Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Overseas cyber-attacks spike during major Chinese holidays and ceremonies
https://www.globaltimes.cn/page/202109/1233890.shtml
The number of overseas cyber-attacks on the Guizhou-Cloud system platform often increase significantly during China's major holidays and celebrations, a manager from the China's leading cloud system platform told the Global Times on Thursday.
Yang Yunyong, the general manager of the Guizhou-Cloud Big Data Industry Development Company said during the interview with the Global Times that the number of overseas cyber-attacks on the Guizhou-Cloud system platform during the nation's major holidays or ceremonies often show a more than tenfold increase.
The Global Times found on Thursday at the company's data center that the number of attacks at 10 am reached nearly half a million, as Yang added that this number only counted effective attacks.
"If you add attempts of the attacks, the total number per day is estimated to reach more than ten million," said Yang.
The attacks are mostly from China, the US, Russia, and India. Yang noted that attacks are largely from large countries which can recruit top-level talent and have a stronger ability and means to attack.
As for the purpose of these cyber attacks, Yang believes that most of the domestic attackers are taking actions due to "interest", adding that some attackers may feel take down the "fortress" as a feeling of taking a commanding height in the hacker world as the Guizhou-Cloud system platform is the first "fortress" for China's e-government platform.
As for attackers overseas, it is still not clear how they view the Guizhou-Cloud system platform, said Yang, emphasizing that the platform will work on increasing the defense forces by implementing special protection measures as the cloud platform receives more than tenfold increase in attacks from overseas actors during the nation's major holidays and ceremonies.
Yang pointed out that the company has established three defense systems and cooperated with other companies and relevant authorities to ensure the safety of the country's e-government platform, so the defense capability of the cloud system is leading in China.
==================================================================
Given Wave was bundled with Lenovo computers and had a distribution agreement with them, one would think that China would realize a great benefit for using Wave especially during the holidays. They could keep unauthorized devices (unknown and unapproved devices) from accessing enterprise networks by using Wave!!! Organizations in China wouldn't have the problem outlined in the above article!!! Wave/Lenovo/China could improve China's cybersecurity in a big way!!!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
Choose data protection that actually works!!!
http://www.wavesys.com/wave-alternative
Better security at less than half the cost!!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Titanfall 2 Hacking Rumor Blown Out Of Proportion, Respawn Says
https://kotaku.com/titanfall-2-hacking-rumor-blown-out-of-proportion-resp-1847643027
Excerpt:
Titanfall 2 hasn’t exactly had a hot girl summer. Since May, hackers have regularly hit Respawn Entertainment’s first-person shooter with direct denial of service (DDOS) attacks, making the game virtually unplayable. The situation hit a fever pitch yesterday, when viral social posts suggested hackers could actually obtain control of players’ computers. But Respawn, which acknowledged security concerns, said the issue was overblown.
=================================================================
It sounds like the TPM, Wavexpress and Wave software could have a big positive impact on Titanfall 2!!! With Riot (see post #246785 and Titanfall 2, Wave could be helping out the situation with these two along with other games. Steven and Michael Sprague may have moved on (that is unfortunate), but what they created with Wavexpress could still have big positive impact on the market. Windows 11 is going to require the TPM, but there are other users that will need the activation and managing capabilities of the TPM that Wave can provide for those with other Windows based computers!!! I believe Windows 11 comes out October 5th, so Wave has a huge opportunity. Wave could redevelop it's technology for games and videos if its not ready already!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Hackers Steal U.N. Data That Could Be Used for Future Government Cyberattacks
https://www.newsweek.com/hackers-steal-un-data-that-could-used-future-government-cyberattacks-1627648
Excerpt:
The hack, which was first reported by Bloomberg and later confirmed by the U.N., occurred sometime earlier this year. It is believed that a hacker entered the system by using a stolen username and password that Bloomberg reported were likely purchased off the dark web.
==================================================================
Wave VSC 2.0 (MFA) could have prevented this, and could be massively benefiting the U.N. and government and MANY other organizations. There is contact information for Wave below for Wave's awesome solutions!!!
Better security at less than half the cost!!!
You need multi-factor authentication. Fast. You need Wave Virtual Smart Card.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Attacker Breakout Time Now Less Than 30 Minutes
https://thecybersecurity.news/general-cyber-security-news/attacker-breakout-time-now-less-than-30-minutes-12673/?nowprocket=1
The common time it can take threat actors to go from original accessibility to lateral movement has fallen by 67% more than the past calendar year, placing additional pressure on security operations (SecOps) groups, according to CrowdStrike.
The findings come from the security firm’s own investigations with clients throughout all-around 248,000 one of a kind world endpoints.
For incidents wherever this “breakout time” could be derived around the previous calendar year, it averaged just 1 hour 32 minutes. Even so, in above a 3rd (36%) of intrusions, adversaries managed to move laterally to additional hosts in less than 30 minutes.
That reportedly would make the occupation of incident responders additional complicated. With lateral movement arrives the discovery of info to exfiltrate and new methods to deploy ransomware on.
Threat actors are also turning out to be extra stealthy. In 68% of detections indexed by CrowdStrike, no malware was employed at all. This usually means “living off the land” approaches and legitimate tooling was used to stay underneath the radar of classic security instruments.
In overall, the vendor detected a 60% improve in tried intrusions throughout all verticals and geographic regions concerning July 2020 and June 2021 as opposed to a 12 months previous.
Not all of this exercise is about knowledge collection and ransomware deployment. CrowdStrike recorded a 100% yr-on-yr maximize in crypto-jacking in interactive intrusions.
When it came to focused intrusions, China-centered threat actors had been the most prolific by considerably, accounting for 67% of incidents. Following arrived unattributed condition-backed attackers (20%), then Iran (7%) and North Korean (5%) actors.
“Over the past calendar year, companies confronted an unparalleled onslaught of advanced attacks on a each day foundation,” mentioned Param Singh, CrowdStrike’s VP of menace looking company Falcon OverWatch.
“In order to thwart modern adversaries’ stealthy and unabashed practices and procedures, it is crucial that organizations include both equally pro threat hunting and risk intelligence into their security stacks, layer machine-mastering enabled endpoint detection and reaction (EDR) into their networks, and have comprehensive visibility into endpoints to in the long run quit adversaries in their tracks.”
Some pieces of this posting are sourced from:
www.infosecurity-magazine.com
=================================================================
If organizations had Wave VSC 2.0, these hackers wouldn't be moving laterally across the network!!! They wouldn't get on the network because they are unknown and unapproved devices!!!
Better security at less than half the cost!!!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Hackers leak passwords for 500,000 Fortinet VPN accounts
https://www.bleepingcomputer.com/news/security/hackers-leak-passwords-for-500-000-fortinet-vpn-accounts/
Excerpts:
While the threat actor states that the exploited Fortinet vulnerability has since been patched, they claim that many VPN credentials are still valid.
This leak is a serious incident as the VPN credentials could allow threat actors to access a network to perform data exfiltration, install malware, and perform ransomware attacks.
==================================================================
Wave VSC 2.0 could save these networks from being hacked!!! Wave VSC 2.0 - better security at less than half the the cost, and no need for all these password resets!!! The Wave alternative - simpler, more secure and cheaper!!!
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
What can it be used for?
What do you use your smart card for today? With the exception of keying open the door at work, Wave Virtual Smart Card can perform any of the services or applications you rely on your smart card for today. Secure VPN, WiFi, remote desktop, cloud applications – it can all be done with a virtual smart card.
=================================================================
http://www.wavesys.com/wave-alternative
Choose data protection that actually works!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Riot Will Use Windows 11’s TPM 2.0 Requirement to Ban Cheaters From Valorant
https://www.extremetech.com/gaming/326740-riot-will-use-windows-11s-tpm-2-0-requirement-to-ban-cheaters-from-valorant
=================================================================
If only Wavexpress was revived with Steven and Michael Sprague at the helm!!! TPMs, Wavexpress and Wave software could create a tsunami of success for Wave!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Episode 224: Engineering Trust in the Cyber Executive Order
https://securityledger.com/2021/08/episode-224-engineering-trust-in-the-cyber-executive-order/
Excerpt:
In this spotlight edition of the podcast, sponsored by Trusted Computing Group Thomas Hardjono and Henk Birkholz join us to talk about President Biden's Cyber Executive Order and how the EO's call for increasing trust in federal IT systems is creating demand for TCG technologies.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Why Antivirus Signatures And Next-Gen Malware Detection Aren’t Enough
https://www.forbes.com/sites/forbestechcouncil/2021/09/03/why-antivirus-signatures-and-next-gen-malware-detection-arent-enough/
=================================================================
Wave wrote about this years ago with Wave Endpoint Monitor. Is the market realizing what Wave knew about antivirus years ago? See why WEM is so great in the links below!!! With hardware security (SEDs and TPMs), Wave solutions are set apart from a lot of cybersecurity products!!! As other companies try to formulate a plan for organizations' cybersecurity, Wave has one (The Wave Alternative), and it actually works!!! If more organizations were using it, these organizations would be protected. Use Wave solutions, and all these cyber disasters wouldn't be happening!!!
=================================================================
http://www.wavesys.com/malware-protection
Only hardware-based security can beat malware!!!
=================================================================
http://www.wavesys.com/products/wave-endpoint-monitor
http://www.wavesys.com/wave-alternative
Choose data protection that actually works!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Happy Labor Day!!
Biden administration on alert for cyberattacks ahead of Labor Day weekend
https://thehill.com/policy/cybersecurity/570643-biden-administration-on-alert-for-cyberattacks-ahead-of-labor-day
Excerpt:
“Indeed, a long weekend can sometimes make attackers feel they have extra time to navigate in before they are detected,” she said. (Anne Neuberger)
=================================================================
Should organizations even let attackers navigate on the network? With Wave, only known and approved devices are allowed to access the network, the attackers (unknown and unapproved devices) are kept from accessing the network!!! Wave would make future Labor Day Weekends more secure for organizations!!!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
Better security at less than half the cost!!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Tech CEOs: Multi-Factor Authentication Can Prevent 90% of Attacks
https://thecybersecurity.news/general-cyber-security-news/tech-ceos-multi-factor-authentication-can-prevent-90-of-attacks-12556/?nowprocket=1
Excerpt:
“Security teams ought to proactively hunt on a network. It’s sort of like a digital model of going for walks the defeat. Seem for any initial indicators of compromise or just about anything unusual on a network,” she said.
=================================================================
The World would be better off not allowing unknown and unapproved devices access to the network!!! If these devices aren't on the network they won't be stealing from it!!! Hunting them down sounds like the security team could be too late, and they are on the network!!! This could be very stressful and not as effective as Wave's technology!!!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
==================================================================
Choose better security at less than half the cost!!! Choose Wave Systems!!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
WhatsApp hit with $267 million GDPR fine for bungling user privacy disclosure
https://www.cyberscoop.com/whatsapp-hit-with-267-million-gdpr-fine-for-bungling-user-privacy-disclosure/
=================================================================
With GDPR fines being what they are now ($267 million for Whatsapp), could increased fines for unencrypted data at rest and unauthorized access to companies' data be far behind? This comes especially knowing that there is technology, Wave solutions, that can protect that data!!! If SEDs (Self-Encrypting Drives) and TPMs (Trusted Platform Modules) were mandated to be activated (see previous post) and organizations used Wave software, these GDPR fines could be a thing of the past!!!
=================================================================
http://www.wavesys.com/
Better security at less than half the cost!!!
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
The first national cyber director has big plans to toughen U.S. digital defenses
https://www.politico.com/news/2021/08/30/chris-inglis-cyber-attacks-507021
=================================================================
Let's face it, activated SEDs and TPMs as standards should have been mandated years ago. Our nation's cybersecurity is suffering tremendously because we haven't done so. The more we wait on mandating these standards, the more we are susceptible to cyber attacks!!! And Wave software could activate and manage these hardware standards so that the U.S. has better security!!! Wave could help a LOT of organizations protect their data with their awesome solutions!!!
================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
91% of Industrial Organizations Can Be Penetrated by Hackers
https://thecybersecurity.news/general-cyber-security-news/91-of-industrial-organizations-can-be-penetrated-by-hackers-12483/?nowprocket=1
A lot more than nine in 10 (91%) industrial businesses are susceptible to cyber-attacks, in accordance to a new report by Constructive Technologies.
The research found that external attackers can penetrate the corporate network in all these companies, and as soon as inside of, can attain person credentials and entire command more than the infrastructure in 100% of circumstances. In more than two-thirds (69%) of these situations, exterior attackers can steal delicate information from the organization, such as details about partners and company personnel and internal documentation.
In addition, penetration testers from Positive Technologies gained entry to the technological section of the network of 75% of corporations. This then enabled them to entry industrial control techniques (ICS) in 56% of circumstances.
Once malicious actors acquire obtain to ICS components, they have the opportunity to induce significant hurt and even fatalities — this features shutting down entire productions, resulting in gear to are unsuccessful and triggering industrial accidents.
Positive Systems claimed there is a variety of components that are earning these companies vulnerable to hackers. For illustration, for the duration of recent PT NAD pilot projects, its experts uncovered quite a few suspicious situations in the internal network of each and every industrial company. In a single case, PT NAD registered an RDP relationship to an exterior cloud storage, enabling 23 GB of info to be transferred to the address of this storage by using RDP and HTTPS.
The vendor also mentioned that industrial businesses frequently use out-of-date software and typically save relationship parameters (username and password) in a remote access authentication kind, letting attackers to connect to the resources of an isolated phase without the need of qualifications when they get hold of command around this sort of a laptop.
The opportunity impact of an attack on an industrial corporation was shown during a digital cyber-vary at The Standoff 2021. In one particular scenario, within two days, attackers received regulate of the fuel station, halting the gas provide and resulting in an explosion.
Olga Zinenko, senior analyst at Favourable Technologies, commented: “Today, the level of cybersecurity at most industrial companies is too minimal for comfort and ease. In most conditions, internet-obtainable exterior network perimeters include weak security, machine configurations have flaws, and we obtain a lower stage of ICS network security and the use of dictionary passwords and out-of-date application variations existing pitfalls.”
Some components of this article are sourced from:
www.infosecurity-magazine.com
================================================================
These organizations could be using better security (Wave VSC 2.0) at less than half the cost, AND PREVENTING THESE CYBER ATTACKS!!!
Rethink cybersecurity and USE WAVE'S AWESOME SOLUTIONS!!!
=================================================================
http://www.wavesys.com/wave-alternative
Excerpts:
Choose data protection that actually works!
It’s part of what makes the Wave alternative not only more secure, but also simpler and cheaper. Total cost of ownership for Wave data protection can be almost half that of a traditional software-based system.
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
The Taliban Reportedly Have Control of US Biometric Devices – a Lesson in Life-and-Death Consequences of Data Privacy
https://www.nextgov.com/ideas/2021/08/taliban-reportedly-have-control-us-biometric-devices-lesson-life-and-death-consequences-data-privacy/184948/
Excerpt:
For years following 9/11, researchers, activists and policymakers raised concerns that the mass collection, storage and analysis of sensitive biometric data posed dangers to privacy rights and human rights. Reports of the Taliban potentially accessing U.S. biometric data stored by the military show that those concerns were not unfounded. They reveal potential cybersecurity vulnerabilities in the U.S. military’s biometric systems. In particular, the situation raises questions about the security of the mobile biometric data collection devices used in Afghanistan.
=================================================================
It could be after reading an article like this one that the PIN and TPM (Wave VSC 2.0) are the better factors of authentication than using biometrics!!!
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
Excerpt:
The user experience with a virtual smart card is simple: he or she logs in with a PIN (authentication factor number one). The TPM (authentication factor number two) then transparently identifies the device to the network and connects the user to all the approved services. It’s one less thing for users to carry around.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Fujitsu says stolen data being sold on dark web 'related to customers'
https://www.zdnet.com/article/fujitsu-says-stolen-data-being-sold-on-dark-web-related-to-customers/
A group called "Marketo" has claimed it has 4 GB of stolen data and purports to have 70 bids on it already.
Jonathan Greig
By Jonathan Greig | August 30, 2021 -- 22:51 GMT (15:51 PDT) | Topic: Security
Data from Japanese tech giant Fujitsu is being sold on the dark web by a group called Marketo, but the company said the information "appears related to customers" and not their own systems.
On August 26, Marketo wrote on its leak site that it had 4 GB of stolen data and was selling it. They provided samples of the data and claimed they had confidential customer information, company data, budget data, reports and other company documents including information on projects.
Initially, the group's leak site said it had 280 bids on the data but now, the leak site shows 70 bids for the data, including one bid today.
A Fujitsu spokesperson downplayed the incident and told ZDNet that there was no indication it was connected to a situation in May when hackers stole data from Japanese government entities through Fujitsu's ProjectWEB platform.
"We are aware that information has been uploaded to dark web auction site 'Marketo' that purports to have been obtained from our site. Details of the source of this information, including whether it comes from our systems or environment, are unknown," a Fujitsu spokesperson told ZDNet.
"Because this includes information that appears related to customers, we will refrain from commenting on the details. I assume that you may recall the last event of Project WEB on May, but there is no indication that this includes information leaked from ProjectWEB, and we believe that this matter is unrelated."
Cybersecurity experts like Cato Networks senior director of security strategy Etay Maor questioned the number of bids on the data, noting that the Marketo group controls the website and could easily change the number as a way to put pressure on buyers.
But Ivan Righi, cyber threat intelligence analyst with Digital Shadows, said Marketo is known to be a reputable source.
Righi said the legitimacy of the data stolen cannot be confirmed but noted that previous data leakages by the group have been proven to be genuine.
"Therefore, it is likely that the data exposed on their website is legitimate. At the time of writing, Marketo has only exposed a 24.5 MB 'evidence package,' which contained some data relating to another Japanese company called Toray Industries. The group also provided three screenshots of spreadsheets allegedly stolen in the attack," Righi said.
He explained that while Marketo is not a ransomware group, it operates similar to ransomware threat actors.
"The group infiltrates companies, steals their data, and then threatens to expose that data if a ransom payment is not made. If a company does not respond to the threat actor's ransom demand, they are eventually posted on the Marketo data leak site," Righi told ZDNet.
"Once a company is posted on the Marketo site, an evidence package is usually provided with some data stolen from the attack. The group will then continue to threaten the companies and expose data periodically, if the ransom is not paid. While the group does have an auction section on their website, not all victims are available in this section, and Fujitsu has not been put up for auction publicly at the time of writing. It is unknown where the 70 bids purportedly came from, but it is possible that these bids may originate from closed auctions."
Digital Shadows wrote a report about the group in July, noting that it was created in April 2021 and often markets its stolen data through a Twitter profile by the name of @Mannus Gott.
The account has taunted Fujitsu in recent days, writing on Sunday, "Oh, the sweet, sweet irony. One of the largest IT services provider couldn't find themselves an adequate protection."
The gang has repeatedly claimed it is not a ransomware group and instead an "informational marketplace." They contacted multiple news outlets in May to tout their work.
"The marketplace itself operates in a similar fashion to other data leak sites with some unique features. Interestingly the group includes an 'Attacking' section naming organizations that are in the progress of being attacked. The marketplace allows for user registration and provides a contact section for victim and press inquiries," Digital Shadows Photon Research Team wrote.
"Victims are provided a link to a separate chat to conduct negotiations. Within the individual posts, Marketo provides a summary of the organization, screenshots of seemingly compromised data, and a link to an "evidence pack" otherwise known as a proof. They auction sensitive data in the form of a silent auction through a blind bidding system where users make bids based on what they think the data is worth."
=================================================================
Sounds like Fujitsu and many other Japanese organizations could use data protection that actually works (Wave)!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
CISA: Don’t use single-factor auth on Internet-exposed systems
https://www.bleepingcomputer.com/news/security/cisa-don-t-use-single-factor-auth-on-internet-exposed-systems/
=================================================================
Something important to remember about Wave VSC 2.0 (MFA):
http://www.wavesys.com/wave-alternative
Excerpts:
A big piece of this heightened security is device authentication. Traditional two-factor authentication requires what amounts to two user IDs. But by using the TPMs inside your devices, Wave can confirm the identity of not only users, but also the devices they’re on. Combine that with fast, enforced encryption of sensitive data via your SEDs—all easily managed with Wave software—and your data is protected from the full range of modern risks: device theft, missent emails, flash drives, portable hot spots … even (and no one else can say this) hardware keyloggers. Not to mention Bob.
Do we need to say that with Wave, compliance is no problem?
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Windows 11: Microsoft stands firm on hardware requirements
https://www.zdnet.com/article/windows-11-microsoft-stands-firm-on-hardware-requirements/
Excerpt:
If you were expecting Microsoft to relent in its strict hardware requirements for Windows 11, prepare to be disappointed. Most PC designs from 2018 or earlier will be unable to make the upgrade.
=================================================================
Your organization is going to have activated TPMs in its new Windows 11 PCs. Why not activate TPMs in your other Windows computers?! Wave can help with the activation and managing of these critical security chips that are already built-in to your organization's computers!!! A full fleet of activated TPMs in your organization's computers with the right software (Wave) could give your organization much better security!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Dell's Q2 carried by commercial PC sales boom
https://www.zdnet.com/article/dells-q2-carried-by-commercial-pc-sales-boom/
Excerpt:
Commercial PC revenue surged 32% in the quarter to $10.6 billion and consumer sales of $3.7 billion was up 17% from a year ago.
=================================================================
I wonder if Dell is providing the ultimate in cybersecurity - Wave solutions!!! They should be!!!
Better security at less than half the cost!!!
Choose data protection that actually works!!!
==================================================================
http://www.wavesys.com/products/wave-self-encrypting-drive-management
http://www.wavesys.com/products/wave-cloud
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/products/wave-endpoint-monitor
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
New Hampshire town loses $2.3 million to overseas scammers
https://www.bleepingcomputer.com/news/security/new-hampshire-town-loses-23-million-to-overseas-scammers/
Excerpt:
BEC scammers use various tactics (including phishing and social engineering) to compromise or impersonate their targets' business email accounts, allowing them to redirect pending or future payments to bank accounts they control.
=================================================================
Wave VSC 2.0 could be stopping a lot of BEC scams (due to phishing attacks). Its amazing that Wave's technology doesn't get more use!!!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpts:
Key Features:
Strong Security
• Authenticate securely, encrypt email, and prove integrity of the device with one management console
• Protect against phishing, malware and other network security threats by storing authentication credentials in hardware
• Provide centralized enforcement of custom policies
=================================================================
Better security at less than half the cost!!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Biden tackles cybersecurity with tech, finance leaders
https://apnews.com/article/business-apple-inc-00a31a944d465a93f1f1110a8e6d5a5c
=================================================================
If someone would only whisper in President Biden's ear, "Check out Wave System's awesome cybersecurity! Wave could help the U.S. have a much better cyber posture, and stop cyberattacks with its cybersecurity!!! Something that has been missing for quite sometime."
=================================================================
Choose data protection that actually works!!!
http://www.wavesys.com/wave-alternative
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Cyber insurance market encounters ‘crisis moment’ as ransomware costs pile up
https://www.cyberscoop.com/cyber-insurance-ransomware-crisis/
It’s a sure sign of trouble when leading insurance industry executives are worried about their own prices going up.
Two separate CEOs of major insurance giants remarked in recent weeks about a considerable jump in cyber insurance premium prices: AIG’s chief executive said rates increased by 40% for its clients, while Chubb’s chief executive said that company was charging more, too.
Rather than welcoming the trend, Chubb CEO Evan Greenberg offered a warning. Those price increases, he said, still don’t reflect the grave risk that a catastrophic cyber event poses. “That is not addressing by itself the fundamental issue,” he said.
Those are just two data points about how, in the past year, the evolution of ransomware has radically altered the landscape of cyber insurance, according to analysts inside and outside the industry. Cyber insurance covers a range of ransomware-related costs, like extortion demands, remediation efforts and other losses.
Ransomware now accounts for 75% of all cyber insurance claims, up from 55% in 2016, according to the credit ratings agency AM Best. The percentage increase in claims is outpacing that of premiums, said a June report which concluded that “the prospects for the cyber insurance market are grim.” Fitch Ratings in April found that the ratio of losses to premiums earned was at 73% last year, jeopardizing the profitability of the industry.
A lack of profitability could lead to yet more premium increases, insurers fleeing the cyber insurance market or policyholders receiving more limited coverage. Problems in the cyber insurance marketplace stand to limit its ability to be a force for effective data protection techniques in the wider private sector, as clients look to insurers for guidance on specific security tools and measures.
“For the cyber insurance market, we are in the very first and most pivotal challenge that we’ve ever had,” said Michael Phillips, chief claims officer for Resilience. “This is our crisis moment.”
There’s less agreement about what could turn things around. Some changes are underway, with insurers imposing stricter cybersecurity safeguards for policyholders or reducing coverage limits. Such requirements could help businesses bolster their defenses, but may also make it harder for others to meet the threshold and therefore leave them without coverage. And reduced coverage limits means higher costs for ransomware victims.
Some observers suspect that over time, the insurance industry — around for hundreds of years in the United States — will acclimate to the risk and costs. Others suggest insurers might be scared away from offering cyber coverage, something that has happened in corners of the industry. And yet others think government intervention might be necessary.
“I think there’s going to be a breaking point,” said David Anderson, vice president and head of major accounts at Lockton Cyber Technology Practice, a brokerage. “I just don’t know what it’s going to look like.”
What’s happening
Cyber insurance is in high demand, a condition that could keep the industry from veering into disaster. Client take-up rate — or the proportion of existing clients opting for cyber coverage — rose 46% in 2020, according to the Government Accountability Office.
Even before the rise of ransomware, though, many analysts maintained that cyber insurance was particularly difficult due to an absence of historical data that complicated the kind of risk forecasting the industry typically uses to set prices. The issue has become severe enough that seven major insurers in June formed a company, CyberAcuView, to combine their data collection and analysis resources.
Now, rates are rising considerably as ransomware attacks increase. One North Carolina school board, for example, recently approved $22,318 for one year of cyber liability insurance — up from last year’s cost of $6,653, or a 235% jump.
“Before this current environment that we’re in, underwriters were almost entirely focused on privacy — how many records do you have, how well are those records protected,” Anderson said, adding that underwriters are now focused on business interruption costs.
There are other factors making the industry picture negative. AM Best noted that an earthquake insurer can diversify its books by offering insurance in different geographical regions, but cyber-risk has no such boundaries. And the losses right now are “crazy,” said Fred Eslami, senior financial analyst at AM Best.
Some contend that the cyber insurance industry at least partly has itself to blame for the growing expense it’s incurring from ransomware payments. Paying the attackers keeps them in the crime business, after all, ensuring future attacks. And it can have secondary effects, too.
“In too many cases the insurance model incentivizes paying criminals instead of having good security in place beforehand,” a Brookings Institution paper argued last month. A representative of the REvil ransomware gang said the gang targets companies that it knows have insurance, as they are “the tastiest morsels.”
The insurance industry publicly resists the notion that it’s anything but a positive force against ransomware, providing a backstop against expenses that can ruin ransomware victims.
Where it’s going
Some insurers have vocally indicated that they want no part of cyber insurance. Others have done so more subtly.
“What is more common than very public exits, are strategy changes that might signal an exit,” said Phillips. That could mean covering fewer and fewer aspects of ransomware costs, he said. AXA, for instance, has said it will stop paying ransom demands for future policyholders, partly in response to French government pressure to halt the practice.
“They’re going to say, ‘You want to buy it from us, fine, but you’re only going to get a tenth of what you got last year,’” Phillips said.
Others might limit coverage in other ways. “As companies are deemed risky then maybe there’s a higher deductible, or the insurance company might say, ‘I’m not going to write a $5 million limit on your cyber, I’m just going to limit my exposure to you to $500,000,’” said Sridhar Manyem, director of industry research at AM Best.
Remaining insurers are trending toward more thoroughly examining prospective policyholders’ security controls, interrogating them on whether they have taken steps such as multifactor authentication as a condition of receiving coverage.
Previously, Anderson said, carriers used paper applications with yes or no questions and “you took everyone’s word for it.” Now, he said, “They go through everything with a fine-toothed comb.”
More immediately worrisome for Phillips is whether some insurers will deem more potential policyholders uninsurable and refuse to provide them coverage because their security is too poor — a situation that would be worrisome for those who lack the financial means to obtain security technology, like municipalities or small businesses.
Solutions
For the insurers that weather the storm, momentum seems to be building for firms to take a more active role in breach response situations.
The U.S. Ransomware Task Force made up of industry, government, non-profit and academic cyber experts, recommended creating cyber response funds to aid local governments trying to recover from cyberattacks and either don’t have insurance, or insurance won’t cover certain costs.
The U.K.’s Royal United Services Institute think tank, meanwhile, recommended more government intervention, such as suggesting that insurers work with the government to write minimum security standards that would be included as part of any ransomware coverage, or that the government provide breach notification data to insurers.
Tom Johansmeyer, head of Property Claim Services at Verisk, said that the cyber insurance industry might need to push through any potential profitability downturn. “I think we’re going to need a certain amount of tolerance for loss,” he said. While cyber insurance is a newer industry, however, there’s a considerable amount to be lost now as opposed to a line of business in its infancy.
Cyber insurance could consider learning from other forms of insurance. Anja Shortland, a professor at King’s College London who has studied kidnap for ransom insurance, said the practice of “disruptive bargaining” drove down payout demands from kidnappers.
“They’ve got very clear control of the ransom negotiations, and they tell their customers, ‘This is how you’re going to run this,’” Shortland said. “‘And you’re not going to panic. Yes, you will get some really horrible threats, and they might say they will take an ear off and they always get that on the fifth phone call. We’ve yet to receive an ear, so don’t cave in.”
=================================================================
What could turn things around is Wave solutions!!! With hardware security (SEDs and TPMs) and Wave software, the cyber insurance market could be turned around. The direction this is going in reveals that Wave could have a hugely positive impact on what is happening in the market!!! MFA is a good start, but Wave VSC 2.0 (MFA) uses the TPM and device authentication for better security!!! Key contacts need to know about Wave's awesome solutions!!!
Choose data protection that actually works!!!
http://www.wavesys.com/wave-alternative
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
The State Department Has Reportedly Been Hacked
https://gizmodo.com/the-state-department-has-reportedly-been-hacked-1847536299
The U.S. State Department was purportedly the victim of a serious cyber attack in recent weeks, according to a Fox News report published on Saturday. The extent of breach and when it was discovered are currently unknown.
Citing an unnamed source, the outlet stated that the Department of Defense’s Cyber Command had issued notifications of a possibly serious breach. Although it’s unclear whether the State Department’s operations have been affected by the attack, Fox reported that the department’s work to evacuate thousands of Americans and Afghans from Kabul, Afghanistan amid the withdrawal of U.S. forces had not been affected.
The identity of the alleged perpetrators is unknown at this time. In a statement to Fox News, the State Department did not confirm or deny the purported attack.
“The Department takes seriously its responsibility to safeguard its information and continuously takes steps to ensure information is protected,” a department spokesperson said. “For security reasons, we are not in a position to discuss the nature or scope of any alleged cybersecurity incidents at this time.”
However, Reuters stated that a knowledgeable source affirmed the department has not experienced significant disruptions and has not had its operations impeded in any way. Reuters’ source did not confirm the incident.
Fox News pointed out that the revelation of a possible cyber attack has occurred in the same month the Senate’s Committee on Homeland Security and Government Affairs released its federal cybersecurity report.
Notably, the report found that the agency could not provide documentation for 60% of the sample employees tested that had access to its classified network. The State Department also left thousands of employee accounts active even after they had departed from the agency for extended periods of time—in some cases as long as 152 days after employees quit, retired, or were fired—on its classified and unclassified networks.
“Former employees or hackers could use those unexpired credentials to gain access to State’s sensitive and classified information, while appearing to be an authorized user,” the report stated.
An analysis of the State Department’s systems found that the agency failed to address vulnerabilities. Ten systems were found to contain 450 critical-risk and 736 high-risk outstanding vulnerabilities.
Overall, the State Department’s cybersecurity practices received a “D” rating, one of the lowest ratings available.
==================================================================
Choose data protection that actually works!!! Choose Wave and earn an 'A' in cybersecurity.
http://www.wavesys.com/wave-alternative
=================================================================
Better security at less than half the cost!!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Cybercrime Could Cost the World $10.5 Trillion Annually by 2025
https://www.entrepreneur.com/article/364015
Don't let your business become a victim to the onslaught of attacks.
=================================================================
Spread the Wave solutions word!! As evidenced by the title of this article the world could really benefit by using Wave!!!
=================================================================
A small, American company (Wave) has the technology to put a huge dent in these figures if many more organizations were using it!!! Unlike other products, Wave's data protection actually works!!! Please get in touch with Wave, and simply see what you, and your organization may not know about Wave's awesome cybersecurity!!! Not using Wave is costing organizations many millions of dollars!!!
==================================================================
http://www.wavesys.com/wave-alternative
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Hackers Strike Another Hospital System
https://www.nextgov.com/cybersecurity/2021/08/hackers-strike-another-hospital-system/184713/
Excerpts:
A network of hospitals and clinics in Ohio and West Virginia was forced to cancel surgeries and divert patients with emergencies to other facilities after it was hit in a ransomware attack this week.
Officials said Memorial had to shut down its information technology systems and cancel urgent surgical cases scheduled for Monday. It also had to divert ambulances to other hospitals.
“Staff at our hospitals … are working with paper charts while systems are restored, and data recovered."
==================================================================
If the world could see what organizations can do with Wave VSC 2.0, Wave SED management, and Wave Cloud, hospitals wouldn't be put in situations like in the above article because they would choose Wave for their cybersecurity!!! The other cybersecurity products are not working (ie.- hospitals, Accenture, T-Mobile, AT & T)!!! Hardware security (activated TPMs and SEDs) and Wave software actually work!!!
==================================================================
Choose data protection that actually works!!!
http://www.wavesys.com/wave-alternative
Better security at less than half the cost!!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
AT&T denies data breach after hacker auctions 70 million user database
https://www.bleepingcomputer.com/news/security/atandt-denies-data-breach-after-hacker-auctions-70-million-user-database/
==================================================================
HOLY COW!!! AND ACCENTURE AND T-MOBILE!!!
==================================================================
Many organizations probably have not read the Wave alternative below, but they could be amazed by what they learn, and if they used Wave solutions these ransomare attacks and data breaches could be a thing of the past!!! Some of the best companies in the world are having these problems with security and their security could be better with Wave!!!
Better security at less than half the cost!!!
Choose data protection that actually works!!!
http://www.wavesys.com/wave-alternative
The IT perimeter is gone
With tablets, smartphones, and cloud applications, your employees can access sensitive data anytime, from anywhere. Indeed, around 70 percent of security breaches and data thefts are inside jobs. Meanwhile, the hackers only get better: advanced persistent threats (APTs) appear as normal traffic, and malware can go unnoticed for weeks.
It’s a new world, one without borders. Yet most organizations are still trying to protect their data with the same old firewalls and antivirus software. It’s not working. We refer you to the headline-making breach of the week.
You have to start with the device
Wave has an alternative: security that’s built into each and every device.
We’re talking about hardware: self-encrypting drives (SEDs), which protect data when a device is stolen or lost, and trusted platform modules (TPMs), or embedded security chips. Both go in at the factory, and increasingly, both are standard. They make it possible for you to monitor and control each individual device and its data, no matter where it is. But you need software to turn on and manage your SEDs and TPMs. Wave makes that software.
We’ve been refining comprehensive, centralized management of hardware-based security longer than anyone else. More than that, we’ve shaped the field as a founding member of the Trusted Computing Group, the not-for-profit that develops and promotes industry standards for the hardware.
Security that’s confirmed, not assumed
With Wave, you’ll know that you’re secure. Because we start with the individual devices, you get a broad, deep view of your network. You can see exactly who’s on it, with what devices and what apps, at any given time. Just for example, if Bob goes home and tries to log onto Facebook with the company laptop, Wave can stop him.
A big piece of this heightened security is device authentication. Traditional two-factor authentication requires what amounts to two user IDs. But by using the TPMs inside your devices, Wave can confirm the identity of not only users, but also the devices they’re on. Combine that with fast, enforced encryption of sensitive data via your SEDs—all easily managed with Wave software—and your data is protected from the full range of modern risks: device theft, missent emails, flash drives, portable hot spots … even (and no one else can say this) hardware keyloggers. Not to mention Bob.
Do we need to say that with Wave, compliance is no problem?
Start closing your security gaps today, with what you’ve got
You might be surprised to hear that 90 percent or more of your computers probably already have TPMs. Mobile devices are catching up fast. SEDs are newer, but you probably have a bunch of those too. Machines that don’t have them can often be outfitted at little to no extra cost. So you’ve got some or all of the hardware. All you need to do is turn it on with Wave.
It’s almost as easy as it sounds. TPMs and SEDs are built to open, vendor-neutral industry standards, and so are Wave solutions. That means Wave works on your existing mix of hardware, across platforms, and will evolve with you. It’s part of what makes the Wave alternative not only more secure, but also simpler and cheaper. Total cost of ownership for Wave data protection can be almost half that of a traditional software-based system.
Questions? Read on, or contact our sales department.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Zero doubt about the direction of zero-trust
https://www.scmagazine.com/perspective/policy/zero-doubt-about-the-direction-of-zero-trust
Excerpt:
Zero trust requires authentication of all users, authorized and continuously monitored before getting access to applications and data.
==================================================================
Does this mean that unknown and unapproved devices are allowed on the network? So hackers (who have stolen passwords to get on the network) are allowed to freely roam the network as long as they are 'continuously monitored!!!'
Wave has a better alternative!!!
http://www.wavesys.com/wave-alternative
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Microsoft takes a stake in Rubrik to combat ransomware
https://www.zdnet.com/article/microsoft-takes-a-stake-in-rubrik-to-combat-ransomware/
==================================================================
Does Rubrik and Microsoft protect against 6TB that could be (and was) potentially stolen by an unauthorized party off a company's network (Accenture as an example) and held for ransom ($50 million)? Wave could have protected against this, and other ransomware attacks!!! Please see bolded excerpt and links below.
If your organization wants awesome cybersecurity solutions, use Wave!!!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
CISA shares guidance on how to prevent ransomware data breaches
https://www.bleepingcomputer.com/news/security/cisa-shares-guidance-on-how-to-prevent-ransomware-data-breaches/
================================================================
Some helpful hints as to what Wave solutions can do... Wave can improve upon defenses against phishing, and improve upon the existing MFA in the marketplace. It's also important to consider Wave instead of firewalls. Here are some excerpts from Wave's website regarding these key elements that were in CISA's guidance:
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Key Features:
Strong Security
• Authenticate securely, encrypt email, and prove integrity of the device with one management console
• Protect against phishing, malware and other network security threats by storing authentication credentials in hardware
• Provide centralized enforcement of custom policies
=================================================================
http://www.wavesys.com/wave-alternative
Security that’s confirmed, not assumed
With Wave, you’ll know that you’re secure. Because we start with the individual devices, you get a broad, deep view of your network. You can see exactly who’s on it, with what devices and what apps, at any given time. Just for example, if Bob goes home and tries to log onto Facebook with the company laptop, Wave can stop him.
A big piece of this heightened security is device authentication. Traditional two-factor authentication requires what amounts to two user IDs. But by using the TPMs inside your devices, Wave can confirm the identity of not only users, but also the devices they’re on. Combine that with fast, enforced encryption of sensitive data via your SEDs—all easily managed with Wave software—and your data is protected from the full range of modern risks: device theft, missent emails, flash drives, portable hot spots … even (and no one else can say this) hardware keyloggers. Not to mention Bob.
Do we need to say that with Wave, compliance is no problem?
=================================================================
http://www.wavesys.com/wave-alternative
It’s a new world, one without borders. Yet most organizations are still trying to protect their data with the same old firewalls and antivirus software. It’s not working. We refer you to the headline-making breach of the week.
=================================================================
Whether its protecting against phishing, Wave having better MFA or being aware that there are better solutions than firewalls (like Wave), Wave solutions could prevent ransomware and data breaches!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
TPM Security Easy To Defeat
https://www.i-programmer.info/news/149-security/14794-tpm-security-easy-to-defeat.html
==================================================================
TPMs are not easy to defeat!!! Why didn't they test the SED with a TPM instead of Bitlocker?? "Evil Maid" attacks years ago were proven to be prevented by the SED!!! Hardware security (TPMs and SEDs) have been proven to be stronger than the alternative in software alone. Not using TPMs and SEDs makes the user a lot less secure and hardware security with Wave software, organizations could have much better data protection!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Homeland Security Considering CMMC-like Compliance Effort
https://www.nextgov.com/cybersecurity/2021/08/homeland-security-considering-cmmc-compliance-effort/184561/
The agency is inviting interested parties to weigh in on plans to ensure contractors follow best cyber hygiene practices.
The Department of Homeland Security will conduct a “pathfinder assessment” to determine a path forward regarding a new cybersecurity compliance program that shares similarities to the Defense Department’s Cybersecurity Maturity Model Certification, or CMMC.
In a special notice published Aug. 10, the agency seeks input on its nascent effort to improve industry compliance with existing and future cyber-hygiene requirements. The notice is authored by DHS Chief Information Officer Eric Hysen and acting Chief Procurement Officer Paul Courtney, and follows several high-profile cyber events, including the SolarWinds hack and Colonial Pipeline attack.
“In light of recent events, DHS seeks to advance our process in assessing industry compliance with cyber hygiene clause requirements,” the notice states. “DHS has been closely monitoring the Department of Defense’s implementation of the Cybersecurity Maturity Model Certification (CMMC) program to identify lessons learned and best practices for consideration by DHS as we advance our process. Our end goal is to have a means of ensuring a contractor has key cybersecurity and cyber hygiene practices in place as a condition for contract award.”
The notice called industry compliance with cyber requirements a “critical step in our progress towards protecting the Homeland.” Through the pathfinder assessment, DHS will solicit feedback through Sept. 30.
The Defense Department’s CMMC program mandates third-party reviews for its contractors and is designed to end the practice of simply taking companies at their word on the cybersecurity controls they implement. The Pentagon intends to reduce the loss of what it assesses to be hundreds of billions of dollars in intellectual property to cyber adversaries each year. The program is rolling out now, and all defense contractors are required to be compliant by 2026.
=================================================================
Wave probably is pursuing a lot of amazing opportunities to be helping MANY organizations in the World. With what Wave has in data protection, the U.S. government and its defense contractors, particularly, could be benefiting from Wave's solutions (that use hardware) in a BIG WAY!!! This outstanding cybersecurity can be done in compliance and done so in a much needed fast turnaround time frame (compliance by 2026 is too long)!!!
Wave is the perfect American company to accomplish the Pentagon's intention (see bolds above)!!!
http://www.wavesys.com/wave-alternative
Choose data protection that actually works!!!
=================================================================
Better security at less than half the cost!!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Most employees reusing personal passwords to protect corporate data
https://www.helpnetsecurity.com/2021/08/16/employees-reusing-personal-passwords/
Nearly two thirds of employees are using personal passwords to protect corporate data, and vice versa, with even more business leaders concerned about this very issue. Surprisingly, 97% of employees know what constitutes a strong password, yet 53% admit to not always using one.
This is according to a research by My1Login, which surveyed 1,000 employees and 1,000 business leaders to compare employees’ realities, opinions, and outlook to security at work, alongside expectations and opinions of business leaders across a variety of industries.
The research also found that 85% of employees are reusing passwords across business applications after receiving training, in contrast to 91% of employees who haven’t received any cybersecurity training.
Training is only making a negligible difference to how employees are protecting corporate data, highlighting that corporate security is at a high risk of being compromised even for organizations investing in training.
Employees in the healthcare sector particularly prone to reusing passwords
In terms of industry-specific findings, the research found that employees in the healthcare sector are particularly prone to reusing passwords, with 94% of employees declaring they have done so. Employees in the education and public sector reused passwords to a similar degree, with 91% of respondents admitting having done so in healthcare and 83% in the public sector.
All three verticals were also found to have the highest use of personal passwords for business applications, with 75% in education and 61% in healthcare and public sector, considerably higher than employees in technology (45%).
Mike Newman, CEO of My1Login, commented: “Poor password habits make cyber criminals’ lives far easier, offering a gateway into organizations and enabling them to conduct damaging, far-reaching cyber-attacks. From creating weak passwords to reusing them across applications, employees consistently struggle to maintain good password ‘hygiene’.
“Our finding that cybersecurity training is not having the desired effect – despite significant investment from leaders into helping employees improve their security behaviour – is very concerning. Employees are finding the process of juggling a variety of passwords frustrating, and this negativity is translating into negligent password practices due to a lack of motivation.
“Instead of relying on training to change employees’ behaviour around the protection of corporate data, business leaders need to take the responsibility out of the hands of employees as much as possible. An authentication management solution which offers a passwordless single sign-on experience does just that, alleviating the burden placed on employees and elevating productivity and wellbeing, in addition to placing leaders back in control of their organization’s security,” Mike concluded.
=================================================================
After reading this article, it's obvious that there should be a BIG need for Wave VSC 2.0!!! Spread the Wave VSC 2.0 word, and a lot of employees and their organizations could have better multi-factor authentication and a simpler and more secure experience.
================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpts:
Token-free, password-free user authentication
We know you’ve dreamt about shredding your list of passwords. Go on and do it.
Because you are starting the authentication process in the device’s hardware, the user doesn’t have to interact with it. All users see is their usual Windows log-in screen – no more additional passwords to access the VPN or other resources. They just sign in once, and the secure credentials in their TPMs securely and quickly connect them to everything they need. Say goodbye to user frustration and slow OS performance.
=================================================================
Better security at less than half the cost!!!
Choose data protection that actually works!!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
US Agencies Ordered to Pinpoint Critical Software
https://thecybersecurity.news/general-cyber-security-news/us-agencies-ordered-to-pinpoint-critical-software-11993/?nowprocket=1
==================================================================
Shouldn't there be a follow up article: "U.S. agencies ordered to use Critical Hardware Security (ie. SEDs and TPMs)!" It sure would solve a LOT of cybersecurity deficiencies!!!
==================================================================
Choose data protection that actually works!
http://www.wavesys.com/wave-alternative
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Hacker claims to steal data of 100 million T-mobile customers
https://www.bleepingcomputer.com/news/security/hacker-claims-to-steal-data-of-100-million-t-mobile-customers/
==================================================================
Here is another data breach that could have been prevented by Wave solutions!!! If only hardware security (SEDs and TPMs) and Wave software were being used, these hacks wouldn't be happening!!!
Rethink cybersecurity and use Wave's awesome solutions!!!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpts:
Confirm the identity of user and device!
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Ransomware Group Demanding $50M In Accenture Security Breach: Cyber Firm
https://www.crn.com/news/security/ransomware-group-demanding-50m-in-accenture-security-breach-cyber-firm
Excerpts:
Ultimately, Grosfield said it’s “no surprise” to see ransomware groups going after IT service providers such as Accenture.
“The only surprise is that it took the bad guys this long to figure out that service providers are a pretty juicy target,” he said.
The Accenture incident is a reminder of the axiom “physician, heal thyself”—that IT service providers need to ensure that their own systems are secure in order to remain credible in recommending security measures for their own customers, Grosfield said.
“If you’re not well protected, then you’re not well positioned to be able to protect others,” he said.
The threat actor is demanding the $50 million in exchange for more than 6 TB of data, according to a tweet from Cyble, a dark web and cybercrime monitoring firm.
=================================================================
With Accenture's "Let there be change!" and new strategy "to deliver on the promise of technology and human ingenuity," Wave and its solutions could save Accenture from another cyber attack as well as save its many customers from cyber attacks!!!
Choose data protection that actually works!
http://www.wavesys.com/wave-alternative
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Are Password Managers Safe?
https://www.usnews.com/360-reviews/password-managers/are-password-managers-safe
Excerpts:
What Happens if You Forget Your Master Password?
If you have lost or forgotten your master password, you may need to delete your account and start over from scratch, as most companies do not allow you to reset it easily. But, depending on the company, there are a few steps that you can take to try to save your data or regain access.
•Use recovery codes: some services will give you a list of recovery codes, usually when you sign up. These should be written down or saved somewhere secure. If you have these on hand, you can use them to regain access.
•If your service uses biometric security (fingerprints or face scans), you may be able to use these to reset your master password, usually on a smartphone.
•If you set up an emergency contact (not all managers allow this), they may be able to reset your master password.
•Check if your password manager is still logged in on another device. If so, you may be able to back up your passwords before deleting or resetting your account.
•If these options don’t work or aren’t available, you’ll most likely have to fully reset your account, which means you will lose all your saved passwords.
=================================================================
When you read the options in these excerpts after forgetting your master password, and the options don't work you could lose all of your saved passwords. With Wave VSC 2.0, the PIN recovery process is simpler, more secure, and your secure credentials are safe!!!
Why take a chance with a password manager when you could have better security with Wave VSC 2.0?!
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Phishing campaign leverages legit DocuSign email notifications
https://www.scmagazine.com/analysis/cloud/phishing-campaign-leverages-legit-docusign-email-notifications
==================================================================
Does your organization want to trust phishing training, and what your employees do with that training or use Wave VSC 2.0 to protect against phishing? Make the smart choice and use Wave!!! It only takes one employee's phished credentials to compromise a network which could lead to ransomware attack and/or service that the employee relies on!!!
Better security at less than half the cost!!!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpts:
Token-free, password-free user authentication
We know you’ve dreamt about shredding your list of passwords. Go on and do it.
Because you are starting the authentication process in the device’s hardware, the user doesn’t have to interact with it. All users see is their usual Windows log-in screen – no more additional passwords to access the VPN or other resources. They just sign in once, and the secure credentials in their TPMs securely and quickly connect them to everything they need. Say goodbye to user frustration and slow OS performance.
Key Features:
Strong Security
• Authenticate securely, encrypt email, and prove integrity of the device with one management console
• Protect against phishing, malware and other network security threats by storing authentication credentials in hardware
• Provide centralized enforcement of custom policies
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Defense Industry Waits on Costly Trump-Era Cyber Rule Update (1)
https://news.bloomberglaw.com/tech-and-telecom-law/defense-industry-awaits-update-on-costly-trump-era-cyber-rule
Excerpts:
In September 2020, the Pentagon outlined an ambitious plan to implement the certification by Oct. 1, 2025. On that day, according to the DOD’s interim rule on supply chain security, every new contract solicitation will require CMMC certification.
But with roughly 220,000 companies in the defense supply chain—roughly three-quarters of them small businesses—the goal of auditing every single supplier by then amounts to a Herculean undertaking.
The DOD will need roughly 8,000 third-party auditors working around the clock to certify enough companies to meet the 2025 deadline...
All told, the Pentagon estimates put the total cost of CMMC implementation at roughly $6.5 billion annually, or about $93 billion over the life of the program. The program could cost small businesses alone $23.3 billion over its first 10 years.
The department’s forecasts are unrealistically low, according to Evans.
“We’re seeing costs that do not align with that estimate,” he told Bloomberg Government. “We’re seeing costs much, much higher.”
================================================================
A great option for defense contractors could be to:
Choose data protection that actually works, and choose better security at less than half the cost!!! Getting these defense contractors be in compliance is no problem at less than half the cost could happen so much faster than by 2025!!! With Wave/ESW employees, the U.S. government could envision better security for defense contractors at less than half the cost and being set up faster than by 2025!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
U.S. Infrastructure Bill Allocates $2 Billion to Cybersecurity
https://www.securityweek.com/us-infrastructure-bill-allocates-2-billion-cybersecurity
Excerpt:
U.S. senators recently unveiled the finalized version of a $1.2 trillion bipartisan infrastructure bill, which the White House says will allocate roughly $2 billion to improving the country’s cybersecurity capabilities.
=================================================================
A small, American company (Wave) that uses two built-in hardware security standards (TPMs and SEDs) in its cybersecurity could provide a great cyber defense for the government and other organizations. Wave's technology has been ahead of its time, and now with TPMs and SEDs being ubiquitous, this should lead to a seismic paradigm shift in the World's cyber defenses with the help of ESW/Wave and its stellar employees!!!
==================================================================
http://www.wavesys.com/wave-alternative
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Organizations have seen an increase in device encryption
https://www.helpnetsecurity.com/2021/05/31/device-encryption-increase/
Excerpts:
32% of organizations have seen an increase in device encryption in the past year, according to a Vanson Bourne survey.
Additionally, 31 percent noted that their organization now requires all data to be encrypted as standard, whether it’s at rest or in transit, and 24 percent require the encryption of all data when it’s being stored on their systems or in the cloud.
Further to this, 27 percent of surveyed IT decision makers stated their organization has increased the implementation of encryption in other ways – up from zero in the 2020 survey. This rise is likely due to organizations having had to operate in new working environments with increased remote working and the need to implement new systems and controls as a consequence.
“Encryption is increasingly recognised as a key component for data security and cyber resilience, especially at the highest levels. Examples include the use of encryption being one of very few technologies recommended within GDPR and Joe Biden’s recent Executive Order, stipulating the need to adopt encryption for data at rest and in transit. If ever there were a time to increase and execute the use of encryption, this is it!”
Lack of encryption and misplaced devices causing data breaches
Regardless of the increase in the use of encryption, when asked to select up to three main causes of a data breach within their organization, 30 percent of those surveyed report lack of encryption (12%) and lost/misplaced devices containing sensitive corporate information (18%) as main causes. This could be due to the absence of control over corporate data.
When reporting up to three of the biggest challenges associated with implementing a cyber security plan for remote/mobile working, 39 percent of those surveyed admitted they cannot be certain that their data is adequately secured, 18 percent said they don’t have a good understanding of which of their data sets need to be encrypted and 15 percent have no control over where company data goes and where it is stored.
The increase in encryption usage looks set to continue
When questioned on which devices their organization currently encrypts, and which they plan to expand encryption, surveyed IT decision makers noted that their organization already encrypts some devices, and plan to expand their encryption usage on USB sticks (19%), laptops (16%), desktops (12%), mobiles (22%) and portable hard drives (18%).
=================================================================
http://www.wavesys.com/products/wave-self-encrypting-drive-management
http://www.wavesys.com/products/wave-cloud
The fast, risk-free way to deploy SEDs (Self Encrypting Drives).
Excerpts:
No infrastructure, no software …
no more excuses
You know you should be encrypting data on every device in your organization, especially your laptops. Self-encrypting drives (SEDs) are the fastest, easiest and most secure way to do that. But setting up to support and manage SEDs can seem daunting. Even to test them, you need server infrastructure and management software. Right?
Not with Wave Cloud. The world’s first cloud-based service for managing SEDs, Microsoft Bitlocker and OS X FileVault 2, Wave Cloud lets users take advantage of the benefits of SEDs without jumping through the hoops traditionally associated with SED management. Whether you’re doing a small proof-of-concept or full-blown production deployment, Wave Cloud is the fastest way to get there.
Contact Wave Sales and you’re on your way - no servers or software or big capital expenditures.
Manage the entire range of endpoint encryption technologies
Wave Cloud is the world’s only cloud service that manages SEDs and software encryption in a single console. Its hybrid management approach is the best way to secure your legacy endpoints today with OS-native full disk encryption, while phasing in self-encrypting drives on your latest-generation assets.
Key Features:
Flexibility
• Compatible with Windows 8.1, 8, 7 and Vista operating systems; and OS X 10.8 and 10.9 (for OS X FileVault 2)
• Manage mixed environments from one console
Easy security compliance
• Active monitoring, logging, and reporting of all user and device events associated with SEDs
• No infrastructure to buy or set up - fast, easy compliance
Data protection
• The only cloud-based management solution that gives you drive initialization, user management, drive locking, and user recovery for all Opal-based, proprietary, and solid-state SEDs
• Secure user recovery using challenge/response
• User-based SSO after recovery
• Control for external SEDs
• S3 sleep support
Simplicity
• Fast deployment of SEDs and OS-native software encryption—no need to buy, build, and test (or maintain) server infrastructure
• Easy-to-use web interface
• Deploy many drives at once with policy-based management
• Windows password synchronization and single sign-on (SSO)
• Features and maintenance patches are continually updated, so you’re always running the best, most secure version of the service
• One-click initialization/provisioning
• Your subscription covers everything—no up-front charges, no support charges
No compromises
• Wave Cloud is every bit as secure as our on-premise SED management product
• All the same monitoring, logging, and reporting you need for compliance
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Want a strong password? You're probably still doing it the wrong way
https://www.zdnet.com/article/want-a-strong-password-youre-probably-still-doing-it-the-wrong-way/
================================================================
Token-free, password-free user authentication
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpts:
We know you’ve dreamt about shredding your list of passwords. Go on and do it.
Because you are starting the authentication process in the device’s hardware, the user doesn’t have to interact with it. All users see is their usual Windows log-in screen – no more additional passwords to access the VPN or other resources. They just sign in once, and the secure credentials in their TPMs securely and quickly connect them to everything they need. Say goodbye to user frustration and slow OS performance.
=================================================================
Do it the right way with Wave!!! Using hardware security with Wave, you and your organization would be so much better off!!!
Better security at less than half the cost!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE