Cyber Access Control | MFA Enterprise Password Management | Access Smart

Archive for Smartcard Data Security,

Biometrics Are Less Secure Than Passwords

Biometrics give a false sense of security.

Biometrics authenticationOn Sept 23, 2015, Office of Personnel Management (OPM) revised the number of stolen fingerprint files to 5.6 million! Why should you care?

Some security pundits believe that biometrics are far more secure than passwords. They argue that since everyone has unique identifiers like their voice, iris, face and fingerprints, why not use these to authenticate a user in to a computer network? Sounds logical and from a theoretical perspective, it’s true. But major flaws become apparent during implementation. Read More→

Power LogOn – The Stepping-Stone to PKI

Power LogOn Helps Migrate Companies to PKI Adoption.

Power LogOn Complements PKIIn my many blogs, videos and whitepapers, I discuss how passwords are secure, but their management isn’t. Frequently, cybersecurity specialists believe that I’m pitting my Power LogOn solution against a PKI solution. That is not my intent. In reality, Power LogOn is a stepping-stone to PKI adoption.

This is not a contest of one technology being better than another, but rather matching the right technology to the environmental requirements. For example, what’s the difference between a Ferrari and a Jeep? Both are automobiles, they have engines, tires, seats, etc., and both will get you from point A to B on any paved road. However, you would never take your Ferrari off-roading in the Utah desert, nor would you drive a banged-up jeep to the red carpet at the Oscars. Implementation is about matching the correct vehicle to the environmental requirements. IT must also match the correct cyber authentication solution to the company’s requirements. Read More→

When is a Password like a Private Key?

Password vs KeyMy stance on passwords is well known – “Passwords are secure, people managing them aren’t.” Whenever I make this claim, some computer security pundits vehemently disagree with me. They bring up technologies like PKI, digital certificates, and all the advanced hardware technology, encryption algorithms and infrastructure. Their arguments are true, but why is all this advanced security technology needed? Answer: to protect the cryptographic keys. Read More→

Access Smart Offers New FIPS-Validated Password Management Software

Ladera Ranch, California (Sept. 20, 2013) – Access Smart, LCC is offering their newest password management software called Power LogOn for government agencies, corporations, and business. The product was given a Federal Information Processing Standards (FIPS) 140-2 validation by laboratory InfoGard, a National Institute of Standards and Technology (NIST)-approved laboratory. Read More→

Healthcare Needs Network Access Control Solutions

NeMCMHA implements Access Smart’s Network Access Control Solutions

Network Access Control SoluionsNetwork access control solutions are needed more today than ever before because one of the key components in the Affordable Care Act (Obamacare), the expansion of electronic health records (EHR) and personal health records (PHR) services.  While great debates are going on throughout the country regarding IRS enforcement, using data for political gains and government access to patient records, the elephant in the room is still securely authenticating the access to a person’s health records.  HIPAA and HITECH are not going away.  Plus, according to resent Ponemon Institute’s “2013 Cost of Data Breach Study: Global Analysis” May 2013, healthcare had the highest number of data breach costs in 2012. Read More→