Don’t believe the numbers without first understanding the problem. There has been a lot of cyber companies putting out their spin regarding Verizon’s April 2017 Data Breach Investigation Report (DBIR) . In the report they claim, “81% of the tactics used were of hacking-related breaches leveraged either stolen and/or weak passwords.”
This makes sense when you consider that over 90% of all authentication methods rely on passwords, but let’s look behind these numbers and what the report doesn’t say. Read More→
Position Paper: US Government’s Cybersecurity Procurement
I am asking that Congress instruct the General Services Administration (GSA) to develop procurement codes under Schedule 70 specifically for the purchase of Cybersecurity hardware and software products.
“Kill Biometrics” is as silly as “Kill Passwords”
Sounds silly, right? It is. And it’s just as silly to say “kill passwords.” Here’s why. Currently, there are only three recognized “factors” – something you Know (password or PIN), something you Have (technology), and something you Are (biometrics). There are two more coming (location and behavior), but adopting those could take a while. Killing any one factor accomplishes nothing. It simply limits your security resources. Factors don’t need to be killed, they need to be secured and combined with other factors. Read More→
Access Smart is Growing their Cybersecurity Footprint
Access Smart is excited to announce a new addition to our team- Dr. Joel Rakow, a globally recognized leader in cybersecurity. Joining the team as our Reseller/Business Development Consultant, Joel bring more than 25 years of technology leadership experience in the areas of cybersecurity, physical security systems enterprise risk management and software deployments.
Joel is a partner in the LA and Orange County Practice of Fortium Partners, and is nationally recognized in the field of technology security, having served as an advisor to the Secret Service and Los Angeles Electronic Crimes Task Force and a representative member of the FBI Infragard, Adobe Software’s Advisory Council and the Receivers Team for the State Courts of California.
We are thrilled to add Joel’s extensive experience and expertise to the Access Smart team as we continue to be your number one source for cybersecurity and password management.
The government is never going to fix its cybersecurity problem until it fixes its procurement problem!
Shockingly, there are no NAICS, SIC or SIN CODES for cybersecurity products on the GSA Schedule. As a California Certified Small Business owner who offers multi-factor authentication (MFA) products on the GSA Schedule, this is a serious problem.
Without cybersecurity procurement codes, government agencies and departments are unable to find, let alone implement, targeted products and services to keep our nation’s electronic data secure. Current procedure involves a keyword search on the GSA Schedule. If the exact keyword is not typed or listed, no match is found. An agency’s only recourse then becomes generating expensive and time consuming RFIs, RFPs and RFQs. Cybersecurity NAICS, SIN and SIC codes are designed streamline the entire process, save money and ensure fast cybersecurity implementations. Read More→