Cyber Access Control | MFA Enterprise Password Management | Access Smart

Archive for cyber warfare

ZeroAccess botnet disrupted

By Microsoft, the FBI, Europol and industry partners. It’s about Time!

Cyber Access ControlIn the past I have written many blogs about how software companies and OS developers need to start taking security more seriously.  While Microsoft has been a focus of mine, it seems that they are finally being proactive.  While there new Digital Crime Unit is important, they also need to start reworking an entirely new operating system from scratch with no backward compatibility to DOS or older versions of Windows.  The Operating System should start from a security stance and then build in functionality.  Plus, the rollout can be limited to get other software companies to make changes to their programs, but in five years “Patch Tuesdays” should be a footnote in history books.

The following is an excerpt from a recent Microsoft press release on ZeroAccess. Read More→

Businesses Can Stop Identity Theft

87% of all business owners who seriously inquire about Power LogOn® end up buying it. Before I go into why, here are some new findings from Javelin Strategy & Research’s network access authentication partners for Access Smartlatest report 2013 Identity Fraud Report: Data Breaches Becoming a Treasure Trove for Fraudsters:

  • Identity fraud incidents and amount stolen increased—The number of identity fraud incidents increased by one million more consumers over the past year, and the dollar amount stolen increased to $21 billion, a three-year high but still significantly lower than the all-time high of $47 billion in 2004. This equates to 1 incident of identity fraud every 3 seconds. Read More→

Are your customers asking you for a Logical Access Solution?

Looking for a Logical Access Partner to handle all the IT concerns?

Logical AccessWe had a great presence at the ISC West 2013 conference in Las Vegas.  One recurring theme we heard from ID resellers was their desire to offer their existing customers a value add, card based, logical access solution for network security. 

I want to help you secure these new logical access business opportunities.

Companies, healthcare and government agencies are looking for multifactor cyber access control because of the increase in data breaches, implementation of privacy laws like HITECH, HIPPA and CJIS, and their overall concern for network security.  Our Power LogOn cyber access control allows you to add logical access to almost any type of ID badge your currently sell. And best of all, it only takes a few hours to install.

Access Smart wants to be your IT security partner.  It is our policy to work with you so you can offer your customers a multi-factor cyber access control solution.  Here is my promise to you:

     1.  You retain full ownership of your customer.

     2.  You will be a reseller of our Power LogOn.

     3.  We will assist you and your customer on all IT integration, training and support.

Logical access control does not need to be scary, cumbersome, or expensive when you have a partner with 20-years of industry experience.  If you are interested in expanding your business, up selling your existing customers and increasing revenue at no risk to your business, then please call me to learn more.

Data security begins with cyber access control. Cyber access control begins with Power LogOn.

 

Keep up with Cyber Access Control by subscribing to our blog headlines.

Best regards,

Dovell Bonnett
Founder and CEO
Access Smart, LLC
E: Dovell@access-smart.com
W: www.access-smart.com
P: 949-218-8754

Cyber Warfare Protection Start With Cyber Authentication

Cyber Security begins with Network Access Authentication

Network Access AuthenticationMy first Law of Computers took a step backwards on November 20, 2012 with the announcement of the Pentagon’s new Cyber Warfare Central proposed by DARPA, Code Name “PlanX”.  The Pentagon is giving birth to a brand new, baby branch. Besides the Army, Navy, Air Force, Marines and Coast Guard we now have the Geeks. I wonder if their anthem will be the theme from Star Trek and the service men and woman will use the famous “three finger salute” to honor each other.

The DARPA proposal states:

DARPA is soliciting innovative research proposals in the area of understanding, planning, and managing military cyber operations in real-time, large-scale, and dynamic network environments. Plan X will conduct novel research into the nature of cyber warfare and support development of fundamental strategies needed to dominate the cyber battlespace. Proposed research should investigate innovative approaches that enable revolutionary advances in science, devices, or systems. Specifically excluded is research that primarily results in evolutionary improvements to the existing state of practice.

Cyberspace is the new battlefield as I blogged about earlier. Identity theft has migrated into cyber warfare. It’s no longer about governments attacking governments, armies against armies, or radicals against governments. Everyone and everything is a target: civilians, corporations and infrastructure are part of the cyber battlefield. The cyber warriors are found in their home basements, internet cafes, etc..

Network access has to begin before the firewall. Plan X only emphasizes the demand to implement my second Law of Computers – Law #2: Computers must first positively authenticate the user, determine that user’s rights and privileges, and leave an accountability record before executing its programs.

 

See FoxNews article, Inside ‘Plan X’:’ The Pentigon’s Plan for cyberweapon central for more cyber warfare information

Dovell’s Three Laws of Computers

Network Access Authentication is essential to the Laws of Computers

Laws of Computers

The concept of mechanical devices that will do manual and menial labor can be traced back to Ancient Greece. Whether it’s an automaton by Hephaestus or Honda’s Asimo robot, they all have something in common, a human-written program that controls the machine’s behaviors and actions. In a 1942 short story “Runaround,” Isaac Asimov first introduced the “Three Laws of Robotics” that is accepted as gospel among roboticists. As recently as 2011, the Engineering and Physical Sciences Research Council (EPRSC) and the Arts and Humanities Research Council (AHRC) of Great Britain jointly published a set of five ethical “principles for designers, builders and users of robots” that built off of Asimov’s laws. But what is a robot?

Robots are basically computers with mechanical appendages that give them some form of mobility. There seems to be no consensus on which machines actually qualify as a robot, but many designs seem to mimic humans or animals. While Isaac thought it necessary to write laws for a fictitious device and the EPRSC published their five laws, the “brain” controlling robots is left to total anarchy: The Computer. There needs to be Three Laws of Computers.

Computers, unlike robots, are all around us. They help in cooking our food, powering our homes, communicating around the world, and traveling to the far reaches of space. Young kids today are more adept with a mouse than a pencil. Computers are being used for good things like producing clean drinking water to terrible things like spinning uranium to create nuclear weapons. With all its uses, it seems odd that the founders of the computer age – Charles Babbage,  Calvin Gotlieb, Michael Dell, Tom Watson, Steve Jobs, Bill Gates, Dr. Wang, Hewlett or Packard to name a few – never saw the need to write any Laws of Computers.

If robots are just mechanical extensions of computers, and a computer controls the robot’s actions, movements and tasks, then before one has laws on robotics shouldn’t there first be laws governing computers? Therefore, I have taken it upon myself to publish:

Dovell’s Three Laws of Computers.

 Law #1: Computers must not, or allow other computers to, harm humans or other sentient life forms as they complete their series of commands (program) given to it.

 Law #2: Computers must first positively authenticate the user, determine that user’s rights and privileges, and leave an accountability record before executing its programs.

 Law #3: Computers must automatically learn, configure and remember how each human wants it to behave and then instantly recall that configuration every time that human accesses it.

Read More→