Reducing Password Change Tasks
Preventing so many password changes. GateKeeper Proximity password manager allows users to log on to their computers using their GateKeeper Token (hardware security token, or Trident phone app) instead of having to manually type in their username and password. Reduce password change requirements and increase security. This password-free login allows administrators the option of setting…
Read MoreDangers of Unlocked Computers
With reliance on the Internet only continuing to rise, there’s more value available for theft through our computers. People keep leaving computers unlocked, despite years of knowing the dangers. There are plenty of horror stories in the news and even more that go largely unnoticed on blogs and social media sites, especially ones that focus…
Read MoreLogin Options for GateKeeper Proximity 2FA
Login Options Available on GateKeeper®. Hands-free login to workstations, websites, and desktop applications. Turbocharge your end users’ login options for a more productive workforce. Most importantly, IT admins can increase security while actually letting users login faster! GateKeeper Proximity has multiple convenient login options available for IT admins to let end user login with: 2FA…
Read MoreProximity Key for Passwords
When it comes to security vs convenience, it is hard to find a good balance. However, the GateKeeper proximity key solution provides both. It is a proximity key-based password manager for computers, websites, and software. This greatly reduces password mistypes, forgotten passwords, sharing passwords, and unlocked workstations. There are two groups of people that benefit…
Read MoreHow to Launch RDP Session Automatically at Login
Launch your RDP session automatically at login. Launch RDP automatically. Follow the step-by-step directions for using Windows Task Scheduler (Windows 10) to launch a Remote Desktop Session every time the computer is unlocked. This will save much time and increase speed of login. 1. First, click the Windows Key. Then search for Task Scheduler. 2.…
Read MoreThwarting Insider Threats
Insider threats are difficult to see and even harder to acknowledge for most organization. “How could our own people be a threat to us?” Yes, this is exactly the type of attitude that leads to successful insider threat actors. Many insider threats come from trusted employees, which is something most employers don’t consider. It’s hard…
Read MoreWhat is an Advanced Persistent Threat?
Advanced Persistent Threats explained. Advanced Persistent Threats (or “APTs”) are a dangerous form of cyber attack where a team of intruders use sophisticated hacking techniques to establish a long-term presence on a network. Their intention is usually to breach highly sensitive data and their methods are always evolving. These APT attacks usually come from very…
Read MoreHow Mistakes, Forgetfulness, and Carelessness can Undo the Best IT Security
Some things just can’t be anticipated and protected against. Human foibles are at the top of the list. Human beings aren’t perfect, and their mistakes, carelessness and just plain bad luck can wreak unintentional havoc. Sometimes the simplest error can undo the most intricate IT security plans. All it takes is one person. It could…
Read MorePhishing and Email Fraud are Top Security Risks for Corporations
Email is essential for business, but it’s also a top concern for security administrators that need to protect the internal network from data breaches and loss of digital assets. With a combination of reconnaissance and social media, an attacker can form a list of possible victims and target them in an attempt to get credentials…
Read More