ACCESS CONTROL

A high proportion of data theft and security breaches occur internally within your own premises, so it makes sense to tighten up on passwords.

But how do you ensure passwords are not written on the PC, kept inside the user's desk or are so obvious anyone can guess them?

One way is to not use typed passwords but add an interface to your IT system that replaces memory dependent passwords with tokens.

These tokens can be:
Small plug-in devices uniquely issued to a member of staff that if not used denies access to systems.

SmartCard Readers - no card, no access.

Existing Proximity and ID Cards used within your organisation to grant access to your building, areas within your premises or for "clocking-in" that avoid duplication of cards.

Biometrics solutions

Some systems may utilise a token not only to deny access to the PC itself but to deny access to data that has been encrypted where no key, means no readable access to the data. For information on this, see the section on Encryption.

ID, Prox or Credit Card Keyboard-mounted Reader
Smart Card Reader with USB connection
Fingerprint reader on your keyboard
PRODUCTS AVAILABLE
RISK / SECURITY SOLUTION
 
PHYSICAL DEFENCE
ACCESS CONTROL
ANTI - VIRUS
FIRE PROTECTION
BACKUP PROTECTION
MONITORING
ENCRYPTION