PortSys adds OTP two-factor authentication to Total Access Control
2-factor authentication for account log-in through mobile applications offers greater protection against attacks or unauthorized access.
2-factor authentication for account log-in through mobile applications offers greater protection against attacks or unauthorized access.
According to the Securities and Exchange Commission (SEC), the average cost of cyber breaches it studied increased an astounding 50 percent in 2018 – hitting $7.5 million. In the past, one of the most frequent breaches relied on bare-bones phishing attacks sent out in bulk to compromise user credentials – often hitting the rank and…
What is your security superpower today? It seems quaint now, but there was a time not so long ago – before the pandemic – when security administrators ruled over their IT fiefdoms through the Superpower of NO! Want access with a mobile device? NO! Want access from home? NO! Want access from the road? NO!…
According to the 2017 Verizon Data Breach Investigation Report, 7.3% of users fell for phishing attacks. Even more astounding, 15% of those people fell for subsequent phishing attacks that hijacked their credentials. It’s a short trip through those holes for hackers to spread out and infect other users across your enterprise, share your proprietary information…
I’ve traveled around many parts of the world and it’s been quite surprising to me that the US seems to be behind in finding ways to adequately protect mobility. When I say mobility, it’s more than just smartphones and tablets too, although this is a part of it. But, mobility in general and cohesive protection…
When recently discussing this with some colleagues I realized that there are still a number of people who aren’t certain about the differences in technologies and how they impact them directly. Being in the security field, we often forget that what we know and accept as understood can be quite mysterious and unclear to others who aren’t so inundated with security.
Smaller businesses have generally operated with very limited investment in information security. Perhaps lulled into a sense of “security through anonymity,” some businesses have decided that investing their resources in security was overkill.
Times have changed.
The majority of organizations today have a highly complex segmented security infrastructure that is difficult to manage and prone to gaps. Different products are responsible for securing different parts of the network and the lack of a cohesive central product capable of controlling and communicating with all the different elements makes organizations vulnerable to attacks….
PortSys strengthens Total Access Control’s ability to fight brute force attacks through proxy access to Microsoft Office 365’s Software as a Service (SaaS).
SecuritySolutionsWatch.com: Thank you for joining us today, Michael. Before discussing PortSys Products & Solutions in greater detail, please tell us about your background and may we have a brief corporate history? Michael Oldham: I’ve been in IT and Security for over 30 years and have had quite a variety of different experiences. I began on the technical side as…
PortSys, Inc. 201 Boston Post Road West
Suite 205
Marlborough, MA 01752-4667
United States
+1 781-996-4900
United Kingdom
+44 208 196 2420
PortSys, Inc.
201 Boston Post Road West
Suite 205
Marlborough,
MA 01752-4667
United States
+1 781-996-4900
United Kingdom
+44 208 196 2420
PortSys, Inc.
163 Main Street
Suite 1
Medway, MA 02053
United States
+1 781-996-4900
United Kingdom
+44 208 196 2420
©2025 PortSys, Inc. All Rights Reserved.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
We’re spreading some Christmas cheer across our entire range. Get up to 50% off selected items - sale ends Friday.