Skip to content

NordPass Desktop App: Release Notes

NordPass 6.3 (latest)

We’ve now added a warning when deleting a shared folder to better highlight that the action is permanent.

NordPass 6.2

We’ve fixed an issue that Firefox and Safari users were having with the Dark Reader browser extension.

NordPass 6.1

We’ve put our app through a quick pit stop to make sure it’s ready for the road ahead. Thanks for being alongside us for the journey.

NordPass 6.0

We’ve started rolling out a brand new look and feel on desktop. Colors, icons, interactions — the works. The best part? This is just the start — keep an eye out for more exciting updates coming soon.

NordPass 5.29

We’ve waved bye-bye to some pesky bugs and have also spruced up the place a touch. Stay tuned for some big news that’s just around the corner!

NordPass 5.28

Building good things takes time. So since the last release, we’ve mainly focused on catching and eliminating pesky bugs.

NordPass 5.27

No big announcements from us this time. However, we hope you’ll still enjoy an updated NordPass version with fewer bugs.

NordPass 5.26

All NordPass Business users can now import their two-factor authentication codes for password items. Happy updating!

NordPass 5.25

  • Autofill: We’ve updated our browser extension so that you can now enjoy even more control over your autofill and autosave preferences online. Head to your vault settings to discover the brand new control center.

     

  • Password Health: We’ve added a new category to our Password Health tool: Exposed Passwords. This means you can instantly find out if any of your passwords have appeared on the dark web as part of a data breach.

NordPass 5.24

We’ve waved bye-bye to some pesky bugs and have also spruced up the place a touch – enjoy!

NordPass 5.23

  • Improved import from LastPass: Moving from LastPass to NordPass is now even easier. You can directly import all your passwords using Azure ENTRA ID SSO, allowing you to set up your NordPass account faster than you can blink!

  • Bug fixes.

NordPass 5.22

Building good things takes time. So since the last release, we’ve mainly focused on catching and eliminating pesky bugs.

NordPass 5.21

In this release, you’ll find some sharing improvements for all users.

  • For personal and family account users: When sharing a single item with multiple people, the sharer will now be able to customize sharing rights for each individual recipient.

  • For business users: When sharing items within your organization, you’ll now see your organization members suggested in the search field.

  • And bug fixes.

NordPass 5.20

No big announcements from us this time. However, we hope you’ll still enjoy an updated NordPass version with fewer bugs.

NordPass 5.19

Building good things takes time. So since the last release, we’ve mainly focused on catching and eliminating pesky bugs.

NordPass 5.18

We’ve waved bye-bye to some pesky bugs and have also spruced up the place a touch – enjoy!

NordPass 5.17

Hold on to your seat — we’ve got some very exciting news to announce:

  • TOTP is now live on Chrome and Firefox browsers for NordPass business users. You can now create time-based one-time passwords on your favorite browser.

  • Autofill issue on Google fixed. Autofill got confused; it recognized Google login forms but treated them as new account creation forms. From this release on, the glitch has been fixed, and you’ll no longer see incorrect prompts.

NordPass 5.16

Building good things takes time. So since the last release, we’ve mainly focused on catching and eliminating pesky bugs.

NordPass 5.15

  • Item Sharing: We’ve revamped our sharing permissions so that you can now enjoy more control over the access a friend, family member or colleague has to an item. More permission options + more flexibility = more peace of mind. Check out the changes in your vault today!

  • Import: You can now easily transfer data from KeePass into NordPass via an XML file.

NordPass 5.14

Looking to import data into NordPass from another password manager? Good news — we now support more file formats such as JSON, ZIP, and 1PUX.

NordPass 5.13

Introducing the latest NordPass updates:

  • New Feature: Instant Login: Logging into accounts just got even easier. Gone are the days of manually tapping the NordPass icon to fill in your passwords. With this update, NordPass automatically detects when you’re on a login page and offers to fill in your credentials for you. We hope you’ll enjoy the seamless login experience, but if you prefer the traditional method, fear not–you can disable this feature in Settings.

  • Email Masking Update: Forgot why you set up email masks? No worries! Now, you can easily identify which of your accounts are safeguarded by email masks with a quick glance.

NordPass 5.12

We’re kicking off 2024 with a few game-changing updates:

  • Email Masking: Say hello to our brand new Premium tool — Email Masking! With this tool, you can protect your real email address from spam and online threats by creating unique email masks every time a website asks for your details. With full control over email forwarding included as well, this tool really puts you in the driving seat.

  • Data Breach Scanner: We’ve enhanced this all-important tool so that you can now get real-time alerts if your credit card appears in a breach. We hope you enjoy the new look and feel too!

  • Import: We’ve tweaked our import settings so that you can now easily move all of your Proton Pass items over to NordPass.

NordPass 5.11

“Spreek je Nederlands?” Because we now do! That’s right, you can now use the NordPass extension and desktop app in Dutch — simply head over to Settings to adjust your preferred language.

NordPass 5.10

We’ve waved bye-bye to some pesky bugs and have also spruced up the place a touch. Stay tuned for some big news that’s just around the corner!

NordPass 5.9

Hold on to your seat — we’ve got some very exciting news to announce:

  • Browser Extension: You now have the option to use a new standalone NordPass browser extension that doesn’t require our desktop app! That’s right, you can now enjoy a fast, fully browser-based NordPass experience on Chrome, Firefox, Safari and more.

  • Autofill: You asked, we’ve listened. You can now tweak your app settings to enjoy a better autofill experience on websites with a subdomain.

  • Password Health: When logging in to a website, you’ll now be prompted if your password is weak or reused so that you can quickly act to reduce the risk of your data falling into the wrong hands.

NordPass 5.8

Gather round, folks — we’ve got some exciting updates to share:

  • Data hosting: Organizations using NordPass Business or Enterprise can now choose to store company data in the European Union.

  • Autofill: You can now instantly search for a specific item to autofill on a webpage if it’s not automatically suggested for you.

  • Custom fields: You can now personalize your NordPass experience by adding custom fields to all item types. From passport numbers and bank details to dates of birth, you’re free to securely store exactly what you need.

NordPass 5.7

Here are just a couple of highlights from our latest release:

  • Autofill: As some websites (e.g. facebook.com and messenger.com) require you to use the same login credentials, you can now add multiple web addresses to a single NordPass password item for a smoother autofill experience. Faster account access and a tidier vault sounds good to us.

  • Passkeys: Already using biometrics to unlock your NordPass vault? Good news you can now also use your face or fingerprint to verify your identity when using a passkey.

NordPass 5.6

We’ve given our passkey prompts a fresh coat of paint and have also now built them directly into the web browser experience, meaning no more jumping back and forth between our desktop app. Enjoy!

NordPass 5.5

With NordPass Enterprise, you can now instantly share a shared folder with a group! That’s right, instead of having to add teammates one by one to a shared folder, you can now share the folder with a large group of people in one go. Happy updating!

NordPass 5.4

Here’s what’s new in the latest NordPass release:

  • NordPass Business: Users can now move items with two-factor codes to shared folders. If a member has set up NordPass as an authenticator, they will be able to access the item’s two-factor code immediately.

  • Bug fixes: We’ve also fixed a few bugs and improved our app’s performance.

NordPass 5.3

As some web services now require an additional identity check to use a passkey, we’ve added a new authentication step to our passkey creation and login flows so that you can continue using passkeys to securely access your accounts.

NordPass 5.2

You asked, we’ve listened – our latest release is inspired by your valuable feedback:

  • Passkeys: You can now better control how often you see certain NordPass passkey prompts on websites. We’ve also introduced a new button in a couple of our passkey flows so that you can more easily switch to using another passkey solution instead of NordPass.

  • Autofill: You now have the power to change the autofill behavior of website form fields so that you’re suggested exactly the right information you’re looking for. For example, if you’re suggested credit card details on a login page, you can adjust the autofill logic so that you’re correctly suggested a password item in future.

  • File attachments: You can now save time by viewing attached .jpg and .png image files directly in the app, meaning there’s no longer a need to first download them.

Thanks as always for sharing your thoughts with us. If anything else crosses your mind, you can always find us at  support@nordpass.com.

NordPass 5.1

No major updates this time, just a new and improved app release with some under-the-hood performance upgrades – enjoy!

NordPass 5.0

Introducing… file attachments!

That’s right, with NordPass Premium you can now conveniently attach documents and images to any item so that you’ve got access to all-important info when you need it most. Contracts, copies of your IDs, cat photos – you name it, you can securely store it. We hope you enjoy this highly requested feature!

NordPass 4.38

Remember when we said we had some big news to announce soon? Well, here it is… say hello to a new item category: passkeys!

Passkeys are unique, end-to-end encrypted login credentials that are stronger and more convenient to use than passwords.

You can now use NordPass to create passkeys on supported websites. NordPass will also securely store your passkeys so you can use them to instantly log in to your accounts online.

Passwordless authentication: unlocked. Enjoy!

NordPass 4.37

We’ve waved bye-bye to some pesky bugs and have also spruced up the place a touch – enjoy!

NordPass 4.36

We’re starting off 2023 on the right foot with a release that’s faster and more reliable. Stay tuned for some bigger announcements!

NordPass 4.35

No major updates this time, just a new and improved app release with some under-the-hood performance upgrades – enjoy!

NordPass 4.34

We’re happy to present you with a new release. Here’s what we’ve got this time:

  • DESIGN CHANGES TO ITEMS. We updated how your item details are displayed. Hope you’ll like it.

NordPass 4.33

Building good things takes time. So since the last release, we have mainly focused on catching and eliminating pesky bugs.

NordPass 4.32

This time we’ve waved bye-bye to some pesky bugs and have also spruced up the place a touch – enjoy.

NordPass 4.31

We’re happy to present you with a new release. Here’s what we’ve got this time:

  • AUTOFILL DISABLEMENT ON WEBSITES. You can now disable autofill on any page that you don’t want to fill your details. It won’t reset when you refresh the page but you can turn it back on at any time.

  • BUG FIXES.

NordPass 4.30

Here’s what you’ll see in the new NordPass release:

  • ONBOARDING UPDATE. New users will be greeted by a refreshed onboarding experience that will help them familiarize themselves with NordPass.

NordPass 4.29

No major updates this time, just a new and improved app release with some under-the-hood performance upgrades – enjoy!

NordPass 4.28

Building good things takes time. So since the last release, we have mainly focused on catching and eliminating pesky bugs.

NordPass 4.27

This time we’ve waved bye-bye to some pesky bugs and have also spruced up the place a touch – enjoy!

NordPass 4.26

No big announcements from us this time. However, we hope you’ll still enjoy an updated NordPass version with fewer bugs and better autofill.

recovery code

NordPass 4.25

Our bug busters have been working hard since the last time you heard from us. That’s why today we can proudly present another NordPass release with even fewer bugs. We hope you’ll like it.

NordPass 4.24

Building good things takes time. So since the last release, we have mainly focused on catching and eliminating pesky bugs.

NordPass 4.23

We’re happy to present you with a new NordPass release. Here’s what we’ve got this time:

  • UPDATED PASSWORD INFO. Now you’ll get more guidance on making your passwords more secure. Open any of your passwords, and you’ll see whether it’s been reused on other accounts or it’s too old and needs changing.

  • BUG FIXES. Rome wasn’t built in a day. Therefore, we continuously aim to catch pesky bugs and provide you with the best password management experience.

NordPass 4.22

Here’s what you’ll see in the new NordPass release:

  • SWITCH ACCOUNT. A long-awaited feature is here! If you have a few NordPass accounts, like personal and business, switching between them will now be a breeze. Just click on your profile account and look for a “Switch Account” button.

  • LITHUANIAN LANGUAGE. For our Lithuanian friends out there, you can now use NordPass in your mother tongue. Simply head to Settings to change the language.

  • BUG FIXES.

NordPass 4.21

Our bug busters have been working hard since the last time you heard from us. That’s why today we can proudly present another NordPass release with even fewer bugs. We hope you’ll like it.

NordPass 4.20

We’re happy to present you with a new NordPass release. Here’s what we’ve got this week:

  • CARD PIN. From now on, you can also add your PIN when saving card details. Don’t worry; it won’t be autofilled. It’s for your reference only.

  • DELETE CLIPBOARD SETTING. When you copy your password or other item data, it’s normally saved in the clipboard. To avoid pasting it somewhere you didn’t intend; you can now choose the clipboard to clear after a set time.

  • BUG FIXES.

NordPass 4.19

It’s international women’s day! So we want to take this opportunity and say thank you to all the beautiful women who tirelessly work at NordPass. It wouldn’t be the same without you.

P.S. We mainly focused on fixing bugs this time, so we hope you like a better running app.

NordPass 4.18

Here’s what you’ll see in the new NordPass release:

  • SUBDOMAIN SORTING IMPROVEMENTS. From now on, if you have multiple items saved for one domain, the account with the matching subdomain will be shown first.

  • BUG FIXES.

NordPass 4.17

Did you know that January has a Blue Monday – the most depressing day of the year? The good news is it’s over. But if you’re still feeling a little bit blue, here’s a few things we’ve updated to hopefully cheer you up.

  • Safari import. You can now import passwords saved in Safari straight to NordPass.

  • Data Breach Report update. If your password appears in a Data Breach report and you update it on the website, select “Resolve” and the same details won’t appear next time you run the report.

  • Bug fixes. Caught many annoying bugs that hinder your experience.

Some write songs, some dedicate sonnets, some built monuments. We create release notes to honor each update of NordPass app for Windows, macOS and Linux. A single click of that magical “Update” button unlocks the newer, faster, better-performing world of stress-free password management.

NordPass 4.16

As Christmas is over, it’s time to make some New Year’s resolutions. But why wait? We want to become a better, smoother-running, and more user-friendly app now. We have strived for perfection since NordPass was launched, and this week is no exception. So we present you a new NordPass version with fewer bugs and more Autofill fixes.

NordPass 4.15

A good beginning makes a good ending, so why not start a week with a new NordPass release? Here’s what we’ve got this week:

  • BREACH SCANNER UPDATE. If your password was leaked in a data breach and you’ve reused it on other accounts, a new ‘Accounts at risk` tab will appear. There you’ll see a list of accounts that may be vulnerable. Don’t wait for a second and change their passwords to prevent cyber attacks.

  • AUTOFILL UPDATE. We’ve fixed a ton of autofill bugs so you’d have a smoother autofill experience on even more websites.

NordPass 4.14

We know that sometimes life throws challenges right at you. At those times, the last thing you want to think about is how and where to access your passwords.

That’s why from now on, you can give emergency access to your passwords and other items. Choose a person you really trust and invite them to be your emergency contact. Once they accept it, you can give them access immediately or wait for 7 days to be given automatically. Note: You can only give emergency access to another NordPass user with a Personal or Family plan.

NordPass 4.13

Trick or treat? Who are we kidding? It’s always just treated here at NordPass. So here’s our Halloween treat to you – a brand new NordPass release. Don’t worry, nothing to be scared of—just a smoother running version of your password manager.

NordPass 4.12

Tired of too many emails and banners? We get you, and we want to improve our communication with you. That’s why from now on, a lot of important information will appear as in-app notifications. So if you open the app and see a red dot next to a bell icon, just know that it’s something important from us to you.

P.S. We also solved a number of bugs.

NordPass 4.11

Getting your data stolen isn’t nice. But if that happens to you, it’s important to identify the stolen information and act quickly. That’s why with this release, Data Breach Scanner has gone even better. How?

If your data has ever appeared in any breach, you can now use the Breach Scanner to identify not just what type of data was leaked, but also see it in plain text. This includes passwords, your address, social security number, birth date, and other data types.

In addition to all this, we are continually working to improve one of our core features – Autofill. So expect to see more websites working flawlessly with NordPass.

NordPass 4.10

Can’t find tools to improve your password security? We got you. You’ll find security tools such as Password Generator, Data Breach Scanner, and Password Health in the sidebar from this release. More accessible to access and easier to use.

We also solved some pesky bugs to make your NordPass experience more enjoyable.

NordPass 4.9

What do you have in the box this time NordPass? Well, let me see…

  • Title and website address suggestion. That’s right, now when creating a new item, you only need to enter a few letters in the Title or Website address fields, and NordPass will suggest filling it with one of the thousand popular websites.

  • Spanish and Italian languages are now available on the NordPass extension.

  • Bug fixes, bug fixes, and more bug fixes.

NordPass 4.8

It’s August my friend. And you know what August is good for? Learning new languages.

Hablas español? Parli italiano? If you do, lucky you. Because you can now use NordPass in Spanish and Italian. Enjoy!

NordPass 4.7

Did you know that no one else has the same fingerprint as you? That’s why it’s the most unique password you can have. Dedicated Mac users, this release is for you. Yes, you can now sign in to your NordPass app with a fingerprint. Feeling like James Bond yet? We are!

P.S. We also solved a ton of pesky bugs to make your experience smoother than ever.

NordPass 4.6

Dear bugs, it’s time. Time to say goodbye. It won’t be the same without you. It will be better. The password managing experience will be much greater now.

NordPass 4.5

It’s officially summer, NordPass people! (Or winter, if you live in the southern hemisphere.) Wherever you are, we hope it’s sunny so that you can enjoy the brand new release. Here’s what we’ve got:

  • MULTIPLE ITEM SHARING. Sharing is caring, right? Well, now you can select multiple items and share them all at once. Easy peasy. Just always make sure you trust the people you share your credentials with.

  • PASSWORD GENERATOR HISTORY. You know that moment when you create a super-strong password with the NordPass Generator and forget to save it? Yeah, we’ve been there too. That’s why you’ll now see a little clock icon in your Generator where you can check your previously generated passwords.

  • BUG FIXES. And, of course, we won’t release a new NordPass version without getting rid of as many bugs as possible.

NordPass 4.4

“Speed” was the main keyword at NordPass this week. So what to expect in this release?

  • Updated designs so you could find your passwords or any other items at the speed of light.

  • Tons of bug fixes and maintenance work so that your app would work faster than ever and would be as pretty on the inside as it is on the outside.

NordPass 4.3

Don’t worry if you missed the chance to get NordPass Premium for less. The Summer Kick-Off Sale is here! Use this offer to get access to all the amazing Premium features.

Also, we have a little something for our Business users. From now on, all members who are added or removed from groups will be notified by email.

NordPass 4.2.18

Hello, world! We’ve prepared a nice little juicy pack of updates – just for you. Please give a warm welcome to:

  • Double EXTENSION-upgrade: from now on, not only it speaks German fluently but also is available in Dark Mode. Ready to give some rest for those sore eyes?

  • A new ge-ne-ra-tion for stronger passwords! Check out the PASSWORD GENERATOR to enjoy shiny new looks and (finally!) PASS-PHRASES for nice-and-strong-memorable-passwords.

NordPass 4.1

We are working hard on bringing Dark Mode to the NordPass extension. In the meantime, we are also doing some good old maintenance work. So expect to see some design changes in the browser extension and forget the existence of annoying bugs.

NordPass 4.0

Today is the day! You know what we are talking about. You asked for it; we delivered it. And oh boy, how good it looks! You’ll believe it once you see it.

OK, we recommend sitting down for this one. Then open your NordPass app, update it to the newest version and enjoy the shiny new DARK MODE.

And if that doesn’t impress you, well, then we have more news. You can now use NordPass in German. Whether it’s your mother tongue or just want to polish your German skills, you can now change your language preference in Settings.

NordPass 3.31

This time we’ve got many design changes to make your life easier. So let’s get to it. Here’s what you’ll see in this release.

  • TOAST MESSAGES UPDATE. Some of the success messages, such as when you import items or update your app, were outdated, so we made them easier to understand.

  • MULTISELECT REWORK. We noticed that the sorting option was missing when multiple items were selected. We introduced this option and changed long-winded buttons to visually pleasing icons.

  • BROWSER EXTENSION UPDATE. You can now access Tools from the NordPass extension, including the Password Health and the Data Breach Scanner.

NordPass 3.30

Are you ready to switch off the lights? Because Dark Mode is coming very very soon. We are working hard to make sure everything looks perfect for the release. A few more things, and we are done. Keep your eyes peeled.

In other news, we fixed some annoying bugs we found in Groups and took care of other bugs.

iconless styling

NordPass 3.29

Sometimes what we do is either too difficult to explain or too difficult to see. Yes, you guessed it. This week we put all our effort into finding and getting rid of bugs. We hope we’ll have something more exciting for you next week.

NordPass 2.34

NordPass has gone through some serious spring cleaning with this release. Why do we say so? Here’s what we did:

  • B2B GROUPS BUG FIXES. It’s new, fresh, and now with fewer bugs.

  • APP BUG FIXES. We’ll never give up on perfecting NordPass.

  • EXTENSION DESIGN REWORK. So much better looking now! You have to see it to believe it.

And something exciting is coming up very soon. So stay tuned. 😉

NordPass 2.33

This time, we’ve got good news for Business users. Let us introduce GROUPS. Admins and Owners can now assign members to groups and share passwords with a number of people instantly. Think, your finance department sharing login details every accountant needs to access.

Anything else? Of course, we got rid of more nasty bugs.

NordPass 2.32

Happy April Fool’s! Stay vigilant, and don’t get tricked by any hackers. Keep your passwords safe with an updated NordPass app. Here’s what we’ve got this time:

  • CHANGES TO MASTER PASSWORD CREATION. Now it’s easier to understand what that mysterious Master Password is and how it is different from your Nord Account password. BUG FIXES as usual.

NordPass 2.31

It’s spring! Flowers are blooming, birds are chirping, and NordPass is releasing another update. In this release, you’ll find: KEYBOARD SHORTCUTS. You can now use CTRL + F to search your items and CTRL + L to lock your app instantly. BUG FIXES. No bugs allowed here.

keyboard shortcuts

NordPass 2.30

NordPass bug hunters strike again. Yes, you guessed it. We got rid of more pesky bugs so you could enjoy an even smoother experience with NordPass. That’s it for now!

NordPass 2.29

“Could NordPass be any better?” asks our team every single week. And the answer never changes. YES, it can!

But it’s not always about new features and crazy advancements. Sometimes it’s all about perfecting those nitty-gritty details. So this week, we say another goodbye to a bunch of bugs. Bye, we won’t miss you.

NordPass 2.28

Another week, another release of a better, faster, and more secure NordPass app. And for this we say a BIG thank you to our bug hunters (aka developers). You guys rock.

NordPass 2.27

If NordPass was a dog, what would he say to a flea?

  • Stop bugging me.

The good news NordPass doesn’t need to endure nasty bugs. Bye-bye, bugs. We don’t wanna see you no more.

NordPass 2.26

Ready, set, new release! What can you expect to see in the new and shiny NordPass 2.26?

EXTENSION REWORK. Updated, upgraded, and overall better-looking browser extension. But what did we actually do? Well, we just made it even more similar to your desktop app, meaning more functional and easier to use. Voila!

BUG FIXES. Can you tell we don’t like insects? No bugs are allowed in our app. Yuck.

NordPass 2.25

It’s a very special day today. We thought about it over and over again. We were constantly considering, overthinking, and having sleepless nights about it. We even visited a fortune teller to ask if you’ll like it, or not. Yet still, our developers were nervously (but carefully!) coding that code.

And here it comes. A sincere love letter. In PDF format. Containing your Recovery Code. Save it, delete it, save it again, print it – do whatever you want, but please, keep it safe. And don’t show to anyone else! It was created from the bottom of our hearts to express how much we LOVE YOU.

Take care!

And don’t forget to update the app to get those extra bug fixes.

NordPass 2.24

Once upon a time, in a faraway land, a password manager named NordPass lived. His goal was to become the best password manager that there ever was. And he did it one release at a time.

He proudly presents his latest achievements:

  • AUTOSAVE AND PASSWORD EDIT UPDATES. Now it will be easier to understand when NordPass is prompting to update an old password or when it is offering to save a new one automatically.

  • HELP SECTION ADDED TO SETTINGS. If you need help using NordPass, head to Settings to be directed to the Help Center.

  • COPY CHANGES. Salvador Dali might have said not to fear perfection as we’ll never reach it, but we’ll still give it a good go.

  • BUG FIXES. No need to call the pest control officer; we got it fixed.

NordPass 2.23

AbraCadabra boom! No, it’s not magic. It’s just your passwords and personal information filling in quicker and smoother than ever before. Bye-bye, annoying bugs who tried to stop you. What else can you expect in this release?

  • ONLINE/OFFLINE INDICATOR appears in the NordPass extension.

  • COPY CHANGES to make the app easier to navigate.

  • MORE BUG FIXES.

NordPass 2.22

New Year, new NordPass release. Here’s what you’ll see in the latest version:

  • EASIER LOG IN WITH NORD ACCOUNT. We tweaked the steps you take logging in to NordPass for a smoother experience.

  • BUG FIXES, because no one likes bugs.

  • RECOVERY CODE PDF. You will now be able to download your Recovery Code in PDF. Keep it somewhere safe. 😉

recovery code

NordPass 2.21

Yeah, Christmas will be different this year. But we’ve still got something to spread a little cheer.

In this release, you will see:

  • ICONLESS ITEMS STYLING. Your passwords that don’t have dedicated icons will light up in a variety of colors.

  • BUG FIXES. Well, it cannot be called a release without bug fixes, right?

iconless styling

NordPass 2.20

“You guys give up? Or are you thirsty for more?” – Kevin, Home Alone, 1990

That’s the NordPass spirit, Kevin! We’ve got more:

  • Design changes. Yes, the sky’s the limit for our designers, sorry.

  • Password Generator update. Did we mention that it’s important to have long and unique passwords?

  • Browser extension update. Easier to understand, prettier to look at.

desktop instagram

NordPass 2.19

I don’t want a lot for Christmas
There is just one thing I need
I don’t care about the presents
Underneath the Christmas tree

Don’t want NordPass for my own
More than you could ever know
Making this wish come true
Giving a bug-free NordPass for you

P.S. Thanks Mariah Carey for inspiration.

NordPass 2.18

NordPass has turned 1 year old this week. Just on time for Thanksgiving, can you believe it? And we can honestly say this year we are the most grateful for YOU, our dear NordPass user. You, who believed in us and drove us to release one update after another.

So here’s one more. Full of even more design edits, bug fixes, and love:

  • LOGINS TURN TO PASSWORDS. Now all across the app, you’ll see the term “Password” instead of “Login” because it’s just easier to understand.

  • CHOOSE FOLDER WHEN AUTOSAVING to organize your passwords there and then.

  • RENEWED IMPORT. Importing passwords in bulk is now easier than ever.

  • MINOR DESIGN CHANGES because, let’s be honest, who doesn’t like a good-looking app.

  • NORD ACCOUNT DEEPLINK FIXES. No more accidental logouts when you use NordVPN and change your IP.

NordPass 2.17

Xmas is in less than 35 days. You’re welcome.

In other news, our designers, developers, and copywriters are presenting you with another brand new update. This time we fixed the annoying-forever-loading spinner, made minor changes to the way you see your items’ details, and updated the copy to make your app even more easier to navigate. Until next time 😉

NordPass 2.16

We know you have better things to do (like keep up with the news on the current presidential election. Yikes, so intense!). So we thought, ‘who are we to bombard you with more messages?’. Poof! Your login and logout messages are gone.

To make your day a little bit brighter, we also made some improvements to your items layout. And we can describe it with just one word – SLEEK. You’ll believe it when you see it 😉

And NordPass update wouldn’t be an update without bug fixes. We did the dirty work and crushed them once again.

NordPass 2.15

Trick or treat? Treat, always. We might be a few days late to any online Halloween party, but, to make up for it, we are bringing new treats to your desktop app:

  • ADD ITEM IN FOLDER. You can now add items straight from your folders. Easy, breazy, and all your items are organized.

  • ITEM DETAILS FIXES. “There is no limit to perfection!” screams the NordPass design team. Your items will now look more beautiful than ever.

  • OTHER LITTLE BUG FIXES. Little bugs and spiders might fit the Halloween theme, but they don’t look good in your NordPass app. We got rid of them to make your experience smoother and safer.

NordPass 2.14

Providing high-quality password-managing experience, routine maintenance and working under-the-hood is just as essential as releasing a new shiny feature. So nothing grand this time — just the usual bug-fixing and design-improving business. We’re packing and sending best wishes along with app improvements your way!

NordPass 2.13

  • BUG FIXES. Sometimes you couldn’t scroll down to the end of your passwords list. You simply couldn’t. The good news is that we did some magic tricks, so now you can.

  • BUG FIXES. We’ve also changed the font style, the button style, and the spacing style in the context menu of your passwords list (not exactly a bug, but we wanted to keep the release notes in style).

  • BUG FIXES for everyone.

  • BUG FIXES. Sometimes you couldn’t scroll down to the end of your passwords list. You simply couldn’t. The good news is that we did some magic tricks, so now you can.

NordPass 2.12

When life gives you Monday, we release the app update. Let’s see what we’ve got:

  • IN-APP NOTIFICATIONS sometimes were over-competitive and tried to overlap each other. Someone smart once said that the best way to kill competition is to partner it. So after some inspiring conversations about team spirit, the attitude was fixed – all notifications now act super friendly.

  • DESIGN BUG FIXES. Yes, sometimes bugs may look stylish. Even pretty. They are still bugs – and they are out now.

  • PASSWORD HEALTH IMPROVEMENTS. The development department was very excited about changing something with the algorithm. All I know is that the health of your passwords will be calculated even more accurately. I only write release notes – please don’t judge me. And have a nice day!

NordPass 2.11

Hey there! How are you? Ready for the update? Let’s go:

  • BREACH REPORT. This one feels like a lottery. By clicking a ‘Scan’ button, you can find out if any of your accounts were ever caught in data breaches. However, it probably is the first lottery where it’s better not to ‘win’ anything.

  • DESIGN IMPROVEMENTS. They see you scrollin’, they hatin’, – because scrolling with that new scroll bar has never felt so good. Just give it a go.

NordPass 2.1

Another week – another update. Let’s roll!

  • DESIGN IMPROVEMENTS. Yes, we did it again. We’ve played with UI, got lost in perfecting the details. Oh, baby baby. Yes, the item lists now look neat, the font is sent from above. It all looks perfect now!

  • PERFORMANCE IMPROVEMENTS. Let’s be honest – after entering your Master Password to unlock the vault, the app window was getting overexcited and moved all over the place. Not that it was a bad thing – but those moves really weren’t good. So, we’ve sent the app to some dancing classes. The result – the app learned some solid, stylish but still moves – more like JLo style.

NordPass 2.9

Faster than light.
Supersonic.
Fleet-footed.
Pronto.
Winged.

We’ve spent hours trying to find the right word to describe the improved speed of opening your passwords (and other items) in the vault, but none of them was good enough. They say that action speaks a thousand words, so enjoy viewing your items at full speed.

NordPass 2.8

Passwords are more human-natured than you could possibly think. They need a safe and cozy place to stay. Most of them eat well (cheat days included 😉 ) and constantly work out to become faster and stronger. However, sometimes they also may feel weak and unwell, so regular health check-ups are crucial. Luckily, we’ve found an easy way to maintain their well-being – set up a password health checker in the app. Take a chance to make your precious passwords happier (and accounts safer) without leaving the house.

Stay safe, everyone!

NordPass 2.7

The idea of throwing this party came out of thin air. Why not, we thought – work hard, party harder, right?

So we’ve ordered lots of food and drinks (everyone was curious seeing what new employees look like when they’re drunk), brought in a magical photo booth (making selfies was too mainstream), and prized trivia (to avoid awkward silences), and live music by our beloved DJ “Vibe Manager”.

Time flew, the party’s got in full swing (no one seemed to be running out of things to talk about – phew). Even NordVPN and NordLocker stopped by. After a not-work-related heated discussion about data privacy and online security, they promised to join our “Tools” department. Like, forever.

Autofill department surprised everyone with funky moves – those icons felt like dancin’ till the break of dawn. It was fun until the ‘fun’ went out of control – and out of login fields. Luckily, after taking a chill pill, everything’s got back in order.

By the way, some unwanted URL spaces were trying to crash both the party and the app. That’s kind of rude, so we’ve asked them to leave.

We’ve finished with a small team-building session with cleaning the office – it’s now nice and clean – and so is the app (we hope so).

That’s it – peace out!

NordPass 2.6

Our engineers are all about perfection. They literally were calculating coordinates for pixel-perfect autofill icons placement. However, some “wind of change” has happened, and those icons ended up finding their home OUTSIDE the login fields. Sorry for that – this unforgivable mistake was fixed.

Also, some sneaky, crawly, totally gross bugs were caught and removed. The app is much better without them – enjoy!

NordPass 2.5

This release contains some behind-the-scenes magic, usual tinkering-under-the-hood and minor design tweaks. By hitting the “Update” button, you will get one step closer to top-notch password-managing experience. Stay well!

NordPass 2.4

They say – small changes make a big difference. Behold – the update with a bunch of app upgrades is here. Let’s see what we’ve got here:

  • VISUAL IMPROVEMENTS. Mirror mirror on the wall, who is prettiest of them all? Well, our designer’s brush made some magic tweaks, so the answer is clear now – it’s those tiny cute little app icons. Lookin’ good!

  • APP LOADING FASTER. Need for speed? You’re welcome! Fasten your seatbelt and put the pedal to the metal – the project “Make the app faster” was completed successfully.

  • BUG FIXES. Dear sneaky bugs, thanks for visiting, farewell, let’s never meet again.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

How to prevent lateral movement—the most overlooked cyber threat

 

Summary: Understand how lateral movement enables deep network compromise, the techniques behind it, and how to stop it.

Even the most secure perimeter means little once an attacker is inside. That’s where lateral movement begins, and understanding how to prevent lateral movement is a must.

While phishing attacks and endpoint breaches dominate headlines, it’s the post-intrusion maneuvering—when threat actors quietly escalate privileges, pivot across systems, and harvest credentials—that often determines the true impact of a breach.

Lateral movement definition

Lateral movement refers to the techniques cyber attackers use after initial compromise to move deeper within a network, often with the goal of gaining access to high-value systems or data. Rather than striking immediately, bad actors exploit internal tools, credentials, and trust relationships to move stealthily between endpoints—avoiding detection while gaining more access and control.

This phase of a cyber-attack is especially dangerous because it unfolds inside the network perimeter, where traditional defenses like firewalls and antivirus solutions offer limited visibility. Detecting lateral movement often requires a combination of behavioral analytics, access control enforcement, and visibility into how users and systems interact—especially around privileged accounts and critical assets like the domain controller.

The attack chain: how lateral movement typically unfolds

Lateral movement attacks don’t happen in a single step—they unfold over a series of calculated moves designed to escalate access and maintain stealth. Here are the stages of lateral movement:

Infographic titled "The stages of a lateral movement attack"

Stage 1: Initial access

The attacker breaches the perimeter through methods like phishing attacks, exploiting remote services (e.g., RDP or VPN), or targeting unpatched vulnerabilities. Once inside, attackers establish a foothold but remain limited in scope—often landing on a low-privilege endpoint.

Common techniques: Phishing, brute-force attacks, vulnerable public-facing apps
Defensive response: Multi-factor authentication, endpoint detection, access control policies

Stage 2: Reconnaissance and enumeration

With a foothold established, the attacker begins mapping the internal environment. They collect information about user accounts, system architecture, network shares, and potential targets such as the domain controller or privileged accounts.

Common techniques: Netstat, PowerShell scripts, built-in OS tools
Defensive response: Least privilege enforcement, intrusion detection systems, user behaviour analytics

Stage 3: Credential dumping and privilege escalation

To move further, malicious actors seek elevated access. They use tools to dump credentials, exploit privilege escalation vulnerabilities, or abuse poorly protected password management systems to access accounts.

Common techniques: Mimikatz, token manipulation, credential reuse
Defensive response: Endpoint detection, password management best practices, privilege segmentation

Stage 4: Lateral movement

Now armed with valid credentials and internal knowledge, the cybercriminal begins accessing various systems in the network. They use lateral movement techniques, such as exploiting SMB, WMI, or remote desktop protocol (RDP) to access additional machines and data.

Common techniques: Pass-the-Hash, Pass-the-Ticket, WMI, RDP, PsExec
Defensive response: Network segmentation, monitor remote services, restrict internal movement with Zero Trust solutions

Stage 5: Target acquisition and impact

The final goal is usually exfiltration, encryption, or business disruption. The attacker reaches high-value assets (e.g., network controller, file servers, customer databases), and carries out their objective—often undetected if lateral movement hasn’t been flagged.

Common techniques: Data exfiltration, ransomware deployment, system sabotage
Defensive response: Threat detection via machine learning, monitoring of unusual activity, real-time response

Key techniques attackers use for lateral movement

Once inside a network, bad actors rely on various lateral movement techniques to gain higher-level access and quietly move between systems. These methods often abuse legitimate tools and protocols, making them difficult to detect:

  • Pass-the-Hash (PtH): Reuses hashed credentials captured from memory to authenticate on other systems without needing plaintext passwords.
  • Pass-the-Ticket (PtT): Relies on Kerberos tickets (TGTs or service tickets) to access services across the domain.
  • Remote Desktop Protocol (RDP): Uses remote services to gain access to other machines via legitimate remote desktop functionality.
  • Windows Management Instrumentation (WMI): Executes commands and scripts remotely, often without triggering alerts.
  • PsExec: Runs processes on remote systems—commonly abused for executing commands across hosts.
  • Credential dumping: Extracts credentials stored in memory or the registry using tools like Mimikatz.
  • Shared network access abuse: Moves through shared drives, mapped folders, or misconfigured file shares.
  • Token impersonation: Hijacks access tokens to impersonate users—especially high-privilege accounts.
  • Internal spear phishing: Sends malicious content to users within the network to steal further credentials or plant malware.
  • Exploitation of poor password hygiene: Takes advantage of reused or weak credentials, especially when password management practices are lacking.

 

Real-world example: SolarWinds attack (2020)

One of the most devastating lateral movement attacks to date occurred during the SolarWinds supply chain breach. After compromising the Orion software update mechanism, cybercriminals gained initial access to multiple US government and enterprise networks.

Once inside, they used credential dumping, token impersonation, and customized lateral movement techniques to silently traverse systems for months—targeting domain controllers and cloud environments.

  • Estimated impact: ~18,000 organizations received the malicious update
  • Dwell time: Up to 9 months undetected
  • Threat group: APT29 (Cozy Bear), linked to Russian intelligence

How to detect lateral movement

Detecting lateral movement is particularly difficult because attackers often mimic legitimate user behavior and exploit trusted internal systems. However, several strategies and technologies can help expose suspicious activity before it leads to a full-blown compromise:

  • Behavioral analytics: One of the most effective ways to detect lateral movement is to analyze user behavior over time to identify sudden deviations—like a user accessing unfamiliar systems or logging in at odd hours—that may signal compromise.
  • Endpoint monitoring: Deploy Endpoint Detection and Response (EDR) tools to track processes, login attempts, and access to sensitive assets. Watch for signs of credential dumping or remote command execution.
  • Unusual access patterns: Monitor for activity that falls outside normal user roles or workflows— such as PsExec or RDP use between endpoints that don’t typically communicate.
  • Multi-factor authentication (MFA) alerts: Watch for failed or bypassed MFA attempts, which can serve as early indicators of a lateral movement attack in progress.
  • Threat detection systems: Use machine learning-based threat detection to flag low-and-slow attacks that traditional defenses might miss. These systems can correlate subtle anomalies across the network to detect lateral movement.
  • Audit privileged account usage: Closely monitor high-level accounts for unusual activity, especially after initial compromise. Lateral movement often involves attackers attempting to escalate their own privileges and abuse these accounts.
  • Track remote service usage: Investigate unexpected or unauthorized use of internal remote services, which can be leveraged to pivot across systems.
  • Shrink the attack surface: While not a detection method in itself, limiting lateral access through segmentation and access control boosts visibility and raises red flags when violations occur.

Steps to preventing lateral movement

Infographic titled "How to prevent lateral movement: 5 core defense strategies" showing five circular icons and labels beneath them.

1. Segment and isolate the network

Flat networks make lateral movement easy. Implement internal segmentation to limit access between departments, teams, and resources. Isolate sensitive assets—like network controllers and critical servers—within protected zones that can only be accessed under strict conditions. Technologies like software-defined perimeters and microsegmentation can help reduce exposure and enforce contextual access boundaries.

2. Enforce least privilege access

Users should only have access to the systems and data they absolutely need. Overprivileged accounts are a key enabler of lateral movement. Apply the principle of least privilege (PoLP) across all identities—users, admins, and services—and ensure privileges are continuously reviewed and revoked when no longer needed.

3. Monitor identity and access

Track who is accessing what, from where, and when. Continuous monitoring of identity and access helps surface abnormal behavior—like a standard user accessing sensitive systems or credentials being used in new geographies. Integrate single sign-on (SSO), strong password policies, and Role-Based Access Control (RBAC) to maintain visibility and reduce risk, and align with network monitoring best practices.

4. Detect and respond in real-time

Lateral movement is often subtle and slow. Use detection tools that combine behavior analysis, anomaly detection, and response automation to spot threats before they escalate. Visibility across endpoints and cloud services is essential to correlate signals and trigger rapid remediation actions.

5. Implement Zero Trust architecture

Adopting a Zero Trust approach ensures no user or device is inherently trusted—even inside the network. Authenticate every session, verify device posture, and validate contextual risk before granting access. This architecture effectively disrupts lateral movement paths by requiring continuous verification.

NordLayer’s role in lateral movement defense

Preventing lateral movement requires more than visibility—it demands control over how users interact with your network from the inside out. NordLayer is designed to give IT teams that control, combining intelligent access policies with modern network architecture to block lateral paths and contain threats before they escalate.

A key part of this strategy is segmentation. With NordLayer’s network segmentation tools, organizations can create secure, logically separated environments that limit movement between users, departments, and critical infrastructure. Whether your team is fully remote, hybrid, or distributed across multiple locations, segmentation ensures attackers can’t freely pivot once inside.

Identity and access management is just as essential. NordLayer supports granular access controls and SSO integration, allowing administrators to define exactly who can reach what—and under which conditions. This level of control makes it easier to flag anomalies, shut down credential abuse, and enforce least-privilege policies across the board.

At the core of NordLayer’s approach is Zero Trust Network Access (ZTNA), which eliminates the assumption that anything inside your network should be trusted by default. Every user, device, and request is authenticated continuously, with access granted only if context, location, and risk level align. This disrupts the internal freedom lateral movement attacks rely on—stopping threats at the access point, even after initial compromise.

For organizations, the stakes are high: lateral movement attacks don’t just steal data—they threaten operations, reputation, and compliance. NordLayer empowers IT leaders, CISOs, and security architects to go beyond detection and actively architect environments that are resilient by design. When attackers can’t move freely, they can’t succeed—and that’s where NordLayer gives you the edge.

Contact sales to see how NordLayer can help your organization.

 

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Healthcare data security for modern organizations

Summary: Learn why healthcare data security is critical, the top threats, and practical strategies healthcare organizations can use to protect patient data.

Imagine an attacker quietly gaining access to sensitive patient information in your hospital network—reading lab results, personal health information, insurance details, and even payment data, undetected for weeks. For many healthcare organizations, this is not a hypothetical scenario but a daily concern.

In a world driven by electronic health records and digital transformation, healthcare data security has become critical for protecting patient privacy, maintaining operational integrity, and complying with strict regulations while building patient trust.

In this article, we’ll walk through what makes healthcare data security uniquely challenging and why it’s critical to get it right—from understanding the most common threats to implementing practical strategies that protect patient data.

What is healthcare data security?

Healthcare data security refers to the policies, practices, and technologies healthcare providers and companies use to protect electronic health records (EHRs), personal health information (PHI), and other sensitive patient data from unauthorized access, corruption, or theft.

It ensures that patient data security aligns with regulatory requirements, organizational goals, and patient privacy expectations.

Healthcare data security involves implementing layered security measures, including secure networks, encryption, role-based access control (RBAC), multi-factor authentication (MFA), and continuous monitoring to protect healthcare data across all systems and endpoints.

Why healthcare data is a growing cybersecurity concern

The healthcare industry is especially exposed to cyber threats that are becoming more advanced and frequent. While the number of data breaches continues to rise, several reasons make healthcare data security harder to maintain:

Key reasons why healthcare faces growing cybersecurity risks: digital data surge, outdated systems, black market value, wider attack surface, and skill gaps.

Surge in digital patient data & interconnectedness

The widespread adoption of EHRs, coupled with the rapid expansion of telehealth services and remote patient monitoring, has dramatically increased the volume of sensitive patient data stored, processed, and transmitted digitally.

Every new digital tool helps patient care, but also gives attackers more points to target. The amount of valuable data makes healthcare organizations attractive targets for cybercriminals.

Fragmented systems & outdated infrastructure

Many healthcare providers still use old systems that were not built with modern cybersecurity in mind. These outdated systems often lack security features, have known weaknesses, and are hard to update or patch, making them easy targets for bad actors.

Replacing or upgrading these systems can be expensive, so many healthcare organizations struggle to modernize their cybersecurity.

High value of healthcare data on the black market

Unlike credit card numbers, which can be quickly canceled, PHI and insurance data are incredibly valuable on the black market. They can be used for various illicit activities, including identity theft, insurance fraud, and even medical fraud, for years.

This high street value makes healthcare organizations exceptionally attractive targets for financially motivated cybercriminals, leading to an alarming number of data breaches—only in May 2025, 59 breaches were reported in the U.S. healthcare sector, affecting 1.8 M individuals.

The average cost of a healthcare data breach is significantly higher than in other sectors, reflecting the sensitive nature of the data involved.

The expanding attack surface

The healthcare ecosystem is incredibly complex, with healthcare organizations relying heavily on a vast network of third-party vendors for everything from billing and IT services to specialized medical devices. If not properly secured, each third-party connection represents a potential entry point for attackers.

Furthermore, the growing use of IoT medical devices—from smart infusion pumps to remote monitoring sensors—introduces new vulnerabilities. Many of these devices are not built with robust healthcare data security in mind, creating a wider attack surface and increasing the risk of data breaches.

Resource constraints & skill gaps

Despite the critical nature of their data, many healthcare organizations operate with limited cybersecurity budgets and a lack of skilled cybersecurity professionals to manage it. This makes it harder to implement, maintain, and continuously update the advanced security measures necessary to keep pace with modern threats.

The ability to invest in cutting-edge healthcare data security tools and retain top talent is often a challenge.

Key regulations in healthcare data protection

To ensure patient data security and privacy, healthcare organizations must comply with several key regulations:

  • Health Insurance Portability and Accountability Act (HIPAA): Establishes national standards for protecting sensitive patient information.
  • Health Information Technology for Economic and Clinical Health Act (HITECH): Encourages healthcare providers to adopt electronic health records while strengthening the privacy and security protections under HIPAA.
  • General Data Protection Regulation (GDPR): This regulation applies to healthcare providers processing EU residents’ data and requires strict data protection measures.
  • State-specific privacy laws: Regulations like the California Consumer Privacy Act (CCPA) may also apply, emphasizing patient privacy and data security practices.

These regulations are designed to ensure healthcare data protection, requiring healthcare organizations to adopt robust security measures and implement strong data protection practices.

 

Top security threats to healthcare organizations

Various cybersecurity firms and annual industry reports confirm healthcare as a prime target for specific attack types like ransomware and phishing. Reports from cybersecurity firms like Proofpoint indicate that 88–92% of healthcare organizations experience cyber-attacks once a year. The threats they mostly encounter are:

Ransomware attacks

These remain one of the most debilitating threats. Often initiated via phishing or exploiting unpatched vulnerabilities, ransomware encrypts critical systems and patient data, demanding a ransom. Such attacks can bring hospital operations to a standstill, directly impacting patient care and causing extensive data breaches, with recovery costs often in the millions.

Insider breaches

Not all threats originate externally. Employees or contractors with authorized access can intentionally misuse or accidentally expose patient data, from unauthorized snooping to misdirected emails. These incidents pose serious patient data security issues and are particularly challenging to detect given the authorized access.

Phishing and credential theft

Phishing remains a primary initial vector for many cyber-attacks. Highly sophisticated campaigns target healthcare providers to trick staff into revealing login credentials. Once stolen, these credentials grant attackers unauthorized access to internal networks and sensitive patient data, directly leading to data breaches.

Third-party and vendor risks

The intricate supply chain means healthcare organizations rely on numerous vendors. Insecure systems within these third parties can become direct entry points into an organization’s network. A data breach at a vendor can thus compromise data for multiple partner healthcare organizations, creating a snowball effect on healthcare data security.

IoT vulnerabilities

While beneficial, the growing use of IoT medical devices introduces significant security risks. Many such devices prioritize functionality over robust security, often lacking strong authentication or encryption. This vulnerability allows potential unauthorized access to patient data or even manipulation of device functionality, impacting both healthcare data security and patient safety.

 

 

Security challenges in the healthcare industry

The healthcare industry faces a unique and persistent set of challenges in maintaining effective data security in healthcare, which often exceed those found in other sectors. Successfully addressing these requires a careful understanding of the operational realities within healthcare organizations.

  • Balancing ease of access for medical staff with robust patient data security. Healthcare environments demand immediate, seamless access to patient information, especially in critical situations, making it a constant struggle to enforce strong network security without impeding patient care efficiency.
  • Integrating new technologies while maintaining compliance and security measures. The rapid adoption of innovations like AI and telemedicine requires careful integration into existing infrastructures, all while ensuring continuous regulatory compliance and maintaining a high level of data security across all systems.
  • Limited budgets and IT resources for advanced security tools. Many healthcare organizations, especially smaller providers, operate with constrained cybersecurity budgets and a shortage of skilled professionals, limiting their ability to invest in advanced healthcare data security tools and increasing their vulnerability to sophisticated cyber-attacks and data breaches.
  • Managing a diverse ecosystem of connected devices and vendor systems. A typical healthcare organization faces a challenge in ensuring consistent and effective data security across many interconnected medical devices, diverse IT systems, and numerous external vendor platforms that broaden the attack surface and increase the potential for undetected data breaches.

These challenges encourage healthcare organizations to adopt a proactive, multi-layered, and flexible approach to data protection. It’s not a one-time fix but an ongoing commitment to continuous improvement, built on robust strategies and strong partnerships. Let’s explore this more by diving into the best practices of data protection in healthcare.

Best practices to protect healthcare data

Implementing a strong healthcare data security strategy requires a combination of technology, processes, and people. These best practices are crucial for healthcare organizations aiming to prevent data breaches and maintain patient trust.

Four essential practices for protecting healthcare data: role-based access control with MFA, encryption and secure handling, staff training, and vendor security checks.

Role-based access control (RBAC) and MFA

Limit access to sensitive patient information based on job roles and enforce multi-factor authentication to add an extra layer of protection for EHRs. This ensures that employees only access the data necessary for their duties. At the same time, MFA significantly hardens login security, making it much more difficult for unauthorized users to gain access even with stolen credentials.

Encryption and secure data handling

Encrypt patient data at rest and in transit to safeguard healthcare data from unauthorized access. Even if a system is compromised, encryption renders the data unreadable to attackers. Implement secure data handling practices, including strict protocols for data disposal and secure file sharing, to minimize exposure risks.

Continuous staff training

Regularly train staff on data security practices, phishing awareness, and handling sensitive patient information securely to reduce human error. An informed workforce is often the first line of defense, capable of identifying and reporting potential threats before they escalate into data breaches.

Vendor and third-party oversight

Vet vendors and third-party services to ensure they follow strong data protection practices and do not expose your organization to unnecessary risks. Comprehensive due diligence and ongoing monitoring of third-party security postures are essential to extend your healthcare data security perimeter beyond your immediate infrastructure.

How to respond to a healthcare data breach

Despite all preventative efforts, data breaches can and do happen. A swift, organized, and compliant response is crucial to minimizing damage, restoring operational integrity, and rebuilding patient trust. This is a critical component of overall healthcare data security.

1. Contain the incident and assess the scope

Immediately isolate affected systems to prevent further damage and assess the scope of compromised patient data. Quick containment limits the spread of the breach, while a rapid assessment helps understand what data was impacted and how many individuals are affected.

2. Investigate the cause and preserve evidence

Identify how the breach occurred, preserve evidence for compliance and potential legal needs, and understand vulnerabilities in your systems. A thorough forensic investigation is vital not only for accountability but also to prevent future similar incidents and strengthen healthcare data security.

3. Notify affected parties and implement long-term fixes

Notify affected individuals and regulatory bodies as required, while addressing the root causes to strengthen data security in healthcare and prevent future incidents. Clear communication and quick action help reduce legal risks and regain trust in your data security.

How can NordLayer help with data security in healthcare

NordLayer supports healthcare providers and companies by securing their networks, helping with security compliance, and protecting healthcare data through layered security, Zero Trust Network Access (ZTNA), and continuous monitoring.

Our healthcare cybersecurity solutions are designed to address the complex challenges of healthcare data security, providing a robust defense against modern cyber threats. We help healthcare organizations strengthen data security and maintain patient trust while working toward compliance with healthcare regulations.

Frequently asked questions

What types of healthcare data are most frequently targeted by attackers?

Attackers typically target electronic health records, PHI, insurance data, and payment details due to their high value on the black market. These data types are central to many data breaches in the healthcare sector.

Do smaller healthcare providers face the same security challenges as large systems?

Yes, smaller healthcare providers face similar security challenges but often with fewer resources, making them particularly vulnerable to cyber threats and data breaches. They may lack the sophisticated defenses of larger healthcare organizations.

How do you secure healthcare data?

Securing healthcare data involves a layered approach, including role-based access, encryption, continuous monitoring, regular staff training, and strong vendor management, while aligning with regulatory requirements for healthcare data protection.

 

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Zero Trust Data Protection: a modern approach to securing sensitive data

Summary: Learn about Zero Trust Data Protection and its role in modern cybersecurity. See how it redefines data control, access, and risk in high-threat environments.

Today, traditional perimeter-based security models are no longer enough. With sensitive data flowing across hybrid environments, remote endpoints, and decentralized cloud systems, the challenge is no longer where data is—but who can access it and under what conditions. Zero Trust Data Protection offers a modern, policy-driven framework that rethinks how data security should function in a world where implicit trust is a liability.

This article explores what Zero Trust Data Protection really means, how it differs from broader Zero Trust security strategies, and why forward-thinking enterprises are adopting it as a foundational layer of their cybersecurity. If your organization handles sensitive data—and needs to ensure it’s always protected regardless of location, user, or device—this guide is for you.

What is Zero Trust Data Protection?

Zero Trust Data Protection (ZTDP) is an advanced security approach that applies Zero Trust principles specifically to how data is accessed, used, and protected. Unlike traditional models that assume trust based on network location or credentials, ZTDP follows the “never trust, always verify” philosophy—enforcing strict access controls and continuous validation across every layer of data interaction.

While it shares DNA with Zero Trust architecture, ZTDP goes a step further by shifting the focus from infrastructure to data access itself. This means that even if a user, device, or application gains entry into a trusted environment, data access is never assumed. Instead, policies built around least privilege access, real-time context, and behavioral signals govern who or what can interact with sensitive information—and under what conditions.

How does Zero Trust differ from traditional data security models?

Traditional data security models were built around the idea of a secure perimeter—think firewalls, VPNs, and on-premises access controls. In these models, once a user or device was authenticated and “inside the network,” they were typically granted broad access to internal systems and protected data. Trust was implicit, and security was largely dependent on defending the perimeter.

Zero Trust Data Protection completely upends this approach. Rooted in Zero Trust principles and enforced through Zero Trust architecture, ZTDP assumes that no user, device, or process should be trusted by default—even if inside the corporate network. Instead, every attempt to access data is treated as potentially hostile and evaluated in real time using contextual signals like identity, device health, geolocation, and behavior.

Another key distinction is how access is granted. While legacy systems often rely on static role-based access, ZTDP enforces least privilege access, ensuring that users can only access the data and resources they absolutely need, and only for the duration required. These strict access controls dramatically reduce the attack surface and limit lateral movement in the event of a breach.

In short, while traditional models focus on protecting the network, Zero Trust Data Protection is designed to protect the data itself—wherever it resides. This shift is critical in remote work, cloud adoption, and escalating insider threats. For organizations aiming to modernize their security posture and prevent unauthorized access or data loss, ZTDP isn’t just an upgrade—it’s a necessity.

What’s the difference between Zero Trust Data Protection and Zero Trust Data Security?

While often used interchangeably, Zero Trust Data Protection and Zero Trust Data Security serve distinct purposes—and understanding the difference is critical for businesses building advanced cybersecurity strategies.

In short, ZTDP differs from Zero Trust Data Security in that it centers more narrowly on data as the protected asset, rather than the broader ecosystem of users, networks, and endpoints. It strengthens an organization’s security posture, mitigates the risk of unauthorized access, and forms the backbone of effective data loss prevention strategies in modern, decentralized environments.

To put things into perspective, Zero Trust Data Security refers to the broader application of the Zero Trust security model. It includes securing networks, applications, endpoints, and identities, and is designed to eliminate implicit trust across the IT environment. Its goal is to reduce attack surfaces and prevent lateral movement through continuous verification and contextual authentication.

Zero Trust Data Protection, on the other hand, applies those principles directly to confidential data itself. Rather than focusing on infrastructure or identity per se, ZTDP enforces least privilege access to data at the object level—governing who or what can interact with specific data assets, under which conditions, and for how long. This data-centric approach is especially valuable in complex, distributed environments where access to data is fluid and dynamic.

The distinction matters. A company may implement Zero Trust security controls across its network and endpoints, but still leave data vulnerable if access policies aren’t enforced at the data layer. ZTDP closes that gap, enabling granular enforcement, contextual visibility, and stronger protection against unauthorized access—whether from external actors or insider threats.

An infographic showcasing that ZTDP matters, because it has reduced breach costs by 63% and enabled 45% faster threat detection.

This difference isn’t just theoretical. A 2021 study found that organizations implementing mature Zero Trust strategies—including data-level enforcement—experienced 63% lower breach costs and detected incidents 45% faster than those relying on traditional models or partial Zero Trust rollouts. In another example, a mid-sized healthcare provider reduced insider threat incidents by 40% after adopting data-centric Zero Trust controls, which limited data access to authorized personnel only, in real-time conditions.

For B2B organizations handling regulated or high-value data, Zero Trust Data Protection represents the next level of strategic investment—one that directly supports compliance, operational resilience, and long-term risk reduction.

Benefits of Zero Trust Data Protection

Securing data today isn’t just about keeping intruders out—it’s about controlling exactly who can access what, and under what conditions. As businesses grow more distributed and data becomes increasingly portable, traditional security approaches that focus on the perimeter or user identity alone are no longer enough. Zero Trust Data Protection takes a different approach: it puts the data at the center of the security strategy.

Below are some of the most valuable outcomes organizations can expect when implementing a ZTDP model:

Minimizes the attack surface

ZTDP reduces risk by enforcing least privilege access—only verified users and systems get access to the data they’re explicitly authorized to use. This limits the impact of compromised credentials or insider threats and prevents lateral movement within the environment.

Improves data visibility and control

One of the core benefits of Zero Trust—and of ZTDP specifically—is enhanced operational visibility. This makes it easier to detect unusual activity, apply dynamic policies, and respond to incidents faster.

Supports regulatory compliance

ZTDP helps meet regulatory requirements by applying precise, auditable controls to protected data. Organizations can enforce consistent policies and demonstrate that access is both justified and logged, simplifying audits and reducing compliance risk.

Key principles of Zero Trust applied to data protection

An image of a lock inside a shield and a list of the key principles of Zero Trust Data Protection: never trust, always verify; least privilege access; continuous verification; context-based data access; Protect data, not just perimeter

The principles of Zero Trust security form the foundation of an effective data protection strategy. When applied specifically to securing sensitive data, these principles help organizations reduce risk, enforce precise access controls, and respond dynamically to changing threats. Here are the core Zero Trust security principles as they relate to data protection:

  • Never trust, always verify. Trust is never assumed—even within the corporate network. Every request to access data must be authenticated, authorized, and continuously evaluated based on context such as user identity, device health, and location.
  • Least privilege access. Users, applications, and devices are granted only the minimum level of data access necessary to perform their function. This reduces the blast radius of potential breaches and enforces tight control over who can interact with which data.
  • Continuous verification. ZTDP relies on ongoing validation—not one-time authentication. Access is reassessed in real time using telemetry and behavior analysis, ensuring that session context and trust levels remain valid throughout.

How NordLayer helps implement Zero Trust Data Protection

Implementing Zero Trust Data Protection requires more than just high-level strategy—it demands technology that can enforce granular access controls, support dynamic work environments, and scale securely across your infrastructure. That’s where NordLayer’s platform stands out.

NordLayer enables organizations to apply Zero Trust security principles directly to data access, ensuring that every interaction with sensitive resources is authorized, authenticated, and context-aware. With identity-based Network Access Control (NAC), network segmentation, and Device Posture Security, NordLayer helps enforce least privilege access across your distributed workforce.

Its centralized Control Panel allows IT teams to manage user permissions, apply policy changes in real time, and monitor data activity across cloud and on-prem environments. By continuously verifying user and device trust levels, NordLayer ensures that access is both dynamic and compliant with modern security standards.

For organizations navigating complex compliance landscapes or hybrid infrastructure, NordLayer offers the tools to move from legacy perimeter-based models toward practical, enforceable Zero Trust solutions—ones that place data access at the core of the security strategy.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

More visibility to admins: Failed Logins data and revamped Dashboards

Summary: NordLayer’s new Failed Logins data and revamped Dashboards offer instant visibility, detailed logs, and clearer insights to enhance proactive threat detection.

Every access attempt to your network is significant—and quickly detecting unusual patterns can be critical for protecting your organization’s sensitive data. While occasional failed logins are normal, a sudden surge in login attempts can indicate brute-force attacks, signaling that someone may be trying to gain unauthorized access.

At NordLayer, we’re committed to protecting what matters most to your business while keeping security simple to manage. That’s why we continue to improve the Control Panel, which gives IT teams greater visibility and monitoring capabilities. These updates are part of our mission to provide layered, proactive protection without disrupting daily operations, helping you stay ahead of modern risks with confidence.

Instant visibility with the Failed Logins data

We’re introducing powerful new Failed Logins data within your Control Panel’s Dashboards section. It provides an overview of suspicious or unauthorized access attempts across your NordLayer Control Panel, apps, and Browser Extension—whether users log in via SSO or email/password, with or without 2FA.

Now, you’ll find a dedicated Failed Logins widget and graph that offers visibility into:

  • The number of attempts to log in within 24 hours
  • Trends that might indicate a targeted brute force attack
  • Anomalies that require your immediate attention
NordLayer Dashboards Security category displaying Failed Logins widget and graph, and the percentage of 2FA enablement

This instant insight helps you spot potential threats early, allowing you to stay in control and act before issues escalate. It’s a proactive approach to mitigating security risks.

Activity section upgrade—detailed Failed Logins log

To complement the Dashboards feature, we’ve also improved the Activity section. Now, a detailed Failed Logins log is available, providing 24-hour data and granular context for each unsuccessful access attempt.

NordLayer Control Panel showing Failed Logins log for monitoring suspicious login attempts

This comprehensive log equips IT admins with crucial information, including:

  • Name and email—who attempted to log in
  • Exact date and time—when the attempt occurred
  • Device IP address—the location of the attempt
  • Device or browser Information—what was used
  • Login method—SSO or email and password
  • Failure reason—which part of the login process failed
  • Number of failed attempts (per session)—to identify persistent efforts
  • Role (owner, member, etc.)—context about the user’s permissions
  • Status of the user—active, invited, etc

This level of visibility empowers your team to react faster to anomalies, investigate suspicious patterns thoroughly, and strengthens your overall threat response strategy with confidence.

By analyzing these patterns, admins can detect anomalies in user behavior, which may indicate brute force attacks, compromised accounts, or insider threats.

Dashboards overview

Beyond the new Failed Logins data, our redesigned Dashboards experience makes your security and usage insights clearer and more actionable.

Your NordLayer Dashboards continue to offer a wealth of valuable information, including:

  • User activity. Monitor who is connecting, when, and from where.
  • Throughput usage. Track data consumption across your network.
  • Server load. Keep an eye on performance and optimize resource allocation.
  • Connection trends. Understand network patterns and peak usage times.

These insights are vital for optimizing network performance, managing user access, and maintaining a robust security posture, all from a centralized control point.

Usage vs. Security categories

We’re restructuring the dashboard to improve clarity and streamline your experience. You’ll now find insights clearly grouped under two new, intuitive categories: Usage and Security.

NordLayer Dashboards displaying Usage category with network activity, such as Active sessions during the last seven days

Usage

This section provides an overview of network activity, throughput consumption, and user engagement, helping you manage resources efficiently. You’ll still find familiar visualizations, including:

  • Graphs for sessions, protocols, server bandwidth
  • Donut charts for device OS distribution, browser type distribution, and NordLayer client versions

Security

This new dedicated section consolidates all critical security-related data, including the new Failed Logins data, threat alerts, compliance-related metrics, and 2FA enablement percentages. This clear separation ensures that your most vital security information is easily accessible, allowing for rapid assessment and decision-making.

The new structure not only simplifies navigation but also makes it easier to focus on specific areas of your network’s performance and security health.

Why it matters

These updates are more than just new additions; they’re about giving IT admins and organization owners better visibility and monitoring capabilities for proactive security and streamlined operations.

  1. Monitor failed logins to instantly spot potential unauthorized access attempts or brute-force attacks, helping mitigate security risks before they escalate.
  2. Gain deeper insights into user behavior patterns to detect anomalies indicating compromised accounts or insider threats.
  3. Enforce stricter access controls and align with Zero Trust principles by continually verifying access based on failed login data. This allows you to quickly implement additional authentication measures or adjust permissions when suspicious activity is detected.
  4. When a spike in failed logins occurs, quickly investigate, block suspicious IPs, or temporarily suspend accounts, reducing response time and minimizing exposure.
  5. Contribute to audit trails with detailed logs of failed login attempts for compliance with regulations like GDPR and HIPAA, fostering accountability and demonstrating due diligence.
  6. Highlight areas where users might need additional training on password management or where access policies require refinement, such as implementing MFA for frequent failures.

By providing clear, actionable intelligence, NordLayer helps your organization detect threats early, stay in control, and act before issues escalate into significant incidents.

Final thoughts

The new Failed Logins data and the redesigned Dashboards experience represent a significant step forward in improving your cybersecurity with NordLayer. These tools will give you greater peace of mind and more effective control over your network’s security, empowering you to manage complex challenges with greater efficiency.

We encourage you to log into your Control Panel today, explore the new Dashboards categories, and use the data to strengthen your threat detection and response strategies.

Your proactive security journey just got a powerful upgrade.

 

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×