Cyber Access Control | MFA Enterprise Password Management | Access Smart

Archive for data security products

Six Easy Tips to Reduce Cybersecurity Vulnerabilities.

Corporate cybersecurity policies and procedures must come first.

CybersecurityThe news bombards us with the latest cyber-attack stories. Being aware of potential attacks is important, but what can a business owner do? Are you worried that cybersecurity vendors are going to try to exploit these attacks to sell you their products? Are you afraid that IT will ask for more money? Do you just keep doing what you are currently doing and hope a cyberattack never happens to you?

Investing in cybersecurity is important; however, you can’t afford to make a snap security decision based on fear that will do little to no good. Nor can you hope it will never happen to you. Cybersecurity is not all about new technologies. Often a change in policies and business practices can have a greater impact on your bottom line. Before you bring out the checkbook, here are six tips that costs very little, but have high security impact. Read More→

Power LogOn – The Stepping-Stone to PKI

Power LogOn Helps Migrate Companies to PKI Adoption.

Power LogOn Complements PKIIn my many blogs, videos and whitepapers, I discuss how passwords are secure, but their management isn’t. Frequently, cybersecurity specialists believe that I’m pitting my Power LogOn solution against a PKI solution. That is not my intent. In reality, Power LogOn is a stepping-stone to PKI adoption.

This is not a contest of one technology being better than another, but rather matching the right technology to the environmental requirements. For example, what’s the difference between a Ferrari and a Jeep? Both are automobiles, they have engines, tires, seats, etc., and both will get you from point A to B on any paved road. However, you would never take your Ferrari off-roading in the Utah desert, nor would you drive a banged-up jeep to the red carpet at the Oscars. Implementation is about matching the correct vehicle to the environmental requirements. IT must also match the correct cyber authentication solution to the company’s requirements. Read More→

Christmas Cyber Attack – Who’s to Blame?

A cyber attack Scrooged Christmas. Treat security as a process – not as a product!

cyber attack

 In reading articles about the resent Christmas cyber attacks, the authors’ key take away is that global companies are extremely vulnerable to cyber-attacks and data losses.  Guess what, so too are the small and medium size businesses.  Every business, healthcare service, government agency and educational institution is vulnerable since they all use many of the same technology components. So who’s to blame

 These last few weeks I have been asking the questions: “Who do you think should be held accountable for all the cyber breaches: the Merchants or the Technology companies?”  The responses have been most enlightening. Some blame the business owners, others the IT managers, some the technology companies, and some say all the above. Read More→

Cyber Security Magazine on Apple’s Newsstand

CAC – Cyber Security for the Business Owner

Network Access ControlAccess Smart announces the release of their new CAC (Cyber Access Control) Magazine. CAC is an online magazine for business owners, professionals and any other non-techies who want to understand the threats, the risks and the costs associated with computer and network (cyber) security.  It is often said that a strong offense is a great defense.  Business owners need to know the whos, hows and whys of cyber security in order to mount that great defense.  Data is the new world currency.

Everyday more and more news sites flood the headlines about cyber-attacks.  It doesn’t matter if it’s done by hackers, organized criminals, government agencies or your own employees stealing the data; by law, your company is liable for protecting customers’ private information.  Read More→

Power LogOn – Two Cybersecurity Modes

cybersecurity Mutifactor AuthenticationMultifactor Authentication Cybersecurity

Power LogOn offers IT the flexibility to determine how best to implement multifactor authentication cybersecurity. It has always been Access Smart’s belief that Power LogOn should allow custom configurations to meet a company’s security policy, and not force a company to change their security policy because of a product’s limitations.

Power LogOn can operate in either On-Card Mode or Server Mode. This flexibility allows Power LogOn to be installed in a small office to a large multi-international corporation. It’s the same product. So as a company grows they can use the same Power LogOn software to migrate from one mode to another.

I just finished our latest video on Power LogOn Administrator On-Card Mode. In this video you will understand where On-Card Mode is best placed. Please watch the video and contact us if you would like to know how Power LogOn best works in your business.

Link to Video