Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
LEG looks poised to breakout out to the upside--looking at the charts.
"Leggett & Platt Reports Record 2Q Results"
• 2Q sales were a quarterly record1 $1.27 billion, a 50% increase vs 2Q20
• 2Q EBIT was $172 million, an increase of $149 million vs 2Q20
• 2Q record adjusted2 EBIT was $144 million, up $94 million vs 2Q20
• 2Q EPS was $.82, up $.87 vs 2Q20; 2Q adjusted2 EPS was $.66, up $.51 vs 2Q20 adjusted2 EPS
• Acquired Kayfoam, an Ireland-based provider of specialty foam and finished mattresses
• Increasing 2021 guidance: sales of $4.9–$5.1 billion; EPS of $2.86–$3.06; adjusted2 EPS of $2.70–$2.90
I received an e-mail from the company Investor Relations about the Jerusalem Post article. Did anyone else get it? You would think they could get a little help with their English, considering that they are going to go global. But good to see anyways.
WHEN GROUP e-MAIL:
Hi Dear Investor
As you can see we are moving ahead internally and externally we have new members that each and everyone of them is a worldwide success story.
We are on the way of building a security dream team in the words of our General: “it Doesn’t matter which tools you have - ONLY people matter! “
On the dev part we have started the alpha stage already installed our systems in some businesses and our trail blazing technology is an amazing surprise. (we knew that ??)
On the external side of things the media has started to notice our company:
https://www.israeldefense.co.il/en/node/50917
Ex-head of German intelligence service joins board of Israeli cybersecurity company WHEN | Israel Defense
www.israeldefense.co.il
World Health Energy Holdings, a cybersecurity company with proprietary technologies developed to protect individuals and enterprises from cybersecurity threats, announced today the appointment of Dr. August Hanning, the former director of Germany’s Federal Intelligence Service (BND), and state secretary of the German Federal Interior Ministry, to its Advisory Board. Dr.
https://www.jpost.com/international/ex-mossad-german-intel-chiefs-team-up-in-cyber-security-674972
and we do have more many more …. But that is for next week
Sincerely Yours,
World Health Energy Holding inc.
https://www.whengroup.com
GE has found a way to move up.
LOL
You always need to factor in the dividend into the total return. And be able to average down when the decline in the price is not offset by the dividend. Been in NLY for the past five years at many different entry points. Comfortable average cost basis now. And nice total on dividends. But, imo, you cannot buy it one time and just forget about it.
The chart looks terribly sold out. RSI is very low. Some cautious traders may wait for a high volume break (and close) above the 10 Day Moving average.
JMO
FCEL is off the front pages. Or the back pages too.
For now.
Getting media attention is, IMHO, the first indication of upcoming news. If you know you do no have news soon, why get media coverage and be silent for months and months?
I bet their sales teams are getting some inquiries today.
What is the short interest on FCEL?
WHEN Group was in the Jerusalem Post today on Cybersecuriy
https://www.jpost.com/international/ex-mossad-german-intel-chiefs-team-up-in-cyber-security-674972
Ex-Mossad, German intel chiefs team up in cyber security
A mix of intelligence and technological capabilities could be the key to escaping the next mega hack, former Mossad and former German intelligence BND chiefs told the Jerusalem Post on Monday.
By YONAH JEREMY BOB JULY 26, 2021 22:26
Danny Yatom, leader of the newly formed Veteran's Party. (photo credit: GIDON BALTZAN)
A mix of intelligence and technological capabilities could be the key to escaping the next mega hack, former Mossad and former German intelligence BND chiefs told The Jerusalem Post on Monday.
Speaking only a week after announcing that former BND chief August Hanning had joined the World Health Energy Holdings (WHEN) cyber security company, former Mossad director Danny Yatom, who is WHEN’s president, told the Post that, “there is a development that anyone who wants to hack has so many motivations, and with digital systems there are more hacking options, more capabilities and more hackers who can destroy systems or cause them to cease functioning.”
“There are states like Iran trying to harm infrastructure: water, electricity and transportation in Israel,” said the former Mossad director.
Yatom stated, “There is a weakness in the modern world with the fact that we depend more and more on the digital sphere. There are more states developing hacking capabilities against other states and this will change, or already has changed, into a new war in addition to all” of the traditional areas of war.
He said that bringing down the network of a business could cause “complete chaos,” and in certain areas like air travel, lead to very dangerous situations.
Next, he was presented with the premise that no matter how much time and energy Israel, the US and other Western allies invest in cyber defense that cyber offense always beats cyber defense, leading to mega economy-wide hacks, given sufficient time and resources.
Yatom responded that, “This is very true in some ways,” but is not the full picture because there are many attempted attacks which “are blocked by cyber defense systems – these do not get the same amount of publicity.”
“We hear more about successful attacks, but barely hear about the tens or hundreds of thousands of [serious] attacks which fail, so the image we get of the cyber systems is as if everything is penetrated and porous like a wide-open net, but this is not true. You need to look at the full picture, including the successes,” he said.
Describing his company, WHEN Group, he said, “We collect data about the behavior of the officials who are part of a group or business which we want to defend over a period of days or weeks.”
He explained that WHEN’s system tracks and collects all audio, video, writing and geolocation data and metadata from company cell phones and computers so that all company activity is constantly monitored.
Privacy protections generally prevent companies from collecting such data from employees’ personal cell phones and electronic devices, but the private sector can condition employment on performing all business functions solely on its own devices.
Yatom did add that a company can decide to limit or focus data collection to certain subjects or people and can turn on or off other collection options.
He confirmed that in some ways his company’s solution is designed to catch an individual like Edward Snowden, who leaked huge aspects of US CIA and NSA technological tracking secrets, and to do this before they can ferret out company information to the outside world.
Still, “the goal of the system is not to follow employers and check if they are ok. This might be a byproduct, but it is just there to gather information to see if there is a breach based on how the group acts day to day,” he said.
“We know how to frame what is happening in the company or factory… once there is even a small element which is not compatible with standard behavior, the system waves a red flag,” said the former Mossad chief.
Next, WHEN’s system “automatically reviews if there is something hostile and automatically eliminates the threat before it can spread.”
Yatom said that bringing in Hanning was important as the company moves into a new phase of growth in the US and globally in general.
Hanning will give the company more of an international flavor, he said, while also mentioning that there were plans to bring aboard another one or two similar big-name consultants.
Also, he noted that the company is registered in Delaware with divisions in both Florida and California.
Specifically regarding Hanning, Yatom said the two intelligence chiefs knew each other even prior to their Mossad-BND cooperation from the era where Yatom was military adviser to then prime minister Yitzhak Rabin and Hanning was a top advisor to then German Chancellor Helmut Kohl.
Yatom declined to get into the specifics of their intelligence cooperation, for example against Iran, but said, “it is known that there is cooperation between the Mossad and many foreign intelligence agencies, usually with top ones, and the BND is thought of as one of the best.”
Beyond that, Yatom complained that the recent era had seen too much publicity about specific Mossad operations, including former prime minister Benjamin Netanyahu’s revelation of the espionage agency’s heist of Iran’s secret nuclear archives.
[Hanning said he would be able to help WHEN because of “my intelligence background – intelligence agencies play an important role in the cyberspace business. We are of course more concentrated on the private sector, but you need contacts with states, law enforcement and intelligence agencies… I have some contacts here in Germany and Europe, he has good contacts in Israel and the US.”
Addressing the mega hacks problem, Hanning said, “this is one of the very big problems [hovering] over the world at the government, society and economic levels. What we see is that these hackers are on the side of state hackers and intelligence organizations, with every modern intelligence agency having a tool for hacking.”
The former BND intelligence chief described how there is a rising dangerous mix of powerful purely private hackers along with “a gray zone between those [private hackers], state agencies and intelligence agencies using hackers for their own purposes.”
Moreover, he said that many private sector businesses were not even reporting when they were hacked, and were simply paying ransoms to the hackers to free up their systems “because they fear this will weaken their position.”
While praising intelligence cooperation between Western countries, he said many private sector companies need private sector cyber defenses like WHEN because the state cannot protect everyone and private cyber firms can act faster, cooperate worldwide and with no border issues.
WHEN Group was in the Jerusalem Post today
https://www.jpost.com/international/ex-mossad-german-intel-chiefs-team-up-in-cyber-security-674972
Ex-Mossad, German intel chiefs team up in cyber security
A mix of intelligence and technological capabilities could be the key to escaping the next mega hack, former Mossad and former German intelligence BND chiefs told the Jerusalem Post on Monday.
By YONAH JEREMY BOB JULY 26, 2021 22:26
Danny Yatom, leader of the newly formed Veteran's Party. (photo credit: GIDON BALTZAN)
A mix of intelligence and technological capabilities could be the key to escaping the next mega hack, former Mossad and former German intelligence BND chiefs told The Jerusalem Post on Monday.
Speaking only a week after announcing that former BND chief August Hanning had joined the World Health Energy Holdings (WHEN) cyber security company, former Mossad director Danny Yatom, who is WHEN’s president, told the Post that, “there is a development that anyone who wants to hack has so many motivations, and with digital systems there are more hacking options, more capabilities and more hackers who can destroy systems or cause them to cease functioning.”
“There are states like Iran trying to harm infrastructure: water, electricity and transportation in Israel,” said the former Mossad director.
Yatom stated, “There is a weakness in the modern world with the fact that we depend more and more on the digital sphere. There are more states developing hacking capabilities against other states and this will change, or already has changed, into a new war in addition to all” of the traditional areas of war.
He said that bringing down the network of a business could cause “complete chaos,” and in certain areas like air travel, lead to very dangerous situations.
Next, he was presented with the premise that no matter how much time and energy Israel, the US and other Western allies invest in cyber defense that cyber offense always beats cyber defense, leading to mega economy-wide hacks, given sufficient time and resources.
Yatom responded that, “This is very true in some ways,” but is not the full picture because there are many attempted attacks which “are blocked by cyber defense systems – these do not get the same amount of publicity.”
“We hear more about successful attacks, but barely hear about the tens or hundreds of thousands of [serious] attacks which fail, so the image we get of the cyber systems is as if everything is penetrated and porous like a wide-open net, but this is not true. You need to look at the full picture, including the successes,” he said.
Describing his company, WHEN Group, he said, “We collect data about the behavior of the officials who are part of a group or business which we want to defend over a period of days or weeks.”
He explained that WHEN’s system tracks and collects all audio, video, writing and geolocation data and metadata from company cell phones and computers so that all company activity is constantly monitored.
Privacy protections generally prevent companies from collecting such data from employees’ personal cell phones and electronic devices, but the private sector can condition employment on performing all business functions solely on its own devices.
Yatom did add that a company can decide to limit or focus data collection to certain subjects or people and can turn on or off other collection options.
He confirmed that in some ways his company’s solution is designed to catch an individual like Edward Snowden, who leaked huge aspects of US CIA and NSA technological tracking secrets, and to do this before they can ferret out company information to the outside world.
Still, “the goal of the system is not to follow employers and check if they are ok. This might be a byproduct, but it is just there to gather information to see if there is a breach based on how the group acts day to day,” he said.
“We know how to frame what is happening in the company or factory… once there is even a small element which is not compatible with standard behavior, the system waves a red flag,” said the former Mossad chief.
Next, WHEN’s system “automatically reviews if there is something hostile and automatically eliminates the threat before it can spread.”
Yatom said that bringing in Hanning was important as the company moves into a new phase of growth in the US and globally in general.
Hanning will give the company more of an international flavor, he said, while also mentioning that there were plans to bring aboard another one or two similar big-name consultants.
Also, he noted that the company is registered in Delaware with divisions in both Florida and California.
Specifically regarding Hanning, Yatom said the two intelligence chiefs knew each other even prior to their Mossad-BND cooperation from the era where Yatom was military adviser to then prime minister Yitzhak Rabin and Hanning was a top advisor to then German Chancellor Helmut Kohl.
Yatom declined to get into the specifics of their intelligence cooperation, for example against Iran, but said, “it is known that there is cooperation between the Mossad and many foreign intelligence agencies, usually with top ones, and the BND is thought of as one of the best.”
Beyond that, Yatom complained that the recent era had seen too much publicity about specific Mossad operations, including former prime minister Benjamin Netanyahu’s revelation of the espionage agency’s heist of Iran’s secret nuclear archives.
[Hanning said he would be able to help WHEN because of “my intelligence background – intelligence agencies play an important role in the cyberspace business. We are of course more concentrated on the private sector, but you need contacts with states, law enforcement and intelligence agencies… I have some contacts here in Germany and Europe, he has good contacts in Israel and the US.”
Addressing the mega hacks problem, Hanning said, “this is one of the very big problems [hovering] over the world at the government, society and economic levels. What we see is that these hackers are on the side of state hackers and intelligence organizations, with every modern intelligence agency having a tool for hacking.”
The former BND intelligence chief described how there is a rising dangerous mix of powerful purely private hackers along with “a gray zone between those [private hackers], state agencies and intelligence agencies using hackers for their own purposes.”
Moreover, he said that many private sector businesses were not even reporting when they were hacked, and were simply paying ransoms to the hackers to free up their systems “because they fear this will weaken their position.”
While praising intelligence cooperation between Western countries, he said many private sector companies need private sector cyber defenses like WHEN because the state cannot protect everyone and private cyber firms can act faster, cooperate worldwide and with no border issues.
Interesting article on solar energy, Spot on.
Now we have to contend with Covid and civil unrest in South Africa.
Competition---and validation at the same time.
With ransomware increasingly in the news, Cybersecurity stocks have been doing very well.
Impressive addition to the WHEN team
https://www.worldsecuritynetwork.com/author_bio/august-hanning
Global Surge in Ransomware Attacks: To pay or not to pay is not the only question
Guide for enterprises on how to prevent and deal with ransomware attacks
Check Point Research (CPR) recently revealed that the average weekly number of ransomware attacks has increased 93% over the past 12 months.
Every week, more than 1,200 organizations worldwide fall victim to a ransomware attack, and all enterprises without exceptions are at risk.
According to Cybersecurity Ventures, the damage caused by ransomware will reach approximately $20 billion this year, a 57-fold increase from 2015. By 2031, the cost of ransomware incidents could even surpass the hard-to-believe figure of $265 billion.
The number of ransomware attacks is growing for a simple reason, hackers are getting paid. The willingness to pay creates a dangerous loop and increases the motivation of attackers. Additionally, cyber risk insurance is becoming more common, so companies do not hesitate to meet the demands of cybercriminals, further exacerbating the problem.
The increase in attacks is also related to the availability of threats. Many hacker groups offer ransomware as a service, so anyone can rent this type of threat, including infrastructure, negotiating with victims or extortion websites where stolen information can be posted. The ransom is then split between the ‘partners’.
Yet, a ransomware attack often does not start with ransomware. It often starts with a ‘simple’ phishing email. In addition, hacker groups often work together. For example, in the Ryuk ransomware attacks, the Emotet malware was used to infiltrate the network, then the network was infected with Trickbot, and finally the ransomware encrypted the data.
How can enterprises even know if they have fallen victim of a ransomware attack and how should they react? If not caught on time, it’s relatively easy to find out, as organizations will get a message asking for a ransom and won’t be able to access the company’s data.
In addition, cybercriminals are constantly refining their techniques to increase the pressure to pay. Originally, ransomware “just” encrypted data and demanded a ransom to unlock it. The attackers soon added a second phase and stole valuable information before encryption, threatening to make it public if the ransom was not paid. Approximately 40% of all new ransomware families use data theft in some way in addition to encryption. In addition, we have recently seen a third phase where the attacked companies’ partners or customers are also contacted for a ransom, this is a new technique called triple extortion.
Check Point Software’s Incident Response Team, which has dealt with countless ransomware cases worldwide, recommends following these steps when a ransomware attack occurs:
1) Keep a cool head
If your organization falls victim to a ransomware attack, do not to panic. Contact your security team immediately and take a photo of the ransom note for law enforcement and further investigation.
2) Isolate the compromised systems
Disconnect infected systems from the rest of the network immediately to prevent further damage. At the same time, identify the source of the infection. Of course, as mentioned, a ransomware attack usually starts with another threat, and hackers may have been in the system for a long time, gradually covering their tracks, so detecting “patient zero” may not be something most companies can handle without outside help.
3) Beware of backups
Attackers know that organisations will try to recover their data from backups to avoid paying theransom. That’s why one of the phases of the attack is often an attempt to locate and encrypt or delete backups. Also, never connect external devices to infected devices. Recovering encrypted data may cause corruption, for example, due to a faulty key. Therefore, it may be useful to make copies of the encrypted data. Decryption tools are also gradually being developed that can help to crack previously unknown code. If you did have backups that haven’t been encrypted, check the integrity of the data before fully restoring.
4) No reboots or system maintenance
Turn off automatic updates and other maintenance tasks on infected systems. Deleting temporary files or making other changes could unnecessarily complicate investigations and remediation. At the same time, do not reboot systems, as some threats may then start deleting files.
5) Cooperate
In the fight against cybercrime, and ransomware in particular, collaboration is key. So contact law enforcement and national cyber authorities, and don’t hesitate to contact the dedicated incident response team of a reputable cybersecurity company. Inform employees of the incident, including instructions on how to proceed in the event of any suspicious behavior.
6) Identify the type of ransomware
If the message from the attackers does not directly state what type of ransomware it is, then you can use one of the free tools and visit the No More Ransom Project website, you may find a decryption tool just for your ransomware there.
7) To pay or not to pay?
If the ransomware attack is successful, the organization is faced with the choice of whether to pay the ransom or not. Either way, companies must go back to the beginning and find out why the incident occurred. Whether it was human factors or technology that failed, go through all the processes again and rethink the entire strategy to ensure that a similar incident never happens again. Taking this step is necessary regardless of whether an organization pays the ransom or not. One can never take comfort in the fact that somehow data recovery has occurred and consider the incident resolved.
So to pay or not to pay? The answer is not as simple as it first appears. While the ransom amounts are sometimes in the hundreds of thousands or millions of dollars, outages of critical systems often surpass these amounts. However, enterprises must remember that even if the ransom is paid, it does not mean that the data, or even part of it, will actually be decrypted. There are even known cases where attackers have bugs in the codes so that the organization cannot recover the data even if they wanted to.
Don’t rush into a decision and consider all your options carefully. Paying the ransom should really be the last resort.
How can you minimise the risk of being the next victim of ransomware?
Be extra vigilant on weekends and holidays. Most ransomware attacks over the past year have taken place on weekends or holidays, when organizations are more likely to be slower to respond to a threat.
Install updates and patches regularly. WannaCry hit organizations around the world hard in May 2017, infecting over 200,000 computers in three days. Yet a patch for the exploited EternalBlue vulnerability had been available for a month before the attack. Updates and patches need to be installed immediately and have an automatic setting.
Install anti-ransomware. Anti-ransomware protection watches for any unusual activity, such as opening and encrypting large numbers of files, and if any suspicious behavior is detected it can react immediately and prevent massive damage.
Education is an essential part of protection. Many cyberattacks start with a targeted email that does not contain malware, but uses social engineering to try to lure the user into clicking on a dangerous link. User education is therefore one of the most important parts of protection.
Ransomware attacks do not start with ransomware, so beware of other malicious codes, such as Trickbot or Dridex that infiltrate organizations and set the stage for a subsequent ransomware attack.
Backing up and archiving data is essential. If something goes wrong, your data should be easily and quickly recoverable. It is imperative to back up consistently, including automatically on employee devices, and not rely on them to remember to turn on the backup themselves.
Limit access to only necessary information and segment access. If you want to minimize the impact of a potentially successful attack, then it is important to ensure that users only have access to the information and resources they absolutely need to do their jobs. Segmentation minimizes the risk of ransomware spreading uncontrollably across the network. Dealing with the aftermath of a ransomware attack on one system can be difficult, but repairing the damage after a network-wide attack is much more challenging.
Global Surge in Ransomware Attacks: To pay or not to pay is not the only question
Guide for enterprises on how to prevent and deal with ransomware attacks
Check Point Research (CPR) recently revealed that the average weekly number of ransomware attacks has increased 93% over the past 12 months.
Every week, more than 1,200 organizations worldwide fall victim to a ransomware attack, and all enterprises without exceptions are at risk.
According to Cybersecurity Ventures, the damage caused by ransomware will reach approximately $20 billion this year, a 57-fold increase from 2015. By 2031, the cost of ransomware incidents could even surpass the hard-to-believe figure of $265 billion.
The number of ransomware attacks is growing for a simple reason, hackers are getting paid. The willingness to pay creates a dangerous loop and increases the motivation of attackers. Additionally, cyber risk insurance is becoming more common, so companies do not hesitate to meet the demands of cybercriminals, further exacerbating the problem.
The increase in attacks is also related to the availability of threats. Many hacker groups offer ransomware as a service, so anyone can rent this type of threat, including infrastructure, negotiating with victims or extortion websites where stolen information can be posted. The ransom is then split between the ‘partners’.
Yet, a ransomware attack often does not start with ransomware. It often starts with a ‘simple’ phishing email. In addition, hacker groups often work together. For example, in the Ryuk ransomware attacks, the Emotet malware was used to infiltrate the network, then the network was infected with Trickbot, and finally the ransomware encrypted the data.
How can enterprises even know if they have fallen victim of a ransomware attack and how should they react? If not caught on time, it’s relatively easy to find out, as organizations will get a message asking for a ransom and won’t be able to access the company’s data.
In addition, cybercriminals are constantly refining their techniques to increase the pressure to pay. Originally, ransomware “just” encrypted data and demanded a ransom to unlock it. The attackers soon added a second phase and stole valuable information before encryption, threatening to make it public if the ransom was not paid. Approximately 40% of all new ransomware families use data theft in some way in addition to encryption. In addition, we have recently seen a third phase where the attacked companies’ partners or customers are also contacted for a ransom, this is a new technique called triple extortion.
Check Point Software’s Incident Response Team, which has dealt with countless ransomware cases worldwide, recommends following these steps when a ransomware attack occurs:
1) Keep a cool head
If your organization falls victim to a ransomware attack, do not to panic. Contact your security team immediately and take a photo of the ransom note for law enforcement and further investigation.
2) Isolate the compromised systems
Disconnect infected systems from the rest of the network immediately to prevent further damage. At the same time, identify the source of the infection. Of course, as mentioned, a ransomware attack usually starts with another threat, and hackers may have been in the system for a long time, gradually covering their tracks, so detecting “patient zero” may not be something most companies can handle without outside help.
3) Beware of backups
Attackers know that organisations will try to recover their data from backups to avoid paying theransom. That’s why one of the phases of the attack is often an attempt to locate and encrypt or delete backups. Also, never connect external devices to infected devices. Recovering encrypted data may cause corruption, for example, due to a faulty key. Therefore, it may be useful to make copies of the encrypted data. Decryption tools are also gradually being developed that can help to crack previously unknown code. If you did have backups that haven’t been encrypted, check the integrity of the data before fully restoring.
4) No reboots or system maintenance
Turn off automatic updates and other maintenance tasks on infected systems. Deleting temporary files or making other changes could unnecessarily complicate investigations and remediation. At the same time, do not reboot systems, as some threats may then start deleting files.
5) Cooperate
In the fight against cybercrime, and ransomware in particular, collaboration is key. So contact law enforcement and national cyber authorities, and don’t hesitate to contact the dedicated incident response team of a reputable cybersecurity company. Inform employees of the incident, including instructions on how to proceed in the event of any suspicious behavior.
6) Identify the type of ransomware
If the message from the attackers does not directly state what type of ransomware it is, then you can use one of the free tools and visit the No More Ransom Project website, you may find a decryption tool just for your ransomware there.
7) To pay or not to pay?
If the ransomware attack is successful, the organization is faced with the choice of whether to pay the ransom or not. Either way, companies must go back to the beginning and find out why the incident occurred. Whether it was human factors or technology that failed, go through all the processes again and rethink the entire strategy to ensure that a similar incident never happens again. Taking this step is necessary regardless of whether an organization pays the ransom or not. One can never take comfort in the fact that somehow data recovery has occurred and consider the incident resolved.
So to pay or not to pay? The answer is not as simple as it first appears. While the ransom amounts are sometimes in the hundreds of thousands or millions of dollars, outages of critical systems often surpass these amounts. However, enterprises must remember that even if the ransom is paid, it does not mean that the data, or even part of it, will actually be decrypted. There are even known cases where attackers have bugs in the codes so that the organization cannot recover the data even if they wanted to.
Don’t rush into a decision and consider all your options carefully. Paying the ransom should really be the last resort.
How can you minimise the risk of being the next victim of ransomware?
Be extra vigilant on weekends and holidays. Most ransomware attacks over the past year have taken place on weekends or holidays, when organizations are more likely to be slower to respond to a threat.
Install updates and patches regularly. WannaCry hit organizations around the world hard in May 2017, infecting over 200,000 computers in three days. Yet a patch for the exploited EternalBlue vulnerability had been available for a month before the attack. Updates and patches need to be installed immediately and have an automatic setting.
Install anti-ransomware. Anti-ransomware protection watches for any unusual activity, such as opening and encrypting large numbers of files, and if any suspicious behavior is detected it can react immediately and prevent massive damage.
Education is an essential part of protection. Many cyberattacks start with a targeted email that does not contain malware, but uses social engineering to try to lure the user into clicking on a dangerous link. User education is therefore one of the most important parts of protection.
Ransomware attacks do not start with ransomware, so beware of other malicious codes, such as Trickbot or Dridex that infiltrate organizations and set the stage for a subsequent ransomware attack.
Backing up and archiving data is essential. If something goes wrong, your data should be easily and quickly recoverable. It is imperative to back up consistently, including automatically on employee devices, and not rely on them to remember to turn on the backup themselves.
Limit access to only necessary information and segment access. If you want to minimize the impact of a potentially successful attack, then it is important to ensure that users only have access to the information and resources they absolutely need to do their jobs. Segmentation minimizes the risk of ransomware spreading uncontrollably across the network. Dealing with the aftermath of a ransomware attack on one system can be difficult, but repairing the damage after a network-wide attack is much more challenging.
PRU is a solid addition to any income portfolio. Nice, secure dividend with some capital appreciation to boot.
Nice pop on this WHEN news today. Makes you wonder where WHEN could go on a few more Press Releases on revenues and contracts.
Ransomware in the PR could be a big deal for the future of WHEN.
Cybersecurity Innovator World Health Energy Holdings Appoints Dr. August Hanning, Former Director of Germany’s Federal Intelligence Service (BND), to Advisory Board
Leading German Government Security Expert Joins as Company Eyes Global Expansion
NEW YORK, NY, July 13, 2021 (GLOBE NEWSWIRE) -- World Health Energy Holdings, Inc. (OTC PINK: WHEN) (“WHEN Group” or the “Company”), a cybersecurity company with proprietary technologies developed to protect individuals and enterprises from cybersecurity threats, announced today the appointment of Dr. August Hanning, the former director of Germany’s Federal Intelligence Service (BND), and state secretary of the German Federal Interior Ministry, to its Advisory Board.
Dr. Hanning joins World Health Energy Holdings, Inc. as the company is expanding commercial availability of its security monitoring solutions for businesses, organizations, and families.
Dr. August Hanning, commenting on joining the WHEN Group Advisory Board, said: “I am excited to join a company whose cutting-edge technology positions it as a leader in developing a new generation of cybersecurity technology. With the constant rise in cyber-attacks and data breaches across the globe, cybersecurity plays a critical role in securing global enterprises and their infrastructure, as well as national governments. I look forward to applying my expertise to drive the Company’s global growth and help position WHEN Group as a world leader in cybersecurity."
Dr. August Hanning has over 50 years of experience in top intelligence and security leadership roles. Prior to being appointed as the state secretary of the Federal Interior Ministry in 2005, and president of the German Secret Service, the Bundesnachtrichtendienst (BND), in 1998, Dr. Hanning supervised the intelligence services of the Federal Chancellery, where he served as the director general from 1996. Starting in 1986, Dr. Hanning led the Permanent Mission of the Federal Republic of Germany (West Germany) to the German Democratic Republic (East Germany) in Berlin, where he was responsible for diplomatic relations between the two countries. Dr. Hanning earned his law degree in Münster and Freiburg, Germany, in 1966.
“We are pleased to welcome Dr. August Hanning to WHEN Group’s Advisory Board,” said WHEN Group President Maj. Gen. (Ret.) Danny Yatom. ”As a fellow senior intelligence expert, I am ecstatic that Dr. Hanning accepted our invitation to join the board. His addition further expands our existing skills and experiences, and we are confident he will provide invaluable insight and expertise as we continue to develop our innovative and groundbreaking technology and global strategy."
WHEN Group CEO Giora Rosenzweig said: “With long decades of service in major national security and intelligence positions in Germany, Dr. Hanning is a significant asset to our board. The recent addition of senior global security veterans like Maj. Gen. (ret.) Danny Yatom, president of WHEN Group, and now Dr. Hanning to the company, demonstrates WHEN Group’s commitment to expand its expertise and develop the next generation of cybersecurity systems.”
Rosenzweig continued: “Recent high profile ransomware attacks (Cybersecurity Ventures predicts that the damage caused by ransomware could cost the worldwide stage $265 billion by 2031) highlight the increase in global cyber threats and costs to businesses and governments, and with the inclusion of Dr. Hanning, WHEN Group is perfectly positioned to directly take on these challenges.
Future WHEN Group Press Releases and Updates
Interested investors and shareholders will be notified of future Press Releases and Industry Updates by e-mailing info@worldhealthenergy.com
About WHEN Group
World Health Energy Holdings, Inc. (d/b/a WHEN Group) is a holding company comprised of SG 77, Inc./RNA Ltd, which develops and significantly improves existing cybersecurity solutions in the B2C and B2B marketplace. WHEN Group develops new systems by applying pattern recognition technology based on IOT / mobile / servers and computer activity, analyzing human and device behavior, relationships and BPM (Business Process Management) in order to automatically identify and prevent potential danger to individuals and companies. The B2C Cybersecurity division targets families concerned with external cyber threats and exposures in addition to monitoring a child's behavioral patterns that may alert parents to potential tragedies caused by cyberbullying, pedophiles, other predators, and depression. The B2B Cybersecurity system software development and implementation company is focused on innovative solutions for the constantly evolving cyber challenges of businesses, non-governmental organizations (NGOs) and governmental entities. By deploying a highly experienced development team, RNA Ltd. anticipates both internal and external cyber threats, by identifying behavioral patterns that flag potential cyber compromises. Additional information is available at: https://www.whengroup.com/.
Notice Regarding Forward-Looking Statements
This press release contains forward-looking statements which are made pursuant to the safe harbor provisions of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities and Exchange Act of 1934, as amended. These forward-looking statements involve substantial uncertainties and risks and are based upon our current expectations, estimates, and projections, and reflect our beliefs and assumptions based upon information available to us at the date of this release. We caution readers that forward-looking statements are predictions based on our current expectations about future events. These forward-looking statements are not guarantees of future performance and are subject to risks, uncertainties and assumptions that are difficult to predict. Our actual results, performance or achievements could differ materially from those expressed or implied by the forward-looking statements as a result of a number of factors, including, but not limited to, our ability to integrate the operations of the acquired entities and manage the combined entity, the success of our business plan, market reception of our products, our ability to raise the capital needed to realize our business plan and on commercially reasonable terms, our ability to retain needed personnel and our ability to compete against companies with much larger resources as well as the risks and uncertainties discussed under the heading "RISK FACTORS" in our Annual Report on Form 10-K for the year ended December 31, 2020 filed on April 15, 2021, and in our other filings with the Securities and Exchange Commission. We undertake no obligation to revise or update any forward-looking statement for any reason.
Investor Relations:
World Health Energy Holdings, Inc.
Tel: +1 561-870-0440
Email: info@worldhealthenergy.com
Media Contact:
Binyamin Tjong-Alvares
Rimon Cohen PR for WHEN Group
Binyamin@rcspr.co.il
@tjongalvares
+972 52 6791817
T is dead money for the foreseeable future. So much uncertainty on what the forward looking dividend will be.
The F150 EV will be, imo, a big seller--and will not have to be discounted at the dealerships. Higher profit margins for Ford. And with all the potential for brownouts in the West, that feature that the EV battery can be used to power a house will add more to the sales trajectory.
Considering getting back in. Sp glad I sold most on the huge spike--too far too fast. But happily I did not try to gt back in too soon. Now FCEL is right on long term support.
How many shares have gone out so far this year?
Thanks for the update.
SHELL RISK is gone on otcmarkets. com
I checked three days ago and it was still there. Something is up, imo.
How many shares outstanding here?
Bought more when I saw the CEO blog post. looks like they have a "shortcut" to market.
Bought back in on this great news. Watch for a short squeeze
PRU has been holding up as the other financials are getting clocked . GLTU
Everything has been taking a hit lately.
So true. T has been a horrible investment. The only thing that will get this above $33 and stay above it will be reducing their debt. And buying back shares.
PRU dividend makes a difference in my income portfolio. And divvy reinvestment in my retirement account has been a winner over the past year.
Been in since May...and happy with the dividend flow.