Cybersecurity for the Next Generation

As technology continues to advance it is vital for children to understand the potential risks that are out there and how to be cyber aware when online. Children ages 8-18 spend an average of 7 hours and 38 minutes online. During this time, they may be exposed to cyberbullying, cyber predators, and identity theft. In each child there seems to be an inherent trust in the technology that...

Continue Reading →

Tags: Authentication, Authentication Security, #cyberattacks, #cybersecurity, #2FA, #2ndfactor, Cyber Security, hackers, sign on to web applications, password policies, password generator, password habits, challenge questions, impersonations, cybercriminals, enforcing strong passwords, cyber aware generation, changing your password often, cyber aware, cyberbullying, teach cybersecurity, cyber predators, children and technology

by Christopher Perry 0 Comments

7 Blogs to Revisit for National Cybersecurity Awareness Month

Since 2004, the Department of Homeland Security (DHS) and the National Cyber Security Alliance (NCSA) have officially recognized October as National Cybersecurity Awareness Month (NCSAM).  Pulled directly from the official StaySafeOnline website, NCSAM is “…a broad effort to help all Americans stay safer and more secure online.”  Here at PortalGuard, Security is something that we take very...

Continue Reading →

Tags: Education, PortalGuard, security questions, #securityandusability, static password, strong password, technology, Tokenless Authentication, Turnkey Authentication, usability, User Experience, PortalGuard Configuration, PortalGuard for Education, service, Single-Factor Authentication, Single Sign-On (SSO), #singlesign-on, SSPR, Stand your Ground, stronger authentication, stronger security, #strongpassword, tech support, Two-Factor Authentication, User Authentication, user convenience, #userauthentication, #userexperience, Virtual Private Network, web applications, Password Reset from the Mac Desktop, reducing help desk calls, healthcare, SSO Proxy, password spraying, pwned passwords, Lanyard Login, Chrome Books, Special Education, Para Professionals, Students, Single Sign-On Options, increase security, SAML Single Logout, flexibility, security trends, secure login, Ask Christopher, technical support, geolocation, off network access, PortalGuard Authentication Provider, Google Authenticator, SMS Text Message Gateway, Duo Push Security, RSA SecurID, Duo, higher education budgeting, budget, fiscally sound decisions, classroom, OTP Methods, empower users, stolen passwords, hackers, scams, weak link, budgeting for education, university, college, community college, password policies, password length, passphrase, update your passwords, password patterns, password generator, password habits, secure passwords, challenge questions, IT Department Best Practices, impersonations, layer of security, breaches, IT Department, security risk, logging off, login session, outlook, mobile authentication, PortalGuard Security Policy, National Cybersecurity Month

by Christopher Perry 0 Comments
by Gregg Browinski 0 Comments
by Jason Garfagna 0 Comments

Parents - The Other Type of Hacker...

It seems like every other day you hear about a new data breach or some new scam designed to steal credentials of the unsuspecting end user. With the advent of social media, it’s now easier than ever to social engineer a person’s identity for nefarious intent. With these constant barrages of attacks, there is a heavy focus in the community on executing best practices for navigating the murky...

Continue Reading →

Tags: #forgotpassword, help desk calls, #lockedout, Multi-Factor Authentication, strong password, password best practices, Password Security, PortalGuard for Education, secure authentication, Self-Service Password Reset, social engineering, SSPR, stronger authentication, Two-Factor Authentication, User Authentication, reducing help desk calls, teachers, K-5, Single Sign-On Options, secure login, stolen passwords, hackers, scams, password policies, update your passwords, password patterns, password habits, challenge questions, student accounts, IT Department Best Practices, impersonations, layer of security