GATEKEEPER BLOG

Human error in cyber security.

How Mistakes, Forgetfulness, and Carelessness can Undo the Best IT Security

January 15, 2019

Some things just can’t be anticipated and protected against. Human foibles are at the top of the list. Human beings aren’t perfect, and their mistakes, carelessness and just plain bad luck can wreak unintentional havoc. Sometimes the simplest error can undo the most intricate IT security plans. All it takes is one person. It could…

Read More

Satori Malware Aims at D-Link Routers

December 17, 2018

Satori isn’t new malware, but it’s the most infamous of its kind in the IoT world. Satori is a malicious application that scans the Internet for vulnerable devices and adds this vulnerable device to its botnet. It’s terribly effective for botnet creators – good for malware attackers but bad for innocent bystander users. The result:…

Read More
Prevent currency miners.

The Rise of Currency Miner Malware

December 10, 2018

Crypto currency is in high demand. Not just for everyday people, but for cyber criminals. Insider threats are considered the most malicious of cyber threats. Insiders already have access to everything. This makes the risk level extremely high. Most companies think of a cyber threat as someone who maliciously attacks the network, steals data, or…

Read More
Defense against cyber vulnerabilities.

The 5 Vulnerabilities You’re Missing on Your Corporate Network

December 3, 2018

When an organization thinks of insider threats, it’s often thought that it means malicious employees stealing data or destroying resources. Insider threats aren’t just employees with malicious intent. It’s also employee negligence either by allowing malware to be installed on the local network or just accidentally leaking data. Whatever the reason, it’s the responsibility of…

Read More

Understanding Your Employee Cybersecurity

November 23, 2018

A common error with most employee cybersecurity is that what they do is exempt from all other issues in regard to security. The fact is that cybersecurity has a lot to do with the way the public perceives an organization. How employees use customer records have a huge effect on the way your data is…

Read More
Drupal vulnerability - drupalgeddon2

When CMS Software Such as Drupal is a Threat

November 13, 2018

Sometimes, insider threats are less about people maliciously attacking your network but more about the software you install. Any type of software could have vulnerabilities including what would otherwise seem like innocuous software. Even CMS (content management system) software could pose a threat. This is exactly what happened with the latest Drupal threat. Drupal CMS…

Read More
Advanced access control on need to know basis.

Understanding Permission Aggregation and Insider Threats

November 1, 2018

Insider threats are a growing concern for any large corporation.  In 2016, 40% of successful breaches were due to outsiders, but 37% were due to insider threats. These numbers show that these types of attackers are just as popular as threats caused by employees, vendors or corporate contractors. Insider threats include anything from simple employee…

Read More
best cyber defense team

Research Shows that the Best Cyber Defense Teams are Antisocial

October 29, 2018

A new study that involved Army research to find the best cyber security defense team members showed that the best people for the job are antisocial, reconfirming what many people confirmed as the stereotypical programmer as the best person for the job. In March and April 2017, the Mid-Atlantic Collegiate Cyber Defense Competition studied a…

Read More
Email fraud prevention solution.

Phishing and Email Fraud are Top Security Risks for Corporations

October 25, 2018

Email is essential for business, but it’s also a top concern for security administrators that need to protect the internal network from data breaches and loss of digital assets. With a combination of reconnaissance and social media, an attacker can form a list of possible victims and target them in an attempt to get credentials…

Read More