by Christopher Perry 0 Comments

3 Multi-factor Authentication Best Practices Every Bank Should Have

With the coronavirus pandemic (COVID-19), there has been a 238% surge in cyberattacks against banks and financial institutions. Throughout the year, many financial services organizations have been exposed due to a poor cybersecurity infrastructure, and as many cybercriminals are getting more innovative in their cyberattack methods (cloud hijacking, AI machine manipulation, etc.), the financial...

Continue Reading →

Tags: Authentication Methods, End user experience, information security, IT Security, MFA, Single Sign-On, Two-Factor Authentication

by PortalGuard 0 Comments

3 Ways to Help Employees Spot Phishing Attacks

From a data breach investigation of Verizon, roughly one in 10 employees will click on a malicious email.And the average phishing attack costs a mid-sized company $1.6 million.Phishing attacks are fraudulent process where victims are tricked into giving away sensitive user information, potentially putting an entire company at risk.

Continue Reading →

Tags: Authentication, Authentication Security, #cyberattacks, #cybersecurity, Education, email, information security, mobile security, PortalGuard, Cyber Security, #defeatcyberattacks, Password Management, #phishing, password spraying, security trends, hackers, secure passwords, student accounts, impersonations, layer of security, breaches, IT Department, security risk, login session, cybercriminals, National Cybersecurity Month, malicious email, spear fishing

It took 10 years, but the future has arrived for Multi-Factor Authentication!

The internet is a curious thing. It empowers us by being a gateway to the world's information, increases productivity by enabling us to work anywhere in the world and entertains us by streaming decades' worth of music, movies and television shows with a few clicks. Unfortunately, it also harbors the worst kinds of profit or thrill-seeking miscreants and criminals whether they are working alone...

Continue Reading →

Tags: 2FA, Authentication Security, information security, MFA, Multi-Factor Authentication, network security, #2FA, data breach, #phishing, two-factor, Two-Factor Authentication, #YubiKey, increase security, Google Authenticator, Duo Push Security, secure passwords, FIDO, FIDO Alliance, Biometrics, information systems, voice biometrics, password-based authentication, multilayer encryption, strong online security, technology evolution, improve security, phone call, interoperability, FIDO2, PKI, Public Key Infrastructure, Client-to-Authenticator, CTAP, fingerprint readers, hardware token, passwordless, WebAuthn, Web Authentication, Authenticators

by Eric Jeffers 0 Comments

Maintaining Security and Data Privacy is one of the Biggest IT Challenges Today

Every year at the EDUCAUSE Conference the Top 10 IT Issues for the upcoming year are announced. Leading up to each conference a panel of experts ranging from IT leaders, CIO’s and faculty members present a list of the top IT trends. which are then voted on by EDUCAUSE members. The top initiatives are the most important topics and trends and will be a focus for the upcoming year. This year was...

Continue Reading →

Tags: 2FA, Access Client, Account Unlock, attack surface reduction, Authentication, authentication management, Authentication Methods, Authentication Security, authentication security, #breach, checklist, Compliance, #cyberattacks, #cybersecurity, Education, Education Portals, email, encryption, End user experience, expiration, help desk calls, higher education, #HIPAA, I.T. Solutions, Identity Federation, identity management, Increase ROI, increased usability, information security, #infosec, Integration, IT Security, it security, #ITSecurity, K-12, login security, MFA, Multi-Factor Authentication, National Institute of Standards and Technology, network security, password reset, security questions, Access Control, Access Management, Access Point, account management, Active Directory, Application Security Testing, Authentication Provider, #breachnews, customer experience, Cyber Security, data breach, data security, Easy to Maintain Solutions, OTP, password alternatives, password encryption, Self-Service Password Reset, Single Sign-On, Two-Factor Authentication, healthcare, Students, single logout, increase security, EDUCAUSE, budgeting for education, student accounts, maintain security privacy, maintain data privacy

by Eric Jeffers 0 Comments

Where are we in leading the charge of training the next cybersecurity leaders?

Cyber Range [cy·ber I rānj] -  is a virtual environment used for cyberwarfare training and cybertechnology development. It provides tools that help strengthen the stability, security, and performance of cyber-infrastructures and IT systems used by government and military agencies, and appears on college campuses everywhere.

Continue Reading →

Tags: #cyberattacks, #cybersecurity, Education, higher education, information security, Cyber Security, #defeatcyberattacks, Risk Score, stronger security, healthcare, increase security, security trends, security risk, cybercriminals, cyber aware generation, cyber aware, teach cybersecurity, training, Cyber Range, cybersecurity leaders, Degrees in Cybersecurity, CISSP, GSEC, Certified Ethical Hacker (CEH), National Defense, cyberwarfare, virtual environment, executive cyber management, Asset Protection, CISA, CEH, innovation

by Rob K 0 Comments

Getting Away from Your Homegrown Environment

 

From the moment the doors first opened and continuing through today, many organizations and institutions have been creating and developing their IT systems and departments continuously. Through the years, changes in IT range from new technologies to new positions and/or employees. This in turn, makes it very difficult to ensure the entire department is on the same current technical page....

Continue Reading →

Tags: Authentication, Authentication Security, best practices, #bestpractices, #cybersecurity, information security, IT Security, PortalGuard, SSO, Uncategorized, User Experience, #2FA, data security, Password Management, Password Security, SAML, Self-Service Password Recovery, Self-Service Password Reset, Single Sign-On, Single Sign-On (SSO), #singlesign-on, SSPR, Two-Factor Authentication, User Authentication

by Rob K 0 Comments

Cyber Security Breaches at Higher Education Institutions

There’s been a concerning trend over the last few years in the higher education field. No, not the sky-high tuition aimed to keep you in debt. Today we’re talking about cyber security breaches aimed at higher education institutions, students and faculty members.

Continue Reading →

Tags: best practices, Industry Updates, information security, IT Security, #ITSecurity, PortalGuard, SSO, Uncategorized, #2FA, Password Management, Password Security, PortalGuard for Education, Single Sign-On (SSO), stronger authentication, Two-Factor Authentication

Why is it important to conform to the WCAG 2.0 Guidelines?

Navigating in the Dark

You’ve been working hard today. Time to take a break, open a new browser tab on your workstation and visit your favorite website. Maybe it’s Facebook or ESPN or a news site. Just after entering the web address, close your eyes and keep them closed. How successful would you be navigating the site? Out of habit, your hand is probably on your mouse or trackpad. Well,...

Continue Reading →

Tags: 2FA, Authentication, #bestpractices, identity management, Industry Updates, information security, IT Security, Level AA, #passwordmanagement, PortalGuard, Product Updates, Uncategorized, WCAG 2.0, data security, Password Management, Password Security, Two-Factor Authentication, User Authentication, WCAG 2.0 Guidelines