Skip to content

Offline Mode, policy to block jailbroken and rooted devices, and other improvements: catch up with NordPass in Q3 of 2025

Media and awards

We’re super happy to share three acknowledgments we’ve received this quarter for our work creating advanced yet intuitive password management solutions. 

Listed as #1 by Password Manager

We are honored to be named the Best Password Manager of 2025 by Gunnar Kallstrom, a Cyber Team Lead at a DOD contracting company. Kallstrom highlighted NordPass as a well-balanced solution with strong security and a smooth user experience for both personal and business use. As this is ingrained in our brand’s DNA, it’s great to be recognized for it. 

Geekflare picks us as #2 best enterprise password manager 

Geekflare recognized us for our ability to combine simplicity with robust security, adding to our growing list of accolades. Their team helps businesses find the best software for their needs, so it was a great pleasure to be named by them as the second-best enterprise password manager for 2025. According to Geekflare, NordPass makes a standout choice for those who seek straightforward password management with strong encryption.

PCMag’s pick for the best password manager

We’re thrilled to share that PCMag has honored us with its Editor’s Choice award for the second year in a row, naming NordPass the Best Premium Password Manager for 2025. We’re especially proud of their praise, calling NordPass “just about everything you’d want from a password manager.” Rest assured, we’re committed to keeping it that way!

What’s new with NordPass

We stay true to that promise by improving our password manager every quarter—whether it’s refining existing features or introducing new ones. Let’s take a look at what we’ve been working on over the past few months.

Offline Mode 

First up, we’re excited to introduce Offline Mode for our Business users. It’s a new feature that ensures you can access your vault even without an internet connection. Whether you’re traveling, dealing with an internet outage, or working in a network-restricted area, you’ll still have secure, read-only access to all your credentials when you need them most. This feature is currently available only on mobile devices, but we’re excited to roll it out to the desktop app and browser extensions soon.

This eliminates the need for risky workarounds like exporting your vault to an unsecure file, keeping your sensitive data protected within the encrypted NordPass environment at all times.

1-inner-asset-Offline Mode

Block jailbroken and rooted devices

NordPass now has a new default policy option that blocks access to the NordPass app on rooted Android and jailbroken iOS devices. Such devices pose a higher risk of data leakage, app tampering, and other security breaches. So, with this feature, you’ll enforce security and maintain the integrity of the application. However, if there’s a need, your organization’s Owners and Admins can allow usage on those devices.

2-inner-asset-Block jailbroken

Business Account session management

With the next phase of Business Account session management, we’re giving you even more control over your organization’s security. This feature provides Admins with a complete overview of all active user sessions across the organization, including details about those sessions, like device, platform, IP address, and the last login. This enhanced visibility empowers you to take immediate action—if you spot any suspicious activity, you can instantly revoke members’ sessions, either all at once or in separate sessions, to protect your company’s data.

3-inner-asset-session management

Enhancing the autofill experience for Android users 

We upgraded the URL linking to the items on the Android NordPass app. Now, if the website is not linked to the item on the app, NordPass autofill will suggest that the user add the URL to the NordPass item.

Similarly, you can now use autofill to copy NordPass’ built-in TOTP code to the clipboard once it is generated to streamline the logging process without interruption.

Making the B2B onboarding process more intuitive 

We continuously strive to improve and make our product more intuitive. Onboarding is a crucial part of this equation—if you can’t get through the onboarding without hiccups, will the product actually be intuitive? With that in mind, we revised our B2B onboarding process, tweaking the necessary parts to make the flow as seamless as possible.

Other minor improvements

But that’s not all! We also did some other minor product touch-ups to make your experience better:

  • We’ve rolled out performance improvements to the Sharing Hub, ensuring a faster and more reliable experience.

  • Finding what you need is now easier with our smarter search. It now understands non-exact titles, so you can find an item like “Bayern München” even if you just type “Munchen.”

  • Lastly, we’ve introduced new in-app privacy settings, giving you clear and direct control over your data tracking preferences.

Bottom line

Well, that’s a wrap! This quarter was busy mainly with feature updates and experience enhancements—we hope you have already made the best use of them!

Just before you go, a quick note. Recently, our team has noticed an increased number of scams offering help through fake NordPass phone numbers. We want to remind you that we only provide customer support through chats and emails. That’s all—see you next quarter!

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

What is Privileged Access Management (PAM)?

Privileged Access Management (PAM) is a security solution designed to protect a business by monitoring, detecting, and preventing unauthorized access to its most critical resources. The main objective of PAM is to ensure that individuals are granted only the minimum level of access required to perform their jobs, which significantly helps in preventing data breaches.

What is a Privileged Account?

A privileged account is any account that has more permissions and access rights than a standard user account. These accounts can take several forms, including:

  • Superuser accounts: These accounts, such as ‘root’ on Linux or ‘Administrator’ on Windows, have virtually unrestricted access to the system.
  • Domain administrator accounts: These accounts possess the highest level of control across an entire network domain.
  • Local administrator accounts: These provide full control over a specific server or workstation.
  • Application administrator accounts: These are used to manage specific software and its associated data.
  • Business privileged user accounts: These accounts grant high-level access based on a person’s specific job function, such as roles in finance or human resources.
  • Emergency accounts: Also known as ‘break-glass’ accounts, they provide temporary administrator access during a crisis or disaster.

The Core Principles of PAM

An effective Privileged Access Management strategy is built on three fundamental principles:

  1. Principle of Least Privilege (PoLP): This is the cornerstone of a robust security strategy. It dictates that users and systems should only be given the bare minimum access they need to perform their duties.
  2. Just-in-Time (JIT) access: This principle eliminates the need for users to have powerful permissions around the clock. Instead, elevated access is granted on-demand for a specific task and a limited time, and is automatically revoked once the task is complete.
  3. Continuous monitoring and auditing: This involves privileged session management (PSM), which actively monitors, records, and controls all activity that occurs during a privileged session. This creates a clear, unalterable audit trail for accountability and investigation.

Why is PAM Important?

Implementing a PAM solution is a crucial business decision that provides benefits in three key areas:

  • Mitigating cyber risks: PAM prevents unauthorized parties from gaining elevated access, halting lateral movement in a network during a breach, and neutralizing ransomware attacks by starving malware of the access it needs to spread. It also helps manage insider threats by limiting employee access to only what is required for their jobs.
  • Achieving regulatory compliance: Many regulations, such as SOX, HIPAA, and PCI DSS, require proof of effective security measures. PAM solutions provide detailed session logs and audit trails that serve as concrete evidence for auditors.
  • Improving operational efficiency: PAM solutions automate the manual, time-consuming tasks of managing privileged credentials, offering a centralized platform for password management, and streamlining the process of granting and revoking permissions.

PAM and Other Security Solutions

It’s important to understand how PAM fits into the broader cybersecurity landscape:

  • Identity and Access Management (IAM): This is the broadest category, managing the rights of every user in an organization. PAM and PIM (Privileged Identity Management) are more focused solutions that operate within the IAM framework.
  • Privileged Identity Management (PIM): PIM focuses on the user identity itself, managing the lifecycle of privileged user accounts and their permissions.
  • Privileged Access Management (PAM): PAM, on the other hand, focuses on controlling and monitoring access to critical resources and securing the connection to sensitive systems and data. You can think of PIM as securing the “who,” while PAM secures the “what” and “how.”

Key Features of PAM Software

An effective PAM solution should include:

  • Secure vaulting and password management: A centralized digital safe for all privileged credentials.
  • Session management and monitoring: The ability to monitor, record, and terminate suspicious sessions in real time, creating an unalterable record for investigations.
  • Access control and elevation: Granular control to enforce the principle of least privilege, allowing users to request temporary, elevated permissions only when needed.
  • Multi-factor authentication (MFA): A non-negotiable security layer that ensures accounts remain secure even if a password is stolen.

Best Practices for Implementing PAM

A successful PAM implementation requires a thoughtful strategy, including:

  • Implementing least privilege access and a zero-trust model.
  • Using strong authentication, with MFA on every privileged account.
  • Monitoring and auditing all activities through session management features.
  • Controlling the credentials lifecycle with unique, strong passwords stored in an encrypted vault.
  • Educating users on the importance of these security controls.

How NordPass Can Help

NordPass can be a valuable tool for building a PAM suite, assisting organizations with their credential management challenges. With NordPass, you can:

  • Securely store, share, and manage credentials in an encrypted vault using the XChaCha20 encryption algorithm.
  • Manage access rights for individuals and groups.
  • Set company-wide password rules and provide tools for generating and storing strong passwords.
  • Strengthen authentication by requiring MFA and integrating with existing SSO providers.
  • Monitor login activity in real-time with detailed audit logs.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

How to recover your hacked Facebook account

This article provides a guide on how to recover a compromised Facebook account, outlining steps for two main scenarios: when you still have access, and when you are completely locked out. It also includes advice for securing your account afterward to prevent future attacks.

If You Still Have Access to Your Account

If you can still log in, you must act quickly to secure your account.

  • Change Your Password: Create a new, strong password immediately.
  • Log Out of All Devices: In your security settings, you can force a log-out on all devices that have ever been logged into your account.
  • Review Connected Apps: Check for any apps you don’t recognize and remove them.

If You Are Completely Locked Out

If a hacker has changed your login information, use Facebook’s official recovery tool to regain access.

  1. Navigate to the Facebook recovery page: https://www.facebook.com/hacked.
  2. Follow the on-screen instructions, which will guide you through a process to identify your account and verify your identity.
  3. Important: Avoid using any third-party services that claim to recover your account, as these are often scams.

How to Prevent Future Hacks

Once you’ve regained control of your account, take these steps to make it more secure.

  • Enable Multi-Factor Authentication (MFA): This adds an extra layer of security, requiring a code from your phone or another device in addition to your password.
  • Secure Your Email: Ensure the email account linked to your Facebook profile is also secure, as hackers can use it to reset your password.
  • Notify Your Contacts: Inform friends and family that your account was compromised so they can be aware of any malicious messages sent from it.
  • Use a Password Manager: Consider using a password manager to generate and store strong, unique passwords for all your online accounts.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

The Importance of SaaS Data Loss Prevention (DLP)

The increasing use of Software as a Service (SaaS) applications in modern businesses has created a major challenge for data security. While SaaS tools are excellent for collaboration, they also spread sensitive data across multiple platforms, significantly increasing the risk of data breaches.

Challenges to Modern Data Security

Traditional, on-premise DLP solutions are no longer effective in this cloud-centric world. The key challenges to modern data security include:

  • Shadow IT: The widespread use of unapproved or unmonitored applications.
  • Poor Visibility: Difficulty in tracking where sensitive data is going.
  • Identity-based Attacks: Hackers targeting user accounts to gain access to data.

Best Practices for SaaS DLP

To combat these threats, a new approach is needed. Best practices for SaaS DLP include:

  • Data Classification: Identifying and categorizing all sensitive information.
  • Access Control: Implementing the principle of “least privilege,” where users only have access to the data they absolutely need.
  • Real-time Monitoring: Continuously watching for suspicious activity within SaaS applications.

The article introduces a “browser-first” DLP strategy, which aims to enforce security where most work happens—in the browser. This method provides real-time protection without negatively impacting employee productivity. NordLayer’s upcoming Enterprise Browser is presented as a purpose-built solution to address these challenges.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Deep Web vs. Dark Web: Understanding the Difference

This article clarifies the common confusion between the deep web and the dark web, explaining that they are distinct parts of the internet. The deep web is a vast, hidden part of the internet that is not indexed by standard search engines, while the dark web is a much smaller, intentional hidden part of the internet that requires special software to access.

What is the Deep Web?

The deep web makes up the majority of the internet, containing content that is behind login portals, paywalls, or exists in databases. This includes your email account, online banking statements, and private company intranets. Access to this information is restricted for security and privacy reasons, but it is not inherently malicious.

What is the Dark Web?

The dark web is a small fraction of the deep web, designed to be anonymous and untraceable. It can only be accessed using specialized browsers like Tor. The dark web is often associated with illegal activities, such as drug trafficking, cybercrime, and the sale of stolen data. However, it also has legitimate uses, such as providing a platform for journalists and activists in countries with strict censorship.

Key Differences

The article provides a simple analogy to help distinguish between the two:

  • Surface Web: The part of the internet you can access with a standard browser and find using search engines (e.g., this blog post).
  • Deep Web: The part of the internet you cannot find with a search engine and that requires specific credentials or a direct URL to access (e.g., your online banking portal).
  • Dark Web: A small, private part of the deep web that requires specific software to enter and is designed for anonymity.

Understanding these distinctions is crucial for both personal and corporate security, as it helps in identifying where real threats may be lurking.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×