Fixing the Weakest Link in Cybersecurity
Ladera Ranch, CA – March 30, 2016 – The Founder a CEO of Access Smart, Dovell Bonnett, is so passionate about the security of passwords, he literally wrote the book: Making Passwords Secure: Fixing the Weakest Link in Cybersecurity.
Dovell proves that making passwords secure is not only possible, passwords can actually become an effective, cost efficient and user friendly feature of robust cybersecurity. After examining how encryption keys are secured, what is and is not multi-factor authentication, this book introduces a new strategy called Password Authentication Infrastructure (PAI) that rivals digital certificates, but at the fraction of the cost.
“There are so many errors, misconceptions and lies about passwords security,” said Dovell Bonnett. So, here are just five basic truths:
- Passwords are a secure method for cyber authentication.
- Passwords are not going away anytime soon.
- When passwords are managed like private keys, then they are just as secure.
- Private keys, symmetric keys and biometric templates are only glorified passwords.
- The more complex a security infrastructure becomes, the greater the likelihood of a security breach.“For years I have been arguing for password security,” said Dovell.
“Well, I have now written a book that sets the record straight, debunks many of the false believes about passwords, and explains the SIMPLE TRUTH about Multi-Factor Authentication.”
User authentication is the most ignored risk to enterprise cybersecurity. When end users are allowed to generate, know, remember, type and manage their own passwords, IT has inadvertently surrendered the job title Network Security Administrator to employees – the weakest link in the cybersecurity chain.
Dovell Bonnett reveals another truth about the elephant in the room that no one wants to mention: Expensive backend security is worthless when the virtual front door has a lousy lock!
The information in this book is a game changer for both businesspeople and technical people. Business owners, corporate officers, agency managers, and financial decision makers will gain a high-level understanding about what the IT administrator or Chief Information and Security Officer (CISO) worries about and needs in order to protect the business.
The CISO, IT Administrator, and other technology recommenders will gain a greater appreciation for what the business side must have to create purchasing approvals and be better able to communicate what they need, without bogging the business folks down with tech speak.
By arming both sides with targeted information to make informed decisions about cybersecurity technology, this book is designed to help you implement the best security solution for your organization, become a hero in the boardroom, and protect against a security breach that would seriously damage your company.
After reading the book, you too will become Access Smart. Get your copy today
About Access Smart®, LLC
Founded in 2005 and headquartered in Ladera Ranch, California, Access Smart, LLC (a certified CA Small Business) is dedicated to empowering businesses, agencies and institutions to regain control over their computers and networks at the point of entry. Authentication, authorization and non-repudiation do not have to be cumbersome to be effective. For more, visit www.access-smart.com.com
# # #
The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
For more information, press only:
Access Smart LLC, (949) 218-8754, info@Access-Smart.com.
Note to editors: If you are interested in viewing additional information on Access Smart or Power LogOn, please visit http://www.Access-Smart.com.