Cyber Access Control | MFA Enterprise Password Management | Access Smart

Archive for cloud

Access Smart Joins Microsoft Enterprise Cloud Alliance

New-Look-of-Power-LogOn---web

Microsoft Enterprise Cloud Alliance Now Includes Authenticated Access –

Delivered by Power Logon®

Ladera Ranch, CA – March 29, 2016 – Access Smart, LLC, a multi-factor authentication cybersecurity provider, today announced that the company has joined the Microsoft Enterprise Cloud Alliance Program. The company’s multi-factor enterprise password management solution adds an extra layer of cybersecurity during the initial logon process to the Microsoft Azure Cloud Computing platform.

Microsoft’s Enterprise Cloud Alliance seeks to create, nurture and grow a strong eco-system across a broad set of Enterprise Cloud Products. With this alliance, Microsoft delivers the best on premise, hosted and Public Cloud solutions in the industry. The Alliance promotes and supports partners providing integrations and extensions to existing Microsoft products. As part of Microsoft’s Enterprise Cloud Alliance, Access Smart provides its flagship application. Most importantly, Power LogOn enables both secure and convenient, multi-factor authentication of the user before accessing the cloud environment. Read More→

Hackers aren’t always responsible for Security Breach

Security breach exposes roughly 100,000 IEEE members’ User IDs and Passwords

Security breachOn Sept. 24 2012 the Institute of Electrical and Electronics Engineers (IEEE) confirmed that nearly 100,000 of its members User Names and Passwords were publicly exposed from a computer security breach.

It seems that the Password and User Name files on an FTP server were left open for at least a month. According to Radu Dragusin, a teaching assistant at the University of Copenhagen, Denmark, “The usernames and passwords kept in plaintext were publicly available on their FTP server for at least one month prior to my discovery. Among the almost 100,000 compromised users are Apple, Google, IBM, Oracle and Samsung employees.” Read More→

Ingersoll Rand Partners with Access Smart for Cyber Security

Ingersoll Rand Security Technologies / Access Smart Provide Cyber Security with Smart Cards

Affordable, smartcard based, enterprise password manager for Windows solution for network access authentication

cyber security begins with network access authenticationCARMEL, Ind – Sept. 6, 2012 – Ingersoll Rand Security Technologies, a leading global provider of security and safety solutions and manufacturer of contactless smart credentials and readers, announced that its aptiQ™ smart card users can now deploy the Access Smart® Power LogOn® as their password manager for Windows. No longer will employees have to self-manage their passwords, a practice which can easily lead to an expensive company security breach.

     “When employees self-manage their passwords, the network access authentication becomes very insecure. Passwords are written down, simple passwords are used and the same password is used for multiple sites and applications,” explains Dovell Bonnett, Access Smart founder and CEO. “IT administrators using Power LogOn in combination with aptiQ smart cards can now easily add secure network access authentication. Businesses of all sizes must comply with state and federal privacy protection laws and cyber criminals are aggressively targeting businesses. Power LogOn securely authenticates a user before they are allowed past the firewall.” Read More→

Company’s Identity Theft Worries Elevate to Cyber Crime

Cyber Crime Protection – Evaluate and Segment Data

Data SecurityIt only seemed like yesterday that when business owners were asked about network security their focus was on identity theft protection and/or compliance with the different state and federal privacy laws. Those concerns are now elevating to the more destructive and finacially devistating risks of cyber crimes. At the beginning of this year I wrote a blog about how I was advancing my security skills from identity theft protecter to cyber warrior. I even posted a chapter-by-chapter review of the book “Cyber Warfare”, by Jason Andress and Steve Winterfeld. It doesn’t mater what industry your in, the size of your company , or the complexity of your computer network because if you can be found on Google, Bing, Yahoo, LinkedIn, FaceBook, Twitter, etc.then your business is at risk. All you can do now is limit your exposure and midigate the damages.

Here is a recent article on how cyber crime is targeting companies.

A Risk-Based Approach to Combating Cyber Crime

—by Rich Baich, principal, and Peter Makohon, senior manager, Deloitte & Touche LLP and leaders of the Deloitte Center for Security & Privacy Solutions. Read More→

DNSChanger Trojan Faced Down by FBI

Unfortunately,an estimated 45,600 users will not be able to connect to the internet

malware data security threatsThis coming Monday morning may be unusually  tough for many Internet users and businesses. A nasty malware called  DNSChanger Trojan that infected computers and servers internationally will come to a tidy end as the FBI shuts down the infected servers hosting DNS. Unfortunately once these servers shut down an estimated 45,600 users will not be able to connect to the internet and resolving their connectivity issue won’t be easy either. To avoid an unnecessarily manic Monday utilize free tools such as Norton’s Power  Eraser http://security.symantec.com/nbrt/npe.aspx and for Apple systems http://macscan.securemac.com/

Scan systems as soon as possible and even if there is assumed integrity-scan anyways. Monday’s don’t need to be rougher than they already are. 

To read more about  DNSChanger Trojan, Federal Government Acts Against Trojan; Some Users May Lose Internet Access Monday by Ken Presti.

“A DNSChanger Trojan literally changes the infected computer’s DNS settings,” explained Marcus. “When a user opens up a browser and enters a web address, good DNS settings will take you to the proper website. But if you’ve got malicious DNS settings, the criminal can point you to whatever server they want. So it can be used in a lot of nasty and malicious ways. The FBI has taken control of a lot of these malicious servers, and on July 9th, they are going to shut down all of these servers. That means if you open up your browser and you are infected with this malware, you won’t be able to get to the Internet because it won’t be able to resolve your DNS to the correct addresses or anything else.”