Skip to content

Offline Mode, policy to block jailbroken and rooted devices, and other improvements: catch up with NordPass in Q3 of 2025

Media and awards

We’re super happy to share three acknowledgments we’ve received this quarter for our work creating advanced yet intuitive password management solutions. 

Listed as #1 by Password Manager

We are honored to be named the Best Password Manager of 2025 by Gunnar Kallstrom, a Cyber Team Lead at a DOD contracting company. Kallstrom highlighted NordPass as a well-balanced solution with strong security and a smooth user experience for both personal and business use. As this is ingrained in our brand’s DNA, it’s great to be recognized for it. 

Geekflare picks us as #2 best enterprise password manager 

Geekflare recognized us for our ability to combine simplicity with robust security, adding to our growing list of accolades. Their team helps businesses find the best software for their needs, so it was a great pleasure to be named by them as the second-best enterprise password manager for 2025. According to Geekflare, NordPass makes a standout choice for those who seek straightforward password management with strong encryption.

PCMag’s pick for the best password manager

We’re thrilled to share that PCMag has honored us with its Editor’s Choice award for the second year in a row, naming NordPass the Best Premium Password Manager for 2025. We’re especially proud of their praise, calling NordPass “just about everything you’d want from a password manager.” Rest assured, we’re committed to keeping it that way!

What’s new with NordPass

We stay true to that promise by improving our password manager every quarter—whether it’s refining existing features or introducing new ones. Let’s take a look at what we’ve been working on over the past few months.

Offline Mode 

First up, we’re excited to introduce Offline Mode for our Business users. It’s a new feature that ensures you can access your vault even without an internet connection. Whether you’re traveling, dealing with an internet outage, or working in a network-restricted area, you’ll still have secure, read-only access to all your credentials when you need them most. This feature is currently available only on mobile devices, but we’re excited to roll it out to the desktop app and browser extensions soon.

This eliminates the need for risky workarounds like exporting your vault to an unsecure file, keeping your sensitive data protected within the encrypted NordPass environment at all times.

1-inner-asset-Offline Mode

Block jailbroken and rooted devices

NordPass now has a new default policy option that blocks access to the NordPass app on rooted Android and jailbroken iOS devices. Such devices pose a higher risk of data leakage, app tampering, and other security breaches. So, with this feature, you’ll enforce security and maintain the integrity of the application. However, if there’s a need, your organization’s Owners and Admins can allow usage on those devices.

2-inner-asset-Block jailbroken

Business Account session management

With the next phase of Business Account session management, we’re giving you even more control over your organization’s security. This feature provides Admins with a complete overview of all active user sessions across the organization, including details about those sessions, like device, platform, IP address, and the last login. This enhanced visibility empowers you to take immediate action—if you spot any suspicious activity, you can instantly revoke members’ sessions, either all at once or in separate sessions, to protect your company’s data.

3-inner-asset-session management

Enhancing the autofill experience for Android users 

We upgraded the URL linking to the items on the Android NordPass app. Now, if the website is not linked to the item on the app, NordPass autofill will suggest that the user add the URL to the NordPass item.

Similarly, you can now use autofill to copy NordPass’ built-in TOTP code to the clipboard once it is generated to streamline the logging process without interruption.

Making the B2B onboarding process more intuitive 

We continuously strive to improve and make our product more intuitive. Onboarding is a crucial part of this equation—if you can’t get through the onboarding without hiccups, will the product actually be intuitive? With that in mind, we revised our B2B onboarding process, tweaking the necessary parts to make the flow as seamless as possible.

Other minor improvements

But that’s not all! We also did some other minor product touch-ups to make your experience better:

  • We’ve rolled out performance improvements to the Sharing Hub, ensuring a faster and more reliable experience.

  • Finding what you need is now easier with our smarter search. It now understands non-exact titles, so you can find an item like “Bayern München” even if you just type “Munchen.”

  • Lastly, we’ve introduced new in-app privacy settings, giving you clear and direct control over your data tracking preferences.

Bottom line

Well, that’s a wrap! This quarter was busy mainly with feature updates and experience enhancements—we hope you have already made the best use of them!

Just before you go, a quick note. Recently, our team has noticed an increased number of scams offering help through fake NordPass phone numbers. We want to remind you that we only provide customer support through chats and emails. That’s all—see you next quarter!

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Detecting Ransomware Across the Entire Attack Lifecycle

The threat of ransomware is constantly evolving, and traditional security tools are struggling to keep up. This is largely because ransomware has become a sophisticated business model, fueled by the availability of “Ransomware-as-a-Service.” This model allows individuals with very little technical skill to launch professional-grade attacks. Traditional defenses like firewalls and endpoint protection platforms (EPPs) are no longer sufficient because they leave significant blind spots, especially with unmanaged devices such as printers, scanners, and IoT devices that cannot run an endpoint agent.

The Importance of Network Visibility

The core principle for effective ransomware detection is comprehensive network visibility. Every stage of a ransomware attack, from the initial compromise to data exfiltration, leaves a detectable trace in network traffic. By mapping the stages of an attack to the MITRE ATT&CK framework, we can see how network monitoring can reveal malicious activity:

  • Initial Access: Unauthorized user logins or connections to external systems.
  • Execution: The start of a new process or suspicious PowerShell command.
  • Persistence: The creation of new user accounts or scheduled tasks.
  • Privilege Escalation: Network access to administrator accounts or servers.
  • Lateral Movement: Communication between endpoints that normally don’t interact.
  • Command and Control: Connections to suspicious IP addresses or domains.
  • Exfiltration: Large data transfers to external, unknown servers.

How Network-Based Detection Works

A solution like GREYCORTEX Mendel is designed to provide this essential network visibility. Mendel monitors the behavior of the entire network infrastructure, using machine learning and behavioral analysis to detect malicious activity. This is effective even on devices where endpoint protection cannot be deployed.

Beyond active detection, a network-based approach also aids in post-attack compromise assessment. By continuously monitoring for hidden backdoors and “keep alive” connections, it helps ensure the network is truly clean after remediation, preventing attackers from returning later.

Strengthening Your Cybersecurity Ecosystem

A solution like Mendel is a crucial component of a modern cybersecurity ecosystem. By providing deep network visibility, it not only helps stop active attacks but also strengthens long-term network resilience. This holistic approach ensures that your defenses are prepared for a ransomware attack at every stage of its lifecycle.

About GREYCORTEX
GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

MENDEL, GREYCORTEX’s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.

MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

What is Privileged Access Management (PAM)?

Privileged Access Management (PAM) is a security solution designed to protect a business by monitoring, detecting, and preventing unauthorized access to its most critical resources. The main objective of PAM is to ensure that individuals are granted only the minimum level of access required to perform their jobs, which significantly helps in preventing data breaches.

What is a Privileged Account?

A privileged account is any account that has more permissions and access rights than a standard user account. These accounts can take several forms, including:

  • Superuser accounts: These accounts, such as ‘root’ on Linux or ‘Administrator’ on Windows, have virtually unrestricted access to the system.
  • Domain administrator accounts: These accounts possess the highest level of control across an entire network domain.
  • Local administrator accounts: These provide full control over a specific server or workstation.
  • Application administrator accounts: These are used to manage specific software and its associated data.
  • Business privileged user accounts: These accounts grant high-level access based on a person’s specific job function, such as roles in finance or human resources.
  • Emergency accounts: Also known as ‘break-glass’ accounts, they provide temporary administrator access during a crisis or disaster.

The Core Principles of PAM

An effective Privileged Access Management strategy is built on three fundamental principles:

  1. Principle of Least Privilege (PoLP): This is the cornerstone of a robust security strategy. It dictates that users and systems should only be given the bare minimum access they need to perform their duties.
  2. Just-in-Time (JIT) access: This principle eliminates the need for users to have powerful permissions around the clock. Instead, elevated access is granted on-demand for a specific task and a limited time, and is automatically revoked once the task is complete.
  3. Continuous monitoring and auditing: This involves privileged session management (PSM), which actively monitors, records, and controls all activity that occurs during a privileged session. This creates a clear, unalterable audit trail for accountability and investigation.

Why is PAM Important?

Implementing a PAM solution is a crucial business decision that provides benefits in three key areas:

  • Mitigating cyber risks: PAM prevents unauthorized parties from gaining elevated access, halting lateral movement in a network during a breach, and neutralizing ransomware attacks by starving malware of the access it needs to spread. It also helps manage insider threats by limiting employee access to only what is required for their jobs.
  • Achieving regulatory compliance: Many regulations, such as SOX, HIPAA, and PCI DSS, require proof of effective security measures. PAM solutions provide detailed session logs and audit trails that serve as concrete evidence for auditors.
  • Improving operational efficiency: PAM solutions automate the manual, time-consuming tasks of managing privileged credentials, offering a centralized platform for password management, and streamlining the process of granting and revoking permissions.

PAM and Other Security Solutions

It’s important to understand how PAM fits into the broader cybersecurity landscape:

  • Identity and Access Management (IAM): This is the broadest category, managing the rights of every user in an organization. PAM and PIM (Privileged Identity Management) are more focused solutions that operate within the IAM framework.
  • Privileged Identity Management (PIM): PIM focuses on the user identity itself, managing the lifecycle of privileged user accounts and their permissions.
  • Privileged Access Management (PAM): PAM, on the other hand, focuses on controlling and monitoring access to critical resources and securing the connection to sensitive systems and data. You can think of PIM as securing the “who,” while PAM secures the “what” and “how.”

Key Features of PAM Software

An effective PAM solution should include:

  • Secure vaulting and password management: A centralized digital safe for all privileged credentials.
  • Session management and monitoring: The ability to monitor, record, and terminate suspicious sessions in real time, creating an unalterable record for investigations.
  • Access control and elevation: Granular control to enforce the principle of least privilege, allowing users to request temporary, elevated permissions only when needed.
  • Multi-factor authentication (MFA): A non-negotiable security layer that ensures accounts remain secure even if a password is stolen.

Best Practices for Implementing PAM

A successful PAM implementation requires a thoughtful strategy, including:

  • Implementing least privilege access and a zero-trust model.
  • Using strong authentication, with MFA on every privileged account.
  • Monitoring and auditing all activities through session management features.
  • Controlling the credentials lifecycle with unique, strong passwords stored in an encrypted vault.
  • Educating users on the importance of these security controls.

How NordPass Can Help

NordPass can be a valuable tool for building a PAM suite, assisting organizations with their credential management challenges. With NordPass, you can:

  • Securely store, share, and manage credentials in an encrypted vault using the XChaCha20 encryption algorithm.
  • Manage access rights for individuals and groups.
  • Set company-wide password rules and provide tools for generating and storing strong passwords.
  • Strengthen authentication by requiring MFA and integrating with existing SSO providers.
  • Monitor login activity in real-time with detailed audit logs.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Why IT Security Authentication Fails

Authentication is a crucial part of IT security, but it can often fail due to several common issues. This article from Portnox explains why strong authentication is so important and details the main causes and consequences of authentication failures.

Common Causes of Authentication Failures

The article discusses a variety of authentication methods, including passwords, biometrics, and multi-factor authentication (MFA). It identifies the following as the main reasons for authentication failures:

  • Weak Passwords: Users often create simple passwords that are easy to guess or crack.
  • Phishing Attacks: Hackers trick users into revealing their login credentials.
  • Lack of User Training: Employees may not understand the importance of security best practices.
  • System Misconfigurations: Improperly set up security systems can create vulnerabilities.

Consequences and Prevention

The consequences of these failures can be severe, including data breaches, loss of customer trust, and major operational disruptions. To prevent these problems, the article recommends strengthening password policies, providing better user training, and implementing robust security measures like MFA.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

How to recover your hacked Facebook account

This article provides a guide on how to recover a compromised Facebook account, outlining steps for two main scenarios: when you still have access, and when you are completely locked out. It also includes advice for securing your account afterward to prevent future attacks.

If You Still Have Access to Your Account

If you can still log in, you must act quickly to secure your account.

  • Change Your Password: Create a new, strong password immediately.
  • Log Out of All Devices: In your security settings, you can force a log-out on all devices that have ever been logged into your account.
  • Review Connected Apps: Check for any apps you don’t recognize and remove them.

If You Are Completely Locked Out

If a hacker has changed your login information, use Facebook’s official recovery tool to regain access.

  1. Navigate to the Facebook recovery page: https://www.facebook.com/hacked.
  2. Follow the on-screen instructions, which will guide you through a process to identify your account and verify your identity.
  3. Important: Avoid using any third-party services that claim to recover your account, as these are often scams.

How to Prevent Future Hacks

Once you’ve regained control of your account, take these steps to make it more secure.

  • Enable Multi-Factor Authentication (MFA): This adds an extra layer of security, requiring a code from your phone or another device in addition to your password.
  • Secure Your Email: Ensure the email account linked to your Facebook profile is also secure, as hackers can use it to reset your password.
  • Notify Your Contacts: Inform friends and family that your account was compromised so they can be aware of any malicious messages sent from it.
  • Use a Password Manager: Consider using a password manager to generate and store strong, unique passwords for all your online accounts.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×