by Michael Galinat 0 Comments

Offline Enhancements For Better Online Security

Are you a person that is constantly working on the move? Are you worried that your computer could be compromised by a cyber criminal who hacked your password?  If you answered "YES" to either of these questions, then we highly recommend installing our latest PortalGuard Desktop Client.

Continue Reading →

Tags: 2FA, Authentication Methods, authentication security, IT Security, login security, Two-Factor Authentication, offline, offline desktop 2fa

by Christopher Perry 0 Comments

Prophecy Vs. Reality: Popular Cybersecurity Trends of 2019

Society loves prophecy.  Whether it’s used as a justification for acts of good or evil, or even if it’s just a matter of looking at your friend and saying “HA!  I was right!”  Correctly predicting what’s coming is a safe bet in terms of drawing interest, and it is a small wonder that even the biggest tech giants have hopped on that bandwagon.  Of course, prophecy and reality often differ, and...

Continue Reading →

Tags: 2FA, Authentication, authentication management, Authentication Security, authentication security, cloud, Cloud SaaS, cloud security, #cybersecurity, encryption, Gartner, Identity Provider, MFA, Multi-Factor Authentication, #passwords, #ssoimplementations, trust, Authentication Provider, Cloud authenticaiton, Cloud Authentication, data breach, data security, password encryption, two-factor, Two-Factor Authentication, #twofactor, security trends, password habits, secure acounts, password-based authentication, passwordless, Keeping your information safe, NIST, contextual Two-Factor Authentication, usual password, Google, identity solutions, open-source software, haveibeenpwned.com, two-step authentication, two-step verification, real-time monitoring

Your Online Security is Important - Better Your Digital Profile

Strong online security is the white whale of the digital revolution.  With each step towards the final achievement, development and ingenuity necessitate that the individual takes two steps back.  One step to familiarize oneself with the new technology, and another to determine the best foot forward. It’s an inescapable fact that technology moves faster than most people. 

Rapid evolution isn’t...

Continue Reading →

Tags: 2FA, #applications, authentication security, Identity Provider, MFA, Multi-Factor Authentication, multilayer authentication, technology, usability, data breach, data security, Password Security, Two-Factor Authentication, data quality, security risk, PortalGuard Security Policy, google titan security key, mobile authenticator, trending cybersecurity attacks, information systems, maintain security privacy, maintain data privacy, improve usability and productivity, development server, Admin Privileges, multilayer encryption, strong online security, technology evolution, digital profile, online security, improve security, phone call, second factor

by Eric Jeffers 0 Comments

Maintaining Security and Data Privacy is one of the Biggest IT Challenges Today

Every year at the EDUCAUSE Conference the Top 10 IT Issues for the upcoming year are announced. Leading up to each conference a panel of experts ranging from IT leaders, CIO’s and faculty members present a list of the top IT trends. which are then voted on by EDUCAUSE members. The top initiatives are the most important topics and trends and will be a focus for the upcoming year. This year was...

Continue Reading →

Tags: 2FA, Access Client, Account Unlock, attack surface reduction, Authentication, authentication management, Authentication Methods, Authentication Security, authentication security, #breach, checklist, Compliance, #cyberattacks, #cybersecurity, Education, Education Portals, email, encryption, End user experience, expiration, help desk calls, higher education, #HIPAA, I.T. Solutions, Identity Federation, identity management, Increase ROI, increased usability, information security, #infosec, Integration, IT Security, it security, #ITSecurity, K-12, login security, MFA, Multi-Factor Authentication, National Institute of Standards and Technology, network security, password reset, security questions, Access Control, Access Management, Access Point, account management, Active Directory, Application Security Testing, Authentication Provider, #breachnews, customer experience, Cyber Security, data breach, data security, Easy to Maintain Solutions, OTP, password alternatives, password encryption, Self-Service Password Reset, Single Sign-On, Two-Factor Authentication, healthcare, Students, single logout, increase security, EDUCAUSE, budgeting for education, student accounts, maintain security privacy, maintain data privacy

by Christopher Perry 0 Comments

Ask Christopher - "Should I Upgrade?"

Upgrading is always a top priority in the software industry.  Keeping vital software running smoothly and without issues is imperative to any industry with a digital presence.   With an authentication package like PortalGuard, up-to-date software also brings along new features and fixes for existing bugs or hiccups discovered along the way.  With that in mind, I am not surprised at the most...

Continue Reading →

Tags: 2FA, Authentication, Authentication Methods, Authentication Security, authentication security, Centralized Authentication, #cybersecurity, MFA, Access Control, Access Management, Access Point, account management, Authentication Provider, Cyber Security, tech support, PortalGuard Authentication Provider, upgrades, PortalGuard Security Policy, PortalGuard Proxy, PortalGuard v6.2, Modern SSO Protocols, cybersecurity leaders, newest version, why upgrade

by Christopher Perry 0 Comments

Why Gamers Tolerate Two-Factor Authentication

Two-Factor Authentication is often a dirty phrase for end-users – though that does not seem to hold true within the gaming community. It is not a stretch of the truth to say that gamers are a temperamental lot.  We like things that work, and we hate change on principal.  Of course, opinions can shift one way or the other, but that’s the basic foundation when targeting gamers as an audience:...

Continue Reading →

Tags: 2FA, #AccountUnlock, Authentication, authentication management, Authentication Methods, Authentication Security, authentication security, #gamer, MFA, Microsoft, Multi-Factor Authentication, Access Management, Authentication Provider, OTP Authentication, Two-Factor Authentication, User Authentication, mobile authentication, mobile authenticator, blizzard, Square-Enix, Steam, XBOX, PC Games, Benefits of 2FA, Sony, PlayStation, gaming companies using 2FA

by Christopher Perry 0 Comments

Top 5 Reasons to Use a Mobile Authenticator

The advent of modern authentication security places a lot of pressure on the user to remain secure in a constantly changing environment.  Using a Mobile Authenticator is one of the most simple and accessible methods to remain secure without compromising usability.  We discuss what makes a good Mobile Authenticator in our recent White Paper - The Argument for a Better Authenticator. However,...

Continue Reading →

Tags: 2FA, #2FASolutions, authentication security, #cybersecurity, MFA, mobile security, Multi-Factor Authentication, #2FA, Access Management, Active Directory, Cyber Security, OTP, OTP Authentication, Single Sign-On (SSO), SSPR, user convenience, Single Sign-On Options, flexibility, OTP Methods, mobile authentication, HOTP, cyber aware, mobile authenticator, accessibility, Simplicity

by Gregg Browinski 0 Comments

Creating a Strong Password Policy - Complexity, Length, 2FA

Strengthening password policies is a major topic of debate these days.  Various sources for best practices have peaked out from every corner, each spouting something new.  While having options is a great thing in many cases, paralyzing users and admins with which ‘best practice’ is really best is another issue entirely.  Instead, I will take a look at the facts behind strengthening password...

Continue Reading →

Tags: 2FA, #2FASolutions, authentication security, #balance, best practices, #cybersecurity, MFA, Multi-Factor Authentication, #passwordmanagement, strong password, usability, password complexity, password manager, Self-Service Password Reset, Two-Factor Authentication, PortalGuard Authentication Provider, empower users, stolen passwords, university, community college, password policies, password length