GATEKEEPER BLOG

Malicious browser.

Malicious Browser Extensions Contribute to Insider Threats

October 7, 2018

Network administrators have a unique challenge providing users with an efficient working environment that also protects against network threats. Most administrators block random installations. But this can be a problem when users need to customize their desktops to work productively. This customized environment includes the ability to add browser extensions. But these small programs can…

Read More
insider threat detection

How to Identify the Basic Signs of Insider Threats to your Local Network

September 22, 2018

Insider threats are cyber security breaches that stem from a trusted employee or vendor allowing an outsider to gain access to the local network. It’s a frustrating and difficult cyber security issue to avoid. You need to give employees plenty of permissions to perform everyday tasks. But you can’t give them open access to areas…

Read More
default password risk from routers

Routers Under Attack from Russian Hackers through Default Passwords

July 14, 2018

One common element of all networks is the existence of routers. These devices weren’t always used in household networks. But they soon became commonplace with any home network. Because they are so commonplace, hackers have gone after home routers with numerous different attacks. Some attacks make routers a part of a botnet. Others sniff data…

Read More

A Recent Ticketfly Data Breach Reminds Consumers to Use Incomplete Data When Possible

June 26, 2018

Data breaches obviously leak private information to nefarious people. They then sell it on the black market or use it for financial gain. But how do consumers know when a provider is secure? One way to combat your data being leaked and take some security into your own hands is to leave incomplete or even…

Read More
GDPR compliance solution

€20,000,000 or 4%? – GDPR

May 20, 2018

You knew it was coming, and while initially, you may have been in denial, you can’t ignore it anymore. The General Data Protection Regulation (GDPR) is going into effect on May 25, 2018, whether you’re ready or not. Make sure you have a GDPR compliance solution deployed to make maintaining compliance much easier. Because the…

Read More
crypto mining malware

Insider Threats and the Dangers of Crypto Mining to the Enterprise

March 25, 2018

Although there has been several debates on the advantages and disadvantages of cryptocurrency and the enterprise, one issue with it is cyber security. Dealing with bitcoin or any other cryptocurrency could be an advantage for revenue. But cyber security experts are concerned with the risk of mining and using internal resources on the local network.…

Read More
Human errors in technology

When Human Error Sends Panic Across the Country

February 6, 2018

On January 13th, the state of Hawaii went into a state of panic when they received an emergency text message telling them that a ballistic missile was incoming. It took 38 minutes before a follow-up message was sent telling people that the message was in error.  The governor of Hawaii later held a conference explaining…

Read More
cyber security defense solution

The First Line of Defense in Cyber Security

January 12, 2018

Headlines continue to provide us with more information on large data breaches like Yahoo and Equifax, where cyber attackers gained access to personal information through gaps in security software. But a shocking number of data breaches have nothing at all to do with the level of an organization’s security. Instead, they have everything to do…

Read More
Crypto hardware wallet password key.

How do Cryptocurrency Hardware Wallets Work?

December 3, 2017

How Does a Cryptocurrency Hardware Wallet Work? The cryptocurrency market continues to grow with many new technological and innovative advancements. The hardware wallet is such an advancement – it stores your private keys on an external device rather than online, on your phone, or your computer. Hardware wallets are popular because they offer increased security…

Read More