by Christopher Perry 0 Comments

Prophecy Vs. Reality: Popular Cybersecurity Trends of 2019

Society loves prophecy.  Whether it’s used as a justification for acts of good or evil, or even if it’s just a matter of looking at your friend and saying “HA!  I was right!”  Correctly predicting what’s coming is a safe bet in terms of drawing interest, and it is a small wonder that even the biggest tech giants have hopped on that bandwagon.  Of course, prophecy and reality often differ, and...

Continue Reading →

Tags: 2FA, Authentication, authentication management, Authentication Security, authentication security, cloud, Cloud SaaS, cloud security, #cybersecurity, encryption, Gartner, Identity Provider, MFA, Multi-Factor Authentication, #passwords, #ssoimplementations, trust, Authentication Provider, Cloud authenticaiton, Cloud Authentication, data breach, data security, password encryption, two-factor, Two-Factor Authentication, #twofactor, security trends, password habits, secure acounts, password-based authentication, passwordless, Keeping your information safe, NIST, contextual Two-Factor Authentication, usual password, Google, identity solutions, open-source software, haveibeenpwned.com, two-step authentication, two-step verification, real-time monitoring

by Abbey Freeman 0 Comments

Sing a Song of Passwords

The voice. It allows us to communicate with each other, to share emotions through laughter, sobs, and songs. It can now also let us access our accounts. With multi-factor authentication enabled on certain accounts, we can use our voices as a second form of credential. In addition to our password which isn’t a reliable security credential, our voice is a lot more reliable. Only you can produce...

Continue Reading →

Tags: 2FA, Authentication, Authentication Security, MFA, Multi-Factor Authentication, Password, two-factor, Two-Factor Authentication, VoiceIt, Biometrics, voice biometrics, enable 2fa, voice recognition

by Abbey Freeman 0 Comments

MFA: Authentication Masterpiece or Endless Frustration?

Artists and tech experts alike should be aware of MFA (multi-factor authentication). Well, the tech experts likely already have an idea of what it is, but what about the artists? You may have multi-factor login turned on for your bank account as a security precaution. After you type in your password, you may also have to type in a code texted to your smartphone. Or, instead of a code, you may...

Continue Reading →

Tags: MFA, Multi-Factor Authentication, two-factor, Two-Factor Authentication, #YubiKey, SMS Text Message Gateway, Duo Push Security, hackers, secure passwords, breaches, Biometrics, Benefits of 2FA, trending cybersecurity attacks, Denial of Service, Account Lockout, ransomware attacks, voice biometrics, Data Structure Attacks, online security, improve security, enable 2fa, stay safe online, security compliance, brute-force attacks

PortalGuard's Latest in Feature Updates - Summer 2019

There is never a shortage of feature and enhancement requests from our customer base. These have been critical to ensuring PortalGuard's relevance in the authentication space so keep them coming! Features that make it into PortalGuard are either directly funded by a customer through our Tailored Authentication program or they are requested by multiple customers. For the latter case, these...

Continue Reading →

Tags: Authentication Security, End user experience, MFA, Multi-Factor Authentication, PortalGuard, Access Control, Access Management, Active Directory, PortalGuard Configuration, PortalGuard for Education, PortalGuard Update, SOL-based directory, two-factor, Two-Factor Authentication, secure login, security risk, login session, mobile authentication, Biometrics, front-end login, voice biometrics, domain policy, fingerprint readers, enable 2fa, security compliance, features, voice recognition, tailored authentication, automatic delivery fallback/failover, web-key, bio-key

It took 10 years, but the future has arrived for Multi-Factor Authentication!

The internet is a curious thing. It empowers us by being a gateway to the world's information, increases productivity by enabling us to work anywhere in the world and entertains us by streaming decades' worth of music, movies and television shows with a few clicks. Unfortunately, it also harbors the worst kinds of profit or thrill-seeking miscreants and criminals whether they are working alone...

Continue Reading →

Tags: 2FA, Authentication Security, information security, MFA, Multi-Factor Authentication, network security, #2FA, data breach, #phishing, two-factor, Two-Factor Authentication, #YubiKey, increase security, Google Authenticator, Duo Push Security, secure passwords, FIDO, FIDO Alliance, Biometrics, information systems, voice biometrics, password-based authentication, multilayer encryption, strong online security, technology evolution, improve security, phone call, interoperability, FIDO2, PKI, Public Key Infrastructure, Client-to-Authenticator, CTAP, fingerprint readers, hardware token, passwordless, WebAuthn, Web Authentication, Authenticators

The Benefits of Two-Factor for Your Offline Desktop

Why Require Two Factor for Windows Logons?

PortalGuard has offered two-factor authentication for Windows workstations and servers as part of its PortalGuard Desktop offering since 2013. As with all multi-factor initiatives, the primary use case is to increase security. As an example, multiple customers have installed the PortalGuard Desktop 2FA on Windows servers in their environment. If a ...

Continue Reading →

Tags: 2FA, #2FASolutions, MFA, Microsoft Active Directory, Multi-Factor Authentication, PortalGuard, #2FA, #One-time password, two-factor, Two-Factor Authentication, Windows 10, #YubiKey, increase security, off network access, Duo Push Security, mobile authenticator, Benefits of 2FA, maintain security privacy, server-to-server communication, PortalGuard Service Provider, improve security, desktop 2FA, credential provider, HTTPS requests, Installation Requirements, offline, offline desktop 2fa, domain policy, modifying

by Christopher Perry 0 Comments

What to do When You Don't Always Need Two-Factor Authentication

 

Two-Factor Authentication (2FA) is an important topic of discussion where security is of concern. Too many data breaches have occurred over the last 10 years purely because of lackadaisical security requirements. Many of these events would have been avoided with a proper Two-Factor Authentication system in place.  Security: personal, private, corporate – the list goes on and on. Each entry a...

Continue Reading →

Tags: 2FA, #2FASolutions, contextual authentication, #contextualauthentication, #passwordmanagement, #security, security questions, #securityandusability, #selfservice, usability, User Experience, #2FA, #2ndfactor, Access Control, Access Management, account management, Password Synchronization, secure authentication, two-factor, Two-Factor Authentication, security trends, geolocation, layer of security, mobile authentication, mobile authenticator, Benefits of 2FA, one click, when you don't need 2FA

by Jay Ouellette 0 Comments
by Gregg Browinski 0 Comments