by Dovell Bonnett | May 31, 2012 | Data Security, Data Theft Prevention, Identity Theft
Rampant Identity Theft could undermine the right of every citizen to vote. Two separate news stories when combined may have devastating effects on our nation’s sovereignty. The first one discusses how, according to the Identity Theft Resource Center...
by Dovell Bonnett | May 18, 2012 | Book Reviews, Cloud Security, Cyber Security, Cyber Warfare, Data Security, Online Security
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by J. Andress and S. Winterfeld. Cyber warfare is real. That’s why each Friday I will post a review on this book: Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners, and...
by Dovell Bonnett | May 4, 2012 | Book Reviews, Cyber Security, Cyber Warfare, Data Security, Industrial Espionage
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by J. Andress and S. Winterfeld. Cyber warfare is real. That’s why each Friday I will post a review on this book: Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners, and...
by Dovell Bonnett | May 2, 2012 | Cyber Security, Cyber Warfare, Data Security, Password Authentication, Password Management, Power LogOn, Smartcards
Access Smart Announces a New Password Manager for Windows Reseller in Africa Access Smart® is pleased to announce a new Power LogOn – Password Manager for Windows – reseller in Africa. Pure Access IT, LTD, located in Abuja, Nigeria, is adding password...
by Dovell Bonnett | May 1, 2012 | Cloud Security, Cyber Security, Data Security, Identity Theft, Online Security, Social Networking
Google is gathering your personal and corporate data. Google Inc. (GOOG) motto is, “do no harm.” But who defines what is harmful? Employees recently testified to the U.S. Federal Communications Commission that they didn’t initially know that their...
by Dovell Bonnett | Apr 27, 2012 | Book Reviews, Cyber Security, Cyber Warfare, Data Security, Online Security
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by J. Andress and S. Winterfeld Cyber warfare is real. That’s why each Friday I will post a review on this book: Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners, and...
by Dovell Bonnett | Apr 26, 2012 | Cloud Security, Cyber Security, Data Security, Identity Theft, Online Security, Social Networking
Throwing Privacy Out the Window Source: Lifehacker, by Thorin Klosowski I am an extremely private person. I don’t broadcast my location, I use privacy tools to keep advertisers from tracking me, and almost never give any app access to Facebook. Of course, a lot...
by Dovell Bonnett | Apr 23, 2012 | Cloud Security, Cyber Security, Data Security, Multifactor Authentication,, Online Security, Password Authentication, Password Management, Power LogOn
Network Access Authentication using a Magnetic Stripe Card Access Smart®, LLC expands our network access authentication product line for data security. Power LogOn for MagStripe allows any issued magnetic stripe card to be used to log onto a computer and network....
by Dovell Bonnett | Apr 6, 2012 | Book Reviews, Cloud Security, Data Security, Industrial Espionage
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by J. Andress and S. Winterfeld Cyber warfare is real. That’s why each Friday I will post a review on this book: Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners, and...
by Dovell Bonnett | Apr 5, 2012 | Cyber Security, Data Security, Multifactor Authentication,, Password Authentication, Password Management, Smartcards
Network access authentication secures the firewall’s “front door”. We all have been told by IT that network access authentication requires complex passwords, a minimum of ten characters, different passwords for every sites, and changing passwords...