Poor cybersecurity practices in the workplace.

5 Poor Cybersecurity Practices Putting your Organization at Risk

March 8, 2022

Most cybersecurity incidents result from avoidable mistakes and poor cybersecurity practices. Human error is evidently a major and growing cyber risk factor. As a result, you’re probably picturing employee negligence, careless mistakes, and irresponsible behavior. But entire companies are just as likely to fall into poor security habits and routines as individuals. These bad habits…

Read More
Cybersecurity culture development.

How to Build Cybersecurity Culture in your Organization

March 1, 2022

The cybersecurity landscape has evolved drastically over the last few years. Cybercrime has become more sophisticated, common, devastating, and successful, as is evident in the ITRC 2021 Data Breach Report. The ever-growing cyber threats, coupled with the strict enforcement of data privacy and protection regulations, have led many organizations to rethink their cybersecurity strategies. A…

Read More

5 Cybersecurity Trends to Watch out for in 2022

February 14, 2022

The IT security scene has been quite chaotic since the COVID-19 pandemic hit. 2020 and 2021 saw widespread digital transformations across all commercial industries, which created new opportunities for criminals to perpetrate their heinous acts. Cybersecurity trends are always changing. First, let’s take a look at recent years. 2020 was a bad year for cybersecurity,…

Read More

Tips for Achieving Data Security and Compliance in Healthcare Cybersecurity

February 7, 2022

Electronic health records (EHRs) and electronic medical records (EMRs) are incredibly useful, allowing for easy and quick access to patient data for healthcare purposes. Unfortunately, this digitization introduces new risks to healthcare facilities and their patients. Personal medical information has become an attractive target for cybercriminals. This makes data security a key issue in healthcare…

Read More

Cyberattack Prevention with the 6-Phase Incident Response Plan

February 2, 2022

A holistic cybersecurity strategy must include both proactive defenses to deter threats and responsive measures to counter attacks. An incident response plan (IRP) is a formal guide that outlines the procedures and responsibilities an organization takes during a cyber incident. It essentially tells an organization’s leaders, IT team, and staff what to do amid and…

Read More

Cybersecurity Lessons Learned From Two Years of Remote Work

January 26, 2022

2020 and 2021 were busy years for the infosec community, overflowing with cybersecurity lessons to remember. It all started in March 2020 when the COVID-19 pandemic disrupted the business and IT environments in ways that many organizations had not anticipated. Many companies were forced to move from well-established IT infrastructures to makeshift solutions in response…

Read More

GateKeeper Proximity Recognized as High Performer in the G2 Winter 2022 Grid® Report for Multi-Factor Authentication (MFA)

January 17, 2022

The G2 Winter 2022 Grid® Report recognizes GateKeeper Proximity’s high performance across multiple categories. WASHINGTON, D.C., Jan. 17, 2022 / — Untethered Labs, Inc. is proud to announce that the GateKeeper Proximity product has been recognized as a High Performer by software review platform G2. In compiling their Winter 2022 Grid® Report, G2 found that their…

Read More
Dental EHR 2FA solution.

Improve Efficiency in Dental Offices with Faster Logins

January 10, 2022

How Faster Authentication and Auto-logouts Help Improve Efficiency in Dental Offices Improved efficiency is always a key goal for dental healthcare providers. However, this cannot come at the expense of care quality and patient satisfaction. With faster authentication and auto-logouts, you can target this efficiency while maintaining high levels of performance across key metrics. Eliminate…

Read More

Best XyLoc Alternative – GateKeeper Proximity

November 29, 2021

Looking to lock workstations automatically when users leave? GateKeeper’s “walk-away lock” mechanism maximizes user productivity while increasing computer security. If you’re looking for the best XyLoc alternative, check out the Capterra comparison page for XyLoc and GateKeeper. Login to your workstation using a token. Simply tap to login, just like with an RFID card. For…

Read More