Don't change passwords.

History of the Password

September 15, 2021

The Evolution of the Password Throughout History Every few months, banks, our company’s IT department, email clients and certain apps remind us to change our passwords. And when we do, some systems even assess the level of difficulty of our new passwords, telling us if our new password is weak or strong. We’re also told…

Read More
Reducing Password Changes.

Why Password Change Requirements are Bad

September 14, 2021

Is your password policy to change passwords every so often? 90 days? According to NIST, the FTC, Microsoft, and other leading organizations, required password changes might be a bad idea for both security and convenience. Forced password changes wasn’t a bad idea. But relying on end users to frequently change their passwords leads to the…

Read More
CMMC Level 3

Achieving CMMC Level 3 Certification with the GateKeeper Token

September 9, 2021

The CMMC is a cybersecurity framework implemented by the Department of Defense (DoD) in an effort to protect the data of all Americans and to foster a long-term culture of cyber hygiene. Since 2020, the team behind CMMC has been conducting auditing procedures and offering certifications to businesses that meet their exacting standards. Therefore, we…

Read More
Manufacturing cyber security solution.

Security and Accessibility on the Shop Floor: The GateKeeper Solution in Manufacturing

August 31, 2021

Modern manufacturing sits at the confluence of both traditional and digitally-focused working practices. Humans continue to play a critical role in manufacturing. Now, more than ever, supporting humans with state-of-the-art systems on the shop floor is crucial for both enterprise cybersecurity and productivity. However, access to these systems may not be in step with the…

Read More
Work from home computer security solution.

How to Protect Laptops for a Mobile Workforce

August 30, 2021

There are more people working offsite than ever before. With a growing mobile workforce, so much for all those concrete walls, CCTV cameras, and turnstiles that require ID badges to get in. These defenses no longer protect the computers that were once inside. The computers are now scattered throughout the world in homes, apartments, coffee…

Read More
2FA Case Study.

Passwords in the Finance Industry

August 27, 2021

WINTER PARK, Fla., Aug. 27, 2021 /PRNewswire-PRWeb/ — GateKeeper Enterprise, the innovative proximity-based two-factor authentication solution, announced the release of its 2FA case study with BARR Financial Services, LLC, a financial advisory firm based in Winter Park, Florida. After deploying the patented GateKeeper authentication solution, BARR Financial slashed its helpdesk ticket requests by a 50 percent. Kirk BARR Young, the…

Read More
Preventing stolen passwords.

Crazy Ways Hackers can Steal your Passwords

August 17, 2021

Cybercriminals are getting more sophisticated in their methods and use of technology when executing cyber attacks. Walls, fences, gates, turnstiles, guards, CCTV cameras – these all protect access. But passwords require digital walls, digital fences, digital turnstiles, and digital guards. Solutions like 2FA, password managers, IAM, SSO, and others make protecting passwords against password theft…

Read More
Continuous authentication explained.

What is Continuous Authentication?

August 10, 2021

Continuous Authentication explained. Continuous authentication/continuous 2FA is an advanced method of identity verification. This mechanism runs the authentication protocol an ongoing basis from the start of a session to the end. Rather than authenticating just at the start, the authentication mechanism continues to re-verify the user’s identity throughout the whole session. Continuous authentication fits the…

Read More
Proximity computer lock.

Bluetooth Proximity Lock for Workstations

April 27, 2021

Bluetooth proximity lock for computers allows you to lock and unlock computers with a Bluetooth signal (Bluetooth token or phone). Some Bluetooth PC lock models use active Bluetooth connections. Some are easier to use while others have more dynamic features for IT admins with a central admin console. Though this may require some setup or…

Read More