Industry surveys claim that 81% of all hacking related breaches are caused by weak and stolen passwords. We can’t just blame the hacker because hackers are just capitalizing on the most overlooked IT security flaw … user-managed passwords. I recently...
Ladera Ranch, CA – Sept. 15, 2018 – Access Smart LLC, provider of innovative multi-factor authentication, IT Centralized, password management cyber access control systems, recently announced our relocation from Southern California to Austin, TX....
LADERA RANCH, Calif., May 16, 2018 — Access Smart LLC, provider of innovative multi-factor authentication and logical access security control systems, announces a partnership with NCN Technology (NCN), a provider of web and mobile development services who is now...
Cybersecurity Tech Accord Microsoft, Cisco, Facebook, HP, Nokia, Oracle and others vow to move cybersecurity forward and defend all of their customers worldwide against cyber warfare. Overall, the Tech Accord covers four core areas— stronger defense,...
Silo cybersecurity creates “vulnerability gaps” which hackers exploit How many cybersecurity news articles and blogs have you read about how IT Managers can prevent a cyber-attack on their company’s network? One author promotes Multi-Factor...
Power LogOn Secures Multi-Factor Authentication Before Bootup and the Firewall LADERA RANCH, California—Access Smart, LLC today announced that its Power Logon Multi-Factor Authentication and Password Management System was voted “Best Security”...
DFARS 252.204-7012 Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017 As with most government documents, one often leads to another. And that’s the case with DFARS 252.204-7012 . “DFARS” (the Defense Federal Acquisition...
Don’t believe the numbers without first understanding the problem. There has been a lot of cyber companies putting out their spin regarding Verizon’s April 2017 Data Breach Investigation Report (DBIR) . In the report they claim, “81% of the tactics...
Position Paper: US Government’s Cybersecurity Procurement I am asking that Congress instruct the General Services Administration (GSA) to develop procurement codes under Schedule 70 specifically for the purchase of Cybersecurity hardware and software products....
“Kill Biometrics” is as silly as “Kill Passwords” Sounds silly, right? It is. And it’s just as silly to say “kill passwords.” Here’s why. Currently, there are only three recognized “factors” – something...