GATEKEEPER BLOG

What's my computer's domain name?

What’s my computer’s domain name?

June 30, 2021

Look up your Computer’s Domain Name on Windows 10 PC. Windows 10: To find the Domain name for your Windows 10 PC, please follow the directions below. Click on the Start Menu. Go to Control Panel. Click System and Security. Click System. You’ll see your computer’s domain name at the bottom next to “Domain:“. In the example below, the…

Read More
Launch applications automatically at startup.

How to Automatically Launch Applications at Startup

June 15, 2021

Did you know you can set your Windows 10 computer to launch any desktop application you want at startup so you can skip having to manually click open everything? Useful examples include your web browser, EHR, VPN, MS Word, etc. Anything you need to do your work or access often should be readily available, not…

Read More
Improving patient care with faster EHR login.

Improving Patient Care by Reducing IT Burdens on Physicians

June 1, 2021

The words condemning the inefficiencies and excessive administrative tasks of the current electronic health record (EHR) system came directly from the American College of Physicians (ACP). They called it “inefficient, excessive, and imposing”. The ACP said that EHR systems divert time from patient care and contribute to physician burnout. It was a wholesale condemnation of…

Read More
Proximity authentication solution.

What is Proximity Authentication?

May 15, 2021

Proximity authentication explained. Proximity authentication is the process of authenticating users of a system via their presence (proximity) using either a proximity token or smartphone. If the user is in a close enough proximity to the computer, then a prepared set of credentials are automatically verified and the user is authenticated. This is the fastest…

Read More

Preventing Password Fatigue & Stress

May 6, 2021

Stress alert! The biggest password problem might be the fatigue and stress. Password stress happens when users must memorize and type a large number of passwords on a consistent basis. Nobody wants to remember and type a long and complex password. The problem is that good security means unique usernames and passwords that are both long…

Read More
Proximity computer lock.

Bluetooth Proximity Lock for Workstations

April 27, 2021

Bluetooth proximity lock for computers allows you to lock and unlock computers with a Bluetooth signal (Bluetooth token or phone). Some Bluetooth PC lock models use active Bluetooth connections. Some are easier to use while others have more dynamic features for IT admins with a central admin console. Though this may require some setup or…

Read More
MFA token for improving workflow performance.

Security Key – Multi Factor Authentication

April 15, 2021

Security Key for Multi-Factor Authentication explained. Hardware-based MFA keys provide an additional layer of security to your computers, website accounts, and desktop application accounts. Security key-based login is an authentication mechanism that uses a dedicated hardware device to grant the user access to a system rather than using a password or other non-hardware based means…

Read More
Authentication solutions for 2FA.

Authentication Methods

March 31, 2021

What is an Authentication Method? Authentication is a security mechanism that requires predetermined evidence (factor) before being granted authorization to a system. 2FA is consists of two different required authentication methods. MFA may require more than two factors of authentication before a user can access a system. The most common examples of authentication factors are…

Read More
Prevent MitM attacks solution.

Preventing Man-in-the-Middle Attacks with GateKeeper.

March 6, 2021

Prevent man-in-the-middle attacks using GateKeeper 2FA. Using a 2-factor authentication solution prevents malicious actors from successfully executing a man-in-the-middle attack, even if a password is stolen. The thief would still need the second authentication factor to gain access to the targeted account. Man-in-the-middle attacks involve a malicious actor listening in on communications. A typical example…

Read More