Improving Patient Care by Reducing IT Burdens on Physicians
The words condemning the inefficiencies and excessive administrative tasks of the current electronic health record (EHR) system came directly from the American College of Physicians (ACP). They called it “inefficient, excessive, and imposing”. The ACP said that EHR systems divert time from patient care and contribute to physician burnout. It was a wholesale condemnation of…
Read MoreWhat is Proximity Authentication?
Proximity authentication explained. Proximity authentication is the process of authenticating users of a system via their presence (proximity) using either a proximity token or smartphone. If the user is in a close enough proximity to the computer, then a prepared set of credentials are automatically verified and the user is authenticated. This is the fastest…
Read MorePreventing Password Fatigue & Stress
Stress alert! The biggest password problem might be the fatigue and stress. Password stress happens when users must memorize and type a large number of passwords on a consistent basis. Nobody wants to remember and type a long and complex password. The problem is that good security means unique usernames and passwords that are both long…
Read MoreBluetooth Proximity Lock for Workstations
Bluetooth proximity lock for computers allows you to lock and unlock computers with a Bluetooth signal (Bluetooth token or phone). Some Bluetooth PC lock models use active Bluetooth connections. Some are easier to use while others have more dynamic features for IT admins with a central admin console. Though this may require some setup or…
Read MoreSecurity Key – Multi Factor Authentication
Security Key for Multi-Factor Authentication explained. Hardware-based MFA keys provide an additional layer of security to your computers, website accounts, and desktop application accounts. Security key-based login is an authentication mechanism that uses a dedicated hardware device to grant the user access to a system rather than using a password or other non-hardware based means…
Read MoreAuthentication Methods
What is an Authentication Method? Authentication is a security mechanism that requires predetermined evidence (factor) before being granted authorization to a system. 2FA is consists of two different required authentication methods. MFA may require more than two factors of authentication before a user can access a system. The most common examples of authentication factors are…
Read MoreWhat is the difference between lock and log off?
GateKeeper Authentication lock vs log off options. What’s the difference between Windows lock and log off? The difference between “locking” (Lock Workstation) and “logging out / signing out” (Logout) is what happens to your open applications. Locking the computer means your apps are still ON and running. In GateKeeper, logging / signing off will CLOSE…
Read MoreHow to Free Up Space on Windows 10
How to free up space on Windows 10 computers. Free space on your computer. You might have faced computer memory storage problems once in a while. There are a lot of unnecessary files that can be removed to save on space. Thankfully, it’s easy to free up space on Windows 10 computers. Let’s do some…
Read MoreHow to set up 2FA Key – GateKeeper Enterprise
Set up GateKeeper Enterprise 2FA key on your end user computers using the directions below. Choose your login option (PIN, touch, Enter) and also your lock method. Please make sure you have your GateKeeper Client software installed on your computer and your token registered (GateKeeper 2FA key fob or GateKeeper Trident phone app) before setting…
Read More