by Nancy Wolff Leary 0 Comments

Strengthening Authentication to Adapt to Changing Circumstances

Are you worried that your current IT projects are overly complicated, haven’t been tested sufficiently or may impact existing applications in a way that you have not considered?

Continue Reading →

Tags: 2FA, Authentication, Authentication Methods, Authentication Security, #breach, Compliance, IT Security, #passwords, #security, #phishing, Two-Factor Authentication, secure passwords

by Eric Jeffers 0 Comments

Maintaining Security and Data Privacy is one of the Biggest IT Challenges Today

Every year at the EDUCAUSE Conference the Top 10 IT Issues for the upcoming year are announced. Leading up to each conference a panel of experts ranging from IT leaders, CIO’s and faculty members present a list of the top IT trends. which are then voted on by EDUCAUSE members. The top initiatives are the most important topics and trends and will be a focus for the upcoming year. This year was...

Continue Reading →

Tags: 2FA, Access Client, Account Unlock, attack surface reduction, Authentication, authentication management, Authentication Methods, Authentication Security, authentication security, #breach, checklist, Compliance, #cyberattacks, #cybersecurity, Education, Education Portals, email, encryption, End user experience, expiration, help desk calls, higher education, #HIPAA, I.T. Solutions, Identity Federation, identity management, Increase ROI, increased usability, information security, #infosec, Integration, IT Security, it security, #ITSecurity, K-12, login security, MFA, Multi-Factor Authentication, National Institute of Standards and Technology, network security, password reset, security questions, Access Control, Access Management, Access Point, account management, Active Directory, Application Security Testing, Authentication Provider, #breachnews, customer experience, Cyber Security, data breach, data security, Easy to Maintain Solutions, OTP, password alternatives, password encryption, Self-Service Password Reset, Single Sign-On, Two-Factor Authentication, healthcare, Students, single logout, increase security, EDUCAUSE, budgeting for education, student accounts, maintain security privacy, maintain data privacy

by BIO-key Team 0 Comments

Security Concerns for Cloud Hosted Systems in Higher Education

By 2020, the number of smartphones, tablets, and PCs in use will reach approximately 7.3 billion units. This wave of the Internet of Things (IoT) is becoming even more prevalent throughout higher education institutions. However, Cloud Hosted Systems and services are still only a conceptual notion among many colleges and universities.

Continue Reading →

Tags: #bestpractices, Compliance, higher education, information security, IT Security, #ITSecurity, K-12, On-premise, PortalGuard, Uncategorized, Access Management, cloud computing, Cloud Hosted System, Password Management

Popular Issues with Log Management

In a world full of compliance concerns, data breaches, and a slue of security-minded innovations in authentication and access control, log management is still an issue of much debate. For those not in the know, log management – also known simply as auditing – is a method of collecting, storing, and analyzing logs from various sources. Due to the nature of these logs, management is often more...

Continue Reading →

Tags: Compliance, information security, IT Security, log management, Dynamic Analysis, SIEM

by BIO-key Team 0 Comments

The Benefits of Two-Factor Authentication | Part II

In light of the lessons IT decision makers may have learned from the Office of Personnel Management (OPM) breach—the largest data security rupture in U.S. government history—the time has come for taking another glance at the benefits associated with a two-factor authentication solution.

Continue Reading →

Tags: Authentication Security, Compliance, identity management, Dynamic Analysis, OTP, stronger authentication, Two-Factor Authentication