Corporate cybersecurity policies and procedures must come first. The news bombards us with the latest cyber-attack stories. Being aware of potential attacks is important, but what can a business owner do? Are you worried that cybersecurity vendors are going to try to...
Pass the Hash Protections. Last week I attended the BSide LA hackers’ conference to discuss that passwords are secure. At first, some of the attendees scoffed at my claim. I then went on to explain that it’s the management of passwords and the way some IT...
HTTPS Everywhere safeguards our visitors from malware. Access Smart, LLC, a leading supplier of Cyber Access Control solutions, moves their website from the standard, unsecure Hypertext Transfer Protocol (HTTP) to the Hypertext Transfer Protocol Secure (HTTPS) web...
You don’t have to be an IT sepecialist to offer your customers cyber access security. If you are interested in combining physical access with cyber access contol then please drop by the Allegion booth (#20031) at the ISC West show in Las Vegas for a live...
A cyber attack Scrooged Christmas. Treat security as a process – not as a product! In reading articles about the resent Christmas cyber attacks, the authors’ key take away is that global companies are extremely vulnerable to cyber-attacks and data...
CAC – Cyber Security for the Business Owner Access Smart announces the release of their new CAC (Cyber Access Control) Magazine. CAC is an online magazine for business owners, professionals and any other non-techies who want to understand the threats, the risks...
By Microsoft, the FBI, Europol and industry partners. It’s about Time! In the past I have written many blogs about how software companies and OS developers need to start taking security more seriously. While Microsoft has been a focus of mine, it...
Salted Hash – The one-way encryption for password security. Ok, I’m not talking about that potato hash you love with your eggs. I am talking about the encryption hash that needs to be used to safeguard computer data files like passwords....
Power LogOn® meets US Government’s FIPS 140-2 requirement for networks access control Government regulations mandate agencies to implement multi-factor authentication for secure network access control (NAC). User names and passwords are still the most...
HIPAA Healthcare Data Breach Fines Climb With Enforcement Boost Re-Post By Robert Westervelt, CRN 1:48 PM EST Tue. Jan. 08, 2013 Millions of dollars in fines associated with alleged violations of the Health Insurance Portability and Accountability Act have been doled...