GATEKEEPER BLOG

Foreign hackers.

Foreign Hackers from the East

September 19, 2017

From the US presidential election to Kaspersky, there is nary a day that goes by that doesn’t contain at least one reference to nefarious cybersecurity acts sponsored by Russia and Russian-aligned entities. The Baltic NATO members have felt that threat and in even in nations like the Ukraine, competing factions vie for influence with the…

Read More
Hard lessons from data breaches in cybersecurity.

One Hard Lesson From the Breach of Breaches

September 13, 2017

Spoiler alert: we’re talking about data breaches – Equifax. It seems like once a week there’s a new hacking making headlines. The one at the top of our list lately that we’re reading obsessively about—Equifax. In the wake of the Equifax breach, businesses, lawmakers, and individuals (including all of us over here) are putting the…

Read More
Medical cyber security solutions.

Medical Cyber Security with GateKeeper

September 11, 2017

Medical cyber security automated for doctors and nurses. GateKeeper is a localized wireless tracking solution that allows for constant real-time monitoring of personnel in a pre-determined and well-defined location. Personnel only carry a small wireless smart key with them, and their presence and absence in the trauma center will automatically be monitored. This system does…

Read More
Adopt Multifactor Authentication. Why you need MFA.

Why Enterprises Should Rush to Adopt Multifactor Authentication.

August 2, 2017

Phishing attacks, social engineering, database breaches, cyber attacks – all terms that have found their way into our daily lives. If the incessant news of the past decade has shown any trend, it’s that no organization is immune to cyberattacks. And a lot of this evidence points to single points of failures – passwords. Adopt…

Read More
Convenient 2FA - Continuous authentication solution.

Continuous and Convenient 2FA

July 17, 2017

We all use some form of authentication—passwords, passcodes, an ID card—upon entering into a place with restricted access. Whether this place is digital or real-world, authentication systems are typically founded on a barrier. This is a point of access where you must prove that you have permission before you proceed. But since so many of…

Read More
Cyber security awareness training for privacy theft prevention.

Train and Arm Employees with the Tools to Stave Off Privacy Theft

June 12, 2017

A 167% growth in ransomware attacks in one year – are you protected? Even the best firewalls can’t prevent every single virus from sneaking into your organization. Ransomware sliding through in email attachments can attack an entire system if opened. The best, most highly developed security systems can’t yet guard against human error – or…

Read More
Desktop security solutions - computer security.

4 Common Ways Attackers can Access a Desktop

May 12, 2017

Having access to one of your business computers is an attacker’s dream. They not only have access to the desktop’s resources, but they have full access to anything the local user has access to, which is usually corporate files and data. Desktop security is a crucial factor in IT security management. Attackers have several ways…

Read More
Healthcare cyber threats in healthcare IT.

What About the Cyber Threat Walking the Floors of Your Hospital?

April 24, 2017

Every day, there are new reports of cyberattacks around the world striking with increasing reach and devastation. Headlines like “Global ransomware attack hits Merck, health system after thrashing Europe” show the ferociousness of cybercriminals. All one has to do is read this report from Healthcare IT News to feel the chilling effect: “The virulent Petya…

Read More
Passwords on Post-its in violation of compliance.

Password Security Rules: Choose Length Not Complexity

March 7, 2017

You’ve been snoozing that annoying security popup for two weeks and time has run out. Password rules are being broken too often and brazenly. Your password needs updating. Even as an administrator you find this annoying. Imagine how the rest of your organization feels—and they probably don’t care about security as much as you do.…

Read More