by Eric Jeffers 0 Comments

How Employee Turnover Could be a Problem for your IT Department and Put your Company at Risk

In 2018 the leading sector with the highest employee turnover was once again the technology industry at 13.2%. This was followed by Government, Education, and non-profit at 11.7%. However, employee turnover is not just an HR issue. According to a study by the American Bar Association, American businesses lose an estimated $59 billion a year due to the loss of intellectual property. Current...

Continue Reading →

Tags: Access Point, Single Sign-On, Single Sign-On (SSO), Single Sign-On Options, update your passwords, secure passwords, IT Department Best Practices, Single Sign Off, IT Department, security risk, cybersecurity leaders, IT Professionals, essential cybersecurity, IT Management, web-based SSO, maintain security privacy, maintain data privacy, Employee, SSO reduces login prompts for end-users, IdP Options, SSO Process, secure SSO, employee turnover

by Eric Jeffers 0 Comments

Maintaining Security and Data Privacy is one of the Biggest IT Challenges Today

Every year at the EDUCAUSE Conference the Top 10 IT Issues for the upcoming year are announced. Leading up to each conference a panel of experts ranging from IT leaders, CIO’s and faculty members present a list of the top IT trends. which are then voted on by EDUCAUSE members. The top initiatives are the most important topics and trends and will be a focus for the upcoming year. This year was...

Continue Reading →

Tags: 2FA, Access Client, Account Unlock, attack surface reduction, Authentication, authentication management, Authentication Methods, Authentication Security, authentication security, #breach, checklist, Compliance, #cyberattacks, #cybersecurity, Education, Education Portals, email, encryption, End user experience, expiration, help desk calls, higher education, #HIPAA, I.T. Solutions, Identity Federation, identity management, Increase ROI, increased usability, information security, #infosec, Integration, IT Security, it security, #ITSecurity, K-12, login security, MFA, Multi-Factor Authentication, National Institute of Standards and Technology, network security, password reset, security questions, Access Control, Access Management, Access Point, account management, Active Directory, Application Security Testing, Authentication Provider, #breachnews, customer experience, Cyber Security, data breach, data security, Easy to Maintain Solutions, OTP, password alternatives, password encryption, Self-Service Password Reset, Single Sign-On, Two-Factor Authentication, healthcare, Students, single logout, increase security, EDUCAUSE, budgeting for education, student accounts, maintain security privacy, maintain data privacy

by Christopher Perry 0 Comments

Ask Christopher - "Should I Upgrade?"

Upgrading is always a top priority in the software industry.  Keeping vital software running smoothly and without issues is imperative to any industry with a digital presence.   With an authentication package like PortalGuard, up-to-date software also brings along new features and fixes for existing bugs or hiccups discovered along the way.  With that in mind, I am not surprised at the most...

Continue Reading →

Tags: 2FA, Authentication, Authentication Methods, Authentication Security, authentication security, Centralized Authentication, #cybersecurity, MFA, Access Control, Access Management, Access Point, account management, Authentication Provider, Cyber Security, tech support, PortalGuard Authentication Provider, upgrades, PortalGuard Security Policy, PortalGuard Proxy, PortalGuard v6.2, Modern SSO Protocols, cybersecurity leaders, newest version, why upgrade

by Tom Hoey 0 Comments

RADIUS Authentication Management

If you are in need of a remote authentication solution for your network, the RADIUS protocol is it.  To say that the RADIUS protocol is a ubiquitous approach to providing large-scale, centralized authentication management for internal or external networks, would be an understatement.  Widely used by ISPs and large enterprises to manage a variety...

Continue Reading →

Tags: Access Client, Access Server, Centralized Authentication, ISP, MD5 Hashing Algorithm, NAS, RADIUS protocol, RADIUS Server, Access Point, RADIUS, RADIUS Client, Remote Authentication, Shared secret