GATEKEEPER BLOG

Don't change passwords.

History of the Password

September 15, 2021

The Evolution of the Password Throughout History Every few months, banks, our company’s IT department, email clients and certain apps remind us to change our passwords. And when we do,…

Read More
Reducing Password Changes.

Why Password Change Requirements are Bad

September 14, 2021

Is your password policy to change passwords every so often? 90 days? According to NIST, the FTC, Microsoft, and other leading organizations, required password changes might be a bad idea…

Read More
CMMC Level 3

Achieving CMMC Level 3 Certification with the GateKeeper Token

September 9, 2021

The CMMC is a cybersecurity framework implemented by the Department of Defense (DoD) in an effort to protect the data of all Americans and to foster a long-term culture of…

Read More
Manufacturing cyber security solution.

Security and Accessibility on the Shop Floor: The GateKeeper Solution in Manufacturing

August 31, 2021

Modern manufacturing sits at the confluence of both traditional and digitally-focused working practices. Humans continue to play a critical role in manufacturing. Now, more than ever, supporting humans with state-of-the-art…

Read More
Work from home computer security solution.

How to Protect Laptops for a Mobile Workforce

August 30, 2021

There are more people working offsite than ever before. With a growing mobile workforce, so much for all those concrete walls, CCTV cameras, and turnstiles that require ID badges to…

Read More
2FA Case Study.

Passwords in the Finance Industry

August 27, 2021

WINTER PARK, Fla., Aug. 27, 2021 /PRNewswire-PRWeb/ — GateKeeper Enterprise, the innovative proximity-based two-factor authentication solution, announced the release of its 2FA case study with BARR Financial Services, LLC, a financial advisory firm based…

Read More
Preventing stolen passwords.

Crazy Ways Hackers can Steal your Passwords

August 17, 2021

Cybercriminals are getting more sophisticated in their methods and use of technology when executing cyber attacks. Walls, fences, gates, turnstiles, guards, CCTV cameras – these all protect access. But passwords…

Read More
Continuous authentication explained.

What is Continuous Authentication?

August 10, 2021

Continuous Authentication explained. Continuous authentication/continuous 2FA is an advanced method of identity verification. This mechanism runs the authentication protocol an ongoing basis from the start of a session to the…

Read More
Proximity computer lock.

Bluetooth Proximity Lock for Workstations

April 27, 2021

Bluetooth proximity lock for computers allows you to lock and unlock computers with a Bluetooth signal (Bluetooth token or phone). Some Bluetooth PC lock models use active Bluetooth connections. Some…

Read More