GATEKEEPER BLOG

Passwords on Post-its in violation of compliance.

Password Security Rules: Choose Length Not Complexity

March 7, 2017

You’ve been snoozing that annoying security popup for two weeks and time has run out. Your password needs updating. Even as an administrator you find this annoying. Imagine how the rest of your organization feels—and they probably don’t care about security as much as you do. When was the last time you saw this during…

Read More
Bad habits in cybersecurity.

6 Habits You Need to Break Now If You Want To Avoid a Patient Data Breach

February 20, 2017

Habits can be hard to break; we get it. Especially when they’re habits we’ve developed at work. We can’t blame clinicians for these bad habits though. They’re just taking on actions that they’re seeing. Some poor habits can develop over time, especially with the demands that come with patient-care and constantly changing healthcare regulations. One…

Read More

How to Find and Ban IPs of Hackers

January 31, 2017

Dealing with the hackers and malicious visitors is becoming tough day by day. The ease of changing IP addresses and names is giving them freedom to attack different online store and eCommerce websites. They can anonymously access websites for their monetary gains, theft of data and leak personal details of the users. For any reputable…

Read More
Reducing health risks from cyber stress.

5 Ways Technology Puts Your Health at Risk & 5 Hacks to Safeguard

December 8, 2016

Overuse of digital technology can overshadow otherwise good health care. Here are 5 common health destroyers, with 5 simple prevention measures. In the early 60s, a space-aged cartoon entitled The Jetsons pulled kids to television sets on Saturday mornings. Back then the futurist gadgets the family used seemed impossible. Today many of them exist, and…

Read More
Protecting patient data.

How Safe is your Clinic’s Data?

November 2, 2016

Is Your Clinic’s Data Safe? Clinics can be busy, challenging places to work. With the demands of patients and the needs of staff at the forefront of operator minds, it’s no surprise that concerns like data safety can fall by the wayside. How easy it is to forget that data is the foundation of any…

Read More
Turn your phone into your key.

Turn Your Smartphone Into Your Computer Key

October 9, 2016

You’re working away at your city’s coolest new co-working space, and the energy in the building is buzzing—or maybe that’s just you from all the coffee you’ve had this morning. So much coffee, in fact, you need to run to the restroom.  Why you need a computer key. Taking a peek around the room, everyone…

Read More
Prevent bad password habits

Why Traditional Passwords Are a Time Waster

September 15, 2016

Dealing with passwords is as much a part of the modern world as the internet or technology in general. Over the years, they’ve gone from something we have only a few of to something that we’re surrounded by. Passwords are out of control. Most people lose track of how many online accounts and passwords they…

Read More

Principles to Ensure Good Enterprise System Security Architecture

August 1, 2016

“Employees will be company’s biggest threat” according to Experian. Data can be breached and companies can lose massive amounts of information in a matter of minutes. A good security system for your site can stop or limit the amount of damage hackers can do. Do not wait until your system is hacked, be proactive and…

Read More