GATEKEEPER BLOG

Proximity token for password managers.

Proximity Key for Passwords

May 23, 2019

When it comes to security vs convenience, it is hard to find a good balance. However, the GateKeeper proximity key solution provides both. It is a proximity key-based password manager for computers, websites, and software. This greatly reduces password mistypes, forgotten passwords, sharing passwords, and unlocked workstations. There are two groups of people that benefit…

Read More
Auto-launch RDP session at startup.

How to Launch RDP Session Automatically at Login

April 18, 2019

Launch your RDP session automatically at login. Launch RDP automatically. Follow the step-by-step directions for using Windows Task Scheduler (Windows 10) to launch a Remote Desktop Session every time the computer is unlocked. This will save much time and increase speed of login. 1. First, click the Windows Key. Then search for Task Scheduler.   2.…

Read More
Insider threat prevention solution.

Thwarting Insider Threats

March 29, 2019

Insider threats are difficult to see and even harder to acknowledge for most organization. “How could our own people be a threat to us?” Yes, this is exactly the type of attitude that leads to successful insider threat actors. Many insider threats come from trusted employees, which is something most employers don’t consider. It’s hard…

Read More
APT prevention solution.

What is an Advanced Persistent Threat?

February 22, 2019

Advanced Persistent Threats explained. Advanced Persistent Threats (or “APTs”) are a dangerous form of cyber attack where a team of intruders use sophisticated hacking techniques to establish a long-term presence on a network. Their intention is usually to breach highly sensitive data and their methods are always evolving. These APT attacks usually come from very…

Read More
Human error in cyber security.

How Mistakes, Forgetfulness, and Carelessness can Undo the Best IT Security

January 15, 2019

Some things just can’t be anticipated and protected against. Human foibles are at the top of the list. Human beings aren’t perfect, and their mistakes, carelessness and just plain bad luck can wreak unintentional havoc. Sometimes the simplest error can undo the most intricate IT security plans. All it takes is one person. It could…

Read More
Advanced access control on need to know basis.

Understanding Permission Aggregation and Insider Threats

November 1, 2018

Insider threats are a growing concern for any large corporation.  In 2016, 40% of successful breaches were due to outsiders, but 37% were due to insider threats. These numbers show that these types of attackers are just as popular as threats caused by employees, vendors or corporate contractors. Insider threats include anything from simple employee…

Read More
cyber security defense solution

The First Line of Defense in Cyber Security

January 12, 2018

Headlines continue to provide us with more information on large data breaches like Yahoo and Equifax, where cyber attackers gained access to personal information through gaps in security software. But a shocking number of data breaches have nothing at all to do with the level of an organization’s security. Instead, they have everything to do…

Read More
Assistive technology solution for logging into computers.

GateKeeper Assistive Technology for Logging In

November 5, 2017

The best office tech helps you get your work done with efficiency and convenience. But when you’re working with a disability, challenges to that kind of unthinking ease can crop up throughout the day. Assistive technology for logging into computers. Touchless password tech can help. GateKeeper type-free login offers simple and elegant tech that unlocks…

Read More
Adopt Multifactor Authentication. Why you need MFA.

Why Enterprises Should Rush to Adopt Multifactor Authentication.

August 2, 2017

Phishing attacks, social engineering, database breaches, cyber attacks – all terms that have found their way into our daily lives. If the incessant news of the past decade has shown any trend, it’s that no organization is immune to cyberattacks. And a lot of this evidence points to single points of failures – passwords. Adopt…

Read More