Larry Conroy

October 10, 2017
by Larry Conroy
0 comments

Leveraging Data Quality to Improve Institutional Efficiency

“Leveraging Data Quality to Improve Institutional Efficiency”, that’s a mouthful of big words.  When I was first asked to write on this topic, I thought, “What does that even mean?”  Well, like any good author/engineer, I broke it up into smaller pieces to try and make sense of it.

Continue Reading →

Christopher Perry

October 4, 2017
by Christopher Perry
0 comments

PistolStar Inc. Is Proud to Announce: PortalGuard v5.6.4!

PortalGuard 5.6.4

 

In an effort to provide our customers with the most secure and efficient product possible, the team behind PortalGuard is proud to announce the release of version 5.6.4!  This latest version of PortalGuard follows a recent round of penetration testing by Veracode – a third party solution brought in to ensure that PortalGuard is as secure as possible. As a result of that test, PortalGuard version 5.6.4 comes equipped with some new bells and whistles to enable our customers to maintain security without sacrificing usability. Continue Reading →

Tyler Dannat

September 7, 2017
by Tyler Dannat
0 comments

A Fresh Look at Passphrases and NIST’s New Password Policy: Size Matters

 

 

Let’s face it, complicated, alphanumeric passwords are one of the worst parts about being online. With the plethora of websites and online applications requiring us to create accounts and passwords, the advice of password security experts is easy to ignore.

As the computing power available for password cracking continues to grow, poor password hygiene has led businesses and organizations to enforce stronger password policies such as 10-character passwords mixed with capital letters, numbers, and special characters.

Security practices like this, however, have led to user complaints when it comes down to usability – especially in the work place. Can you blame them? I mean, balancing life with work is tough enough.  When you add hurdles such as account lockouts due to complex passwords, you’ve got a seriously frustrating distraction. But guess what? It doesn’t need to be this complicated and the government is here to help.

Continue Reading →

Rob K

August 22, 2017
by Rob K
0 comments

Considerations for Developing BYOD Security Guidelines

 

BYOD Security Guidelines Back in 2002 would it have surprised you to know that in only a short amount of time almost everyone would have a cell phone? Let alone a cell phone that would have access to the internet? It sure would have taken me by surprise and that brings us to the reality of today’s world in 2017. Almost everybody has their own smart device, albeit an iPhone, a laptop, a tablet, you name it! This is a huge leap for the technological world, and society, but it also brings many questions to light. Today we’re going to explore how to approach BYOD (bring your own device) in the workplace or on your campus.

Continue Reading →

Rob K

August 18, 2017
by Rob K
0 comments

Getting Away from Your Homegrown Environment

Homegrown

 

From the moment, the doors first opened and continuing through today, many organizations and institutions have been creating and developing their IT departments continuously. Through the years, changes in IT range from new technologies to new positions and/or employees. This in turn, makes it very difficult to ensure the entire department is on the same current technical page. It’s a major issue when an IT department creates a homegrown system that has been built through various people and cannot support all the functionality of new technology. Now it’s time to invest in a solution that will rid you of any ambiguity.

Continue Reading →

Rob K

August 11, 2017
by Rob K
0 comments

Higher Education Needs More Protection

Over the past year, there has been an increase in phishing and hacking attacks throughout Higher Education nationwide. Hackers are targeting these institutions for a variety of different reasons. Some of the reasons are access to sensitive data such as date of births, social security numbers, research findings, enrollment status and more. Also, a large amount of IT systems in Higher Ed  cannot prevent or are not prepared for a cyber-attack. The main initiatives for institutions moving forward should be to implement a security system that enforces students, staff and faculty to enroll in two-factor authentication. This is imperative to ensure you take the next step into cyber security.

Continue Reading →

Larry Conroy

August 8, 2017
by Larry Conroy
0 comments

Top 3 Problems seen in a Tech Support Role

 PortalGuard Tech Support

Here at PortalGuard Technical Support, we get quite an assortment of inquiries needing resolution/understanding by our customers and prospects. We are committed to taking the time to document or build into our product what is needed to eliminate these questions from taking up too much time for us and our customers. However, I have been able to find three concerns that I see the most in tech support.

Continue Reading →

Main menu