GATEKEEPER BLOG

Convenient 2FA - Continuous authentication solution.

Continuous and Convenient 2FA

July 17, 2017

We all use some form of authentication—passwords, passcodes, an ID card—upon entering into a place with restricted access. Whether this place is digital or real-world, authentication systems are typically founded on a barrier. This is a point of access where you must prove that you have permission before you proceed. But since so many of…

Read More
Cyber security awareness training for privacy theft prevention.

Train and Arm Employees with the Tools to Stave Off Privacy Theft

June 12, 2017

A 167% growth in ransomware attacks in one year – are you protected? Even the best firewalls can’t prevent every single virus from sneaking into your organization. Ransomware sliding through in email attachments can attack an entire system if opened. The best, most highly developed security systems can’t yet guard against human error – or…

Read More
Desktop security solutions - computer security.

4 Common Ways Attackers can Access a Desktop

May 12, 2017

Having access to one of your business computers is an attacker’s dream. They not only have access to the desktop’s resources, but they have full access to anything the local user has access to, which is usually corporate files and data. Desktop security is a crucial factor in IT security management. Attackers have several ways…

Read More
Healthcare cyber threats in healthcare IT.

What About the Cyber Threat Walking the Floors of Your Hospital?

April 24, 2017

Every day, there are new reports of cyberattacks around the world striking with increasing reach and devastation. Headlines like “Global ransomware attack hits Merck, health system after thrashing Europe” show the ferociousness of cybercriminals. All one has to do is read this report from Healthcare IT News to feel the chilling effect: “The virulent Petya…

Read More
Passwords on Post-its in violation of compliance.

Password Security Rules: Choose Length Not Complexity

March 7, 2017

You’ve been snoozing that annoying security popup for two weeks and time has run out. Password rules are being broken too often and brazenly. Your password needs updating. Even as an administrator you find this annoying. Imagine how the rest of your organization feels—and they probably don’t care about security as much as you do.…

Read More
Bad habits in cybersecurity lead to patient data breach.

6 Habits You Need to Break Now If You Want To Avoid a Patient Data Breach

February 20, 2017

Habits can be hard to break; we get it. Especially when they’re habits we’ve developed at work. We can’t blame clinicians for these bad habits though. They’re just taking on actions that they’re seeing. Some poor habits can develop over time, especially with the demands that come with patient-care and constantly changing healthcare regulations. These…

Read More
Ban IPs

How to Find and Ban IPs of Hackers

January 31, 2017

Dealing with the hackers and malicious visitors is becoming tough day by day. The ease of changing IP addresses and names is giving them freedom to attack different online store and eCommerce websites. They can anonymously access websites for their monetary gains, theft of data and leak personal details of the users. For any reputable…

Read More
Reducing health risks from cyber stress.

5 Ways Technology Puts Your Health at Risk & 5 Hacks to Safeguard

December 8, 2016

Overuse of digital technology can overshadow otherwise good health care. Here are 5 common health destroyers, with 5 simple prevention measures. In the early 60s, a space-aged cartoon entitled The Jetsons pulled kids to television sets on Saturday mornings. Back then the futurist gadgets the family used seemed impossible. Today many of them exist, and…

Read More
Protecting patient data.

How Safe is your Clinic’s Data?

November 2, 2016

Is Your Clinic’s Data Safe? Clinics can be busy, challenging places to work. With the demands of patients and the needs of staff at the forefront of operator minds, it’s no surprise that concerns like data safety can fall by the wayside. How easy it is to forget that data is the foundation of any…

Read More