by Gregg Browinski 0 Comments
by Christopher Perry 0 Comments

Ask Christopher - "Should I Upgrade?"

Upgrading is always a top priority in the software industry.  Keeping vital software running smoothly and without issues is imperative to any industry with a digital presence.   With an authentication package like PortalGuard, up-to-date software also brings along new features and fixes for existing bugs or hiccups discovered along the way.  With that in mind, I am not surprised at the most...

Continue Reading →

Tags: #cybersecurity, cybersecurity leaders, Cyber Security, newest version, why upgrade, upgrades, PortalGuard Proxy, PortalGuard v6.2, PortalGuard Security Policy, PortalGuard Authentication Provider, 2FA, MFA, Modern SSO Protocols, Access Control, Access Management, Access Point, account management, Authentication, Authentication Security, Authentication Provider, authentication security, Authentication Methods, Centralized Authentication, tech support

by Eric Jeffers 0 Comments

Where are we in leading the charge of training the next cybersecurity leaders?

Cyber Range [cy·ber I rānj] -  is a virtual environment used for cyberwarfare training and cybertechnology development. It provides tools that help strengthen the stability, security, and performance of cyber-infrastructures and IT systems used by government and military agencies, and appears on college campuses everywhere.

Continue Reading →

Tags: teach cybersecurity, cyber aware, cybercriminals, #cybersecurity, cyber aware generation, #defeatcyberattacks, Cyber Security, #cyberattacks, cyberwarfare, training, Cyber Range, cybersecurity leaders, higher education, Education, virtual environment, security risk, security trends, stronger security, increase security, information security, Degrees in Cybersecurity, executive cyber management, Risk Score, Asset Protection, CISSP, CISA, CEH, GSEC, Certified Ethical Hacker (CEH), innovation, healthcare, National Defense

by Christopher Perry 0 Comments

What to do When You Don't Always Need Two-Factor Authentication

 

Two-Factor Authentication (2FA) is an important topic of discussion where security is of concern. Too many data breaches have occurred over the last 10 years purely because of lackadaisical security requirements. Many of these events would have been avoided with a proper Two-Factor Authentication system in place.  Security: personal, private, corporate – the list goes on and on. Each entry a...

Continue Reading →

Tags: one click, #2FA, 2FA, #2FASolutions, #2ndfactor, Access Control, Access Management, account management, Benefits of 2FA, when you don't need 2FA, mobile authenticator, mobile authentication, layer of security, geolocation, security trends, User Experience, usability, Two-Factor Authentication, two-factor, #selfservice, #securityandusability, security questions, #security, secure authentication, #passwordmanagement, Password Synchronization, contextual authentication, #contextualauthentication

by Kody Pinette 0 Comments

Proxy - Is it Confusing, Mysterious, or Essential?

Proxy? Sounds confusing, mysterious, or essential? So what is it and why would you want to use one? A proxy server is a wall that acts as a gateway between you and the internet. Without a proxy, your browser communicates directly with the internet. Think of the proxy as a form of protection; it can scan your downloads, filter web content, get around certain web restrictions and allow anonymity...

Continue Reading →

Tags: Cyber Security, #cyberattacks, #cybersecurity, customer experience, End user experience, limit minimum password length, password habits, password age, password policy best practices, update your passwords, password policies, password length, stolen passwords, #phishing, secure passwords, SSO Proxy, single logout, #singlesignon, strong password, one click, proxy server, PortalGuard Proxy, password encryption, encryption, password strength

by Christopher Perry 0 Comments

Why Gamers Tolerate Two-Factor Authentication

Two-Factor Authentication is often a dirty phrase for end-users – though that does not seem to hold true within the gaming community. It is not a stretch of the truth to say that gamers are a temperamental lot.  We like things that work, and we hate change on principal.  Of course, opinions can shift one way or the other, but that’s the basic foundation when targeting gamers as an audience:...

Continue Reading →

Tags: mobile authenticator, User Authentication, Two-Factor Authentication, Multi-Factor Authentication, MFA, 2FA, #gamer, blizzard, Access Management, #AccountUnlock, Authentication, authentication management, Authentication Methods, authentication security, Authentication Security, mobile authentication, OTP Authentication, Authentication Provider, Square-Enix, Steam, Sony, Microsoft, XBOX, PlayStation, PC Games, Benefits of 2FA, gaming companies using 2FA

by Jay Ouellette 0 Comments
by Christopher Perry 0 Comments

Top 5 Reasons to Use a Mobile Authenticator

The advent of modern authentication security places a lot of pressure on the user to remain secure in a constantly changing environment.  Using a Mobile Authenticator is one of the most simple and accessible methods to remain secure without compromising usability.  We discuss what makes a good Mobile Authenticator in our recent White Paper - The Argument for a Better Authenticator. However,...

Continue Reading →

Tags: 2FA, Access Management, Active Directory, mobile authentication, mobile authenticator, authentication security, #cybersecurity, Cyber Security, cyber aware, accessibility, Single Sign-On (SSO), Single Sign-On Options, OTP Authentication, HOTP, OTP Methods, OTP, MFA, Multi-Factor Authentication, #2FA, #2FASolutions, mobile security, user convenience, SSPR, Simplicity, flexibility

Cybersecurity for the Next Generation

As technology continues to advance it is vital for children to understand the potential risks that are out there and how to be cyber aware when online. Children ages 8-18 spend an average of 7 hours and 38 minutes online. During this time, they may be exposed to cyberbullying, cyber predators, and identity theft. In each child there seems to be an inherent trust in the technology that...

Continue Reading →

Tags: Cyber Security, #2FA, #2ndfactor, Authentication, Authentication Security, changing your password often, cyber aware, #cybersecurity, cybercriminals, #cyberattacks, cyberbullying, teach cybersecurity, cyber aware generation, hackers, enforcing strong passwords, impersonations, cyber predators, password generator, challenge questions, password habits, sign on to web applications, password policies, children and technology

by Christopher Perry 0 Comments

Password Policy Best Practices to Consider

Coming up with a valid password policy is a nightmare.  Too many variables need to be considered, and when you throw end-users into the mix, things can go south very quickly. However, building a secure password policy doesn’t need to be an ordeal.  It all comes down to knowing your end-users, and anticipating what they will let you get away with.  To help you bridge that gap, we’ve created a...

Continue Reading →

Tags: National Cybersecurity Month, PortalGuard Security Policy, password policy best practices, secure passwords, update your passwords, password policies, password length, minimum length passwords, strong password, cybercriminals, security risk, login session, layer of security, password habits, password patterns, password generator, passphrase, limit minimum password length, enforcing strong passwords, password age, regular password changes, NIST Updates, password history, reduce reusing weak passwords, password complexity, stronger authentication, password strength

Free White Paper: Don’t trust the standard Office 365 login screen. Be better protected against phishing attempts.



Recent Posts