Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Microsoft warns over password attacks against these Office 365 customers
Another good reason to turn on multi-factor authentication now.
https://www.zdnet.com/article/microsoft-warns-over-password-attacks-against-250-office-365-customers/
==================================================================
Use Wave VSC 2.0 (MFA) to prevent the problem from happening for organizations in the above article!
http://www.wavesys.com/products/wave-virtual-smart-card
Excerpts:
One helpdesk call you'll never get: "I lost my virtual smart card again..."
There are so many ways to lose a token – couch cushions, street drains, curious toddlers. In fact, up to 30% of all tokens are eventually lost. It’s much harder to lose a laptop, and you notice a lot faster when you do.
The user experience with a virtual smart card is simple: he or she logs in with a PIN (authentication factor number one). The TPM (authentication factor number two) then transparently identifies the device to the network and connects the user to all the approved services. It’s one less thing for users to carry around.
==================================================================
Better security at less than half the cost!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
SnapMC hackers skip file encryption and just steal your files
https://www.bleepingcomputer.com/news/security/snapmc-hackers-skip-file-encryption-and-just-steal-your-files/
Excerpt:
Researchers at NCC Group have been tracking a new adversary which they call SnapMC, named after the rapid strike approach the group follows, who enter networks, steal files, and deliver extortion emails in under 30 minutes.
=================================================================
Wave could keep this group off the network. As an added protection, activated SEDs could have these files automatically encrypted so SnapMC wouldn't be stealing files, and Wave SED management could activate and manage an organization's SEDs!
=================================================================
Thanks Methinks!
=================================================================
http://www.wavesys.com/products/wave-self-encrypting-drive-management
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Microsoft demoes hacker attacks on PCs with no TPM, VBS, and more
https://www.neowin.net/news/microsoft-demoes-hacker-attacks-on-pcs-with-no-tpm-vbs-and-more/
Excerpt:
Not just that but the firm also presented a video demo - starring Weston - that shows how potential hackers could easily gain access to such vulnerable machines that don't have these features. The video shows how hackers can gain control of a vulnerable device both remotely or locally to infect such systems with malicious payloads like ransomware or steal user authentication data. The video is meant to really drive the point home that such features are indeed crucial for a secure Windows 11 environment.
=================================================================
A good idea to activate TPMs and use Wave software!!!
=================================================================
Better security at less than half the cost!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
TSA set to mandate railroads and rail systems report cyber incidents to government
https://abcnews.go.com/Politics/tsa-set-mandate-railroads-rail-systems-report-cyber/story?id=80457231
Excerpts:
The CISA director said over 90% of successful cyber attacks occur because of a phishing email and urged companies to prepare for a disruption.
"When those who are entrusted with government dollars who are trusted to work on sensitive government systems fail to follow required cybersecurity standards, we're going to go after that behavior and extract very hefty -- very hefty fines," Deputy Attorney General Lisa Monaco said Wednesday in an appearance at the Aspen Cyber Summit.
In addition to railways, the TSA is also requiring U.S. airport operators, passenger aircraft operators and all cargo aircraft operators to designate a cybersecurity coordinator and report all incidents to CISA, by next spring, Mayorkas said at the Billington Cybersecurity Forum.
==================================================================
Wave protects against phishing!
And if organizations are using built-in cybersecurity standards like SEDs and TPMs with Wave software, CISA won't need to go after your organization with hefty fines!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Key Features:
Strong Security
• Authenticate securely, encrypt email, and prove integrity of the device with one management console
• Protect against phishing, malware and other network security threats by storing authentication credentials in hardware
• Provide centralized enforcement of custom policies
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Your cybersecurity team will face burnout, and you need to help
https://venturebeat.com/2021/10/09/your-cybersecurity-team-will-face-burnout-and-you-need-to-help/
=================================================================
After reading this article, one has to ask why are these security teams doing what they are doing to experience burnout constantly. Keeping unknown and unapproved devices from accessing the network (see how this is possible in the link below) could eliminate a lot of stress, lead to better security, better employee health and greater efficiency in organizations. Wave's solutions can make shareholders', the BODs' and employees' lives much improved in organizations across the world!!!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Secure device & user authentication
Sometimes it feels like security is more effective at deterring your users than hackers. But you still have to protect your enterprise resources, and we’re here to help. We take pride in securing your network, data, and resources to an unprecedented level, without causing a revolt from either IT or your users. In fact, your users probably won’t even know we’re there.
Here’s how it works:
Trusted Platform Module (TPM) + Wave’s ERAS for TPM Management = hardware-secured, fully-managed authentication
Most of your devices already come with TPMs (check out our “What is a TPM?” brochure if you’re not sure why this is exciting). This security chip comes attached to the motherboard of most enterprise-class PCs. There’s nothing “add-on” about it. The TPM provides a verifiable, unique identity for each machine.
Wave’s ERAS for TPM Management gives IT remote, centralized management of all TPMs on enterprise computers and tablets.
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
North American Orgs Hit with an Average of 497 Cyberattacks per Week
https://www.darkreading.com/attacks-breaches/north-american-orgs-experience-497-attacks-per-week-on-average-currently
=================================================================
The number of data breaches in 2021 has already surpassed last year’s total
https://fortune.com/2021/10/06/data-breach-2021-2020-total-hacks/
Excerpt:
Year to date, there have been 1,291 breaches, compared to 1,108 in 2020. The all-time high was set in 2017, with 1,529. And 2020’s biggest spikes occurred beginning in August, implying more are on the way.
=================================================================
Day after day, year after year, the cybersecurity market continues to allow too many cyberattacks and data breaches!!! If Wave solutions was a big part of that market, cyberattacks and data breaches wouldn't be close to happening at their current pace!!! Wave's cybersecurity solutions unlike other products actually work and work well!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Company that routes SMS for all major US carriers was hacked for five years
https://arstechnica.com/information-technology/2021/10/company-that-routes-sms-for-all-major-us-carriers-was-hacked-for-five-years/
Excerpts:
Syniverse hasn't revealed whether text messages were exposed.
A filing with the Securities and Exchange Commission last week said that "in May 2021, Syniverse became aware of unauthorized access to its operational and information technology systems by an unknown individual or organization.
Syniverse said that its "investigation revealed that the unauthorized access began in May 2016" and "that the individual or organization gained unauthorized access to databases within its network on several occasions, and that login information allowing access to or from its Electronic Data Transfer ('EDT') environment was compromised for approximately 235 of its customers."
Syniverse says its intercarrier messaging service processes over 740 billion messages each year for over 300 mobile operators worldwide. Though Syniverse likely isn't a familiar name to most cell phone users, the company plays a key role in ensuring that text messages get to their destination.
=================================================================
Unauthorized access keeps happening!!! Why, because these organizations don't have the protection that Wave solutions offers!!! Protect your data with Wave solutions!!! Choose data protection that actually works, choose Wave solutions!!!
=================================================================
http://www.wavesys.com/data-protection
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
BYOD security warning: You can't do everything securely with just personal devices
https://www.zdnet.com/article/byod-security-warning-you-cant-do-everything-securely-with-personal-devices-says-cybersecurity-body/
Excerpts:
New National Cyber Security Centre guidance looks to find a balance between BYOD and security -- and warns if BYOD devices have admin privileges, those privileges should be removed immediately.
Remote working has become far more commonplace over the past year. Still, even as some employees start returning to the office, businesses must be aware that there should be limitations to staff using their own laptops and other devices inside a corporate environment.
==================================================================
Definitely a positive article for Wave!!! All the more reason for organizations to be using TPM based devices with SEDs! All your corporate devices could be recognized as known and approved devices on your network. A great way to keep the bad guys off the network!!! With many BYODs, it opens the corporate network up to unknown and unapproved devices (including hackers) if you are letting BYODs (non-TPM based devices) have access to the network. In other words, if you let non-TPM based devices (BYOD) on the network you are also opening the network to hackers!!!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpts:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
DOJ to Hit Government Contractors with ‘Very Hefty Fines’ If They Fail to Disclose Data Breaches
https://www.nextgov.com/cybersecurity/2021/10/doj-hit-government-contractors-very-hefty-fines-if-they-fail-disclose-data-breaches/185894/
Excerpt:
Deputy Attorney General Lisa Monaco promised to use an existing law to go after contractors that don't follow required cybersecurity standards.
=================================================================
Required cybersecurity standards should include activated SEDs and TPMs!!! After all, they are hardware security, already built-in to computers, supported by the TCG, and just need to be activated and managed!!!
Avoid these data breaches by using these critical activated hardware security standards (SEDs and TPMs) along with Wave software!!!
==================================================================
Choose data protection that actually works!!!
http://www.wavesys.com/wave-alternative
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Google to auto-enroll 150m users, 2m YouTubers with two-factor authentication
https://www.theregister.com/2021/10/06/google_twofactor_authentication/
Excerpts:
Uh, cool?
Two-factor authentication provides an extra layer of security by, say, requiring a one-time code to complete your login – this code could be generated by an app on your phone or emailed to you – or a hardware key you insert into your computer. The idea being that if someone learns of or guesses your password, they also need to get something else off you, like your unlocked phone or hardware key.
Google calls this two-step verification (2SV) and it involves being sent a code to type in, using a hardware key, or an app on your phone.
=================================================================
Wave VSC 2.0 (MFA) in organizations could be easier, more secure, and cooler than Google's method for 2FA!!! Google should give an option that if you are enrolled in Wave VSC 2.0, you don't have to be enrolled in Google 2FA!!!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpts:
Token-free, password-free user authentication
We know you’ve dreamt about shredding your list of passwords. Go on and do it.
Because you are starting the authentication process in the device’s hardware, the user doesn’t have to interact with it. All users see is their usual Windows log-in screen – no more additional passwords to access the VPN or other resources. They just sign in once, and the secure credentials in their TPMs securely and quickly connect them to everything they need. Say goodbye to user frustration and slow OS performance.
Decrease expenses with virtual smart cards
You know what else happens when you take passwords out of the equation? A lot fewer calls to IT. Imagine if you took password resets out of the picture – that frees up a chunk of IT time, lowering your operating expenses significantly.
If your organization currently uses traditional tokens or smart cards, switching to virtual smart cards takes an even bigger burden off of IT – we use the hardware-protected credentials in the TPM to create a virtual smart card, which performs the same functionality as traditional smart cards. That means no need to purchase, deploy, replace or maintain external tokens, smart cards or smart card readers. Because virtual smart cards are already on your machines and can’t be forgotten, lost or stolen, you have lower capital expenses and lower operating expenses.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
NSA director expects to be facing ransomware attacks 'every single day' in five years
https://thehill.com/policy/cybersecurity/575386-nsa-director-expects-to-be-facing-ransomware-attacks-every-single-day-in
=================================================================
The title of this article doesn't lend too much confidence in the cybersecurity of the world!!!
Have we really used hardware security (SEDs and TPMs) extensively, and Wave software to prevent these ransomware attacks?! Hardware security has proven itself!!! If you use Wave solutions, you will have confidence in Wave, based on its ability to protect your organization!!!
=================================================================
Choose data protection that actually works!!!
http://www.wavesys.com/wave-alternative
Excerpt:
Start closing your security gaps today, with what you’ve got
You might be surprised to hear that 90 percent or more of your computers probably already have TPMs. Mobile devices are catching up fast. SEDs are newer, but you probably have a bunch of those too. Machines that don’t have them can often be outfitted at little to no extra cost. So you’ve got some or all of the hardware. All you need to do is turn it on with Wave.
It’s almost as easy as it sounds. TPMs and SEDs are built to open, vendor-neutral industry standards, and so are Wave solutions. That means Wave works on your existing mix of hardware, across platforms, and will evolve with you. It’s part of what makes the Wave alternative not only more secure, but also simpler and cheaper. Total cost of ownership for Wave data protection can be almost half that of a traditional software-based system.
Questions? Read on, or contact our sales department.
=================================================================
Better security at less than half the cost!!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
President Biden wants to kill off ransomware for good
https://www.techradar.com/news/president-biden-wants-to-kill-off-ransomware-for-good
Encrypt your data and use MFA, President urges
=================================================================
When you mix TPMs and Wave VSC 2.0 (MFA), you are able to keep unknown and unapproved devices from accessing your organization's network. In other words, you keep the bad guys from stealing your data that is on the network. When you encrypt your data by using SEDs, your data at rest is protected!!! Activated TPMs and SEDs make the cybersecurity to protect against ransomware better!!! Encrypting your data and using MFA is good, but using it with activated standards, SEDs and TPMs, is even better!!!
=================================================================
http://www.wavesys.com/products/wave-self-encrypting-drive-management
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Ransomware Is a Growing Problem. Here’s How the Cyberinsurance Industry Is Fueling It.
https://flipboard.com/@barrons/barron-s-q6kg2r1sz/ransomware-is-a-growing-problem-here-s-how-the-cyberinsurance-industry-is-fueli/a-_rjFJZ73SiGKZzlKRgUuwQ%3Aa%3A1900270198-049c692b37%2Fbarrons.com
==================================================================
It's amazing that there is a group, The Trusted Computing Group (TCG), that is made up of 100+ companies (and Wave was a promoter), and they back SEDs and TPMs (hardware security) for better cybersecurity, and what is mentioned in this article for companies' protection is security software!!! It's kind of ironic that October is Cybersecurity Awareness Month and two activated hardware standards (SEDs and TPMs) with the right software (Wave) could make cybersecurity so much better!!! Here we have a gigantic ransomware problem, and these hardware technologies could have a hugely positive impact on the problem!!! When is this going to be mandated in at least critical industries? Better late than never!!! Hopefully, Wave Nation is making people aware of the tremendous benefits of hardware security that is already built-in!!!
=================================================================
http://www.wavesys.com/wave-alternative
Choose data protection that actually works!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Chinese Hackers Used a New Rootkit to Spy on Targeted Windows 10 Users
https://thehackernews.com/2021/10/chinese-hackers-used-new-rootkit-to-spy.html
==================================================================
Wave Endpoint Monitor Delivers a Powerful Weapon in the Battle against Advanced Persistent Threats
Monitors PC Health, Detects Anomalous Behavior & Ensures a Higher Level of Trust in the Endpoint
http://www.wavesys.com/buzz/pr/wave-endpoint-monitor-delivers-powerful-weapon-battle-against-advanced-persistent-threats
Lee, MA -
September 11, 2012 -
Wave Systems Corp. (NASDAQ:“WAVX”) today announced the general availability of Wave Endpoint Monitor (WEM), the only solution that detects malware by leveraging capabilities of an industry standard security chip onboard the PC. WEM provides increased visibility into endpoint health to help protect enterprise resources and minimize the potential cost of advanced persistent threats such as rootkits.
Rootkit attacks are particularly harmful in their ability to hide in host systems, evade current mainstream detection methods (such as anti-virus programs or whitelisting at the operating system level) and their capacity to replace legitimate IT system firmware. Such attacks occur before the operating system (OS) loads, targeting the system BIOS and Master Boot Record (MBR), and can persistently infect higher-level system functions including operating systems and applications.
“APTs facing enterprises today are more complex, nefarious and sophisticated than ever before,” said Richard Stiennon, Chief Research Analyst at IT-Harvest and author of Surviving Cyberwar. “Malware hiding in a device’s BIOS will go undetected by traditional anti-virus programs operating at the OS level, creating a strong need for a solution that can identify an attack as it happens. Because Wave’s approach is rooted in hardware-based technologies, rootkits and other malware can be spotted before the OS even starts.”
Wave Endpoint Monitor captures verifiable PC health and security metrics before the operating system loads, by utilizing information stored within the Trusted Platform Module (TPM), a security chip located on the motherboard of all business PCs. If anomalies are detected, IT is alerted immediately with real-time analytics. Capabilities of Wave Endpoint Monitor include:
• Securely reports PC integrity measurements for central reporting and analysis
• Ensures data comes from a known endpoint
• Alerts IT administrators to anomalous behaviors, which can be linked to the presence of malware
• Provides configurable reporting and query tools
• Ensures strong device identity through the use of hardware-based digital certificates
• Remote provisioning of the TPM
“Today’s security threat environment calls for industry-proven solutions to collect and analyze pre-operating system health information and to ensure endpoints are known and trusted,” said Steven Sprague, CEO of Wave Systems. “Since advanced persistent threats can sometimes appear as normal traffic, new rootkits often go unnoticed for long periods of time and cause severe damage in the form of infected systems and data loss. Wave Endpoint Monitor allows IT to utilize the hardware security you’ve already bought and deployed to ensure PC health from the start of the boot process while creating a higher level of trust in your endpoints.”
Wave has successfully piloted WEM with several government groups for the past six months.
The National Institute of Standards and Technology (NIST) has also recognized the importance of BIOS integrity and has issued initial guidelines for protecting a computer's BIOS in SP 800-147 and SP 800-155 (draft).
Wave Endpoint Monitor, plus Wave’s EMBASSY Remote Administration Server (ERAS) with full central management of all enterprise TPMs, supports all platforms with version 1.2 TPMs and is now available for purchase.
=================================================================
Only hardware-based security can beat malware!!!
http://www.wavesys.com/malware-protection
http://www.wavesys.com/products/wave-endpoint-monitor
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
First on CNN: Biden administration to convene 30 countries to crack down on ransomware threat
https://www.cnn.com/2021/10/01/politics/blinken-cybersecurity-alliance/index.html
Excerpt:
In bolstering US cybersecurity, "the Federal government needs the partnership of every American and every American company in these efforts," Biden added.
=================================================================
With all the great minds on Wave's BODs, current and former employees are in a better position to speak to Biden about Wave's simpler, more secure, and cheaper set of solutions. One key feature is that only known and approved devices are allowed access to the network!!! Wave solutions activates hardware security (SEDs and TPMs), and manages these standards as well!!! Hopefully, Wave Nation isn't silent when an opportunity like this arises!!! Wave has such awesome cybersecurity!!!
==================================================================
Choose data protection that actually works!!!
http://www.wavesys.com/wave-alternative
==================================================================
Better security at less than half the cost!!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
These systems are facing billions of attacks every month as hackers try to guess passwords
https://www.zdnet.com/article/these-systems-are-facing-billions-of-attacks-every-month-as-hackers-try-to-guess-passwords/
Excerpt:
Organisations can also provide an additional layer of protection against brute-force password-guessing attacks – and other campaigns – by deploying multi-factor authentication (MFA). Using MFA means that, even if the attackers know the correct password, there's an extra barrier to prevent them from automatically being able to access the network.
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
Excerpts:
What can it be used for?
What do you use your smart card for today? With the exception of keying open the door at work, Wave Virtual Smart Card can perform any of the services or applications you rely on your smart card for today. Secure VPN, WiFi, remote desktop, cloud applications – it can all be done with a virtual smart card.
=================================================================
The article above represents another very important reason for organizations to be using Wave VSC 2.0 (MFA)!!!
=================================================================
Better security at less than half the cost!!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
After 3 Years, Key IRS Systems Still Aren’t Properly Encrypted
https://www.nextgov.com/analytics-data/2021/09/after-3-years-key-irs-systems-still-arent-properly-encrypted/185722/
But those systems—the total number of which was redacted from the IG report—hold incredibly sensitive data, including personally identifiable information on every taxpayer in the U.S.
==================================================================
Wave has served some well renowned companies in the way of SED management. With Wave's data protection, and the expertise that Wave served some of these large well renowned companies with its SED management, the IRS and government would be fortunate to choose Wave for this process and technology. Wave solutions could give the IRS and government a whole new, exciting outlook on its cybersecurity!!! ESW had 20 million committed to Wave years ago. With the technology that Wave has and the market need for its solutions, that 20 million should expand especially given that October 5 is fast approaching with Microsoft making the activated TPM part of Windows 11!!! (Wave can activate the other TPMs in older Windows OSes while organizations wait to upgrade to Windows 11)
==================================================================
http://www.wavesys.com/products/wave-self-encrypting-drive-management
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Audit: IRS Needs to Improve How It Wipes Taxpayer Data from Devices
https://www.nextgov.com/cybersecurity/2021/09/audit-irs-needs-improve-how-it-wipes-taxpayer-data-devices/185651/
=================================================================
SEDs (Self-Encrypting Drives) are built-in hardware to computers that should be activated extensively (Wave SED management can do that) in organizations to protect data!!! The crypto-erase feature that is part of Wave's SED management could have made things easier for the IRS or could make things easier in the future at the end of the IRS's or organization's computer life.
=================================================================
http://www.wavesys.com/products/wave-self-encrypting-drive-management
Excerpts:
Enterprises choose Wave to manage SEDs
Why? From our single console, you can manage all your organization’s self-encrypting drives (SEDs) easily and remotely, whether they number in the hundreds, or hundreds of thousands.
SEDs are the most secure, best-performing and most transparent encryption option for protecting data on laptops. These drives automatically encrypt all data written to the drive, so you don’t have to decide what’s important enough to encrypt. They also perform this encryption in the hardware of the drive, so you don’t end up with the performance issues software full-disk encryption is infamous for. SEDs are available as HDD or SSD, and are sold by most major drive manufacturers.
Wave’s management solution delivers remote drive initialization, user management, drive locking, user recovery and crypto-erase for all Opal-based, proprietary and solid-state SEDs.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Proper password security falling short despite increase in online presence
https://www.helpnetsecurity.com/2021/09/27/proper-password-security/
Excerpts:
While 92 percent of people know that using the same password or a variation is a risk, 65 percent still re-use passwords across accounts, drastically increasing the risks to their sensitive information, a LastPass report revealed.
While 68 percent of respondents would create stronger passwords for financial accounts, only 32 percent noted they would create strong passwords for work-related accounts.
=================================================================
More reasons (see excerpts above and excerpts below) for organizations to be using Wave VSC 2.0!!!
Rethink cybersecurity and use Wave's awesome solutions!!!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpts:
Token-free, password-free user authentication
We know you’ve dreamt about shredding your list of passwords. Go on and do it.
Because you are starting the authentication process in the device’s hardware, the user doesn’t have to interact with it. All users see is their usual Windows log-in screen – no more additional passwords to access the VPN or other resources. They just sign in once, and the secure credentials in their TPMs securely and quickly connect them to everything they need. Say goodbye to user frustration and slow OS performance.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Telegram bots are trying to steal your one-time passwords
https://www.zdnet.com/article/telegram-bots-are-trying-to-steal-your-one-time-passwords/
Excerpts:
The tokens can be used to shred second-stage account verification.
Telegram-powered bots are being utilized to steal the one-time passwords required in two-factor authentication (2FA) security.
=================================================================
By using Wave VSC 2.0, the attacker would need your computer as well as your PIN number to try to hack it!!! The above hack wouldn't work against Wave VSC 2.0!!! Another reason for organizations to be using Wave VSC 2.0!!!
Better security at less than half the cost!!!
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
'Quad' group seeks to set security standards for global tech industry
https://www.theregister.com/2021/09/27/quad_communqiue_technology_announcements/
Excerpts:
We expect technology suppliers, vendors, and distributors to produce and maintain secure systems, and to be trustworthy, transparent, and accountable in their practices. Technology developers should also build in safety and security-by-design approaches so that robust safety and security practices are a part of the technology development process.
No timeframes for delivery of the plans mentioned in the communiqué were set – a great many meetings must be held and documents drafted before anything concrete emerges.
=================================================================
With all that has been done by the TCG, Wave and other companies concerning activated SEDs and TPMs, the promotion of these two standards should be happening rather quickly also given the enormous cybersecurity benefit they could have in the World!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Newly-formed international alliances vow to improve cybersecurity, in moves China sees as affront
https://www.cyberscoop.com/quad-china-cyber-australia-india-japan/
Excerpt:
A coalition of four nations — Australia, India, Japan and the U.S. — has committed to promoting cybersecurity standards and practices as one of their chief goals, in one of several recent moves from countries widely viewed as a counter to China in cyberspace and elsewhere.
==================================================================
Standards such as Self-Encrypting Drives (SEDs) and Trusted Platform Modules (TPMs) could dramatically improve cybersecurity with the right software (Wave) across the World!!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Ransomware shame: More than half of business owners conceal cyber-breach
https://www.foxbusiness.com/technology/ransomware-cyber-breach-concealed
=================================================================
The status quo is not working!!! Use technology that works!!!
Use Wave solutions, and prevent cyber-breaches!!!
Use better security at less than half the cost!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
TangleBot Malware Reaches Deep into Android Device Functions
https://threatpost.com/tanglebot-malware-device-functions/174999/
=================================================================
Wave had a license agreement with Samsung (the leader in Android phones) back in 2012!!! The agreement was for 15 years!!! With Wave's technology in mobile TPMs (MTMs), this malware could be stopped by Wave/Samsung!!! If Microsoft with Windows 11 is moving the ecosystem to activated TPMs, shouldn't Wave/Samsung be doing that in mobile to help create full saturation of TPMs and for the sake of better cybersecurity for organizations!!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Biden administration officials push Congress to shape breach reporting mandates
https://www.cyberscoop.com/incident-reporting-easterly-homeland-security-committee/
Excerpts:
The leaders of the Senate Intelligence Committee favor a 24-hour deadline. A draft bill from leaders of the Senate Homeland Security and Governmental Affairs Committee would set the range at between 72 hours and seven days, as determined by CISA. And a draft from leading members of the House Homeland Security Committee proposes leaving the decision up to CISA but requiring reports no earlier than 72 hours.
“The earlier that CISA, the federal lead for asset response, receives information about a cyber incident, the faster we can conduct urgent analysis and share information to protect other potential victims,” CISA Director Jen Easterly told the Senate Homeland Security and Governmental Affairs Committee.
=================================================================
Unlike what is happening now with current status quo, the future is much brighter with Wave, activated TPMs and SEDs (hardware security)!!! Those with Wave's cybersecurity would find this government reporting not necessary to worry about!!!
Be prepared, use Wave's awesome solutions!!!
Better security at less than half the cost!!!
=================================================================
http://www.wavesys.com/wave-alternative
Choose data protection that actually works!!!
Reading the contents in the above link shows why the Wave alternative is better for now and the future cybersecurity of organizations!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Treasury Sanctions First Cryptocurrency Exchange to Combat Ransomware
https://www.nextgov.com/cybersecurity/2021/09/treasury-sanctions-first-cryptocurrency-exchange-combat-ransomware/185512/
Excerpt:
“We’re hardening our critical infrastructure against cyberattacks, disrupting ransomware networks, and working to establish clear rules of the road for all nations as it relates to cyberspace,” Biden said. “We reserve the right to respond decisively to cyberattacks that threaten our people, our allies, or our interests.”
=================================================================
Biden Calls for 'United Response' to Emerging Tech, Cyber Warfare in U.N. Speech
https://www.nextgov.com/cybersecurity/2021/09/biden-calls-united-response-emerging-tech-cyber-warfare-un-speech/185510/
Excerpt:
The federal government, he said, is “hardening critical infrastructure against cyberattacks, disrupting ransomware networks and working to establish clear rules of the road for all nations as it relates to cyber space.”
=================================================================
Hopefully, this also means that the U.S. is using hardware security (activated SEDs and TPMs) to greatly improve (harden) our cybersecurity!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Hardware Otp Token Authentication Market Growth Opportunities 2021-2027 | FEITIAN Technologies, Nexus Group, RSA SecurID
https://www.stillwatercurrent.com/hardware-otp-token-authentication-market-growth-opportunities-2021-2027-feitian-technologies-nexus-group-rsa-securid/
==================================================================
Has there been a study on how many organizations had OTP Token Authentication (ex.- SecurID), and the organizations still had data breaches and ransomware attacks?? The OTP Token Authentication try to cover many thousands of organizations so with the thousands of data breaches and ransomware attacks in the last few years, there must have been a lot of 'covered' organizations still attacked!!! Wave solutions can prevent these data breaches and ransomware attacks from happening!!! Wave has awesome security that really protects!!! Don't become another statistic, use Wave!!!
Better security at less than half the cost!!!
==================================================================
http://www.wavesys.com/wave-alternative
Excerpts:
Security that’s confirmed, not assumed
With Wave, you’ll know that you’re secure. Because we start with the individual devices, you get a broad, deep view of your network. You can see exactly who’s on it, with what devices and what apps, at any given time. Just for example, if Bob goes home and tries to log onto Facebook with the company laptop, Wave can stop him.
A big piece of this heightened security is device authentication. Traditional two-factor authentication requires what amounts to two user IDs. But by using the TPMs inside your devices, Wave can confirm the identity of not only users, but also the devices they’re on. Combine that with fast, enforced encryption of sensitive data via your SEDs—all easily managed with Wave software—and your data is protected from the full range of modern risks: device theft, missent emails, flash drives, portable hot spots … even (and no one else can say this) hardware keyloggers. Not to mention Bob.
Do we need to say that with Wave, compliance is no problem?
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Momentum builds to strengthen FTC's role as privacy enforcer, though hurdles remain
https://www.cyberscoop.com/ftc-privacy-alvaro-bedoya-big-tech/
Excerpt:
Today, consumers are up against a constant push by tech companies to gather deeply personal information about their lives and turn it for a profit — often without the security practices needed to protect that data.
==================================================================
Wave's data protection and compliance solutions could make Facebook, Google, the FTC and a lot of other organizations very HAPPY!!! Please read about these solutions at Wave's website below!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Epik data breach impacts 15 million users, including non-customers
https://arstechnica.com/information-technology/2021/09/epik-data-breach-impacts-15-million-users-including-non-customers/
Excerpts:
Scraped WHOIS data of NON-Epik customers also exposed in the 180 GB leak.
Epik has now confirmed that an "unauthorized intrusion" did in fact occur into its systems.
=================================================================
This post is a follow up to post #246793. Choosing Wave solutions should be obvious now!!!
Better security at less than half the cost!!!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
AT&T Phone-Unlocking Malware Ring Costs Carrier $200M
https://threatpost.com/att-phone-unlocking-malware/174787/
==================================================================
It would be interesting to see what AT&T is using for MFA! With Wave VSC 2.0 and Wave Endpoint Monitor and Wave solutions, AT&T could have saved itself 200M!!! Readership that can send some past posts/messages to the world about how Wave can help their cybersecurity in a big way would be much appreciated, and if you have already, thank you!
=================================================================
http://www.wavesys.com/
Cybersecurity defenses lacking in many companies, says survey
https://www.shine.cn/biz/tech/2109185262/
Excerpts:
Three quarters of Chinese respondents, or 75 percent, are not sure whether their cybersecurity defenses are adequate to respond to hackers, according to the 2021 EY Global Information Security Survey.
The survey covered 1,400 experts and senior officials from 1,010 companies from March to May 2021.
=================================================================
Wave and Lenovo could change cybersecurity in China so that organizations are confident in keeping hackers from accessing their data and networks. Wave offers better security at less than half the cost!!! With a new data protection law, Chinese organizations would be happy to choose data protection that actually works (Wave)!!!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/wave-alternative
Choose data protection that actually works!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Auditors, Contractors Hang in the Balance as Defense Overhauls Cybersecurity Certification Program
https://www.nextgov.com/cybersecurity/2021/09/auditors-contractors-hang-balance-defense-overhauls-cybersecurity-certification-program/185438/
Excerpt:
The Defense Department has not ruled out a return to allowing companies to ‘self-attest’ their security posture.
=================================================================
Not only would Wave's solutions provide critical industries and defense contractors with better security at less than half the cost, but they could prove compliance as well!!! The Wave alternative is simpler, more secure, cheaper and the winning formula for cybersecurity success for these organizations!!!
==================================================================
http://www.wavesys.com/compliance
What is compliance?
Organizations must meet industry-wide government requirements for data management, including storage, archiving, encryption, and retrieval. These requirements are intended to prevent data theft and preserve consumer privacy. They often mandate specific controls, corporate compliance programs, audits, public disclosures (“notice of breach”), and stiff penalties—from fines to prison time—for noncompliance.
If your organization falls victim to a security breach and you can’t prove that you were in compliance when it happened, you will be considered negligent. In addition to fines or criminal prosecution, you could face lawsuits, negative publicity, and loss of business.
Here are some of the primary areas of regulation:
Corporate accounting: SOX
Health care: HIPAA and HITECH
Credit and debit transactions: PCI
Government: FISMA and VPAT
Europe: DPA
The regulations are overwhelming and costly
Compliance is a major concern because of the increasing number and complexity of the regulations, as well as the expense they can entail—in the form of investment in new technologies and management. In the United States alone, there are more than 8,500 state and federal regulations concerning records management and notice of breach, plus voluntary standards. A 2011 study of multinational companies found the average cost of compliance to be more than $3.5 million.
Wave’s solution: start with the device
The Wave approach to the compliance challenge is twofold:
First, we offer serious security that’s confirmed, not assumed. Regulators won’t take your word for it. We use your existing hardware to more or less equip each and every device with its own data protection system. That can mean both strong two-factor authentication and automatic encryption.
This gives you unprecedented yet straightforward monitoring of and control over exactly who has access to your data, with what devices, over what networks. Detailed logs record it all—and show that you were in compliance at any given time. Proving compliance to an auditor can be as easy as clicking “print.”
Second, we keep it simple to keep costs down. Again, we start with the devices you already have. We can do that because our products are based on an open standard that’s already been implemented on 600 million–plus laptops and is now working its way onto mobile devices. Our software may be all you need to tame the compliance monster.
Our products are also designed to make managing your security—and your compliance—refreshingly straightforward. Usually, you can do all your management, monitoring, and reporting through a single console. Preconfigured security policies mean you can be in compliance as soon as our software is installed. It all adds up to less time, less staff.
For these reasons, total cost of ownership for Wave can be almost half that of a traditional software-based system that may not even prove you are in compliance—never mind protect your data.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Watchdog: CISA Needs to Update Plans to Protect Critical Infrastructure
https://www.nextgov.com/cybersecurity/2021/09/watchdog-cisa-needs-update-plans-protect-critical-infrastructure/185415/
=================================================================
Hardware security (built-in TPMs and SEDs) that are activated and managed using Wave software at less cost provides better security!!! Why critical infrastructure isn't totally using this technology in light of all the potential cyber attacks happening is hard to imagine. Proven built-in hardware security could be protecting our Nation's critical infrastructure at a level that software only just can't do!!! Time is of the essence in this critical area of the U.S. economy!!!
=================================================================
http://www.wavesys.com/wave-alternative
The Wave alternative link above is a great alternative (plan) for cybersecurity!!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Ransomware preparedness is low despite executives’ concerns
https://www.helpnetsecurity.com/2021/09/15/ransomware-preparedness/
Excerpt:
86.7% of C-suite and other executives say they expect the number of cyberattacks targeting their organizations to increase over the next 12 months, according to a recent Deloitte poll.
=================================================================
And with many of the ransomware attackers in these cyber attacks able to get on the network, sensitive information can easily be stolen and put up for ransom by the ransomware attackers!!! Wave can prevent that from happening!!! Only allowing known and approved devices access to your network is a better approach than trying to keep attackers off the network by using other products like Securid!!! Wave costs less and is better security!!!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Anonymous Claims to Have Stolen Huge Trove of Data From Epik, the Right-Wing’s Favorite Web Host
https://gizmodo.com/anonymous-claims-to-have-stolen-huge-trove-of-data-from-1847673935
==================================================================
http://www.wavesys.com/data-protection
Security = data protection
When we talk about security, what we really mean is protecting data from theft and misuse. Proprietary information, R&D, corporate strategy, customer names and phone numbers, social security numbers, passwords … All have potential monetary value, and all are targets. Data theft is a growth industry. As an example, tens of thousands of new malware strains pop up daily. With online tools, even a non-technical person can create one in minutes.
The IT perimeter has vanished
Data protection is easy enough when your data is sitting in secure servers. But today, it’s not. The workforce is increasingly mobile. More than 60 percent of corporate data lives not on servers but on laptops, tablets, and other devices (and more and more of those devices are owned by employees). Data is dispersed, constantly moving, and constantly exposed to the Internet and all the malware, viruses, and hackers lurking there.
Wave’s solution: start with the device
The Wave approach to this challenge is to make the IT perimeter irrelevant. Wave turns on and manages the self-encrypting drives (SEDs) and trusted platform modules (TPMs), or security chips, that are already embedded in many of your devices. The upshot is that each and every device is equipped with its own data protection system—while being centrally managed. This gives you unprecedented yet straightforward control over exactly who has access to your data, with what devices, over what networks.
We cost less too. Wave works on your existing hardware, across platforms. That’s because our solutions are based on an open standard that’s already been implemented on 600 million–plus laptops and is now working its way onto mobile devices. Our software is all you need to reach a whole new level of data protection. It’s one of the big reasons why total cost of ownership can be almost half that of a traditional software-based system that doesn’t even work very well.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Cyber Stress: The growing threat facing CISOs
https://www.techradar.com/news/cyber-stress-the-growing-threat-facing-cisos
Excerpt:
How to remediate high-stress levels among cybersecurity professionals.
==================================================================
Two options that CISOs have:
1. Hunting down threats that are already allowed access to the network.
vs.
2. Only allow known and approved devices access to the network (Wave).
Judging by the number of cyber attacks there have been in the last 5 years, option 1 is not working!!! And the process to stop these intruders under option 1 is creating a lot of stress!!!
Use option 2 (Wave) and have network and data protection that works, and creates a lot less stress!!!
It's better to be proactive than reactive!!!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Overseas cyber-attacks spike during major Chinese holidays and ceremonies
https://www.globaltimes.cn/page/202109/1233890.shtml
The number of overseas cyber-attacks on the Guizhou-Cloud system platform often increase significantly during China's major holidays and celebrations, a manager from the China's leading cloud system platform told the Global Times on Thursday.
Yang Yunyong, the general manager of the Guizhou-Cloud Big Data Industry Development Company said during the interview with the Global Times that the number of overseas cyber-attacks on the Guizhou-Cloud system platform during the nation's major holidays or ceremonies often show a more than tenfold increase.
The Global Times found on Thursday at the company's data center that the number of attacks at 10 am reached nearly half a million, as Yang added that this number only counted effective attacks.
"If you add attempts of the attacks, the total number per day is estimated to reach more than ten million," said Yang.
The attacks are mostly from China, the US, Russia, and India. Yang noted that attacks are largely from large countries which can recruit top-level talent and have a stronger ability and means to attack.
As for the purpose of these cyber attacks, Yang believes that most of the domestic attackers are taking actions due to "interest", adding that some attackers may feel take down the "fortress" as a feeling of taking a commanding height in the hacker world as the Guizhou-Cloud system platform is the first "fortress" for China's e-government platform.
As for attackers overseas, it is still not clear how they view the Guizhou-Cloud system platform, said Yang, emphasizing that the platform will work on increasing the defense forces by implementing special protection measures as the cloud platform receives more than tenfold increase in attacks from overseas actors during the nation's major holidays and ceremonies.
Yang pointed out that the company has established three defense systems and cooperated with other companies and relevant authorities to ensure the safety of the country's e-government platform, so the defense capability of the cloud system is leading in China.
==================================================================
Given Wave was bundled with Lenovo computers and had a distribution agreement with them, one would think that China would realize a great benefit for using Wave especially during the holidays. They could keep unauthorized devices (unknown and unapproved devices) from accessing enterprise networks by using Wave!!! Organizations in China wouldn't have the problem outlined in the above article!!! Wave/Lenovo/China could improve China's cybersecurity in a big way!!!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
Choose data protection that actually works!!!
http://www.wavesys.com/wave-alternative
Better security at less than half the cost!!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Titanfall 2 Hacking Rumor Blown Out Of Proportion, Respawn Says
https://kotaku.com/titanfall-2-hacking-rumor-blown-out-of-proportion-resp-1847643027
Excerpt:
Titanfall 2 hasn’t exactly had a hot girl summer. Since May, hackers have regularly hit Respawn Entertainment’s first-person shooter with direct denial of service (DDOS) attacks, making the game virtually unplayable. The situation hit a fever pitch yesterday, when viral social posts suggested hackers could actually obtain control of players’ computers. But Respawn, which acknowledged security concerns, said the issue was overblown.
=================================================================
It sounds like the TPM, Wavexpress and Wave software could have a big positive impact on Titanfall 2!!! With Riot (see post #246785 and Titanfall 2, Wave could be helping out the situation with these two along with other games. Steven and Michael Sprague may have moved on (that is unfortunate), but what they created with Wavexpress could still have big positive impact on the market. Windows 11 is going to require the TPM, but there are other users that will need the activation and managing capabilities of the TPM that Wave can provide for those with other Windows based computers!!! I believe Windows 11 comes out October 5th, so Wave has a huge opportunity. Wave could redevelop it's technology for games and videos if its not ready already!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Hackers Steal U.N. Data That Could Be Used for Future Government Cyberattacks
https://www.newsweek.com/hackers-steal-un-data-that-could-used-future-government-cyberattacks-1627648
Excerpt:
The hack, which was first reported by Bloomberg and later confirmed by the U.N., occurred sometime earlier this year. It is believed that a hacker entered the system by using a stolen username and password that Bloomberg reported were likely purchased off the dark web.
==================================================================
Wave VSC 2.0 (MFA) could have prevented this, and could be massively benefiting the U.N. and government and MANY other organizations. There is contact information for Wave below for Wave's awesome solutions!!!
Better security at less than half the cost!!!
You need multi-factor authentication. Fast. You need Wave Virtual Smart Card.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Attacker Breakout Time Now Less Than 30 Minutes
https://thecybersecurity.news/general-cyber-security-news/attacker-breakout-time-now-less-than-30-minutes-12673/?nowprocket=1
The common time it can take threat actors to go from original accessibility to lateral movement has fallen by 67% more than the past calendar year, placing additional pressure on security operations (SecOps) groups, according to CrowdStrike.
The findings come from the security firm’s own investigations with clients throughout all-around 248,000 one of a kind world endpoints.
For incidents wherever this “breakout time” could be derived around the previous calendar year, it averaged just 1 hour 32 minutes. Even so, in above a 3rd (36%) of intrusions, adversaries managed to move laterally to additional hosts in less than 30 minutes.
That reportedly would make the occupation of incident responders additional complicated. With lateral movement arrives the discovery of info to exfiltrate and new methods to deploy ransomware on.
Threat actors are also turning out to be extra stealthy. In 68% of detections indexed by CrowdStrike, no malware was employed at all. This usually means “living off the land” approaches and legitimate tooling was used to stay underneath the radar of classic security instruments.
In overall, the vendor detected a 60% improve in tried intrusions throughout all verticals and geographic regions concerning July 2020 and June 2021 as opposed to a 12 months previous.
Not all of this exercise is about knowledge collection and ransomware deployment. CrowdStrike recorded a 100% yr-on-yr maximize in crypto-jacking in interactive intrusions.
When it came to focused intrusions, China-centered threat actors had been the most prolific by considerably, accounting for 67% of incidents. Following arrived unattributed condition-backed attackers (20%), then Iran (7%) and North Korean (5%) actors.
“Over the past calendar year, companies confronted an unparalleled onslaught of advanced attacks on a each day foundation,” mentioned Param Singh, CrowdStrike’s VP of menace looking company Falcon OverWatch.
“In order to thwart modern adversaries’ stealthy and unabashed practices and procedures, it is crucial that organizations include both equally pro threat hunting and risk intelligence into their security stacks, layer machine-mastering enabled endpoint detection and reaction (EDR) into their networks, and have comprehensive visibility into endpoints to in the long run quit adversaries in their tracks.”
Some pieces of this posting are sourced from:
www.infosecurity-magazine.com
=================================================================
If organizations had Wave VSC 2.0, these hackers wouldn't be moving laterally across the network!!! They wouldn't get on the network because they are unknown and unapproved devices!!!
Better security at less than half the cost!!!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE