GATEKEEPER BLOG

Can Employees Be Trusted Password Security Best Practices for IT Managers.

Can Employees Be Trusted? Password Security Best Practices for IT Managers

January 22, 2024

As an IT professional, you understand the importance of robust security protocols, and passwords are often the first line of defense. However, the question arises: Can people be trusted with passwords? Let’s delve into some password security best practices for IT managers to conquer passwords across the workforce. The Human Element in Password Security Despite…

Read More
Kiosk Mode for Shared PCs

How to Set Up Multiple Logins to One Windows Profile – GateKeeper Kiosk Feature

January 15, 2024

Organizations often require multiple users to access a single Windows profile without compromising on security or convenience. This is where GateKeeper’s Kiosk Mode (gkaccess.com) comes into play, offering a seamless solution for how to set up multiple logins to one Windows profile, without sacrificing security. Understanding GateKeeper Kiosk Mode GateKeeper Kiosk Mode is designed to…

Read More
Enforcing 2FA for VPNs - GateKeeper MFA

Enforcing 2FA for VPNs to Secure the Gateway

January 8, 2024

Virtual Private Networks (VPNs) have emerged as essential tools for maintaining secure connections to corporate networks. However, as the reliance on VPNs grows, so does the risk of cyber threats. This is where Two-Factor Authentication (2FA) comes into play. Implementing 2FA for VPN access is no longer a luxury but a necessity for companies aiming…

Read More
Two-factor Authentication Without a Phone

Two-factor Authentication Without a Phone

January 2, 2024

Traditionally, 2FA has relied heavily on mobile phones as a secondary verification tool, through SMS codes or authentication apps. However, this approach has its limitations and vulnerabilities. For IT managers seeking a more robust and convenient solution, GateKeeper Proximity offers a groundbreaking alternative. This article explores how GateKeeper Proximity is redefining 2FA, enabling secure two-factor…

Read More
Password Manager for Employees Enhancing Cybersecurity with Password Managers

Password Manager for Employees: Enhancing Cybersecurity with Password Managers

December 27, 2023

One of the most effective tools in combating these threats is a password manager. As per a Verizon Data Breach Investigations Report, 81% of hacking-related breaches leveraged either stolen or weak passwords. This statistic alone underscores the critical role a password manager for employees plays in strengthening an organization’s cybersecurity posture. The Role of Password…

Read More
How hackers steal passwords

How Hackers Steal Passwords

December 15, 2023

Hackers are always evolving their methods of stealing passwords. It will be too late once the data breach has already occurred and the cybersecurity teams starts to wonder how could hackers steal passwords from them. 1. Advanced Phishing Techniques Phishing remains a primary method for stealing passwords, but the tactics have become more sophisticated. Hackers…

Read More
Does Bluetooth work in Space

Does Bluetooth work in Space?

December 8, 2023

Have you ever wondered ‘does Bluetooth work in space’ before? Bluetooth, like any other wireless communication technology, relies on the transmission of electromagnetic waves, which can indeed function in space. The principles of Bluetooth technology are based on radio frequency (RF) transmissions, which do not require air or any other medium to propagate. Therefore, in…

Read More
How to Enforce Locking Workstations When Leaving using GateKeeper Proximity.

How to Enforce Locking Workstations When Leaving using GateKeeper Proximity

December 4, 2023

No need to play fast and loose with passwords and logins. As an IT manager, you understand the importance of automating security measures to ensure compliance and protect sensitive data. One effective solution to this challenge is the implementation of GateKeeper Proximity, a tool designed to automatically lock and unlock computers based on user proximity.…

Read More
Password-Related Breaches

Password Pandemonium: The Alarming Rise of Password-Related Breaches

November 30, 2023

Weak passwords are akin to leaving the front door of your house unlocked: an open invitation to cybercriminals. The Verizon Data Breach Investigations Report consistently finds that a significant percentage of breaches involve weak or stolen credentials. In a world where password-related data breaches can cost millions and lead to irreparable damage to a company’s…

Read More