Imagine this ... A line of students outside the helpdesk office waiting on a password reset. Or hundreds of faculty and staff attaching sticky notes with written passwords to their computer screens. Not to mention frustrating connectivity outages resulting from required database maintenance.Continue Reading →
Artists and tech experts alike should be aware of MFA (multi-factor authentication). Well, the tech experts likely already have an idea of what it is, but what about the artists? You may have multi-factor login turned on for your bank account as a security precaution. After you type in your password, you may also have to type in a code texted to your smartphone. Or, instead of a code, you may...Continue Reading →
Tags: MFA, Multi-Factor Authentication, two-factor, Two-Factor Authentication, #YubiKey, SMS Text Message Gateway, Duo Push Security, hackers, secure passwords, breaches, Biometrics, Benefits of 2FA, trending cybersecurity attacks, Denial of Service, Account Lockout, ransomware attacks, voice biometrics, Data Structure Attacks, online security, improve security, enable 2fa, stay safe online, security compliance, brute-force attacks
Knowing where to store user data is tough. Many variables must be considered before making a final decision, and the choice itself is never easy. PPortalGuard offers two different options for storing user-specific data: the file system and an SQL backend. While the initial choice may be daunting, it really is a no-brainer when you think about it.
For many administrators, implementing an...Continue Reading →
Tags: CAS, PortalGuard, SQL, User Experience, data security, Single Sign-On, Ask Christopher, empower users, CAS SSO, compliances, administrator, online security, improve security, security compliance, SQL Monitoring Utility Tool, user profiles, features, user data, user-specific data, end-users, data compliance, NIST, web-utility, contextual Two-Factor Authentication, load balanced environments, cost-effective, reporting
Ahhh, summer! As we flip the calendar to July and another school year winds down it is a perfect time to close one chapter and begin planning for the upcoming year. As teachers and students head to the beaches and summer camps, IT managers will be hard at work planning and implementing new technologies for the next school year. K-12 IT leaders are tasked with the mission to equip our children...Continue Reading →
Tags: K-12, Multi-Factor Authentication, Self-Service Password Reset, Single Sign-On (SSO), teachers, classroom, password policies, password length, update your passwords, password generator, password habits, breaches, security risk, cyber aware generation, changing your password often, cyber aware, teach cybersecurity, Ransomware, trending cybersecurity attacks, Denial of Service, Account Lockout, account lockout protections, IT Professionals, IT Management, compliances, creating a budget, updating technology, budget process, IT spending, budget fundamentals, software, administrator, funding, malware, unauthorized applications, technology evolution, digital profile, online security, improve security, accessing data, internet access, stay safe online, user profiles, user data, end-users, data compliance, cost-effective
My recent travels abroad have made me think about how I keep my information safe while I am in a new country. As I was packing my carry-on with snacks, spare toiletries (in case we were stranded), external battery packs (to binge the latest on Netflix), and the multitude of chargers that accompany our tablets and phones, I hesitated. How am I going to protect the information on all of my...Continue Reading →
Tags: 2FA, #cybersecurity, email, information security, #infosec, MFA, Microsoft, Multi-Factor Authentication, password strength, data security, password alternatives, Password Management, password quality, Password Security, two-factor, Two-Factor Authentication, Google Authenticator, passphrase, enforcing strong passwords, reduce reusing weak passwords, Benefits of 2FA, employee turnover, secure acounts, compliances, strong online security, online security, improve security, free wifi, accessing data, enable 2fa, Keeping your information safe, security applications, beware of free wifi, personal data, personal security, internet access, stay safe online, work applications, security compliance
The internet is a curious thing. It empowers us by being a gateway to the world's information, increases productivity by enabling us to work anywhere in the world and entertains us by streaming decades' worth of music, movies and television shows with a few clicks. Unfortunately, it also harbors the worst kinds of profit or thrill-seeking miscreants and criminals whether they are working alone...Continue Reading →
Tags: 2FA, Authentication Security, information security, MFA, Multi-Factor Authentication, network security, #2FA, data breach, #phishing, two-factor, Two-Factor Authentication, #YubiKey, increase security, Google Authenticator, Duo Push Security, secure passwords, FIDO, FIDO Alliance, Biometrics, information systems, voice biometrics, password-based authentication, multilayer encryption, strong online security, technology evolution, improve security, phone call, interoperability, FIDO2, PKI, Public Key Infrastructure, Client-to-Authenticator, CTAP, fingerprint readers, hardware token, passwordless, WebAuthn, Web Authentication, Authenticators
Why Require Two Factor for Windows Logons?
PortalGuard has offered two-factor authentication for Windows workstations and servers as part of its PortalGuard Desktop offering since 2013. As with all multi-factor initiatives, the primary use case is to increase security. As an example, multiple customers have installed the PortalGuard Desktop 2FA on Windows servers in their environment. If a ...Continue Reading →
Tags: 2FA, #2FASolutions, MFA, Microsoft Active Directory, Multi-Factor Authentication, PortalGuard, #2FA, #One-time password, two-factor, Two-Factor Authentication, Windows 10, #YubiKey, increase security, off network access, Duo Push Security, mobile authenticator, Benefits of 2FA, maintain security privacy, server-to-server communication, PortalGuard Service Provider, improve security, desktop 2FA, credential provider, HTTPS requests, Installation Requirements, offline, offline desktop 2fa, domain policy, modifying
Strong online security is the white whale of the digital revolution. With each step towards the final achievement, development and ingenuity necessitate that the individual takes two steps back. One step to familiarize oneself with the new technology, and another to determine the best foot forward. It’s an inescapable fact that technology moves faster than most people.
Rapid evolution isn’t...Continue Reading →
Tags: 2FA, #applications, authentication security, Identity Provider, MFA, Multi-Factor Authentication, multilayer authentication, technology, usability, data breach, data security, Password Security, Two-Factor Authentication, data quality, security risk, PortalGuard Security Policy, google titan security key, mobile authenticator, trending cybersecurity attacks, information systems, maintain security privacy, maintain data privacy, improve usability and productivity, development server, Admin Privileges, multilayer encryption, strong online security, technology evolution, digital profile, online security, improve security, phone call, second factor