You don’t have to be an IT sepecialist to offer your customers cyber access security. If you are interested in combining physical access with cyber access contol then please drop by the Allegion booth (#20031) at the ISC West show in Las Vegas for a live...
A cyber attack Scrooged Christmas. Treat security as a process – not as a product! In reading articles about the resent Christmas cyber attacks, the authors’ key take away is that global companies are extremely vulnerable to cyber-attacks and data...
CAC – Cyber Security for the Business Owner Access Smart announces the release of their new CAC (Cyber Access Control) Magazine. CAC is an online magazine for business owners, professionals and any other non-techies who want to understand the threats, the risks...
By Microsoft, the FBI, Europol and industry partners. It’s about Time! In the past I have written many blogs about how software companies and OS developers need to start taking security more seriously. While Microsoft has been a focus of mine, it...
Salted Hash – The one-way encryption for password security. Ok, I’m not talking about that potato hash you love with your eggs. I am talking about the encryption hash that needs to be used to safeguard computer data files like passwords....
87% of all business owners who seriously inquire about Power LogOn® end up buying it. Before I go into why, here are some new findings from Javelin Strategy & Research’s latest report 2013 Identity Fraud Report: Data Breaches Becoming a Treasure Trove...