by PortalGuard 0 Comments

3 Ways to Help Employees Spot Phishing Attacks

From a data breach investigation of Verizon, roughly one in 10 employees will click on a malicious email.And the average phishing attack costs a mid-sized company $1.6 million.Phishing attacks are fraudulent process where victims are tricked into giving away sensitive user information, potentially putting an entire company at risk.

Continue Reading →

Tags: Authentication, Authentication Security, #cyberattacks, #cybersecurity, Education, email, information security, mobile security, PortalGuard, Cyber Security, #defeatcyberattacks, Password Management, #phishing, password spraying, security trends, hackers, secure passwords, student accounts, impersonations, layer of security, breaches, IT Department, security risk, login session, cybercriminals, National Cybersecurity Month, malicious email, spear fishing

by Craig Campbell 0 Comments

Forget the Race Against Time: Leverage the Power of Single Sign-On and a Shared Desktop

Technology overload is a growing problem for many employees. According to a report from RingCentral, employees use an average of four apps just for communication, and more than half of workers toggle between apps up to 10 times an hour.

Continue Reading →

Tags: Authentication Security, SSO, Password Security, stronger security, Jump Page, improve usability and productivity, efficiency, Scooch, shared desktop

by Christopher Perry 0 Comments

Keeping Our Customers Happy with HappyFox

Customer support is pivotal in every vertical for a simple reason: customers keep companies alive.  Existing customers provide feedback, revenue flow, and even referral business for a given company.  This only remains true if customers are happy and cared for throughout the lifetime of the partnership. Elite and dedicated customer support drives customer relationships and enables companies to...

Continue Reading →

Tags: Authentication Security, contextual authentication, #deployment, HelpDesk, IT Security, MFA, Multi-Factor Authentication, SSO, Password Security, privacy, Self-Service Password Reset, SSPR, support, Two-Factor Authentication, PortalGuard Authentication Provider

by Jay Ouellette 0 Comments

City of Sacramento Case Study

California’s state capital of Sacramento is a city rich in history, with a population over 500,000 and growing. The city is the core cultural and economic center of the Sacramento metropolitan area, which serves seven counties with an estimated population of 2.7 million people.

Continue Reading →

Tags: Authentication Security, SSO, Password Security, SSPR, Two-Factor Authentication, case study

by Nancy Wolff Leary 0 Comments

Strengthening Authentication to Adapt to Changing Circumstances

Are you worried that your current IT projects are overly complicated, haven’t been tested sufficiently or may impact existing applications in a way that you have not considered?

Continue Reading →

Tags: 2FA, Authentication, Authentication Methods, Authentication Security, #breach, Compliance, IT Security, #passwords, #security, #phishing, Two-Factor Authentication, secure passwords

by Gregg Browinski 0 Comments

How Can a Cloud Provider Securely Access my Active Directory?

More users and companies are running software applications in the cloud than ever before. When even the US Federal government is looking to get into the cloud, it's a clear indication that it has reached wide acceptance. Similarly, Identity as a Service (IDaaS) has been around for years, but how often do admins considering this approach bother to take a deeper dive into the issue of directory...

Continue Reading →

Tags: Authentication, Authentication Methods, Authentication Security, Cloud SaaS, encryption, firewall, Identity Federation, IT Security, #security, Access Control, Access Management, Active Directory, User Authentication, VPN, OAuth 2.0, OAauth, IDaaS, directory synchronization

by Christopher Perry 0 Comments

Prophecy Vs. Reality: Popular Cybersecurity Trends of 2019

Society loves prophecy.  Whether it’s used as a justification for acts of good or evil, or even if it’s just a matter of looking at your friend and saying “HA!  I was right!”  Correctly predicting what’s coming is a safe bet in terms of drawing interest, and it is a small wonder that even the biggest tech giants have hopped on that bandwagon.  Of course, prophecy and reality often differ, and...

Continue Reading →

Tags: 2FA, Authentication, authentication management, Authentication Security, authentication security, cloud, Cloud SaaS, cloud security, #cybersecurity, encryption, Gartner, Identity Provider, MFA, Multi-Factor Authentication, #passwords, #ssoimplementations, trust, Authentication Provider, Cloud authenticaiton, Cloud Authentication, data breach, data security, password encryption, two-factor, Two-Factor Authentication, #twofactor, security trends, password habits, secure acounts, password-based authentication, passwordless, Keeping your information safe, NIST, contextual Two-Factor Authentication, usual password, Google, identity solutions, open-source software, haveibeenpwned.com, two-step authentication, two-step verification, real-time monitoring

by Jay Ouellette 0 Comments

Passwordless Authentication Methods for Account Access

Just a short time ago everyone was starting to talk about passwords diminishing from existence. New forms of proving an individual’s identity are getting better and better each month and the FIDO Alliance deserves all the recognition for making it possible. The FIDO Alliance is focused on making authentication secure for consumers without using common OTP methods. Passwordless authentication...

Continue Reading →

Tags: 2FA, Authentication Security, MFA, Multi-Factor Authentication, #YubiKey, Duo Push Security, password habits, secure passwords, security risk, FIDO, FIDO Alliance, VoiceIt, Biometrics, vendor integrations, Benefits of 2FA, multilayer encryption, fingerprint readers, enable 2fa, security compliance, user profiles, end-users, cost-effective, password requirements, usual password, brute-force attacks, voice recognition, tailored authentication, web-key, bio-key

by Abbey Freeman 0 Comments

Sing a Song of Passwords

The voice. It allows us to communicate with each other, to share emotions through laughter, sobs, and songs. It can now also let us access our accounts. With multi-factor authentication enabled on certain accounts, we can use our voices as a second form of credential. In addition to our password which isn’t a reliable security credential, our voice is a lot more reliable. Only you can produce...

Continue Reading →

Tags: 2FA, Authentication, Authentication Security, MFA, Multi-Factor Authentication, Password, two-factor, Two-Factor Authentication, VoiceIt, Biometrics, voice biometrics, enable 2fa, voice recognition

PortalGuard's Latest in Feature Updates - Summer 2019

There is never a shortage of feature and enhancement requests from our customer base. These have been critical to ensuring PortalGuard's relevance in the authentication space so keep them coming! Features that make it into PortalGuard are either directly funded by a customer through our Tailored Authentication program or they are requested by multiple customers. For the latter case, these...

Continue Reading →

Tags: Authentication Security, End user experience, MFA, Multi-Factor Authentication, PortalGuard, Access Control, Access Management, Active Directory, PortalGuard Configuration, PortalGuard for Education, PortalGuard Update, SOL-based directory, two-factor, Two-Factor Authentication, secure login, security risk, login session, mobile authentication, Biometrics, front-end login, voice biometrics, domain policy, fingerprint readers, enable 2fa, security compliance, features, voice recognition, tailored authentication, automatic delivery fallback/failover, web-key, bio-key