Are you worried that your current IT projects are overly complicated, haven’t been tested sufficiently or may impact existing applications in a way that you have not considered?Continue Reading →
The boys of summer have been in full swing! As we enter mid August, it's hard to believe that the major league baseball season is over half way completed! After the All-Star break, the drive begins. Not only will the players be getting those extra batting practice swings in and pitchers working additional bullpen sessions allowing them to dial in their mechanics for that final push into the...Continue Reading →
Tags: 2FA, Access Server, #breach, MFA, mobile password generator, Multi-Factor Authentication, Password, password fatigue, password reset, password strength, #breachnews, data breach, password alternatives, password best practices, password complexity, password encryption, password expiration, Password Management, password manager, password quality, Password Security, Password Synchronization, #phishing, Two-Factor Authentication, hackers, update your passwords, password habits, secure passwords, breaches, limit minimum password length, reduce reusing weak passwords, applications supporting SAML, SSO Process, secure SSO, voice biometrics, employee turnover, secure acounts, password-based authentication, compliances, software, password requirements, brute-force attacks, compromised, hacked
Every year at the EDUCAUSE Conference the Top 10 IT Issues for the upcoming year are announced. Leading up to each conference a panel of experts ranging from IT leaders, CIO’s and faculty members present a list of the top IT trends. which are then voted on by EDUCAUSE members. The top initiatives are the most important topics and trends and will be a focus for the upcoming year. This year was...Continue Reading →
Tags: 2FA, Access Client, Account Unlock, attack surface reduction, Authentication, authentication management, Authentication Methods, Authentication Security, authentication security, #breach, checklist, Compliance, #cyberattacks, #cybersecurity, Education, Education Portals, email, encryption, End user experience, expiration, help desk calls, higher education, #HIPAA, I.T. Solutions, Identity Federation, identity management, Increase ROI, increased usability, information security, #infosec, Integration, IT Security, it security, #ITSecurity, K-12, login security, MFA, Multi-Factor Authentication, National Institute of Standards and Technology, network security, password reset, security questions, Access Control, Access Management, Access Point, account management, Active Directory, Application Security Testing, Authentication Provider, #breachnews, customer experience, Cyber Security, data breach, data security, Easy to Maintain Solutions, OTP, password alternatives, password encryption, Self-Service Password Reset, Single Sign-On, Two-Factor Authentication, healthcare, Students, single logout, increase security, EDUCAUSE, budgeting for education, student accounts, maintain security privacy, maintain data privacy
A picture is worth a thousand words.
Now, imagine if that picture of yours, that piece of personal information, was accessible for the whole world to see . . . Whoa!
Last week, a picture leak occurred as 500MB of private pictures became publically available. Snapchat, an Internet messaging service, promises its users that anything they share (i.e. pictures, videos, and messages) will...Continue Reading →