<img alt="" src="https://secure.hook6vein.com/218483.png" style="display:none;">
by BIO-key Team 0 Comments

Biometric Single Sign-On: Enhancing Security and User Experience

In today's digital landscape, where individuals interact with numerous applications and systems, managing multiple usernames and passwords is burdensome and poses security risks. Biometric Single Sign-On (SSO) is an advanced authentication solution that leverages biometric technology to provide a secure and convenient way for users to access multiple applications and systems using a single set of...

Continue Reading →

Tags: Single Sign-On, Single Sign Off, Biometrics, identity bound biometrics

by Mark Cochran 0 Comments

Durham NC Selects BIO-key’s PortalGuard Solution to Enhance Security

Wall, NJ, July 30, 2020 - BIO-key International, Inc. (NASDAQ: BKYI), an innovative provider of identity and access management (IAM) solutions powered by biometrics, today announced that the municipality of Durham, North Carolina has selected BIO-key’s PortalGuard solution to meet the city’s IAM requirements and provide needed governance cyber security controls. After reviewing potential...

Continue Reading →

Tags: MFA, Multi-Factor Authentication, PortalGuard, Single Sign-On, Two-Factor Authentication, Biometrics, BIO-key International

by BIO-key Team 0 Comments

Cyber Security Fundamentals: CIA Triad and AAA

One of the first concepts you will learn when studying Cyber Security is the CIA Triad, which stands for Confidentiality, Integrity, and Availability. These are the three main pillars around which information and data security revolve.

Continue Reading →

Tags: Authentication, #cybersecurity, confidentiality, accounting, integrity, availability, authorization

by BIO-key Team 0 Comments

Growing Demand for Cybersecurity: How Vendors Can Support Their MSPs

With the increasing complexity of IT systems and the benefits of outsourcing IT services, the use of managed service providers (MSPs) has grown significantly among organizations, from SMBs to enterprises. 

At the same time, many MSPs are seizing the opportunity as a “one-stop-shop” for their clients by offering an all-inclusive tech stack that covers the bases for their clients’ needs. One area...

Continue Reading →

Tags: mssp, msp

by BIO-key Team 0 Comments

Securing Endpoints: How to keep your desktops and workstations safe

Desktop computers and workstations are an indispensable part of enterprise operations and contain a wealth of information that organizations want to keep safe. However, without adequate endpoint security in place, desktops and workstations can be exploited to access corporate networks, causing irreparable damage and disrupting operations indefinitely. Thus, strong security protocols are critical...

Continue Reading →

Tags: Shared Workstations, Desktops, Endpoint Security, PortalGuard Desktop

by BIO-key Team 0 Comments

The Reality of Today's Passwordless Hype

Think about this: what are you actually authenticating when someone requests access to your systems, data, and other critical parts of your business?

54% of IT and cybersecurity professionals have started to transition to passwordless authentication. Unfortunately, most common passwordless solutions are possession-based (e.g. hardware security keys, phone-based push tokens, authenticator apps,...

Continue Reading →

Tags: Authentication, User Authentication, Biometrics, passwordless, identity bound biometrics

by BIO-key Team 0 Comments

Is Biometric Authentication on Smartphones Secure?

Over 85% of the world’s population own a smartphone in 20231, and many smartphone vendors, such as Samsung and Apple, have introduced biometric authentication capabilities to enhance the overall user experience, including fingerprint scanning, face, and voice recognition. In fact, Cisco reported that 81% of all smartphones have built-in biometrics capabilities in 20222.

As more users adopt ...

Continue Reading →

Tags: Biometrics

by BIO-key Team 0 Comments

Modern Approach to Bolster Supply Chain Cybersecurity

To say it’s been an eventful few years for supply chain risk management would be a massive understatement. From delays and disruptions to complete ceases in activity, supply chains have seen it all. While this chaos sparked a tremendous amount of innovation around supply chain technology – which is a positive thing – it also created a vast world of new opportunities for cyber criminals. 

Continue Reading →
by BIO-key Team 0 Comments

Pros and Cons: Cybersecurity Outsourcing

Let’s start with the basics. What exactly is outsourcing cybersecurity? Outsourced cybersecurity is when an organization enlists the support of an outside third-party to manage a range of sophisticated security needs, including network security, operational security, application security, and information security. This can be a daunting undertaking for many companies, which is why the use of...

Continue Reading →
by BIO-key Team 0 Comments