How the ENIGMA Cipher was Hacked in World War 2
The iconic ENIGMA machine was widely used during World War 2 by the German military and thought to be uncrackable. But, the incredible story of how the ENIGMA cipher code was hacked involved brute forcing, an insider threat, human error, and even just plain luck (bad luck for the other side). The Insider Threat that…
Read MoreHow Faster Authentication and Auto-logouts Help Patient Care
In the field of medical care, efficiency and efficacy are paramount. Patients need to receive the very best care promptly — something which will, in turn, reduce costs and improve satisfaction. But this is difficult, especially in these demanding times. Giving care providers a means to quickly and securely login to workstations and software platforms…
Read MoreThin Client Benefits
Modern businesses are constantly on the lookout for ways to improve IT effectiveness and cost-efficiency. IT hardware budgets have fallen on average in the last two years, from 35% of total IT budget in 2019 to only 31% in 2021. What’s more, IT departments now expect more from their solutions at a more amenable price…
Read MoreHistory of the Password
The Evolution of the Password Throughout History Every few months, banks, our company’s IT department, email clients and certain apps remind us to change our passwords. And when we do, some systems even assess the level of difficulty of our new passwords, telling us if our new password is weak or strong. We’re also told…
Read MoreWhy Password Change Requirements are Bad
Is your password policy to change passwords every so often? 90 days? According to NIST, the FTC, Microsoft, and other leading organizations, required password changes might be a bad idea for both security and convenience. Forced password changes wasn’t a bad idea. But relying on end users to frequently change their passwords leads to the…
Read MoreReduce Helpdesk Tickets with a Password Manager
Reduce helpdesk tickets with a password manager Is your helpdesk inundated with password problems? According to a study carried out by Google, around 75% of people report experiencing password issues. In a climate where cybercrime is on the rise, it’s wise to encourage your employees to use multiple complex passwords. However, if they’re continuously forgetting…
Read MoreAchieving CMMC Level 3 Certification with the GateKeeper Token
The CMMC is a cybersecurity framework implemented by the Department of Defense (DoD) in an effort to protect the data of all Americans and to foster a long-term culture of cyber hygiene. Since 2020, the team behind CMMC has been conducting auditing procedures and offering certifications to businesses that meet their exacting standards. Therefore, we…
Read MoreSecurity Lessons from Military History
History repeats itself more often than we think. Let’s take a look at some military security lessons through the ages and see how they can apply to our modern-day cyber security challenges. Many of the same fundamental requirements for a successful military campaign are no different than those of an IT manager’s battles. They both…
Read More