by PortalGuard 0 Comments

3 Ways to Help Employees Spot Phishing Attacks

From a data breach investigation of Verizon, roughly one in 10 employees will click on a malicious email.And the average phishing attack costs a mid-sized company $1.6 million.Phishing attacks are fraudulent process where victims are tricked into giving away sensitive user information, potentially putting an entire company at risk.

Continue Reading →

Tags: Authentication, Authentication Security, #cyberattacks, #cybersecurity, Education, email, information security, mobile security, PortalGuard, Cyber Security, #defeatcyberattacks, Password Management, #phishing, password spraying, security trends, hackers, secure passwords, student accounts, impersonations, layer of security, breaches, IT Department, security risk, login session, cybercriminals, National Cybersecurity Month, malicious email, spear fishing

by Eric Jeffers 0 Comments

Maintaining Security and Data Privacy is one of the Biggest IT Challenges Today

Every year at the EDUCAUSE Conference the Top 10 IT Issues for the upcoming year are announced. Leading up to each conference a panel of experts ranging from IT leaders, CIO’s and faculty members present a list of the top IT trends. which are then voted on by EDUCAUSE members. The top initiatives are the most important topics and trends and will be a focus for the upcoming year. This year was...

Continue Reading →

Tags: 2FA, Access Client, Account Unlock, attack surface reduction, Authentication, authentication management, Authentication Methods, Authentication Security, authentication security, #breach, checklist, Compliance, #cyberattacks, #cybersecurity, Education, Education Portals, email, encryption, End user experience, expiration, help desk calls, higher education, #HIPAA, I.T. Solutions, Identity Federation, identity management, Increase ROI, increased usability, information security, #infosec, Integration, IT Security, it security, #ITSecurity, K-12, login security, MFA, Multi-Factor Authentication, National Institute of Standards and Technology, network security, password reset, security questions, Access Control, Access Management, Access Point, account management, Active Directory, Application Security Testing, Authentication Provider, #breachnews, customer experience, Cyber Security, data breach, data security, Easy to Maintain Solutions, OTP, password alternatives, password encryption, Self-Service Password Reset, Single Sign-On, Two-Factor Authentication, healthcare, Students, single logout, increase security, EDUCAUSE, budgeting for education, student accounts, maintain security privacy, maintain data privacy

by Eric Jeffers 0 Comments

Where are we in leading the charge of training the next cybersecurity leaders?

Cyber Range [cy·ber I rānj] -  is a virtual environment used for cyberwarfare training and cybertechnology development. It provides tools that help strengthen the stability, security, and performance of cyber-infrastructures and IT systems used by government and military agencies, and appears on college campuses everywhere.

Continue Reading →

Tags: #cyberattacks, #cybersecurity, Education, higher education, information security, Cyber Security, #defeatcyberattacks, Risk Score, stronger security, healthcare, increase security, security trends, security risk, cybercriminals, cyber aware generation, cyber aware, teach cybersecurity, training, Cyber Range, cybersecurity leaders, Degrees in Cybersecurity, CISSP, GSEC, Certified Ethical Hacker (CEH), National Defense, cyberwarfare, virtual environment, executive cyber management, Asset Protection, CISA, CEH, innovation

by Kody Pinette 0 Comments

Proxy - Is it Confusing, Mysterious, or Essential?

Proxy? Sounds confusing, mysterious, or essential? So what is it and why would you want to use one? A proxy server is a wall that acts as a gateway between you and the internet. Without a secure proxy, your browser communicates directly with the internet. Think of the proxy as a form of protection; it can scan your downloads, filter web content, get around certain web restrictions and allow...

Continue Reading →

Tags: #cyberattacks, #cybersecurity, encryption, End user experience, password strength, #singlesignon, strong password, customer experience, Cyber Security, password encryption, #phishing, SSO Proxy, single logout, stolen passwords, password policies, password length, update your passwords, password habits, secure passwords, password policy best practices, limit minimum password length, password age, PortalGuard Proxy, one click, proxy server

by Jay Ouellette 0 Comments

Cybersecurity for the Next Generation

As technology continues to advance it is vital for children to understand the potential risks that are out there and how to be cyber aware when online. Children ages 8-18 spend an average of 7 hours and 38 minutes online. During this time, they may be exposed to cyberbullying, cyber predators, and identity theft. In each child there seems to be an inherent trust in the technology that...

Continue Reading →

Tags: Authentication, Authentication Security, #cyberattacks, #cybersecurity, #2FA, #2ndfactor, Cyber Security, hackers, sign on to web applications, password policies, password generator, password habits, challenge questions, impersonations, cybercriminals, enforcing strong passwords, cyber aware generation, changing your password often, cyber aware, cyberbullying, teach cybersecurity, cyber predators, children and technology

by Jay Ouellette 0 Comments

New England School Districts are an Easy Target for Cyber Criminals

Schools are becoming easy targets for cyber criminals, not only in New Hampshire but across the country. Exposing, compromising and exploiting confidential information to make an easy profit or to test their skills. The Cybersecurity incident map, a useful tool created by Doug Levins of EdTech Strategies, LLC., provides an in depth look of past and recent events. (For those who haven’t...

Continue Reading →

Tags: #cyberattacks, #cybersecurity, SSO, User Interface, Access Management, Cyber Security, #defeatcyberattacks, #phishing, SSPR, teachers, Students, Single Sign-On Options, increase security, security trends, secure login, classroom, Portal Customization, empower users, stolen passwords, hackers, scams, university, college, community college, password policies, update your passwords, password habits, secure passwords, student accounts, impersonations, Single Sign Off, breaches, IT Department, security risk, cybercriminals

by Loretta Keefe 0 Comments