GATEKEEPER BLOG

Prevent MitM attacks solution.

Preventing Man-in-the-Middle Attacks with GateKeeper.

March 6, 2021

Prevent man-in-the-middle attacks using GateKeeper 2FA. Using a 2-factor authentication solution prevents malicious actors from successfully executing a man-in-the-middle attack, even if a password is stolen. The thief would still need the second authentication factor to gain access to the targeted account. Man-in-the-middle attacks involve a malicious actor listening in on communications. A typical example…

Read More
Proximity token for password managers.

Proximity Key for Passwords

May 23, 2019

When it comes to security vs convenience, it is hard to find a good balance. However, the GateKeeper proximity key solution provides both. It is a proximity key-based password manager for computers, websites, and software. This greatly reduces password mistypes, forgotten passwords, sharing passwords, and unlocked workstations. There are two groups of people that benefit…

Read More
Auto-launch RDP session at startup.

How to Launch RDP Session Automatically at Login

April 18, 2019

Launch your RDP session automatically at login. Launch RDP automatically. Follow the step-by-step directions for using Windows Task Scheduler (Windows 10) to launch a Remote Desktop Session every time the computer is unlocked. This will save much time and increase speed of login. 1. First, click the Windows Key. Then search for Task Scheduler.   2.…

Read More
Prevent currency miners.

The Rise of Currency Miner Malware

December 10, 2018

Crypto currency is in high demand. Not just for everyday people, but for cyber criminals. Insider threats are considered the most malicious of cyber threats. Insiders already have access to everything. This makes the risk level extremely high. Most companies think of a cyber threat as someone who maliciously attacks the network, steals data, or…

Read More
software container malware

Developers Learn that Downloading Docker Hubs is Not Always Safe

October 18, 2018

Docker is the latest in popular technology where developers can quickly configure and deploy containers in an environment without affecting other components of an application. It’s a way to turn monolithic code bases into compartments that work individually on the network. Docker is one container provider that works in the cloud. Docker makes it easier…

Read More

Attackers Still use Drupalgeddon2 Vulnerabilities for Cryptojacking

June 2, 2018

A vulnerability in Drupal’s content management system was found weeks ago. But as with many patches site owners either don’t know that they need to patch their software or they disregard it as unnecessary.  Unfortunately, this is the crux of a widespread problem in recent days that indicate more attackers are using the Drupalgeddon2 exploit…

Read More
malicious site access prevention

More Malicious Sites Threaten Your Organization’s Cyber Security

April 19, 2018

Having Internet access is a must for most employees. They need it for various productivity tasks. What was once a “nice to have” is not necessary for job function. IT administrators are forced to provide Internet access even if it’s limited to certain parts of the web. The difficult part is providing open Internet access…

Read More
crypto mining malware

Insider Threats and the Dangers of Crypto Mining to the Enterprise

March 25, 2018

Although there has been several debates on the advantages and disadvantages of cryptocurrency and the enterprise, one issue with it is cyber security. Dealing with bitcoin or any other cryptocurrency could be an advantage for revenue. But cyber security experts are concerned with the risk of mining and using internal resources on the local network.…

Read More
Crypto hardware wallet password key.

How do Cryptocurrency Hardware Wallets Work?

December 3, 2017

How Does a Cryptocurrency Hardware Wallet Work? The cryptocurrency market continues to grow with many new technological and innovative advancements. The hardware wallet is such an advancement – it stores your private keys on an external device rather than online, on your phone, or your computer. Hardware wallets are popular because they offer increased security…

Read More