Rob K

November 17, 2017
by Rob K
0 comments

Access Control|Contextual Authentication

Access Control Contextual Authentication: Basic password methods of access control are not enough.

 

Access control is simply controlling entry into a cyberspace as previously explained in this blog. For example, you have to have a password to access your Facebook account. This password requirement is access control. Without it, anybody could access your page and do whatever they wanted. This is primarily why cybersecurity exists…to prevent those who shouldn’t have access from getting into a cyberspace. If you have had your social media hacked, then you know that the basic password method of access control is not enough.

Continue Reading →

Rob K

November 7, 2017
by Rob K
0 comments

CyberSecurity Access Control with Single Sign-on

 

Cybersecurity Access Control with Single Sign-on

CyberSecurity Access Control with Single Sign-on

If you haven’t noticed yet, browsing the web in 2017 basically requires you to have multiple accounts with usernames and passwords. For my fellow Chrome users, you may forget that you are already signed into your account as soon as you open the browser unless of course, you sign out of your account every single session. Realistically who does that though?  I personally love already being signed into Chrome, Gmail, and YouTube automatically.  On top of having to log into the browser itself, we then have to log into Twitter, Reddit, email provider, your favorite place to buy clothes, Amazon, eBay, any news page with a paywall, Hulu, etc. This list could go on for days.  The point is it appears every webpage you like to browse requires an account to be made. With these accounts, come usernames and passwords. That is exactly why there is a need for cybersecurity.

Continue Reading →

Rob K

October 31, 2017
by Rob K
0 comments

CyberSecurity Access Control with Two-Factor Authentication

CyberSecurity Access Control with Two-Factor Authentication

CyberSecurity Access Control with Two-Factor Authentication

 

Cybersecurity is on its way to becoming a $200-billion-dollar industry as we discussed in my previous blog “The Importance of CyberSecurity Access Control”. Like any industry this size, there are many different subcategories within it. In the aforementioned blog, I wrote about access control, what it is, and how it ties into cybersecurity. Today we’re going to talk about an effective means of access control known as Two-Factor Authentication!

Continue Reading →

Rob K

October 24, 2017
by Rob K
0 comments

The Importance of CyberSecurity Access Control


It’s 2017 and almost everything in your daily life is tied into an online network of some sort. Going to the movies is no longer checking the newspaper to see what is playing, or calling Moviefone and asking for the showtimes near you. Now, we simply pull out our smartphones or computers and search “movie times near me”. This alone gives enough links to allow you to have everything but the popcorn purchased in a few clicks. With that being said the threat of having that payment information stolen is often overlooked or completely forgotten. That is exactly why cybersecurity is so important in today’s world. Luckily for us, there are people working hard on preventing this threat to a peaceful life.

Continue Reading →

Jason Garfagna

October 23, 2017
by Jason Garfagna
0 comments

Secure Single Sign-on to Ellucian Products


Secure Single Sign-on to Ellucian Products

The advent of online resources that are becoming more accessible to students in higher education has spawned the need to streamline access to online systems. This is a common theme and reason why our education customers contact PortalGuard. They are looking for a solution that would allow their students to focus on learning rather than managing passwords and logins.

Continue Reading →

Larry Conroy

October 10, 2017
by Larry Conroy
0 comments

Leveraging Data Quality to Improve Institutional Efficiency

“Leveraging Data Quality to Improve Institutional Efficiency”, that’s a mouthful of big words.  When I was first asked to write on this topic, I thought, “What does that even mean?”  Well, like any good author/engineer, I broke it up into smaller pieces to try and make sense of it.

Continue Reading →

Main menu