by Christopher Perry 0 Comments

Ask Christopher: Mitigating the Risk of Phishing Attacks with MFA

 

Hackers are a blight on the digital scenery where we all spend most of our time, and phishing attacks are one of the oldest tricks in the book. Whether it’s at work or home, modern technology has made the digital world all but necessary. In this environment, hackers and malicious users are the banes of each admin and end-user attempting to get things done. Amid the recent pandemic, the leaches...

Continue Reading →

Tags: #cyberattacks, End user experience, #HumanFactor, MFA, Multi-Factor Authentication, #defeatcyberattacks, #phishing, Ask Christopher, security risk, multi-factor, mitigation

by BIO-key Team 0 Comments

4 Best Password Policy Practices for State and Local Government

Brief Note about Password Policies in State and Local Government

Employees and citizens expect their data and identity to be protected through secure, reliable, and advanced technology when it comes to their interactions with their state and local government. As the novel coronavirus shuts down more offices and pushes more employees to work from home, state and local government need to prioritize...

Continue Reading →

Tags: NIST Updates, password strength, strong password, password complexity, stronger authentication, password policies, password length, passphrase, update your passwords, password patterns, password generator, password habits, secure passwords, layer of security, security risk, login session, cybercriminals, PortalGuard Security Policy, National Cybersecurity Month, password policy best practices, limit minimum password length, regular password changes, minimum length passwords, enforcing strong passwords, password age, password history, reduce reusing weak passwords

by PortalGuard 0 Comments

3 Ways to Help Employees Spot Phishing Attacks

From a data breach investigation of Verizon, roughly one in 10 employees will click on a malicious email.And the average phishing attack costs a mid-sized company $1.6 million.Computer phishing attacks are fraudulent processes where victims are tricked into giving away sensitive user information, potentially putting an entire company at risk.

Continue Reading →

Tags: Authentication, Authentication Security, #cyberattacks, #cybersecurity, Education, email, information security, mobile security, PortalGuard, Cyber Security, #defeatcyberattacks, Password Management, #phishing, password spraying, security trends, hackers, secure passwords, student accounts, impersonations, layer of security, breaches, IT Department, security risk, login session, cybercriminals, National Cybersecurity Month, malicious email, spear fishing

by Jay Ouellette 0 Comments

Passwordless Authentication Methods for Account Access

Just a short time ago everyone was starting to talk about passwords diminishing from existence. New forms of proving an individual’s identity are getting better and better each month and the FIDO Alliance deserves all the recognition for making it possible. The FIDO Alliance is focused on making authentication secure for consumers without using common OTP methods. Passwordless authentication...

Continue Reading →

Tags: 2FA, Authentication Security, MFA, Multi-Factor Authentication, #YubiKey, Duo Push Security, password habits, secure passwords, security risk, FIDO, FIDO Alliance, VoiceIt, Biometrics, vendor integrations, Benefits of 2FA, multilayer encryption, fingerprint readers, enable 2fa, security compliance, user profiles, end-users, cost-effective, password requirements, usual password, brute-force attacks, voice recognition, tailored authentication, web-key, bio-key

PortalGuard's Latest in Feature Updates - Summer 2019

There is never a shortage of feature and enhancement requests from our customer base. These have been critical to ensuring PortalGuard's relevance in the authentication space so keep them coming! Features that make it into PortalGuard are either directly funded by a customer through our Tailored Authentication program or they are requested by multiple customers. For the latter case, these...

Continue Reading →

Tags: Authentication Security, End user experience, MFA, Multi-Factor Authentication, PortalGuard, Access Control, Access Management, Active Directory, PortalGuard Configuration, PortalGuard for Education, PortalGuard Update, SOL-based directory, two-factor, Two-Factor Authentication, secure login, security risk, login session, mobile authentication, Biometrics, front-end login, voice biometrics, domain policy, fingerprint readers, enable 2fa, security compliance, features, voice recognition, tailored authentication, automatic delivery fallback/failover, web-key, bio-key

The Risks of Incrementing a base Password | PortalGuard

You know when you go to sign up for a new account, and you’re given WAY too many strict password requirements, so you decide “screw this” and make it the same as your usual password? How do you make this new secure password distinctive from your regular password: by adding special characters, numbers, or a combination of both?

Continue Reading →

Tags: #forgotpassword, risk based, hackers, sign on to web applications, password policies, password length, passphrase, update your passwords, password patterns, password generator, password habits, secure passwords, security risk, password history, Keeping your information safe, easily guessed passwords, password requirements, incrementing, base password, usual password

by Eric Jeffers 0 Comments

Your Online Security is Important - Better Your Digital Profile

Strong online security is the white whale of the digital revolution.  With each step towards the final achievement, development and ingenuity necessitate that the individual takes two steps back.  One step to familiarize oneself with the new technology, and another to determine the best foot forward. It’s an inescapable fact that technology moves faster than most people. 

Rapid evolution isn’t...

Continue Reading →

Tags: 2FA, #applications, authentication security, Identity Provider, MFA, Multi-Factor Authentication, multilayer authentication, technology, usability, data breach, data security, Password Security, Two-Factor Authentication, data quality, security risk, PortalGuard Security Policy, google titan security key, mobile authenticator, trending cybersecurity attacks, information systems, maintain security privacy, maintain data privacy, improve usability and productivity, development server, Admin Privileges, multilayer encryption, strong online security, technology evolution, digital profile, online security, improve security, phone call, second factor

by Eric Jeffers 0 Comments

How Employee Turnover Could be a Problem for your IT Department and Put your Company at Risk

In 2018 the leading sector with the highest employee turnover was once again the technology industry at 13.2%. This was followed by Government, Education, and non-profit at 11.7%. However, employee turnover is not just an HR issue. According to a study by the American Bar Association, American businesses lose an estimated $59 billion a year due to the loss of intellectual property. Current...

Continue Reading →

Tags: Access Point, Single Sign-On, Single Sign-On (SSO), Single Sign-On Options, update your passwords, secure passwords, IT Department Best Practices, Single Sign Off, IT Department, security risk, cybersecurity leaders, IT Professionals, essential cybersecurity, IT Management, web-based SSO, maintain security privacy, maintain data privacy, Employee, SSO reduces login prompts for end-users, IdP Options, SSO Process, secure SSO, employee turnover