by Dovell Bonnett | Sep 25, 2015 | Cloud Security, Cyber Security, Cyber Warfare, Data Security, Identity Theft
Biometrics give a false sense of security. On Sept 23, 2015, Office of Personnel Management (OPM) revised the number of stolen fingerprint files to 5.6 million! Why should you care? Some security pundits believe that biometrics are far more secure than passwords. They...
by Dovell Bonnett | Jan 25, 2014 | Cloud Security, Company Updates, Cyber Security, Data Security, Data Theft Prevention, Identity Theft, Industry News, Logical Access Control (LAC), Multifactor Authentication,, Network Access Control (NAC), Online Security, Password Authentication, Password Management, Physical Access Control (PAC), Power LogOn
CAC – Cyber Security for the Business Owner Access Smart announces the release of their new CAC (Cyber Access Control) Magazine. CAC is an online magazine for business owners, professionals and any other non-techies who want to understand the threats, the risks and...
by Dovell Bonnett | Nov 15, 2013 | Cloud Security, Cyber Security, Data Security, Identity Theft, Power LogOn
87% of all business owners who seriously inquire about Power LogOn® end up buying it. Before I go into why, here are some new findings from Javelin Strategy & Research’s latest report 2013 Identity Fraud Report: Data Breaches Becoming a Treasure Trove for...
by Dovell Bonnett | Dec 13, 2012 | Cloud Security, Cyber Security, Cyber Warfare, Data Security, Identity Theft, Multifactor Authentication,, Online Security, Password Authentication, Password Management, Social Networking
When it comes to cyber authentication, the weakest link is the user. Cyber authentication is a hot topic in today’s world of Malware, Cyber Warfare, BYOD, Cloud Computing and Hackers. In a recent Google Password Management blog, “Google Password Management Tips...
by Dovell Bonnett | Nov 28, 2012 | Cloud Security, Cyber Security, Cyber Warfare, Data Security, Identity Theft, Multifactor Authentication,, Online Security, Password Authentication, Password Management
Network Access Authentication is essential to the Laws of Computers The concept of mechanical devices that will do manual and menial labor can be traced back to Ancient Greece. Whether it’s an automaton by Hephaestus or Honda’s Asimo robot, they all have something in...
by Dovell Bonnett | Nov 10, 2012 | Cyber Security, Identity Theft, Social Networking
Mark Zuckerberg, Did you miss the class discussing “Privacy” at Harvard? As you fill your Facebook account with family. friend and new contacts, it is obvious that Privacy is not a word that Facebook cares about or understands. In some recent articles...