Cyber Access Control | MFA Enterprise Password Management | Access Smart

Archive for PKI

Power LogOn – The Stepping-Stone to PKI

Power LogOn Helps Migrate Companies to PKI Adoption.

Power LogOn Complements PKIIn my many blogs, videos and whitepapers, I discuss how passwords are secure, but their management isn’t. Frequently, cybersecurity specialists believe that I’m pitting my Power LogOn solution against a PKI solution. That is not my intent. In reality, Power LogOn is a stepping-stone to PKI adoption.

This is not a contest of one technology being better than another, but rather matching the right technology to the environmental requirements. For example, what’s the difference between a Ferrari and a Jeep? Both are automobiles, they have engines, tires, seats, etc., and both will get you from point A to B on any paved road. However, you would never take your Ferrari off-roading in the Utah desert, nor would you drive a banged-up jeep to the red carpet at the Oscars. Implementation is about matching the correct vehicle to the environmental requirements. IT must also match the correct cyber authentication solution to the company’s requirements. Read More→

When is a Password like a Private Key?

Password vs KeyMy stance on passwords is well known – “Passwords are secure, people managing them aren’t.” Whenever I make this claim, some computer security pundits vehemently disagree with me. They bring up technologies like PKI, digital certificates, and all the advanced hardware technology, encryption algorithms and infrastructure. Their arguments are true, but why is all this advanced security technology needed? Answer: to protect the cryptographic keys. Read More→

Password Manager for Windows in Africa

Access Smart Announces a New Password Manager for Windows Reseller in Africa

enterprise password managerAccess Smart® is pleased to announce a new Power LogOn – Password Manager for Windows – reseller in Africa. Pure Access IT, LTD, located in Abuja, Nigeria, is adding password manager for Windows to their extensive line of IT services. The addition of Power LogOn provides Pure Access IT customers with a complete secure network solution.

With data breaches and identity theft at epidemic levels, businesses and government agencies need network access authentication to identify a person prior to them getting past the firewall. Passwords are the most common way people use to log onto a computer, network and internet; but, the way individuals choose, use and manage their passwords makes them vulnerable to attack. Power LogOn delivers a secure means to manage passwords with multi-factor authentication, plus user convenience  of never having to remember, type or know their passwords. Power LogOn can also be tied in to Active Directory to keep IT as the central manager of access rights and privileges.

“Secure user authentication should never be a luxury and never a barrier to preventing cyber-attacks,” said Dovell Bonnett, Founder and CEO of Access Smart. “We are so pleased to have Pure Access IT as a strong partner.”

Pure Access IT Ltd is a multi-disciplined information technology integrator that offers IT solutions, training as well as expert implementation of the best technologies for website architecture and design, data access, transactions, Internet Service provision and information security. We work with leading companies to deliver to government and businesses at the highest level of technology, integration, and services. Pure Access is also engaged in the provision of software outsourcing services. Today hundreds of small and medium sized businesses including Government rely on the superior technical expertise of the Pure Access Team to support their Systems, network infrastructures, and to provide the necessary support to keep their businesses running.

“Access Smart adds those additional layers of security, low cost of ownership and user convenience needed to authenticate the user,” said Wasiu Olatundun, CEO of Pure Access IT.

Please contact Access Smart or Pure Access IT for more information.


Google may be doing Harm

Google is gathering your personal and corporate data.

Cloud security Google Inc. (GOOG) motto is, “do no harm.” But who defines what is harmful? Employees recently testified to the U.S. Federal Communications Commission that they didn’t initially know that their mapping-service project software was gather personal data, even though an undisclosed engineer told a few fellow workers. The software would access payload data like e-mails, text messages, passwords, internet-usage, and other highly sensitive personal information. The FCC ended up not penalizing Google for data gathering, but assessed a $25,000 fine for not cooperating with the FCC during the initial inquiry. The fine would not even be considered a slap on the wrist. Read More→

Cyber Warfare: Chapter 5

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by J. Andress and S. Winterfeld

Cyber warfare is real. That’s why each Friday I will post a review on this book: Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners, and today I am sharing what I am reading in…

Chapter 5: Logical Weapons.Cyber Warfare Techniques Tactics and Tools for Security Practitioners - Book review by Dovell Bonnett of Access

This chapter is chocked full of valuable information. Instead of going through the details of all the tools discussed, I think that startling insight into the defense of these attack tools is more important. I do, however, strongly suggest your read this chapter to get a better perspective on the types and capabilities of the available logical access weapons.

The weapons or tools available to cyber warriors are vast and many are free and open sourced. The non-government and non-military attackers are using common or customized tools. At times the same tools used to investigate an attack are also the same tools used to attack. While many may believe that the government and military warriors have highly specialized tools, the authors suggest that they are using some of the same commercially available tools.

Read More→