Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
A hacking slugfest between Iran and its foes sparks fears of a wider cyberwar
https://www.latimes.com/world-nation/story/2021-12-23/iran-israel-hacking-heightens-fears-cyberwar
==================================================================
After seeing a headline like this, and the U.S. still hasn't mandated the activation of TPMs and SEDs makes little sense. This built-in hardware security could be protecting our data, devices and networks, and apparently the Biden administration and Congress somehow don't see the need to make activation mandatory. Reading this article just shows how important this is! Our software security alone will not protect us and other countries in the event of a cyberwar. Read about Wave in the links in the previous post, and how Wave software, and hardware security (TPMs and SEDs) provide a better defense!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
How familiar are consumers with data protection best practices?
https://www.helpnetsecurity.com/2021/12/21/data-protection-consumer/
=================================================================
I wonder how many consumers, and organizations have had the opportunity to read about Wave and compliance and Wave and data protection. It's really combinations and their descriptions that organizations and consumers should know about! And reading about the Wave alternative should be a must read for those rethinking cybersecurity, and curious about Wave's awesome solutions. Please read the contents in the links below to be able to have a better understanding of Wave's compliance, data protection, and the Wave alternative. It is very enlightening and offers superior cybersecurity/trusted computing!
==================================================================
http://www.wavesys.com/data-protection
To keep data safe, arm your devices!
==================================================================
http://www.wavesys.com/compliance
With device based security, compliance is simple!
==================================================================
http://www.wavesys.com/wave-alternative
Choose data protection that actually works!
=================================================================
Better security at less than half the cost!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Merry Christmas TommyBoy - loved reading your posts from the past!
Log4j flaw: Attackers are 'actively scanning networks' warns new CISA guidance
https://www.zdnet.com/article/cisa-cybersecurity-centers-from-australia-nz-uk-and-canada-release-log4j-advisory/
=================================================================
Why have the attackers actively scan your network, when you could keep those devices (attackers) from accessing the network by using Wave! Use better security at less than half the cost!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
Merry Christmas and Happy Holidays!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
New York Department of Financial Services Issues New Guidance on Multi-Factor Authentication and Cybersecurity Frameworks
https://www.jdsupra.com/legalnews/new-york-department-of-financial-4099905/
Excerpts:
However, the Industry Letter goes on to note that “MFA weaknesses are the most common cybersecurity gap exploited at financial services companies,” most often due to MFA “being absent, not fully implemented, or configured improperly.” Specifically, NYDFS noted that, from January 2020 to July 2021, more than 18.3 million consumers were impacted by cybersecurity incidents reported to NYDFS that were linked to an MFA failure.
Push-based and token-based MFA configurations are the most commonly used.
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
Excerpts:
Get better security at less than half the cost
Passwords are weak. Tokens are expensive. Don’t compromise on security or price.
==================================================================
http://www.wavesys.com/buzz/pr/wave-announces-5-year-master-license-agreement-virtual-smart-card-20-leading-global
Wave Announces 5-Year Master License Agreement for Virtual Smart Card 2.0 with Leading Global Financial Services Company
Wins competitive evaluation against market leader in two-factor authentication tokens
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Police found 225 million stolen passwords hidden on a hacked cloud server. Is yours one of them?
https://www.zdnet.com/article/police-found-225-million-stolen-passwords-hidden-on-a-hacked-cloud-server-is-yours-one-of-them/
=================================================================
If only these people who are part of organizations knew about Wave and Wave VSC 2.0! They could try and buy Wave solutions so that they have cybersecurity/trusted computing second to none! Please see the links with more information on Wave below!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
Token-free, password-free user authentication
We know you’ve dreamt about shredding your list of passwords. Go on and do it.
Because you are starting the authentication process in the device’s hardware, the user doesn’t have to interact with it. All users see is their usual Windows log-in screen – no more additional passwords to access the VPN or other resources. They just sign in once, and the secure credentials in their TPMs securely and quickly connect them to everything they need. Say goodbye to user frustration and slow OS performance.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Congress passes a bipartisan defense bill that includes a 2.7% servicemember pay boost
https://www.npr.org/2021/12/07/1062192097/house-passes-ndaa-national-defense-authorization-act
=================================================================
How much of this bill is allocated to cybersecurity? In cybersecurity/trusted computing, other than Wave, who provides the biggest bang for the buck AND better security? AND Wave is friendlier to the environment by securing systems rather than retiring them early!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Biden national security officials warn of 'heightened risk' of 'malicious cyber' activities around holidays
https://www.foxbusiness.com/politics/biden-national-security-officials-warn-of-heightened-risk-of-malicious-cyber-activities-around-Christmas
Excerpts:
Its time for US to 'go on offense' to combat cybercrime: Crowdstrike founder.
"Historically we have seen breaches around national holidays because criminals know that security operations centers are often short-staffed, delaying the discovery of intrusions."
Neuberger and Inglis said that the U.S. has "experienced numerous recent events that highlight the strategic risks we all face because of the fragility of digital infrastructure and the ever-present threat of those who would use it for malicious purposes."
The officials warned that cyber criminals plan and begin an intrusion "before the holiday itself," by infiltrating a network and waiting for "the optimal time to launch an attack."
=================================================================
Wave wouldn't recommend the US go on offense with the cyber defensive solutions that it offers!
Are organizations effectively able to keep attackers from accessing their networks: holiday or no holiday? An organization using Wave solutions could ensure that only known and approved devices are accessing their network!
If you haven't read about the Wave alternative, the link is provided below and is recommended reading! Please also see the contact information below if you would like to try/buy a solution or learn more about Wave's awesome solutions!
=================================================================
http://www.wavesys.com/wave-alternative
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Ransomware in 2022: We're all screwed
https://www.zdnet.com/article/ransomware-in-2022-were-all-screwed/
Excerpts:
Security experts tell us what to expect in the cybercriminal landscape as we head into the new year. It's not good.
Pay to stay away?
Another potential method of extortion we may see next year is that of companies paying operators not to attack them. Joseph Carson, Chief Security Scientist at ThycoticCentrify, suggests that while RaaS is already in full swing, "ransomware could even evolve further into a subscription model in which you pay the criminal gangs to not target you."
=================================================================
The existing cybersecurity has not been stopping ransomware when looking at the number of affected companies, and the future effectiveness of cybersecurity (outside of Wave) doesn't bode well when seeing the title of this article. It is a great time to be using Wave solutions to prevent ransomware attacks now and into the future!
=================================================================
Below, view the Wave alternative for a good glimpse into Wave! 'Contact Wave' is posted below for those who would like to learn about, try and/or buy cybersecurity/trusted computing that actually works!
=================================================================
Choose data protection that actually works!
http://www.wavesys.com/wave-alternative
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Washington shouldn't pat itself on the back for its cybersecurity spending just yet
https://thehill.com/opinion/cybersecurity/586054-washington-shouldnt-pat-itself-on-the-back-for-its-cybersecurity
=================================================================
How well do organizations keep unauthorized devices from accessing their networks, and from getting sensitive information from their networks? There has been a large number of ransomware attacks where data has been held for ransom, and thus the unauthorized devices are getting on organizations' networks. Wave has a solution, only allow known and approved devices access to the network! The solution can keep attackers from the network, and access to Log4Shell as well!
It's time that governments invested in Wave's solutions.... solutions that actually work!
=================================================================
Better security at less than half the cost!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Secure device & user authentication
Sometimes it feels like security is more effective at deterring your users than hackers. But you still have to protect your enterprise resources, and we’re here to help. We take pride in securing your network, data, and resources to an unprecedented level, without causing a revolt from either IT or your users. In fact, your users probably won’t even know we’re there.
Here’s how it works:
Trusted Platform Module (TPM) + Wave’s ERAS for TPM Management = hardware-secured, fully-managed authentication
Most of your devices already come with TPMs (check out our “What is a TPM?” brochure if you’re not sure why this is exciting). This security chip comes attached to the motherboard of most enterprise-class PCs. There’s nothing “add-on” about it. The TPM provides a verifiable, unique identity for each machine.
Wave’s ERAS for TPM Management gives IT remote, centralized management of all TPMs on enterprise computers and tablets.
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Log4j flaw: This new threat is going to affect cybersecurity for a long time
https://www.zdnet.com/article/log4j-flaw-this-new-threat-is-going-to-affect-cybersecurity-for-a-long-time/
Excerpt:
But much more dangerous threats soon followed. These included instances of penetration-testing tool Cobalt Strike being installed – something commonly used by attackers to steal usernames and passwords that are necessary to move around networks.
==================================================================
Wave VSC 2.0 prevents the bolded in the excerpt above, and it uses the TPM which is built-in to billions of devices. The market, unfortunately, is not using the TPMs en masse. A company like Wave can turn these TPMs on! Only allowing known and approved devices to an organization's network should be mandated given ALL the TPMs that are out there in devices inactivated. This mandate or stepped up marketing from the TCG could save many thousands of companies from Log4shell and attackers. By not allowing unknown and unapproved devices (attackers) to access the network, Wave keeps these attackers from exploiting Log4shell that is on the networks.
=================================================================
Rethink cybersecurity, and invest in Wave's awesome solutions!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Log4j flaw could be a problem for industrial networks 'for years to come'
https://www.zdnet.com/article/log4j-flaw-could-be-a-problem-for-industrial-networks-for-years-to-come/
Excerpts:
Cybersecurity researchers issue advice for critical infrastructure operators – many of who might not even know whether or where Log4j is used on the network.
Many industrial organisations struggle with visibility into their networks due to their complex nature, but it's important for those running operational technology to know what their network looks like and counter the possibility of attacks attempting to exploit the vulnerability as a matter of urgency.
==================================================================
Wave could be a BIG HELP to organizations that are critical infrastructure and others as well! It's very important to only allow known and approved devices access to the network! Wave has this capability, and it could be the difference in an attacker 'attempting to exploit the vulnerability' successfully on the network, and simply not being allowed access to the network because of Wave solutions!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
Choose data protection that actually works!
http://www.wavesys.com/wave-alternative
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Microsoft: Log4j exploits extend past crypto mining to outright theft
https://venturebeat.com/2021/12/12/microsoft-log4j-exploits-extend-past-crypto-mining-to-outright-theft/
Excerpt:
Microsoft said Saturday that exploits so far of the critical Apache Log4j vulnerability, known as Log4Shell, extend beyond crypto coin mining and into more serious territory such as credential and data theft.
=================================================================
With Wave VSC 2.0, credentials are stored in the protected hardware of the TPM! Wave solutions should be on the shopping lists of MANY organizations! Wave would have MANY happy customers! TPMs activated with Wave software, and SEDs (self-encrypting drives) could stop the data theft problem too! Please see links and excerpts below.
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
Excerpt:
The user experience with a virtual smart card is simple: he or she logs in with a PIN (authentication factor number one). The TPM (authentication factor number two) then transparently identifies the device to the network and connects the user to all the approved services. It’s one less thing for users to carry around.
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpts:
Token-free, password-free user authentication
We know you’ve dreamt about shredding your list of passwords. Go on and do it.
Because you are starting the authentication process in the device’s hardware, the user doesn’t have to interact with it. All users see is their usual Windows log-in screen – no more additional passwords to access the VPN or other resources. They just sign in once, and the secure credentials in their TPMs securely and quickly connect them to everything they need. Say goodbye to user frustration and slow OS performance.
==================================================================
http://www.wavesys.com/data-protection
Excerpts:
Wave’s solution: start with the device
The Wave approach to this challenge is to make the IT perimeter irrelevant. Wave turns on and manages the self-encrypting drives (SEDs) and trusted platform modules (TPMs), or security chips, that are already embedded in many of your devices. The upshot is that each and every device is equipped with its own data protection system—while being centrally managed. This gives you unprecedented yet straightforward control over exactly who has access to your data, with what devices, over what networks.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
UNDER ATTACK Billions of Windows users warned over ‘worst hack in history’ that lets crooks hijack your PC
https://www.the-sun.com/lifestyle/tech-old/4263230/windows-worst-hack-in-history-threat/
==================================================================
This is software being exploited. If your organization used Wave VSC 2.0 (MFA) with TPMs, it would be much more difficult to hack hardware, the TPM (the second factor of authentication for logging into the computer). This Log4shell incident should make Wave VSC 2.0 very popular amongst organizations!
==================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Timekeeping biz Kronos hit by ransomware and warns customers to engage biz continuity plans
https://www.theregister.com/2021/12/13/ultimate_kronos_group_ransomware_attack/
Excerpts:
Kronos Private Cloud has been hit by a ransomware attack. The company, also known as Ultimate Kronos Group (UKG), provides timekeeping services to companies employing millions across worldwide.
"Issues companies will have is employees don't know their schedule (it's in Kronos) and then when they clock in and out, that clock won't go anywhere," a Register reader, who works for an affected firm, told us.
Kronos' timekeeping products are used by companies in the UK including supermarket chain Sainsburys, Boots the Chemist and Jaguar Land Rover, and large outfits in the US including Clemson Uni in South Carolina, USA; Winthrop University Hospital in Long Island, New York; and US state and local government customers such as Santa Clara County.
The message from Kronos said restoring full service would take "several weeks."
=================================================================
With the enormous benefits that Wave can provide to organizations so they can prevent cyber attacks, Wave could be helping a lot of organizations with its superior cybersecurity/trusted computing!
=================================================================
Choose data protection that actually works!
http://www.wavesys.com/wave-alternative
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
US military's hacking unit to take on ransomware gangs
https://www.hackread.com/us-militarys-hacking-on-ransomware-gangs/
The Unit’s boss Gen. Paul Nakasone said that the US military computer operatives are ready to target ransomware gangs and state actors, whoever poses a threat to critical US infrastructure.
==================================================================
If the US government makes offensive maneuvers against the ransomware attackers, does the government have better security to protect against any retaliation? Is their data protected from the unauthorized (attackers) by security like Wave solutions? They should have better security like Wave VSC 2.0 to prevent the attackers from stealing the US's data! Current security has led to having to resort to offensive maneuvers! Turn on TPMs and SEDs with Wave software for better protection! Just ask Bill Solms!
=================================================================
Choose data protection that actually works!
http://www.wavesys.com/wave-alternative
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Why Crowdstrike looks better than the competition
https://seekingalpha.com/article/4474299-crowdstrike-crwd-stock-better-than-competition
==================================================================
This writer appears to not know about Wave Endpoint Monitor for anti-malware. Downloading large new files to computers is not necessary when using WEM, and there is no long list to 'try' to keep updated! Custom malware can be missed by Crowdstrike and other antivirus providers! Use better security, use Wave solutions!
==================================================================
Only hardware-based security can beat malware!
http://www.wavesys.com/malware-protection
Excerpts:
Software can’t always detect malware
The big problem with malware is that antivirus software doesn’t always detect it. Anti-malware software is based on signatures of known bad software. However, there always needs to be a patient 0 that discovers he is infected, for the rest of the world to benefit from it. In the case of APTs (Advanced Persistent Threats), your organization may be the only target for the specific strand of malware. In that case, the signature detection process will not protect you. Modern anti-malware and other software packages that promise cyber security or protection from APTs would use various heuristics and "AI" (Artificial Intelligence) to detect malware based on a predefined set of behavioral parameters. A sophisticated attacker is able to fine tune the behavior of the malware he is writing against various known anti-malware software solutions, so that it can evade detection for long periods of time.
A further challenge for anti-malware software is that it commonly works at the OS level. It isn’t very good at seeing deeper into the system, where some malware lives. Malware can hide from anti-malware by feeding it false results as it lies lower in the stack.
Wave’s solution: start with the device
If antivirus software doesn’t work, what does? The Wave alternative relies not on superficial layers of software but on standards-based hardware: self-encrypting drives (SEDs) and Trusted Platform Modules (TPMs), or security chips, that are already embedded in many of your computers and mobile devices. This hardware provides you with secure storage. When you turn the SED and TPM on and manage them with Wave, you suddenly have a broad, deep view into your network. Among other things, you’ll know immediately whether any one of your devices—computers, laptops, tablets, smartphones—has been tampered with. But Wave is proactive too: you can block the kinds of behaviors that invite malware in. Wave's Endpoint Monitor provides early detection for these low-lying sneaky attacks.
==================================================================
http://www.wavesys.com/products/wave-endpoint-monitor
Excerpt:
Every time a device boots up, Wave Endpoint Monitor makes a comparison against previous boot values, and if anything deviates from the norm, it alerts you immediately.
==================================================================
Methink's input is always appreciated!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Microsoft fires back after CrowdStrike questions its trustworthiness
https://www.windowscentral.com/microsoft-fires-back-after-crowdstrike-questions-its-trustworthiness
CrowdStrike called out Microsoft in a recent report, and the Redmond-based giant clapped back.
==================================================================
Microsoft could say that Crowdstrike may be unaware of a company like Wave Systems that could activate hardware security (TPMs and SEDs) that is already built in to Windows systems to greatly improve its trustworthiness!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Microsoft, Google OAuth flaws can be abused in phishing attacks
https://www.bleepingcomputer.com/news/security/microsoft-google-oauth-flaws-can-be-abused-in-phishing-attacks/
Excerpt:
Email protection systems are helpless against these attacks," concludes Proofpoint.
==================================================================
Given that phishing remains the most common cause of data breaches (Post #246928), and that email protection systems are helpless against these attacks, Wave protecting against phishing would be a feature that saves organizations from sneaky data breaches while also saving organizations money, their brand, and their reputation!
Use better security in organizations... Use Wave VSC 2.0, and you don't need to use OAuth!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Cybersecurity company says Chinese hackers targeting Southeast Asian nations
https://thehill.com/policy/technology/584941-southeast-asian-nations-broadly-targeted-by-chinese-hackers-report
It said that Malaysia, Indonesia and Vietnam were the top subjects of the attacks though other countries were impacted as well.
=================================================================
If organizations used Wave Endpoint Monitor and Wave VSC 2.0, they should quickly realize what better security is all about, and go on to being properly protected with Wave's solutions! Another Wave solution, Wave SED management could activate and manage your organization's SEDs (Self Encrypting Drives)!
Seeing statistics of thousands of cyber attacks happening every year is getting old, and very frustrating for many organizations; prevent cyber attacks by using Wave solutions!
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/free-trial-request?product_trial_requested=wave_vsc
================================================================
http://www.wavesys.com/products/wave-self-encrypting-drive-management
http://www.wavesys.com/free-trial-request?product_trial_requested=wave_sed_management
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
http://www.wavesys.com/free-trial-request?product_trial_requested=eras_for_tpm_management
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Chinese Ransomware Attacks Major Energy Network! Potentially Shutting Down Power for 3 Million Homes
https://www.techtimes.com/articles/269092/20211208/chinese-ransomware-attack-major-energy-network-chinese-ransomware-shut-down-power-3-million-homes.htm
Excerpt:
Bills said that "this incident may have affected our corporate network, but we are fortunate to have a resilient and highly skilled workforce."
=================================================================
After seeing numerous incidents where the unauthorized have hacked into organizations' networks, the primary plan to stop these attackers should be to only allow known and approved devices access to the network. The method for stopping these attackers in the above article should not be relied upon for such a critical situation. Next time things could be a lot worse unless they were using Wave solutions!
Protect your organization from potentially big cyber incidents like these... Use Wave solutions!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
New chart shows how fast a computer can crack your exact password — and simple tweaks to protect it
https://thehill.com/changing-america/enrichment/education/584713-new-chart-shows-how-fast-a-computer-can-crack-your
Excerpt:
The World Economic Forum released a series of tips to help inform people how to change their passwords to maximize security.
==================================================================
What is simpler than adding more characters, and complexity ('tweaks') to passwords?
What has better security?
What is less than half the cost?
The answer to these questions is Wave VSC 2.0 (MFA) for organizations!
=================================================================
Rethink cybersecurity and use Wave's awesome solutions!
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Phishing remains the most common cause of data breaches, survey says
https://www.darkreading.com/edge-threat-monitor/phishing-remains-the-most-common-cause-of-data-breaches-survey-says
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpts:
Key Features:
Strong Security
• Authenticate securely, encrypt email, and prove integrity of the device with one management console
• Protect against phishing, malware and other network security threats by storing authentication credentials in hardware
• Provide centralized enforcement of custom policies
==================================================================
I heard it once said - Alone we are smart. Together we are brilliant!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Colorado energy company loses 25 years of data after cyberattack while still rebuilding network
https://www.zdnet.com/article/colorado-energy-company-loses-25-years-of-data-after-cyberattack-still-rebuilding-network/
Excerpts:
We are committed to restoring our network and getting back to normal operations...
DMEA CEO Alyssa Clemsen Roberts said the impact on their systems was "extensive" and that a good portion of their saved data such as forms and documents was corrupted
"It's a bit of a surprise that we haven't seen more attacks on public utilities, but there is no question that more are coming." Nayyer explained.
==================================================================
If DMEA were using Wave solutions, these unknown and unapproved devices (hackers) would not have had access to the network to do all this damage! Wave solutions could be doing a much better job of protecting organizations like DMEA!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
==================================================================
Choose data protection that actually works!
http://www.wavesys.com/wave-alternative
Excerpt:
Security that’s confirmed, not assumed
With Wave, you’ll know that you’re secure. Because we start with the individual devices, you get a broad, deep view of your network. You can see exactly who’s on it, with what devices and what apps, at any given time. Just for example, if Bob goes home and tries to log onto Facebook with the company laptop, Wave can stop him.
A big piece of this heightened security is device authentication. Traditional two-factor authentication requires what amounts to two user IDs. But by using the TPMs inside your devices, Wave can confirm the identity of not only users, but also the devices they’re on. Combine that with fast, enforced encryption of sensitive data via your SEDs—all easily managed with Wave software—and your data is protected from the full range of modern risks: device theft, missent emails, flash drives, portable hot spots … even (and no one else can say this) hardware keyloggers. Not to mention Bob.
Do we need to say that with Wave, compliance is no problem?
=================================================================
http://www.wavesys.com/compliance
With device-based security, compliance is simple!
=================================================================
Better security at less than half the cost!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Windows 11 adoption nears 9%, but businesses are waiting
https://www.computerworld.com/article/3643074/windows-11-adoption-nears-9-but-businesses-are-waiting.html
==================================================================
The more business wait to upgrade to Window 11 machines, obviously the better off the environment is. While businesses wait to adopt Windows 11, smart businesses should turn on their already built-in hardware security (TPMs and SEDs), and do so by using Wave software! Otherwise, a good portion of the world will continue to have devices, data and networks that aren't properly protected!
Use data protection that actually works... Use Wave solutions!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Double Extortion Ransomware Victims Soar 935%
https://thecybersecurity.news/general-cyber-security-news/double-extortion-ransomware-victims-soar-935-14978/?nowprocket=1
Excerpts:
Researchers have recorded a 935% year-on-yr enhance in double extortion attacks, with info from more than 2300 providers posted on to ransomware extortion web-sites.
==================================================================
OVER 2300 COMPANIES' DATA ARE POSTED ONTO RANSOMWARE EXTORTION SITES! WAVE CAN PROVIDE THE DATA PROTECTION FOR ORGANIZATIONS THAT CAN STOP THE ABOVE FROM CONTINUING TO HAPPEN!
TIME FOR A GREAT CHANGE IN CYBERSECURITY.....TIME FOR WAVE!
==================================================================
http://www.wavesys.com/wave-alternative
Choose data protection that actually works!
==================================================================
http://www.wavesys.com/data-protection
To keep data safe, arm your devices!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Ransomware actors steal data of 400K patients from LA Planned Parenthood
https://www.scmagazine.com/analysis/breach/ransomware-actors-steal-data-of-400k-patients-from-la-planned-parenthood
Excerpt:
The investigation found attackers gained access to the PPLA network between Oct. 9 and Oct. 17, wherein they were able to exfiltrate some files on the network.
=================================================================
If only Planned Parenthood LA and other organizations used Wave solutions to keep ransomware actors from accessing their networks, this cyber incident wouldn't have happened.
How? Only allow known and approved (authorized) devices access to your network. You can do this for your organization with Wave! This data breach should not have happened. Wave's solutions stop the problem; these other products (ie. continuous monitoring) don't fix it, like Wave can!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
FBI: Cuba ransomware breached 49 US critical infrastructure orgs
https://www.bleepingcomputer.com/news/security/fbi-cuba-ransomware-breached-49-us-critical-infrastructure-orgs/
=================================================================
Avoid these ransomware attacks and data breaches. It's time for organizations to wake up to the smell of sweet success of using Wave solutions!
Better security at less than half the cost!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Crooks are selling access to hacked networks. Ransomware gangs are their biggest customers
https://www.zdnet.com/article/theres-been-a-big-jump-in-crooks-selling-access-to-hacked-networks-ransomware-gangs-are-their-best-customers/
Dark web forum posts offering compromised VPN, RDP credentials and other ways into networks have tripled in the last year.
=================================================================
Use Wave VSC 2.0 (MFA) to stop the crooks!
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
Excerpt:
What can it be used for?
What do you use your smart card for today? With the exception of keying open the door at work, Wave Virtual Smart Card can perform any of the services or applications you rely on your smart card for today. Secure VPN, WiFi, remote desktop, cloud applications – it can all be done with a virtual smart card.
==================================================================
Better security at less than half the cost!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Suspected Chinese hackers breach more US defense and tech firms
https://www.cnn.com/2021/12/02/politics/china-hackers-espionage-defense-contractors/index.html
=================================================================
There are over 100+ companies (TCG) that support trusted computing, and two of their hardware security standards (TPM and SED) need to be activated for better security! Not using these standards has sent the world into a downward spiral within the cybersecurity realm. Wave and its software along with this hardware security could protect organizations so much better than software security alone The above posted article just shows that our current cybersecurity is not working.
Rethink cybersecurity and use Wave's awesome solutions!
=================================================================
Choose data protection that actually works!
http://www.wavesys.com/wave-alternative
=================================================================
With device based security, compliance is simple!
http://www.wavesys.com/compliance
=================================================================
To keep your data safe, arm your devices!
http://www.wavesys.com/data-protection
=================================================================
Better security at less than half the cost!
http://www.wavesys.com/products/wave-virtual-smart-card
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
What the SEC Requires From Businesses After a Data Breach
https://securityintelligence.com/articles/sec-business-data-breach/
Consumers have become wary of data breaches and the decreased safety of their personal information. However, the cost of a data breach is no longer only a matter of money and your company’s good name. There is now a third critical reason to pay attention: the U.S. Securities and Exchange Commission — more commonly referred to as the SEC.
The SEC has begun to take aim at the business practices that can lead to breaches. So, what does the SEC’s involvement mean for cybersecurity professionals?
Why Is the SEC Involved in Data Breach Response?
You might think about the SEC in terms of stocks and the stock market. But it has a three-part mission: protect investors, facilitate capital formation and maintain fair, orderly and efficient markets.
To protect investors, the SEC works to make sure consumers are not investing their hard-earned money in a company’s stock based on false or misleading information. That might mean looking into falsified earning reports, but it also goes much deeper.
The SEC aims for transparency. So, they require each business to disclose all types of risk that can affect the company’s earnings and, in the end, the stock price. This process increases the odds that an investor has access to all the information about a company’s financial health.
The possible risks encompass much more than fraud; they can include everything from supply chain issues to natural disasters. The purpose is to share anything and everything that could possibly affect the financial future of the company.
This leads us right to the answer about why the SEC cares about cybersecurity. When a company faces a cybersecurity attack or event, it affects its revenue. According to the IBM Cost of a Data Breach Report 2021, the average cost of a ransomware attack (the costliest type of breach) is $4.62 million. And the average cost of the least costly type of data breach (breaches in hybrid cloud environments) is still very expensive, at $3.61 million.
What This Means for Revenue
This means cybersecurity practices play a large part in a company’s revenue. Even minor breaches result in severe losses. Most consumers never consider cybersecurity when deciding where to invest their money.
Very few cybersecurity issues develop because of a single poor decision or mistake. Instead, there are multiple choices and factors that lead to the vulnerabilities that allow a breach to happen.
The issue concerns the SEC because when an organization faces a major incident, the price of that company’s stock almost always goes down. But consumers don’t have cybersecurity-related information when they purchase company stock. So, they are making those purchasing decisions without key information. That can make their investment much riskier than they realize.
Why now? It’s simple. The costs of breaches are going up, which means the risk to investors is increasing.
The IBM Cost of a Data Breach Report 2021 found the cost of a breach increased 10% between 2020 and 2021. As you might expect, the increased number of people working from home was a factor. Breaches involving remote work cost $1.07 million more than other breaches.
Reputation is a bit harder to quantify. But the fact that 38% of the cost of a breach comes from lost business is notable.
What Is the SEC Doing About Cybersecurity Risks and Incidents?
The SEC is leveraging fines to companies with poor cybersecurity practices more and more.
In July 2021, the SEC settled with Pearson Plc, a London-based public educational publishing company. Pearson agreed to pay $1 million in response to charges of misleading investors regarding a 2018 breach, which involved the theft of millions of student records, including dates of birth and email addresses. The SEC’s stance was that Pearson did not have good enough disclosure controls and procedures.
And Pearson isn’t the only case like this. In August 2021, the SEC announced actions against eight financial firms for failures in their cybersecurity procedures and policies. Each of the companies had email account takeovers that caused exposure of client personal information, and the settlements ranged between $200,000 and $300,000 for each company. Experts agree that these are likely just the beginning. They are a signal that the SEC is now focusing on the risks cybersecurity issues pose to investors.
How to Avoid SEC Fines After a Data Breach
Harvard Business Review’s article on this subject is right on the money. First, create a committee for disclosure to conduct quarterly surveys to uncover everything that needs to be disclosed.
Secondly, disclose early. In a past case, the SEC ruled that six months was too long. Companies should take action as soon as possible. Along those lines, HBR gave further guidance that companies should disclose they understand the full scope of the breach.
The final two suggestions — conduct forensic assessments and build visibility into your assets — provide practical advice. They can guide you to create a process that makes it easy to quickly and accurately disclose cybersecurity issues.
Let the SEC’s Data Breach Response Increase Your Cybersecurity Funding
Chief information security officers often ask me how they can show their company’s leaders how important cybersecurity is. And this SEC news is an outstanding proof point. It’s a great illustration of how cybersecurity incidents cost reputation and money. Plus, no one wants to get fined by the SEC. It’s just not a good look.
Before your next budgeting meeting, set up time to meet with your company leaders. Bring copies of recent SEC sanctions and a list of potential vulnerabilities in your own company. Start with sharing the SEC’s recent actions. Next, make the case for areas that could cause your company the same fate. Then tie it right back to your budget. Show how investments in cybersecurity can help prevent your organization from becoming the SEC’s next target.
You’ve known for years, if not decades, the importance of cybersecurity to your company. And while at first glance it appears the SEC news is bad for the industry, it’s actually the opposite. It’s even more proof that your company’s success and future depend on taking effective and proactive cybersecurity measures now.
==================================================================
Avoid data breaches, and thus avoid the SEC.....Use Wave solutions!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Lloyd’s Carves Out Cyber-Insurance Exclusions for State-Sponsored Attacks
https://threatpost.com/lloyds-cyber-insurance-exclusions/176669/
Excerpt:
The insurer's new definition of cyber-war leaves plenty of latitude for the insurer to refuse to pay.
==================================================================
Instead of being an organization that goes through the possibility of denial of coverage after experiencing a cyber attack, be an organization that proactively uses Wave solutions to prevent cyber attacks.
Better security at less than half the cost!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
2.1 Million People Affected by Breach at DNA Testing Company
https://www.securityweek.com/21-million-people-affected-breach-dna-testing-company
Ohio-based DNA testing company DNA Diagnostics Center (DDC) this week disclosed a data breach affecting 2.1 million people.
In a data breach notice posted on its website, DDC said it detected unauthorized access to its network on August 6. An investigation has determined that the attackers had accessed an archived database containing personal information collected between 2004 and 2012 for a national genetic testing organization system that was acquired by the firm in 2012.
“This system has never been used in DDC’s operations and has not been active since 2012,” the company said. “DDC has been and remains fully operational, and the systems and databases that are actively used by DDC were not infiltrated.”
DDC has determined that the hackers may have copied certain files and folders between May 24 and July 28, 2021.
The data breach notification posted on the company’s website does not provide any other details regarding the attack, but information submitted to the Maine Attorney General’s Office shows that the incident has impacted more than 2.1 million individuals.
Information that may have been obtained by the hackers includes names, Social Security numbers, bank account numbers, and payment card data.
DDC has been informing impacted people about the breach and offering them free credit monitoring services.
DDC says it has conducted more than 20 million DNA tests since 1995. The company offers paternity, immigration, COVID-19, DNA relationship, fertility and other types of testing.
=================================================================
Isn't free credit monitoring services becoming lacking in true effectiveness unlike being proactive and using Wave solutions upfront.
If DDC and other organizations used Wave solutions, they would be very happy that unauthorized devices wouldn't be accessing their networks and stealing their sensitive data!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
CISA Releases Guidance on Securing Enterprise Mobile Devices
https://www.securityweek.com/cisa-releases-guidance-securing-enterprise-mobile-devices
=================================================================
If the CISA used the Wave/ARM blueprint for securing Enterprise Mobile Devices, organizations would be a lot more secure!
=================================================================
Wave Joins ARM TrustZone Ready Program
Committed to Helping Chip Manufacturers Implement Industry Standard Security for Mobile Platforms
http://www.wavesys.com/buzz/pr/wave-joins-arm-trustzone-ready-program
Lee, MA -
September 26, 2012 -
Wave Systems Corp. (NASDAQ:WAVX) today announced that it has joined the ARM TrustZone® Ready Enablement Program to provide support and infrastructure for implementing enterprise security capabilities in mobile devices. As a partner in the program, Wave joins other industry leaders in helping chip manufacturers design and implement new industry standard security capabilities within ARM’s TrustZone architecture to enable full cross-platform interoperability across PCs, tablets, smartphones and other mobile devices.
TrustZone Technology (developed by ARM, the world’s leading semiconductor IP supplier) is a System-on-Chip security concept that involves a hardware-isolated space for a Trusted Execution Environment (TEE). Once integrated, core security services such as cryptography, storage and user interfaces can enable services to be deployed with a new level of security and convenience.
The primary goal of ARM's TrustZone Ready enablement program is to guide chip and device manufacturers to design robust, industry-certified security architecture into their products that will meet the needs of service providers looking to deploy secure services on secured platforms. Companies that implement system-wide security into their platforms can benefit from this program through a cohesive set of design blueprints, market requirements, and checklists aligned with industry standards.
“Smart phones, tablets and other devices are essential for today’s enterprise, and require access to sensitive applications and data. While these devices have excellent security for the mobile operator’s services, they lack basic security for use within an enterprise network,” commented Steven Sprague, Wave’s CEO. “ARM, with the TrustZone Ready Program, is taking the lead in making sure that standards-based security implemented in the TrustZone Trusted Execution Environment (TEE) is integrated into chipsets for mobile devices. Wave is committed to sharing its expertise in Trusted Platform Module (TPM) implementations, application development and trust infrastructure support.”
“Wave’s infrastructure for managing TPM and TPM-mobile-enabled devices will allow enterprise users to exploit the full capabilities of Trusted Computing Group standards across multiple device types,” added Jon Geater, Director of Technology for ARM Secure Services Division and Board Representative of ARM at GlobalPlatform. “ARM welcomes Wave into the TrustZone Ready Program as a valuable partner that will bring secure enterprise services to TrustZone secured devices running GlobalPlatform Trusted Execution Environments.”
Eliminating passwords, Providing Health Measurements for mobile devices
The TPM, shipped on more than half a billion PCs, is a cryptographic component built on specifications from the Trusted Computing Group. The TPM brings strong, enterprise-grade security features to consumer devices that are widely deployed in enterprise networks. The TPM for mobile devices is uniquely designed to support the security needs of multiple stakeholders, allowing enterprises to provide strong security in end-user applications, satisfy the security requirements of third-party application developers, and support other parties.
With a TPM Mobile implemented within the hardware-based security boundaries of ARM’s TrustZone and protected by a full function Trusted Execution Environment, enterprises will be able to take advantage of the strong security of the TPM in the following ways:
• Protect corporate devices and user identities
• Measure and attest to the integrity and health of the mobile device
• Implement secure network access
• Provide secure messaging for corporate traffic
• Reduce the need for user passwords, with reliance on the device itself as a strong authentication token for access to services and data, including cloud-based functions.
• Offer central control over devices which are lost or stolen to protect sensitive data
Increased emphasis on trusted computing is driving the security industry toward hardware-based technologies that offer improved access control, encryption, and the early detection of malware. With Wave’s industry-leading trusted computing solutions, customers are empowered to secure endpoint data, protect data-in-motion and ensure that only trusted devices gain access to the enterprise network. Wave’s solution will provide enterprises with cross-platform interoperability between PCs and mobile devices for trusted computing-based functions and applications.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
The Booming Underground Market for Bots That Steal Your 2FA Codes
https://www.vice.com/en/article/y3vz5k/booming-underground-market-bots-2fa-otp-paypal-amazon-bank-apple-venmo
The bots convincingly and effortlessly help hackers break into Coinbase, Amazon, PayPal, and bank accounts.
=================================================================
One would think that organizations effected in this article, and others would be clamoring for Wave Knowd so that customers with existing 2FA don't get scammed over the phone by unknowingly giving their code to the hackers! Wave Knowd could stop this from happening since there is no code to give for Wave Knowd (it's based on machine identity)! There would be many happy organizational customers and users of Wave's service!
================================================================
Wave Knowd Introduces New Model for Internet Authentication Without Passwords
Knowd ‘Trust Score’ Assures User Identity when Accessing Web Services
http://www.wavesys.com/buzz/pr/wave-knowd-introduces-new-model-internet-authentication-without-passwords
Lee, MA -
May 9, 2013 -
Wave Systems Corp. (NASDAQ: WAVX), the Trusted Computing Company, today announced Wave Knowd, a new web service available for preview that significantly reduces the vulnerability and use of passwords by leveraging the unique identity of computing devices. With a simple integration of Wave Knowd, any website can establish reliable and consistent identity relationships with the devices its customers use most often for Internet services. Wave Knowd, which signifies “Known Devices,” is being tested by partners to provide the backbone for general purpose machine identity.
“The maturation of the web mandates a change in how we, and our computing devices, connect to the web,” said Steven Sprague, Wave CEO. “With cable television, satellite radio, bank kiosks and mobile phones, the service relationship is tied to the endpoint device. The web needs the security and simplicity of this same model, where our computing devices themselves play an added role in authentication. I access dozens of web services every day from the computer in my home office, and want those sites to know and trust my PC so they’ll stop continually asking me to log in. Wave Knowd enables that trust.”
To make web authentication stronger and simpler, Wave Knowd provides a new approach to signing on and accessing Cloud and Internet services. From online banking to business services and even consumer gaming, passwords are failing to provide a level of security that either service providers or users can trust. Knowd is built upon the concept that only known devices should ever access a protected network. Knowd incorporates all of your access and identity solutions together to establish a relationship of trust between users’ computing devices, and the web services they access.
“We interact online using so many devices now, but from a security perspective those devices aren’t all equal. Accessing medical records or confidential business files from my kid’s smartphone is certainly not as trustworthy as connecting from my business PC with an encrypted drive,” continued Mr. Sprague. “Wave Knowd is all about making the Web simpler and safer, and that new foundation of trust begins with known devices, and known capabilities.”
Once machine identity is established, any web site—from gaming, social networking or shopping; to banking, business and financial services—can use Wave Knowd to create a reliable and persistent identity for the connecting device. Knowd allows Web sites to streamline access for users who repeatedly log on from trusted devices, while bolstering security. Initial authentication creates a unique and anonymous relationship between each computing device and each web service accessed, and then the level of trust between the two grows over time. Knowing the device can also help the site prevent fraud and phishing, or simply provide quicker no-password access. Wave is the partner helping to create and manage these relationships.
“Wave Systems was the obvious choice to provide ID Dataweb’s attribute exchange with device identity services,” said David Coxe, CEO at ID Dataweb. “In Knowd, Wave has provided a system that is rooted in state of the art device security technologies such as the Trusted Platform Module and other secure elements, while also offering a simple web based integration. It’s easy to identify if a connecting device is highly trusted, or whether it requires added screening and security.”
ID Dataweb uses Wave’s Knowd solution as part of the Identity Ecosystem supported through a grant from the U.S. Department of Commerce’s National Institute of Standards and Technology’s NSTIC initiative (National Strategy for Trusted Identities in Cyberspace). ID Dataweb has created a standards-based platform to simplify online identity verification using OpenID credentials.
Providing the Tools to Manage Trust in the Cloud: What’s Your Trust Score?
Wave Knowd is a powerful enhancement for any website. The endpoint identity service links an individual users’ unique device identity, with the Internet services that are typically protected only by username and password access. Users are prompted by their cloud service provider to register their primary computing devices to create a unique and persistent device identity relationship with their Internet services and service providers. No personal ID information is obtained by Wave, as Knowd works purely as a machine identity service. Furthermore, registered devices are given a unique ID for every service provider, establishing a separate trust relationship with each service.
Wave Knowd asserts a Trust Score that helps both consumers and cloud services or relying parties to determine the level of trust granted to each specific computing device. For example, a home PC that is used regularly for banking will quickly build a high Trust Score. Users can achieve a higher Trust Score by installing a small software application (Wave Knowd currently supports Windows 7 and 8, with Apple and Android to follow later this year). Business-class PCs containing a standard Trusted Platform Module (TPM) can establish even greater trust by leveraging the TPM security chip to create and securely store a unique device ID.
Knowd provides a web service with a new capability to enable or disable features based on the device that the user is actively using, providing a new security option for the end user. Perhaps an account password can only be reset from the user’s registered home computer and not from anywhere in the world, thereby linking in all of the user’s investment in the security of their home, from their alarm system to the doorman. Every web service can benefit from integrating Wave Knowd as part of the user’s experience.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
As the cyber insurance bubble begins to burst, the market scrambles for a new approach
https://www.scmagazine.com/feature/policy/as-the-cyber-insurance-bubble-begins-to-burst-the-market-scrambles-for-a-new-approach
Excerpts:
Lloyds of London, the carrier holding nearly a fifth of the cyber insurance market, discouraged its syndicate from taking cyber business in 2022.
According to S&P Global Marketing Intelligence data, in 2016, 43 cents out of every dollar paid in cyber insurance premiums was spent paying and insurance claim or related cost. Between 2016 and 2019, that number known as a loss ratio, when it's written as a percentage-never went as high as 48 cents In 2020 it ballooned to 73 cents on the dollar.
=================================================================
An approach that works (Wave) is what is needed! Hardware security is already built-in to an organization's computers. The hardware security (TPMs and SEDs) just need to be activated along with Wave's software to keep the ransomware attackers from accessing your computers, data and networks. The Trusted Computing Group (100+ companies) support these standards (TPM and SED). Not using them is putting a lot of pressure and stress on organizations and insurance companies! Use these standards, use Wave solutions, and enjoy better cybersecurity!
==================================================================
http://www.wavesys.com/data-protection
Excerpt:
Wave’s solution: start with the device
The Wave approach to this challenge is to make the IT perimeter irrelevant. Wave turns on and manages the self-encrypting drives (SEDs) and trusted platform modules (TPMs), or security chips, that are already embedded in many of your devices. The upshot is that each and every device is equipped with its own data protection system—while being centrally managed. This gives you unprecedented yet straightforward control over exactly who has access to your data, with what devices, over what networks.
We cost less too. Wave works on your existing hardware, across platforms. That’s because our solutions are based on an open standard that’s already been implemented on 600 million–plus laptops and is now working its way onto mobile devices. Our software is all you need to reach a whole new level of data protection. It’s one of the big reasons why total cost of ownership can be almost half that of a traditional software-based system that doesn’t even work very well.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Report Shows Global Financial Giants Are at Risk of Cyberattacks
https://www.nextgov.com/cybersecurity/2021/11/report-shows-global-financial-giants-are-risk-cyberattacks/187087/
Excerpt:
It identified 6,472 breaches and leakages, plus more than 3.3 million exposed records from the 20 companies—with the number of exposed records growing “six-fold” in just two years. About two-thirds of the breaches and leakages included personally identifiable information (PII), including the top executives from breached companies in 71% of the recorded cases.
=================================================================
Why not use cybersecurity solutions (Wave) that actually work?!
Are the current cyber solutions really working??? Wave can do a LOT better than the statistics in the above excerpt! Use better security, use Wave solutions!
=================================================================
Wave Announces 5-Year Master License Agreement for Virtual Smart Card 2.0 with Leading Global Financial Services Company
Wins competitive evaluation against market leader in two-factor authentication tokens
http://www.wavesys.com/buzz/pr/wave-announces-5-year-master-license-agreement-virtual-smart-card-20-leading-global
Lee, MA -
December 17, 2015 -
Wave Systems Corp. (NASDAQ: WAVX) announces a five-year master licensing agreement (MLA) with a leading global corporation (as determined by the 2015 Fortune Global 500 List) for its Virtual Smart Card 2.0 solution. This MLA sets the terms and pricing for licenses and maintenance across the customer’s global organization and establishes it as their preferred two-factor authentication solution. Instead of one large license purchase for the entire organization, each of the customer’s subordinate divisions will make separate orders in accordance with the terms of this MLA.
The first purchase of 2,000 VSC 2.0 licenses under this agreement, when added to a previous purchase, completes the requirement for the customer’s global IT division. That division will now lead the internal effort to standardize the remaining 150,000+ endpoints within their organization with the new Wave VSC 2.0 solution. While there are no minimum order requirements under the agreement, discussions for additional orders are underway.
“Our five-year agreement with this customer is the first very large scale contract for VSC 2.0 and is an important milestone for Wave,” said Bill Solms, President and CEO of Wave Systems. “This customer is a major global financial services company and their standards for protecting their systems from unauthorized access and the integrity of their data are of the highest order. Wave had to pass a very rigorous technical and business review to win the competition. We believe that this client’s decision to choose Wave Virtual Smart Card 2.0 over their incumbent solution gives us tremendous credibility in the two-factor authentication market. We will remain engaged with this company in order to complete the additional sales and deployments in the months ahead.”
Wave Virtual Smart Card 2.0 is a tokenless, hardware-based, two-factor authentication solution that offers superior security at less than half the cost of comparable solutions. It is the industry’s only enterprise-grade virtual smart card management solution that works on Windows 7, 8 and 10. It also provides management support for the Microsoft Virtual Smart Card on Windows 8 and 10. Wave’s VSC solution emulates the functionality of physical smart cards or tokens, but offers greater convenience to users, significantly lower total cost of ownership, and a greatly reduced risk of unauthorized access.
Wave Virtual Smart Card 2.0 gives IT the ability to:
• Remotely create and delete virtual smart cards
• Provide help desk-assisted recovery
• Configure Passphrase and card policies
• View the status of virtual smart cards and enrolled certificates
• Generate reports for compliance
• Support virtual smart cards on laptops, tablets and desktops with both TPM 1.2 and TPM 2.0 security chips
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Federal agencies issue cybersecurity warning ahead of Thanksgiving
https://nypost.com/2021/11/24/cisa-fbi-issue-cybersecurity-warning-ahead-of-thanksgiving/
=================================================================
If you are part of an organization that doesn't want to throw away computers and hurt the environment, use Wave solutions for protecting your computers, data and network from unauthorized devices, and save a lot of money in the process!
It seems that ESG would also embrace Wave for their benefits to the environment!
Please spread the message.
Happy Thanksgiving!
=================================================================
http://www.wavesys.com/wave-alternative
Choose data protection that actually works!
=================================================================
Better security at less than half the cost!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Will the shift to Windows 11 mean more e-waste?
https://www.computerworld.com/article/3641833/will-the-shift-to-windows-11-mean-more-e-waste.html
Excerpts:
Because the move to Windows 11 is likely to force users to buy new hardware, a lot of older computers may wind up in the trash — worsening environmental issues for everyone.
•40 million tons of electronic waste is generated every year. As the site notes, it’s like throwing out 800 laptops every second.
•The average cellphone user replaces the device every 18 months.
•E-waste comprises 70% of our overall toxic waste.
•Only 12.5% of E-Waste is recycled.
•85% of E-Waste going to landfills and incinerators is mostly burned, releasing toxins into the air.
•Electronics contain lead, which can damage the central nervous system and kidneys. (A child’s mental development can be affected by low level exposure to lead.)
•The most common hazardous electronic items include LCD desktop monitors, LCD TVs, Plasma TVs, and TVs and computers with Cathode Ray Tubes.
•E-waste contains hundreds of substances, many of them toxic. This includes mercury, lead, arsenic, cadmium, selenium, chromium, and flame retardants.
•80% of E-Waste in the US and most other countries is transported to Asia.
•300 million computers and 1 billion cellphones go into production annually. That number is expected to grow by 8% per year.
Now, layer on the increasing amount of e-waste that will be created by the retirement of Windows 10 hardware and you can imagine we’re going to have a big problem on our hands.
=================================================================
If organizations used Wave to activate their TPMs and SEDs in older computers and used Wave software, the computers would be more secure, and there wouldn't be e-waste generated. Wave could not only secure these older computers with its security, and by activating hardware security (TPMs and SEDs), but also contribute to a more environmentally friendlier World!
=================================================================
Better security at less than half the cost!
=================================================================
Choose data protection that actually works!
http://www.wavesys.com/wave-alternative
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Report: China May Steal Encrypted Government Data Now to Decrypt with Quantum Computers Later
https://www.nextgov.com/emerging-tech/2021/11/report-china-may-steal-encrypted-government-data-now-decrypt-quantum-computers-later/187020/
==================================================================
http://www.wavesys.com/products/wave-self-encrypting-drive-management
Excerpts:
Enterprises choose Wave to manage SEDs
Why? From our single console, you can manage all your organization’s self-encrypting drives (SEDs) easily and remotely, whether they number in the hundreds, or hundreds of thousands.
SEDs are the most secure, best-performing and most transparent encryption option for protecting data on laptops. These drives automatically encrypt all data written to the drive, so you don’t have to decide what’s important enough to encrypt. They also perform this encryption in the hardware of the drive, so you don’t end up with the performance issues software full-disk encryption is infamous for. SEDs are available as HDD or SSD, and are sold by most major drive manufacturers.
Wave’s management solution delivers remote drive initialization, user management, drive locking, user recovery and crypto-erase for all Opal-based, proprietary and solid-state SEDs.
Key Features:
Data protection
Drive locking is supported in sleep or standby (S3) modes
=================================================================
The above article and excerpts reveals the importance of SEDs, and Wave SED management in protecting a stolen laptop and its data by the Chinese! Organizations should be required to be using already built-in SED laptops and a SED management software like Wave's!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE