by Chris Hoey 0 Comments

Under the hood: The IDaaS Cloud Infrastructure and Kubernetes

As a tech nerd, few things pique my interest like the cutting edge.  As the architect behind the IDaaS cloud infrastructure at BIO-key, I’ve had the pleasure and rare opportunity to build a system from the ground up that utilizes the latest design philosophies and toolsets available to the industry.  What are these tools and what makes them different? Cloud Computing as a paradigm can have its...

Continue Reading →

Tags: IDaaS, Kubernetes, Cloud IAM, Cloud Identity and Access Manangement

by BIO-key Team 0 Comments

Finding the Right Multi-Factor Authentication (MFA) Solution

The traditional method of authenticating to a network or endpoint uses a single factor – a combination of a username and password that the user enters to gain access. That approach is fraught with security problems, including the fact that users will generally use simple passwords that are easy for them to remember (and easy for bad actors to guess or determine through brute force techniques),...

Continue Reading →

Tags: MFA, Multi-Factor Authentication, Biometrics, zero trust

by BIO-key Team 0 Comments

The Rise of Zero-Trust Architecture

Josef Stalin is supposed to have once said, “I trust no one, not even myself”. While murderous dictators are normally not reliable sources of useful information, this quote properly summarizes the essence of the Zero Trust architecture, which the National Institute of Standards and Technology (NIST) defines as:

“The term for an evolving set of cybersecurity paradigms that move defenses from...

Continue Reading →

Tags: MFA, Multi-Factor Authentication, zero trust

by BIO-key Team 0 Comments

County Elected Officials: Three Cybersecurity Questions You Should Ask Your IT Team

After attending the NACo Annual Conference this year and having the pleasure of speaking with hundreds of county elected officials and their IT teams, it was clear that the topic of cybersecurity was top of mind for everyone. The recent headlines about cyberattacks, especially ransomware on major organizations including Tyler Technologies, Solarwinds, the Colonial Pipeline, JBS, and Kaseya...

Continue Reading →

Tags: IT Security, Cyber Security, IT Department, state and local

by BIO-key Team 0 Comments

Moving Toward a Passwordless Environment with Biometrics

Moving Away from Passwords

The use of passwords – the traditional method for employees and customers to access networks, applications, data sources and other elements of the IT infrastructure – is the most common method of authentication. They have the advantage of being easy to implement, they are cost-effective, they can be entered from virtually any device with a keyboard, and they offer...

Continue Reading →

Quick Tip: The Dangers of Password Reuse

Another day, another data breach. As we have experienced, organizations being a victim of data breaches are no longer a matter of "if" but "when". Day after day, more and more organizations are falling victim to cyberattacks, like the recent 2021 attacks on the Colonial Pipeline which affected gas stations all throughout the East Coast into Texas and the JBS Meat Factory cyberattack. These...

Continue Reading →

Tags: Authentication Security, authentication security, MFA, Dynamic Analysis, News & Press, password best practices, Password Security, Single Sign-On

by BIO-key Team 0 Comments

Why is the Healthcare Industry a Prime Target for Ransomware Attacks?

Recent cyberattacks have targeted hospitals, crippling systems for weeks and disrupting patient care.  Over the past several weeks, hospitals in Ireland, New Zealand, and San Diego have been hit by ransomware attacks that have disrupted systems for periods lasting as long as several weeks. Ransom demands for healthcare breaches currently average $4.6 million

Continue Reading →

Tags: healthcare, secure passwords, Biometrics, Ransomware, ransomware attacks

Ask Christopher: Alternative Biometric MFA Options

In many ways, the upcoming summer signifies a huge step forward for everyone. We are halfway out of the dark side of a global pandemic, and each one of us has honed skills both new and old. Many individuals have taken this dark time and made it even darker by attacking those who are already struggling to find a sense of normalcy. Balancing the physical world and the digital one is no longer a...

Continue Reading →
by BIO-key Team 0 Comments

Improving User Experience Everywhere with Single Sign-On

Ever since the COVID-19 pandemic hit a lot of offices, many organizations have migrated to a fully remote or a hybrid workforce. Regardless, a lot more employees and users find themselves in a more digital environment than before, so improving digital user experience has been a priority for some. Say, for example, you’re an average office worker or student trying to access your work. You wait for...

Continue Reading →

Tags: Authentication, #bestpractices, identity management, PortalGuard, SSO, Password Security, SAML, Single Sign-On, Single Sign-On (SSO), #singlesign-on

Compromised VPN Passwords Taking Down Pipelines - Why?

While the topics of multi-factor authentication (MFA), Zero Trust, and other cybersecurity measures are discussed at great length across all industries, are they being implemented? With the recent explosion of ransomware attacks going after our critical infrastructure and disrupting our daily lives, you would think that cybercriminals are getting past all of these security measures using complex...

Continue Reading →

Tags: MFA, Multi-Factor Authentication, VPN, tailored authentication, compromised, two-step authentication