by BIO-key Team 0 Comments

4 Best Password Policy Practices for State and Local Government

Brief Note about Password Policies in State and Local Government

Employees and citizens expect their data and identity to be protected through secure, reliable, and advanced technology when it comes to their interactions with their state and local government. As the novel coronavirus shuts down more offices and pushes more employees to work from home, state and local government need to prioritize...

Continue Reading →

Tags: NIST Updates, password strength, strong password, password complexity, stronger authentication, password policies, password length, passphrase, update your passwords, password patterns, password generator, password habits, secure passwords, layer of security, security risk, login session, cybercriminals, PortalGuard Security Policy, National Cybersecurity Month, password policy best practices, limit minimum password length, regular password changes, minimum length passwords, enforcing strong passwords, password age, password history, reduce reusing weak passwords

by PortalGuard 0 Comments

3 Ways to Help Employees Spot Phishing Attacks

From a data breach investigation of Verizon, roughly one in 10 employees will click on a malicious email.And the average phishing attack costs a mid-sized company $1.6 million.Phishing attacks are fraudulent process where victims are tricked into giving away sensitive user information, potentially putting an entire company at risk.

Continue Reading →

Tags: Authentication, Authentication Security, #cyberattacks, #cybersecurity, Education, email, information security, mobile security, PortalGuard, Cyber Security, #defeatcyberattacks, Password Management, #phishing, password spraying, security trends, hackers, secure passwords, student accounts, impersonations, layer of security, breaches, IT Department, security risk, login session, cybercriminals, National Cybersecurity Month, malicious email, spear fishing

by Eric Jeffers 0 Comments

Where are we in leading the charge of training the next cybersecurity leaders?

Cyber Range [cy·ber I rānj] -  is a virtual environment used for cyberwarfare training and cybertechnology development. It provides tools that help strengthen the stability, security, and performance of cyber-infrastructures and IT systems used by government and military agencies, and appears on college campuses everywhere.

Continue Reading →

Tags: #cyberattacks, #cybersecurity, Education, higher education, information security, Cyber Security, #defeatcyberattacks, Risk Score, stronger security, healthcare, increase security, security trends, security risk, cybercriminals, cyber aware generation, cyber aware, teach cybersecurity, training, Cyber Range, cybersecurity leaders, Degrees in Cybersecurity, CISSP, GSEC, Certified Ethical Hacker (CEH), National Defense, cyberwarfare, virtual environment, executive cyber management, Asset Protection, CISA, CEH, innovation

Cybersecurity for the Next Generation

As technology continues to advance it is vital for children to understand the potential risks that are out there and how to be cyber aware when online. Children ages 8-18 spend an average of 7 hours and 38 minutes online. During this time, they may be exposed to cyberbullying, cyber predators, and identity theft. In each child there seems to be an inherent trust in the technology that...

Continue Reading →

Tags: Authentication, Authentication Security, #cyberattacks, #cybersecurity, #2FA, #2ndfactor, Cyber Security, hackers, sign on to web applications, password policies, password generator, password habits, challenge questions, impersonations, cybercriminals, enforcing strong passwords, cyber aware generation, changing your password often, cyber aware, cyberbullying, teach cybersecurity, cyber predators, children and technology

by Jay Ouellette 0 Comments

New England School Districts are an Easy Target for Cyber Criminals

Schools are becoming easy targets for cyber criminals, not only in New Hampshire but across the country. Exposing, compromising and exploiting confidential information to make an easy profit or to test their skills. The Cybersecurity incident map, a useful tool created by Doug Levins of EdTech Strategies, LLC., provides an in depth look of past and recent events. (For those who haven’t...

Continue Reading →

Tags: #cyberattacks, #cybersecurity, SSO, User Interface, Access Management, Cyber Security, #defeatcyberattacks, #phishing, SSPR, teachers, Students, Single Sign-On Options, increase security, security trends, secure login, classroom, Portal Customization, empower users, stolen passwords, hackers, scams, university, college, community college, password policies, update your passwords, password habits, secure passwords, student accounts, impersonations, Single Sign Off, breaches, IT Department, security risk, cybercriminals