Power LogOn Secures Multi-Factor Authentication Before Bootup and the Firewall
LADERA RANCH, California—Access Smart, LLC today announced that its Power Logon Multi-Factor Authentication and Password Management System was voted “Best Security” by the attendees at the recent SMB TechFest, California’s largest quarterly technology conference. Power LogOn is an advanced Multi-Factor Authentication System with integrated Enterprise Password Management that secures networks, clouds and computers by combining physical and logical access onto a single credential and eliminating the weakest link in cybersecurity: user managed passwords.
“We are honored to receive the prestigious Best Security award at SMB TechFest,” said founder and CEO Dovell Bonnett. “SMB TechFest is a great venue to check out the latest developments in IT technology, hear industry experts speak and connect with potential partners. With so many outstanding products and solutions showcased at SMB TechFest, we are honored to have been selected as the best security solution.”
Know your Password Manager
Last week the cybersecurity industry was a buzz about the Boston-based company LogMeIn, Inc purchasing LastPass for $125M. In the different news articles some interesting facts were quoted:
- Only 10 percent of knowledge workers today use a password manager
- Only 37 percent of survey participants use passwords that contain both letters and numbers
- Nearly 64 percent of people who use the Internet deploy the same password for most websites
- Nearly 80 percent of cloud-based services and apps have monitored, sensitive or private information
- 35 percent intend to adopt a password manager in the next 12 months
While these are staggering statistics, it’s the last one I want to address. That’s because not all password managers are the same. You need to understand the differences before you deploy. Read More→
Every day I read another post, hear another news story, or have another conversation that passwords are insecure and that PKI and digital certificates must replace passwords. Comparing passwords to certificates, or PKI, is not correct because:
- A passwords is a single component within multifactor authentication.
- Certificates and PKI are a complete infrastructure made up of many different components.
- What keeps certificates secure is how their keys are safeguarded, generated, protected, and managed
Access Smart® Improves Cybersecurity With Power LogOn.
LADERA RANCH, CA. June 15, 2015 – Access Smart, LLC today announced that the Power LogOn software now supports Microsoft Azure. Power LogOn adds an extra layer of cybersecurity during the initial logon process to Azure. Azure provides Power LogOn customers with an efficient cloud solution, keeping data available with improved security.
Because cybersecurity needs to start before the firewall, Access Smart complements Azure by adding on a security-enhanced password manager. To access the power of Azure, employees don’t need to type in their user name and password. The greatest security threat to any company is the employee managed user names and passwords. By removing this cybersecurity vulnerability, Power LogOn puts the control of sensitive data back in the hands of IT professionals. Read More→
Corporate cybersecurity policies and procedures must come first.
The news bombards us with the latest cyber-attack stories. Being aware of potential attacks is important, but what can a business owner do? Are you worried that cybersecurity vendors are going to try to exploit these attacks to sell you their products? Are you afraid that IT will ask for more money? Do you just keep doing what you are currently doing and hope a cyberattack never happens to you?
Investing in cybersecurity is important; however, you can’t afford to make a snap security decision based on fear that will do little to no good. Nor can you hope it will never happen to you. Cybersecurity is not all about new technologies. Often a change in policies and business practices can have a greater impact on your bottom line. Before you bring out the checkbook, here are six tips that costs very little, but have high security impact. Read More→