Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
These systems are facing billions of attacks every month as hackers try to guess passwords
https://www.zdnet.com/article/these-systems-are-facing-billions-of-attacks-every-month-as-hackers-try-to-guess-passwords/
Excerpt:
Organisations can also provide an additional layer of protection against brute-force password-guessing attacks – and other campaigns – by deploying multi-factor authentication (MFA). Using MFA means that, even if the attackers know the correct password, there's an extra barrier to prevent them from automatically being able to access the network.
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
Excerpts:
What can it be used for?
What do you use your smart card for today? With the exception of keying open the door at work, Wave Virtual Smart Card can perform any of the services or applications you rely on your smart card for today. Secure VPN, WiFi, remote desktop, cloud applications – it can all be done with a virtual smart card.
=================================================================
The article above represents another very important reason for organizations to be using Wave VSC 2.0 (MFA)!!!
=================================================================
Better security at less than half the cost!!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
After 3 Years, Key IRS Systems Still Aren’t Properly Encrypted
https://www.nextgov.com/analytics-data/2021/09/after-3-years-key-irs-systems-still-arent-properly-encrypted/185722/
But those systems—the total number of which was redacted from the IG report—hold incredibly sensitive data, including personally identifiable information on every taxpayer in the U.S.
==================================================================
Wave has served some well renowned companies in the way of SED management. With Wave's data protection, and the expertise that Wave served some of these large well renowned companies with its SED management, the IRS and government would be fortunate to choose Wave for this process and technology. Wave solutions could give the IRS and government a whole new, exciting outlook on its cybersecurity!!! ESW had 20 million committed to Wave years ago. With the technology that Wave has and the market need for its solutions, that 20 million should expand especially given that October 5 is fast approaching with Microsoft making the activated TPM part of Windows 11!!! (Wave can activate the other TPMs in older Windows OSes while organizations wait to upgrade to Windows 11)
==================================================================
http://www.wavesys.com/products/wave-self-encrypting-drive-management
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Audit: IRS Needs to Improve How It Wipes Taxpayer Data from Devices
https://www.nextgov.com/cybersecurity/2021/09/audit-irs-needs-improve-how-it-wipes-taxpayer-data-devices/185651/
=================================================================
SEDs (Self-Encrypting Drives) are built-in hardware to computers that should be activated extensively (Wave SED management can do that) in organizations to protect data!!! The crypto-erase feature that is part of Wave's SED management could have made things easier for the IRS or could make things easier in the future at the end of the IRS's or organization's computer life.
=================================================================
http://www.wavesys.com/products/wave-self-encrypting-drive-management
Excerpts:
Enterprises choose Wave to manage SEDs
Why? From our single console, you can manage all your organization’s self-encrypting drives (SEDs) easily and remotely, whether they number in the hundreds, or hundreds of thousands.
SEDs are the most secure, best-performing and most transparent encryption option for protecting data on laptops. These drives automatically encrypt all data written to the drive, so you don’t have to decide what’s important enough to encrypt. They also perform this encryption in the hardware of the drive, so you don’t end up with the performance issues software full-disk encryption is infamous for. SEDs are available as HDD or SSD, and are sold by most major drive manufacturers.
Wave’s management solution delivers remote drive initialization, user management, drive locking, user recovery and crypto-erase for all Opal-based, proprietary and solid-state SEDs.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Proper password security falling short despite increase in online presence
https://www.helpnetsecurity.com/2021/09/27/proper-password-security/
Excerpts:
While 92 percent of people know that using the same password or a variation is a risk, 65 percent still re-use passwords across accounts, drastically increasing the risks to their sensitive information, a LastPass report revealed.
While 68 percent of respondents would create stronger passwords for financial accounts, only 32 percent noted they would create strong passwords for work-related accounts.
=================================================================
More reasons (see excerpts above and excerpts below) for organizations to be using Wave VSC 2.0!!!
Rethink cybersecurity and use Wave's awesome solutions!!!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpts:
Token-free, password-free user authentication
We know you’ve dreamt about shredding your list of passwords. Go on and do it.
Because you are starting the authentication process in the device’s hardware, the user doesn’t have to interact with it. All users see is their usual Windows log-in screen – no more additional passwords to access the VPN or other resources. They just sign in once, and the secure credentials in their TPMs securely and quickly connect them to everything they need. Say goodbye to user frustration and slow OS performance.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Telegram bots are trying to steal your one-time passwords
https://www.zdnet.com/article/telegram-bots-are-trying-to-steal-your-one-time-passwords/
Excerpts:
The tokens can be used to shred second-stage account verification.
Telegram-powered bots are being utilized to steal the one-time passwords required in two-factor authentication (2FA) security.
=================================================================
By using Wave VSC 2.0, the attacker would need your computer as well as your PIN number to try to hack it!!! The above hack wouldn't work against Wave VSC 2.0!!! Another reason for organizations to be using Wave VSC 2.0!!!
Better security at less than half the cost!!!
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
'Quad' group seeks to set security standards for global tech industry
https://www.theregister.com/2021/09/27/quad_communqiue_technology_announcements/
Excerpts:
We expect technology suppliers, vendors, and distributors to produce and maintain secure systems, and to be trustworthy, transparent, and accountable in their practices. Technology developers should also build in safety and security-by-design approaches so that robust safety and security practices are a part of the technology development process.
No timeframes for delivery of the plans mentioned in the communiqué were set – a great many meetings must be held and documents drafted before anything concrete emerges.
=================================================================
With all that has been done by the TCG, Wave and other companies concerning activated SEDs and TPMs, the promotion of these two standards should be happening rather quickly also given the enormous cybersecurity benefit they could have in the World!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Newly-formed international alliances vow to improve cybersecurity, in moves China sees as affront
https://www.cyberscoop.com/quad-china-cyber-australia-india-japan/
Excerpt:
A coalition of four nations — Australia, India, Japan and the U.S. — has committed to promoting cybersecurity standards and practices as one of their chief goals, in one of several recent moves from countries widely viewed as a counter to China in cyberspace and elsewhere.
==================================================================
Standards such as Self-Encrypting Drives (SEDs) and Trusted Platform Modules (TPMs) could dramatically improve cybersecurity with the right software (Wave) across the World!!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Ransomware shame: More than half of business owners conceal cyber-breach
https://www.foxbusiness.com/technology/ransomware-cyber-breach-concealed
=================================================================
The status quo is not working!!! Use technology that works!!!
Use Wave solutions, and prevent cyber-breaches!!!
Use better security at less than half the cost!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
TangleBot Malware Reaches Deep into Android Device Functions
https://threatpost.com/tanglebot-malware-device-functions/174999/
=================================================================
Wave had a license agreement with Samsung (the leader in Android phones) back in 2012!!! The agreement was for 15 years!!! With Wave's technology in mobile TPMs (MTMs), this malware could be stopped by Wave/Samsung!!! If Microsoft with Windows 11 is moving the ecosystem to activated TPMs, shouldn't Wave/Samsung be doing that in mobile to help create full saturation of TPMs and for the sake of better cybersecurity for organizations!!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Biden administration officials push Congress to shape breach reporting mandates
https://www.cyberscoop.com/incident-reporting-easterly-homeland-security-committee/
Excerpts:
The leaders of the Senate Intelligence Committee favor a 24-hour deadline. A draft bill from leaders of the Senate Homeland Security and Governmental Affairs Committee would set the range at between 72 hours and seven days, as determined by CISA. And a draft from leading members of the House Homeland Security Committee proposes leaving the decision up to CISA but requiring reports no earlier than 72 hours.
“The earlier that CISA, the federal lead for asset response, receives information about a cyber incident, the faster we can conduct urgent analysis and share information to protect other potential victims,” CISA Director Jen Easterly told the Senate Homeland Security and Governmental Affairs Committee.
=================================================================
Unlike what is happening now with current status quo, the future is much brighter with Wave, activated TPMs and SEDs (hardware security)!!! Those with Wave's cybersecurity would find this government reporting not necessary to worry about!!!
Be prepared, use Wave's awesome solutions!!!
Better security at less than half the cost!!!
=================================================================
http://www.wavesys.com/wave-alternative
Choose data protection that actually works!!!
Reading the contents in the above link shows why the Wave alternative is better for now and the future cybersecurity of organizations!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Treasury Sanctions First Cryptocurrency Exchange to Combat Ransomware
https://www.nextgov.com/cybersecurity/2021/09/treasury-sanctions-first-cryptocurrency-exchange-combat-ransomware/185512/
Excerpt:
“We’re hardening our critical infrastructure against cyberattacks, disrupting ransomware networks, and working to establish clear rules of the road for all nations as it relates to cyberspace,” Biden said. “We reserve the right to respond decisively to cyberattacks that threaten our people, our allies, or our interests.”
=================================================================
Biden Calls for 'United Response' to Emerging Tech, Cyber Warfare in U.N. Speech
https://www.nextgov.com/cybersecurity/2021/09/biden-calls-united-response-emerging-tech-cyber-warfare-un-speech/185510/
Excerpt:
The federal government, he said, is “hardening critical infrastructure against cyberattacks, disrupting ransomware networks and working to establish clear rules of the road for all nations as it relates to cyber space.”
=================================================================
Hopefully, this also means that the U.S. is using hardware security (activated SEDs and TPMs) to greatly improve (harden) our cybersecurity!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Hardware Otp Token Authentication Market Growth Opportunities 2021-2027 | FEITIAN Technologies, Nexus Group, RSA SecurID
https://www.stillwatercurrent.com/hardware-otp-token-authentication-market-growth-opportunities-2021-2027-feitian-technologies-nexus-group-rsa-securid/
==================================================================
Has there been a study on how many organizations had OTP Token Authentication (ex.- SecurID), and the organizations still had data breaches and ransomware attacks?? The OTP Token Authentication try to cover many thousands of organizations so with the thousands of data breaches and ransomware attacks in the last few years, there must have been a lot of 'covered' organizations still attacked!!! Wave solutions can prevent these data breaches and ransomware attacks from happening!!! Wave has awesome security that really protects!!! Don't become another statistic, use Wave!!!
Better security at less than half the cost!!!
==================================================================
http://www.wavesys.com/wave-alternative
Excerpts:
Security that’s confirmed, not assumed
With Wave, you’ll know that you’re secure. Because we start with the individual devices, you get a broad, deep view of your network. You can see exactly who’s on it, with what devices and what apps, at any given time. Just for example, if Bob goes home and tries to log onto Facebook with the company laptop, Wave can stop him.
A big piece of this heightened security is device authentication. Traditional two-factor authentication requires what amounts to two user IDs. But by using the TPMs inside your devices, Wave can confirm the identity of not only users, but also the devices they’re on. Combine that with fast, enforced encryption of sensitive data via your SEDs—all easily managed with Wave software—and your data is protected from the full range of modern risks: device theft, missent emails, flash drives, portable hot spots … even (and no one else can say this) hardware keyloggers. Not to mention Bob.
Do we need to say that with Wave, compliance is no problem?
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Momentum builds to strengthen FTC's role as privacy enforcer, though hurdles remain
https://www.cyberscoop.com/ftc-privacy-alvaro-bedoya-big-tech/
Excerpt:
Today, consumers are up against a constant push by tech companies to gather deeply personal information about their lives and turn it for a profit — often without the security practices needed to protect that data.
==================================================================
Wave's data protection and compliance solutions could make Facebook, Google, the FTC and a lot of other organizations very HAPPY!!! Please read about these solutions at Wave's website below!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Epik data breach impacts 15 million users, including non-customers
https://arstechnica.com/information-technology/2021/09/epik-data-breach-impacts-15-million-users-including-non-customers/
Excerpts:
Scraped WHOIS data of NON-Epik customers also exposed in the 180 GB leak.
Epik has now confirmed that an "unauthorized intrusion" did in fact occur into its systems.
=================================================================
This post is a follow up to post #246793. Choosing Wave solutions should be obvious now!!!
Better security at less than half the cost!!!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
AT&T Phone-Unlocking Malware Ring Costs Carrier $200M
https://threatpost.com/att-phone-unlocking-malware/174787/
==================================================================
It would be interesting to see what AT&T is using for MFA! With Wave VSC 2.0 and Wave Endpoint Monitor and Wave solutions, AT&T could have saved itself 200M!!! Readership that can send some past posts/messages to the world about how Wave can help their cybersecurity in a big way would be much appreciated, and if you have already, thank you!
=================================================================
http://www.wavesys.com/
Cybersecurity defenses lacking in many companies, says survey
https://www.shine.cn/biz/tech/2109185262/
Excerpts:
Three quarters of Chinese respondents, or 75 percent, are not sure whether their cybersecurity defenses are adequate to respond to hackers, according to the 2021 EY Global Information Security Survey.
The survey covered 1,400 experts and senior officials from 1,010 companies from March to May 2021.
=================================================================
Wave and Lenovo could change cybersecurity in China so that organizations are confident in keeping hackers from accessing their data and networks. Wave offers better security at less than half the cost!!! With a new data protection law, Chinese organizations would be happy to choose data protection that actually works (Wave)!!!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/wave-alternative
Choose data protection that actually works!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Auditors, Contractors Hang in the Balance as Defense Overhauls Cybersecurity Certification Program
https://www.nextgov.com/cybersecurity/2021/09/auditors-contractors-hang-balance-defense-overhauls-cybersecurity-certification-program/185438/
Excerpt:
The Defense Department has not ruled out a return to allowing companies to ‘self-attest’ their security posture.
=================================================================
Not only would Wave's solutions provide critical industries and defense contractors with better security at less than half the cost, but they could prove compliance as well!!! The Wave alternative is simpler, more secure, cheaper and the winning formula for cybersecurity success for these organizations!!!
==================================================================
http://www.wavesys.com/compliance
What is compliance?
Organizations must meet industry-wide government requirements for data management, including storage, archiving, encryption, and retrieval. These requirements are intended to prevent data theft and preserve consumer privacy. They often mandate specific controls, corporate compliance programs, audits, public disclosures (“notice of breach”), and stiff penalties—from fines to prison time—for noncompliance.
If your organization falls victim to a security breach and you can’t prove that you were in compliance when it happened, you will be considered negligent. In addition to fines or criminal prosecution, you could face lawsuits, negative publicity, and loss of business.
Here are some of the primary areas of regulation:
Corporate accounting: SOX
Health care: HIPAA and HITECH
Credit and debit transactions: PCI
Government: FISMA and VPAT
Europe: DPA
The regulations are overwhelming and costly
Compliance is a major concern because of the increasing number and complexity of the regulations, as well as the expense they can entail—in the form of investment in new technologies and management. In the United States alone, there are more than 8,500 state and federal regulations concerning records management and notice of breach, plus voluntary standards. A 2011 study of multinational companies found the average cost of compliance to be more than $3.5 million.
Wave’s solution: start with the device
The Wave approach to the compliance challenge is twofold:
First, we offer serious security that’s confirmed, not assumed. Regulators won’t take your word for it. We use your existing hardware to more or less equip each and every device with its own data protection system. That can mean both strong two-factor authentication and automatic encryption.
This gives you unprecedented yet straightforward monitoring of and control over exactly who has access to your data, with what devices, over what networks. Detailed logs record it all—and show that you were in compliance at any given time. Proving compliance to an auditor can be as easy as clicking “print.”
Second, we keep it simple to keep costs down. Again, we start with the devices you already have. We can do that because our products are based on an open standard that’s already been implemented on 600 million–plus laptops and is now working its way onto mobile devices. Our software may be all you need to tame the compliance monster.
Our products are also designed to make managing your security—and your compliance—refreshingly straightforward. Usually, you can do all your management, monitoring, and reporting through a single console. Preconfigured security policies mean you can be in compliance as soon as our software is installed. It all adds up to less time, less staff.
For these reasons, total cost of ownership for Wave can be almost half that of a traditional software-based system that may not even prove you are in compliance—never mind protect your data.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Watchdog: CISA Needs to Update Plans to Protect Critical Infrastructure
https://www.nextgov.com/cybersecurity/2021/09/watchdog-cisa-needs-update-plans-protect-critical-infrastructure/185415/
=================================================================
Hardware security (built-in TPMs and SEDs) that are activated and managed using Wave software at less cost provides better security!!! Why critical infrastructure isn't totally using this technology in light of all the potential cyber attacks happening is hard to imagine. Proven built-in hardware security could be protecting our Nation's critical infrastructure at a level that software only just can't do!!! Time is of the essence in this critical area of the U.S. economy!!!
=================================================================
http://www.wavesys.com/wave-alternative
The Wave alternative link above is a great alternative (plan) for cybersecurity!!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Ransomware preparedness is low despite executives’ concerns
https://www.helpnetsecurity.com/2021/09/15/ransomware-preparedness/
Excerpt:
86.7% of C-suite and other executives say they expect the number of cyberattacks targeting their organizations to increase over the next 12 months, according to a recent Deloitte poll.
=================================================================
And with many of the ransomware attackers in these cyber attacks able to get on the network, sensitive information can easily be stolen and put up for ransom by the ransomware attackers!!! Wave can prevent that from happening!!! Only allowing known and approved devices access to your network is a better approach than trying to keep attackers off the network by using other products like Securid!!! Wave costs less and is better security!!!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Anonymous Claims to Have Stolen Huge Trove of Data From Epik, the Right-Wing’s Favorite Web Host
https://gizmodo.com/anonymous-claims-to-have-stolen-huge-trove-of-data-from-1847673935
==================================================================
http://www.wavesys.com/data-protection
Security = data protection
When we talk about security, what we really mean is protecting data from theft and misuse. Proprietary information, R&D, corporate strategy, customer names and phone numbers, social security numbers, passwords … All have potential monetary value, and all are targets. Data theft is a growth industry. As an example, tens of thousands of new malware strains pop up daily. With online tools, even a non-technical person can create one in minutes.
The IT perimeter has vanished
Data protection is easy enough when your data is sitting in secure servers. But today, it’s not. The workforce is increasingly mobile. More than 60 percent of corporate data lives not on servers but on laptops, tablets, and other devices (and more and more of those devices are owned by employees). Data is dispersed, constantly moving, and constantly exposed to the Internet and all the malware, viruses, and hackers lurking there.
Wave’s solution: start with the device
The Wave approach to this challenge is to make the IT perimeter irrelevant. Wave turns on and manages the self-encrypting drives (SEDs) and trusted platform modules (TPMs), or security chips, that are already embedded in many of your devices. The upshot is that each and every device is equipped with its own data protection system—while being centrally managed. This gives you unprecedented yet straightforward control over exactly who has access to your data, with what devices, over what networks.
We cost less too. Wave works on your existing hardware, across platforms. That’s because our solutions are based on an open standard that’s already been implemented on 600 million–plus laptops and is now working its way onto mobile devices. Our software is all you need to reach a whole new level of data protection. It’s one of the big reasons why total cost of ownership can be almost half that of a traditional software-based system that doesn’t even work very well.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Cyber Stress: The growing threat facing CISOs
https://www.techradar.com/news/cyber-stress-the-growing-threat-facing-cisos
Excerpt:
How to remediate high-stress levels among cybersecurity professionals.
==================================================================
Two options that CISOs have:
1. Hunting down threats that are already allowed access to the network.
vs.
2. Only allow known and approved devices access to the network (Wave).
Judging by the number of cyber attacks there have been in the last 5 years, option 1 is not working!!! And the process to stop these intruders under option 1 is creating a lot of stress!!!
Use option 2 (Wave) and have network and data protection that works, and creates a lot less stress!!!
It's better to be proactive than reactive!!!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Overseas cyber-attacks spike during major Chinese holidays and ceremonies
https://www.globaltimes.cn/page/202109/1233890.shtml
The number of overseas cyber-attacks on the Guizhou-Cloud system platform often increase significantly during China's major holidays and celebrations, a manager from the China's leading cloud system platform told the Global Times on Thursday.
Yang Yunyong, the general manager of the Guizhou-Cloud Big Data Industry Development Company said during the interview with the Global Times that the number of overseas cyber-attacks on the Guizhou-Cloud system platform during the nation's major holidays or ceremonies often show a more than tenfold increase.
The Global Times found on Thursday at the company's data center that the number of attacks at 10 am reached nearly half a million, as Yang added that this number only counted effective attacks.
"If you add attempts of the attacks, the total number per day is estimated to reach more than ten million," said Yang.
The attacks are mostly from China, the US, Russia, and India. Yang noted that attacks are largely from large countries which can recruit top-level talent and have a stronger ability and means to attack.
As for the purpose of these cyber attacks, Yang believes that most of the domestic attackers are taking actions due to "interest", adding that some attackers may feel take down the "fortress" as a feeling of taking a commanding height in the hacker world as the Guizhou-Cloud system platform is the first "fortress" for China's e-government platform.
As for attackers overseas, it is still not clear how they view the Guizhou-Cloud system platform, said Yang, emphasizing that the platform will work on increasing the defense forces by implementing special protection measures as the cloud platform receives more than tenfold increase in attacks from overseas actors during the nation's major holidays and ceremonies.
Yang pointed out that the company has established three defense systems and cooperated with other companies and relevant authorities to ensure the safety of the country's e-government platform, so the defense capability of the cloud system is leading in China.
==================================================================
Given Wave was bundled with Lenovo computers and had a distribution agreement with them, one would think that China would realize a great benefit for using Wave especially during the holidays. They could keep unauthorized devices (unknown and unapproved devices) from accessing enterprise networks by using Wave!!! Organizations in China wouldn't have the problem outlined in the above article!!! Wave/Lenovo/China could improve China's cybersecurity in a big way!!!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
Choose data protection that actually works!!!
http://www.wavesys.com/wave-alternative
Better security at less than half the cost!!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Titanfall 2 Hacking Rumor Blown Out Of Proportion, Respawn Says
https://kotaku.com/titanfall-2-hacking-rumor-blown-out-of-proportion-resp-1847643027
Excerpt:
Titanfall 2 hasn’t exactly had a hot girl summer. Since May, hackers have regularly hit Respawn Entertainment’s first-person shooter with direct denial of service (DDOS) attacks, making the game virtually unplayable. The situation hit a fever pitch yesterday, when viral social posts suggested hackers could actually obtain control of players’ computers. But Respawn, which acknowledged security concerns, said the issue was overblown.
=================================================================
It sounds like the TPM, Wavexpress and Wave software could have a big positive impact on Titanfall 2!!! With Riot (see post #246785 and Titanfall 2, Wave could be helping out the situation with these two along with other games. Steven and Michael Sprague may have moved on (that is unfortunate), but what they created with Wavexpress could still have big positive impact on the market. Windows 11 is going to require the TPM, but there are other users that will need the activation and managing capabilities of the TPM that Wave can provide for those with other Windows based computers!!! I believe Windows 11 comes out October 5th, so Wave has a huge opportunity. Wave could redevelop it's technology for games and videos if its not ready already!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Hackers Steal U.N. Data That Could Be Used for Future Government Cyberattacks
https://www.newsweek.com/hackers-steal-un-data-that-could-used-future-government-cyberattacks-1627648
Excerpt:
The hack, which was first reported by Bloomberg and later confirmed by the U.N., occurred sometime earlier this year. It is believed that a hacker entered the system by using a stolen username and password that Bloomberg reported were likely purchased off the dark web.
==================================================================
Wave VSC 2.0 (MFA) could have prevented this, and could be massively benefiting the U.N. and government and MANY other organizations. There is contact information for Wave below for Wave's awesome solutions!!!
Better security at less than half the cost!!!
You need multi-factor authentication. Fast. You need Wave Virtual Smart Card.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Attacker Breakout Time Now Less Than 30 Minutes
https://thecybersecurity.news/general-cyber-security-news/attacker-breakout-time-now-less-than-30-minutes-12673/?nowprocket=1
The common time it can take threat actors to go from original accessibility to lateral movement has fallen by 67% more than the past calendar year, placing additional pressure on security operations (SecOps) groups, according to CrowdStrike.
The findings come from the security firm’s own investigations with clients throughout all-around 248,000 one of a kind world endpoints.
For incidents wherever this “breakout time” could be derived around the previous calendar year, it averaged just 1 hour 32 minutes. Even so, in above a 3rd (36%) of intrusions, adversaries managed to move laterally to additional hosts in less than 30 minutes.
That reportedly would make the occupation of incident responders additional complicated. With lateral movement arrives the discovery of info to exfiltrate and new methods to deploy ransomware on.
Threat actors are also turning out to be extra stealthy. In 68% of detections indexed by CrowdStrike, no malware was employed at all. This usually means “living off the land” approaches and legitimate tooling was used to stay underneath the radar of classic security instruments.
In overall, the vendor detected a 60% improve in tried intrusions throughout all verticals and geographic regions concerning July 2020 and June 2021 as opposed to a 12 months previous.
Not all of this exercise is about knowledge collection and ransomware deployment. CrowdStrike recorded a 100% yr-on-yr maximize in crypto-jacking in interactive intrusions.
When it came to focused intrusions, China-centered threat actors had been the most prolific by considerably, accounting for 67% of incidents. Following arrived unattributed condition-backed attackers (20%), then Iran (7%) and North Korean (5%) actors.
“Over the past calendar year, companies confronted an unparalleled onslaught of advanced attacks on a each day foundation,” mentioned Param Singh, CrowdStrike’s VP of menace looking company Falcon OverWatch.
“In order to thwart modern adversaries’ stealthy and unabashed practices and procedures, it is crucial that organizations include both equally pro threat hunting and risk intelligence into their security stacks, layer machine-mastering enabled endpoint detection and reaction (EDR) into their networks, and have comprehensive visibility into endpoints to in the long run quit adversaries in their tracks.”
Some pieces of this posting are sourced from:
www.infosecurity-magazine.com
=================================================================
If organizations had Wave VSC 2.0, these hackers wouldn't be moving laterally across the network!!! They wouldn't get on the network because they are unknown and unapproved devices!!!
Better security at less than half the cost!!!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Hackers leak passwords for 500,000 Fortinet VPN accounts
https://www.bleepingcomputer.com/news/security/hackers-leak-passwords-for-500-000-fortinet-vpn-accounts/
Excerpts:
While the threat actor states that the exploited Fortinet vulnerability has since been patched, they claim that many VPN credentials are still valid.
This leak is a serious incident as the VPN credentials could allow threat actors to access a network to perform data exfiltration, install malware, and perform ransomware attacks.
==================================================================
Wave VSC 2.0 could save these networks from being hacked!!! Wave VSC 2.0 - better security at less than half the the cost, and no need for all these password resets!!! The Wave alternative - simpler, more secure and cheaper!!!
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
What can it be used for?
What do you use your smart card for today? With the exception of keying open the door at work, Wave Virtual Smart Card can perform any of the services or applications you rely on your smart card for today. Secure VPN, WiFi, remote desktop, cloud applications – it can all be done with a virtual smart card.
=================================================================
http://www.wavesys.com/wave-alternative
Choose data protection that actually works!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Riot Will Use Windows 11’s TPM 2.0 Requirement to Ban Cheaters From Valorant
https://www.extremetech.com/gaming/326740-riot-will-use-windows-11s-tpm-2-0-requirement-to-ban-cheaters-from-valorant
=================================================================
If only Wavexpress was revived with Steven and Michael Sprague at the helm!!! TPMs, Wavexpress and Wave software could create a tsunami of success for Wave!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Episode 224: Engineering Trust in the Cyber Executive Order
https://securityledger.com/2021/08/episode-224-engineering-trust-in-the-cyber-executive-order/
Excerpt:
In this spotlight edition of the podcast, sponsored by Trusted Computing Group Thomas Hardjono and Henk Birkholz join us to talk about President Biden's Cyber Executive Order and how the EO's call for increasing trust in federal IT systems is creating demand for TCG technologies.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Why Antivirus Signatures And Next-Gen Malware Detection Aren’t Enough
https://www.forbes.com/sites/forbestechcouncil/2021/09/03/why-antivirus-signatures-and-next-gen-malware-detection-arent-enough/
=================================================================
Wave wrote about this years ago with Wave Endpoint Monitor. Is the market realizing what Wave knew about antivirus years ago? See why WEM is so great in the links below!!! With hardware security (SEDs and TPMs), Wave solutions are set apart from a lot of cybersecurity products!!! As other companies try to formulate a plan for organizations' cybersecurity, Wave has one (The Wave Alternative), and it actually works!!! If more organizations were using it, these organizations would be protected. Use Wave solutions, and all these cyber disasters wouldn't be happening!!!
=================================================================
http://www.wavesys.com/malware-protection
Only hardware-based security can beat malware!!!
=================================================================
http://www.wavesys.com/products/wave-endpoint-monitor
http://www.wavesys.com/wave-alternative
Choose data protection that actually works!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Happy Labor Day!!
Biden administration on alert for cyberattacks ahead of Labor Day weekend
https://thehill.com/policy/cybersecurity/570643-biden-administration-on-alert-for-cyberattacks-ahead-of-labor-day
Excerpt:
“Indeed, a long weekend can sometimes make attackers feel they have extra time to navigate in before they are detected,” she said. (Anne Neuberger)
=================================================================
Should organizations even let attackers navigate on the network? With Wave, only known and approved devices are allowed to access the network, the attackers (unknown and unapproved devices) are kept from accessing the network!!! Wave would make future Labor Day Weekends more secure for organizations!!!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
Better security at less than half the cost!!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Tech CEOs: Multi-Factor Authentication Can Prevent 90% of Attacks
https://thecybersecurity.news/general-cyber-security-news/tech-ceos-multi-factor-authentication-can-prevent-90-of-attacks-12556/?nowprocket=1
Excerpt:
“Security teams ought to proactively hunt on a network. It’s sort of like a digital model of going for walks the defeat. Seem for any initial indicators of compromise or just about anything unusual on a network,” she said.
=================================================================
The World would be better off not allowing unknown and unapproved devices access to the network!!! If these devices aren't on the network they won't be stealing from it!!! Hunting them down sounds like the security team could be too late, and they are on the network!!! This could be very stressful and not as effective as Wave's technology!!!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
==================================================================
Choose better security at less than half the cost!!! Choose Wave Systems!!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
WhatsApp hit with $267 million GDPR fine for bungling user privacy disclosure
https://www.cyberscoop.com/whatsapp-hit-with-267-million-gdpr-fine-for-bungling-user-privacy-disclosure/
=================================================================
With GDPR fines being what they are now ($267 million for Whatsapp), could increased fines for unencrypted data at rest and unauthorized access to companies' data be far behind? This comes especially knowing that there is technology, Wave solutions, that can protect that data!!! If SEDs (Self-Encrypting Drives) and TPMs (Trusted Platform Modules) were mandated to be activated (see previous post) and organizations used Wave software, these GDPR fines could be a thing of the past!!!
=================================================================
http://www.wavesys.com/
Better security at less than half the cost!!!
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
The first national cyber director has big plans to toughen U.S. digital defenses
https://www.politico.com/news/2021/08/30/chris-inglis-cyber-attacks-507021
=================================================================
Let's face it, activated SEDs and TPMs as standards should have been mandated years ago. Our nation's cybersecurity is suffering tremendously because we haven't done so. The more we wait on mandating these standards, the more we are susceptible to cyber attacks!!! And Wave software could activate and manage these hardware standards so that the U.S. has better security!!! Wave could help a LOT of organizations protect their data with their awesome solutions!!!
================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
91% of Industrial Organizations Can Be Penetrated by Hackers
https://thecybersecurity.news/general-cyber-security-news/91-of-industrial-organizations-can-be-penetrated-by-hackers-12483/?nowprocket=1
A lot more than nine in 10 (91%) industrial businesses are susceptible to cyber-attacks, in accordance to a new report by Constructive Technologies.
The research found that external attackers can penetrate the corporate network in all these companies, and as soon as inside of, can attain person credentials and entire command more than the infrastructure in 100% of circumstances. In more than two-thirds (69%) of these situations, exterior attackers can steal delicate information from the organization, such as details about partners and company personnel and internal documentation.
In addition, penetration testers from Positive Technologies gained entry to the technological section of the network of 75% of corporations. This then enabled them to entry industrial control techniques (ICS) in 56% of circumstances.
Once malicious actors acquire obtain to ICS components, they have the opportunity to induce significant hurt and even fatalities — this features shutting down entire productions, resulting in gear to are unsuccessful and triggering industrial accidents.
Positive Systems claimed there is a variety of components that are earning these companies vulnerable to hackers. For illustration, for the duration of recent PT NAD pilot projects, its experts uncovered quite a few suspicious situations in the internal network of each and every industrial company. In a single case, PT NAD registered an RDP relationship to an exterior cloud storage, enabling 23 GB of info to be transferred to the address of this storage by using RDP and HTTPS.
The vendor also mentioned that industrial businesses frequently use out-of-date software and typically save relationship parameters (username and password) in a remote access authentication kind, letting attackers to connect to the resources of an isolated phase without the need of qualifications when they get hold of command around this sort of a laptop.
The opportunity impact of an attack on an industrial corporation was shown during a digital cyber-vary at The Standoff 2021. In one particular scenario, within two days, attackers received regulate of the fuel station, halting the gas provide and resulting in an explosion.
Olga Zinenko, senior analyst at Favourable Technologies, commented: “Today, the level of cybersecurity at most industrial companies is too minimal for comfort and ease. In most conditions, internet-obtainable exterior network perimeters include weak security, machine configurations have flaws, and we obtain a lower stage of ICS network security and the use of dictionary passwords and out-of-date application variations existing pitfalls.”
Some components of this article are sourced from:
www.infosecurity-magazine.com
================================================================
These organizations could be using better security (Wave VSC 2.0) at less than half the cost, AND PREVENTING THESE CYBER ATTACKS!!!
Rethink cybersecurity and USE WAVE'S AWESOME SOLUTIONS!!!
=================================================================
http://www.wavesys.com/wave-alternative
Excerpts:
Choose data protection that actually works!
It’s part of what makes the Wave alternative not only more secure, but also simpler and cheaper. Total cost of ownership for Wave data protection can be almost half that of a traditional software-based system.
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
The Taliban Reportedly Have Control of US Biometric Devices – a Lesson in Life-and-Death Consequences of Data Privacy
https://www.nextgov.com/ideas/2021/08/taliban-reportedly-have-control-us-biometric-devices-lesson-life-and-death-consequences-data-privacy/184948/
Excerpt:
For years following 9/11, researchers, activists and policymakers raised concerns that the mass collection, storage and analysis of sensitive biometric data posed dangers to privacy rights and human rights. Reports of the Taliban potentially accessing U.S. biometric data stored by the military show that those concerns were not unfounded. They reveal potential cybersecurity vulnerabilities in the U.S. military’s biometric systems. In particular, the situation raises questions about the security of the mobile biometric data collection devices used in Afghanistan.
=================================================================
It could be after reading an article like this one that the PIN and TPM (Wave VSC 2.0) are the better factors of authentication than using biometrics!!!
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
Excerpt:
The user experience with a virtual smart card is simple: he or she logs in with a PIN (authentication factor number one). The TPM (authentication factor number two) then transparently identifies the device to the network and connects the user to all the approved services. It’s one less thing for users to carry around.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Fujitsu says stolen data being sold on dark web 'related to customers'
https://www.zdnet.com/article/fujitsu-says-stolen-data-being-sold-on-dark-web-related-to-customers/
A group called "Marketo" has claimed it has 4 GB of stolen data and purports to have 70 bids on it already.
Jonathan Greig
By Jonathan Greig | August 30, 2021 -- 22:51 GMT (15:51 PDT) | Topic: Security
Data from Japanese tech giant Fujitsu is being sold on the dark web by a group called Marketo, but the company said the information "appears related to customers" and not their own systems.
On August 26, Marketo wrote on its leak site that it had 4 GB of stolen data and was selling it. They provided samples of the data and claimed they had confidential customer information, company data, budget data, reports and other company documents including information on projects.
Initially, the group's leak site said it had 280 bids on the data but now, the leak site shows 70 bids for the data, including one bid today.
A Fujitsu spokesperson downplayed the incident and told ZDNet that there was no indication it was connected to a situation in May when hackers stole data from Japanese government entities through Fujitsu's ProjectWEB platform.
"We are aware that information has been uploaded to dark web auction site 'Marketo' that purports to have been obtained from our site. Details of the source of this information, including whether it comes from our systems or environment, are unknown," a Fujitsu spokesperson told ZDNet.
"Because this includes information that appears related to customers, we will refrain from commenting on the details. I assume that you may recall the last event of Project WEB on May, but there is no indication that this includes information leaked from ProjectWEB, and we believe that this matter is unrelated."
Cybersecurity experts like Cato Networks senior director of security strategy Etay Maor questioned the number of bids on the data, noting that the Marketo group controls the website and could easily change the number as a way to put pressure on buyers.
But Ivan Righi, cyber threat intelligence analyst with Digital Shadows, said Marketo is known to be a reputable source.
Righi said the legitimacy of the data stolen cannot be confirmed but noted that previous data leakages by the group have been proven to be genuine.
"Therefore, it is likely that the data exposed on their website is legitimate. At the time of writing, Marketo has only exposed a 24.5 MB 'evidence package,' which contained some data relating to another Japanese company called Toray Industries. The group also provided three screenshots of spreadsheets allegedly stolen in the attack," Righi said.
He explained that while Marketo is not a ransomware group, it operates similar to ransomware threat actors.
"The group infiltrates companies, steals their data, and then threatens to expose that data if a ransom payment is not made. If a company does not respond to the threat actor's ransom demand, they are eventually posted on the Marketo data leak site," Righi told ZDNet.
"Once a company is posted on the Marketo site, an evidence package is usually provided with some data stolen from the attack. The group will then continue to threaten the companies and expose data periodically, if the ransom is not paid. While the group does have an auction section on their website, not all victims are available in this section, and Fujitsu has not been put up for auction publicly at the time of writing. It is unknown where the 70 bids purportedly came from, but it is possible that these bids may originate from closed auctions."
Digital Shadows wrote a report about the group in July, noting that it was created in April 2021 and often markets its stolen data through a Twitter profile by the name of @Mannus Gott.
The account has taunted Fujitsu in recent days, writing on Sunday, "Oh, the sweet, sweet irony. One of the largest IT services provider couldn't find themselves an adequate protection."
The gang has repeatedly claimed it is not a ransomware group and instead an "informational marketplace." They contacted multiple news outlets in May to tout their work.
"The marketplace itself operates in a similar fashion to other data leak sites with some unique features. Interestingly the group includes an 'Attacking' section naming organizations that are in the progress of being attacked. The marketplace allows for user registration and provides a contact section for victim and press inquiries," Digital Shadows Photon Research Team wrote.
"Victims are provided a link to a separate chat to conduct negotiations. Within the individual posts, Marketo provides a summary of the organization, screenshots of seemingly compromised data, and a link to an "evidence pack" otherwise known as a proof. They auction sensitive data in the form of a silent auction through a blind bidding system where users make bids based on what they think the data is worth."
=================================================================
Sounds like Fujitsu and many other Japanese organizations could use data protection that actually works (Wave)!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
CISA: Don’t use single-factor auth on Internet-exposed systems
https://www.bleepingcomputer.com/news/security/cisa-don-t-use-single-factor-auth-on-internet-exposed-systems/
=================================================================
Something important to remember about Wave VSC 2.0 (MFA):
http://www.wavesys.com/wave-alternative
Excerpts:
A big piece of this heightened security is device authentication. Traditional two-factor authentication requires what amounts to two user IDs. But by using the TPMs inside your devices, Wave can confirm the identity of not only users, but also the devices they’re on. Combine that with fast, enforced encryption of sensitive data via your SEDs—all easily managed with Wave software—and your data is protected from the full range of modern risks: device theft, missent emails, flash drives, portable hot spots … even (and no one else can say this) hardware keyloggers. Not to mention Bob.
Do we need to say that with Wave, compliance is no problem?
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Windows 11: Microsoft stands firm on hardware requirements
https://www.zdnet.com/article/windows-11-microsoft-stands-firm-on-hardware-requirements/
Excerpt:
If you were expecting Microsoft to relent in its strict hardware requirements for Windows 11, prepare to be disappointed. Most PC designs from 2018 or earlier will be unable to make the upgrade.
=================================================================
Your organization is going to have activated TPMs in its new Windows 11 PCs. Why not activate TPMs in your other Windows computers?! Wave can help with the activation and managing of these critical security chips that are already built-in to your organization's computers!!! A full fleet of activated TPMs in your organization's computers with the right software (Wave) could give your organization much better security!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Dell's Q2 carried by commercial PC sales boom
https://www.zdnet.com/article/dells-q2-carried-by-commercial-pc-sales-boom/
Excerpt:
Commercial PC revenue surged 32% in the quarter to $10.6 billion and consumer sales of $3.7 billion was up 17% from a year ago.
=================================================================
I wonder if Dell is providing the ultimate in cybersecurity - Wave solutions!!! They should be!!!
Better security at less than half the cost!!!
Choose data protection that actually works!!!
==================================================================
http://www.wavesys.com/products/wave-self-encrypting-drive-management
http://www.wavesys.com/products/wave-cloud
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/products/wave-endpoint-monitor
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
New Hampshire town loses $2.3 million to overseas scammers
https://www.bleepingcomputer.com/news/security/new-hampshire-town-loses-23-million-to-overseas-scammers/
Excerpt:
BEC scammers use various tactics (including phishing and social engineering) to compromise or impersonate their targets' business email accounts, allowing them to redirect pending or future payments to bank accounts they control.
=================================================================
Wave VSC 2.0 could be stopping a lot of BEC scams (due to phishing attacks). Its amazing that Wave's technology doesn't get more use!!!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpts:
Key Features:
Strong Security
• Authenticate securely, encrypt email, and prove integrity of the device with one management console
• Protect against phishing, malware and other network security threats by storing authentication credentials in hardware
• Provide centralized enforcement of custom policies
=================================================================
Better security at less than half the cost!!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE