How High Employee Turnover Poses Increased Cybersecurity Risk

In 2019, US companies had an average turnover rate of 22%, and the retail and wholesale industry saw the highest average voluntary turnover rate, followed by contact center and customer service, manufacturing and operations, and sales.

However, employee turnover is not just an HR issue, companies can also face increased cybersecurity risk through substantial losses as a result of IP theft. The...

Continue Reading →

Tags: data security, Single Sign-On, secure passwords, Single Sign Off, security risk, IT Management, employee turnover, internal data breach, insider threat, insider risk, internal threat, password policy, offboarding employees

BIO-key Named as a Finalist for SC Media 2021 Trust Award

It’s been an exciting 2021 so far as the wheels continue to turn in the identity industry. Most recently, BIO-key was recognized by SC Media in its 2021 Trust Awards as one of the finalists and leading providers of Identity and Access Management (IAM) solutions, recognized for the quality, security, and ease of use of our PortalGuard IDaaS platform.

Continue Reading →

Tags: authentication management, Multi-Factor Authentication, PortalGuard, #userauthentication, IDaaS, identity and access management

by BIO-key Team 0 Comments

Improving Cybersecurity Readiness Across the Government Sector

The collective government sector, including state and local governments, municipalities, city councils, local law and federal, and other government entities continue to be a target for cyberattacks. Unfortunately, in 2021, there continue to be more cyberattacks, with more future threats on the horizon. According to a recent article on ZDNet, in 2020 the government sector had 16% of the total...

Continue Reading →

Tags: #cybersecurity, MFA, #phishing, Federal Government, Biometrics, cybersecurity leaders, state and local

by BIO-key Team 0 Comments

2 Year Cyber Threat Outlook for Higher Education

With the education sector being a large target for cyberattacks and having to face numerous types of threats, IT teams in school districts need to be aware of current threats and the future ones that are steadily approaching. As more schools are going hybrid in the effort to combat COVID-19, many threat actors are using a variety of techniques for cyberattacks.

Here is our cybersecurity outlook...

Continue Reading →

Tags: #cybersecurity, Education, higher education, identity management, IAM, iam strategy, cyberthreat

by BIO-key Team 0 Comments
by BIO-key Team 0 Comments

Why is the Education Sector a Key Target for Cyberattacks?

Why has the education sector become a key target for cyberattacks? Threat actors have increased their cyber security threats against the education sector and institutions for numerous reasons. Let's go over them.

Continue Reading →

Securing PeopleSoft Access – Don't Leave it Out of Your IAM Strategy

Secure access needs to be given to all applications, regardless of the type of application it is and where it is located – on-premises or in the cloud. However, the larger and more critical the application is, the more complicated and challenging it can become to secure access to it.  

Continue Reading →

Tags: identity management, User Authentication, IAM, peoplesoft, strategy, oracle, iam strategy

by BIO-key Team 0 Comments

Cyberattacks on Education: 87% Have Experienced at Least One

The education sector continues to face a growing complex of cybersecurity threats. While the education industry has been under high attack for several years, the forced move to remote and online learning as a response to the coronavirus pandemic in early 2020 has blown the gates off. At this point, 87% of educational institutions have experienced at least one successful cyberattack, and 36% of...

Continue Reading →

Tags: #cyberattacks, #cybersecurity, Education, higher education, #defeatcyberattacks

by PortalGuard 0 Comments

5 Multi-factor Authentication “Must Haves” for a Zero Trust Architecture

While I thought the conversation started 10 years ago, as early as 2004 we’ve been talking about the de-perimeterization of our cybersecurity thinking. Regardless of when the conversation started, there are clear recommendations to move cybersecurity strategies away from the concept of a defined security perimeter, often designated by the corporate network, with everything outside the network...

Continue Reading →

Tags: Authentication, MFA, Multi-Factor Authentication