Login Options for GateKeeper Proximity 2FA
Login Options Available on GateKeeper®. Hands-free login to workstations, websites, and desktop applications. Turbocharge your end users’ login options for a more productive workforce. Most importantly, IT admins can increase security while actually letting users login faster! GateKeeper Proximity has multiple convenient login options available for IT admins to let end user login with: 2FA…
Read MoreProximity Key for Passwords
When it comes to security vs convenience, it is hard to find a good balance. However, the GateKeeper proximity key solution provides both. It is a proximity key-based password manager for computers, websites, and software. This greatly reduces password mistypes, forgotten passwords, sharing passwords, and unlocked workstations. There are two groups of people that benefit…
Read MoreHow to Launch RDP Session Automatically at Login
Launch your RDP session automatically at login. Launch RDP automatically. Follow the step-by-step directions for using Windows Task Scheduler (Windows 10) to launch a Remote Desktop Session every time the computer is unlocked. This will save much time and increase speed of login. 1. First, click the Windows Key. Then search for Task Scheduler. 2.…
Read MoreThwarting Insider Threats
Insider threats are difficult to see and even harder to acknowledge for most organization. “How could our own people be a threat to us?” Yes, this is exactly the type of attitude that leads to successful insider threat actors. Many insider threats come from trusted employees, which is something most employers don’t consider. It’s hard…
Read MoreWhat is an Advanced Persistent Threat?
Advanced Persistent Threats explained. Advanced Persistent Threats (or “APTs”) are a dangerous form of cyber attack where a team of intruders use sophisticated hacking techniques to establish a long-term presence on a network. Their intention is usually to breach highly sensitive data and their methods are always evolving. These APT attacks usually come from very…
Read MoreHow Mistakes, Forgetfulness, and Carelessness can Undo the Best IT Security
Some things just can’t be anticipated and protected against. Human foibles are at the top of the list. Human beings aren’t perfect, and their mistakes, carelessness and just plain bad luck can wreak unintentional havoc. Sometimes the simplest error can undo the most intricate IT security plans. All it takes is one person. It could…
Read MorePhishing and Email Fraud are Top Security Risks for Corporations
Email is essential for business, but it’s also a top concern for security administrators that need to protect the internal network from data breaches and loss of digital assets. With a combination of reconnaissance and social media, an attacker can form a list of possible victims and target them in an attempt to get credentials…
Read More€20,000,000 or 4%? – GDPR
You knew it was coming, and while initially, you may have been in denial, you can’t ignore it anymore. The General Data Protection Regulation (GDPR) is going into effect on May 25, 2018, whether you’re ready or not. Make sure you have a GDPR compliance solution deployed to make maintaining compliance much easier. Because the…
Read MoreWhen Human Error Sends Panic Across the Country
On January 13th, the state of Hawaii went into a state of panic when they received an emergency text message telling them that a ballistic missile was incoming. It took 38 minutes before a follow-up message was sent telling people that the message was in error. The governor of Hawaii later held a conference explaining…
Read More