by Christopher Perry 0 Comments

Ask Christopher: Mitigating the Risk of Phishing Attacks with MFA

 

Hackers are a blight on the digital scenery where we all spend most of our time, and phishing attacks are one of the oldest tricks in the book. Whether it’s at work or home, modern technology has made the digital world all but necessary. In this environment, hackers and malicious users are the banes of each admin and end-user attempting to get things done. Amid the recent pandemic, the leaches...

Continue Reading →

Tags: #cyberattacks, End user experience, #HumanFactor, MFA, Multi-Factor Authentication, #defeatcyberattacks, #phishing, Ask Christopher, security risk, multi-factor, mitigation

by PortalGuard 3 Comments

Dynamic Passwords - Enforcing Authentication

Stepping Away from the Static

Even in 2021, in a world where authentication is a large part of cybersecurity measures, the password has still become the cornerstone for accessing websites, applications, and other common logins. In the recent Raconteur publication, "Future of Authentication", they report that Username/Password is still a key identity and access management (IAM) service in 73%...

Continue Reading →

Tags: password strength, static password, Uncategorized, Access Management, data security, #One-time password, OTP, OTP Authentication, stronger authentication

by Michael Barry 0 Comments

Getting Support for Your Hybrid Environment from an IDaaS Solution

While there are key benefits to moving to a cloud-based IAM solution, not all of them are created equal when it comes to their support for various applications and environments. Although the great “cloud migration” is underway, your environment is probably like many organizations – a hybrid. A mix of cloud, on-prem and even “legacy” applications are still in use. With many IDaaS solutions solely...

Continue Reading →

Tags: hybrid, PortalGuard, total cost of ownership, Cloud Authentication, User Authentication, flexibility, IAM, cost-effective, IDaaS, identity management software, identity and access management, Cloud IAM, Article, Article - Resource Center