GATEKEEPER BLOG

Defense against cyber vulnerabilities.

The 5 Vulnerabilities You’re Missing on Your Corporate Network

December 3, 2018

When an organization thinks of insider threats, it’s often thought that it means malicious employees stealing data or destroying resources. Insider threats aren’t just employees with malicious intent. It’s also…

Read More

Understanding Your Employee Cybersecurity

November 23, 2018

A common error with most employee cybersecurity is that what they do is exempt from all other issues in regard to security. The fact is that cybersecurity has a lot…

Read More
Drupal vulnerability - drupalgeddon2

When CMS Software Such as Drupal is a Threat

November 13, 2018

Sometimes, insider threats are less about people maliciously attacking your network but more about the software you install. Any type of software could have vulnerabilities including what would otherwise seem…

Read More
Advanced access control on need to know basis.

Understanding Permission Aggregation and Insider Threats

November 1, 2018

Insider threats are a growing concern for any large corporation.  In 2016, 40% of successful breaches were due to outsiders, but 37% were due to insider threats. These numbers show…

Read More
Email fraud prevention solution.

Phishing and Email Fraud are Top Security Risks for Corporations

October 25, 2018

Email is essential for business, but it’s also a top concern for security administrators that need to protect the internal network from data breaches and loss of digital assets. With…

Read More
healthcare cyber security

Healthcare Organizations are Among the Biggest Targets for Attackers

October 22, 2018

Of all the organizations threatened by insider threats, healthcare companies top the list. In the past several years, healthcare organization data is among the top of the list in the…

Read More
insider threat detection

How to Identify the Basic Signs of Insider Threats to your Local Network

September 22, 2018

Insider threats are cyber security breaches that stem from a trusted employee or vendor allowing an outsider to gain access to the local network. It’s a frustrating and difficult cyber…

Read More
Chrome exploits - CSS code.

Chrome and Firefox Exploits using CSS and HTML5

August 6, 2018

Insider threats come in all different shapes and sizes. Many times it’s not malicious in any way even though they come directly from your own employees. A recent vulnerability found…

Read More
default password risk from routers

Routers Under Attack from Russian Hackers through Default Passwords

July 14, 2018

One common element of all networks is the existence of routers. These devices weren’t always used in household networks. But they soon became commonplace with any home network. Because they…

Read More