Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
CISA forms public-private partnership to fight ransomware, work on cyber defense strategy
https://www.scmagazine.com/news/policy/cisa-forms-public-private-partnership-to-fight-ransomware-work-on-cyber-defense-strategy
=================================================================
It seems that when it comes to a cyber defense strategy, the U.S. government would want the input of Wave Systems!!! Big things come in small packages!!!
=================================================================
http://www.wavesys.com/wave-alternative
Choose data protection that actually works.
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Gigabyte reportedly hit with ransomware attack
https://mashable.com/article/gigabyte-ransomware-attack
Excerpts:
The group RansomExx is claiming responsibility for the attack, Recorded Future reports. They allegedly stole 112GB of company data during the intrusion, and are threatening to dump the files unless Gigabyte pays up.
RansomExx has already created a private page on the dark web that contains alleged samples of the stolen files. “We have downloaded 112 GB (120,971,743,713 bytes) of your files and we are ready to PUBLISH it. Many of them are under NDA (Intel, AMD, American Megatrends),” the extortion page says, according to Recorded Future.
==================================================================
Does the dumping of companies' data from ransomware attacks have to keep happening? By using Wave solutions, the answer is no!!! With Wave solutions, the unauthorized devices don't have access to the organization's network so they don't have access to the data!!! This attack wouldn't have happened if Gigabyte was using Wave solutions!!!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Trend Micro: 80% of global orgs anticipate customer data breach in the next year
https://venturebeat.com/2021/08/06/trend-micro-80-percent-global-orgs-anticipate-customer-data-breach-in-next-year/
Excerpt:
A staggering 86% of global organizations believe they will suffer serious cyber attacks in the next year and 80% reported they are likely to experience a data breach, according to a new report by Trend Micro and the Ponemon Institute. The greatest risk was found in North America.
==================================================================
Is your organization looking for a cybersecurity company that has defenses that can stop intruders/attackers? Look no further than Wave Systems where your organization can anticipate success, not a breach or serious cyber attack!!!
==================================================================
Better security at less than half the cost!!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Black Hat: Microsoft’s Patch for Windows Hello Bypass Bug is Faulty, Researchers Say
https://threatpost.com/microsofts-patch-windows-hello-faulty/168392/
==================================================================
Why take a chance with this on-going problem with Windows Hello?! Use proven multi-factor authentication (MFA), use Wave VSC 2.0!!!
==================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Asus releases Windows 11-ready BIOS updates with automatic TPM support
https://www.theverge.com/2021/8/5/22610869/asus-windows-11-bios-updates-download-tpm-support
Excerpts:
Asus is getting ready for Windows 11’s launch
Both Intel and AMD chipsets are supported, and these new BIOS updates will even automatically enable TPM (Trusted Platform Module) on AMD and Intel systems.
Microsoft’s Windows 11 upgrade checker didn’t ease that confusion initially, so it’s encouraging to see big manufacturers like Asus now enabling TPM by default so people don’t have to dig around.
==================================================================
If your organization has Windows 11 Asus computers with the TPM enabled by default, it makes a lot of sense to enable the other TPMs in your Windows 7, 8, and/or 10 computers with Wave solutions for better security!!! Wave solutions can enable as well as manage the TPMs!!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
A clever phishing campaign is targeting Office 365 users
https://www.helpnetsecurity.com/2021/08/04/phishing-office-365-users/
Excerpt:
Microsoft is warning about an ongoing, “sneakier than usual” phishing campaign aimed at Office 365 users.
==================================================================
Survey: Nearly 3 in 4 Organizations Suffered Data Breaches Due to Phishing
https://www.nextgov.com/cybersecurity/2021/08/survey-nearly-3-4-organizations-suffered-data-breaches-due-phishing/184246/
Excerpt:
A survey released Tuesday indicates 73% of organizations have suffered data breaches caused by phishing attacks in the past calendar year.
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpts:
Key Features:
Strong Security
• Authenticate securely, encrypt email, and prove integrity of the device with one management console
• Protect against phishing, malware and other network security threats by storing authentication credentials in hardware
• Provide centralized enforcement of custom policies
==================================================================
It's amazing what Wave solutions can accomplish on the defensive cybersecurity front!!! Better security at less than half the cost!!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
SAP applications more vulnerable than users might think
https://www.helpnetsecurity.com/2021/08/03/sap-applications-vulnerable/
Excerpt:
The report advises on addressing the gap in understanding with education, the adoption of a ‘secure by design’ approach and breaking down the silos that exist between the SAP estate and wider IT risk management.
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
==================================================================
SAP and its customers could be a sizable market for Wave to protect with its awesome solutions. Wave could protect a LOT of SAP customers!!! Wave solutions use hardware security or secure by design!!!
Better security at less than half the cost!!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Not a single federal agency received an ‘A’ in a new Senate cybersecurity report card
https://www.popsci.com/technology/cybersecurity-evaluation-reveals-federal-government-flaws/
Excerpts:
The report found that none of the eight agencies met basic cybersecurity standards and protocols that could secure Americans' personal data.
The average grade for all the large federal agencies was a C-minus.
In general, agencies “consistently failed to implement certain key cybersecurity requirements including encryption of sensitive data, limiting each user’s access to the information and systems needed to perform their job, and multi-factor authentication, or to certify to Congress that the system is nonetheless secure,” the statement outlines.
==================================================================
Wave is a unique company that could solve the governments' pressing cybersecurity problems with its awesome solutions at less than half the cost!!! Wave solutions could turn these agencies' grades to As in short order!!! Please read about Wave's encryption and multi-factor authentication solutions in the links below.
==================================================================
http://www.wavesys.com/products/wave-self-encrypting-drive-management
http://www.wavesys.com/products/wave-virtual-smart-card
=================================================================
The fast, risk-free way to deploy SEDs.
http://www.wavesys.com/products/wave-cloud
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Federal cybersecurity defenses not strong enough to protect American data, Senate report warns
https://www.cbsnews.com/news/federal-cybersecurity-defenses-american-data-at-risk-senate-report/
Excerpts:
Tuesday's evaluation also found that EINSTEIN, DHS's flagship cybersecurity program for federal agencies, suffers from "significant limitations in detecting and preventing intrusions."
Congressional investigators recommended an "update" to Einstein that justifies its cost. Authorization of the program with a price tag in the billions is set to expire in 2022.
=================================================================
The title of this article would be missing the words 'not' and 'warns' if the federal government was using Wave solutions!!!
=================================================================
Choose data protection that actually works!
http://www.wavesys.com/wave-alternative
=================================================================
Wave has cybersecurity solutions that work effectively. EINSTEIN continues to be ineffective. Why not go with Wave solutions at a fraction of the cost and better security??! Wave has an alternative that is simpler, more secure and cheaper!!! Hardware security (activated TPMs and SEDs), and Wave solutions could totally change the government's cybersecurity posture for the better!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
51 percent of cybersecurity professionals experience burnout
https://betanews.com/2021/08/02/cybersecurity-professionals-experience-burnout/
=================================================================
What if you had systems that worked effectively - Wave Systems that is! Then there wouldn't be all of this burnout talked about in this article!!! The organizations' cyber defenses (Wave solutions) function more efficiently and effectively than other products!!! Please see the excerpts below for two key descriptions of what Wave can do to dramatically reduce burnout!!!
==================================================================
http://www.wavesys.com/wave-alternative
Excerpts:
Security that’s confirmed, not assumed
With Wave, you’ll know that you’re secure. Because we start with the individual devices, you get a broad, deep view of your network. You can see exactly who’s on it, with what devices and what apps, at any given time. Just for example, if Bob goes home and tries to log onto Facebook with the company laptop, Wave can stop him.
A big piece of this heightened security is device authentication. Traditional two-factor authentication requires what amounts to two user IDs. But by using the TPMs inside your devices, Wave can confirm the identity of not only users, but also the devices they’re on. Combine that with fast, enforced encryption of sensitive data via your SEDs—all easily managed with Wave software—and your data is protected from the full range of modern risks: device theft, missent emails, flash drives, portable hot spots … even (and no one else can say this) hardware keyloggers. Not to mention Bob.
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
XLoader malware steals logins from macOS and Windows systems
https://www.bleepingcomputer.com/news/security/xloader-malware-steals-logins-from-macos-and-windows-systems/
Excerpts:
XLoader is currently being offered on an underground forum as a botnet loader service that can “recover” passwords from web browsers and some email clients (Chrome, Firefox, Opera, Edge, IE, Outlook,Thunderbird, Foxmail).
The advertiser explained that Formbook’s developer contributed a lot to creating XLoader, and the two malware had similar functionality (steal login credentials, capture screenshots, log keystrokes, and execute malicious files).
Check Point researchers say that XLoader is stealthy enough to make it difficult for a regular, non-technical user to spot it.
==================================================================
It's malware like this that should make Wave Endpoint Monitor, and Wave VSC 2.0 must haves for organizations!!! More reasons in the links below for organizations to be using these Wave solutions!!!
==================================================================
http://www.wavesys.com/products/wave-endpoint-monitor
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Token-free, password-free user authentication
We know you’ve dreamt about shredding your list of passwords. Go on and do it.
Because you are starting the authentication process in the device’s hardware, the user doesn’t have to interact with it. All users see is their usual Windows log-in screen – no more additional passwords to access the VPN or other resources. They just sign in once, and the secure credentials in their TPMs securely and quickly connect them to everything they need. Say goodbye to user frustration and slow OS performance.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Dark web ads offering corporate network access increase seven-fold
https://www.helpnetsecurity.com/2021/07/29/dark-web-ads-offering-corporate-network-access/
==================================================================
Be smart. Protect your network. Protect your network, and devices with activated hardware security and Wave solutions!!!
==================================================================
http://www.wavesys.com/wave-alternative
Choose data protection that actually works.
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
TMF Board Still Accepting Governmentwide Cyber Proposals
https://www.nextgov.com/it-modernization/2021/07/tmf-board-still-accepting-governmentwide-cyber-proposals/184194/
Agencies have submitted more projects since a huge infusion of cash and a relaxing of the payback model.
Federal projects to improve cybersecurity at multiple agencies in a single go have a good chance at getting money from the Technology Modernization Fund with little to no payback requirement, program leaders said this week.
The TMF, established in 2017 as part of the Modernizing Government Technology Act, was initially established as a multimillion-dollar fund to support IT upgrades with short-term loans. However, the nature of the TMF changed significantly earlier this year after the American Rescue Plan stimulus package added $1 billion to the fund.
After the cash infusion, the TMF Board asked agencies to submit proposals by early June. They received 108 proposals from 43 agencies, Federal CIO Clare Martorana told Congress during a hearing this week. If all were approved, the TMF would need $2.1 billion to cover all of the asks, according to OMB.
Not all of those proposals will be approved, Deputy Federal CIO Roat said during a panel this week hosted by Palo Alto Networks. She encouraged agencies to continue submitting proposals.
“There’s four areas we’re really focused on for the TMF: modernizing high-priority systems, cybersecurity, public-facing digital services and cross-government collaboration and those scalable services,” Roat said, though, in the short-term, OMB’s focus is on cybersecurity and specifically those projects that can have a broader effect beyond a single agency.
The $1 billion addition also came with a loosening of the payback model, which previously required programs to fully reimburse the fund within three to five years. Due to the urgency of cybersecurity issues and the continued pandemic response, Congress and OMB opted to relax the payback model for critical needs.
“The proposals we’re seeing, as they’re coming in, are really taking on those cybersecurity priorities,” Roat said. “Agencies are looking for that influx of funding so that they can step out and address those cybersecurity [issues]: access management, identity credentialing, logging. This is really key to continuing delivering modern services and meeting their missions.”
And the $1 billion and relaxed payback requirements are encouraging those sorts of proposals, according to Beth Killoran, deputy CIO at the General Services Administration.
“That allows some flexibility based on the criticalities of the need and what the agencies are able to achieve,” Killoran said. “In some places—especially in the area of cybersecurity—the need is very large across the federal government.”
Unlike with past TMF awards, the new cyber-focused proposals in particular are rarely about cost savings, Killoran noted.
“This is new investment that needs to happen in order for us to meet the objectives [of the executive order on securing government systems] and protect the data and the systems that serve the American people,” she said. “By not having a full payback capability and allowing a minimal payback, that allows us to have projects that are aimed at tackling some of the more urgent IT needs where we know that there might not be as much of a payback.”
But the larger pot of money has also led to a larger and more diverse pool of applicants to the fund, including broader projects that could apply to multiple agencies and provide cost savings that merit a full payback agreement, Killoran said.
Roat cited an award to the Labor Department back in 2018. (Labor also received a second TMF loan one day after the stimulus package was signed into law.)
“While Department of Labor led that, that touched … other agencies,” she said, citing the Agriculture Department, U.S. Citizenship and Immigration Services and the State Department.
Roat said there are two cybersecurity programs underway in government that she is pushing to apply for TMF funding.
“Not a huge amount of dollars, minimal payback—minimal-to-zero—yet impact the entire federal government,” she said.
That broad applicability—a goal of TMF since its inception—will continue to be the intent for the future, as well, Roat said, especially if the TMF gets another significant influx of money.
“We really want to continue to drive toward those enterprise-scale programs and those that are really transformative for the federal enterprise,” she said. “We’re already seeing that enterprise mentality across the federal government. … Leveraging the TMF dollars and continuing to drive those enterprisewide programs” will be the goal going forward.
==================================================================
I wonder if Wave has already submitted a proposal to the government to use it's solutions. This article could be another path that Wave could take to have the government use Wave's transformative/awesome solutions!!!
==================================================================
Better security at less than half the cost!!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Ransomware: These are the two most common ways hackers get inside your network
https://www.zdnet.com/article/ransomware-these-are-the-two-most-common-ways-hackers-get-inside-your-network/
Excerpt:
Email phishing attacks and brute force attacks against exposed remote desktop protocol (RDP) services are the most common methods cyber criminals are using to gain an initial foothold in corporate networks to lay the foundations for ransomware attacks.
==================================================================
This article reveals two reasons (that represent more than 80% of the attacks) to use Wave VSC 2.0 to protect against ransomware!!! Certainly makes sense to use a great defense like Wave VSC 2.0!!! Wave contact information is given below!!!
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Better security at less than half the cost!!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Biden: If U.S. has 'real shooting war' it could be result of cyber attacks
https://finance.yahoo.com/news/biden-warns-cyber-attacks-could-213033884.html
Excerpt:
WASHINGTON (Reuters) -President Joe Biden on Tuesday warned that if the United States ended up in a "real shooting war" with a "major power" it could be the result of a significant cyber attack on the country, highlighting what Washington sees as growing threats posed by Russia and China.
==================================================================
Better security at less than half the cost!!!
==================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/products/wave-self-encrypting-drive-management
http://www.wavesys.com/wave-alternative
Choose data protection that actually works.
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
'Login infrastructure issue' blamed as sustained Xero outage threatens payrolls
https://www.theregister.com/2021/07/27/xero_outage_accountancy_saas/
Excerpts:
Accoutancy software goes TITSUP* as biz users can't invoice customers nor see who's paid their bills
The cloud-based software slinger, which boasts around 640,000 customers in the UK including accountants, bookkeepers and SMEs, has posted a succession of messages on its status page this morning apologising for the downtime and informing customers it is busy trying to fix the problem.
But Xero told them: "Fixing this issue is our top priority right now, as we can appreciate the impact this is having for our users. Please note that passwords and logins are not incorrect. There is no need to attempt to reset your password."
=================================================================
With data sensitivity like this, Wave solutions would be a lot better security than passwords and logins!!! A sizable market for Wave to help with their awesome solutions!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
What Is a TPM in Security? Trusted Platform Modules Explained
https://www.thesslstore.com/blog/what-is-tpm-security-trusted-platform-modules-explained/
==================================================================
Methinks had a great post on TPMs. This one is pretty comprehensive, but an excellent read! After reading this article, it should become apparent to organizations why they should activate and manage their TPMs with a company like Wave!!!
Better security at less than half the cost!!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Phish Swims Past Email Security With Milanote Pages
https://threatpost.com/phish-email-security-milanote/168021/
Excerpt:
The Milanote app, billed as the “Evernote for creatives” by reviewers, has attracted the notice of cybercriminals who are abusing it to carry out credential-stealing campaigns that skate past secure email gateways (SEGs), researchers said.
==================================================================
This article represents another reason to be using Wave VSC 2.0!!!
==================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpts:
Key Features:
Strong Security
• Authenticate securely, encrypt email, and prove integrity of the device with one management console
• Protect against phishing, malware and other network security threats by storing authentication credentials in hardware
• Provide centralized enforcement of custom policies
=================================================================
Better security at less than half the cost!!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
A plan to label companies vulnerable to hacking is set to spark debate on Capitol Hill
https://www.cyberscoop.com/sici-cyber-ransomware-congress-critical-infrastructure/
=================================================================
The U.S. government should award Wave a contract to enable and manage their TPMs and SEDs as well as use Wave solutions!!! It would strongly encourage enablement of these two standards throughout the private sector. SICI (in the article) and Congress by itself sounds like it could take awhile. And with what's been happening in the marketplace (China, Russia etc.), these two enabled standards are needed now more than ever!!!
Better security at less than half the cost!!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
How Taiwan is trying to defend against a cyber 'World War III'
https://www.cnn.com/2021/07/23/tech/taiwan-china-cybersecurity-intl-hnk/index.html
================================================================
Taiwan could highly benefit from having its built-in TPMs and SEDs activated and managed by Wave!!! Taiwan could avoid World War III by using Wave and activated TPMs and SEDs (hardware security)!!!
================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/wave-alternative
Choose data protection that actually works.
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Twitter reveals surprisingly low two-factor auth (2FA) adoption rate
https://www.bleepingcomputer.com/news/security/twitter-reveals-surprisingly-low-two-factor-auth-2fa-adoption-rate/
Excerpt:
Twitter has revealed in its latest transparency report that only 2.3% of all active accounts have enabled at least one method of two-factor authentication (2FA) between July and December 2020.
=================================================================
With the Twitter 2FA adoption rate and many other sites' 2FA adoption rates being low, and the TPM being required for Windows 11, it makes a lot of sense to reintroduce Wave Knowd (the Wave technological masterpiece!!!) to the market!!! This is a great opportunity for Wave, and the authentication market that needs Wave Knowd!!!
=================================================================
Wave Knowd Introduces New Model for Internet Authentication Without Passwords
Knowd ‘Trust Score’ Assures User Identity when Accessing Web Services
http://www.wavesys.com/buzz/pr/wave-knowd-introduces-new-model-internet-authentication-without-passwords
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Long-awaited bill would force breach victims to contact CISA
https://www.scmagazine.com/analysis/breach/long-awaited-bill-would-force-breach-victims-to-contact-cisa
==================================================================
Shouldn't there be a requirement for these companies to have their hardware security: TPMs (Trusted Platform Modules) and SEDs (Self Encrypting Drives) enabled IF there is going to be limited legal protections?!!
These are two hardware security standards that have the support of 100+ companies (TCG), and they should be required to be enabled in organizations. It could save a lot of these potential breaches from being reported: because there wouldn't have been these breaches!!!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Secure device & user authentication
Sometimes it feels like security is more effective at deterring your users than hackers. But you still have to protect your enterprise resources, and we’re here to help. We take pride in securing your network, data, and resources to an unprecedented level, without causing a revolt from either IT or your users. In fact, your users probably won’t even know we’re there.
Here’s how it works:
Trusted Platform Module (TPM) + Wave’s ERAS for TPM Management = hardware-secured, fully-managed authentication
Most of your devices already come with TPMs (check out our “What is a TPM?” brochure if you’re not sure why this is exciting). This security chip comes attached to the motherboard of most enterprise-class PCs. There’s nothing “add-on” about it. The TPM provides a verifiable, unique identity for each machine.
Wave’s ERAS for TPM Management gives IT remote, centralized management of all TPMs on enterprise computers and tablets.
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
The State of Data Security in the Federal Government
https://www.nextgov.com/ideas/2021/07/state-data-security-federal-government/183869/
Excerpt:
Nearly half of U.S. federal government respondents in the 2021 Thales Data Threat Report noted they have experienced a security breach at some point, and of these, 47% said they had experienced a breach in the last 12 months.
==================================================================
http://www.wavesys.com/wave-alternative
Wave offers data protection that is simpler, more secure and cheaper!!!
Make the smart choice, use Wave solutions!!!
Better security at less than half the cost!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
China Threatens U.S., Allies Following Claims of Cyber Hacks
https://www.usnews.com/news/world-report/articles/2021-07-19/china-threatens-us-allies-following-claims-of-cyber-hacks-we-will-retaliate
=================================================================
http://www.wavesys.com/wave-alternative
Choose data protection that actually works.
The IT perimeter is gone
With tablets, smartphones, and cloud applications, your employees can access sensitive data anytime, from anywhere. Indeed, around 70 percent of security breaches and data thefts are inside jobs. Meanwhile, the hackers only get better: advanced persistent threats (APTs) appear as normal traffic, and malware can go unnoticed for weeks.
It’s a new world, one without borders. Yet most organizations are still trying to protect their data with the same old firewalls and antivirus software. It’s not working. We refer you to the headline-making breach of the week.
You have to start with the device
Wave has an alternative: security that’s built into each and every device.
We’re talking about hardware: self-encrypting drives (SEDs), which protect data when a device is stolen or lost, and trusted platform modules (TPMs), or embedded security chips. Both go in at the factory, and increasingly, both are standard. They make it possible for you to monitor and control each individual device and its data, no matter where it is. But you need software to turn on and manage your SEDs and TPMs. Wave makes that software.
We’ve been refining comprehensive, centralized management of hardware-based security longer than anyone else. More than that, we’ve shaped the field as a founding member of the Trusted Computing Group, the not-for-profit that develops and promotes industry standards for the hardware.
Security that’s confirmed, not assumed
With Wave, you’ll know that you’re secure. Because we start with the individual devices, you get a broad, deep view of your network. You can see exactly who’s on it, with what devices and what apps, at any given time. Just for example, if Bob goes home and tries to log onto Facebook with the company laptop, Wave can stop him.
A big piece of this heightened security is device authentication. Traditional two-factor authentication requires what amounts to two user IDs. But by using the TPMs inside your devices, Wave can confirm the identity of not only users, but also the devices they’re on. Combine that with fast, enforced encryption of sensitive data via your SEDs—all easily managed with Wave software—and your data is protected from the full range of modern risks: device theft, missent emails, flash drives, portable hot spots … even (and no one else can say this) hardware keyloggers. Not to mention Bob.
Do we need to say that with Wave, compliance is no problem?
Start closing your security gaps today, with what you’ve got
You might be surprised to hear that 90 percent or more of your computers probably already have TPMs. Mobile devices are catching up fast. SEDs are newer, but you probably have a bunch of those too. Machines that don’t have them can often be outfitted at little to no extra cost. So you’ve got some or all of the hardware. All you need to do is turn it on with Wave.
It’s almost as easy as it sounds. TPMs and SEDs are built to open, vendor-neutral industry standards, and so are Wave solutions. That means Wave works on your existing mix of hardware, across platforms, and will evolve with you. It’s part of what makes the Wave alternative not only more secure, but also simpler and cheaper. Total cost of ownership for Wave data protection can be almost half that of a traditional software-based system.
Questions? Read on, or contact our sales department.
=================================================================
Rethink cybersecurity and use Wave's awesome solutions!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Ransomware hits law firm counseling Fortune 500, Global 500 companies
https://www.bleepingcomputer.com/news/security/ransomware-hits-law-firm-counseling-fortune-500-global-500-companies/
Excerpt:
Some of its current and past clients include Exxon, Apple, Mercedes Benz, Boeing, Home Depot, British Airways, Dow Chemical, Allianz Insurance, Universal Health Services, Marriott International, Johnson & Johnson, Pfizer, Time Warner, and many others.
==================================================================
If this law firm enabled and managed its SEDs and TPMs (hardware security) with Wave software, this law firm wouldn't be having the problems in the article!!! Just think what your company and other organizations in the World could save with Wave: LOTS OF MONEY, STRESS, and YOUR COMPANY'S REPUTATION!!!
==================================================================
http://www.wavesys.com/wave-alternative
Choose data protection that actually works!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
What can government do as cyber insurance costs increase?
https://www.govtech.com/security/what-can-government-do-as-cyber-insurance-costs-increase
Excerpt:
Government officials looking to elevate organizations' cyber postures may need to either mandate certain best practices - rather than rely on the lure of insurance coverage to incentivize voluntary adherence....
==================================================================
Some of the most well renowned companies in the World (TCG) stand behind activated TPMs and SEDs and their security. Isn't it time that these activated standards help insurance companies, their customers, companies and the government?!
=================================================================
Better security at less than half the cost!!!
http://www.wavesys.com/wave-alternative
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
US agencies circulate warning about 'aggressive' Chinese hacking effort to steal secrets from a range of targets
https://www.cyberscoop.com/china-hacking-fbi-biden-alert-ip/
=================================================================
How about protecting data with HARDWARE? TPMs are built into billions of computer devices and SEDs are built into millions of computer devices. These hardware security technologies could prevent the Chinese from stealing secrets. Why not turn them all on and use them or make it a law that organizations have to enable these technologies? Not enabling SEDs and TPMs is continuing to cause major cyber problems, and costing the World billions of dollars!!!
=================================================================
http://www.wavesys.com/data-protection
To keep data safe, arm your devices
Excerpt:
Wave’s solution: start with the device
The Wave approach to this challenge is to make the IT perimeter irrelevant. Wave turns on and manages the self-encrypting drives (SEDs) and trusted platform modules (TPMs), or security chips, that are already embedded in many of your devices. The upshot is that each and every device is equipped with its own data protection system—while being centrally managed. This gives you unprecedented yet straightforward control over exactly who has access to your data, with what devices, over what networks.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Connecticut Becomes Third State to Incentivize Cybersecurity Best Practices for Businesses
https://www.prnewswire.com/news-releases/connecticut-becomes-third-state-to-incentivize-cybersecurity-best-practices-for-businesses-301328677.html
Excerpt:
"It is critically important to do a better job of protecting businesses and consumers against cyber-attacks," said Representative Simmons. "In Connecticut, we took a step to accomplish this voluntarily without regulation by incentivizing organizations to adopt cyber best practices, like the NIST framework and the CIS Critical Security Controls."
==================================================================
TCG releases first security verification guide for enterprise systems with NIST
https://trustedcomputinggroup.org/tcg-releases-first-security-verification-guide-for-enterprise-systems-with-nist/
Excerpts:
The PC Client Firmware Integrity Measurement (FIM) specification provides an official definitive guide, derived from the National Institute of Standards and Technology’s draft publication SP 800-155, December 2011, to verifying the security status of equipment bought by enterprises. It provides the guidelines for products that can determine the integrity of a device at the manufacturing stage and offers a baseline measurement that allows for security result comparisons throughout its lifecycle.
“TCG continues to coordinate with the industry and government to improve the overall security of the infrastructure. This is one such example where TCG worked closely with NIST to provide a specific set of requirements to meet the NIST SP800-155 draft published in 2011.” – Shiva Dasari, Chief Technologist, HPE Infrastructure Security.
================================================================
http://www.wavesys.com/products/wave-endpoint-monitor
Excerpt:
Be proactive on compliance
No new regulations here—yet. But government agencies recognize malware as a growing threat. In 2011, NIST published guidelines for basic input/output system (BIOS) integrity measurement, the BIOS being what initializes a computer when it boots up. When this critical system is malware’s target, the consequences are big. The guidelines describe what’s needed to establish a chain of trust for the BIOS: Has it been tampered with? NIST actually looked to Wave for feedback on this document (see the acknowledgments). We know what’s needed, because Wave Endpoint Monitor is already doing it.
=================================================================
Businesses in at least 3 states could be happy buyers of Wave solutions!!!
Better security at less than half the cost!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Windows Hello Bypass Fools Biometrics Safeguards in PCs
https://threatpost.com/windows-hello-bypass-biometrics-pcs/167771/
==================================================================
If you had used Wave VSC 2.0 in your organization all along, this Windows Hello problem wouldn't be effecting your organization, and your organization would have better multi-factor authentication (MFA)!!! Also, in the article, "Tsarfati said that the solution may not fully mitigate the issue." Use better security, use Wave VSC 2.0!!!
==================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Cybersecurity organizations announce new first responder credentialing program
https://www.zdnet.com/article/cybersecurity-organizations-announce-new-first-responder-credentialing-program/
CISA and the ISA Global Cybersecurity Alliance are working together to certify first responders for cyber incidents.
==================================================================
So this is what cybersecurity is coming to!!! Don't be a victim!!! Rethink cybersecurity and use Wave's awesome solutions!!!
==================================================================
Better security at less than half the cost!!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Microsoft fixes Windows Hello authentication bypass vulnerability
https://www.bleepingcomputer.com/news/security/microsoft-fixes-windows-hello-authentication-bypass-vulnerability/
Excerpts:
Microsoft has addressed a security feature bypass vulnerability in the Windows Hello authentication biometrics-based tech, letting threat actors spoof a target's identity and trick the face recognition mechanism into giving them access to the system.
"The vulnerability allows an attacker with physical access to the device to manipulate the authentication process by capturing or recreating a photo of the target’s face and subsequently plugging in a custom-made USB device to inject the spoofed images to the authenticating host," security researcher Omer Tsarfati explained.
"We have no evidence that this attack has been used in the wild, but it could be used by a motivated attacker to target a researcher, scientist, journalist, activist or privileged user with sensitive IP on their device, for example."
==================================================================
Wave VSC 2.0 is looking even better after an article like this one!!! It's great to use Wave VSC 2.0 for multi-factor authentication (MFA)!!!
==================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Can They See You Now?
Remote Working Requires a Security-First Approach Against Cyberattacks —
https://www.isemag.com/2021/07/telecom-2021-cybersecurity-best-practices-remote-work/
Excerpts:
The Role of Trusted Computing
It is crucial that a security-by-design approach is followed to guarantee a device remains protected throughout its whole life cycle. If security is left as an afterthought by developers or manufacturers, products present a vulnerable access point for hackers to intercept large amounts of data for a prolonged period of time. It is therefore critical that each device plays its own role in safeguarding the entire network by being able to report its integrity and protect its own hardware and software.
Trusted Computing should be utilized to ensure a multi-layered security safeguard against the growing sophistication of cyberthreats. Ensuring trustworthiness of devices, device identity, and security validity, Trusted Computing has a key role to play. For example, the Trusted Platform Module (TPM) is a hardware-based root of trust which, when implemented, creates a secure way of being able to examine the authenticity and integrity of a device and its firmware. The capabilities of the TPM, including run time integrity measurements and private encryption keys, can also be used to protect data from unauthorized users.
Global technology standards and specifications are also incredibly important, as they ensure organizations have the required tools to protect against cyberattacks. A great example of this is the European Telecommunications Standards Institute (ETSI) and their Cyber Security for Consumer Internet of Things: Baseline Requirements. This standard offers the best practice in security for the whole ecosystem of embedded technology and Internet-connected devices, and its recommendations are essential to create a solid foundation that protects against attacks. ETSI’s standard is intended to be complemented by other, more specific, standards, such as the principles and technologies set out by Trusted Computing Group (TCG). It relies on the Device Identifier Composition Engine (DICE) architecture, which combines hardware and software to begin a device boot sequence following the compromise of a device or system.
The DICE capability is utilized as a Root of Trust to perform attestation, authentication, and certification, of the software, regardless of whether a TPM is present or not. DICE works by sorting the boot into different layers and using the Unique Device Secret to form secrets that are unique to each configuration or layer. Each layer uses its unique secret to derive keys that can be used to protect data or report integrity information. As the software and configuration measurements are used to calculate the secrets, they are different whenever a software or configuration change takes place. If malware does get installed on a device, when the boot happens, the malware measurements will be different from the previous software, and the malware will not have access to the previous secrets. In the case of a vulnerability happening, patches can be installed which automatically generate new secrets for the patched layer, and for later ones too.
Other technologies can also be implemented to offer strong attestation of firmware and security, device identify, and secure deployment of software updates. They should be utilized by developers and manufacturers to add additional levels of security, and to ensure that all devices are kept protected.
=================================================================
Better security at less than half the cost!!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
These phishing emails want to deliver password-stealing malware to energy companies and their suppliers
https://www.zdnet.com/article/these-phishing-emails-want-to-deliver-password-stealing-malware-to-energy-companies-and-their-suppliers/
Excerpts:
The fake emails are well researched in an effort to dupe victims into believing they're interacting with known companies in the industry.
Cyber criminals are targeting energy, oil and gas and other companies around the world with a phishing campaign designed to deliver malware capable of stealing usernames, passwords and other sensitive information in what's believed to be the first stage of a wider campaign.
Detailed by cybersecurity company Intezer, the phishing campaign has been active for at least a year and those behind it appear to have put a lot of effort into making the phishing emails look as legitimate as possible.
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpts:
Key Features:
Strong Security
• Authenticate securely, encrypt email, and prove integrity of the device with one management console
• Protect against phishing, malware and other network security threats by storing authentication credentials in hardware
• Provide centralized enforcement of custom policies
=================================================================
Hopefully, Wave has taken advantage of a lot of good ideas generated by this board! These ideas can bring about new insights for the Wave community to prosper from!!! There are a lot of ideas to use!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
New Trojan malware steals millions of login credentials
https://www.techradar.com/news/malware-steals-millions-of-login-credentials-for-popular-websites
Excerpts:
Malware and Wi-Fi threats are on the rise
Cybersecurity researchers have revealed a new custom Trojan-type malware that managed to infiltrate over three million Windows computers and steal nearly 26 million login credentials for about a million websites.
The findings from Nord Security classifies the websites into a dozen categories, which include virtually all popular email services, social media platforms, file storage and sharing services, ecommerce platforms, financial platforms, and more.
In all, the unnamed malware managed to siphon away 1.2 terabytes of personal data including over a million unique email addresses, over two billion cookies, and more than six million other files.
“For every malware that gets worldwide recognition and coverage, there are thousands of custom viruses made specifically for the buyer's needs. These are nameless pieces of malicious code that are compiled and sold on forums and private chats for as little as $100,” explains Nord Security.
=================================================================
After reading this article, you are happy if your organization uses two Wave solutions, Wave VSC 2.0 and Wave Endpoint Monitor!!!
Better security at less than half the cost!!!
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/products/wave-endpoint-monitor
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Biden signs executive order aimed at promoting competition across the economy
https://news.yahoo.com/biden-to-sign-executive-order-aimed-at-promoting-competition-across-the-economy-131418441.html
Excerpts:
Labor markets
Biden is calling on the Federal Trade Commission to ban or limit non-compete agreements, which keep workers from leaving their employer for positions at rival firms. Critics argue the agreements reduce wages by taking away workers' employment options.
Biden "believes that if someone offers you a better job, you should be able to take it. It makes sense,” said White House Press Secretary Jen Psaki earlier this week.
==================================================================
It would be great if the great Wave minds of the past could be together with the great Wave minds of the present to make for a great Wave future!!!
==================================================================
Better security at less than half the cost!!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Cybercrime Costs Organizations Nearly $1.79 Million Per Minute
https://www.infosecurity-magazine.com/news/cybercrime-costs-orgs-per-minute/
Cybercrime costs organizations an incredible $1.79m every minute, according to RiskIQ’s 2021 Evil Internet Minute Report.
The study, which analyzed the volume of malicious activity on the internet, laid bare the scale and damage of cyber-attacks in the past year, finding that 648 cyber-threats occurred every minute.
The researchers calculated that the average cost of a breach is $7.2 per minute, while the overall predicted cybersecurity spend is $280,060 every minute.
E-commerce has been heavily hit by online payment fraud in the past year, with cyber-criminals taking advantage of the shift to online shopping during the COVID-19 pandemic. While the e-commerce industry saw a record $861.1bn in sales, it lost $38,052 to online payment fraud every minute.
Healthcare, another sector that has faced a surge in cyber-attacks since the start of COVID-19, lost $13 per minute on digital security breaches in the past year.
The report also looked at the impact of different forms of cybercrime. It showed that per minute, there was $3615 lost to cryptocurrency scams, 525,600 records compromised and six organizations victimized by ransomware.
The scale of cyber-attacks last year was further underlined by the fact that one Magecart host was detected every 31 minutes, one vulnerable Microsoft Exchange server was patched every 1.7 minutes and one malicious mobile app blocklisted every five minutes.
According to Lou Manousos, CEO of RiskIQ, cybercrime is easier than ever to participate in: “Better threat technology makes cyber-criminals more effective and wealthier than ever before. We have compiled the vast numbers associated with cybercrime over the past year with help from our Internet Intelligence Graph and third-party sources to help businesses and researchers better understand what they’re up against.”
=================================================================
There are over 2,000,000,000 TPMs (hardware security) already built-in to computer devices today, and many of them are not turned on. When you hear or read about what these TPMs can do with the right software, it boggles the mind that they are not all turned on!!! Do we want to continue with the cybercrime costs listed in the article above or turn our TPMs on?! It's costing the World economy a fortune!!! Hackers go after software only rather than hardware because it's less difficult to attack software, and less expensive to attack software only!!! Use the TPM (hardware security), and save your organization money and stress with better protection!!!
Better security at less than half the cost!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
CTOs Keeping Quiet on Breaches to Avoid Cyber Blame Game
https://www.infosecurity-magazine.com/news/ctos-keeping-quiet-breaches-blame/
Nearly two-thirds (36%) of IT leaders are not disclosing breaches for fear that they may lose their job, complicating efforts to enhance security, according to new research.
Keeper Security polled 1000 UK IT decision-makers at businesses of between 100 and 5000 employees to compile its 2021 Cybersecurity Census Report.
It revealed that security breaches are widespread: 92% of respondents said their organization suffered one in the past year and over three-quarters (78%) feel unprepared to deal with cyber-threats.
The financial fallout of successful attacks is also significant, costing nearly one in 10 businesses over £1 million.
Worryingly, many IT leaders appear to be keeping quiet about breaches rather than actively taking steps to tackle their causes.
Nearly all (92%) respondents said they’re aware of gaps in their defenses, but less than half (40%) are addressing all of them. A third (32%) even admitted to using weak credentials such as “password” or “admin” to protect data.
Training and skills appear to be key weaknesses: 58% of IT pros said employees don’t understand the consequences of poor cyber-hygiene, while even more (61%) complained of cyber skills shortages.
This matters increasingly in the context of a current working environment in which remote employees may be more exposed to threats.
Two-thirds (66%) of UK organizations said they’d relaxed their cybersecurity policies to support productivity over the past 12 months.
“UK businesses are clearly worried about their cybersecurity and the challenges are manifold, affecting everything from budgets to productivity,” said Darren Guccione, CEO and co-founder of Keeper Security.
“Companies are facing many competing challenges right now and, understandably, might not always make cybersecurity investments a priority. Our report is an urgent reminder for organizations to proactively address their cybersecurity challenges as a priority, since deferring them will make the consequences far more severe.”
=================================================================
Wave has the technology so that these CTOs won't have breaches to report!!! Enabling hardware security (TPMs and SEDs) and Wave software, these CTOs could realize a whole new level of cybersecurity!!! The hardware security is ALREADY BUILT-IN to computers and other devices!!! You just need to turn it on and manage it with Wave. Why wait to turn on this security? You don't want to be the next CTO who has to hide a data breach!!!
Rethink cybersecurity, and use Wave's awesome solutions!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Colonial Pipeline Didn’t Have Multifactor Authentication in Place—And Most Defense Contractors Don’t Either
https://www.nextgov.com/ideas/2021/07/colonial-pipeline-didnt-have-multifactor-authentication-placeand-most-defense-contractors-dont-either/183078/
When Colonial Pipeline CEO Joseph Blount sat before lawmakers to explain the recent ransomware attack, he found them less sympathetic than they once were to companies that have found themselves victims of hackers.
Rep. John Katko, R-N.Y., the top-ranking GOP member of the House Homeland Security Committee, said he appreciated “Colonial Pipeline’s identification of places where they are now hardening systems in response to the devastating ransomware attack in May, but this begs an obvious question. If your pipeline provides fuel to 45% of the East Coast, why are you only hardening systems after an attack?”
Rep. Bonnie Watson Coleman, D-N.J., was more direct. She called out Colonial Pipeline’s delay of voluntary Transportation Security Administration cybersecurity reviews, pointing out that “delaying these assessments for so long amounts to declining them.”
Still, these reactions are more muted than you might expect given the total disregard most companies—even those responsible for critical infrastructure like Colonial Pipeline—have for the most basic cybersecurity standards.
Certainly, we shouldn’t be blaming the victims of cyberattacks. Even organizations with the best security can fall victim. But Colonial Pipeline didn’t have multifactor authentication in place on the account that was ultimately the weak point that hackers exploited. Of course, multifactor authentication alone won’t necessarily thwart attackers, but the fact that such a basic precaution was missing should raise a lot of alarm bells.
But it’s not uncommon. Companies of all sizes in the defense industrial base often don’t have multifactor authentication in place, even though they were legally required to so six years ago. A CyberSheath look into the networks of 600 such companies found that 71% lacked the level of multifactor authentication required.
That wasn’t the only issue. Looking at the Supplier Performance Risk System score for those companies is even more alarming. A company following every protocol and best practice to the letter would score a perfect 110. A company with nothing in place would score a -203. The average score across the 600 companies we looked at? -125.
Some 66% of companies lacked appropriate access controls to protect controlled unclassified information, 69% failed to establish and enforce security configuration settings, 69% didn’t test their organization’s incident response capability, and 74% didn’t mark media with the proper markings and distribution limitations.
And those are just the most common oversights. We’ve seen decades-old operating systems that are no longer supported or patched, CFO passwords that are essentially “password123,” and on and on.
The fact that none of this is surprising or new is the problem. I testified before Congress about the challenges facing defense contractors in meeting security minimums a decade ago, affirming that minimums were the right thing to do. The law requiring them was passed in 2015, mandating NIST cybersecurity best practices. Defense contractors were legally bound to comply by December 2017. And yet, here we are.
For more than six years, hundreds of thousands of commercial companies in the defense industrial base have been legally required to have these basic protections in place, yet we’re still hearing about how difficult and expensive it will be to implement them.
One positive is that there has been incremental progress. Cybersecurity minimums were first established but not mandated. Then they were mandated but not verified. We’ve seen the results of unverified compliance: There is none. It’s time to start verifying.
The way forward is to tie revenue, tax credits or some other business incentive to compliance. That’s the only way you’re going to get businesses to finally take cybersecurity seriously.
=================================================================
Wave VSC 2.0 - Better security at less than half the cost!!!
You need multi-factor authentication. Fast. You need Wave Virtual Smart Card.
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Russia ‘Cozy Bear’ Hackers Breached GOP as Ransomware Attack Hit
https://www.bloomberg.com/news/articles/2021-07-06/russian-state-hackers-breached-republican-national-committee
Excerpt:
Russian government hackers breached the computer systems of the Republican National Committee last week, around the time a Russia-linked criminal group unleashed a massive ransomware attack, according to two people familiar with the matter.
==================================================================
Wow, Wow!!! The Wave community could shine a bright light on the World!!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Apps with 5.8 million Google Play downloads stole users’ Facebook passwords
https://arstechnica.com/gadgets/2021/07/google-boots-google-play-apps-for-stealing-users-facebook-passwords/
Excerpt:
Google has given the boot to nine Android apps downloaded more than 5.8 million times from the company's Play marketplace after researchers said these apps used a sneaky way to steal users' Facebook login credentials.
==================================================================
AGAIN, another situation that could have been prevented by using Wave's technologies!!! It's interesting that Wave has the technology to help billions of people in the World, yet Wave appears to lay dormant while all this bad stuff is happening!!! Wave has SO MUCH potential with all the opportunities out there!!! If someone would only let Secretariat Jr. (Wave) run!!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE