Security Lessons from Military History
History repeats itself more often than we think. Let’s take a look at some military security lessons through the ages and see how they can apply to our modern-day cyber security challenges. Many of the same fundamental requirements for a successful military campaign are no different than those of an IT manager’s battles. They both…
Read MoreHow Much Time can be Saved with Passwordless Login?
Saving time with passwordless login. IT teams in all industries need to be able to support swift and secure logins. These logins must meet the operational needs of businesses while also achieving robust security. Passwordless login represents the next step in the evolution of this technology and can save businesses a huge amount of time…
Read MoreSecurity Key for Password Vault
Password vaults are excellent tools for security and end user convenience for access control. Maximize the benefits and minimize the risks of using a company-wide password vault for users by securing them with security keys. IT admins can easily increase security while also decreasing time users spend on logging in to workstations, applications, and websites.…
Read MoreSecurity and Accessibility on the Shop Floor: The GateKeeper Solution in Manufacturing
Modern manufacturing sits at the confluence of both traditional and digitally-focused working practices. Humans continue to play a critical role in manufacturing. Now, more than ever, supporting humans with state-of-the-art systems on the shop floor is crucial for both enterprise cybersecurity and productivity. However, access to these systems may not be in step with the…
Read MoreHow to Protect Laptops for a Mobile Workforce
There are more people working offsite than ever before. With a growing mobile workforce, so much for all those concrete walls, CCTV cameras, and turnstiles that require ID badges to get in. These defenses no longer protect the computers that were once inside. The computers are now scattered throughout the world in homes, apartments, coffee…
Read MorePasswords in the Finance Industry
WINTER PARK, Fla., Aug. 27, 2021 /PRNewswire-PRWeb/ — GateKeeper Enterprise, the innovative proximity-based two-factor authentication solution, announced the release of its 2FA case study with BARR Financial Services, LLC, a financial advisory firm based in Winter Park, Florida. After deploying the patented GateKeeper authentication solution, BARR Financial slashed its helpdesk ticket requests by a 50 percent. Kirk BARR Young, the…
Read MoreCrazy Ways Hackers can Steal your Passwords
Cybercriminals are getting more sophisticated in their methods and use of technology when executing cyber attacks. Walls, fences, gates, turnstiles, guards, CCTV cameras – these all protect access. But passwords require digital walls, digital fences, digital turnstiles, and digital guards. Solutions like 2FA, password managers, IAM, SSO, and others make protecting passwords against password theft…
Read MoreWhat is Continuous Authentication?
Continuous Authentication explained. Continuous authentication/continuous 2FA is an advanced method of identity verification. This mechanism runs the authentication protocol an ongoing basis from the start of a session to the end. Rather than authenticating just at the start, the authentication mechanism continues to re-verify the user’s identity throughout the whole session. Continuous authentication fits the…
Read MorePrevent Password Problems
Playing the password game isn’t hard – but winning at it is like playing chess with no way to checkmate the opponent. That’s going to cause a lot of password stress for both IT admins and end users at any organization. Learn how to checkmate password problems before they occur. Prevention is probably the best…
Read More