How the ENIGMA Cipher was Hacked in World War 2

Codebreakers.

The iconic ENIGMA machine was widely used during World War 2 by the German military and thought to be uncrackable. But the incredible story of how the ENIGMA cipher code was hacked involved brute forcing, an insider threat, and human error, and even just plain luck. The Insider Threat that Compromised the ENIGMA Machine Brilliant…

Read More

How Faster Authentication and Auto-logouts Help Patient Care

Faster EHR Authentication.

In the field of medical care, efficiency and efficacy are paramount. Patients need to receive the very best care promptly — something which will, in turn, reduce costs and improve satisfaction. But this is difficult, especially in these demanding times. Giving care providers a means to quickly and securely login to workstations and software platforms…

Read More

Thin Client Benefits

MFA for thin clients.

Modern businesses are constantly on the lookout for ways to improve IT effectiveness and cost-efficiency. IT hardware budgets have fallen on average in the last two years, from 35% of total IT budget in 2019 to only 31% in 2021. What’s more, IT departments now expect more from their solutions at a more amenable price…

Read More

History of the Password

Don't change passwords.

The Evolution of the Password Every few months, banks, our company’s IT department, email clients and certain apps remind us to change our passwords. And when we do, some systems even assess the level of difficulty of our new passwords, telling us if our new password is weak or strong. We’re also told that we’re…

Read More

Why Password Change Requirements are Bad

Reduce password changes.

Is your password policy to change passwords every so often? 90 days? According to NIST, the FTC, Microsoft, and other leading organizations, required password changes might be a bad idea for both security and convenience. Forced password changes wasn’t a bad idea. But relying on end users to frequently change their passwords leads to the…

Read More

Reduce Helpdesk Tickets with a Password Manager

Reduce helpdesk calls and save time.

Reduce helpdesk tickets with a password manager Is your helpdesk inundated with password problems? According to a study carried out by Google, around 75% of people report experiencing password issues. In a climate where cybercrime is on the rise, it’s wise to encourage your employees to use multiple complex passwords. However, if they’re continuously forgetting…

Read More

Achieving CMMC Level 3 Certification with the GateKeeper Token

CMMC Level 3

The CMMC is a cybersecurity framework implemented by the Department of Defense (DoD) in an effort to protect the data of all Americans and to foster a long-term culture of cyber hygiene. Since 2020, the team behind CMMC has been conducting auditing procedures and offering certifications to businesses that meet their exacting standards. Therefore, we…

Read More

Security Risks of Remote Desktop for Work

RDP security solution for IT admins.

Security Risks of Using Remote Desktop for Work. Remote desktop tools allow users to access and control remote computers from other devices over the internet. According to recent observations, a hybrid work system where employees can work interchangeably from the office and remotely is shaping up as the new workplace norm. Remote desktop is an…

Read More

Security Lessons from Military History

Security lessons from history.

History repeats itself more often than we think. Let’s take a look at some military lessons through the ages and see how they can apply to our modern-day cyber security challenges. Many of the same fundamental requirements for a successful military campaign are no different than those of an IT manager’s battles. They both take…

Read More