Biometrics give a false sense of security. On Sept 23, 2015, Office of Personnel Management (OPM) revised the number of stolen fingerprint files to 5.6 million! Why should you care? Some security pundits believe that biometrics are far more secure than passwords. They...
CAC – Cyber Security for the Business Owner Access Smart announces the release of their new CAC (Cyber Access Control) Magazine. CAC is an online magazine for business owners, professionals and any other non-techies who want to understand the threats, the risks and...
87% of all business owners who seriously inquire about Power LogOn® end up buying it. Before I go into why, here are some new findings from Javelin Strategy & Research’s latest report 2013 Identity Fraud Report: Data Breaches Becoming a Treasure Trove for...
When it comes to cyber authentication, the weakest link is the user. Cyber authentication is a hot topic in today’s world of Malware, Cyber Warfare, BYOD, Cloud Computing and Hackers. In a recent Google Password Management blog, “Google Password Management Tips...
Network Access Authentication is essential to the Laws of Computers The concept of mechanical devices that will do manual and menial labor can be traced back to Ancient Greece. Whether it’s an automaton by Hephaestus or Honda’s Asimo robot, they all have something in...
Mark Zuckerberg, Did you miss the class discussing “Privacy” at Harvard? As you fill your Facebook account with family. friend and new contacts, it is obvious that Privacy is not a word that Facebook cares about or understands. In some recent articles...