What is Continuous Authentication?
Continuous Authentication explained. Continuous authentication/continuous 2FA is an advanced method of identity verification. This mechanism runs the authentication protocol an ongoing basis from the start of a session to the end. Rather than authenticating just at the start, the authentication mechanism continues to re-verify the user’s identity throughout the whole session. Continuous authentication fits the…
Read MorePrevent Password Problems
Playing the password game isn’t hard – but winning at it is like playing chess with no way to checkmate the opponent. That’s going to cause a lot of password stress for both IT admins and end users at any organization. Learn how to checkmate password problems before they occur. Prevention is probably the best…
Read MoreSeamless MDT Login with Auto-Lock for Patrol Cars
Compliance requirements for law enforcement’s MDTs are getting stricter and requires a solution that meets the needs of both the user’s ease-of-use and the IT team’s need for stronger security. It’s ironic that accessing a car has gotten faster and easier while accessing a computer has only gotten more complex and time-consuming. MDTs generally require…
Read MoreShared Clinical Workstation Security and Access
Clinical computers are usually shared chaotically between clinicians and present unique vulnerabilities for IT teams in the healthcare ecosystem. The shared clinical workstation is used by physicians for nearly everything: login to EHR to look up patient charts, reporting, scheduling (i.e. surgery), order entry, medication, admission, and more. With so much going on in such…
Read MoreAutomatically Lock Computer When You Walk Away
Automatically lock computers when users walk away, both at the office and offsite. Lock unattended computers automatically when users step away using GateKeeper Proximity’s computer auto-lock feature. As long as the user’s token is present, the computer will remain logged in. The computer will automatically lock to ensure computer security policy as soon as the…
Read MoreSee Who is Logging in on Shared Windows Accounts
Need to accurately audit access logs across the network due to a shared computer? Not easy to track who is logging in when to which computer? Usually, admins can go to Event Viewer, Windows Logs > Security, then click on the event and you can see the username of the person that logged in for…
Read MoreBenefits of Hardware Tokens for Authentication
IT administrators have many responsibilities that require elevated access to the systems that they are responsible for maintaining. This makes them attractive targets for attackers looking to penetrate the most sensitive systems that they control. It’s a well-known fact that many companies are still not taking appropriate measures to protect their privileged access. To complicate…
Read MoreHow to Automatically Launch Websites at Startup in Chrome
How to auto-launch websites on Chrome. Auto-launching applications saves lots of time. You can set your computer to open Chrome and launch any website you want at startup so you can skip having to manually click open everything such as your EHR, CRM, etc. Follow the steps below to save time by launching websites automatically…
Read MoreCommunity Clinic Implements GateKeeper Enterprise Technology to Secure Access to Electronic Medical Records
Faster EHR Access Control for Community Clinic COLLEGE PARK, MD. (PRWEB) JULY 06, 2021 GateKeeper Proximity, a patented login solution, announced today that Dr. Barney Truong’s Community Clinic, a Calgary-based healthcare provider, has implemented proximity-based two-factor authentication for computer and account access. As an open center community clinic, securing access to workstations, knowing which users logged…
Read More