Why Your Business Requires Security

The States and Federal Identity Theft and Privacy Protection Laws now require businesses, agencies and organizations of all sizes to protect all personal information they store, and report to all their customers whenever a breach occurs. The financial ramifications after having a data breach can be very substantial to both present and future business. In some many cases a company never does recover from a breach and is forced to close down. Currently, the average cost on a company is $3.7M per incident.

Author Archive

Oct
05

“So many paper shredders, but what’s right for me?”

Posted by: | Comments Comments Off on “So many paper shredders, but what’s right for me?”

FACTA requires secure disposal of documents that contains a customer’s or employee’s personal information. Shredding is one of the easiest ways to start protecting your company from a violation. With so many different shredders and options on the market, Nancy Heaton of Fellowes will help explain how to match the shredder to your business environment.

Click here to listen to the interview with Nancy Heaton: Fellows

Comments Comments Off on “So many paper shredders, but what’s right for me?”
Oct
01

Bogus Receipts by Email

Posted by: | Comments Comments Off on Bogus Receipts by Email

As we do more online business and commerce, we expect to receive a receipt for our purchases: Amazon, iTunes, etc. Well the thieves and spammers know this too and they are sending our bogus receipts with a high dollar amount just to catch your attention. A key clue that it is a scam is when you move your mouse cursor over the link, if you don’t recognize the web address displayed then odds are it is spam. Don’t fall for the scam and certainly don’t click on the links. Here are some tips to protect you: Read More→

Comments Comments Off on Bogus Receipts by Email
Sep
30

Access Smart Partners with Stamps.com

Posted by: | Comments Comments Off on Access Smart Partners with Stamps.com

Access Smart® Partners with Stamps.com® to offer smartcard-based, password management solution

Reduce your shipping costs while securing your desktop post office  

 Ladera Ranch, CA – Sept. 30, 2010Access Smart today announced its partnership with Stamps.com (NASDAQ:STMP), the leading provider of USPS® postage online and shipping software solutions. With its multi-factor smartcard, Power LogOn by Access Smart provides a convenient, affordable and easy-to-use way for customers to manage their Stamps.com passwords. Read More→

Comments Comments Off on Access Smart Partners with Stamps.com
Sep
27

Two-Factor, Password Management is Manditory

Posted by: | Comments Comments Off on Two-Factor, Password Management is Manditory

IT Security is raising the level of password length from 8 to 13 characters or higher.

This puts more burden on the employee to manage their secure passwords. Stronger passwords without management tools will force users to come up with their own methods. That is why companies need to seriously invest in strong password manager solutions if they want to prevent data breaches. But with different versions on the market how do you choose? Here are just a few key features to consider: Read More→

Comments Comments Off on Two-Factor, Password Management is Manditory
Sep
23

Corporate Network Security Technology Comparison

Posted by: | Comments Comments Off on Corporate Network Security Technology Comparison

A few years ago, many of us had only a few passwords to remember. Today, we have dozens. Corporate networks have become virtually impossible to use today without passwords. On top of this, “IT’s best security practice” requires that employees change passwords frequently and use long, complex passwords. Unfortunately, this has encouraged poor password management habits that lead to security breaches, privacy violations and huge fines.

IT managers have a host of secure, authentication technologies available to safeguard corporate networks. Alongside Smartcard-based Password Managers are One-Time Password (OTP), Certificate-based Logon (PKI), and server-based Single Sign-On (SSO) all targeted to solve the “password problems”. Read More→

Comments Comments Off on Corporate Network Security Technology Comparison
FLEXCAP
SiteLock