by Abbey Freeman 0 Comments

MFA: Authentication Masterpiece or Endless Frustration?

Artists and tech experts alike should be aware of MFA (multi-factor authentication). Well, the tech experts likely already have an idea of what it is, but what about the artists? You may have multi-factor login turned on for your bank account as a security precaution. After you type in your password, you may also have to type in a code texted to your smartphone. Or, instead of a code, you may...

Continue Reading →

Tags: MFA, Multi-Factor Authentication, two-factor, Two-Factor Authentication, #YubiKey, SMS Text Message Gateway, Duo Push Security, hackers, secure passwords, breaches, Biometrics, Benefits of 2FA, trending cybersecurity attacks, Denial of Service, Account Lockout, ransomware attacks, voice biometrics, Data Structure Attacks, online security, improve security, enable 2fa, stay safe online, security compliance, brute-force attacks

Ask Christopher - Why should I use the SQL Back-End with my PortalGuard implementation?

Knowing where to store user data is tough.  Many variables must be considered before making a final decision, and the choice itself is never easy.  PPortalGuard offers two different options for storing user-specific data: the file system and an SQL backend.  While the initial choice may be daunting, it really is a no-brainer when you think about it.

For many administrators, implementing an...

Continue Reading →

Tags: CAS, PortalGuard, SQL, User Experience, data security, Single Sign-On, Ask Christopher, empower users, CAS SSO, compliances, administrator, online security, improve security, security compliance, SQL Monitoring Utility Tool, user profiles, features, user data, user-specific data, end-users, data compliance, NIST, web-utility, contextual Two-Factor Authentication, load balanced environments, cost-effective, reporting

by Eric Jeffers 0 Comments

Your Online Security is Important - Better Your Digital Profile

Strong online security is the white whale of the digital revolution.  With each step towards the final achievement, development and ingenuity necessitate that the individual takes two steps back.  One step to familiarize oneself with the new technology, and another to determine the best foot forward. It’s an inescapable fact that technology moves faster than most people. 

Rapid evolution isn’t...

Continue Reading →

Tags: 2FA, #applications, authentication security, Identity Provider, MFA, Multi-Factor Authentication, multilayer authentication, technology, usability, data breach, data security, Password Security, Two-Factor Authentication, data quality, security risk, PortalGuard Security Policy, google titan security key, mobile authenticator, trending cybersecurity attacks, information systems, maintain security privacy, maintain data privacy, improve usability and productivity, development server, Admin Privileges, multilayer encryption, strong online security, technology evolution, digital profile, online security, improve security, phone call, second factor