GATEKEEPER BLOG

Avoid getting hacked

How to Avoid Getting Hacked

October 1, 2022

What would be your first words after you learned that you were just hacked? Why not just avoid getting hacked to begin with? Unless you’re a super hero, for the rest of us humans, super powers generally come from using super tools. How to avoid getting hacked in the first place here everything is online…

Read More
Reduce Phishing Attack Risk

Reduce Phishing Attack Risk

September 15, 2022

Phishing attacks are one of the most prevalent and dangerous cybersecurity threats today. They involve hackers posing as legitimate entities to trick individuals into revealing their sensitive information, such as passwords, credit card numbers, or social security numbers. According to the 2021 Data Breach Investigations Report by Verizon, 36% of data breaches involved phishing attacks.…

Read More

Manufacturing Cyber Security (2FA)

June 30, 2022

How to ensure security in your manufacturing facility. Cyber security is essential for manufacturing facilities. Hackers can access a single point within a connected system and potentially threaten an entire network. Techniques like phishing, password resets, and keylogging can give bad actors entrance to a manufacturing operation’s entire network. They could download sensitive data or…

Read More
Cybersecurity in logistics

Cybersecurity in Logistics: 2FA Case Study

May 26, 2022

Cybersecurity in logistics is getting an overhaul. GateKeeper Enterprise, the innovative proximity-based two-factor authentication solution, announced the release of its 2FA case study with Schuster Co., a transportation firm based in Le Mars, Iowa. After deploying the patented GateKeeper authentication solution, Schuster experienced an increase in overall user productivity and a decrease in password login friction. 2FA Challenges…

Read More
Passwords in Ancient Times

Passwords in Ancient Times.

May 4, 2022

Passwords have been used throughout history as a means of identifying individuals and controlling access to restricted areas or information. While we often associate passwords with modern technology and digital security, the use of passwords dates back to ancient times. In this article, we will discuss three examples of the use of passwords in ancient…

Read More
What is zero trust security

What is zero-trust?

March 21, 2022

We’ve seen many cybersecurity strategies over the years. As cybercriminals try ever-more ingenious attack techniques, businesses and IT experts must develop increasingly sophisticated defenses to protect sensitive data. Nowadays, zero-trust, an all-new approach to data and network security, has become a buzzword in cybersecurity circles. But actually, zero-trust is not a novel concept. The term…

Read More
myki alternative solution

Best MYKI Alternative – GateKeeper Password Manager

March 14, 2022

  Looking for the best off-line password manager solution to replace MYKI? As of April 10th, 2022, MYKI will discontinue their existing products. If you’re looking the the best Myki alternative solution, check out the SourceForge page comparing MYKI and GateKeeper Enterprise or the Slashdot comparison. A similar password manager to MYKI, the GateKeeper password…

Read More
Poor cybersecurity practices in the workplace.

5 Poor Cybersecurity Practices Putting your Organization at Risk

March 8, 2022

Most cybersecurity incidents result from avoidable mistakes and poor cybersecurity practices. Human error is evidently a major and growing cyber risk factor. As a result, you’re probably picturing employee negligence, careless mistakes, and irresponsible behavior. But entire companies are just as likely to fall into poor security habits and routines as individuals. These bad habits…

Read More
Cybersecurity culture development.

How to Build Cybersecurity Culture in your Organization

March 1, 2022

The cybersecurity landscape has evolved drastically over the last few years. Cybercrime has become more sophisticated, common, devastating, and successful, as is evident in the ITRC 2021 Data Breach Report. The ever-growing cyber threats, coupled with the strict enforcement of data privacy and protection regulations, have led many organizations to rethink their cybersecurity strategies. A…

Read More