Cyber Access Control | MFA Enterprise Password Management | Access Smart

Archive for Identity Theft

Biometrics Are Less Secure Than Passwords

Biometrics give a false sense of security.

Biometrics authenticationOn Sept 23, 2015, Office of Personnel Management (OPM) revised the number of stolen fingerprint files to 5.6 million! Why should you care?

Some security pundits believe that biometrics are far more secure than passwords. They argue that since everyone has unique identifiers like their voice, iris, face and fingerprints, why not use these to authenticate a user in to a computer network? Sounds logical and from a theoretical perspective, it’s true. But major flaws become apparent during implementation. Read More→

Cyber Security Magazine on Apple’s Newsstand

CAC – Cyber Security for the Business Owner

Network Access ControlAccess Smart announces the release of their new CAC (Cyber Access Control) Magazine. CAC is an online magazine for business owners, professionals and any other non-techies who want to understand the threats, the risks and the costs associated with computer and network (cyber) security.  It is often said that a strong offense is a great defense.  Business owners need to know the whos, hows and whys of cyber security in order to mount that great defense.  Data is the new world currency.

Everyday more and more news sites flood the headlines about cyber-attacks.  It doesn’t matter if it’s done by hackers, organized criminals, government agencies or your own employees stealing the data; by law, your company is liable for protecting customers’ private information.  Read More→

Businesses Can Stop Identity Theft

87% of all business owners who seriously inquire about Power LogOn® end up buying it. Before I go into why, here are some new findings from Javelin Strategy & Research’s network access authentication partners for Access Smartlatest report 2013 Identity Fraud Report: Data Breaches Becoming a Treasure Trove for Fraudsters:

  • Identity fraud incidents and amount stolen increased—The number of identity fraud incidents increased by one million more consumers over the past year, and the dollar amount stolen increased to $21 billion, a three-year high but still significantly lower than the all-time high of $47 billion in 2004. This equates to 1 incident of identity fraud every 3 seconds. Read More→

Cyber Authentication – Google Weak on Password Management Systems

When it comes to cyber authentication, the weakest link is the user.

Cyber authenticationCyber authentication is a hot topic in today’s world of Malware, Cyber Warfare, BYOD, Cloud Computing and Hackers. In a recent Google Password Management blog, “Google Password Management Tips To Increase The Security Of Your Accounts” they asked if your Gmail account is safe. They then give seven tips on how to improve password security. These tips, while basically correct, are so old and have been said ever since the first password was issued that they fail to address the real problem: the human element.

We all know the problems with passwords: there are to many, they need to be complex, IT makes you change them every 90-days, and we can’t remember them all. These Google tips should also be classified as: Policy, Technique, or Management. Security typically is weaker when people are expected to securely “manage” the  “techniques.” Finally, even if you followed all these Google tips you still will be vulnerable because of the password cracking tools and attacks being used. While some are saying that password security is dead. I full disagree since passwords are one of the fundamental cyber authentication methods. So let’s review these tip. Read More→

Dovell’s Three Laws of Computers

Network Access Authentication is essential to the Laws of Computers

Laws of Computers

The concept of mechanical devices that will do manual and menial labor can be traced back to Ancient Greece. Whether it’s an automaton by Hephaestus or Honda’s Asimo robot, they all have something in common, a human-written program that controls the machine’s behaviors and actions. In a 1942 short story “Runaround,” Isaac Asimov first introduced the “Three Laws of Robotics” that is accepted as gospel among roboticists. As recently as 2011, the Engineering and Physical Sciences Research Council (EPRSC) and the Arts and Humanities Research Council (AHRC) of Great Britain jointly published a set of five ethical “principles for designers, builders and users of robots” that built off of Asimov’s laws. But what is a robot?

Robots are basically computers with mechanical appendages that give them some form of mobility. There seems to be no consensus on which machines actually qualify as a robot, but many designs seem to mimic humans or animals. While Isaac thought it necessary to write laws for a fictitious device and the EPRSC published their five laws, the “brain” controlling robots is left to total anarchy: The Computer. There needs to be Three Laws of Computers.

Computers, unlike robots, are all around us. They help in cooking our food, powering our homes, communicating around the world, and traveling to the far reaches of space. Young kids today are more adept with a mouse than a pencil. Computers are being used for good things like producing clean drinking water to terrible things like spinning uranium to create nuclear weapons. With all its uses, it seems odd that the founders of the computer age – Charles Babbage,  Calvin Gotlieb, Michael Dell, Tom Watson, Steve Jobs, Bill Gates, Dr. Wang, Hewlett or Packard to name a few – never saw the need to write any Laws of Computers.

If robots are just mechanical extensions of computers, and a computer controls the robot’s actions, movements and tasks, then before one has laws on robotics shouldn’t there first be laws governing computers? Therefore, I have taken it upon myself to publish:

Dovell’s Three Laws of Computers.

 Law #1: Computers must not, or allow other computers to, harm humans or other sentient life forms as they complete their series of commands (program) given to it.

 Law #2: Computers must first positively authenticate the user, determine that user’s rights and privileges, and leave an accountability record before executing its programs.

 Law #3: Computers must automatically learn, configure and remember how each human wants it to behave and then instantly recall that configuration every time that human accesses it.

Read More→