{"id":112842,"date":"2025-07-08T17:37:01","date_gmt":"2025-07-08T09:37:01","guid":{"rendered":"https:\/\/version-2.com\/?p=112842"},"modified":"2025-07-04T17:41:59","modified_gmt":"2025-07-04T09:41:59","slug":"the-changing-dna-of-organized-crime-not-so-secret-business-passwords-and-ux-ui-updates-catch-up-with-nordpass-in-q2-of-2025","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2025\/07\/the-changing-dna-of-organized-crime-not-so-secret-business-passwords-and-ux-ui-updates-catch-up-with-nordpass-in-q2-of-2025\/","title":{"rendered":"The changing DNA of organized crime, Not-So-Secret Business Passwords, and UX\/UI updates: catch up with NordPass in Q2 of 2025"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"112842\" class=\"elementor elementor-112842\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2493f1c elementor-widget elementor-widget-text-editor\" data-id=\"2493f1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/f66a86ae2a\/cover-q2-comms-1062x597.png\/m\/828x0\/filters:quality(60):format(avif)\" width=\"828\" height=\"465\" \/><\/p><div class=\"Article_wrapper__8_7eU [&amp;&gt;*+*]:mt-12\"><div class=\"richtext\"><h2 id=\"media-and-awards\" class=\"heading-xl text-primary\">Media and awards<\/h2><p class=\"body-md text-primary\">Over the past few months, we have received quite a few awards. It&#8217;s a great honor to be recognized for our work creating advanced yet easy-to-use cybersecurity solutions.<\/p><h3 id=\"gqs-pick-for-the-best-password-manager\" class=\"heading-lg text-primary\">GQ&#8217;s pick for the best password manager<\/h3><p class=\"body-md text-primary\">To our great joy, the GQ team selected <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out underline text-success hover:text-primary active:text-success focus-visible:text-green-900\" href=\"https:\/\/www.gq-magazine.co.uk\/lifestyle\/gallery\/best-password-manager\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"NordPass as the best overall password manager\" data-testid=\"nordpass-as-the-best-overall-password-manager-in-blog-post-single\" data-link-full-refresh=\"true\">NordPass as the best overall password manager<\/a> this year. GQ tests password managers based on price, ease of setup, and the quality of different features like autofill or password sharing. They noted that NordPass offers an easy-to-use interface, many features, and a good free tier.<\/p><h3 id=\"american-business-stevie-bronze-medal\" class=\"heading-lg text-primary\">American Business Stevie Bronze Medal<\/h3><p class=\"body-md text-primary\">Here at NordPass, we strive to bring our users the best possible experience. So when there&#8217;s an unexpected hiccup or issue, our amazing Customer Support team is there to help 24\/7. It was a great pleasure to be recognized by the American Business Stevie Awards with the <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out underline text-success hover:text-primary active:text-success focus-visible:text-green-900\" href=\"https:\/\/stevieawards.com\/aba\/customer-service-awards-2\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"Bronze Medal for Customer Support Department of the Year\" data-testid=\"bronze-medal-for-customer-support-department-of-the-year-in-blog-post-single\" data-link-full-refresh=\"true\">Bronze Medal for Customer Support Department of the Year.<\/a><\/p><h3 id=\"cybertech-category-winner-of-the-global-tech-awards\" class=\"heading-lg text-primary\">CyberTech category winner of the Global Tech Awards<\/h3><p class=\"body-md text-primary\">Not a day goes by that we don&#8217;t think about how to improve and make cybersecurity effortless for individuals and companies. So, our team is truly happy to be recognized for excellence in the <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out underline text-success hover:text-primary active:text-success focus-visible:text-green-900\" href=\"https:\/\/www.globaltechaward.com\/winners?p=4\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"Cyber Security Technology category at this year's Global Tech Awards\" data-testid=\"cyber-security-technology-category-at-this-years-global-tech-awards-in-blog-post-single\" data-link-full-refresh=\"true\">Cyber Security Technology category at this year&#8217;s Global Tech Awards<\/a>. The selection criteria include technical quality, user experience, scalability, social impact, and more.<\/p><h3>\u00a0<\/h3><h3 id=\"global-infosec-award-for-passwordless-authentication\" class=\"heading-lg text-primary\">Global InfoSec Award for Passwordless Authentication<\/h3><p class=\"body-md text-primary\">Lastly, the Global InfoSec Awards recognized <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out underline text-success hover:text-primary active:text-success focus-visible:text-green-900\" href=\"https:\/\/www.globenewswire.com\/news-release\/2025\/05\/13\/3080239\/0\/en\/NordPass-wins-Global-InfoSec-Award-for-Passwordless-Authenticator.html\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"NordPass for it's passwordless authentication\" data-testid=\"nordpass-for-its-passwordless-authentication-in-blog-post-single\" data-link-full-refresh=\"true\">NordPass for its passwordless authentication<\/a>. This award celebrates NordPass&#8217; commitment to advancing secure, password-free authentication solutions. With our passwordless authentication platform, Authopia, enterprises can enable seamless, passkey-based logins, help businesses reduce account takeover risks, and improve the user experience.<\/p><p class=\"body-md text-primary\">We have a passwordless login for our vault as well, so our users can access their accounts via biometrics. Additionally, NordPass supports cross-platform passkey storage and integration with identity providers like Google Workspace or Azure Active Directory.<\/p><h2>\u00a0<\/h2><h2 id=\"freshest-nordpass-updates-and-improvements\" class=\"heading-xl text-primary\">Freshest NordPass updates and improvements<\/h2><p class=\"body-md text-primary\">Okay, now let&#8217;s get back to the core of NordPass\u2014the product itself\u2014and see what improvements and updates our team has made.<\/p><h3>\u00a0<\/h3><h3 id=\"sharing-hub-update\" class=\"heading-lg text-primary\">Sharing Hub update<\/h3><p class=\"body-md text-primary\">As organizations grow, the question of sharing becomes more prominent. More and more credentials are moved around teams and departments, often informally or without consistent oversight.<\/p><p class=\"body-md text-primary\">To tackle this problem, we released Sharing Hub this autumn, which included a viewing option that allowed organization Owners to see which items could be accessed and by whom, as well as who had shared or created them. This spring, we significantly improved the feature. Now, Owners can control access to all shared company credentials by granting, modifying, or revoking access rights for any shared item or folder as needed. They can also transfer ownership if required, all from a single place\u2014the NordPass Admin Panel.<\/p><p class=\"body-md text-primary\">\u00a0<\/p><\/div><p><img decoding=\"async\" class=\"mx-auto\" style=\"color: transparent;\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1492x600\/9a98c6c57f\/1-inner-asset-sharing-hub-746x300.png\/m\/1200x0\/filters:quality(60):format(avif)\" sizes=\"(max-width: 376px) 100vw, (max-width: 743px) 60vw, (max-width: 1129px) 50vw, 40vw\" srcset=\"https:\/\/a.storyblok.com\/f\/157611\/1492x600\/9a98c6c57f\/1-inner-asset-sharing-hub-746x300.png\/m\/256x0\/filters:quality(60):format(avif) 256w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/9a98c6c57f\/1-inner-asset-sharing-hub-746x300.png\/m\/360x0\/filters:quality(60):format(avif) 360w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/9a98c6c57f\/1-inner-asset-sharing-hub-746x300.png\/m\/384x0\/filters:quality(60):format(avif) 384w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/9a98c6c57f\/1-inner-asset-sharing-hub-746x300.png\/m\/430x0\/filters:quality(60):format(avif) 430w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/9a98c6c57f\/1-inner-asset-sharing-hub-746x300.png\/m\/640x0\/filters:quality(60):format(avif) 640w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/9a98c6c57f\/1-inner-asset-sharing-hub-746x300.png\/m\/750x0\/filters:quality(60):format(avif) 750w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/9a98c6c57f\/1-inner-asset-sharing-hub-746x300.png\/m\/828x0\/filters:quality(60):format(avif) 828w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/9a98c6c57f\/1-inner-asset-sharing-hub-746x300.png\/m\/1080x0\/filters:quality(60):format(avif) 1080w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/9a98c6c57f\/1-inner-asset-sharing-hub-746x300.png\/m\/1200x0\/filters:quality(60):format(avif) 1200w\" alt=\"Sharing hub\" width=\"746\" height=\"300\" data-nimg=\"1\" \/><\/p><div class=\"richtext\"><h3>\u00a0<\/h3><h3 id=\"whats-new-with-the-company-wide-data-breach-scanner\" class=\"heading-lg text-primary\">What&#8217;s new with the company-wide Data Breach Scanner?<\/h3><p class=\"body-md text-primary\">Similarly, we have made significant improvements to our tried-and-true Data Breach Scanner.<\/p><p class=\"body-md text-primary\">To ensure that your company gets the most from NordPass, we will now monitor your company&#8217;s domain based on the organization Owner&#8217;s email address, eliminating the need for separate verification. Note that in this case, you&#8217;ll only get notifications about the breaches but no detailed information on them. If you want to get that additional info, you&#8217;ll have to add your domain and verify it. As for domain verification, it&#8217;s now seamless and automated.<\/p><p class=\"body-md text-primary\">We also gave the breach report a facelift. Now, you&#8217;ll find a detailed description of the breach, the data it compromised, a list of affected organization members, and some recommendations for resolving the breach. In addition, admins can now see which breaches have been resolved and by whom.<\/p><p class=\"body-md text-primary\">Lastly, the &#8220;Breach details&#8221; list is now easier to navigate because it clearly distinguishes members&#8217; statuses within the NordPass organization. It shows whether members are uninvited, suspended, or Admins, and which groups they belong to.<\/p><\/div><p><img decoding=\"async\" class=\"mx-auto\" style=\"color: transparent;\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1492x600\/639110f51f\/2-inner-asset-data-breach-746x300.png\/m\/1200x0\/filters:quality(60):format(avif)\" sizes=\"(max-width: 376px) 100vw, (max-width: 743px) 60vw, (max-width: 1129px) 50vw, 40vw\" srcset=\"https:\/\/a.storyblok.com\/f\/157611\/1492x600\/639110f51f\/2-inner-asset-data-breach-746x300.png\/m\/256x0\/filters:quality(60):format(avif) 256w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/639110f51f\/2-inner-asset-data-breach-746x300.png\/m\/360x0\/filters:quality(60):format(avif) 360w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/639110f51f\/2-inner-asset-data-breach-746x300.png\/m\/384x0\/filters:quality(60):format(avif) 384w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/639110f51f\/2-inner-asset-data-breach-746x300.png\/m\/430x0\/filters:quality(60):format(avif) 430w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/639110f51f\/2-inner-asset-data-breach-746x300.png\/m\/640x0\/filters:quality(60):format(avif) 640w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/639110f51f\/2-inner-asset-data-breach-746x300.png\/m\/750x0\/filters:quality(60):format(avif) 750w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/639110f51f\/2-inner-asset-data-breach-746x300.png\/m\/828x0\/filters:quality(60):format(avif) 828w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/639110f51f\/2-inner-asset-data-breach-746x300.png\/m\/1080x0\/filters:quality(60):format(avif) 1080w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/639110f51f\/2-inner-asset-data-breach-746x300.png\/m\/1200x0\/filters:quality(60):format(avif) 1200w\" alt=\"Data Breach\" width=\"746\" height=\"300\" data-nimg=\"1\" \/><\/p><div class=\"richtext\"><h3>\u00a0<\/h3><h3 id=\"business-account-session-management\" class=\"heading-lg text-primary\">Business Account session management<\/h3><p class=\"body-md text-primary\">From now on, organizations can set a 1-hour, 4-hour, 1-day, 7-day, 30-day, or custom time interval, after which the member session will end, and they will be logged out from NordPass. To continue using NordPass, the member will need to log in again, either using SSO or their Business Account credentials, and then verify their account with MFA, Master Password, or biometrics. For optimal security, we recommend setting the interval to 7 days. After this time, the member will need to log in again.<\/p><h3>\u00a0<\/h3><h3 id=\"filtering-the-activity-log\" class=\"heading-lg text-primary\">Filtering the Activity Log<\/h3><p class=\"body-md text-primary\">Up next is the filtering improvement for the Activity Log feature. The Activity Log lets organizations gain insight into user activities by tracking access updates and identifying unusual behavior. From now on, Admins and Owners can search the Activity Log by the item ID, allowing them to streamline security investigative processes by quickly identifying suspicious activities. This filtering option, together with filtering by member and date, allows admins to see all actions made to a particular item.<\/p><\/div><p><img loading=\"lazy\" decoding=\"async\" class=\"mx-auto\" style=\"color: transparent;\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1492x600\/6952fcf4f9\/3-inner-asset-activity-log-746x300.png\/m\/1200x0\/filters:quality(60):format(avif)\" sizes=\"(max-width: 376px) 100vw, (max-width: 743px) 60vw, (max-width: 1129px) 50vw, 40vw\" srcset=\"https:\/\/a.storyblok.com\/f\/157611\/1492x600\/6952fcf4f9\/3-inner-asset-activity-log-746x300.png\/m\/256x0\/filters:quality(60):format(avif) 256w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/6952fcf4f9\/3-inner-asset-activity-log-746x300.png\/m\/360x0\/filters:quality(60):format(avif) 360w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/6952fcf4f9\/3-inner-asset-activity-log-746x300.png\/m\/384x0\/filters:quality(60):format(avif) 384w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/6952fcf4f9\/3-inner-asset-activity-log-746x300.png\/m\/430x0\/filters:quality(60):format(avif) 430w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/6952fcf4f9\/3-inner-asset-activity-log-746x300.png\/m\/640x0\/filters:quality(60):format(avif) 640w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/6952fcf4f9\/3-inner-asset-activity-log-746x300.png\/m\/750x0\/filters:quality(60):format(avif) 750w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/6952fcf4f9\/3-inner-asset-activity-log-746x300.png\/m\/828x0\/filters:quality(60):format(avif) 828w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/6952fcf4f9\/3-inner-asset-activity-log-746x300.png\/m\/1080x0\/filters:quality(60):format(avif) 1080w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/6952fcf4f9\/3-inner-asset-activity-log-746x300.png\/m\/1200x0\/filters:quality(60):format(avif) 1200w\" alt=\"activity log\" width=\"746\" height=\"300\" data-nimg=\"1\" \/><\/p><div class=\"richtext\"><h3>\u00a0<\/h3><h3 id=\"integration-with-microsoft-sentinel\" class=\"heading-lg text-primary\">Integration with Microsoft Sentinel<\/h3><p class=\"body-md text-primary\">By striving to build a seamless NordPass user experience, we have integrated with Microsoft Sentinel, an SIEM tool. From now on, our Enterprise customers can significantly strengthen their organization\u2019s ability to meet compliance objectives by maintaining audit trails.<\/p><p class=\"body-md text-primary\">This integration allows Enterprise users to export and access NordPass activity logs alongside the data from other systems within Microsoft Sentinel. In doing so, companies can gain a holistic view of their security posture, conduct analysis, and quickly detect and respond to potential threats.<\/p><h3>\u00a0<\/h3><h3 id=\"you-asked-and-we-delivered\" class=\"heading-lg text-primary\">You asked, and we delivered<\/h3><p class=\"body-md text-primary\">We are always eager to hear your feedback and improve accordingly. So, with that in mind, we ended last quarter with several user experience tweaks. Starting with the NordPass autofill icon, we have made 2 UX improvements:<\/p><ul class=\"leading-normal List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\">You can now easily tell if your vault is locked thanks to the improved NordPass autofill icon. If you want to unlock the vault, simply click on the icon to open the pop-up window where you can enter your Master Password or use biometrics.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\">You can now turn off the NordPass autofill suggestions by clicking the icon. The choice will stay the same throughout the form you\u2019re filling in.<\/p><\/li><\/ul><\/div><p><img loading=\"lazy\" decoding=\"async\" class=\"mx-auto\" style=\"color: transparent; background-size: cover; background-position: 50% 50%; background-repeat: no-repeat;\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1492x600\/9a3feeb08f\/4-inner-asset-nordpass-autofill-icon-746x300.png\/m\/1200x0\/filters:quality(60):format(avif)\" sizes=\"(max-width: 376px) 100vw, (max-width: 743px) 60vw, (max-width: 1129px) 50vw, 40vw\" srcset=\"https:\/\/a.storyblok.com\/f\/157611\/1492x600\/9a3feeb08f\/4-inner-asset-nordpass-autofill-icon-746x300.png\/m\/256x0\/filters:quality(60):format(avif) 256w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/9a3feeb08f\/4-inner-asset-nordpass-autofill-icon-746x300.png\/m\/360x0\/filters:quality(60):format(avif) 360w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/9a3feeb08f\/4-inner-asset-nordpass-autofill-icon-746x300.png\/m\/384x0\/filters:quality(60):format(avif) 384w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/9a3feeb08f\/4-inner-asset-nordpass-autofill-icon-746x300.png\/m\/430x0\/filters:quality(60):format(avif) 430w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/9a3feeb08f\/4-inner-asset-nordpass-autofill-icon-746x300.png\/m\/640x0\/filters:quality(60):format(avif) 640w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/9a3feeb08f\/4-inner-asset-nordpass-autofill-icon-746x300.png\/m\/750x0\/filters:quality(60):format(avif) 750w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/9a3feeb08f\/4-inner-asset-nordpass-autofill-icon-746x300.png\/m\/828x0\/filters:quality(60):format(avif) 828w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/9a3feeb08f\/4-inner-asset-nordpass-autofill-icon-746x300.png\/m\/1080x0\/filters:quality(60):format(avif) 1080w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/9a3feeb08f\/4-inner-asset-nordpass-autofill-icon-746x300.png\/m\/1200x0\/filters:quality(60):format(avif) 1200w\" alt=\"autofill\" width=\"746\" height=\"300\" data-nimg=\"1\" \/><\/p><div class=\"richtext\"><h3>\u00a0<\/h3><h3 id=\"nordpass-interface-redesign\" class=\"heading-lg text-primary\">NordPass&#8217; interface redesign<\/h3><p class=\"body-md text-primary\">The vault interface across all our platforms and the Admin Panel are where our users primarily engage with and monitor their cybersecurity status. Therefore, we want to provide the most user-friendly experience possible. This quarter, we made some design changes to the iOS, Android, and other platforms to give the UI a more modern look and feel, in line with our NordPass rebranding, which we revealed last year. Additionally, all these platforms have seen usability improvements.<\/p><h2>\u00a0<\/h2><h2 id=\"research-and-other-reports\" class=\"heading-xl text-primary\">Research and other reports<\/h2><p class=\"body-md text-primary\">This quarter was equally rich with research and reports, ranging from our classic report on the most common passwords to a brand-new one on digital anxiety. So let&#8217;s see what we discovered:<\/p><h3>\u00a0<\/h3><h3 id=\"top-20-not-so-secret-business-passwords\" class=\"heading-lg text-primary\">TOP 20 Not-So-Secret Business Passwords<\/h3><p class=\"body-md text-primary\">Together with NordStellar, we&#8217;ve analyzed <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out underline text-success hover:text-primary active:text-success focus-visible:text-green-900\" href=\"\/en\/poor-company-passwords\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"the most common business passwords\" data-testid=\"the-most-common-business-passwords-in-blog-post-single\">the most common business passwords<\/a> from 11 industries to uncover the habits behind office doors. Unfortunately, the password patterns are poor and truly not-so-secret. So poor, you might be able to guess the 3 most popular corporate passwords yourself. Yes, they\u2019re &#8220;123456,&#8221; &#8220;123456789,&#8221; and &#8220;12345678.&#8221; If you guessed &#8220;password,&#8221; don&#8217;t worry, it&#8217;s on the list.<\/p><p class=\"body-md text-primary\">Our research also showed that using an email address as a password is just as common\u2014it&#8217;s convenient, yes, but it&#8217;s one of the quickest ways to give your business credentials to hackers. Similarly, many people use their names for work-related passwords\u2014another unfortunate practice that can expose the entire organization&#8217;s sensitive data to potential threats.<\/p><\/div><p><img loading=\"lazy\" decoding=\"async\" class=\"mx-auto\" style=\"color: transparent; background-size: cover; background-position: 50% 50%; background-repeat: no-repeat;\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1492x600\/46ca5aafbd\/5-inner-asset-top-20-not-so-secret-business-passwords-746x300.png\/m\/1200x0\/filters:quality(60):format(avif)\" sizes=\"(max-width: 376px) 100vw, (max-width: 743px) 60vw, (max-width: 1129px) 50vw, 40vw\" srcset=\"https:\/\/a.storyblok.com\/f\/157611\/1492x600\/46ca5aafbd\/5-inner-asset-top-20-not-so-secret-business-passwords-746x300.png\/m\/256x0\/filters:quality(60):format(avif) 256w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/46ca5aafbd\/5-inner-asset-top-20-not-so-secret-business-passwords-746x300.png\/m\/360x0\/filters:quality(60):format(avif) 360w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/46ca5aafbd\/5-inner-asset-top-20-not-so-secret-business-passwords-746x300.png\/m\/384x0\/filters:quality(60):format(avif) 384w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/46ca5aafbd\/5-inner-asset-top-20-not-so-secret-business-passwords-746x300.png\/m\/430x0\/filters:quality(60):format(avif) 430w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/46ca5aafbd\/5-inner-asset-top-20-not-so-secret-business-passwords-746x300.png\/m\/640x0\/filters:quality(60):format(avif) 640w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/46ca5aafbd\/5-inner-asset-top-20-not-so-secret-business-passwords-746x300.png\/m\/750x0\/filters:quality(60):format(avif) 750w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/46ca5aafbd\/5-inner-asset-top-20-not-so-secret-business-passwords-746x300.png\/m\/828x0\/filters:quality(60):format(avif) 828w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/46ca5aafbd\/5-inner-asset-top-20-not-so-secret-business-passwords-746x300.png\/m\/1080x0\/filters:quality(60):format(avif) 1080w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/46ca5aafbd\/5-inner-asset-top-20-not-so-secret-business-passwords-746x300.png\/m\/1200x0\/filters:quality(60):format(avif) 1200w\" alt=\"top 20 not so secret bisiness passwords\" width=\"746\" height=\"300\" data-nimg=\"1\" \/><\/p><div class=\"richtext\"><h3>\u00a0<\/h3><h3 id=\"top-200-most-common-passwords\" class=\"heading-lg text-primary\">TOP 200 Most Common Passwords<\/h3><p class=\"body-md text-primary\">Ah, and yes, what&#8217;s NordPass without our annual <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out underline text-success hover:text-primary active:text-success focus-visible:text-green-900\" href=\"\/en\/most-common-passwords-list\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"TOP 200 Most Common Password research\" data-testid=\"top-200-most-common-password-research-in-blog-post-single\">TOP 200 Most Common Passwords research<\/a>? It&#8217;s our sixth year in a row\u2014this time, in collaboration with NordStellar\u2014analyzing people&#8217;s password habits. And not so shockingly, they are still bad.<\/p><p class=\"body-md text-primary\">We researched passwords from 44 countries that were stolen by malware or exposed in the data leaks. Because they were leaked with email addresses in most cases, we could distinguish corporate and personal credentials by domain name, gaining more insight into both areas.<\/p><\/div><p><img loading=\"lazy\" decoding=\"async\" class=\"mx-auto\" style=\"color: transparent; background-size: cover; background-position: 50% 50%; background-repeat: no-repeat;\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1492x600\/c8bc17753d\/6-inner-asset-top-200-most-common-passwords-746x300.png\/m\/1200x0\/filters:quality(60):format(avif)\" sizes=\"(max-width: 376px) 100vw, (max-width: 743px) 60vw, (max-width: 1129px) 50vw, 40vw\" srcset=\"https:\/\/a.storyblok.com\/f\/157611\/1492x600\/c8bc17753d\/6-inner-asset-top-200-most-common-passwords-746x300.png\/m\/256x0\/filters:quality(60):format(avif) 256w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/c8bc17753d\/6-inner-asset-top-200-most-common-passwords-746x300.png\/m\/360x0\/filters:quality(60):format(avif) 360w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/c8bc17753d\/6-inner-asset-top-200-most-common-passwords-746x300.png\/m\/384x0\/filters:quality(60):format(avif) 384w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/c8bc17753d\/6-inner-asset-top-200-most-common-passwords-746x300.png\/m\/430x0\/filters:quality(60):format(avif) 430w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/c8bc17753d\/6-inner-asset-top-200-most-common-passwords-746x300.png\/m\/640x0\/filters:quality(60):format(avif) 640w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/c8bc17753d\/6-inner-asset-top-200-most-common-passwords-746x300.png\/m\/750x0\/filters:quality(60):format(avif) 750w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/c8bc17753d\/6-inner-asset-top-200-most-common-passwords-746x300.png\/m\/828x0\/filters:quality(60):format(avif) 828w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/c8bc17753d\/6-inner-asset-top-200-most-common-passwords-746x300.png\/m\/1080x0\/filters:quality(60):format(avif) 1080w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/c8bc17753d\/6-inner-asset-top-200-most-common-passwords-746x300.png\/m\/1200x0\/filters:quality(60):format(avif) 1200w\" alt=\"Top 200 most common passwords\" width=\"746\" height=\"300\" data-nimg=\"1\" \/><\/p><div class=\"richtext\"><h3>\u00a0<\/h3><h3 id=\"digital-anxiety-report\" class=\"heading-lg text-primary\">Digital Anxiety Report<\/h3><p class=\"body-md text-primary\">This quarter, we tapped into a new field and released <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out underline text-success hover:text-primary active:text-success focus-visible:text-green-900\" href=\"\/en\/digital-stress-management\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"a study on digital anxiety\" data-testid=\"a-study-on-digital-anxiety-in-blog-post-single\">a study on digital anxiety<\/a>. We wanted to see how many people struggle with it and what&#8217;s causing it. The results, or reasons for digital anxiety, are probably those that most people will relate to.<\/p><p class=\"body-md text-primary\">Nearly 80% of people have digital anxiety, which mostly comes from the fear of facing cybersecurity issues like account takeover, identity theft, or scams. However, mild to moderate anxiety was reported due to excessive ads or lack of internet access. As it turns out, even minor inconveniences online can take a toll on our mental well-being.<\/p><h3>\u00a0<\/h3><h3 id=\"stop-reusing-passwords\" class=\"heading-lg text-primary\">Stop reusing passwords<\/h3><p class=\"body-md text-primary\">Do you have that one good and faithful password you&#8217;ve used since high school? Maybe it&#8217;s scaterrrboi!94, which ticks most sites&#8217; requirements for password length and includes a special character and two numbers\u2014why change it? Well, according to <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out underline text-success hover:text-primary active:text-success focus-visible:text-green-900\" href=\"\/en\/blog\/stop-reusing-passwords\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"our recent survey\" data-testid=\"our-recent-survey-in-blog-post-single\">our recent survey<\/a>, it turns out that it&#8217;s common to reuse passwords. Learn more about why people still reuse passwords in 2025 and why this habit poses a formidable threat to cybersecurity.<\/p><h3>\u00a0<\/h3><h3 id=\"ex-hacker-5-cyber-threats-that-password-managers-protect-against\" class=\"heading-lg text-primary\">Ex-hacker: 5 cyber threats that password managers protect against<\/h3><p class=\"body-md text-primary\">We seek to spread knowledge about cybersecurity in every possible way, and sometimes, showing the nitty-gritty behind it is just what might be needed. So this spring, we collaborated with Daniel Kelley, a reformed black hat hacker, to understand the <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out underline text-success hover:text-primary active:text-success focus-visible:text-green-900\" href=\"\/en\/blog\/threats-password-managers-protect-against\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"5 main cyberattacks thath can be prevented using a password manager\" data-testid=\"5-main-cyberattacks-thath-can-be-prevented-using-a-password-manager-in-blog-post-single\">5 main cyberattacks that can be prevented using a password manager<\/a>. These threats include phishing, credential stuffing, brute-force attacks, keyloggers, and database leaks. By revealing the inner workings of these attacks, Daniel shed light on why relying on a password manager is vital.<\/p><\/div><p><img loading=\"lazy\" decoding=\"async\" class=\"mx-auto\" style=\"color: transparent; background-size: cover; background-position: 50% 50%; background-repeat: no-repeat;\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1492x600\/451600a355\/7-inner-asset-5-cyber-threats-746x300.png\/m\/1200x0\/filters:quality(60):format(avif)\" sizes=\"(max-width: 376px) 100vw, (max-width: 743px) 60vw, (max-width: 1129px) 50vw, 40vw\" srcset=\"https:\/\/a.storyblok.com\/f\/157611\/1492x600\/451600a355\/7-inner-asset-5-cyber-threats-746x300.png\/m\/256x0\/filters:quality(60):format(avif) 256w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/451600a355\/7-inner-asset-5-cyber-threats-746x300.png\/m\/360x0\/filters:quality(60):format(avif) 360w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/451600a355\/7-inner-asset-5-cyber-threats-746x300.png\/m\/384x0\/filters:quality(60):format(avif) 384w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/451600a355\/7-inner-asset-5-cyber-threats-746x300.png\/m\/430x0\/filters:quality(60):format(avif) 430w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/451600a355\/7-inner-asset-5-cyber-threats-746x300.png\/m\/640x0\/filters:quality(60):format(avif) 640w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/451600a355\/7-inner-asset-5-cyber-threats-746x300.png\/m\/750x0\/filters:quality(60):format(avif) 750w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/451600a355\/7-inner-asset-5-cyber-threats-746x300.png\/m\/828x0\/filters:quality(60):format(avif) 828w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/451600a355\/7-inner-asset-5-cyber-threats-746x300.png\/m\/1080x0\/filters:quality(60):format(avif) 1080w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/451600a355\/7-inner-asset-5-cyber-threats-746x300.png\/m\/1200x0\/filters:quality(60):format(avif) 1200w\" alt=\"Cyber threats\" width=\"746\" height=\"300\" data-nimg=\"1\" \/><\/p><div class=\"richtext\"><h3>\u00a0<\/h3><h3 id=\"2025-eu-socta-the-changing-dna-of-organized-crime\" class=\"heading-lg text-primary\">2025 EU-SOCTA: the changing DNA of organized crime<\/h3><p class=\"body-md text-primary\">The EU-SOCTA documented a serious shift in organized crime: it seeped into the online world, creating new hybrid and wholly virtual threats that require unprecedented strategies to tackle. These threats may be accelerating and becoming more dangerous and destabilizing.<\/p><p class=\"body-md text-primary\">For example, one of the biggest threats posed by serious and organized crime is the destabilization of the EU. Criminal organizations aim to reduce trust in the legal system and government by spreading violence, corruption, and illicit proceeds. They rely on digital innovations like AI to conceal their activities and make tracing crime back to its source harder.<\/p><p class=\"body-md text-primary\">Although the landscape painted by the EU-SOCTA might seem grim, it indicates potential future trends, allowing individuals and businesses alike to prepare for evolving risks. So, we took this opportunity to explain <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out underline text-success hover:text-primary active:text-success focus-visible:text-green-900\" href=\"\/en\/blog\/the-changing-dna-of-organized-crime-in-europe\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"how NordSecurity products, including NordPass, can help\" data-testid=\"how-nordsecurity-products-including-nordpass-can-help-in-blog-post-single\">how Nord Security products, including NordPass, can help<\/a>.<\/p><\/div><p><img loading=\"lazy\" decoding=\"async\" class=\"mx-auto\" style=\"color: transparent; background-size: cover; background-position: 50% 50%; background-repeat: no-repeat;\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1492x600\/0ab42557c6\/8-inner-asset-2025-eu-socta-746x300.png\/m\/1200x0\/filters:quality(60):format(avif)\" sizes=\"(max-width: 376px) 100vw, (max-width: 743px) 60vw, (max-width: 1129px) 50vw, 40vw\" srcset=\"https:\/\/a.storyblok.com\/f\/157611\/1492x600\/0ab42557c6\/8-inner-asset-2025-eu-socta-746x300.png\/m\/256x0\/filters:quality(60):format(avif) 256w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/0ab42557c6\/8-inner-asset-2025-eu-socta-746x300.png\/m\/360x0\/filters:quality(60):format(avif) 360w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/0ab42557c6\/8-inner-asset-2025-eu-socta-746x300.png\/m\/384x0\/filters:quality(60):format(avif) 384w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/0ab42557c6\/8-inner-asset-2025-eu-socta-746x300.png\/m\/430x0\/filters:quality(60):format(avif) 430w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/0ab42557c6\/8-inner-asset-2025-eu-socta-746x300.png\/m\/640x0\/filters:quality(60):format(avif) 640w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/0ab42557c6\/8-inner-asset-2025-eu-socta-746x300.png\/m\/750x0\/filters:quality(60):format(avif) 750w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/0ab42557c6\/8-inner-asset-2025-eu-socta-746x300.png\/m\/828x0\/filters:quality(60):format(avif) 828w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/0ab42557c6\/8-inner-asset-2025-eu-socta-746x300.png\/m\/1080x0\/filters:quality(60):format(avif) 1080w, https:\/\/a.storyblok.com\/f\/157611\/1492x600\/0ab42557c6\/8-inner-asset-2025-eu-socta-746x300.png\/m\/1200x0\/filters:quality(60):format(avif) 1200w\" alt=\"Breaking down SOCTA 2025\" width=\"746\" height=\"300\" data-nimg=\"1\" \/><\/p><div class=\"richtext\"><h2>\u00a0<\/h2><h2 id=\"bottom-line\" class=\"heading-xl text-primary\">Bottom line<\/h2><p class=\"body-md text-primary\">And that&#8217;s a wrap! This quarter was busy with research and product improvements. Yet one thing is clear: we&#8217;re not planning to stop this summer, so we&#8217;ll see you again in a few months to review what we\u2019ve been brewing. Stay safe with NordPass!<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63567\" class=\"elementor elementor-63567\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45e3ec76 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"45e3ec76\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-311e216d\" data-id=\"311e216d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d9a2e6f elementor-widget elementor-widget-text-editor\" data-id=\"3d9a2e6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordPass<br \/><\/strong>NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Media and awards Over the past few months, we have rece [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1305,973,1129,61],"tags":[1131,974,1077],"class_list":["post-112842","post","type-post","status-publish","format-standard","hentry","category-1305","category-nord-security","category-nordpass","category-press-release","tag-nordpass","tag-nord-security","tag-1077"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The changing DNA of organized crime, Not-So-Secret Business Passwords, and UX\/UI updates: catch up with NordPass in Q2 of 2025 - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordpass.com\/blog\/product-update-june-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The changing DNA of organized crime, Not-So-Secret Business Passwords, and UX\/UI updates: catch up with NordPass in Q2 of 2025 - Version 2\" \/>\n<meta property=\"og:description\" content=\"Media and awards Over the past few months, we have rece [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordpass.com\/blog\/product-update-june-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-08T09:37:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/f66a86ae2a\/cover-q2-comms-1062x597.png\/m\/828x0\/filters:quality(60):format(avif)\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/product-update-june-2025\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/07\\\/the-changing-dna-of-organized-crime-not-so-secret-business-passwords-and-ux-ui-updates-catch-up-with-nordpass-in-q2-of-2025\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"The changing DNA of organized crime, Not-So-Secret Business Passwords, and UX\\\/UI updates: catch up with NordPass in Q2 of 2025\",\"datePublished\":\"2025-07-08T09:37:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/07\\\/the-changing-dna-of-organized-crime-not-so-secret-business-passwords-and-ux-ui-updates-catch-up-with-nordpass-in-q2-of-2025\\\/\"},\"wordCount\":1816,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/product-update-june-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/f66a86ae2a\\\/cover-q2-comms-1062x597.png\\\/m\\\/828x0\\\/filters:quality(60):format(avif)\",\"keywords\":[\"NordPass\",\"Nord Security\",\"2025\"],\"articleSection\":[\"2025\",\"Nord Security\",\"NordPass\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/07\\\/the-changing-dna-of-organized-crime-not-so-secret-business-passwords-and-ux-ui-updates-catch-up-with-nordpass-in-q2-of-2025\\\/\",\"url\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/product-update-june-2025\\\/\",\"name\":\"The changing DNA of organized crime, Not-So-Secret Business Passwords, and UX\\\/UI updates: catch up with NordPass in Q2 of 2025 - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/product-update-june-2025\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/product-update-june-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/f66a86ae2a\\\/cover-q2-comms-1062x597.png\\\/m\\\/828x0\\\/filters:quality(60):format(avif)\",\"datePublished\":\"2025-07-08T09:37:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/product-update-june-2025\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordpass.com\\\/blog\\\/product-update-june-2025\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/product-update-june-2025\\\/#primaryimage\",\"url\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/f66a86ae2a\\\/cover-q2-comms-1062x597.png\\\/m\\\/828x0\\\/filters:quality(60):format(avif)\",\"contentUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/f66a86ae2a\\\/cover-q2-comms-1062x597.png\\\/m\\\/828x0\\\/filters:quality(60):format(avif)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/product-update-june-2025\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The changing DNA of organized crime, Not-So-Secret Business Passwords, and UX\\\/UI updates: catch up with NordPass in Q2 of 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The changing DNA of organized crime, Not-So-Secret Business Passwords, and UX\/UI updates: catch up with NordPass in Q2 of 2025 - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordpass.com\/blog\/product-update-june-2025\/","og_locale":"en_US","og_type":"article","og_title":"The changing DNA of organized crime, Not-So-Secret Business Passwords, and UX\/UI updates: catch up with NordPass in Q2 of 2025 - Version 2","og_description":"Media and awards Over the past few months, we have rece [&hellip;]","og_url":"https:\/\/nordpass.com\/blog\/product-update-june-2025\/","og_site_name":"Version 2","article_published_time":"2025-07-08T09:37:01+00:00","og_image":[{"url":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/f66a86ae2a\/cover-q2-comms-1062x597.png\/m\/828x0\/filters:quality(60):format(avif)","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordpass.com\/blog\/product-update-june-2025\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/07\/the-changing-dna-of-organized-crime-not-so-secret-business-passwords-and-ux-ui-updates-catch-up-with-nordpass-in-q2-of-2025\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"The changing DNA of organized crime, Not-So-Secret Business Passwords, and UX\/UI updates: catch up with NordPass in Q2 of 2025","datePublished":"2025-07-08T09:37:01+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/07\/the-changing-dna-of-organized-crime-not-so-secret-business-passwords-and-ux-ui-updates-catch-up-with-nordpass-in-q2-of-2025\/"},"wordCount":1816,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordpass.com\/blog\/product-update-june-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/f66a86ae2a\/cover-q2-comms-1062x597.png\/m\/828x0\/filters:quality(60):format(avif)","keywords":["NordPass","Nord Security","2025"],"articleSection":["2025","Nord Security","NordPass","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/07\/the-changing-dna-of-organized-crime-not-so-secret-business-passwords-and-ux-ui-updates-catch-up-with-nordpass-in-q2-of-2025\/","url":"https:\/\/nordpass.com\/blog\/product-update-june-2025\/","name":"The changing DNA of organized crime, Not-So-Secret Business Passwords, and UX\/UI updates: catch up with NordPass in Q2 of 2025 - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordpass.com\/blog\/product-update-june-2025\/#primaryimage"},"image":{"@id":"https:\/\/nordpass.com\/blog\/product-update-june-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/f66a86ae2a\/cover-q2-comms-1062x597.png\/m\/828x0\/filters:quality(60):format(avif)","datePublished":"2025-07-08T09:37:01+00:00","breadcrumb":{"@id":"https:\/\/nordpass.com\/blog\/product-update-june-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordpass.com\/blog\/product-update-june-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordpass.com\/blog\/product-update-june-2025\/#primaryimage","url":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/f66a86ae2a\/cover-q2-comms-1062x597.png\/m\/828x0\/filters:quality(60):format(avif)","contentUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/f66a86ae2a\/cover-q2-comms-1062x597.png\/m\/828x0\/filters:quality(60):format(avif)"},{"@type":"BreadcrumbList","@id":"https:\/\/nordpass.com\/blog\/product-update-june-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"The changing DNA of organized crime, Not-So-Secret Business Passwords, and UX\/UI updates: catch up with NordPass in Q2 of 2025"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-tm2","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/112842","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=112842"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/112842\/revisions"}],"predecessor-version":[{"id":112853,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/112842\/revisions\/112853"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=112842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=112842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=112842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}