by BIO-key Team 0 Comments

Fight Password Fatigue with Single Sign-On Software

Everyone hates passwords, but what most users hate about them is how many they have to remember. In many organizations it has become a requirement to have different complicated passwords for different applications that store valuable and confidential data. So if you have ever just felt overloaded with tons of passwords from work, personal finance, or your Netflix account, you could be suffering...

Continue Reading →

Tags: Authentication Security, #infosec, IT Security, #ITSecurity, PortalGuard, #singlesignon, PassiveKey, Password Security, Single Sign-On, Single Sign-On (SSO)

by PortalGuard 0 Comments

3 Ways to Help Employees Spot Phishing Attacks

From a data breach investigation of Verizon, roughly one in 10 employees will click on a malicious email.And the average phishing attack costs a mid-sized company $1.6 million.Computer phishing attacks are fraudulent processes where victims are tricked into giving away sensitive user information, potentially putting an entire company at risk.

Continue Reading →

Tags: Authentication, Authentication Security, #cyberattacks, #cybersecurity, Education, email, information security, mobile security, PortalGuard, Cyber Security, #defeatcyberattacks, Password Management, #phishing, password spraying, security trends, hackers, secure passwords, student accounts, impersonations, layer of security, breaches, IT Department, security risk, login session, cybercriminals, National Cybersecurity Month, malicious email, spear fishing

by Craig Campbell 0 Comments

Forget the Race Against Time: Leverage the Power of Single Sign-On and a Shared Desktop

Technology overload is a growing problem for many employees. According to a report from RingCentral, employees use an average of four apps just for communication, and more than half of workers toggle between apps up to 10 times an hour.

Continue Reading →

Tags: Authentication Security, SSO, Password Security, stronger security, Jump Page, improve usability and productivity, efficiency, Scooch, shared desktop

by Christopher Perry 0 Comments

Keeping Our Customers Happy with HappyFox

Customer support is pivotal in every vertical for a simple reason: customers keep companies alive.  Existing customers provide feedback, revenue flow, and even referral business for a given company.  This only remains true if customers are happy and cared for throughout the lifetime of the partnership. Elite and dedicated customer support drives customer relationships and enables companies to...

Continue Reading →

Tags: Authentication Security, contextual authentication, #deployment, HelpDesk, IT Security, MFA, Multi-Factor Authentication, SSO, Password Security, privacy, Self-Service Password Reset, SSPR, support, Two-Factor Authentication, PortalGuard Authentication Provider

by BIO-key Team 0 Comments

City of Sacramento Case Study

California’s state capital of Sacramento is a city rich in history, with a population over 500,000 and growing. The city is the core cultural and economic center of the Sacramento metropolitan area, which serves seven counties with an estimated population of 2.7 million people.

Continue Reading →

Tags: Authentication Security, SSO, Password Security, SSPR, Two-Factor Authentication, case study

by Nancy Wolff Leary 0 Comments

Strengthening Authentication to Adapt to Changing Circumstances

Are you worried that your current IT projects are overly complicated, haven’t been tested sufficiently or may impact existing applications in a way that you have not considered?

Continue Reading →

Tags: 2FA, Authentication, Authentication Methods, Authentication Security, #breach, Compliance, IT Security, #passwords, #security, #phishing, Two-Factor Authentication, secure passwords

by Gregg Browinski 0 Comments

How Can a Cloud Provider Securely Access my Active Directory?

More users and companies are running software applications in the cloud than ever before. When even the US Federal government is looking to get into the cloud, it's a clear indication that it has reached wide acceptance. Similarly, Identity as a Service (IDaaS) has been around for years, but how often do admins considering this approach bother to take a deeper dive into the issue of directory...

Continue Reading →

Tags: Authentication, Authentication Methods, Authentication Security, Cloud SaaS, encryption, firewall, Identity Federation, IT Security, #security, Access Control, Access Management, Active Directory, User Authentication, VPN, OAuth 2.0, OAauth, IDaaS, directory synchronization

by Christopher Perry 0 Comments

Prophecy Vs. Reality: Popular Cybersecurity Trends of 2019

Society loves prophecy.  Whether it’s used as a justification for acts of good or evil, or even if it’s just a matter of looking at your friend and saying “HA!  I was right!”  Correctly predicting what’s coming is a safe bet in terms of drawing interest, and it is a small wonder that even the biggest tech giants have hopped on that bandwagon.  Of course, prophecy and reality often differ, and...

Continue Reading →

Tags: 2FA, Authentication, authentication management, Authentication Security, authentication security, cloud, Cloud SaaS, cloud security, #cybersecurity, encryption, Gartner, Identity Provider, MFA, Multi-Factor Authentication, #passwords, #ssoimplementations, trust, Authentication Provider, Cloud authenticaiton, Cloud Authentication, data breach, data security, password encryption, two-factor, Two-Factor Authentication, #twofactor, security trends, password habits, secure acounts, password-based authentication, passwordless, Keeping your information safe, NIST, contextual Two-Factor Authentication, usual password, Google, identity solutions, open-source software, haveibeenpwned.com, two-step authentication, two-step verification, real-time monitoring

by Jay Ouellette 0 Comments

Passwordless Authentication Methods for Account Access

Just a short time ago everyone was starting to talk about passwords diminishing from existence. New forms of proving an individual’s identity are getting better and better each month and the FIDO Alliance deserves all the recognition for making it possible. The FIDO Alliance is focused on making authentication secure for consumers without using common OTP methods. Passwordless authentication...

Continue Reading →

Tags: 2FA, Authentication Security, MFA, Multi-Factor Authentication, #YubiKey, Duo Push Security, password habits, secure passwords, security risk, FIDO, FIDO Alliance, VoiceIt, Biometrics, vendor integrations, Benefits of 2FA, multilayer encryption, fingerprint readers, enable 2fa, security compliance, user profiles, end-users, cost-effective, password requirements, usual password, brute-force attacks, voice recognition, tailored authentication, web-key, bio-key

by Abbey Freeman 0 Comments

Sing a Song of Passwords

The voice. It allows us to communicate with each other, to share emotions through laughter, sobs, and songs. It can now also let us access our accounts. With multi-factor authentication enabled on certain accounts, we can use our voices as a second form of credential. In addition to our password which isn’t a reliable security credential, our voice is a lot more reliable. Only you can produce...

Continue Reading →

Tags: 2FA, Authentication, Authentication Security, MFA, Multi-Factor Authentication, Password, two-factor, Two-Factor Authentication, VoiceIt, Biometrics, voice biometrics, enable 2fa, voice recognition