GATEKEEPER BLOG

GDPR compliance solution

€20,000,000 or 4%? – GDPR

May 20, 2018

You knew it was coming, and while initially, you may have been in denial, you can’t ignore it anymore. The General Data Protection Regulation (GDPR) is going into effect on May 25, 2018, whether you’re ready or not. Make sure you have a GDPR compliance solution deployed to make maintaining compliance much easier. Because the…

Read More
malicious site access prevention

More Malicious Sites Threaten Your Organization’s Cyber Security

April 19, 2018

Having Internet access is a must for most employees. They need it for various productivity tasks. What was once a “nice to have” is not necessary for job function. IT administrators are forced to provide Internet access even if it’s limited to certain parts of the web. The difficult part is providing open Internet access…

Read More
crypto mining malware

Insider Threats and the Dangers of Crypto Mining to the Enterprise

March 25, 2018

Although there has been several debates on the advantages and disadvantages of cryptocurrency and the enterprise, one issue with it is cyber security. Dealing with bitcoin or any other cryptocurrency could be an advantage for revenue. But cyber security experts are concerned with the risk of mining and using internal resources on the local network.…

Read More
cyber security defense solution

The First Line of Defense in Cyber Security

January 12, 2018

Headlines continue to provide us with more information on large data breaches like Yahoo and Equifax, where cyber attackers gained access to personal information through gaps in security software. But a shocking number of data breaches have nothing at all to do with the level of an organization’s security. Instead, they have everything to do…

Read More
Crypto hardware wallet password key.

How do Cryptocurrency Hardware Wallets Work?

December 3, 2017

How Does a Cryptocurrency Hardware Wallet Work? The cryptocurrency market continues to grow with many new technological and innovative advancements. The hardware wallet is such an advancement – it stores your private keys on an external device rather than online, on your phone, or your computer. Hardware wallets are popular because they offer increased security…

Read More
Assistive technology solution for logging into computers.

GateKeeper Assistive Technology for Logging In

November 5, 2017

The best office tech helps you get your work done with efficiency and convenience. But when you’re working with a disability, challenges to that kind of unthinking ease can crop up throughout the day. Assistive technology for logging into computers. Touchless password tech can help. GateKeeper type-free login offers simple and elegant tech that unlocks…

Read More
Hard lessons from data breaches in cybersecurity.

One Hard Lesson From the Breach of Breaches

September 13, 2017

Spoiler alert: we’re talking about data breaches – Equifax. It seems like once a week there’s a new hacking making headlines. The one at the top of our list lately that we’re reading obsessively about—Equifax. In the wake of the Equifax breach, businesses, lawmakers, and individuals (including all of us over here) are putting the…

Read More
Medical cyber security solutions.

Medical Cyber Security with GateKeeper

September 11, 2017

Medical cyber security automated for doctors and nurses. GateKeeper is a localized wireless tracking solution that allows for constant real-time monitoring of personnel in a pre-determined and well-defined location. Personnel only carry a small wireless smart key with them, and their presence and absence in the trauma center will automatically be monitored. This system does…

Read More
Adopt Multifactor Authentication. Why you need MFA.

Why Enterprises Should Rush to Adopt Multifactor Authentication.

August 2, 2017

Phishing attacks, social engineering, database breaches, cyber attacks – all terms that have found their way into our daily lives. If the incessant news of the past decade has shown any trend, it’s that no organization is immune to cyberattacks. And a lot of this evidence points to single points of failures – passwords. Adopt…

Read More