by BIO-key Team 0 Comments

4 Best Password Policy Practices for State and Local Government

Brief Note about Password Policies in State and Local Government

Employees and citizens expect their data and identity to be protected through secure, reliable, and advanced technology when it comes to their interactions with their state and local government. As the novel coronavirus shuts down more offices and pushes more employees to work from home, state and local government need to prioritize...

Continue Reading →

Tags: NIST Updates, password strength, strong password, password complexity, stronger authentication, password policies, password length, passphrase, update your passwords, password patterns, password generator, password habits, secure passwords, layer of security, security risk, login session, cybercriminals, PortalGuard Security Policy, National Cybersecurity Month, password policy best practices, limit minimum password length, regular password changes, minimum length passwords, enforcing strong passwords, password age, password history, reduce reusing weak passwords

by PortalGuard 0 Comments

3 Ways to Help Employees Spot Phishing Attacks

From a data breach investigation of Verizon, roughly one in 10 employees will click on a malicious email.And the average phishing attack costs a mid-sized company $1.6 million.Computer phishing attacks are fraudulent processes where victims are tricked into giving away sensitive user information, potentially putting an entire company at risk.

Continue Reading →

Tags: Authentication, Authentication Security, #cyberattacks, #cybersecurity, Education, email, information security, mobile security, PortalGuard, Cyber Security, #defeatcyberattacks, Password Management, #phishing, password spraying, security trends, hackers, secure passwords, student accounts, impersonations, layer of security, breaches, IT Department, security risk, login session, cybercriminals, National Cybersecurity Month, malicious email, spear fishing

by Nancy Wolff Leary 0 Comments

Strengthening Authentication to Adapt to Changing Circumstances

Are you worried that your current IT projects are overly complicated, haven’t been tested sufficiently or may impact existing applications in a way that you have not considered?

Continue Reading →

Tags: 2FA, Authentication, Authentication Methods, Authentication Security, #breach, Compliance, IT Security, #passwords, #security, #phishing, Two-Factor Authentication, secure passwords

by Abbey Freeman 0 Comments

[DIY] Create a Random Password in 5 Easy Steps!

Let’s give it up for those who want to create a difficult to crack (and remember) password but hesitate to use password generators… fearing their “random password” will be intercepted en route to their screen! Your cynicism is truly admirable. For everyone else vaguely worried about that problem but not enough to do anything about it, this easy step-by-step will guide you through the process...

Continue Reading →

Tags: Password, secure passwords, enforcing strong passwords, reduce reusing weak passwords

by Jay Ouellette 0 Comments

Passwordless Authentication Methods for Account Access

Just a short time ago everyone was starting to talk about passwords diminishing from existence. New forms of proving an individual’s identity are getting better and better each month and the FIDO Alliance deserves all the recognition for making it possible. The FIDO Alliance is focused on making authentication secure for consumers without using common OTP methods. Passwordless authentication...

Continue Reading →

Tags: 2FA, Authentication Security, MFA, Multi-Factor Authentication, #YubiKey, Duo Push Security, password habits, secure passwords, security risk, FIDO, FIDO Alliance, VoiceIt, Biometrics, vendor integrations, Benefits of 2FA, multilayer encryption, fingerprint readers, enable 2fa, security compliance, user profiles, end-users, cost-effective, password requirements, usual password, brute-force attacks, voice recognition, tailored authentication, web-key, bio-key

by Eric Jeffers 0 Comments
by Abbey Freeman 0 Comments

MFA: Authentication Masterpiece or Endless Frustration?

Artists and tech experts alike should be aware of MFA (multi-factor authentication). Well, the tech experts likely already have an idea of what it is, but what about the artists? You may have multi-factor login turned on for your bank account as a security precaution. After you type in your password, you may also have to type in a code texted to your smartphone. Or, instead of a code, you may...

Continue Reading →

Tags: MFA, Multi-Factor Authentication, two-factor, Two-Factor Authentication, #YubiKey, SMS Text Message Gateway, Duo Push Security, hackers, secure passwords, breaches, Biometrics, Benefits of 2FA, trending cybersecurity attacks, Denial of Service, Account Lockout, ransomware attacks, voice biometrics, Data Structure Attacks, online security, improve security, enable 2fa, stay safe online, security compliance, brute-force attacks

The Risks of Incrementing a base Password | PortalGuard

You know when you go to sign up for a new account, and you’re given WAY too many strict password requirements, so you decide “screw this” and make it the same as your usual password? How do you make this new secure password distinctive from your regular password: by adding special characters, numbers, or a combination of both?

Continue Reading →

Tags: #forgotpassword, risk based, hackers, sign on to web applications, password policies, password length, passphrase, update your passwords, password patterns, password generator, password habits, secure passwords, security risk, password history, Keeping your information safe, easily guessed passwords, password requirements, incrementing, base password, usual password

It took 10 years, but the future has arrived for Multi-Factor Authentication!

The internet is a curious thing. It empowers us by being a gateway to the world's information, increases productivity by enabling us to work anywhere in the world and entertains us by streaming decades' worth of music, movies and television shows with a few clicks. Unfortunately, it also harbors the worst kinds of profit or thrill-seeking miscreants and criminals whether they are working alone...

Continue Reading →

Tags: 2FA, Authentication Security, information security, MFA, Multi-Factor Authentication, network security, #2FA, data breach, #phishing, two-factor, Two-Factor Authentication, #YubiKey, increase security, Google Authenticator, Duo Push Security, secure passwords, FIDO, FIDO Alliance, Biometrics, information systems, voice biometrics, password-based authentication, multilayer encryption, strong online security, technology evolution, improve security, phone call, interoperability, FIDO2, PKI, Public Key Infrastructure, Client-to-Authenticator, CTAP, fingerprint readers, hardware token, passwordless, WebAuthn, Web Authentication, Authenticators