GATEKEEPER BLOG

Defense against cyber vulnerabilities.

The 5 Vulnerabilities You’re Missing on Your Corporate Network

December 3, 2018

When an organization thinks of insider threats, it’s often thought that it means malicious employees stealing data or destroying resources. Insider threats aren’t just employees with malicious intent. It’s also employee negligence either by allowing malware to be installed on the local network or just accidentally leaking data. Whatever the reason, it’s the responsibility of…

Read More

Understanding Your Employee Cybersecurity

November 23, 2018

A common error with most employee cybersecurity is that what they do is exempt from all other issues in regard to security. The fact is that cybersecurity has a lot to do with the way the public perceives an organization. How employees use customer records have a huge effect on the way your data is…

Read More
Drupal vulnerability - drupalgeddon2

When CMS Software Such as Drupal is a Threat

November 13, 2018

Sometimes, insider threats are less about people maliciously attacking your network but more about the software you install. Any type of software could have vulnerabilities including what would otherwise seem like innocuous software. Even CMS (content management system) software could pose a threat. This is exactly what happened with the latest Drupal threat. Drupal CMS…

Read More
Advanced access control on need to know basis.

Understanding Permission Aggregation and Insider Threats

November 1, 2018

Insider threats are a growing concern for any large corporation.  In 2016, 40% of successful breaches were due to outsiders, but 37% were due to insider threats. These numbers show that these types of attackers are just as popular as threats caused by employees, vendors or corporate contractors. Insider threats include anything from simple employee…

Read More
Email fraud prevention solution.

Phishing and Email Fraud are Top Security Risks for Corporations

October 25, 2018

Email is essential for business, but it’s also a top concern for security administrators that need to protect the internal network from data breaches and loss of digital assets. With a combination of reconnaissance and social media, an attacker can form a list of possible victims and target them in an attempt to get credentials…

Read More
healthcare cyber security

Healthcare Organizations are Among the Biggest Targets for Attackers

October 22, 2018

Of all the organizations threatened by insider threats, healthcare companies top the list. In the past several years, healthcare organization data is among the top of the list in the biggest data breaches recorded. The healthcare industry is a big target for cyber criminals. It might be the biggest target, depending on the metric. Yahoo…

Read More
insider threat detection

How to Identify the Basic Signs of Insider Threats to your Local Network

September 22, 2018

Insider threats are cyber security breaches that stem from a trusted employee or vendor allowing an outsider to gain access to the local network. It’s a frustrating and difficult cyber security issue to avoid. You need to give employees plenty of permissions to perform everyday tasks. But you can’t give them open access to areas…

Read More
Chrome exploits - CSS code.

Chrome and Firefox Exploits using CSS and HTML5

August 6, 2018

Insider threats come in all different shapes and sizes. Many times it’s not malicious in any way even though they come directly from your own employees. A recent vulnerability found in Firefox and Chrome gave attackers access to images from the popular social media site Facebook. The vulnerability was mainly from the advanced HTML5 and…

Read More
default password risk from routers

Routers Under Attack from Russian Hackers through Default Passwords

July 14, 2018

One common element of all networks is the existence of routers. These devices weren’t always used in household networks. But they soon became commonplace with any home network. Because they are so commonplace, hackers have gone after home routers with numerous different attacks. Some attacks make routers a part of a botnet. Others sniff data…

Read More