GATEKEEPER BLOG

Passwords in Ancient Times

Passwords in Ancient Times.

May 4, 2022

Passwords have been used throughout history as a means of identifying individuals and controlling access to restricted areas or information. While we often associate passwords with modern technology and digital security, the use of passwords dates back to ancient times. In this article, we will discuss three examples of the use of passwords in ancient…

Read More
Use strong passwords

How to use strong passwords in the workplace.

April 14, 2022

In today’s digital age, passwords are a critical aspect of security in the workplace. Whether it’s accessing company software or logging into a work computer, passwords protect sensitive information from cybercriminals. However, creating and managing strong passwords can be challenging. In this article, we will discuss the importance of strong passwords in the workplace and…

Read More
What is zero trust security

What is zero-trust?

March 21, 2022

We’ve seen many cybersecurity strategies over the years. As cybercriminals try ever-more ingenious attack techniques, businesses and IT experts must develop increasingly sophisticated defenses to protect sensitive data. Nowadays, zero-trust, an all-new approach to data and network security, has become a buzzword in cybersecurity circles. But actually, zero-trust is not a novel concept. The term…

Read More
myki alternative solution

Best MYKI Alternative – GateKeeper Password Manager

March 14, 2022

  Looking for the best off-line password manager solution to replace MYKI? As of April 10th, 2022, MYKI will discontinue their existing products. If you’re looking the the best Myki alternative solution, check out the SourceForge page comparing MYKI and GateKeeper Enterprise or the Slashdot comparison. A similar password manager to MYKI, the GateKeeper password…

Read More
Poor cybersecurity practices in the workplace.

5 Poor Cybersecurity Practices Putting your Organization at Risk

March 8, 2022

Most cybersecurity incidents result from avoidable mistakes and poor cybersecurity practices. Human error is evidently a major and growing cyber risk factor. As a result, you’re probably picturing employee negligence, careless mistakes, and irresponsible behavior. But entire companies are just as likely to fall into poor security habits and routines as individuals. These bad habits…

Read More
Cybersecurity culture development.

How to Build Cybersecurity Culture in your Organization

March 1, 2022

The cybersecurity landscape has evolved drastically over the last few years. Cybercrime has become more sophisticated, common, devastating, and successful, as is evident in the ITRC 2021 Data Breach Report. The ever-growing cyber threats, coupled with the strict enforcement of data privacy and protection regulations, have led many organizations to rethink their cybersecurity strategies. A…

Read More

5 Cybersecurity Trends to Watch out for in 2022

February 14, 2022

The IT security scene has been quite chaotic since the COVID-19 pandemic hit. 2020 and 2021 saw widespread digital transformations across all commercial industries, which created new opportunities for criminals to perpetrate their heinous acts. Cybersecurity trends are always changing. First, let’s take a look at recent years. 2020 was a bad year for cybersecurity,…

Read More

Tips for Achieving Data Security and Compliance in Healthcare Cybersecurity

February 7, 2022

Electronic health records (EHRs) and electronic medical records (EMRs) are incredibly useful, allowing for easy and quick access to patient data for healthcare purposes. Unfortunately, this digitization introduces new risks to healthcare facilities and their patients. Personal medical information has become an attractive target for cybercriminals. This makes data security a key issue in healthcare…

Read More
Proximity Lock for PC: Automatically Lock Computers When Users Step Away

What is Intelligent Authentication?

February 3, 2022

Authentication is the process of verifying the identity of a user before granting access to a computer system or application. Traditionally, authentication has relied on static identifiers such as passwords and PINs. However, with the increasing sophistication of cyber threats, traditional authentication methods are no longer sufficient. That’s where intelligent authentication comes in. Advanced Technologies…

Read More