GATEKEEPER BLOG

best cyber defense team

Research Shows that the Best Cyber Defense Teams are Antisocial

October 29, 2018

A new study that involved Army research to find the best cyber security defense team members showed that the best people for the job are antisocial, reconfirming what many people confirmed as the stereotypical programmer as the best person for the job. In March and April 2017, the Mid-Atlantic Collegiate Cyber Defense Competition studied a…

Read More
Email fraud prevention solution.

Phishing and Email Fraud are Top Security Risks for Corporations

October 25, 2018

Email is essential for business, but it’s also a top concern for security administrators that need to protect the internal network from data breaches and loss of digital assets. With a combination of reconnaissance and social media, an attacker can form a list of possible victims and target them in an attempt to get credentials…

Read More
healthcare cyber security

Healthcare Organizations are Among the Biggest Targets for Attackers

October 22, 2018

Of all the organizations threatened by insider threats, healthcare companies top the list. In the past several years, healthcare organization data is among the top of the list in the biggest data breaches recorded. The healthcare industry is a big target for cyber criminals. It might be the biggest target, depending on the metric. Yahoo…

Read More
software container malware

Developers Learn that Downloading Docker Hubs is Not Always Safe

October 18, 2018

Docker is the latest in popular technology where developers can quickly configure and deploy containers in an environment without affecting other components of an application. It’s a way to turn monolithic code bases into compartments that work individually on the network. Docker is one container provider that works in the cloud. Docker makes it easier…

Read More
Data loss prevention.

Corporations Lose Data in Ways They Didn’t Imagine

October 9, 2018

Insider threats make up a large portion of cyber security risk. It’s a third of the risk when you manage sensitive data on your network. Most organizations think of cyber security risk and insider threats as malicious employees, but it’s not always malicious intent that leads to data loss. Negligence, phishing, malware, and other events…

Read More
Malicious browser.

Malicious Browser Extensions Contribute to Insider Threats

October 7, 2018

Network administrators have a unique challenge providing users with an efficient working environment that also protects against network threats. Most administrators block random installations. But this can be a problem when users need to customize their desktops to work productively. This customized environment includes the ability to add browser extensions. But these small programs can…

Read More
insider threat detection

How to Identify the Basic Signs of Insider Threats to your Local Network

September 22, 2018

Insider threats are cyber security breaches that stem from a trusted employee or vendor allowing an outsider to gain access to the local network. It’s a frustrating and difficult cyber security issue to avoid. You need to give employees plenty of permissions to perform everyday tasks. But you can’t give them open access to areas…

Read More
Chrome exploits - CSS code.

Chrome and Firefox Exploits using CSS and HTML5

August 6, 2018

Insider threats come in all different shapes and sizes. Many times it’s not malicious in any way even though they come directly from your own employees. A recent vulnerability found in Firefox and Chrome gave attackers access to images from the popular social media site Facebook. The vulnerability was mainly from the advanced HTML5 and…

Read More
default password risk from routers

Routers Under Attack from Russian Hackers through Default Passwords

July 14, 2018

One common element of all networks is the existence of routers. These devices weren’t always used in household networks. But they soon became commonplace with any home network. Because they are so commonplace, hackers have gone after home routers with numerous different attacks. Some attacks make routers a part of a botnet. Others sniff data…

Read More