When it comes to cyber authentication, the weakest link is the user. Cyber authentication is a hot topic in today’s world of Malware, Cyber Warfare, BYOD, Cloud Computing and Hackers. In a recent Google Password Management blog, “Google Password Management Tips...
Cyber Security begins with Network Access Authentication My first Law of Computers took a step backwards on November 20, 2012 with the announcement of the Pentagon’s new Cyber Warfare Central proposed by DARPA, Code Name “PlanX”. The Pentagon is giving birth to a...
Network Access Authentication is essential to the Laws of Computers The concept of mechanical devices that will do manual and menial labor can be traced back to Ancient Greece. Whether it’s an automaton by Hephaestus or Honda’s Asimo robot, they all have something in...
Access Smart received their ECCN classification determination number today from the US Dept. of Commerce. We are classified as a 5D992b Information Security Software product which allows Access Smart to ship our Power LogOn software and licenses internationally. Under...
Cyber Crime Protection – Evaluate and Segment Data It only seemed like yesterday that when business owners were asked about network security their focus was on identity theft protection and/or compliance with the different state and federal privacy laws. Those...