Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Cybersecurity firm says Chinese hackers breached six US state agencies
https://www.cnn.com/2022/03/08/politics/china-hacking-state-governments-mandiant/index.html
Excerpts:
For agencies in two states, the hackers broke into networks using a critical software flaw that was revealed in December just as the Biden administration was scrambling to respond to the flaw's discovery, according to Mandiant.
Agencies in four other states were hacked via other means.
=================================================================
http://www.wavesys.com/wave-alternative
Choose data protection that actually works!
=================================================================
Wave used extensively by the world's organizations could put an end to the Mandiant/Google cyber clean up division!! It makes more sense to spend upfront smart money on Wave's cybersecurity to prevent cyber attacks than wait and spend it on Mandiant/Google!!
==================================================================
Better security at less than half the cost!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
‘Extremely Destructive’ Russian Cyberattacks Could Cost U.S. Billions Of Dollars In Economic Damage, Goldman Warns
https://www.forbes.com/sites/jonathanponciano/2022/03/07/extremely-destructive-russian-cyberattacks-could-cost-us-billions-of-dollars-in-economic-damage-goldman-warns/
Excerpt:
$945 billion. That's how much the Center for Strategic and International Studies estimates malicious cyber activity costs the world annually.
==================================================================
$945 billion.... and billions more coming! And with companies like Nvidia, Samsung, McDonald's, Accenture, and Toyota (suppliers) being hacked it makes one wonder whether the right technologies are even being incorporated into organizations' cybersecurity.
Wave uses hardware security (TPMs and SEDs) with its software security to provide protection that protects networks, data and devices. The Trusted Computing Group (TCG) has developed this hardware security (TPMs and SEDs - standards) over twenty years, and now would be a GREAT time to use them extensively across the world given the capabilities and protection organizations in the world so desperately needs! The two hardware security technologies are ubiquitous so that means that most organizations can fully protect their networks from unknown and unapproved (unauthorized) devices!!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Assessing the aims of the Government Cyber Security Strategy
https://www.computerweekly.com/opinion/Assessing-the-aims-of-the-Government-Cyber-Security-Strategy
Excerpts:
This new strategy is focused on ensuring the government’s critical functions are hardened to cyber attack by 2025, with all public sector organisations becoming more resilient to cyber threats by 2030. This clear aim is welcome, but is it realistic or achievable?
Implementing the strategy by 2025 will be difficult.
=================================================================
The secure by design objective in this article could already be done with SED and TPM hardware security!! The security is already built in to an organization's devices by design. The UK government would just need to turn them on with Wave software!! Therefore, the data on the devices (SED) would be protected in the event that a device was stolen or lost. And the TPM could protect your secrets (ie. credentials) from malware, and this hardware security does a number of other critical things!! It should be activated now during these difficult times when protection is crucial!!
Wave protects your network, data and devices! The Wave alternative is simpler, more secure and cheaper! It would be very smart to have Wave solutions as part of your Government Cyber Security Strategy. It would make your lives a lot less difficult and more secure!
Better security at less than half the cost!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
I’ve Dealt With Foreign Cyberattacks. America Isn’t Ready for What’s Coming.
https://www.nytimes.com/2022/03/04/opinion/ive-dealt-with-foreign-cyberattacks-america-isnt-ready-for-whats-coming.html
Excerpts:
But American businesses aren’t ready for a war in cyberspace.
America should already be cyberattack-proof, but coordinating these efforts across the country has been an uphill battle.
That’s why America’s leaders must rethink the current cyberdefense system and rally around a centralized regulator to defend both citizens and the private sector against current and future attacks.
None of this will be easy or put in place quickly.
==================================================================
Turning on your built-in SEDs and TPMs with Wave software is a lot easier, more secure, and faster than the proposal in this article. This hardware security with Wave software would provide a strong cyber defense. Protect America and the rest of the world, organizations activate your TPMs and SEDs with Wave software!!
==================================================================
Better security at less than half the cost!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Hackers leak 190GB of alleged Samsung data, source code
https://www.bleepingcomputer.com/news/security/hackers-leak-190gb-of-alleged-samsung-data-source-code/
Excerpt:
The Lapsus$ data extortion group leaked today a huge collection of confidential data they claim to be from Samsung Electronics, the South Korean giant consumer electronics company.
If the details above are accurate, Samsung has suffered a major data breach that could cause huge damage to the company.
=================================================================
Wave could really protect Samsung from data breaches with Wave VSC 2.0!! These hackers probably don't have the TPM mobile and Wave software which could be highly beneficial to Samsung for the encryption problem with 100 million Samsung phones (post #247207)!! It would be great if someone from Wave shared this with Samsung. Wave could have a hugely positive impact on securing Samsung's network, data and devices and securing Samsung's mobile devices!!
=================================================================
Wave Systems Signs 15-year License Agreement with Samsung
http://www.wavesys.com/buzz/news/wave-systems-signs-15-year-license-agreement-samsung
Author:
Mike Lennon
Security Week -
Wednesday, May 30, 2012 -
Wave Systems has signed a 15-year software license and distribution agreement with Samsung, enabling Samsung to bundle Wave’s EMBASSY Security Center (ESC) and TCG Software Stack (TSS) technology with devices that include a Trusted Platform Module (TPM), an industry standard security chip embedded in the motherboard of a computer or other electronic device.
In an SEC filing, Wave said it would receive a per-unit royalty based on Samsung’s sales of products that include its technology, but did not provide estimates in terms of expected revenue derived as a result.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Tens of Cybersecurity Firms Found Exposing Their Assets: Study
https://www.securityweek.com/tens-cybersecurity-firms-found-exposing-their-assets-study
Excerpts:
Tens of cybersecurity companies expose a large number of assets to the internet, according to a study conducted recently by attack surface management firm Reposify.
It’s not uncommon for major companies to unwittingly expose databases and other assets, but a study conducted by Reposify over a two-week period in January showed that 35 multinational cybersecurity companies and their more than 350 subsidiaries hosted over 200,000 exposed assets. These assets included databases, remote access sites, and cloud services.
Reposify’s analysis showed that 86% of these companies have at least one exposed remote access service, 80% expose network assets, and 63% expose back office internal networks. Just over half of the cybersecurity firms have at least one exposed database.
=================================================================
Better security at less than half the cost!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
White House backs bill requiring mandatory cyber reporting to CISA amid Ukraine crisis
https://www.cbsnews.com/news/cyber-reporting-bill-cisa-white-house-support/
Excerpt:
The White House has come out in full support of a bill requiring hospitals, power plants, water utilities, airports and other critical infrastructure to report cyber attacks to the Department of Homeland Security within 72 hours.
==================================================================
Why will organizations have to do this? Because many organizations are not using Wave solutions!! If everyone were using Wave, this reporting requirement wouldn't be necessary because Wave's cybersecurity is awesome!
With Wave, we just wouldn't have all these cyber incidents and data breaches!
Rethink cybersecurity, and use Wave solutions!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
‘You Are a Target’: Navy Warns Staff to Prepare for Cyber Threats
https://www.nextgov.com/cybersecurity/2022/03/you-are-target-navy-warns-staff-prepare-cyber-threats/362608/
Excerpts:
The Navy modernized and extended the reach of its information technology beyond traditional security boundaries over the last few years.
Officials have “seen adversaries exploit policy transgressions on Navy and private home networks,” he added. They’ve done so by stealing or guessing credentials and passwords, downloading and unknowingly installing malware embedded within documents from unofficial websites and sources and posing as fellow service members to dupe people into sharing sensitive or classified information.
Every member of the branch must follow cybersecurity policies and report anything questionable they notice in their networks.
“Do NOT accept that ‘this is just the way things are’ or ‘this is not a big deal,’” Trussler wrote. “Your information systems security manager and our cybersecurity professionals are responsible for determining where the reporting stops.”
==================================================================
Wave's awesome cybersecurity/trusted computing could be a BIG help to the military and government. The Wave alternative is simpler, more secure and cheaper.
It's surprising that neither Bill Solms nor Steven Sprague weren't able to show the government what they are missing in Wave. They could lead a change in the government's cybersecurity to an awesome level.
Zero trust will take too long, and Wave is better security at less than half the cost!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Russian-based phishing attacks increased eight-fold since Feb. 27
https://www.scmagazine.com/analysis/critical-infrastructure/russian-based-phishing-attacks-increased-eight-fold-since-feb-27
Excerpts:
Email cybersecurity firm Avanan said it has seen a sudden and significant uptick in Russian-based phishing attacks and credential harvesting over the past few days targeting U.S. and European customers.
The lures used in these emails do not tend to differ from the kinds normally seen in the phishing realm, such as impersonating CEOs or internal employees sending “urgent” documents or spoofed Microsoft 365 emails asking you to click on a link to keep your account active. The main difference Avanan is seeing in the data is “the magnitude, not the methods” of such attacks.
“I do think or at least suspect we’ll start seeing maybe new methods to bypass Office 365 [protections], said Freidrich. “I wouldn’t be surprised if hackers have kept some of their more sophisticated obfuscation methods for an event like this, and this is really where our analysts are spending their time right now.”
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Key Features:
Strong Security
• Authenticate securely, encrypt email, and prove integrity of the device with one management console
• Protect against phishing, malware and other network security threats by storing authentication credentials in hardware
• Provide centralized enforcement of custom policies
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Microsoft Accounts Targeted by Russian-Themed Credential Harvesting
https://threatpost.com/microsoft-accounts-targeted-russian-credential-harvesting/178698/
Excerpts:
Either way, people are at risk from losing control of their account to the phishers.
In other words, it’s not a particularly sophisticated effort, but it’s a savvy one.
==================================================================
Please read the article. The phishing is sadly very clever. Wave protects against phishing!!
==================================================================
Invest in better security. Invest in Wave solutions!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Russia Could “Absolutely” Lash Out at US Through Cyber, Lawmaker Warns
https://www.nextgov.com/cybersecurity/2022/02/russia-could-absolutely-lash-out-us-through-cyber-lawmaker-warns/362557/
=================================================================
A TPM holds credentials, and other secrets in a security chip that is protected from malware! A self encrypting drive or SED encrypts all the data on a computer so if is lost or stolen the data is unreadable. Both the trusted platform module (TPM) and SED can be activated by Wave so that the computer (device) has a better level of security, and not using this hardware security is borderline crazy especially in the times we are in!! This incredible technology should be used by all organizations after all it's already built in to nearly all organizations computers, and just needs to be activated. The U.S. and its allies should know about this hardware security!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Ukraine recruits "IT Army" to hack Russian entities, lists 31 targets
https://www.bleepingcomputer.com/news/security/ukraine-recruits-it-army-to-hack-russian-entities-lists-31-targets/
==================================================================
The U.S. should be using better security: Wave VSC 2.0 and Wave solutions with hardware security (TPMs and SEDs)!! The world has already seen the effectiveness of other cybersecurity products! Time for Wave!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
US banks are worried about the possibility of a massive Russian cyberattack, says cybersecurity CEO
https://finance.yahoo.com/news/us-banks-worried-possibility-massive-153058156.html
Excerpt:
•Kurtz told CNBC's Jim Cramer that much of the US infrastructure could have better cybersecurity.
"I've talked to a lot of banks recently, a lot of senior executives, and they're concerned," Kurtz told Cramer. "They're very concerned about what might happen here, and they should be."
=================================================================
Wave Announces 5-Year Master License Agreement for Virtual Smart Card 2.0 with Leading Global Financial Services Company
Wins competitive evaluation against market leader in two-factor authentication tokens
http://www.wavesys.com/buzz/pr/wave-announces-5-year-master-license-agreement-virtual-smart-card-20-leading-global
Excerpts:
“This customer is a major global financial services company and their standards for protecting their systems from unauthorized access and the integrity of their data are of the highest order. Wave had to pass a very rigorous technical and business review to win the competition.
Wave Virtual Smart Card 2.0 is a tokenless, hardware-based, two-factor authentication solution that offers superior security at less than half the cost of comparable solutions.
==================================================================
Why be susceptible to cyberattacks and struggle with the status quo when you could have better security like Wave VSC 2.0 for less than half the cost!!
You need multi-factor authentication.
Fast.
You need Wave Virtual Smart Card.
==================================================================
Better security at less than half the cost!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Burnout risk threatens cyber defense readiness
https://www.axios.com/cyber-security-burnout-russia-ukraine-45749fde-c141-4e9c-a513-6296b37dbe41.html
Excerpts:
Being in a prolonged period of high state alert where people are constantly trying to react and respond to incidents may lead to people being worn down and making mistakes, Meyers, SVP of intelligence, tells Axios.
"If you're a bad guy and you target an organization and cause those defenders to constantly get worn down ... that's a long game strategy that may result in degrading their ability to respond."
"I have over 70 people that have been burning the candle on both ends for the better part of six weeks now because of this situation."
==================================================================
After reading this article, there has to be a better way than all this burnout. There is. Only allow known and approved devices access to your network (see excerpt below). The bad guys are kept from accessing your network and because of this, there are less employees with less stress handling this excellent alternative security (Wave VSC 2.0 - MFA)!!
==================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
Better security at less than half the cost!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
GPU giant Nvidia is investigating a potential cyberattack
https://www.bleepingcomputer.com/news/security/gpu-giant-nvidia-is-investigating-a-potential-cyberattack/
Excerpts:
US chipmaker giant Nvidia confirmed today it's currently investigating an "incident" that reportedly took down some of its systems for two days.
The reported outage is the result of a network intrusion, and it is still not known if any business or customer data was stolen during the incident.
An insider has described this incident as having "completely compromised" Nvidia's internal systems.
==================================================================
If Nvidia had this network intrusion then that means there must be a lot of companies that could be in a situation much like Nvidia's! Wave can keep these network intrusions from ever happening! Please read about this in the excerpt below!!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
==================================================================
We are in a crisis situation with cybersecurity, and Wave could be helping many companies prevent these network intrusions with better security!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Anonymous Hacking Group Declares “Cyber War” Against Russia
https://thecybersecurity.news/general-cyber-security-news/anonymous-hacking-group-declares-cyber-war-against-russia-17030/?nowprocket=1
Excerpt:
Anonymous also signaled that it intends to ramp up cyber-attacks on the Russian point out, tweeting previously these days: “We are convinced that sanctions in opposition to Putin’s legal regime will have no effect. We call on nations that guidance #Ukraine to sever ties with #Russia and expel Russian ambassadors. #Nameless will intensify cyber attacks on the Kremlin this afternoon.(Moscow Time) #OpRussia.”
==================================================================
The response to Anonymous could put the U.S. in a precarious position, and activated hardware security (TPMs and SEDs) would better protect organizations with Wave software. This Trusted Computing could save the world if implemented rapidly and extensively!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Samsung shipped '100 million' phones with flawed encryption
https://www.theregister.com/2022/02/23/samsung_encryption_phones/
Excerpts:
Academics found TrustZone-level code could not be trusted to keep secrets
Android smartphones, which pretty much all use Arm-compatible silicon, rely on a Trusted Execution Environment (TEE) supported by Arm's TrustZone technology to keep sensitive security functions isolated from normal applications. These TEEs run their own operating system, TrustZone Operating System (TZOS), and it's up to vendors to implement the cryptographic functions within TZOS.
=================================================================
I can't help but think that the TPM mobile and Wave would be helpful here to the TEE!! Samsung and Wave had an important agreement for 15 years 10 years ago around Wave software and the TPM! If only there was someone with Wave that could help Wave get the TPM mobile with TEE to run Wave software and get this situation trusted!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Nearly 80% of organizations saw an email-based ransomware attack in 2021
https://www.scmagazine.com/news/phishing/nearly-80-of-organizations-saw-an-email-based-ransomware-attack-in-2021
Excerpt:
Phishing has become one of the most common methods of ransomware infiltration into an environment....
=================================================================
The previous post #247205 and this article show why Wave VSC 2.0 is so crucial in protecting against phishing..... ransomware!
=================================================================
Better security at less than half the cost!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Devious phishing method bypasses MFA using remote access software
https://www.bleepingcomputer.com/news/security/devious-phishing-method-bypasses-mfa-using-remote-access-software/
Excerpts:
A devious, new phishing technique allows adversaries to bypass multi-factor authentication (MFA) by secretly having victims log into their accounts directly on attacker-controlled servers using the VNC screen sharing system.
Even more dangerous, this technique will bypass MFA as the user will enter the one-time passcode directly on the attacker's server, authorizing the device for future login attempts.
As for how to protect yourself from these types of attacks, all the phishing advice remains the same: do not click on URLs from unknown senders, inspect embedded links for unusual domains, and treat all email as suspicious, especially when it prompts you to login to your account.
Or you could use Wave VSC 2.0 (MFA), and protect against this devious phishing method!!
=================================================================
Better security at less than half the cost!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Top U.S. cyber official wants to restructure government’s relationship with business
https://www.washingtontimes.com/news/2022/feb/22/top-us-cyber-official-wants-restructure-government/
America’s top cyber official is proposing to overhaul the government’s relationship with industry to stop hackers capable of holding critical infrastructure hostage.
==================================================================
How long will a "Cyber Social Contract" take? Action is needed!!
If a bad cyber attack happens, there is going to be a lot of regret for the event, and regret that hardware security (TPMs and SEDs) wasn't mandated for at least critical industries. Hardware security with the right software (Wave) protects devices, networks and data! Software security alone is not working!
==================================================================
Better security at less than half the cost!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Gov. Hochul says New York fortifying its cyber defenses amid tensions with Russia
https://nypost.com/2022/02/20/gov-kathy-hochul-says-new-york-fortifying-its-cyber-defenses-amid-tensions-with-russia/
=================================================================
The Trusted Computing Group has been in existence for over twenty years and with 100+ companies, it has developed two security standards that should be revolutionizing the protection of the world's cyber assets. These standards are already built-in to most enterprise computers, and just need to be turned on and managed. When I hear of using MFA and encryption for protection, this is where these hardware security standards (TPMs and SEDs) could be of tremendous additional help to the security of the U.S. and the world. Not using these two standards extensively seems like a big waste of excellent technology that is in computers for FREE! It has already been paid for!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Army CID outlines measures to safeguard against cyber threats
https://www.army.mil/article/254052/army_cid_outlines_measures_to_safeguard_against_cyber_threats
==================================================================
After reading this article it sounds like the Army could really benefit from using Wave's Scrambls and Wave's other solutions!
Wave has uniquely great solutions with hardware security in MFA and encryption!! Choose data protection that actually works!!
==================================================================
Protect Corporate Use of Social Media and Cloud Services with Scrambls for Enterprise
Encrypt Postings and Shared Files to Ensure Privacy and Compliance
http://www.wavesys.com/buzz/pr/protect-corporate-use-social-media-and-cloud-services-scrambls-enterprise
Lee, MA -
December 4, 2012 -
Scrambls for Enterprise launched today, giving organizations a means for their employees to safely collaborate over social media sites like Twitter® and Facebook, and share files with cloud services like Dropbox™ and Salesforce.com®. Scrambls protects data that is often overlooked in corporate security initiatives – information shared online via social media, files stored in the cloud and data in motion.
Employees are free to leverage existing social media infrastructures to enter status updates, Tweets, blog posts, files and more, without jeopardizing security or privacy. Scrambls for Enterprise encrypts data before it ever leaves a user’s computer or smartphone. Posts and files can only be viewed by those the enterprise grants permission to—everyone else sees scrambled text.
“Social media and cloud services are expanding the way business is done, but enterprises need greater control of the information they share across the public web,” commented Steven Sprague, scrambls co-creator and CEO of Wave Systems. “These services are often self-discovered by employees who use them to share critical information. Enterprises need to take responsibility for this new flow of data, and scrambls provides the privacy, security and audit controls similar to what you’d see with corporate email accounts.”
The power of scrambls lies in the permissions granted to group members. To read a post or descramble a file, the service automatically applies the permission to make it readable again for only those individuals granted access. Business administrators set the policy and manage the groups. Add or remove people from the groups at any time to change who can read messages and files, even after they’ve been published on the web.
“Scrambls can open up new business opportunities with use cases for every type of vertical market,” continued Sprague. “In healthcare, a private and protected channel for communication leads to better care and service. It’s easy for doctors, social workers and caregivers to have sensitive discussions about the care of a family member in real time using popular tools like Twitter or Facebook. Those conversations remain private with scrambls.”
Deploying scrambls in the Enterprise
The scrambls enterprise console gives employees, managers and IT staff the ability to manage accounts. You first create groups for access either by email addresses or through the existing corporate lists that enterprises already use (Active Directory, corporate email domains, etc.). Add more detailed rules as needed, like an expiration date for a file, or a password that can be used to view a blog post. Deploy the client install or have users download it, and they’re ready to scramble. It’s as simple as that!
Scrambls privacy and security can be added to an organization’s internal applications as well through a software developer kit. The SDK enables third-party apps and sites to integrate directly with scrambls to leverage the same groups for security, privacy and control.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
WH warns US companies to brace for possible Russian cyberattacks
https://nypost.com/2022/02/18/us-companies-warned-to-brace-for-possible-russian-cyberattacks/
Excerpt:
“I cannot stress this enough: We urge our private sector partners to exercise incident response plans and put in place the cybersecurity defenses like encryption and multi-factor authentication that make cyber attacks harder for even sophisticated cyber actors.”
==================================================================
With the experience/expertise Wave has with solutions (Wave VSC 2.0 and Wave SED management) for MFA and encryption, Wave should be the go to company for this protection!! And the fact that Wave enables and manages hardware security (TPMs and SEDs) to go along with the protection (it's already built-in!!) makes it the smart choice for organizations!
==================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/products/wave-self-encrypting-drive-management
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Trickbot Targets 140,000 Victims in 14 Months
https://thecybersecurity.news/general-cyber-security-news/trickbot-targets-140000-victims-in-14-months-16839/?nowprocket=1
Excerpts:
The notorious Trickbot Trojan has focused clients of scores of major-title manufacturers about the past year, which includes Amazon, PayPal and Microsoft, according to new details from Test Level.
The security seller claimed that the malware experienced contaminated at minimum 140,000 victims given that November 2020, with attackers getting careful to target superior-profile victims.
Attacks typically commence with phishing email messages, together with malicious macros.
The malware has remained stubbornly persistent by employing a decentralized architecture, choosing targets selectively and deploying anti-investigation techniques.
“The combination of these two elements is what permits Trickbot to keep on being a dangerous danger for additional than five several years by now. I strongly urge persons to only open paperwork from trustworthy sources and to use unique passwords on distinct web-sites.”
=================================================================
How can you avoid this Trickbot? When your organization uses Wave VSC 2.0 and Wave Endpoint Monitor, you and your organization will detect the sneaky malware, and keep credentials safe in hardware security (TPMs)!!
==================================================================
Only hardware-based security can beat malware!
http://www.wavesys.com/malware-protection
http://www.wavesys.com/products/wave-endpoint-monitor
http://www.wavesys.com/products/wave-virtual-smart-card
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Hackers Had Access to Red Cross Network for 70 Days
https://www.securityweek.com/hackers-had-access-red-cross-network-70-days
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
==================================================================
Better security at less than half the cost!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
MFA fatigue attacks: Users tricked into allowing device access due to overload of push notifications
https://portswigger.net/daily-swig/mfa-fatigue-attacks-users-tricked-into-allowing-device-access-due-to-overload-of-push-notifications
Excerpts:
Malicious hackers are targeting Office 365 users with a spare of ‘MFA fatigue attacks’, bombarding victims with 2FA push notifications to trick them into authenticating their login attempts.
Multi-factor authentication (MFA) fatigue is the name given to a technique used by adversaries to flood a user’s authentication app with push notifications in the hope they will accept and therefore enable an attacker to gain entry to an account or device.
It does require the attacker to have the victim’s credentials, which “could be obtained via brute forcing, password reuse, or spraying”.
“Once the attacker obtains valid credentials, they will perform the push notification spamming repeatedly until the user approves the login attempt and lets the attacker gain access to the account
==================================================================
Use better security. Use Wave VSC 2.0 (MFA)!!
==================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
DOJ official warns companies 'foolish' not to shore up cybersecurity amid Russia tensions
https://abcnews.go.com/Politics/doj-official-warns-companies-foolish-shore-cybersecurity-amid/story?id=82959520
Excerpt:
A top Justice Department official issued a stark warning Thursday to companies in the U.S. and abroad, calling on them to immediately shore up their cybersecurity defenses amid a potential Russian invasion of Ukraine.
==================================================================
You need multi-factor authentication.
Fast.
You need Wave Virtual Smart Card.
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
=================================================================
Better security at less than half the cost!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
US says Russian hackers have collected intelligence from American defense contractors
https://www.cnn.com/2022/02/16/politics/us-russia-defense-contractors-hackers/index.html
Excerpt:
Russian government-backed hackers have acquired sensitive information on the development and deployment of US weapons by breaching American defense contractors over the last two years, US security agencies said in a public advisory on Wednesday.
==================================================================
Wow!! Using Wave solutions could be so beneficial to defense contractors, and the government so breaches like this don't happen!!
==================================================================
To keep data safe, arm your devices!
http://www.wavesys.com/data-protection
Excerpts:
Security = data protection
When we talk about security, what we really mean is protecting data from theft and misuse. Proprietary information, R&D, corporate strategy, customer names and phone numbers, social security numbers, passwords … All have potential monetary value, and all are targets. Data theft is a growth industry. As an example, tens of thousands of new malware strains pop up daily. With online tools, even a non-technical person can create one in minutes.
The IT perimeter has vanished
Data protection is easy enough when your data is sitting in secure servers. But today, it’s not. The workforce is increasingly mobile. More than 60 percent of corporate data lives not on servers but on laptops, tablets, and other devices (and more and more of those devices are owned by employees). Data is dispersed, constantly moving, and constantly exposed to the Internet and all the malware, viruses, and hackers lurking there.
Wave’s solution: start with the device
The Wave approach to this challenge is to make the IT perimeter irrelevant. Wave turns on and manages the self-encrypting drives (SEDs) and trusted platform modules (TPMs), or security chips, that are already embedded in many of your devices. The upshot is that each and every device is equipped with its own data protection system—while being centrally managed. This gives you unprecedented yet straightforward control over exactly who has access to your data, with what devices, over what networks.
We cost less too. Wave works on your existing hardware, across platforms. That’s because our solutions are based on an open standard that’s already been implemented on 600 million–plus laptops and is now working its way onto mobile devices. Our software is all you need to reach a whole new level of data protection. It’s one of the big reasons why total cost of ownership can be almost half that of a traditional software-based system that doesn’t even work very well.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Shields Up: CISA Recommends All Organizations Adopt Heightened Cybersecurity Posture
https://www.hstoday.us/federal-pages/dhs/shields-up-cisa-recommends-all-organizations-adopt-heightened-cybersecurity-posture/
Excerpt:
Reduce the likelihood of a damaging cyber intrusion
•Validate that all remote access to the organization’s network and privileged or administrative access requires multi-factor authentication.
==================================================================
With the importance of multi-factor authentication (MFA), the description in the Wave alternative below is a key feature that sets Wave VSC 2.0 (MFA) apart from other MFA! Using Wave VSC 2.0 (MFA) should be a must have for better security for your organization!!
==================================================================
http://www.wavesys.com/wave-alternative
Excerpt:
A big piece of this heightened security is device authentication. Traditional two-factor authentication requires what amounts to two user IDs. But by using the TPMs inside your devices, Wave can confirm the identity of not only users, but also the devices they’re on.
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Pentagon outlines plan to make continuous ATOs the new ‘gold standard’ for cybersecurity
https://federalnewsnetwork.com/defense-news/2022/02/pentagon-outlines-plan-to-make-continuous-atos-the-new-gold-standard-for-cybersecurity/
Excerpt:
Indeed, the memo makes clear that a DoD-approved cATO is a privilege, not a right, and it can be revoked at any time, if for example, continuous monitoring shows that a system has slipped into a poor cyber posture.
==================================================================
Devices (ie. computers) that have the hardware security (TPMs and SEDs) already built-in, but need to be turned on with software like Wave's should be the new gold standard for cybersecurity. The hardware is ubiquitous! This new gold standard (TPMs and SEDs turned on with Wave software) would do a better job of protecting DOD networks, devices and data!! It would keep the unauthorized (hackers) off the DOD's networks right from the start!!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Microsoft Defender will soon block Windows password theft
https://www.bleepingcomputer.com/news/microsoft/microsoft-defender-will-soon-block-windows-password-theft/
Excerpts:
While Microsoft Defender block programs like Mimikatz, a LSASS memory dump can still be transferred to a remote computer to dump credentials without fear of being blocked.
One of these security features is Credential Guard, which isolates the LSASS process in a virtualized container that prevents other processes from accessing it.
However, this feature can lead to conflicts with drivers or applications, causing some organizations not to enable it.
However, Microsoft has recently begun to choose security at the expense of convenience by removing common features used by Admins and Windows users that increase attack surfaces.
Not a perfect solution but a great start
While enabling the ASR rule by default will significantly impact the stealing of Windows credentials, it is not a silver bullet by any means.
This is because the full Attack Surface Reduction feature is only supported on Windows Enterprise licenses running Microsoft Defender as the primary antivirus. However, BleepingComputer's tests show that the LSASS ASR rule also works on Windows 10 and Windows 11 Pro clients.
Unfortunately, once another antivirus solution is installed, ASR is immediately disabled on the device.
==================================================================
It would just be simpler to use Wave VSC 2.0 so that the attacker has a very difficult time obtaining the PIN and TPM (a security chip inside computer) especially with computers using different antivirus solutions!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
End of 2021 witnessed an explosion of RDP brute-force attacks
https://www.helpnetsecurity.com/2022/02/09/explosion-rdp-brute-force-attacks/
Excerpt:
RDP brute-force attacks escalated throughout all of 2020 and 2021, and the last four months of 2021 brought a further acceleration, with an increase of 274% (from 55 billion in T2 2021 to 206 billion in T3 2021).
==================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
Excerpt:
What can it be used for?
What do you use your smart card for today? With the exception of keying open the door at work, Wave Virtual Smart Card can perform any of the services or applications you rely on your smart card for today. Secure VPN, WiFi, remote desktop, cloud applications – it can all be done with a virtual smart card.
=================================================================
Wave VSC 2.0 (MFA) stops the bad guys and their RDP brute-force attacks!
Invest in better security. Invest in Wave solutions!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
How Phishers Are Slinking Their Links Into LinkedIn
https://krebsonsecurity.com/2022/02/how-phishers-are-slinking-their-links-into-linkedin/
Excerpts:
If you received a link to LinkedIn.com via email, SMS or instant message, would you click it? Spammers, phishers and other ne’er-do-wells are hoping you will, because they’ve long taken advantage of a marketing feature on the business networking site which lets them create a LinkedIn.com link that bounces your browser to other websites, such as phishing pages that mimic top online brands (but chiefly Linkedin’s parent firm Microsoft).
Also, malicious or phishous emails that leverage LinkedIn’s Slinks are unlikely to be blocked by anti-spam or anti-malware filters, because LinkedIn is widely considered a trusted domain, and the redirect obscures the link’s ultimate destination.
=================================================================
You or many employees in your organization don't have to be susceptible to this sneaky phishing attack!! Protect your organization from the phishing in the above article by using Wave VSC 2.0!! This could save your organization from data breaches, and a whole lot of stress!!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpts:
Key Features:
Strong Security
• Authenticate securely, encrypt email, and prove integrity of the device with one management console
• Protect against phishing, malware and other network security threats by storing authentication credentials in hardware
• Provide centralized enforcement of custom policies
==================================================================
Better security at less than half the cost!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
US cyber defense agency warns of possible Russian cyberattacks amid tensions
https://thehill.com/policy/cybersecurity/594013-us-cyber-defense-agency-warns-of-possible-russian-cyberattacks-amid
Excerpt:
CISA said organizations should test backup procedures to quickly restore compromised data, designate a crisis response team, ensure that software is up to date and validate that administrative access to systems requires multi-factor authentication, among other recommendations.
=================================================================
A couple of solutions below could majorly enhance organizations' cyber defenses!!
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/products/wave-self-encrypting-drive-management
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Credential-stuffing attacks on remote windows systems took off in 2021
https://www.darkreading.com/endpoint/credential-stuffing-attacks-on-remote-windows-systems-took-off-in-2021
Excerpts:
Password-guessing became last year's weapon of choice as attackers attempted to brute-force vulnerable Remote Desktop Protocol (RDP) servers, SQL databases and SMB file shares.
Attackers have increasingly targeted remote Windows systems, fueling a surge in credential-stuffing attacks against systems running the remote desktop protocol (RDP) which jumped nearly nine fold in 2021 according to new data.
In total credential-stuffing and other password-based attacks accounted for 46% of external network intrusion vectors.
However, e-mail threats, such as phishing and Trojan horses, climbed 145%.
=================================================================
Fortunately, those organizations using Wave VSC 2.0 don't have the problems outlined in this article. Why struggle with credential-stuffing attacks, password based attacks, phishing, and Trojans, use Wave VSC 2.0 (MFA)!!
With Wave VSC 2.0, the hackers have to physically have the good guy's computer (TPM) to 'try' to hack into it!!
Its amazing how much better off the organizations of the world would be if they bought Wave VSC 2.0 (MFA)!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Data-at-rest security is essential for the successful operation of businesses worldwide
https://www.enterprisetimes.co.uk/2022/02/08/data-at-rest-security-is-essential-for-the-successful-operation-of-businesses-worldwide/
Article comes from TCG website.
Excerpts:
All data must be encrypted
For the most secure storage systems, all user data must be encrypted when first put onto a drive. This is regardless of wear levelling, a way of extending the life of storage devices. There should also be data erasure as a feature. It allows users to delete data from the storage system using specific commands. It also ensures that any information stored on the device is deleted safely and securely.
Software Full Drive Encryption (SW-FDE) is not always able to provide these guarantees. It results in Self Encrypting Drives (SEDs) being increasingly deployed to guarantee this “last mile” compliance to ensure that data is kept safe and secure to avoid a data breach.
==================================================================
http://www.wavesys.com/products/wave-self-encrypting-drive-management
==================================================================
Wave software when combined with hardware security (SEDs and TPMs- Trusted Platform Modules) offers better security for organizations than when using software alone!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Defense contractors need to check their Six
https://www.darkreading.com/dr-tech/defense-contractors-need-to-check-their-six
Excerpt:
As the chart shows, though, credential management was a major weak point for over half: 57 companies rated an F. Indeed, the full report states "42% of defense contractors have had at least one leaked credential within the last 90 days."
=================================================================
Here is another problem (leaking credentials) that Wave could solve with its Wave VSC 2.0 (better security)!!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Token-free, password-free user authentication
We know you’ve dreamt about shredding your list of passwords. Go on and do it.
Because you are starting the authentication process in the device’s hardware, the user doesn’t have to interact with it. All users see is their usual Windows log-in screen – no more additional passwords to access the VPN or other resources. They just sign in once, and the secure credentials in their TPMs securely and quickly connect them to everything they need. Say goodbye to user frustration and slow OS performance.
==================================================================
Better security at less than half the cost!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Companies should embrace multi-factor authentication
https://windowsreport.com/companies-should-embrace-multi-factor-authentication/
Excerpt:
Microsoft is urging companies to enable multi-factor authentication after blocking billions of phishing attacks and spam emails from hackers, but fears many companies are ignoring strong password protection.
Microsoft recommends that organizations use multifactor authentication (MFA) to reduce the threat of account compromise from cyber attacks, advanced persistent threats, and remote phishing tactics.
=================================================================
The U.S. government is requiring multi-factor authentication (MFA) for agencies, and Microsoft is urging companies to enable MFA!! And with Wave VSC 2.0 (MFA) being better security at less than half the cost, one would think that Wave would be having many new customers needing its technology!!
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
A majority of companies hacked in 2021 did not improve MFA controls following attack
https://www.scmagazine.com/news/identity-and-access/a-majority-of-companies-hacked-in-2021-did-not-improve-mfa-controls-following-attack
Excerpt:
64% of those hacked did not enhance or improve their password-based authentication controls following the attack.
=================================================================
When the hacked learn about Wave VSC 2.0 (MFA), they could buy it, and discover that they have much better security! The Wave alternative is simpler, more secure, and cheaper! Use Wave VSC 2.0, and see what your organization is missing! Better security at less than half the cost!! There is a great opportunity for Wave's potential customers, and Wave in the enterprise MFA market.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
SEC’s Gensler wants to regulate company cybersecurity policies
https://www.marketwatch.com/story/secs-gensler-wants-to-regulate-company-cybersecurity-policies-11643041068
Excerpts:
SEC chief calls on Congress to consider broadening financial regulators’ authorities
Now, Securities and Exchange Commission Chairman Gary Gensler wants to leverage his agency’s regulatory powers to compel companies to disclose risks to their businesses from cyber attacks and to systematically divulge incidents of cyber attacks to investors, according to a speech delivered Monday before the Northwestern Pritzker School of Law’s Annual Securities Regulation Institute.
==================================================================
Wave can help companies to have better security to prevent cyber attacks!!
==================================================================
To keep data safe, arm your devices!
http://www.wavesys.com/data-protection
==================================================================
With device-based security, compliance is simple!
http://www.wavesys.com/compliance
==================================================================
You need multi-factor authentication.
Fast.
You need Wave Virtual Smart Card.
==================================================================
Choose data protection that actually works!!
http://www.wavesys.com/wave-alternative
=================================================================
Better security at less than half the cost!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE