GATEKEEPER BLOG

Cyberattack Prevention with the 6-Phase Incident Response Plan

February 2, 2022

A holistic cybersecurity strategy must include both proactive defenses to deter threats and responsive measures to counter attacks. An incident response plan (IRP) is a formal guide that outlines the procedures and responsibilities an organization takes during a cyber incident. It essentially tells an organization’s leaders, IT team, and staff what to do amid and…

Read More

Cybersecurity Lessons Learned From Two Years of Remote Work

January 26, 2022

2020 and 2021 were busy years for the infosec community, overflowing with cybersecurity lessons to remember. It all started in March 2020 when the COVID-19 pandemic disrupted the business and IT environments in ways that many organizations had not anticipated. Many companies were forced to move from well-established IT infrastructures to makeshift solutions in response…

Read More

GateKeeper Proximity Recognized as High Performer in the G2 Winter 2022 Grid® Report for Multi-Factor Authentication (MFA)

January 17, 2022

The G2 Winter 2022 Grid® Report recognizes GateKeeper Proximity’s high performance across multiple categories. WASHINGTON, D.C., Jan. 17, 2022 / — Untethered Labs, Inc. is proud to announce that the GateKeeper Proximity product has been recognized as a High Performer by software review platform G2. In compiling their Winter 2022 Grid® Report, G2 found that their…

Read More
2FA for cyber insurance.

Cyber Insurance Providers Require MFA

January 5, 2022

People are not afraid enough of data breaches. It’s not that people are fearless and undaunted, it just means most people are unaware in this fast, ever-evolving world of cyber threats. One of the best ways to mitigate cyber risks is to enforce MFA across the company network. This is why insurance companies are now…

Read More
MFA Token for Secure Login - GateKeeper Enterprise

Hardware-Based 2FA into PCs

January 3, 2022

Hardware-based two-factor authentication (2FA) is a powerful security measure that provides an additional layer of protection beyond traditional usernames and passwords. By requiring both something you know (password) and something you have (physical device), hardware-based 2FA significantly decreases the chances of unauthorized access. This is more secure than simply using a single factor to authenticate.…

Read More
CMMC Solution

What DoD Contractors need to do while we wait for CMMC 2.0

December 11, 2021

The Department of Defense’s (DoD’s) Office of the Under Secretary of Defense for Acquisition and Sustainment recently issued a long-awaited overhaul to its Cybersecurity Maturity Model Certification (CMMC) program. The DoD introduced CMMC 2.0, which streamlines the CMMC program via a significant set of updates, including:  Lowering the number of CMMC levels from 5 to 3 …

Read More

Best XyLoc Alternative – GateKeeper Proximity

November 29, 2021

Looking to lock workstations automatically when users leave? GateKeeper’s “walk-away lock” mechanism maximizes user productivity while increasing computer security. If you’re looking for the best XyLoc alternative, check out the Capterra comparison page for XyLoc and GateKeeper. Login to your workstation using a token. Simply tap to login, just like with an RFID card. For…

Read More
GateKeeper Remote Desktop (RDP) for remote password access into thin clients.

Thin Client 2FA using GateKeeper Proximity

November 5, 2021

Thin Client 2FA Access with GateKeeper Proximity. 2FA thin client access is crucial for any good security infrastructure. But protecting access to thin clients and RDP isn’t always straight-forward. The GateKeeper 2FA Client application (installed on end user computers) authenticates end users into thin clients running Windows with the proper requirements. This process ONLY authenticates…

Read More
Codebreakers.

How the ENIGMA Cipher was Hacked in World War 2

October 5, 2021

The iconic ENIGMA machine was widely used during World War 2 by the German military and thought to be uncrackable. But, the incredible story of how the ENIGMA cipher code was hacked involved brute forcing, an insider threat, human error, and even just plain luck (bad luck for the other side). The Insider Threat that…

Read More