When it comes to cyber authentication, the weakest link is the user. Cyber authentication is a hot topic in today’s world of Malware, Cyber Warfare, BYOD, Cloud Computing and Hackers. In a recent Google Password Management blog, “Google Password...
Using the Same Security Products! Ingersoll Rand Security Technologies provides high-quality reader and credential products to customers in both the physical and logical access control markets. All Ingersoll Rand readers and credentials are built on open...
Access Smart received their ECCN classification determination number today from the US Dept. of Commerce. We are classified as a 5D992b Information Security Software product which allows Access Smart to ship our Power LogOn software and licenses internationally....
They Are Just Drawn That Way Paraphrasing a line from Jessica Rabbit from the movie Roger Rabbit seems the appropriate comment from Geoffrey A. Fowler’s article “What’s a Company’s Biggest Security Risk? You.” Hence the headline:...
8.24 Million Passwords and User Names stolen and posted by hackers. If you use the online gaming site Gamigo, if your user name was your email address and you use the same password elsewhere then you need to be very, very concerned. Cyber criminals will now...
Cyber Crime Protection – Evaluate and Segment Data It only seemed like yesterday that when business owners were asked about network security their focus was on identity theft protection and/or compliance with the different state and federal privacy laws....
Multifactor Authentication required by HIPPA & HITECH Access Smart® adds multifactor authentication to McKesson’s Paragon Hospital Information System (HIS) software. Access Smart’s Power LogOn® application requires no modifications to the...
Unfortunately,an estimated 45,600 users will not be able to connect to the internet This coming Monday morning may be unusually tough for many Internet users and businesses. A nasty malware called DNSChanger Trojan that infected computers and servers...
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by J. Andress and S. Winterfeld. Cyber warfare is real. That’s why each Friday I will post a review on this book: Cyber Warfare: Techniques, Tactics and Tools for Security...