Cyber Access Control | MFA Enterprise Password Management | Access Smart

Archive for Power LogOn

Weak and Stolen Passwords – 81% of Hacking Tactics

Don’t believe the numbers without first understanding the problem. There has been a lot of cyber companies putting out their spin regarding Verizon’s April 2017 Data Breach Investigation Report (DBIR) . In the report they claim, “81% of the tactics used were of hacking-related breaches leveraged either stolen and/or weak passwords.”

This makes sense when you consider that over 90% of all authentication methods rely on passwords, but let’s look behind these numbers and what the report doesn’t say. Read More→

Make America Cyber Secure

Position Paper: US Government’s Cybersecurity Procurement

I am asking that Congress instruct the General Services Administration (GSA) to develop procurement codes under Schedule 70 specifically for the purchase of Cybersecurity hardware and software products.

Read More→

Dr. Joel Rakow Joins the Access Smart Team

Dr. Joel RakowAccess Smart is Growing their Cybersecurity Footprint

Access Smart is excited to announce a new addition to our team- Dr. Joel Rakow, a globally recognized leader in cybersecurity. Joining the team as our Reseller/Business Development Consultant, Joel bring more than 25 years of technology leadership experience in the areas of cybersecurity, physical security systems enterprise risk management and software deployments.

Joel is a partner in the LA and Orange County Practice of Fortium Partners, and is nationally recognized in the field of technology security, having served as an advisor to the Secret Service and Los Angeles Electronic Crimes Task Force and a representative member of the FBI Infragard, Adobe Software’s Advisory Council and the Receivers Team for the State Courts of California.

We are thrilled to add Joel’s extensive experience and expertise to the Access Smart team as we continue to be your number one source for cybersecurity and password management.

Giant Hole in Government’s Cybersecurity Strategy

The government is never going to fix its cybersecurity problem until it fixes its procurement problem!

cybersecurity weakness in US Government

Shockingly, there are no NAICS, SIC or SIN CODES for cybersecurity products on the GSA Schedule. As a California Certified Small Business owner who offers multi-factor authentication (MFA) products on the GSA Schedule, this is a serious problem.

Without cybersecurity procurement codes, government agencies and departments are unable to find, let alone implement, targeted products and services to keep our nation’s electronic data secure. Current procedure involves a keyword search on the GSA Schedule. If the exact keyword is not typed or listed, no match is found. An agency’s only recourse then becomes generating expensive and time consuming RFIs, RFPs and RFQs. Cybersecurity NAICS, SIN and SIC codes are designed streamline the entire process, save money and ensure fast cybersecurity implementations. Read More→

Cybersecurity Executive Order – Letter to President Trump

Cybersecurity Executive Order – Open Letter to President Trump

February 8, 2017Cybersecurity Executive Order

 

President Donald Trump
The White House
1600 Pennsylvania Avenue NW
Washington DC 20500

Re: Small Business Response to President’s Cybersecurity Executive Order

 

Dear Mr. President,

Thank you so much for your initiative with our nation’s Cybersecurity.

As a California Certified Small Business owner who offers a multi-factor authentication (MFA) product on the GSA Schedule, I have an important concern: Currently, there are no NAICS, SIC or SIN procurement codes for cybersecurity products on the GSA Schedule. This makes it difficult for government agencies and departments to find, let alone implement, the products you are mandating.

A year ago, I sent a similar letter to President Obama. NOTHING has changed. I trust that you are the man to fix this ridiculous problem. By simply adding cybersecurity procurement codes on the GSA Schedule as part of your Executive Order implementation, cybersecurity solutions will be implemented much faster. Read More→