by Jay Ouellette 0 Comments
by Christopher Perry 0 Comments

What to do When You Don't Always Need Two-Factor Authentication


Two-Factor Authentication (2FA) is an important topic of discussion where security is of concern. Too many data breaches have occurred over the last 10 years purely because of lackadaisical security requirements. Many of these events would have been avoided with a proper Two-Factor Authentication system in place.  Security: personal, private, corporate – the list goes on and on. Each entry a...

Continue Reading →

Tags: 2FA, #2FASolutions, contextual authentication, #contextualauthentication, #passwordmanagement, #security, security questions, #securityandusability, #selfservice, usability, User Experience, #2FA, #2ndfactor, Access Control, Access Management, account management, Password Synchronization, secure authentication, two-factor, Two-Factor Authentication, security trends, geolocation, layer of security, mobile authentication, mobile authenticator, Benefits of 2FA, one click, when you don't need 2FA

by Jay Ouellette 0 Comments

Cybersecurity for the Next Generation

As technology continues to advance it is vital for children to understand the potential risks that are out there and how to be cyber aware when online. Children ages 8-18 spend an average of 7 hours and 38 minutes online. During this time, they may be exposed to cyberbullying, cyber predators, and identity theft. In each child there seems to be an inherent trust in the technology that...

Continue Reading →

Tags: Authentication, Authentication Security, #cyberattacks, #cybersecurity, #2FA, #2ndfactor, Cyber Security, hackers, sign on to web applications, password policies, password generator, password habits, challenge questions, impersonations, cybercriminals, enforcing strong passwords, cyber aware generation, changing your password often, cyber aware, cyberbullying, teach cybersecurity, cyber predators, children and technology

by Gregg Browinski 0 Comments
by Rob Bellefeuille 0 Comments

Can a Workstation Act as Your 2nd Factor Authenticator?

When you first read this, you may be scratching your head and wondering how that is even possible? Well my friend, it is possible and is becoming quite popular even!

Now this concept may be way out of left field for you, but the process is simple and surprisingly secure.

For years, costly hard tokens have been the standard for providing 2nd factor authentication. This not only was costly...

Continue Reading →

Tags: Authentication, Authentication Security, IT Security, #ITSecurity, PortalGuard, SaaS, #2FA, #2ndfactor, PassiveKey, Password Security, two-factor, Two-Factor Authentication, User Authentication