by Abbey Freeman 0 Comments

6 Ways to Prevent Password Hacking | PortalGuard

Hackers are the craftiest of fish. They nibble at your account day by day, trying 2 wrong password attempts and stopping before the 3rd attempt locks your account. Then, they wait a day for you, the user, to log into your account and reset the password tries before they try to log in again. Think about how often you log into your most important accounts. Do you log in every day? Month? Less...

Continue Reading →

Tags: Account Unlock, Centralized Authentication, #forgotpassword, Password, password reset, password strength, Access Control, account management, password best practices, password complexity, password expiration, Password Security, #phishing, Self-Service Password Reset, SSPR, secure login, hackers, login session, password history, SSO reduces login prompts for end-users, Web Authentication, end-users, password requirements, usual password, tailored authentication, hacked, username, Self-Service Account Unlock, wrong passwords, social media, Centralized Self-Service Password Reset

It took 10 years, but the future has arrived for Multi-Factor Authentication!

The internet is a curious thing. It empowers us by being a gateway to the world's information, increases productivity by enabling us to work anywhere in the world and entertains us by streaming decades' worth of music, movies and television shows with a few clicks. Unfortunately, it also harbors the worst kinds of profit or thrill-seeking miscreants and criminals whether they are working alone...

Continue Reading →

Tags: 2FA, Authentication Security, information security, MFA, Multi-Factor Authentication, network security, #2FA, data breach, #phishing, two-factor, Two-Factor Authentication, #YubiKey, increase security, Google Authenticator, Duo Push Security, secure passwords, FIDO, FIDO Alliance, Biometrics, information systems, voice biometrics, password-based authentication, multilayer encryption, strong online security, technology evolution, improve security, phone call, interoperability, FIDO2, PKI, Public Key Infrastructure, Client-to-Authenticator, CTAP, fingerprint readers, hardware token, passwordless, WebAuthn, Web Authentication, Authenticators