Why Your Business Requires Security

The States and Federal Identity Theft and Privacy Protection Laws now require businesses, agencies and organizations of all sizes to protect all personal information they store, and report to all their customers whenever a breach occurs. The financial ramifications after having a data breach can be very substantial to both present and future business. In some many cases a company never does recover from a breach and is forced to close down. Currently, the average cost on a company is $3.7M per incident.

Archive for Business Security

Oct
10

Tips on how to create a strong password

Posted by: | Comments Comments Off on Tips on how to create a strong password

Uniblue (www.uniblue.com) recently posted the following arcticle on password security. While all their points are spot on, there still is one hole: How is someone expected to manage all these security tips? Answer: Power LogOn by Access Smart. (www.access-smart.com).

Uniblue Article:

(October 2010) Choosing a strong password is of great importance to everyone. However, it is not always easy to know what makes a strong and secure password which would leave hackers empty handed and reduce the potential of being a victim of other online threats. Read More→

Comments Comments Off on Tips on how to create a strong password
Oct
05

“So many paper shredders, but what’s right for me?”

Posted by: | Comments Comments Off on “So many paper shredders, but what’s right for me?”

FACTA requires secure disposal of documents that contains a customer’s or employee’s personal information. Shredding is one of the easiest ways to start protecting your company from a violation. With so many different shredders and options on the market, Nancy Heaton of Fellowes will help explain how to match the shredder to your business environment.

Click here to listen to the interview with Nancy Heaton: Fellows

Comments Comments Off on “So many paper shredders, but what’s right for me?”
Sep
30

Access Smart Partners with Stamps.com

Posted by: | Comments Comments Off on Access Smart Partners with Stamps.com

Access Smart® Partners with Stamps.com® to offer smartcard-based, password management solution

Reduce your shipping costs while securing your desktop post office  

 Ladera Ranch, CA – Sept. 30, 2010Access Smart today announced its partnership with Stamps.com (NASDAQ:STMP), the leading provider of USPS® postage online and shipping software solutions. With its multi-factor smartcard, Power LogOn by Access Smart provides a convenient, affordable and easy-to-use way for customers to manage their Stamps.com passwords. Read More→

Comments Comments Off on Access Smart Partners with Stamps.com
Sep
23

Corporate Network Security Technology Comparison

Posted by: | Comments Comments Off on Corporate Network Security Technology Comparison

A few years ago, many of us had only a few passwords to remember. Today, we have dozens. Corporate networks have become virtually impossible to use today without passwords. On top of this, “IT’s best security practice” requires that employees change passwords frequently and use long, complex passwords. Unfortunately, this has encouraged poor password management habits that lead to security breaches, privacy violations and huge fines.

IT managers have a host of secure, authentication technologies available to safeguard corporate networks. Alongside Smartcard-based Password Managers are One-Time Password (OTP), Certificate-based Logon (PKI), and server-based Single Sign-On (SSO) all targeted to solve the “password problems”. Read More→

Comments Comments Off on Corporate Network Security Technology Comparison
Sep
18

Passwords are More Secure than Biometrics for Network Security

Posted by: | Comments Comments Off on Passwords are More Secure than Biometrics for Network Security

A Hewlett-Packard’s white paper “HP ProtectTools: Authentication technologies and suitability to task“, 06/2005, does a very good job discussing the different security technologies available (Passwords, Trusted Platform Module, smartcard USB token, biometric fingerprints and virtual tokens) to authenticate a user to a computer or network. I was particularly drawn to the concluding chart (see below) where it compares the “Level of Security” vs. “Administration Complexity”. Read More→

Comments Comments Off on Passwords are More Secure than Biometrics for Network Security
FLEXCAP
SiteLock