Cyber Access Control | MFA Enterprise Password Management | Access Smart

Archive for Industrial Espionage

Exporting Power LogOn

Network Access AuthenticationAccess Smart received their ECCN classification determination number today from the US Dept. of Commerce. We are classified as a 5D992b Information Security Software product which allows Access Smart to ship our Power LogOn software and licenses internationally.

Under this classification, no additional export documentation is required. Purchases can be made and shipped though the internet.

“We are very pleased to receive this classification since it allows our international customers faster and simpler fulfilment “, said Dovell Bonnett, Founder and CEO of Access Smart.

Please contact Access Smart for a no obligation consultation on how best to implement Authentication, Authorization and Non-Repudiation into your business. Access Smart – The Alternative to PKI.

“The first line of defense is authenticating who’s knocking on your network’s ‘front door’. That’s why data security begins with network access authentication, and network access authentication begins with Power LogOn.” – Dovell Bonnett, Founder and CEO of Access Smart

“The Secure CEO” Book

How to Protect Your Computer Systems, Your Company, and Your Job

“The Secure CEO: How to Protect Your Computer Systems, Your Company, and Your Job” Packs Plain-English Security Solutions for Executives

The Secure CEO: Data security begins with network access authenticationViruses… hackers… malware… identity theft… security breaches… it’s enough to make any CEO’s head spin. In order to remain  competitive and profitable these days, it’s absolutely imperative that you—and  your organization—take control of your IT issues before they take control of  you!

In his new book The Secure CEO, Vital Systems Security Review expert Mike Foster combines  his considerable Internet technology experience with his innate understanding  of the latest business and security technologies. The result is The Secure CEO, the definitive IT  handbook for CEOs and key executives. And best of all, it’s written in easy-to-follow  “plain english” that readers can understand, regardless of their technological  background.

Foster’s premise is that although CEOs may think their networks and company  information are safe from prying eyes, more often than not they are not. In his  book Foster asks critical questions key executives need to consider, such as:

  • Are you sure  your network isn’t running illegal programs that have been remotely installed  by criminals in other countries without your knowledge?
  • Is your IT  team so under-trained or over-whelmed that daily “fires” keep them from  performing critical security tasks?
  • Are unclear  communication and negative personality types adversely affecting your IT  department?

The  Secure CEO gives you the bottom line answers you need to effectively  analyze your current use of Internet technology. Readers will uncover strategies  to minimize IT security breaches, tactics for keeping their companies safer,  and proven “best practices” to implement to help keep systems secure in the  future.

IT security has never been a more  important business concern. Get The Secure CEO and share its timely information with your entire IT team, key  managers, and other top executives. Cut through the confusion and intimidation  and harness the power of technology for your company’s advantage. The Secure CEO by Mike Foster will help  you protect your computer systems, your company, and your job!


Employees Are Not Evil…

They Are Just Drawn That Way

PData security begins with network access authentication of employeesaraphrasing a line from Jessica Rabbit from the movie Roger Rabbit seems the appropriate comment from Geoffrey A. Fowler’s article “What’s a Company’s Biggest Security Risk? You.” Hence the headline: Employees Are Not Evil – They Are Just Drawn That Way. It is critical that employers be diligent in training their employees in online safety.

When your employees are online they are opening the door to danger. Be it opening phishing email attachments, writing passwords on sticky notes, plugging in USB drives found in the parking lot, using personal devices to access the company’s network, of hundreds of other social engineering attacks, data is the new currency of the internet age. And if it has value, there will always be someone wanting to steal it. Read More→

Company’s Identity Theft Worries Elevate to Cyber Crime

Cyber Crime Protection – Evaluate and Segment Data

Data SecurityIt only seemed like yesterday that when business owners were asked about network security their focus was on identity theft protection and/or compliance with the different state and federal privacy laws. Those concerns are now elevating to the more destructive and finacially devistating risks of cyber crimes. At the beginning of this year I wrote a blog about how I was advancing my security skills from identity theft protecter to cyber warrior. I even posted a chapter-by-chapter review of the book “Cyber Warfare”, by Jason Andress and Steve Winterfeld. It doesn’t mater what industry your in, the size of your company , or the complexity of your computer network because if you can be found on Google, Bing, Yahoo, LinkedIn, FaceBook, Twitter, etc.then your business is at risk. All you can do now is limit your exposure and midigate the damages.

Here is a recent article on how cyber crime is targeting companies.

A Risk-Based Approach to Combating Cyber Crime

—by Rich Baich, principal, and Peter Makohon, senior manager, Deloitte & Touche LLP and leaders of the Deloitte Center for Security & Privacy Solutions. Read More→

Smart Card Authentication Stops Cyber-Attacks

Access Smart® Announces Power LogOn® Administrator 5.3 for Smart Cards

Power LogOn Administrator for Smart CardsAccess Smart LLC, a leading developer of password and network access authentication solutions through the use of smart card technology, today announced Power LogOn Administrator 5.3 for mid-sized businesses and large enterprises. The solution enables an IT manager to securely, affordably and quickly implement their company’s computer access password policy directly onto a smartcard while providing employees the convenience of not having to generate, remember or type logon passwords on computers, networks, VPN’s, clouds and internet sites.

“The rash of computer network hacks on businesses, healthcare, government agencies and educational institutions have shown that stronger password security is needed,” said Dovell Bonnet, founder and CEO of Access Smart. “Power LogOn uses multi-factor authentication between the user-to-the-card, the card-to-the-computer, card-to-the-server, and user-to-the-data at a substantial fraction of the cost and time of Public Key Infrastructure (PKI). The first line of network defense is to first authenticate who is ‘knocking’ on the firewall.”

Power LogOn Administrator 5.3 allows an IT manager to assign and issue smartcards with variable rights, privileges and passwords to each employee given authorization to network, data files and web accounts. The password data on the smartcard is secured using Triple Data Encryption Standard (3DES) for fast access and AES for securing the server password files. The new auto-syncing between Power LogOn and Active Directory makes password changes easy and convenient for users. Power LogOn has also added new fingerprint and iris biometric partners for even high levels of authentication. The IT Manager has complete control while the employee has data access convenience.

The smartcard can also be combined with an identification badge, so the same card that grants access to the facility permits access to the company network. The confidential data in PC’s and laptops can now be safeguarded so that a theft will not constitute as a data breach. Additional features such as secure, off-site access to company data and cashless purchases for food and supplies can also be added to the card, providing additional perks to employees, while maintaining a high level of logical and physical security.

Depending on the customization required, Power Logon can be implemented in as little as a few hours or a few days. With no heavy, back-end server modifications required and no annual license or subscription fees, the solution is less costly and cumbersome to install than other secure authentication solutions.

“There are two main barriers facing companies from implementing security: 1) If security is inconvenient, employees will find ways to circumvent it; and 2) If security is too expensive, executives will question if it’s needed. Access Smart addresses both these issues by combining top-level security, user convenience, and low cost of ownership,” said Bonnett. “With Power LogOn Administrator 5.3, companies can now reduce their data breach risks by removing the weakest link, the employee.”

 To learn more about Power LogOn contact Access Smart for a free, no obligation consultation.

About Access Smart, LLC:
Headquartered in Ladera Ranch, California, Access Smart, LLC is dedicated to empowering businesses, agencies and institutions to securely regain control over their computer network authentication and data access authorization. Security does not have to be cumbersome to be effective. That is why our products are designed using state-of-the-art security technologies while focusing on ease-of-use and low-cost-of-ownership. Security should never be a luxury, especially with rampant data breaches and privacy regulations.

For more information about Access Smart, please visit

Access Smart and Power LogOn are trademarks exclusively licensed to Access Smart, LLC. Other product names are either trademarks or trade names of their respective holders.