<img alt="" src="https://secure.hook6vein.com/218483.png" style="display:none;">

BIO-key Blog

Read below for news, insights, and discussion on identity and access management.

by BIO-key Team

How High Employee Turnover Poses Increased Cybersecurity Risk

In 2019, US companies had an average turnover rate of 22%, and the retail and wholesale industry saw the highest average voluntary turnover rate, followed by contact center and customer service, manufacturing and operations, and sales.

However, employee turnover is not just an HR issue, companies can also face increased cybersecurity risk through substantial losses as a result of IP theft. The...

Continue Reading →
by BIO-key Team

Improving Cybersecurity Readiness Across the Government Sector

The collective government sector, including state and local governments, municipalities, city councils, local law, and federal, and other government entities continue to be a target for cyberattacks. Unfortunately, in 2021, there continue to be more cyberattacks, with more future threats on the horizon. According to a recent article on ZDNet, in 2020 the government sector had 16% of the total...

Continue Reading →
by BIO-key Team

Why is the Education Sector a Key Target for Cyberattacks?

Why has the education sector become a key target for cyberattacks? Threat actors have increased their cyber security threats against the education sector and institutions for numerous reasons. Let's go over them.

Continue Reading →
by BIO-key Team

Securing PeopleSoft Access – Don't Leave it Out of Your IAM Strategy

Secure access needs to be given to all applications, regardless of the type of application it is and where it is located – on-premises or in the cloud. However, the larger and more critical the application is, the more complicated and challenging it can become to secure access to it.  

Continue Reading →
by Christopher Perry

Ask Christopher – Contextual Authentication Security

I’m going to be very frank: a LOT of questions come through the support team here at PistolStar, Inc. That’s not a bad thing – in fact, I love it! Questions keep me going, and I like to see what customers and prospects can come up with. A good ‘stumper’ goes a long way! Moving forward, I will be taking a look at the most popular or frequent questions that come through the support desk, and...

Continue Reading →
by BIO-key Team

5 Multi-factor Authentication “Must Haves” for a Zero Trust Architecture

While I thought the conversation started 10 years ago, as early as 2004 we’ve been talking about the de-perimeterization of our cybersecurity thinking. Regardless of when the conversation started, there are clear recommendations to move cybersecurity strategies away from the concept of a defined security perimeter, often designated by the corporate network, with everything outside the network...

Continue Reading →
by BIO-key Team

Traditional Multi-factor Authentication Approaches are Failing Us

Even though companies worldwide are struggling to protect systems and data from incessant waves of cyberattacks—there seems to be no end in sightWith the release of the FBI’s Internet Crime Report 2020, it is apparent that cybercriminals took advantage of the impact of the pandemic while many of us were distracted with trying to figure out our “new normal” and the technology we require to...

Continue Reading →
by BIO-key Team

How to Secure the Remote Workforce with Multi-factor Authentication

Due to the novel coronavirus pandemic throughout 2020, many businesses were required to have their employees work from home, and even with the vaccine rollout and a small beam of normalcy, many will continue to work remotely. In a recent Gartner CFO survey 74% of CFOs report that they plan to shift some employees to permanently work remotely.

Continue Reading →
by BIO-key Team

Designing and Implementing a Secure, Fully Brandable Web Portal

Like the blog? Read the whitepaper!

Most portals are designed for their function and only provide the basics when it comes to security, but with the increase in cyberattacks, this is no longer enough. 

Continue Reading →
by Christopher Perry

Ask Christopher: Mitigating the Risk of Phishing Attacks with MFA

Hackers are a blight on the digital scenery where we all spend most of our time, and phishing attacks are one of the oldest tricks in the book. Whether it’s at work or home, modern technology has made the digital world all but necessary. In this environment, hackers and malicious users are the banes of each admin and end-user attempting to get things done. Amid the recent pandemic, the leaches...

Continue Reading →
by BIO-key Team

Dynamic Passwords - Enforcing Authentication

Stepping Away from the Static

Even in 2021, in a world where authentication is a large part of cybersecurity measures, the password has still become the cornerstone for accessing websites, applications, and other common logins. In the recent Raconteur publication, "Future of Authentication", they report that Username/Password is still a key identity and access management (IAM) service in 73% of...

Continue Reading →
by BIO-key Team

Get Support for Your Hybrid Environment from an IDaaS Solution

While there are key benefits to moving to a cloud-based IAM solution, not all of them are created equal when it comes to their support for various applications and environments. Although the great “cloud migration” is underway, your environment is probably like many organizations – a hybrid. A mix of cloud, on-prem and even “legacy” applications are still in use. With many IDaaS solutions solely...

Continue Reading →
by BIO-key Team

How Your Cybersecurity Budget May Be Suffering from Your IAM Solution

The pressure to find or update your IAM solutions is at an all-time high. But when faced with this pressure, you may be choosing an IAM solution that delivers unexpected costs in overhead and licensing fees.

According to Gartner, Inc., by not looking at alternative or even open-source options you could be missing out on as high as 25% savings in your IAM budget.

When rushing to find an ...

Continue Reading →
by BIO-key Team

Finding an IAM Solution - Flexibility is the Key

Identity and Access Management (IAM) is not a new concept or one that many organizations don't already have as part of their security strategy. However, with the evolving threats and constant changes brought on by digital transformation, customer expectations, and even an unexpected pandemic, the need to be able to adapt is more critical than ever.

Continue Reading →
by BIO-key Team

Fight Password Fatigue with Single Sign-On

What is Password Fatigue?

Everyone hates passwords, but what most users hate about them is how many they have to remember. In many organizations it has become a requirement to have different complicated passwords for different applications that store valuable and confidential data. So if you have ever just felt overloaded with tons of passwords from work, personal finance, or your Netflix...

Continue Reading →
by BIO-key Team

4 Best Password Policy Practices for State and Local Government

Brief Note about Password Policies in State and Local Government

Employees and citizens expect their data and identity to be protected through secure, reliable, and advanced technology when it comes to their interactions with their state and local government. As the novel coronavirus shuts down more offices and pushes more employees to work from home, state and local government need to prioritize...

Continue Reading →
by BIO-key Team

PortalGuard vs. Microsoft Azure AD: A Direct Comparison

When it comes to purchases or big decisions, there is no shortage of quotes, quips and clichés. "You get what you pay for", "there's no free lunch" and "if it sounds too good to be true, it probably is". Any decision takes careful research and Identity Management decisions are among the most crucial that a business can make. Previous blog posts examined hidden costs for Microsoft ADFS and made...

Continue Reading →
by BIO-key Team

4 Tips to Prevent and Protect Against Keyloggers

There is no shortage of hacking attempts out there today. With more and more people using computers and smartphones, hackers are coming up with different ways of stealing sensitive data and using some old tactics too! Continue reading to learn how to protect against keyloggers.

Continue Reading →
by Christopher Perry

Office 365 Federation: Facing Default and Multiple Domains

So, you are looking to federate the Office 365 default domain for one reason or another, and - surprise... it's giving you some issues. It's to be expected; many major application or service providers will impose their own restrictions on how they support things like Single Sign-On and federation. The very same is true when it comes to federating the Office 365 Default Domain.

Continue Reading →
by Christopher Perry

Active Directory Trust – What you Need to Know

Without a doubt, Active Directory is one of the most popular user repositories for modern day businesses. While Active Directory is not 'new', it is a very widely used system that works for a large variety of organizations, providing simple and manageable organization.Many administrators and networks managers use Active Directory's built in function, the Active Directory Trust, to handle...

Continue Reading →
by BIO-key Team

Common Office 365 Password Reset Issues and Resolutions

Just like with anything that requires a password, Office 365 password reset is a common issue for a wide range of industries. Office 365 and Outlook Web App (OWA) provide email services to multitudes of end-users every day. As you may or may not know, Office 365 is a cloud-hosted application suite provided by Microsoft, while OWA is installed and maintained on-site by local IT professionals. The...

Continue Reading →
by BIO-key Team

Pros and Cons of Cloud Authentication

Remember when clouds were just floating weather objects in the sky? It was not too long ago that this was the only thing people thought of when the word was mentioned; now it is a completely different story. Today everything is now in the cloud! Our information is floating on a cloud somewhere as we speak, but is it safe? Is it safer to have your information stored in the cloud or locally? To...

Continue Reading →