by PortalGuard 0 Comments

3 Ways to Help Employees Spot Phishing Attacks

From a data breach investigation of Verizon, roughly one in 10 employees will click on a malicious email.And the average phishing attack costs a mid-sized company $1.6 million.Phishing attacks are fraudulent process where victims are tricked into giving away sensitive user information, potentially putting an entire company at risk.

Continue Reading →

Tags: Authentication, Authentication Security, #cyberattacks, #cybersecurity, Education, email, information security, mobile security, PortalGuard, Cyber Security, #defeatcyberattacks, Password Management, #phishing, password spraying, security trends, hackers, secure passwords, student accounts, impersonations, layer of security, breaches, IT Department, security risk, login session, cybercriminals, National Cybersecurity Month, malicious email, spear fishing

by Christopher Perry 0 Comments

Sharepoint Password Expiration Example: Poor UI

 

SharePoint password expiration: that alone is often enough to make chills run down the back of a typical IT administrator. Regardless of the environment, SharePoint remains a popular choice for many organizations. Reasons vary, of course, but the fact remains that SharePoint shows up just about everywhere, even today. That’s not to say that everything with SharePoint is perfect: simply do a...

Continue Reading →

Tags: Authentication Methods, Identity Provider, User Experience, password expiration, Password Management, #SharePoint, User Authentication

by Nancy Wolff Leary 0 Comments

How PortalGuard Strengthened Security and Increased Usability for Delaware County Community College

Imagine this ... A line of students outside the helpdesk office waiting on a password reset. Or hundreds of faculty and staff attaching sticky notes with written passwords to their computer screens. Not to mention frustrating connectivity outages resulting from required database maintenance.

Continue Reading →

Tags: 2FA, usability, #2FA, Password Management, SSPR, Two-Factor Authentication, flexibility, improve security

by Eric Jeffers 0 Comments

You're Not as Unique as You Think You Are!

All I’d need to know to guess one of your end users’ passwords is the name of every person important to them, how frequently they use profanity, their favorite pop culture franchises, any sports teams they like, and their favorite vehicle. Where did I get this information, you ask? It’s a trend I’ve noticed on the list of top 10,000 most easily guessed passwords. More specifically, the top 200...

Continue Reading →

Tags: Authentication Security, End user experience, MFA, Multi-Factor Authentication, multilayer authentication, Password, password fatigue, password reset, password strength, data breach, password alternatives, password best practices, password complexity, password encryption, password expiration, Password Management, password manager, password quality, Password Security, Password Synchronization, passphrase, regular password changes, changing your password often, easily guessed passwords, trochees

Importance of Third-Party Testing and Verification

All companies that create software necessarily do varying degrees of internal testing. There are numerous types of which can include: unit, system or "end-to-end", regression, performance, load or "stress", accessibility and security. Yes, that is a LOT and it's only a sample! Having a dedicated team of specialists for this purpose is ideal, but anyone that works with the same product daily is...

Continue Reading →

Tags: Press Release, software as a service, Software Security Testing, SSO, Static Binary Analysis, static password, usability, User Experience, Veracode, Application Security Testing, Password Management, #phishing, PortalGuard Configuration, PortalGuard for Education, PortalGuard Update, Service Provider, Single Sign-On (SSO), SSPR, Stand your Ground, tech support, updates, PortalGuard Service Provider, veracode verified, "static" analysis, Spoofing, Probabilistic Techniques, Exploitation of Authentication, Manual Penetration Testing, Dynamic Link Libraries, Abuse of Functionality, Exploitation of Trust, Data Structure Attacks

by Jay Ouellette 0 Comments
by Jay Ouellette 0 Comments