by Eric Jeffers 0 Comments

Maintaining Security and Data Privacy is one of the Biggest IT Challenges Today

Every year at the EDUCAUSE Conference the Top 10 IT Issues for the upcoming year are announced. Leading up to each conference a panel of experts ranging from IT leaders, CIO’s and faculty members present a list of the top IT trends. which are then voted on by EDUCAUSE members. The top initiatives are the most important topics and trends and will be a focus for the upcoming year. This year was...

Continue Reading →

Tags: 2FA, Access Client, Account Unlock, attack surface reduction, Authentication, authentication management, Authentication Methods, Authentication Security, authentication security, #breach, checklist, Compliance, #cyberattacks, #cybersecurity, Education, Education Portals, email, encryption, End user experience, expiration, help desk calls, higher education, #HIPAA, I.T. Solutions, Identity Federation, identity management, Increase ROI, increased usability, information security, #infosec, Integration, IT Security, it security, #ITSecurity, K-12, login security, MFA, Multi-Factor Authentication, National Institute of Standards and Technology, network security, password reset, security questions, Access Control, Access Management, Access Point, account management, Active Directory, Application Security Testing, Authentication Provider, #breachnews, customer experience, Cyber Security, data breach, data security, Easy to Maintain Solutions, OTP, password alternatives, password encryption, Self-Service Password Reset, Single Sign-On, Two-Factor Authentication, healthcare, Students, single logout, increase security, EDUCAUSE, budgeting for education, student accounts, maintain security privacy, maintain data privacy

Single Sign-on Checklist | A Game Plan

Single sign-on continues to be a growing technology in a world of diverse identity solutions. This particular authentication solution is well known by many IT professionals as a way to achieve the right balance of security and usability for its users. Based on my experiences, I often find many IT decision-makers blinded by the novelty of single sign-on. As with any change in access to a...

Continue Reading →

Tags: authentication security, best practices, checklist, IT Security, SSO, Dynamic Analysis, Single Sign-On (SSO), user convenience, web applications

Authentication Software Deployment Checklist - What to Know

 

 

Deploying a new solution in any environment poses a certain number of challenges. These challenges can stem from determining how to best execute the deployment, to overcoming user adoption rate issues. Today I will illustrate the key components of a software deployment checklist; and also provide insight on overcoming some common hurdles faced when staring down the barrel of that...

Continue Reading →

Tags: Authentication Security, best practices, checklist, #deployment, Dynamic Analysis