Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
European, U.S. Regulators Tell Banks to Prepare for Russian Cyberattack Threat
https://money.usnews.com/investing/news/articles/2022-02-08/european-u-s-regulators-tell-banks-to-prepare-for-russian-cyberattack-threat
Excerpt:
While the regulator had been focused on ordinary scams that boomed during the pandemic, the Ukraine crisis has diverted its attention to cyber attacks launched from Russia, said one of the people, adding that the ECB has questioned banks about their defences.
=================================================================
Wave Announces 5-Year Master License Agreement for Virtual Smart Card 2.0 with Leading Global Financial Services Company
Wins competitive evaluation against market leader in two-factor authentication tokens
http://www.wavesys.com/buzz/pr/wave-announces-5-year-master-license-agreement-virtual-smart-card-20-leading-global
Excerpt:
“This customer is a major global financial services company and their standards for protecting their systems from unauthorized access and the integrity of their data are of the highest order. Wave had to pass a very rigorous technical and business review to win the competition, said Bill Solms, President and CEO of Wave Systems.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Microsoft Credits Multifactor Authentication in Blocking Second-Stage Phishing Attacks
https://redmondmag.com/articles/2022/02/04/microsoft-credits-multifactor-authentication-in-blocking-attacks.aspx
Excerpts:
MFA is the use of a secondary means of verifying the identity of someone trying to access a network, beyond just a user name and password. Attackers are now taking advantage of networks not using MFA to use stolen credentials to join the victim's network, setting the stage for further phishing attempts. This scheme is labeled "evolved phishing" by Microsoft.
"Evolved Phishing"
Attackers first try to steal credentials in an initial phishing attack in order to gain account privileges on a network. Once on the network, secondary phishing attacks begin. Attackers with e-mail account access can then send "intra-organizational emails" and external mails, extending the campaign.
==================================================================
This article is another reason for smartly prepared organizations to be using Wave VSC 2.0 (MFA)!
Better security at less than half the cost!! And using Wave VSC 2.0 (MFA) is friendlier to the environment as well!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Fortune 500 service provider says ransomware attack led to leak of more than 500k SSNs
https://www.zdnet.com/article/fortune-500-service-provider-says-ransomware-attack-led-to-leak-of-more-than-500k-ssns-more/
Excerpts:
Morley Companies said 521,046 people were affected by a data breach that resulted from a ransomware attack.
"The unfortunate reality is that far too many organizations don't have effective auditing controls to identify when data is access and by whom, or means to detect unusually high levels of access or exfiltration that can indicate that an attack is happening.
==================================================================
The fortunate reality is that Wave has the solutions to protect your network by only allowing known and approved devices access to your network so the hackers can't get their hands on your data!!
It's really simple, buy Wave's solutions and your organization will be able to prevent data breaches like this from happening!!
==================================================================
Choose data protection that actually works!!
http://www.wavesys.com/data-protection
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Report: Data breach numbers may not actually be declining, and reporting them is getting slower
https://www.techrepublic.com/article/report-data-breach-numbers-may-not-actually-be-declining-and-reporting-them-is-getting-slower/
Excerpts:
A study released by Flashpoint and Risk Based Security found two startling facts: It’s report of a drop in the total number of breaches is likely erroneous, and the time it takes for an organization to report. a breach has increased to the highest levels since 2014.
“Readers of the 2020 Year End Report may recall at the time that report was issued, the number of publicly disclosed breaches stood at 3,932. We estimated that number would grow by 5% to 10% over the course of 2021. The number actually increased by 11.8%,” Allocca said. Assuming the same 5-10% growth, 2021 would likely settle into the 4,352 to 4,560 range, putting on par, or just a bit higher, than 2020.
==================================================================
How to PREVENT DATA BREACHES and how to HAVE BETTER SECURITY FOR YOUR ORGANIZATION? Answer: USE Wave solutions!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
News Corp breached by hackers with apparent China link
https://nypost.com/2022/02/04/news-corp-breached-by-hackers-with-apparent-china-link/
Excerpt:
Employees at the New York Post and Wall Street Journal were targeted in an apparent intelligence-gathering operation by Chinese hackers, a cybersecurity consultant for the newspapers’ parent company said Friday.
News Corp said the hackers accessed email accounts and documents from a “limited number” of employees who included journalists. The hack also affected financial news unit Dow Jones and News UK, the division that controls the Times of London and the Sun, News Corp. said in a securities filing Friday.
==================================================================
To keep data safe, arm your devices
http://www.wavesys.com/data-protection
Security = data protection
When we talk about security, what we really mean is protecting data from theft and misuse. Proprietary information, R&D, corporate strategy, customer names and phone numbers, social security numbers, passwords … All have potential monetary value, and all are targets. Data theft is a growth industry. As an example, tens of thousands of new malware strains pop up daily. With online tools, even a non-technical person can create one in minutes.
The IT perimeter has vanished
Data protection is easy enough when your data is sitting in secure servers. But today, it’s not. The workforce is increasingly mobile. More than 60 percent of corporate data lives not on servers but on laptops, tablets, and other devices (and more and more of those devices are owned by employees). Data is dispersed, constantly moving, and constantly exposed to the Internet and all the malware, viruses, and hackers lurking there.
Wave’s solution: start with the device
The Wave approach to this challenge is to make the IT perimeter irrelevant. Wave turns on and manages the self-encrypting drives (SEDs) and trusted platform modules (TPMs), or security chips, that are already embedded in many of your devices. The upshot is that each and every device is equipped with its own data protection system—while being centrally managed. This gives you unprecedented yet straightforward control over exactly who has access to your data, with what devices, over what networks.
We cost less too. Wave works on your existing hardware, across platforms. That’s because our solutions are based on an open standard that’s already been implemented on 600 million–plus laptops and is now working its way onto mobile devices. Our software is all you need to reach a whole new level of data protection. It’s one of the big reasons why total cost of ownership can be almost half that of a traditional software-based system that doesn’t even work very well.
==================================================================
Wave's data protection would be highly beneficial to those in the article above!! All organizations could benefit from Wave's awesome data protection alternative as well!!
Invest in better security, invest in Wave solutions!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Microsoft: ‘Dangerous mismatch’ in security due to slow MFA adoption
https://venturebeat.com/2022/02/03/microsoft-dangerous-mismatch-in-security-battle-due-to-slow-mfa-adoption/
Excerpts:
Thus, the “dangerous mismatch” in the security battle is that “the attacks are increasing, but the preparation is not there yet,” Jakkal said.
Some organizations are no doubt reluctant to move to MFA because it does require change, she said. Users must adjust to the extra steps that are involved in authenticating with MFA. For some, the potential inconvenience of the MFA user experience is seen as a barrier to adoption.
=================================================================
Organizations want convenience, simplicity and better security. Wave VSC 2.0 (MFA) has that!!
=================================================================
Given the solution that Wave has with Wave VSC 2.0, organizations should be happily adopting/using it now at a rapid rate!! It makes no sense for organizations to be without it!!
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Managing Detections is Not the Same as Stopping Breaches
https://www.darkreading.com/crowdstrike/managing-detections-is-not-the-same-as-stopping-breaches
Excerpts:
Unfortunately, even most managed services have several fundamental flaws that prevent them from executing on the core mission of stopping breaches.
First, MDRs frequently filter out low-severity alerts and direct human attention only to the ones that are deemed most critical. Unfortunately, attacks don't start out as critical alerts....!!!
=================================================================
Only allowing known and approved devices access to your network can provide your organization with much better security, and prevent breaches!! See why Wave can make you and your organization VERY HAPPY customers!!
=================================================================
If your organization is not using Wave: YIKES!!
Please read the excerpt below:
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
What to do if you forget your Microsoft Teams login
https://www.techradar.com/how-to/what-to-do-if-you-forget-your-microsoft-teams-login
==================================================================
To answer the title's question: Be proactive ahead of time, and use Wave solutions below, and you won't have users to potentially go through all the complicated scenarios in the article!!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpts:
Token-free, password-free user authentication
We know you’ve dreamt about shredding your list of passwords. Go on and do it.
Because you are starting the authentication process in the device’s hardware, the user doesn’t have to interact with it. All users see is their usual Windows log-in screen – no more additional passwords to access the VPN or other resources. They just sign in once, and the secure credentials in their TPMs securely and quickly connect them to everything they need. Say goodbye to user frustration and slow OS performance.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
FBI director says the threat from China is 'more brazen' than ever before
https://www.npr.org/2022/01/31/1077174231/fbi-director-says-the-threat-from-china-is-more-brazen-than-ever-before
Excerpts:
WASHINGTON — The threat to the West from the Chinese government is "more brazen" and damaging than ever before, FBI Director Christopher Wray said Monday night in accusing Beijing of stealing American ideas and innovation and launching massive hacking operations.
"When we tally up what we see in our investigations, over 2,000 of which are focused on the Chinese government trying to steal our information or technology, there's just no country that presents a broader threat to our ideas, innovation, and economic security than China," Wray said, according to a copy of the speech provided by the FBI.
=================================================================
Judging from this article, others, and Wave's information, the U.S. and the rest of the world need Wave solutions in a big way. We'd have a lot more HAPPY people in the world if organizations were using Wave, except of course the hackers which wouldn't bother with a Wave protected corporate environment! A properly protected Wave organization would be too time consuming, and difficult to try to compromise! The status quo is not working. The present/future cyber defense (hardware security and Wave software) for organizations is much better when using Wave!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
LockBit gang claims it stole data from French Ministry of Justice
https://www.zdnet.com/article/french-officials-investigating-lockbit-claim-of-ransomware-attack/
Excerpt:
The Ministry of Justice was added to the LockBit leak site alongside data from dozens of European companies and towns, including the French city of Saint-Cloud.
=================================================================
Choose data protection that actually works!
http://www.wavesys.com/wave-alternative
=================================================================
BETTER SECURITY at less than half the cost!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Taiwanese Apple and Tesla contractor hit by Conti ransomware
https://www.bleepingcomputer.com/news/security/taiwanese-apple-and-tesla-contractor-hit-by-conti-ransomware/
Excerpts:
Delta Electronics, a Taiwanese electronics company and a provider for Apple, Tesla, HP, and Dell, disclosed that it was the victim of a cyberattack discovered on Friday morning.
Delta claims to be the world's largest provider of switching power supplies and reported sales of over $9 billion last year.
$15 million ransom for decrypting thousands of devices
According to negotiations between Conti and Delta (also seen by BleepingComputer), the Conti operators claim to have encrypted 1,500 servers and 12,000 computers out of roughly 65,000 devices on Delta's network.
The Conti ransomware gang asked Delta to pay a $15 million ransom for a decryptor and stop leaking files stolen from its network. Also promised a discount if the company would pay quickly.
==================================================================
If only Delta had activated SEDs (Self-Encrypting Drives) with Wave SED management, and Wave VSC 2.0 to keep the files from being accessed and stolen from its network! If Wave solutions were being used extensively across organizations throughout the world, the problems in the above article (ie. stolen data, $15 million in ransom) wouldn't be happening!!
==================================================================
http://www.wavesys.com/products/wave-self-encrypting-drive-management
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
DISA makes $7M award to start proving out DoD zero trust strategy
https://federalnewsnetwork.com/defense-main/2022/01/disa-makes-7m-award-to-start-proving-out-dod-zero-trust-strategy/
Excerpt:
But the Thunderdome model represents an entirely different way of thinking about security. Like other zero trust approaches, it’s designed to operate on the presumption that intruders have already penetrated DoD’s networks, and focus on securing individual data elements, implementing new identity management techniques and segmenting the network in ways that make it more difficult for attackers to hop from one section to another.
=================================================================
Is it a good idea to presume that intruders have already penetrated DOD's networks rather than keeping them from accessing the network? Why not keep the intruders from accessing the network in the first place so they don't do damage or steal data? Wave can keep the intruders from accessing the network!! Please see excerpt below!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
Better security at less than half the cost!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
SEC looks to expand cyber coverage
https://fcw.com/security/2022/01/sec-looks-expand-cyber-coverage/361275/
Excerpt:
The Securities and Exchange Commission is taking a new look at how it asks publicly traded companies to disclose cybersecurity risks.
=================================================================
The biggest risk to public companies is not using Wave solutions for their cybersecurity/trusted computing!!
Better security at less than half the cost!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Cybersecurity: White House rolls out zero trust strategy for federal agencies
Federal agencies have until the end of the fiscal year 2024 to "achieve specific zero trust security goals."
https://www.zdnet.com/article/white-house-rolls-out-zero-trust-strategy-for-federal-agencies/
-----------------------------------------------------------------
What happens if other countries or organizations discover the better security in Wave solutions than what is present in zero trust?
As an example, right off the bat Wave eliminates potentially unsecure devices (with device health check) or by not having a TPM (unique identity in most enterprise PCs), and unauthorized (hackers) devices from even accessing the network. Only known and approved devices can access your network. This makes hunting the bad guys down already done upfront with Wave! No bad guys lingering on the network!
There are more great reasons to choose Wave. Please see the website and links below!
-----------------------------------------------------------------
http://www.wavesys.com/wave-alternative
Excerpt:
It’s part of what makes the Wave alternative not only more secure, but also simpler and cheaper. Total cost of ownership for Wave data protection can be almost half that of a traditional software-based system.
------------------------------------------------------------------
You need multi-factor authentication.
Fast.
You need Wave Virtual Smart Card.
-----------------------------------------------------------------
Better security at less than half the cost!
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
White House attempts to strengthen federal cybersecurity after major hacks
https://www.cnn.com/2022/01/26/politics/white-house-cybersecurity-strategy/index.html
Excerpt:
One of the more demanding parts of the strategy is a requirement that agencies have a "complete inventory" of every electronic device on their networks.
==================================================================
Why not turn on all the TPM (verifiable, unique identity) based devices in the network and then only allow the approved devices on the network? It could keep unsecure devices from the network! It would also be easier to keep track of those known and approved devices on the network rather than also having to re-inventory those other potentially unsecure devices!! And there would be a safer network that has less demanding requirements!
================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
Better security at less than half the cost!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Canada’s foreign affairs department hit with cyberattack
https://abcnews.go.com/Politics/canadas-foreign-affairs-department-hit-cyberattack/story?id=82450324
It came days after the government issued a malware warning.
=================================================================
The bolded information below is some of the important reading from Wave to help organizations understand how they can better defend themselves in the cyber realm!
Only hardware-based security can beat malware!
http://www.wavesys.com/products/wave-endpoint-monitor
Excerpts:
Detect attacks before it’s too late
Malware can do its work for weeks or months before you ever know it’s there. But with Wave Endpoint Monitor, you can spot malware before it has a chance to cause damage.
Antivirus software can’t detect rootkits and other malware; it works at the level of the OS and isn’t very good at seeing deeper into the system. For example, it can’t tell whether the boot record is lying. The Wave alternative is to work with the Trusted Platform Modules (TPMs), or security chips, embedded in your devices. By using the TPM to attest to the security of the device each time that device boots, Wave looks below the operating system and can help detect threats lurking there. Every time a device boots up, Wave Endpoint Monitor makes a comparison against previous boot values, and if anything deviates from the norm, it alerts you immediately.
==================================================================
Choose data protection that actually works!
http://www.wavesys.com/wave-alternative
Excerpts:
You have to start with the device
Wave has an alternative: security that’s built into each and every device.
We’re talking about hardware: self-encrypting drives (SEDs), which protect data when a device is stolen or lost, and trusted platform modules (TPMs), or embedded security chips. Both go in at the factory, and increasingly, both are standard. They make it possible for you to monitor and control each individual device and its data, no matter where it is. But you need software to turn on and manage your SEDs and TPMs. Wave makes that software.
We’ve been refining comprehensive, centralized management of hardware-based security longer than anyone else. More than that, we’ve shaped the field as a founding member of the Trusted Computing Group, the not-for-profit that develops and promotes industry standards for the hardware.
Security that’s confirmed, not assumed
With Wave, you’ll know that you’re secure. Because we start with the individual devices, you get a broad, deep view of your network. You can see exactly who’s on it, with what devices and what apps, at any given time. Just for example, if Bob goes home and tries to log onto Facebook with the company laptop, Wave can stop him.
A big piece of this heightened security is device authentication. Traditional two-factor authentication requires what amounts to two user IDs. But by using the TPMs inside your devices, Wave can confirm the identity of not only users, but also the devices they’re on. Combine that with fast, enforced encryption of sensitive data via your SEDs—all easily managed with Wave software—and your data is protected from the full range of modern risks: device theft, missent emails, flash drives, portable hot spots … even (and no one else can say this) hardware keyloggers. Not to mention Bob.
Do we need to say that with Wave, compliance is no problem?
That means Wave works on your existing mix of hardware, across platforms, and will evolve with you. It’s part of what makes the Wave alternative not only more secure, but also simpler and cheaper. Total cost of ownership for Wave data protection can be almost half that of a traditional software-based system.
Questions? Read on, or contact our sales department.
=================================================================
Better security at less than half the cost!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
DHS warns of Russian cyberattack on US if it responds to Ukraine invasion
https://abcnews.go.com/Politics/dhs-warns-russian-cyberattack-us-responds-ukraine-invasion/story?id=82441727
As tensions rise in the standoff over Ukraine, the Department of Homeland Security has warned that the U.S. response to a possible Russian invasion could result in a cyberattack launched against the U.S. by the Russian government or its proxies.
"We assess that Russia would consider initiating a cyber attack against the Homeland if it perceived a US or NATO response to a possible Russian invasion of Ukraine threatened its long-term national security," a DHS Intelligence and Analysis bulletin sent to law enforcement agencies around the country and obtained by ABC News said.
=================================================================
If your organization has laptops, there probably is both a TPM and SED (hardware security) built-in to the laptops. This hardware security when turned on, and used with Wave software could protect your data to an unprecedented level! With what's happening in Russia, I'm not quite sure why the U.S. doesn't mandate the turn-on of TPMs and SEDs especially when an organization like the TCG backs the technology! It could protect A LOT of organizations' data (also, please see previous post #247097). SEE WAVE AND TURN-ON YOUR TPMs and SEDs!! IT COULD SAVE YOUR DATA, DEVICES AND NETWORK!!
=================================================================
Better security at less than half the cost!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Ukraine Attack: Hackers Had Access for Months Before Causing Damage
https://www.securityweek.com/ukraine-attack-hackers-had-access-months-causing-damage
Excerpt:
Talos, which has assisted Ukrainian authorities with their investigation into the latest attacks, believes the attackers leveraged stolen credentials and they “likely had access to the victim network for months before the attack, a typical characteristic of sophisticated advanced persistent threat (APT) operations.”
=================================================================
The scenario bolded above plays out across the world constantly, day after day, and Wave could prevent attackers from accessing the organization's network! It's time to use Wave solutions to protect organizations from attackers trying to steal data from the network by PREVENTING THEM FROM ACCESSING THE NETWORK!! Please read excerpt below.
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
Better security at less than half the cost!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Exposed records exceeded 40 billion in 2021
https://www.helpnetsecurity.com/2022/01/21/exposed-records-2021/
Excerpt:
According to a research by Tenable, at least 40,417,167,937 records were exposed worldwide in 2021, calculated by the analysis of 1,825 breach data incidents publicly disclosed between November 2020 and October 2021. This is a considerable increase on the same period in 2020, which saw 730 publicly disclosed events with just over 22 billion records exposed.
=================================================================
Using Wave solutions extensively would change these numbers so that there would not be a large amount of data exposed by unauthorized devices! This would make new Wave customers VERY HAPPY!!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/data-protection
Excerpts:
Wave’s solution: start with the device
The Wave approach to this challenge is to make the IT perimeter irrelevant. Wave turns on and manages the self-encrypting drives (SEDs) and trusted platform modules (TPMs), or security chips, that are already embedded in many of your devices. The upshot is that each and every device is equipped with its own data protection system—while being centrally managed. This gives you unprecedented yet straightforward control over exactly who has access to your data, with what devices, over what networks.
We cost less too. Wave works on your existing hardware, across platforms. That’s because our solutions are based on an open standard that’s already been implemented on 600 million–plus laptops and is now working its way onto mobile devices. Our software is all you need to reach a whole new level of data protection. It’s one of the big reasons why total cost of ownership can be almost half that of a traditional software-based system that doesn’t even work very well.
==================================================================
Better security at less than half the cost!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Crypto.com Hack Hits 483 Users, Drains $34 Million in Funds
https://www.pcmag.com/news/cryptocom-hack-hits-483-users-drains-34-million-in-funds
Excerpts:
The cryptocurrency exchange is reimbursing affected users. It also plans on phasing out two-factor authentication for a stronger multi-factor authentication system.
The statement from Crypto.com suggests the hackers found a way to bypass the system, enabling them to log in and hijack user accounts, perhaps only with a password.
“Crypto.com revoked all customer 2FA tokens, and added additional security hardening measures, which required all customers to re-login and set up their 2FA token to ensure only authorized activity would occur,” the company said.
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpts:
Decrease expenses with virtual smart cards
You know what else happens when you take passwords out of the equation? A lot fewer calls to IT. Imagine if you took password resets out of the picture – that frees up a chunk of IT time, lowering your operating expenses significantly.
If your organization currently uses traditional tokens or smart cards, switching to virtual smart cards takes an even bigger burden off of IT – we use the hardware-protected credentials in the TPM to create a virtual smart card, which performs the same functionality as traditional smart cards. That means no need to purchase, deploy, replace or maintain external tokens, smart cards or smart card readers. Because virtual smart cards are already on your machines and can’t be forgotten, lost or stolen, you have lower capital expenses and lower operating expenses.
=================================================================
How many 2FA tokens are still out there in the marketplace 'protecting' accounts? Use a tokenless MFA in Wave VSC 2.0, and you and your organization would not have to worry about token bypass like in the article above!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Merck Wins $1.4bn NotPetya Payout from Insurer
https://thecybersecurity.news/general-cyber-security-news/merck-wins-1-4bn-notpetya-payout-from-insurer-16081/?nowprocket=1
Excerpts:
Numerous firms, such as Merck and confectionary big Mondelez, identified their insurance company refusing to fork out mainly because of an exclusion in their coverage for “acts of war.”
Even so, a New Jersey top-quality court docket judge has now ruled that the language therein indicates armed conflict relatively than the cyber form.
Lloyds of London very last November released a new established of clauses that broadened act of war exclusions to “cyber-functions involving states which are not excluded by the definition of war, cyber-war or cyber-functions which have a major detrimental impression on a condition.”
=================================================================
If you and your organization are concerned about new insurance clauses such as Lloyds of London, and the potential impact on a payout in the event of a cyber attack, and that it may not get paid, buying better security with Wave solutions could prevent the cyber attack from happening in the first place! Choose data protection that actually works!
=================================================================
Choose data protection that actually works!
http://www.wavesys.com/wave-alternative
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
‘Anomalous’ spyware stealing credentials in industrial firms
https://www.bleepingcomputer.com/news/security/anomalous-spyware-stealing-credentials-in-industrial-firms/
Excerpt:
The actors use stolen employee credentials that they acquire via spear-phishing to infiltrate deeper and move laterally in the company’s network.
=================================================================
Why you would want Wave VSC 2.0 (MFA-multi-factor authentication) protecting your network. It's better security! And it could easily prevent the problems in the article above! Please see excerpts below!
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpts:
Token-free, password-free user authentication
We know you’ve dreamt about shredding your list of passwords. Go on and do it.
Because you are starting the authentication process in the device’s hardware, the user doesn’t have to interact with it. All users see is their usual Windows log-in screen – no more additional passwords to access the VPN or other resources. They just sign in once, and the secure credentials in their TPMs securely and quickly connect them to everything they need. Say goodbye to user frustration and slow OS performance.
=================================================================
Secure device & user authentication
Sometimes it feels like security is more effective at deterring your users than hackers. But you still have to protect your enterprise resources, and we’re here to help. We take pride in securing your network, data, and resources to an unprecedented level, without causing a revolt from either IT or your users. In fact, your users probably won’t even know we’re there.
Here’s how it works:
Trusted Platform Module (TPM) + Wave’s ERAS for TPM Management = hardware-secured, fully-managed authentication
Most of your devices already come with TPMs (check out our “What is a TPM?” brochure if you’re not sure why this is exciting). This security chip comes attached to the motherboard of most enterprise-class PCs. There’s nothing “add-on” about it. The TPM provides a verifiable, unique identity for each machine.
Wave’s ERAS for TPM Management gives IT remote, centralized management of all TPMs on enterprise computers and tablets.
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Red Cross forced to shutter family reunion service following cyberattack and data leak
https://www.theregister.com/2022/01/20/red_cross_hit_by_cyberattack/
Excerpt:
Director-general pleads with cyber-scum: leave this data alone, because the people involved have suffered enough.
Humanitarian organization the International Red Cross disclosed this week that it has fallen foul of a cyberattack that saw the data of over 515,000 "highly vulnerable people" exposed to an unknown entity.
=================================================================
Better security at less than half the cost!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Thank you Methinks -
Thank you for reminding me of that Methinks. Maybe there is more going on behind the scenes that we are unaware of! Wave was involved with a lot of companies over the years. They could/should be rekindling those partnerships/relationships, and their benefits! Wave's solutions could be benefiting every organization around the world in BIG WAYS!
President Biden signs memo to help improve military cybersecurity
https://www.engadget.com/biden-memorandum-cybersecurity-defense-intelligence-195058392.html
Excerpt:
The President's move also sets timelines and guidance for implementing technologies required in the executive order, ranging from encryption to multi-factor authentication.
==================================================================
Using Wave VSC 2.0 (multi-factor authentication - MFA), and Wave SED (self-encrypting drives) management would be a wise move by the DOD and government! Hardware security activated and managed by the premier cybersecurity/trusted computing company (Wave) would make for better security.
Better security at less than half the cost!
==================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/products/wave-self-encrypting-drive-management
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Fashion giant Moncler confirms data breach after ransomware attack
https://www.bleepingcomputer.com/news/security/fashion-giant-moncler-confirms-data-breach-after-ransomware-attack/
Excerpt:
Italian luxury fashion giant Moncler confirmed that they suffered a data breach after files were stolen by the AlphV/BlackCat ransomware operation in December and published today on the dark web.
Today, the ALPHV ransomware gang published Moncler's data on their data leak and also indicated that they demanded $3 million not to publish the data.
=================================================================
With what Wave has for cybersecurity to secure devices, data and networks, and ransomware like in the article above still keeps happening?!?! Are you kidding me?? Sheeesh!! WAVE COULD BE PREVENTING THESE ATTACKS FROM HAPPENING! The data would have been protected, and the attackers wouldn't have had access to it to hold it for $3 million in ransom! Use better security, use Wave solutions!!!
=================================================================
Better security at less than half the cost!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Secure device & user authentication
Sometimes it feels like security is more effective at deterring your users than hackers. But you still have to protect your enterprise resources, and we’re here to help. We take pride in securing your network, data, and resources to an unprecedented level, without causing a revolt from either IT or your users. In fact, your users probably won’t even know we’re there.
Here’s how it works:
Trusted Platform Module (TPM) + Wave’s ERAS for TPM Management = hardware-secured, fully-managed authentication
Most of your devices already come with TPMs (check out our “What is a TPM?” brochure if you’re not sure why this is exciting). This security chip comes attached to the motherboard of most enterprise-class PCs. There’s nothing “add-on” about it. The TPM provides a verifiable, unique identity for each machine.
Wave’s ERAS for TPM Management gives IT remote, centralized management of all TPMs on enterprise computers and tablets.
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
Microsoft says 'destructive malware' being used against Ukrainian organizations
https://www.zdnet.com/article/microsoft-says-destructive-malware-being-used-against-ukrainian-organizations/
Excerpt:
Microsoft added that it was in the process of creating detections for the malware and provided a slate of security recommendations for organizations that may have been targeted.
==================================================================
Using activated SEDs could keep the MBR and drive from getting corrupted (wiping the drive in this situation). Also, while Microsoft is 'in the process of creating detections for the malware,' Wave Endpoint Monitor could already be detecting the malware if organizations were smartly using Wave Endpoint Monitor!! This may be even more important if there was a 'fight in the cyber realm' which escalates to include the U.S.?!
=================================================================
http://www.wavesys.com/products/wave-self-encrypting-drive-management
Only hardware-based security can beat malware!
http://www.wavesys.com/malware-protection
http://www.wavesys.com/products/wave-endpoint-monitor
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Microsoft Uncovers Destructive Malware Used in Ukraine Cyberattacks
https://www.securityweek.com/microsoft-uncovers-destructive-malware-used-ukraine-cyberattacks
Excerpt:
Gan reminded that overwriting MBR would render the machine unbootable, making recovery impossible especially when the malware also overwrites file contents before overwriting the MBR.
==================================================================
https://trustedcomputinggroup.org/wp-content/uploads/SED-Data-Protection-and-Security-Issues-Drive-Adoption.pdf
Excerpt:
In an SED, the entire drive including the master boot record (MBR) is encrypted. As a result the master boot record can't be corrupted.
=================================================================
Given what is happening in the Ukraine with the MBR (and the World potentially), SEDs being activated would be a great idea for organizations if you don't want your hard drives to be wiped! Also using better malware protection in the Wave Endpoint Monitor would be another great idea!
=================================================================
Only hardware-based security can beat malware!
http://www.wavesys.com/malware-protection
http://www.wavesys.com/products/wave-endpoint-monitor
http://www.wavesys.com/products/wave-self-encrypting-drive-management
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
‘We have to show strength’: Calls grow for U.S. to deter Russian hackers
https://www.politico.com/news/2022/01/16/biden-russia-cyber-ukraine-527183
Excerpt:
Kremlin saber-rattling on the Ukrainian border is increasing worries that a confrontation could fuel cyberattacks on the U.S.
The Biden administration has threatened to respond with sanctions that would cripple the Russian economy — a development that could in turn prompt Russia to retaliate with cyberattacks against the U.S.
=================================================================
Are U.S. organizations prepared for Russian cyberattacks? Hardware security (TPMs and SEDs activated) could get us prepared along with Wave software security! Organizations would be better protected! Otherwise, we are depending on software alone to protect us!
=================================================================
Choose data protection that actually works!
http://www.wavesys.com/wave-alternative
=================================================================
Better security at less than half the cost!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
DoD takes preventive measures to protect data, ward off cyber attacks
https://federalnewsnetwork.com/technology-main/2022/01/dod-takes-preventive-measures-to-protect-data-ward-off-cyber-attacks/
Excerpts:
To ensure DoD responds to the 1,000 or more cyber attacks it faces daily, the Defense Information Systems Agency has employed a task force that reaches the department’s wide-ranging apparatus — including cloud service providers, Cyber Command, JFHQ-DODIN and CISA at the Department of Homeland Security, for example.
Part of DoD’s playbook for effectively detecting ransomware includes having a knowledgeable workforce. DISA, for instance, hires cybersecurity professionals with nationally recognized certifications, and then trains those employees through rehearsals and simulations.
==================================================================
If the DOD is responding to 1000+ cyber attacks daily, it sounds like they could really benefit from using Wave solutions. With Wave, only known and approved devices would be having access to the network! This could eliminate many attackers from accessing the DOD's networks. Bill Solms would be ideal to show the government how this works, and how it could provide the DOD with better cybersecurity! It would also create more efficiency within the DOD!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
Better security at less than half the cost!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Windows security in ’22 — you need more than just antivirus software
https://www.computerworld.com/article/3646552/windows-security-in-22-you-need-more-than-just-antivirus-software.html
Excerpt:
Do you need antivirus in 2022 — especially when some options now come with a cryptominer built in?
=================================================================
After reading (recommended) the above article, using Wave Endpoint Monitor makes even more sense for organizations really interested in stopping/detecting malware!
==================================================================
http://www.wavesys.com/malware-protection
http://www.wavesys.com/products/wave-endpoint-monitor
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
MFA market to reach $21.3 billion by 2027
https://www.helpnetsecurity.com/2022/01/14/mfa-market-2027/
Excerpt:
Amid the COVID-19 crisis, the global market for multi-factor authentication (MFA) estimated at $8.6 billion in the year 2020, is projected to reach a revised size of $21.3 billion by 2027, growing at a CAGR of 13.9% over the analysis period 2020-2027, according to ResearchAndMarkets.
=================================================================
Given the capabilities of Wave VSC 2.0 (MFA), and its better security at less than half the cost, Wave should be.....!
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
19-year-old claims he hacked into over 25 Teslas in 13 countries
https://nypost.com/2022/01/12/teen-claims-he-hacked-into-over-25-teslas-in-13-countries/
Excerpt:
Last fall, Tesla CEO Elon Musk pledged that he would work with regulators on ensuring that electric car drivers’ personal data is protected from the threat of hackers.
==================================================================
Shouldn't regulators be mandating hardware security like Volkswagen (ie. TPMs and SEDs)!
One would think that with the connections/experience Peter Sprague had or has with 'Austin Martin' he could help Tesla and Wave by providing Tesla with Wave software to go along with hardware security that is more secure than software alone!! Wave can work with all of the TPMs!
And Steven Sprague and Michael Sprague saw the potential of electric cars before they even took off. If the three Spragues, Peter, Steven and Michael and Lexi (four) were a team again for Wave, I wouldn't bet against them.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
A Teenager Says He Has Hacked Tesla Vehicles
https://www.barrons.com/articles/tesla-vehicles-hack-51641992560?tesla=y
==================================================================
Volkswagen Deploys Infineon TPM 2.0 For Vehicle Communication Security
https://eepower.com/news/volkswagen-deploys-infineon-tpm-2-0-for-vehicle-communication-security/#
==================================================================
One has to wonder whether Tesla is going to up its security, and use hardware security (TPM) like Volkswagen has!
If one of the larger automakers is using the TPM for security, one would think that this would also give more organizations the push to activate, and have their TPMs managed by Wave software.
Better security at less than half the cost!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Wave Systems Announces First U.S. Federal Government Customer for Wave Virtual Smart Card 2.0
http://www.wavesys.com/buzz/pr/wave-systems-announces-first-us-federal-government-customer-wave-virtual-smart-card-2.0
Lee, MA -
October 2, 2014 -
Wave Systems Corp. (NASDAQ: WAVX) marked an important sales milestone by announcing the first U.S. federal government customer for its Virtual Smart Card 2.0.
Since the Virtual Smart Card 2.0 became commercially available in late July 2014, Wave has entered into dozens of pilot deployments in multiple sectors, including healthcare, financial services, automotive, energy and utilities. However, today’s announcement marks the product’s first sale in the government sector.
“This is an important milestone for Wave,” said Bill Solms, CEO of Wave. “Wave Virtual Smart Card 2.0 has been purchased by a government agency with significant security requirements and one that requires redundant means of system authentication due to national security interests. This initial sale is modest compared to the addressable market within the Federal Government sector, but it is important to our strategy for marketing the Virtual Smart Card to address critical government infrastructure defense.”
“We believe that this sale, which was completed on a shorter sales cycle than we had anticipated, supports our view that customers are interested in the type of cyber security solution that Wave’s Virtual Smart Card 2.0 provides,” Solms added.
Wave Virtual Smart Card 2.0 is the industry’s only enterprise-grade virtual smart card management solution that works on Windows 7. It also supports Windows 8 and 8.1. Wave’s new solution emulates the functionality of physical smart cards or tokens, but offers greater convenience to users, lower total cost of ownership, and a reduced risk of unauthorized use.
Wave Virtual Smart Card 2.0 gives IT the ability to:
• Remotely create and delete virtual smart cards
• Provide help desk-assisted recovery
• Configure PIN and card policies
• View the status of virtual smart cards and enrolled certificates
• Generate reports for compliance
• Support virtual smart cards on laptops, tablets and desktops with TPM 1.2 or TPM 2.0
Trusted Computing
There is one thing about Jimmie Joe's comments that I find interesting, and that is about Trusted Computing. The Trusted Computing Group has been around for 20+ years, and the companies in it back the TPM and SED standards, yet they are not required to use the technology (that I'm aware). Shouldn't they be shining examples of how using Trusted Computing could protect them from threats or cyberattacks!! Especially when you see a tweet on Jan. 6 about Thomas Hardjono, TCG technologies and the government. Wave could be helping them to activate and manage their TPMs and SEDs with Wave security software!!
Breach Respone Shift: More Lawyers, Less Cyber-Insurance Coverage
https://www.darkreading.com/attacks-breaches/changes-to-breach-response-more-lawyers-less-cyber-coverage
=================================================================
How about not having to deal with the insurance companies or the lawyers?! Then, use better security, use Wave solutions!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Cyber-Spike: Orgs Suffer 925 Attacks per Week, an All-Time High
https://threatpost.com/cyber-spike-attacks-high-log4j/177481/
Excerpt:
2021 dragged itself to a close under a Log4Shell-induced blitzkrieg. With millions of Log4j-targeted attacks clocking in per hour since the flaw’s discovery last month, there’s been a record-breaking peak of 925 cyberattacks a week per organization, globally.
==================================================================
Use the Wave solution below to dramatically lower the number of attacks per week on your organization:
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
It's a brilliant solution that could save your organization millions!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Over Half of SMEs Have Experienced a Cybersecurity Breach
https://thecybersecurity.news/general-cyber-security-news/over-half-of-smes-have-experienced-a-cybersecurity-breach-15753/?nowprocket=1
Excerpts:
The examine also analyzed the extent of cybersecurity steps that are in area for SMEs and the self-utilized. Practically 9 in 10 (88%) respondents explained they had at least one particular form of cybersecurity, such as antivirus program, firewalls or multifactor authentication, and 70% said they were being pretty confident or exceptionally self-confident in their cybersecurity preparations.
Of these companies and folks, 53% experienced antivirus/malware application in put, and 48% had invested in firewalls and protected networks.
=================================================================
http://www.wavesys.com/wave-alternative
Excerpt:
It’s a new world, one without borders. Yet most organizations are still trying to protect their data with the same old firewalls and antivirus software. It’s not working. We refer you to the headline-making breach of the week.
==================================================================
And as far as multi factor authentication goes, use a better solution in Wave VSC 2.0!
http://www.wavesys.com/products/wave-virtual-smart-card
==================================================================
Use better security, use Wave solutions!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
=================================================================
RIPTA data breach linked to file wrongly stored on employee's hard drive: union call
https://www.providencejournal.com/story/news/local/2022/01/09/ripta-breach-linked-file-clerks-hard-drive-unions-told/9142764002/
Excerpts:
Hackers were able to access the personal information of thousands of state workers because a Rhode Island Public Transit Authority employee failed to delete a file from their hard drive, union representatives were told this week.
That file was "left on the [employee's] hard drive, which is not normal, and that hard drive was hacked," it goes on to state.
=================================================================
If RIPTA employee were using Wave VSC 2.0, and the hard drive was an SED this wouldn't have been the problem that it was. Using Wave solutions, and the sensitive data wouldn't have been hacked or stolen! It's surprising that TPMs and SEDs aren't mandatory for MANY organizations, and that Wave's solutions aren't flying off the shelves like there is no tomorrow!!
Please read about Wave's flagship solutions below if your have not. This information could be very helpful to you and your organization! There is more information below by contacting Wave and using Wave's website!
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/products/wave-self-encrypting-drive-management
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE