Schedule a Demo of GateKeeper Enterprise or call 240-547-5446

American College of Healthcare Trustees and Untethered Labs’ GateKeeper Enterprise Partner to Offer Healthcare Organizations Fastest Hands-Free Computer Access Control

COLLEGE PARK, Md., May 12, 2020 /PRNewswire-PRWeb/ — The American College of Healthcare Trustees (ACHT) and Untethered Lab’s GateKeeper Enterprise, an on-premise identity access management platform, announce partnership to help hospitals, physician practices and other healthcare organizations to enhance productivity through touchless authentication, while also avoiding unnecessary HIPAA fines and data breaches. This partnership is further supported…

Read More

3 Sectors That Benefited Most from Identity Management Software

The pace at which modern technologies advance is nothing short of impressive. Companies are able to gather and analyze more information and generate actionable insights of better quality. That said, these technological improvements come with great security risks to corporations and businesses of all sizes, including, but not limited to massive data breaches, identity theft,…

Read More

Phishing attack prevention with a key

A phishing attack is a fraudulent effort by a cybercriminal to steal a victim’s credentials (username and password) or other sensitive information such as credit card numbers. The main method of this attack is to send an official-looking email/communication to dupe the victim into freely providing the correct information. Usually the email comes from a…

Read More

Satori Malware Aims at D-Link Routers

Satori isn’t new malware, but it’s the most infamous of its kind in the IoT world. Satori is a malicious application that scans the Internet for vulnerable devices and adds this vulnerable device to its botnet. It’s terribly effective for botnet creators – good for malware attackers but bad for innocent bystander users. The result…

Read More

The Rise of Currency Miner Malware

Insider threats are usually considered malicious. Most companies think of a cyber threat as someone who maliciously attacks the network, steals data, or destroys company resources. Employee negligence also falls into the insider threat category. One area of negligence that puts your company network at risk is downloaded software. The user then installs malicious software…

Read More

The 5 Vulnerabilities You’re Missing on Your Corporate Network

When an organization thinks of insider threats, it’s often thought that it means malicious employees stealing data or destroying resources. Insider threats aren’t just employees with malicious intent. It’s also employee negligence either by allowing malware to be installed on the local network or just accidentally leaking data. Whatever the reason, it’s the responsibility of…

Read More

Understanding Your Corporate Security and Employees

A common error with most organizations is that what they do is exempt from all other issues in regard to security. The fact is that cybersecurity has a lot to do with the way the public perceives an organization. The fact is that the way your employees use customer records can have a huge effect…

Read More

When CMS Software Such as Drupal is a Threat

Sometimes, insider threats are less about people maliciously attacking your network but more about the software you install. Any type of software could have vulnerabilities including what would otherwise seem like innocuous software. Even CMS (content management system) software could pose a threat. This is exactly what happened with the latest Drupal threat, which is…

Read More

Pin It on Pinterest