GATEKEEPER BLOG

Healthcare cyber threats in healthcare IT.

What About the Cyber Threat Walking the Floors of Your Hospital?

April 24, 2017

Every day, there are new reports of cyberattacks around the world striking with increasing reach and devastation. Headlines like “Global ransomware attack hits Merck, health system after thrashing Europe” show…

Read More
Passwords on Post-its in violation of compliance.

Password Security Rules: Choose Length Not Complexity

March 7, 2017

You’ve been snoozing that annoying security popup for two weeks and time has run out. Password rules are being broken too often and brazenly. Your password needs updating. Even as…

Read More
Bad habits in cybersecurity lead to patient data breach.

6 Habits You Need to Break Now If You Want To Avoid a Patient Data Breach

February 20, 2017

Habits can be hard to break; we get it. Especially when they’re habits we’ve developed at work. We can’t blame clinicians for these bad habits though. They’re just taking on…

Read More
Ban IPs

How to Find and Ban IPs of Hackers

January 31, 2017

Dealing with the hackers and malicious visitors is becoming tough day by day. The ease of changing IP addresses and names is giving them freedom to attack different online store…

Read More
Reducing health risks from cyber stress.

5 Ways Technology Puts Your Health at Risk & 5 Hacks to Safeguard

December 8, 2016

Overuse of digital technology can overshadow otherwise good health care. Here are 5 common health destroyers, with 5 simple prevention measures. In the early 60s, a space-aged cartoon entitled The…

Read More
Protecting patient data.

How Safe is your Clinic’s Data?

November 2, 2016

Is Your Clinic’s Data Safe? Clinics can be busy, challenging places to work. With the demands of patients and the needs of staff at the forefront of operator minds, it’s…

Read More
Turn your phone into your key.

Turn Your Smartphone Into Your Computer Key

October 9, 2016

You’re working away at your city’s coolest new co-working space, and the energy in the building is buzzing—or maybe that’s just you from all the coffee you’ve had this morning.…

Read More
Traditional passwords are problems.

Why Traditional Passwords Are a Time Waster

September 15, 2016

Dealing with passwords is as much a part of the modern world as the internet or technology in general. Over the years, they’ve gone from something we have only a…

Read More
virtual security

Virtual Security in Rio

August 26, 2016

The Rio Olympic games are over, but they have not been without their share of issues. Reports of pickpocketing, muggings, robberies and violence have besieged Olympians and tourists alike. Security…

Read More