It’s been an exciting 2021 so far as the wheels continue to turn in the identity industry. Most recently, BIO-key was recognized by SC Media in its 2021 Trust Awards as one of the finalists and leading providers of Identity and Access Management (IAM) solutions, recognized for the quality, security, and ease of use of our PortalGuard IDaaS platform.Continue Reading →
The collective government sector, including state and local governments, municipalities, city councils, local law and federal, and other government entities continue to be a target for cyberattacks. Unfortunately, in 2021, there continue to be more cyberattacks, with more future threats on the horizon. According to a recent article on ZDNet, in 2020 the government sector had 16% of the total...Continue Reading →
With the education sector being a large target for cyberattacks and having to face numerous types of threats, IT teams in school districts need to be aware of current threats and the future ones that are steadily approaching. As more schools are going hybrid in the effort to combat COVID-19, many threat actors are using a variety of techniques for cyberattacks.
Here is our cybersecurity outlook...Continue Reading →
Why has the education sector become a key target for cyberattacks? Threat actors have increased their cyber security threats against the education sector and institutions for numerous reasons. Let's go over them.Continue Reading →
Secure access needs to be given to all applications, regardless of the type of application it is and where it is located – on-premises or in the cloud. However, the larger and more critical the application is, the more complicated and challenging it can become to secure access to it.Continue Reading →
The education sector continues to face a growing complex of cybersecurity threats. While the education industry has been under high attack for several years, the forced move to remote and online learning as a response to the coronavirus pandemic in early 2020 has blown the gates off. At this point, 87% of educational institutions have experienced at least one successful cyberattack, and 36% of...Continue Reading →
While I thought the conversation started 10 years ago, as early as 2004 we’ve been talking about the de-perimeterization of our cybersecurity thinking. Regardless of when the conversation started, there are clear recommendations to move cybersecurity strategies away from the concept of a defined security perimeter, often designated by the corporate network, with everything outside the network...Continue Reading →
Even though companies worldwide are struggling to protect systems and data from incessant waves of cyberattacks—there seems to be no end in sight. With the release of the FBI’s Internet Crime Report 2020, it is apparent that cybercriminals took advantage of the impact of the pandemic while many of us were distracted with trying to figure out our “new normal” and the technology we require to...Continue Reading →
Due to the novel coronavirus pandemic throughout 2020, many businesses were required to have their employees work from home, and even with the vaccine rollout and a small beam of normalcy, many will continue to work remotely. In a recent Gartner CFO survey 74% of CFOs report that they plan to shift some employees to permanently work remotely.Continue Reading →
A virtual private network (VPN) gives you online privacy and anonymity by creating a private network from a public internet connection. VPNs mask your IP (Internet Protocol) address and establish a secure and encrypted connection to provide greater privacy than even a secure Wi-Fi spot.
More importantly, as more users are working from home and expected to continue to work from home, VPNs...Continue Reading →
Tags: Authentication Security, IT Security, NAS, PortalGuard, remote access, OTP, Password Security, RADIUS, Remote Authentication, Single-Factor Authentication, Two-Factor Authentication, Virtual Private Network, VPN