
equity and bring scalable, sustainable healthcare solutions to
rural areas in low-income countries.
Dashlane’s impact was felt immediately. Today, the
organization’s password health has improved by 122%, and it
continues to climb thanks to secure password sharing.
In addition to achieving those goals, implementing Dashlane
helped VillageReach foster a culture of security awareness.
d.
With Dashlane, VillageReach:
● Has more time to focus on their mission while
hands-off security monitoring secures their
tech stack
● Identified and cleaned up weak spots in their
password hygiene that posed a threat to their
donor database.
● Changed the way the entire organization
thinks about security—using Dashlane to
springboard into security awareness and
making security everyone’s responsibility
Source: VillageReach Case Study
32. Confidential Information 32
Thank you!
You have any follow-up questions about this webinar, or your plan and its features, you can email us at
community_success@dashlane.com.
For live support, a chat session can be started from 09:00 am to 06:00 pm EST, Monday through Friday by visiting the main page of our
Help Center-https://support.dashlane.com/ -, and clicking the pink icon located in the bottom-right corner of the page. team.