data

How To Control Who Has Access? Authentication and Access Control Services and Solutions

Two Factor Authentication What is it, how does it work, and why is two factor authenticaion better than just one factor authentication? In this interview with Paul Herbka from South Seas Corporation (services and solutions based out of Colorado), we go in depth in a discussion of two-factor authentication, and why it’s important for any …

How To Control Who Has Access? Authentication and Access Control Services and Solutions Read More »

Encryption: How Does Encryption Work

How does encryption work? That’s what I wanted to know. So I found Paul Herbka to help me understand everything from file and data encryption to WEP Encryption, and to have him talk about a variety of the software and security solutions available in the market today. There’s actually several different types and I’ll kind of break it down into two giant categories. The first category would be like for PC’s, laptops, desktops. And then underneath that comes in all the other different mobile devices, like PDA’s, Smart Phones, Blackberry’s, etc., as well as removable media and the other items that might go into a PC.