by Christopher Perry 0 Comments

What to do When You Don't Always Need Two-Factor Authentication

 

Two-Factor Authentication (2FA) is an important topic of discussion where security is of concern. Too many data breaches have occurred over the last 10 years purely because of lackadaisical security requirements. Many of these events would have been avoided with a proper Two-Factor Authentication system in place.  Security: personal, private, corporate – the list goes on and on. Each entry a...

Continue Reading →

Tags: 2FA, #2FASolutions, contextual authentication, #contextualauthentication, #passwordmanagement, #security, security questions, #securityandusability, #selfservice, usability, User Experience, #2FA, #2ndfactor, Access Control, Access Management, account management, Password Synchronization, secure authentication, two-factor, Two-Factor Authentication, security trends, geolocation, layer of security, mobile authentication, mobile authenticator, Benefits of 2FA, one click, when you don't need 2FA

by Gregg Browinski 0 Comments
by Rob K 0 Comments

Prevent Office 365 Phishing Attacks by Adding a Secure Front Door

 

Office 365 is a must-have software for all industries in today’s world.  The ease of use and value of Office 365 applications are great for users on both the individual and business end. The subscription-based service allows individual users access to Microsoft apps such as Microsoft Office. For businesses Office 365 it offers a bit more. Email and social networking services essential in...

Continue Reading →

Tags: #contextualauthentication, #singlesignon, #office365, secure office 365

by Rob K 0 Comments

Access Control | Contextual Authentication

 

 

Access control is simply controlling entry into a cyberspace as previously explained in this blog. For example, you have to have a password to access your Facebook account. This password requirement is access control. Without it, anybody could access your page and do whatever they wanted. This is primarily why cybersecurity exists…to prevent those who shouldn’t have access from getting...

Continue Reading →

Tags: #contextualauthentication, #cybersecurity, Access Control

by Jason Garfagna 0 Comments

A Call to Arms - Contextual Authentication

 

As Protector of your realm, you stand high upon the stone walls that overlook the sprawling expanse of your kingdom. You admire all that you have accomplished thus far, but maintain a constant vigil over those you are sworn to protect is never ending. You are always wary of the dangers that lurk just beyond the reach of your protection. You can forever sense the undead lurking in the...

Continue Reading →

Tags: #acalltoarms, Authentication, Authentication Security, #contextualauthentication, IT Security, #ithero, PortalGuard, #2FA, Two-Factor Authentication, User Authentication

by Gregg Browinski 0 Comments

Transparent Ally Part 2: Transparent Authentication

Transparent Ally Part 2: Transparent Authentication

 

Contextual authentication has been around for years, but is finally starting to gain traction.  It seeks to leverage extra information the computer can use to make more informed decisions.  It is critical that this information be trustworthy.  As an example, HTML5 now makes it much easier for applications to get the GPS coordinates of a...

Continue Reading →

Tags: Authentication, #contextualauthentication, #html5, IT Security, #ITSecurity, PortalGuard, #2FA, #transparentauthentication, Two-Factor Authentication, User Authentication