Passwords will never die! White House cybersecurity coordinator Michael Daniel stated at the 9th annual Identity Ecosystem Steering Group’s conference, “I often say that one of my key goals in my job that I would really love to be able to do is to kill the...
GSA Schedule Contract Awarded to Access Smart® to purchase of multifactor cybersecurity IT products. Ladera Ranch, CA – June 2, 2014 – Access Smart, LLC, a leading supplier of logical access control solutions (LACS), wins a General Service...
CAC – Cyber Security for the Business Owner Access Smart announces the release of our second issue of CAC (Cyber Access Control) Magazine. The second issue of CAC focuses on the security concerns that healthcare providers face to protect patient medical...
Heartbleed is very dangerous, but not to Power LogOn. This week the cyber security community has been a buzz about the OpenSSL vulnerability and the Heartbleed bug. This is a very serious problem and tech companies are scrambling to plug the holes, get patches...
You don’t have to be an IT sepecialist to offer your customers cyber access security. If you are interested in combining physical access with cyber access contol then please drop by the Allegion booth (#20031) at the ISC West show in Las Vegas for a live...
Cyber Security and Physical Access on One Card. Visit us at the Allegion Booth #20031 Security experts agree that multi-factor authentication is the best way to safeguard against a cyber attack. Now businesses, agencies and institutions can secure the two most...
A cyber attack Scrooged Christmas. Treat security as a process – not as a product! In reading articles about the resent Christmas cyber attacks, the authors’ key take away is that global companies are extremely vulnerable to cyber-attacks and data...
CAC – Cyber Security for the Business Owner Access Smart announces the release of their new CAC (Cyber Access Control) Magazine. CAC is an online magazine for business owners, professionals and any other non-techies who want to understand the threats, the risks...
The Culprit: Cut-and-Paste Command I finished reading an interesting article in Modern Healthcare by Joe Carlson, “Feds eye crackdown on cut-and-paste EHR fraud.” The premise is that “cut-and-paste” invites fraudulent duplication of...
By Microsoft, the FBI, Europol and industry partners. It’s about Time! In the past I have written many blogs about how software companies and OS developers need to start taking security more seriously. While Microsoft has been a focus of mine, it...