Know your Password Manager
Last week the cybersecurity industry was a buzz about the Boston-based company LogMeIn, Inc purchasing LastPass for $125M. In the different news articles some interesting facts were quoted:
- Only 10 percent of knowledge workers today use a password manager
- Only 37 percent of survey participants use passwords that contain both letters and numbers
- Nearly 64 percent of people who use the Internet deploy the same password for most websites
- Nearly 80 percent of cloud-based services and apps have monitored, sensitive or private information
- 35 percent intend to adopt a password manager in the next 12 months
While these are staggering statistics, it’s the last one I want to address. That’s because not all password managers are the same. You need to understand the differences before you deploy. Read More→
Access Smart® Improves Cybersecurity With Power LogOn.
LADERA RANCH, CA. June 15, 2015 – Access Smart, LLC today announced that the Power LogOn software now supports Microsoft Azure. Power LogOn adds an extra layer of cybersecurity during the initial logon process to Azure. Azure provides Power LogOn customers with an efficient cloud solution, keeping data available with improved security.
Because cybersecurity needs to start before the firewall, Access Smart complements Azure by adding on a security-enhanced password manager. To access the power of Azure, employees don’t need to type in their user name and password. The greatest security threat to any company is the employee managed user names and passwords. By removing this cybersecurity vulnerability, Power LogOn puts the control of sensitive data back in the hands of IT professionals. Read More→
Power LogOn Helps Migrate Companies to PKI Adoption.
In my many blogs, videos and whitepapers, I discuss how passwords are secure, but their management isn’t. Frequently, cybersecurity specialists believe that I’m pitting my Power LogOn solution against a PKI solution. That is not my intent. In reality, Power LogOn is a stepping-stone to PKI adoption.
This is not a contest of one technology being better than another, but rather matching the right technology to the environmental requirements. For example, what’s the difference between a Ferrari and a Jeep? Both are automobiles, they have engines, tires, seats, etc., and both will get you from point A to B on any paved road. However, you would never take your Ferrari off-roading in the Utah desert, nor would you drive a banged-up jeep to the red carpet at the Oscars. Implementation is about matching the correct vehicle to the environmental requirements. IT must also match the correct cyber authentication solution to the company’s requirements. Read More→
Accept it; cyber-attacks are happening to your company too.
You may have seen in the news that LivingSocial recently experienced a cyber-attack where 50 million customers’ name, email address and password were exposed. While that news typically makes the headlines, what is not being emphasized is everything that LivingSocial did right to safeguard their customer’s personal data.
Accept it; cyber-attacks are happening to your company too. The hacker’s strategy is to prey on the psychology of employees. Spear phishing, watering hole attacks, social media and poisoned SEO sites s are just some of the weapons of choice. According to Symantec, businesses in 2012 with 2,500 or fewer employees were the targets of 50 percent of the attacks, and those businesses with fewer than 250 employees accounted for 31 percent of the attacks. Here are some other 2012 statistics to confirm the statement that, “there are two types of businesses, those that have been hacked and those that don’t know it yet:” Read More→