by BIO-key Team 0 Comments

4 Best Password Policy Practices for State and Local Government

Brief Note about Password Policies in State and Local Government

Employees and citizens expect their data and identity to be protected through secure, reliable, and advanced technology when it comes to their interactions with their state and local government. As the novel coronavirus shuts down more offices and pushes more employees to work from home, state and local government need to prioritize...

Continue Reading →

Tags: NIST Updates, password strength, strong password, password complexity, stronger authentication, password policies, password length, passphrase, update your passwords, password patterns, password generator, password habits, secure passwords, layer of security, security risk, login session, cybercriminals, PortalGuard Security Policy, National Cybersecurity Month, password policy best practices, limit minimum password length, regular password changes, minimum length passwords, enforcing strong passwords, password age, password history, reduce reusing weak passwords

by Christopher Perry 0 Comments

Prophecy Vs. Reality: Popular Cybersecurity Trends of 2019

Society loves prophecy.  Whether it’s used as a justification for acts of good or evil, or even if it’s just a matter of looking at your friend and saying “HA!  I was right!”  Correctly predicting what’s coming is a safe bet in terms of drawing interest, and it is a small wonder that even the biggest tech giants have hopped on that bandwagon.  Of course, prophecy and reality often differ, and...

Continue Reading →

Tags: 2FA, Authentication, authentication management, Authentication Security, authentication security, cloud, Cloud SaaS, cloud security, #cybersecurity, encryption, Gartner, Identity Provider, MFA, Multi-Factor Authentication, #passwords, #ssoimplementations, trust, Authentication Provider, Cloud authenticaiton, Cloud Authentication, data breach, data security, password encryption, two-factor, Two-Factor Authentication, #twofactor, security trends, password habits, secure acounts, password-based authentication, passwordless, Keeping your information safe, NIST, contextual Two-Factor Authentication, usual password, Google, identity solutions, open-source software, haveibeenpwned.com, two-step authentication, two-step verification, real-time monitoring

by Jay Ouellette 0 Comments

Passwordless Authentication Methods for Account Access

Just a short time ago everyone was starting to talk about passwords diminishing from existence. New forms of proving an individual’s identity are getting better and better each month and the FIDO Alliance deserves all the recognition for making it possible. The FIDO Alliance is focused on making authentication secure for consumers without using common OTP methods. Passwordless authentication...

Continue Reading →

Tags: 2FA, Authentication Security, MFA, Multi-Factor Authentication, #YubiKey, Duo Push Security, password habits, secure passwords, security risk, FIDO, FIDO Alliance, VoiceIt, Biometrics, vendor integrations, Benefits of 2FA, multilayer encryption, fingerprint readers, enable 2fa, security compliance, user profiles, end-users, cost-effective, password requirements, usual password, brute-force attacks, voice recognition, tailored authentication, web-key, bio-key

by Eric Jeffers 0 Comments

The Risks of Incrementing a base Password | PortalGuard

You know when you go to sign up for a new account, and you’re given WAY too many strict password requirements, so you decide “screw this” and make it the same as your usual password? How do you make this new secure password distinctive from your regular password: by adding special characters, numbers, or a combination of both?

Continue Reading →

Tags: #forgotpassword, risk based, hackers, sign on to web applications, password policies, password length, passphrase, update your passwords, password patterns, password generator, password habits, secure passwords, security risk, password history, Keeping your information safe, easily guessed passwords, password requirements, incrementing, base password, usual password

by Eric Jeffers 0 Comments
by Kody Pinette 0 Comments

What's New in PortalGuard Version 6.2?

Here at PortalGuard your security is our main concern. We are always trying new things to keep you secure, but also make your life a little bit easier. In v6.2 we have widened the range of applications you can gain access to through Single Sign-On (SSO). Open Authentication 2.0 (OAuth 2.0) adds yet another way you can safely gain access to applications. OpenID Connect v1.0 (OIDC v1.0) adds the...

Continue Reading →

Tags: SAML Token, #securauth, SSO, usability, User Experience, Veracode, reCAPTCHA, SAML, secure authentication, Single Sign-On, Single Sign-On (SSO), #singlesign-on, Two-Factor Authentication, updates, #userauthentication, #userconvenience, #userexperience, web applications, SSO Proxy, IP blocking, Students, Single Sign-On Options, single logout, increase security, universal logout, SAML SLO, SAML Single Logout, security trends, secure login, upgrades, OTP Methods, empower users, sign on to web applications, password habits, IT Department, Standards, mobile authenticator, accessibility, OAuth 2.0, OpenID Connect, PortalGuard v6.2, Modern SSO Protocols, OIDC v1.0, OpenID Foundation, SSO Support Protocols, cyberwarfare, newest version, why upgrade, Ransomware, trending cybersecurity attacks, unlocking accounts, IP Lockout, Denial of Service, Account Lockout, account lockout protections, CAPTCHA, image-based captcha, ransomware attacks, essential cybersecurity, IT Management, web-based SSO, maintain security privacy, maintain data privacy, Employee

by Kody Pinette 0 Comments

Proxy - Is it Confusing, Mysterious, or Essential?

Proxy? Sounds confusing, mysterious, or essential? So what is it and why would you want to use one? A proxy server is a wall that acts as a gateway between you and the internet. Without a secure proxy, your browser communicates directly with the internet. Think of the proxy as a form of protection; it can scan your downloads, filter web content, get around certain web restrictions and allow...

Continue Reading →

Tags: #cyberattacks, #cybersecurity, encryption, End user experience, password strength, #singlesignon, strong password, customer experience, Cyber Security, password encryption, #phishing, SSO Proxy, single logout, stolen passwords, password policies, password length, update your passwords, password habits, secure passwords, password policy best practices, limit minimum password length, password age, PortalGuard Proxy, one click, proxy server

Cybersecurity for the Next Generation

As technology continues to advance it is vital for children to understand the potential risks that are out there and how to be cyber aware when online. Children ages 8-18 spend an average of 7 hours and 38 minutes online. During this time, they may be exposed to cyberbullying, cyber predators, and identity theft. In each child there seems to be an inherent trust in the technology that...

Continue Reading →

Tags: Authentication, Authentication Security, #cyberattacks, #cybersecurity, #2FA, #2ndfactor, Cyber Security, hackers, sign on to web applications, password policies, password generator, password habits, challenge questions, impersonations, cybercriminals, enforcing strong passwords, cyber aware generation, changing your password often, cyber aware, cyberbullying, teach cybersecurity, cyber predators, children and technology