by Christopher Perry 0 Comments

Ask Christopher: Mitigating the Risk of Phishing Attacks with MFA

 

Hackers are a blight on the digital scenery where we all spend most of our time, and phishing attacks are one of the oldest tricks in the book. Whether it’s at work or home, modern technology has made the digital world all but necessary. In this environment, hackers and malicious users are the banes of each admin and end-user attempting to get things done. Amid the recent pandemic, the leaches...

Continue Reading →

Tags: #cyberattacks, End user experience, #HumanFactor, MFA, Multi-Factor Authentication, #defeatcyberattacks, #phishing, Ask Christopher, security risk, multi-factor, mitigation

by PortalGuard 0 Comments

3 Ways to Help Employees Spot Phishing Attacks

From a data breach investigation of Verizon, roughly one in 10 employees will click on a malicious email.And the average phishing attack costs a mid-sized company $1.6 million.Computer phishing attacks are fraudulent processes where victims are tricked into giving away sensitive user information, potentially putting an entire company at risk.

Continue Reading →

Tags: Authentication, Authentication Security, #cyberattacks, #cybersecurity, Education, email, information security, mobile security, PortalGuard, Cyber Security, #defeatcyberattacks, Password Management, #phishing, password spraying, security trends, hackers, secure passwords, student accounts, impersonations, layer of security, breaches, IT Department, security risk, login session, cybercriminals, National Cybersecurity Month, malicious email, spear fishing

by Nancy Wolff Leary 0 Comments

Strengthening Authentication to Adapt to Changing Circumstances

Are you worried that your current IT projects are overly complicated, haven’t been tested sufficiently or may impact existing applications in a way that you have not considered?

Continue Reading →

Tags: 2FA, Authentication, Authentication Methods, Authentication Security, #breach, Compliance, IT Security, #passwords, #security, #phishing, Two-Factor Authentication, secure passwords

by Abbey Freeman 0 Comments

6 Ways to Prevent Password Hacking | PortalGuard

Hackers are the craftiest of fish. They nibble at your account day by day, trying 2 wrong password attempts and stopping before the 3rd attempt locks your account. Then, they wait a day for you, the user, to log into your account and reset the password tries before they try to log in again. Think about how often you log into your most important accounts. Do you log in every day? Month? Less...

Continue Reading →

Tags: Account Unlock, Centralized Authentication, #forgotpassword, Password, password reset, password strength, Access Control, account management, password best practices, password complexity, password expiration, Password Security, #phishing, Self-Service Password Reset, SSPR, secure login, hackers, login session, password history, SSO reduces login prompts for end-users, Web Authentication, end-users, password requirements, usual password, tailored authentication, hacked, username, Self-Service Account Unlock, wrong passwords, social media, Centralized Self-Service Password Reset

by Eric Jeffers 0 Comments

It took 10 years, but the future has arrived for Multi-Factor Authentication!

The internet is a curious thing. It empowers us by being a gateway to the world's information, increases productivity by enabling us to work anywhere in the world and entertains us by streaming decades' worth of music, movies and television shows with a few clicks. Unfortunately, it also harbors the worst kinds of profit or thrill-seeking miscreants and criminals whether they are working alone...

Continue Reading →

Tags: 2FA, Authentication Security, information security, MFA, Multi-Factor Authentication, network security, #2FA, data breach, #phishing, two-factor, Two-Factor Authentication, #YubiKey, increase security, Google Authenticator, Duo Push Security, secure passwords, FIDO, FIDO Alliance, Biometrics, information systems, voice biometrics, password-based authentication, multilayer encryption, strong online security, technology evolution, improve security, phone call, interoperability, FIDO2, PKI, Public Key Infrastructure, Client-to-Authenticator, CTAP, fingerprint readers, hardware token, passwordless, WebAuthn, Web Authentication, Authenticators

Importance of Third-Party Testing and Verification

All companies that create software necessarily do varying degrees of internal testing. There are numerous types of which can include: unit, system or "end-to-end", regression, performance, load or "stress", accessibility and security. Yes, that is a LOT and it's only a sample! Having a dedicated team of specialists for this purpose is ideal, but anyone that works with the same product daily is...

Continue Reading →

Tags: Press Release, software as a service, Software Security Testing, SSO, Static Binary Analysis, static password, usability, User Experience, Veracode, Application Security Testing, Password Management, #phishing, PortalGuard Configuration, PortalGuard for Education, PortalGuard Update, Service Provider, Single Sign-On (SSO), SSPR, Stand your Ground, tech support, updates, PortalGuard Service Provider, veracode verified, "static" analysis, Spoofing, Probabilistic Techniques, Exploitation of Authentication, Manual Penetration Testing, Dynamic Link Libraries, Abuse of Functionality, Exploitation of Trust, Data Structure Attacks

by Gregg Browinski 0 Comments
by Kody Pinette 0 Comments

Proxy - Is it Confusing, Mysterious, or Essential?

Proxy? Sounds confusing, mysterious, or essential? So what is it and why would you want to use one? A proxy server is a wall that acts as a gateway between you and the internet. Without a secure proxy, your browser communicates directly with the internet. Think of the proxy as a form of protection; it can scan your downloads, filter web content, get around certain web restrictions and allow...

Continue Reading →

Tags: #cyberattacks, #cybersecurity, encryption, End user experience, password strength, #singlesignon, strong password, customer experience, Cyber Security, password encryption, #phishing, SSO Proxy, single logout, stolen passwords, password policies, password length, update your passwords, password habits, secure passwords, password policy best practices, limit minimum password length, password age, PortalGuard Proxy, one click, proxy server