Irish consumers 6x more likely to be scammed by falling for AI fakes

The scale and sophistication of fraudulent advertising and AI-generated scams on social media are growing rapidly, making it harder than ever for people to know what’s real. New research from Visa in Ireland reveals that people who mistake fake AI-generated content for real are six times more likely to be tricked by scammers online than those who don’t (73% vs. 12%). This highlights how digital misinformation directly increases vulnerability and underscores the importance of collective action to protect consumers and restore trust in digital platforms.
In Ireland, Visa found that people who are affected by online scams typically lose €124.50 per incident (median amount), costing the Irish economy an estimated €71.8 million annually. The impact goes beyond financial loss, causing emotional distress, increased anxiety and reduced productivity. On average, victims of online scams spend around 8.9 days resolving the issue – which is 44% of the working month.
The way people engage with content online plays a major role. Those who share a post without checking its accuracy first, are five times more likely to be targeted and impacted by online scams compared to those who tend to take a moment to verify it first (35% vs. 6%). Everyday online habits – such as skimming headlines, resharing without verifying and trusting AI-generated content – are creating new vulnerabilities that scammers are quick to exploit:
  • 59% have believed online content was genuine only to later discover it was an AI-generated fake
  • Over a third (38%) rarely read beyond a headline before forming an opinion
  • Almost a quarter (23%) have reshared a post without checking its accuracy
The ripple effect of online scams
As online scams grow more sophisticated and widespread, this shift in consumer behaviour is having a tangible impact on the wider economy. Almost half (42%) have changed how they shop online after being scammed and one in two people (50%) targeted by online shopping scams say they now avoid shopping with smaller or unfamiliar brands.
This is having a particularly significant impact on small and medium enterprises (SMEs) which account for 99.8% of Ireland’s business population and depend heavily on consumer confidence to survive and grow2.
Stepping up the fight against fraud
Visa is stepping up the fight against social media scams – combining decades of experience with cutting-edge technology and working closely with banks, retailers, and digital platforms to restore trust in online commerce.
AI has been central to Visa’s approach to fraud prevention. For over 30 years, the company has used AI powered tools to help keep payments secure and stay ahead of evolving threats. In the last five years alone, Visa has invested $12 billion in technology, including building smart, AI-powered systems that detect suspicious behaviour in real time and stop scams before they reach people.
Awareness is as critical as technology. With almost two in five (39%) people believing AI will make scams harder to spot on social media, Visa is taking proactive steps to close that gap. Tackling fraud requires a united front, and Visa is committed to collaborating across the ecosystem to set new standards for consumer protection.
By working closely with banks, retailers and platforms to ensure consumers have the right advice at their fingertips, Visa is helping people recognise an AI-generated scam, understand how they work, and stay safe in an increasingly AI-driven digital world. Because the more informed people are, the harder it is for scammers to succeed.
Visa is calling on all stakeholders – platforms, banks, retailers and policymakers – to work together to raise the bar for digital trust and consumer protection.
Conor Langford, Visa Country Manager for Ireland said: “AI is transforming how we live, shop, work and connect, but it’s also reshaping the landscape for fraud. Scammers are using the same technology that brings us innovation to deceive and exploit consumers, blurring the line between real and fake. These scams can hurt real people, costing not just money but peace of mind and trust. At Visa, we’re investing in AI-driven fraud prevention and working hand-in-hand with our partners across the ecosystem to strengthen digital trust. The more informed people are, the safer our digital economy becomes. Together, we can build a more secure digital future for everyone.”
Elaine Burke, Tech journalist & host of the For Tech Sake podcast, warns: “It’s becoming increasingly difficult for people to be certain of what’s real and what’s not online. Social media feeds are flooded with content generated using AI, which is not always disclosed. This same generative AI has made it easier for scammers to create content that looks completely convincing and blends into feeds where AI slop has become the norm. Scammers can even selectively target those who interact with this type of content, knowing they are more likely to engage with it. That’s why education and awareness are so important. The more aware you are of scammers’ methods, the less likely you are to become their next success story.”
Spot the Scam: Five Smart Ways to Stay Safe on Social Media
Question the source
Scammers often mimic legitimacy with fake business pages, slick ads, AI-generated celebrity endorsements, and convincing personal messages. These tactics can look incredibly real. Before you click, pause and ask: Is this trustworthy? A moment of doubt can save you from a costly mistake.
Take a breath
Urgency is a scammer’s best friend. Promises of free gifts, massive discounts, or “limited-time” offers are designed to rush your decision. Instead, slow down. Check if the offer is realistic, research the company, read reviews and visit the official brand website before sharing any personal information.
Verify the sender – not just the profile
A message from a friend, influencer, or organisation asking for money or personal details? Don’t assume it’s legit. Confirm independently: call the person, use a verified website, or contact the business directly. Scammers often hijack real accounts to appear authentic.
Stay secure and report suspicious activity
Protect your accounts by turning on extra security features like two-factor authentication (2FA) or multi-factor authentication (MFA) where possible. Keep your apps and devices updated and regularly review your privacy settings. If you spot a suspicious ad, post or account, report it to the social platform – and to your bank if money is involved.
Pay securely – or not at all
Never share your bank details over social media. If someone asks you to send money via bank transfer, it’s likely a scam. Always use secure payment methods that offer buyer protection. If that’s not an option, walk away.
For more information on how to pay safely, please visit: www.visa.ie/pay-safely-with-visa.html

How to Use Crypto Securely in Ireland: Devices, Apps, and Safety Tips

Cryptocurrency use in Ireland has grown quickly, offering both a flexible payment option and an alternative investment. However, with crypto, users are fully responsible for protecting their assets. There are no banks to reverse fraud or recover lost keys. Security depends on the device used, the apps chosen, and daily habits. For anyone in Ireland using crypto, staying secure is essential.

Using Secure Devices for Crypto Transactions

A secure device is the foundation of any safe crypto setup. For Irish users, this usually means a personal smartphone or laptop that’s regularly updated and well-maintained. Operating system updates patch security flaws, while antivirus software and a firewall help block threats. These tools should always run in the background, with auto-updates enabled.

Public Wi-Fi, common in cafés or during commutes, poses risks since data can be intercepted. A virtual private network (VPN) adds encryption and helps protect sensitive activity. Ideally, crypto transactions should be carried out on a home network using a clean, trusted device.

Some users take this further by setting up a separate phone or computer solely for crypto use. After a factory reset, the device runs only essential apps and stays offline unless needed. This approach adds another layer of protection, especially when making crypto payments on entertainment platforms such as online casinos, where safeguarding wallet access and private keys is essential for peace of mind.

Gambling expert Viola D’Elia from ESI notes that top no-verification platforms take security and anonymity to another level. These sites don’t require players to provide sensitive personal or financial details. Instead, registration typically involves just an email address, a username, and a password. This low-barrier setup enhances anonymity while still offering access to thousands of provably fair games and enabling near-instant, secure payouts through a wide range of cryptocurrencies. By combining strong device protection, smart internet practices, and a mindset focused on privacy, users can confidently navigate the crypto space while keeping their assets safe and their identity protected.

Choosing Trustworthy Crypto Wallets

In Ireland, users can choose from mobile, desktop, hardware, and browser-based crypto wallets, each offering a different trade-off between convenience and security. Mobile wallets are quick and useful for small transactions, but can be compromised if a phone is lost. Desktop wallets provide more features but still operate online, making them vulnerable. Hardware wallets like Ledger and Trezor keep private keys offline and are widely regarded as the most secure option. Though they require an upfront cost, they offer strong protection by staying disconnected except during transactions. Browser-based wallets are convenient but require caution; always verify site legitimacy and avoid entering sensitive details unless sure of the source. Whenever possible, users should use wallets that grant full control of private keys, as custodial options limit personal ownership.

Protecting Passwords and Enabling Two-Factor Authentication

One weak password can result in the complete loss of assets. That’s why password hygiene matters. Avoid using the same login details across multiple platforms. Irish users should rely on reputable password managers to create and store strong, unique passwords. This makes it harder for hackers to guess or brute-force access to crypto accounts.

Two-factor authentication (2FA) is also essential. Instead of relying solely on a password, users receive a second confirmation code before gaining access. SMS-based codes can work, but they are more vulnerable to SIM swap attacks. A more secure method is to use an authenticator app, like Google Authenticator or Authy. These apps generate time-sensitive codes and cannot be intercepted in the same way.

For higher-value accounts, physical security keys such as YubiKey can take authentication even further. In these cases, an attacker would need the physical device in addition to knowing the password. Adding these extra steps might feel inconvenient at first, but they significantly reduce the risk of losing access or having accounts compromised.

Securing Seed Phrases and Backup Systems

The most important part of any wallet setup is the seed phrase, a sequence of words that can recover the entire wallet. In Ireland and beyond, many have lost life-changing amounts by storing it on phones, computers, or cloud services.

Never save a seed phrase digitally. Instead, write it down by hand and store it in a fireproof safe or another secure place only you or trusted individuals can access. Metal backups are also reliable, offering durability against fire or water damage. Ideally, keep copies in two or more locations to reduce risk.

It’s smart to test recovery now and then. Setting up a secondary device and restoring from the phrase, without moving funds, ensures it works and that no words are missing or incorrect.

Avoiding Common Scams and Phishing Attempts

As Ireland’s crypto scene grows, so does the risk of scams, phishing being one of the most common. Fake websites, emails, or apps mimic trusted services to steal passwords or seed phrases.

Always check URLs carefully when accessing wallets or exchanges. Bookmark the official site and avoid clicking on urgent messages like “Your account will be locked.” Never open links or files from unknown emails or social media messages.

Social engineering is also a concern, with scammers posing as support staff or influencers. No legitimate service will ever ask for your private key or seed phrase. If they do, it’s likely a scam. 

Conclusion

Crypto security in Ireland starts with personal responsibility. Whether managing €100 or €100,000, the same principles apply. Using secure devices, strong passwords, private wallets, and reliable backups helps protect against common threats. Staying alert to phishing and using only registered platforms ensures safer transactions. With steady habits and awareness, crypto can remain a secure part of your financial toolkit.

 

The Essential Travel Phone Settings Checklist: Stay Safe, Connected, and Cost-Efficient Abroad

From preventing theft to avoiding data roaming charges, this simple pre-travel setup guide helps travelers secure their phones and personal information before heading overseas.
Whether you’re catching a flight for business or leisure, your smartphone likely holds everything from boarding passes and hotel bookings to banking apps and personal data. However, travel exposes you to new digital threats, both physical and online. A few quick changes to your settings can save you from financial headaches, identity theft, or losing irreplaceable data.
SmartMove.us shares 6 tips on how to set up your phone for a safe, smart, and theft-proof holiday:
1. Disable Control Center Access from the Lock Screen
Thieves often exploit quick-access settings to turn on airplane mode or disable data, making your phone untraceable. Prevent this by locking down your control center from the lock screen.
2. Turn Off Mobile Data and Roaming (Unless You’re Covered)
International roaming charges can rack up fast. Disable roaming and turn off mobile data unless you’re using a travel-friendly plan or SIM.
3. Use an Authenticator App Instead of SMS for 2FA
Text-based 2FA may not work abroad and is vulnerable to SIM-swap fraud. Apps like Google Authenticator offer safer, more reliable alternatives.
4. Enable Remote Tracking & Lock Tools
Features like “Find My iPhone” or “Find My Device” let you locate, lock, or wipe your phone remotely if it’s lost or stolen.
5. Back Up Your Data Before Departure
Ensure all important contacts, documents, and photos are backed up to the cloud or an external drive.
6. Avoid Auto-Connecting to Public Wi-Fi
Disable automatic Wi-Fi connections to avoid insecure networks, and consider using a VPN when accessing sensitive apps.
“Many people pack their passports but forget to ‘pack’ their digital defences. A lot of theft and data breaches abroad are preventable. In fact, your phone is only as secure as its settings.
Opportunistic theft is still a top threat, especially in tourist-heavy areas. A stolen phone can be wiped and sold in minutes if it’s not properly secured. Disabling access to settings like airplane mode from the lock screen is one of the most overlooked but crucial steps.
Another thing to note is the hidden costs of travel, particularly around data usage. You might think you’re safe just by turning your phone off or leaving it on silent, but background apps can still sync. One accidental tap and you’re facing a hefty bill.
Before you board the plane, treat your phone like a second passport: protect it, secure it, and plan for what you’d do if it disappeared,” shares Tech Expert, Jes Johnson from SmartMove.us.

How to be your own data security expert in the absence of 2FA

Inspired by the growth of social media subscription models, notably ‘Twitter Blue’, and how they impact user security, Scott McKinnon, Field CISO at VMware explores the critical value in security education for the consumer. As Twitter has locked SMS-based two factor authentication behind Twitter Blue’s paywall, the traditional user without the means or inclination to offer up their cash for subscription perks must now become their own security expert

More than 4.74 billion people worldwide are social media users, according to recent data from Hootsuite. As a source of news and entertainment, its enormous benefits are accessible and essential to our everyday lives, which can overshadow its pitfalls. 

As we’ve become more reliant on the internet, people put their trust in digital services, whether misplaced or not, particularly social media. However, consumers who rely solely on social platform providers to protect them against cyber criminals are, perhaps, playing with fate. User experience is changing as social media platforms restructure their business models to grow subscription plans. The full impact of these new revenue drivers is yet to be seen, but the security implications are undeniable. 

Due to the alleged increase in bad actor exploitation of two factor authentication (2FA) using text, or SMS, Twitter now limits its SMS-based 2FA services to ‘Twitter Blue’ users only. While it’s reassuring that these platforms are in tune with the attack landscape, this change limits access to full security for those who are without the means or are unwilling to pay for it. Withdrawing access to 2FA from non-subscribers highlights one key change for the masses – we must all become our own security experts. 

Peeling back the layers of authentication  

Twitter’s decision has come under fire for its security implications. SMS-based 2FA is often hailed as an effective protective barrier to hacker attempts, as it requires a user’s login to be authenticated via a third-party application that we all have access to – our texts. Critics express concern that while the decision to withhold SMS-based 2FA for verified users will only benefit the business by generating consistent revenue, the majority of social media users are no longer guaranteed the peace of mind of encrypted security.  

For users who have not opted to pay for the premium perks, having a more secure online experience remains a priority. Social media users must do it for themselves, paying closer attention to their account activity, taking more accountability in their own data privacy, and remaining vigilant of suspicious activity by taking additional measures.    

Friend or foe? 

A common way for hackers to steal identities is by creating convincingly fake profiles to gain access to personal networks. Unfortunately for many, their latest friend request may look authentic, but it could be a hacker posing as a connection they may or may not recognise. In fact, Lloyds Bank has warned that impersonation fraud on Instagram is on the rise, having increased by 155% from 2020 to 2021, according to This is Money. The average scam resulted in a loss of £336 per victim. Alternatively, hackers are known to pose as a friend having already compromised their account, to send you false links and alerts embedded with malware. By clicking through, you have enabled a hack on your account. 

To avoid falling victim in the first place, users must use caution in their digital interactions. My advice is to trust your instincts first and foremost. If something is suspicious, ensure you verify the sender’s identity and resource’s destination before engaging, such as clicking on a video link, and avoid accepting connections from unknown accounts. 

Designing your fortress 

Hackers also know most people use the same password again and again, which opens you up to other accounts becoming compromised – including your bank account. However, those who use different passwords, introduce symbols and numbers – and not simply your birthdate – across their various sites and apps are much less likely to fall victim to data theft than those who copy and paste their passwords for the sake of ease. 

An alternative to creating unique passwords is using a third-party passcode manager. These services generate and store unique and complex passwords for each account with encryption. They often come as a package deal with a mobile device such as Apple Keychain and Google Password Manager or are available for download in app stores. 

While these are very simple approaches, they can mitigate the risks of doing nothing if your SMS-based 2FA is withdrawn and are just good security hygiene. 

Power in your hands 

When we think social media, we think entertainment, and not security. However, we cannot afford to take a back seat to our online security with data key to cybercrime. 

Users are more than ever responsible for their first line of defence. 

Review – Yubico -Yubikey 5 NFC and Yubikey 5Ci. #Yubico #Yubikey #Tech

The Yubikey 5 NFC and Yubikey 5Ci  are designed to protect your online accounts from phishing and account takeovers they use Two Factor Authentication which can be used to protect online accounts with more than a password. The Yubikey is physically strong and solid with the option to connect to your keys with the no battery or network connectivity required The quality is reinforced in the liquid and crush resistant made from reinforced fibreglass material hermetically sealed and injection moulded. The hardware keys can fit on your car keys, company swipe card to ensure your presence as required. 

I had the opportunity to review the YubiKey 4 Nano, in 2017   and subsequently found many of the corporate companies in Ireland were using these hardware keys. The use of Two Factor Authentication allows access when a user can present two pieces of evidence to authentication mechanism e.g. Something you know and something you have.

 

Perspective:

To put this into perspective Techuzz Ireland have regularly posted scams from revenue rebates, shopping vouchers free etc. In 2019, a collection of 2.7 billion identity records, consisting of 774 million unique email addresses and 21 million unique passwords, was posted on the web for sale.   If a user has not changed their password in the last few months or reuse the same password on multiple sites, they are leaving their private life open to hacking and their company.  A quick check to see if your details have been hacked in recent times can be found on https://haveibeenpwned.com/ 

We would normally recommend from any site/email not to click on a link rather search on the web. ( If you do nothing from this review – Change your password today ! )

 

Specifications

  • USB Type USB-A
  • NFC-enabled Yes
  • Authentication Methods Passwordless, Strong Two Factor, Strong Multi-Factor
  • Identity & Access Management AWS Identity and Access Management (IAM), Centrify, Duo Security, Google Cloud Identity,  Idaptive, Microsoft Active Directory, Microsoft Azure AD, Okta, Ping Identity
  • Productivity & Communication Google Account, Microsoft account, Salesforce.com
  • Password Managers 1Password, Dashlane Premium, Keeper®, LastPass Premium
  • Function WebAuthn, FIDO2 CTAP1, FIDO2 CTAP2, Universal 2nd Factor (U2F), Smart card (PIV-compatible), Yubico OTP, OATH – HOTP (Event), OATH – TOTP (Time), Open PGP, Secure Static Password
  • Certifications FIDO 2 Certified, FIDO Universal 2nd Factor (U2F) Certified
  • Cryptographic Specifications RSA 2048, RSA 4096 (PGP), ECC p256, ECC p384
  • Design & Durability Water Resistant, Crush Resistant, No Batteries Required, No Moving Parts
  • Device Type FIDO HID Device, CCID Smart Card, HID Keyboard
  • Manufacturing Made in USA and Sweden

 

YubiKey 5Ci 

The YubiKey 5Ci is a multi-protocol hardware authenticator with dual connectors for Lightning and USB-C

Features. 

  • Easy and fast authentication
  • Secures all major browsers and operating systems
  • Reduces IT operational costs
  • Multi-protocol support: smart card, OTP, U2F, FIDO2/WebAuthn
  • Lightning and USB-C on a single key

 

Physical Specifications

  • Connectors: USB-C, Lightning

Dimensions: 12mm x 40.3mm x 5mm.

Weight: 2.9g

 

Decision:

When deciding on Security option, the determination is required to establish what is required to protect, whether due regulatory requirements, good practise,  quality standard etc. If a hardware key will fit these requirements then a referral to the yubico.com site to determine the recommended technology is recommended. The Yubico has a list of hundreds of services but doesn’t come with instructions included in the packaging but instructions are available from their site.

 

Setup:

The setup for each service or site can vary, Yubikey has provided clear instruction on their web site how the setup is carried out. (Some basic networking knowledge would be an advantage)

https://www.yubico.com/setup/compatible-services/#protocol=all&usecase=all&key=yubikey-5ci

 

Setting up a YubiKey with a Facebook account

  1. Using Chrome, Firefox or Opera, log in to Facebook.
  2. Click the Settings and Account icon, and then select Settings.
  3. In the left pane, select Security and Login.
  4. Next to Use two-factor authentication, click Edit.
  5. If two-factor authentication is not configured yet, click Get Started. Or if two-factor authentication is on, then skip to Step 7.
  6. Select the most convenient method of one-time password authentication.
  7. To the right of Security Key, click Setup.
  8. Plug a YubiKey into a USB port, when the YubiKey starts to blink, tap the button or golden edge on the YubiKey.
  9. Enter a name for the security key, then click Continue, and then click Done.

If you need to register additional YubiKeys, click Add New Security Key, and follow steps 7-8

 

Facebook setup

The instructions are very detailed but would require some technical knowledge to set up. Once set up,  the user has to tap the gold contact on the Yubikey to touch contact. (This is not a fingerprint action rather mechanical action) as requested by the site.

Note: Many sites/ services  do not support hardware authenticator rather via  sending of SMS (text) messages with the code or via an  authenticator app, e.g. LinkedIn has not the option for hardware authenticator  but this can be achieved via  a password manager e.g. LastPass Premium

 

Note: if purchased by an individual for a work Laptop on their sites, many IT departments lock the USB drives preventing its use.  (IT admin can resolve) 

 

 

Conclusion:

 

Many recent articles suggest password are dead been replaced by Software or hardware authentication methods due the complexity of the characters that are required to prevent brute force attacks by automated software. Where strong passwords are used again these may be compromised if used on several sites or not changed regularly. 

The Yubikey 5 NFC and Yubikey 5Ci are stronger options as compared to a text message which can be bypassed by cybercriminals. (but are better than a password alone) The Yubikey are used in many corporate environments (and can be used as a standalone for individuals) as the reduce the password related calls to IT helpdesk. The 2FA is faster than SMS code and more secure, they have the option of using one device for hundreds of sites. The Yubico is only one form of security, IT security should constantly monitor the network. anti-virus up to date etc with no one solutions fits all. 

Note:  No system can give 100% security to prevent hacking (some Air gap network do a good job but impractical for most companies). Each security system used reduces the chance of the hacking to a level where only a very determined hacker, can access.  The future may use 

AI technology to identify abnormalities within a corporate network to pass to a human to intervene to diminish the risks.

Today  The question is not to use 2FA, it’s what methodology, hardware, software etc to minimize the risk, Yubico is a trusted brand ( which is an important consideration) using global authentication standards to ensure the individual key can ensure secure access to your computer, website, networks and phones. A brand we have used in the past and confident (as anyone can be) related to Cybersecurity the risks of a compromised account has been diminished.

 

https://www.amazon.co.uk/Yubico-YubiKey-USB-Authentication-Security-Black/dp/B07HBD71HL/ref=sr_1_1?crid=2DOEPBC34KBY0&dchild=1&keywords=Yubikey+5+NFC&qid=1594050691&sprefix=face+mask%2Caps%2C144&sr=8-1

 

Yubico – YubiKey 5 NFC         Price: £41.49

https://www.amazon.co.uk/Yubico-YubiKey-5Ci-Authentication-Connectors-Black/dp/B07WGJ1DNJ/ref=sr_1_4?dchild=1&keywords=Yubikey+5C1&qid=1594050769&sr=8-4

Yubico YubiKey 5Ci      Price: £68.98

 

Review – The Gatekeeper Halberd token. #GateKeeper #Security

The Gatekeeper Halberd token is a proximity-based 2FA technology which is a combination of the security key and password manager. This works on the principle that for a computer that is left unlocked with weak passwords ( in violation of many corporate policies on IT security ) the GateKeeper Halberd token use proximity-based authentication sensors via Bluetooth to Lock or unlock the Computer. This allows the automation of security taking the risk out of the individual user been automated. The Gatekeeper can be configured to one computer or the option to be configured to numbers as per the individual or corporate policies. Web accounts are similar in the passwords are stored on the gatekeeper centralised password manager removing the need to remember numerous passwords for 100’s of sites. The option of one time passwords is available.

Features:

The Gatekeeper can come as an individual service, as a once-off purchase for the hardware/software etc or an enterprise version:

Setup:

The setup involved using 2 different software, one for Proximity and one for the password manager, For individual use – https://gkaccess.com/downloads/ (Mac also available )

The  software is installed  with the dashboard configured,

The token option is ticked, add

Add a new device, which connects to the Bluetooth device and the Halberd token ( no need to manually enter and details )

 

 

 

This can be configured to be set up for a new user via the dashboard,  the user can be given a four to 8 digit code to use the gatekeeper. IT departments have full access to set up individuals to a computer or allow multiple staff to access one computer.

 

In the event of loss / forget a Token,  this can be configured as a loan token or factory reset of the lost token removing the option to access the computer. Additional security can be set up to include proximity & a unique pin code for a user.

 

 

GateKeeper Password Manager

This is set up via the GateKeeper desktop application to provide proximity-based access to web passwords.  This is set up as a new  extension  on the chrome browser to allow OTP to your website,

 

 

A challenge for an individual user is where they use example Facebook,  LinkedIn and require to access this, this may involve info from an OTP which would not be accessible from a temporary computer which is not connected via a Token.

An optional additional USB Bluetooth Proximity Sensor can be supplied to allow proximity set up where the PC USB is inaccessible allowing for extended coverage set up.   

The individual user data is stored locally on the Laptop, in the event of loss of the token, the enterprise is stored on the network with a cloud version expected in the next few months.

 

Company:

Untethered Labs, Inc Gatekeeper is a USA company set up in 2015. They develop advanced wireless proximity access control solutions that act as the first line of defence for preventing unauthorized access to enterprise computers and websites.

They provide automated privileged access management solutions for a wide range of industries including healthcare, MSP/MSSPs, law enforcement, manufacturing, and finance. Their technology increases security and reduces support costs with touchless, proximity-based two-factor computer authentication, centralized enterprise password management, and auditing. They have partners in a variety of countries UK, France, Germany, and  Australia, the individual option can be purchased directly from GateKeeper,  the enterprise option is available directly or via their partner network.

 

 Overall:

The Gatekeeper Halberd token is ideal for those in a highly regulated environment while can be used in any environment which requires good security practice.  ISO27001 requires on leaving a laptop, the laptop should be locked, the proximity sensor is ideal for this as automating the process. Staff should be focussed on the day to day job not focussing on the IT department requirements for security. The ability to configure multiple workstations from one Halberd token is great allowing supervisor access to multiple systems in a controlled environment. Many articles on the web flag passwords are dead,  this product is another nail in the coffin for the traditional password allowing flexibility to use and multiple sites without the need for multiple passwords.  This is a dual-purpose device,  security to lock your PC and password protection for your websites.  Any technology that automates the cybersecurity process improves compliance, reduces support costs,  enhancing security and removing the weaker link of the human intervention is a winner.

 

https://gkaccess.com/store/