ID Card News

Hacking and 2FA - Free White Paper
A lot of people think PKI using SmartCards and Certificate Authorities is the only way to go. It works, but it is complex and requires significant IT resources to maintain. ...
Hacking and 2FA - Free White Paper
A lot of people think PKI using SmartCards and Certificate Authorities is the only way to go. It works, but it is complex and requires significant IT resources to maintain. ...

6 ways your passwords are stolen
If you lose your password to a criminal, your entire existence can be re-written, compromised, duplicated, and used against you.
6 ways your passwords are stolen
If you lose your password to a criminal, your entire existence can be re-written, compromised, duplicated, and used against you.

How do I protect my computer from hackers?
There are steps you can take to protect your information. Your ID card can be the key.
How do I protect my computer from hackers?
There are steps you can take to protect your information. Your ID card can be the key.

5 steps to a better Cyber Risk Management strategy
Information needs protecting! If one of your PCs is stolen, the cheapest part of the loss is the hardware. On average, it costs $509,000 USD in post-breach notification costs alone.
5 steps to a better Cyber Risk Management strategy
Information needs protecting! If one of your PCs is stolen, the cheapest part of the loss is the hardware. On average, it costs $509,000 USD in post-breach notification costs alone.

What is Two Factor Authentication?
Compromised PCs and networks lead to data theft, costing an average $201 USD per record lost. Two Factor authentication solutions can make your organization data-breach resistant.
What is Two Factor Authentication?
Compromised PCs and networks lead to data theft, costing an average $201 USD per record lost. Two Factor authentication solutions can make your organization data-breach resistant.

3 reasons why you need to lock your Windows™
Every single day, valuable business and personal information is stolen by criminals impersonating real people. Pathetically weak passwords are a serious threat.
3 reasons why you need to lock your Windows™
Every single day, valuable business and personal information is stolen by criminals impersonating real people. Pathetically weak passwords are a serious threat.