Cyber Access Control | MFA Enterprise Password Management | Access Smart

Archive for Online Security

Passwords are Protected by the U.S. Constitution!

Did you know: The U.S. Courts have deemed that passwords are protected under the U.S. Constitution?

united-states-constitutionU.S. Courts have ruled that passwords are considered free speech since they are considered “knowledge”. Therefore, under the Bill of Rights, 5th amendment , no person is required to disclose information that could incriminate themselves. DNA and biometrics, on the other hand, are not protected by these same rights. What’s more, Private Keys are not protected by the Constitution since they are computer generated and not considered  an individual’s “knowledge”. Read More→

Power LogOn® now supports Microsoft Azure

Access Smart® Improves Cybersecurity With Power LogOn.

Girl with Power LogOn in office button(190x190)LADERA RANCH, CA.  June 15, 2015 – Access Smart, LLC today announced that the Power LogOn software now supports Microsoft Azure.  Power LogOn adds an extra layer of cybersecurity during the initial logon process to Azure.  Azure provides Power LogOn customers with an efficient cloud solution, keeping data available with improved security.

Because cybersecurity needs to start before the firewall, Access Smart complements Azure by adding on a security-enhanced password manager.  To access the power of Azure, employees don’t need to type in their user name and password. The greatest security threat to any company is the employee managed user names and passwords. By removing this cybersecurity vulnerability, Power LogOn puts the control of sensitive data back in the hands of IT professionals. Read More→

Six Easy Tips to Reduce Cybersecurity Vulnerabilities.

Corporate cybersecurity policies and procedures must come first.

CybersecurityThe news bombards us with the latest cyber-attack stories. Being aware of potential attacks is important, but what can a business owner do? Are you worried that cybersecurity vendors are going to try to exploit these attacks to sell you their products? Are you afraid that IT will ask for more money? Do you just keep doing what you are currently doing and hope a cyberattack never happens to you?

Investing in cybersecurity is important; however, you can’t afford to make a snap security decision based on fear that will do little to no good. Nor can you hope it will never happen to you. Cybersecurity is not all about new technologies. Often a change in policies and business practices can have a greater impact on your bottom line. Before you bring out the checkbook, here are six tips that costs very little, but have high security impact. Read More→

Power LogOn is Heartbleed safe.

Power LogOn Heartbleed secureHeartbleed is very dangerous, but not to Power LogOn.

This week the cyber security community has been a buzz about the OpenSSL vulnerability and the Heartbleed bug.  This is a very serious problem and tech companies are scrambling to plug the holes, get patches out to companies and help them implement the fix.

I have been getting calls from our customers asking if the client / server communication channel in Power LogOn is safe from the Heartbleed bug. I’m happy to assure every Access Smart customer that the Power LogOn channel is secure.

There are many different security communication protocols available on the market. Access Smart’s engineers decided not to use or rely on the OpenSSL cryptographic functions.  Instead we choose a different NIST FIPS 140-2 approved cryptographic library.

After the different websites have updated their OpenSSL and assigned new keys, IT administrators will want to update all employee passwords.  This is very easy to do with Power LogOn.  IT can change every password as frequently as they deem necessary without the employee having to know, remember or type them.

Security has always been a cat ‘n’ mouse game. Access Smart is constantly monitoring this and other vulnerabilities and when something happens we evaluate and make necessary adjustments.

Rest assured, the Power LogOn server channel is secure from the Heartbleed bug.

About Access Smart

Founded in 2005 and headquartered in Ladera Ranch, California, Access Smart, LLC is a one-stop-shop offering a wide range of Single Sign-On cyber access control products (software, licenses, cards and readers) to make network multi-factor authentication deployment fast, easy and inexpensive. We are dedicated to empowering businesses, agencies and institutions to securely regain control over their computers and networks at the point of entry. Authentication, authorization and non-repudiation do not have to be cumbersome to be effective. That’s why our products are designed using state-of-the-art security technologies while focusing on ease-of-use and low-cost-of-ownership.

Previously, smartcard technology was only affordable to large government agencies and Fortune 500 companies. Access Smart has turned that model upside down by utilizing existing infrastructures and matching the technology to the needs. For example: you can use existing badge technologies, you have no backend server modifications, there are no annual subscription fees, and all your licenses are transferable.

Please contact Access Smart for a no obligation consultation on how best to implement Authentication, Authorization and Non-Repudiation into your business. Access Smart – The Alternative to PKI.

Cyber Security Magazine on Apple’s Newsstand

CAC – Cyber Security for the Business Owner

Network Access ControlAccess Smart announces the release of their new CAC (Cyber Access Control) Magazine. CAC is an online magazine for business owners, professionals and any other non-techies who want to understand the threats, the risks and the costs associated with computer and network (cyber) security.  It is often said that a strong offense is a great defense.  Business owners need to know the whos, hows and whys of cyber security in order to mount that great defense.  Data is the new world currency.

Everyday more and more news sites flood the headlines about cyber-attacks.  It doesn’t matter if it’s done by hackers, organized criminals, government agencies or your own employees stealing the data; by law, your company is liable for protecting customers’ private information.  Read More→