“Leveraging Data Quality to Improve Institutional Efficiency”, that’s a mouthful of big words. When I was first asked to write on this topic, I thought, “What does that even mean?” Well, like any good author/engineer, I broke it up into smaller pieces to try and make sense of it.
In an effort to provide our customers with the most secure and efficient product possible, the team behind PortalGuard is proud to announce the release of version 5.6.4! This latest version of PortalGuard follows a recent round of penetration testing by Veracode – a third party solution brought in to ensure that PortalGuard is as secure as possible. As a result of that test, PortalGuard version 5.6.4 comes equipped with some new bells and whistles to enable our customers to maintain security without sacrificing usability. Continue Reading →
Let’s face it, complicated, alphanumeric passwords are one of the worst parts about being online. With the plethora of websites and online applications requiring us to create accounts and passwords, the advice of password security experts is easy to ignore.
As the computing power available for password cracking continues to grow, poor password hygiene has led businesses and organizations to enforce stronger password policies such as 10-character passwords mixed with capital letters, numbers, and special characters.
Security practices like this, however, have led to user complaints when it comes down to usability – especially in the work place. Can you blame them? I mean, balancing life with work is tough enough. When you add hurdles such as account lockouts due to complex passwords, you’ve got a seriously frustrating distraction. But guess what? It doesn’t need to be this complicated and the government is here to help.
Back in 2002 would it have surprised you to know that in only a short amount of time almost everyone would have a cell phone? Let alone a cell phone that would have access to the internet? It sure would have taken me by surprise and that brings us to the reality of today’s world in 2017. Almost everybody has their own smart device, albeit an iPhone, a laptop, a tablet, you name it! This is a huge leap for the technological world, and society, but it also brings many questions to light. Today we’re going to explore how to approach BYOD (bring your own device) in the workplace or on your campus.
From the moment, the doors first opened and continuing through today, many organizations and institutions have been creating and developing their IT departments continuously. Through the years, changes in IT range from new technologies to new positions and/or employees. This in turn, makes it very difficult to ensure the entire department is on the same current technical page. It’s a major issue when an IT department creates a homegrown system that has been built through various people and cannot support all the functionality of new technology. Now it’s time to invest in a solution that will rid you of any ambiguity.
Over the past year, there has been an increase in phishing and hacking attacks throughout Higher Education nationwide. Hackers are targeting these institutions for a variety of different reasons. Some of the reasons are access to sensitive data such as date of births, social security numbers, research findings, enrollment status and more. Also, a large amount of IT systems in Higher Ed cannot prevent or are not prepared for a cyber-attack. The main initiatives for institutions moving forward should be to implement a security system that enforces students, staff and faculty to enroll in two-factor authentication. This is imperative to ensure you take the next step into cyber security.
Here at PortalGuard Technical Support, we get quite an assortment of inquiries needing resolution/understanding by our customers and prospects. We are committed to taking the time to document or build into our product what is needed to eliminate these questions from taking up too much time for us and our customers. However, I have been able to find three concerns that I see the most in tech support.