InvestorsHub Logo
Followers 31
Posts 1459
Boards Moderated 0
Alias Born 09/08/2012

Re: Rsarabjit post# 162936

Sunday, 05/14/2017 10:42:10 AM

Sunday, May 14, 2017 10:42:10 AM

Post# of 235036
The Post is not correct. Missing some Factors

In one of of posts I used it was stated both Products.

Sfors products prevent your keystrokes from being detected or and their two factor authentication is designed to make sure the correct user is signed on the network remotely. Ive tested both products.


SFOR has 3rd Product the Average Person would not be using ProtectID for Enterprise Systems and the Cloud.

Now on to this the next post:

I see. But how will sfor be needed by a cyber security company if their product is not designed to prevent hackers from hacking into servers, from malware or ransom ware attacks, security breaches due to viruses, human mistakes which allow the spread of these items or even windows, mac or android security vulnerability?

On a security level im asked these questions at work all the time.Now thankfully the healthcare system that i work for is always on top of this and we have never been breached but for smaller systems its very possible.


In the recent ACS Webinar, it was stated both ProductID and Keystroke Encryption would be Combined.

Let's take your average PC tied to a companies Network.

A user Logs in using OBB MFA. Ok say he opens a Email, or goes to a site clicks a Link and gets hit with Malware. The malware needs a Username Password to gain access to the main server.

The Keystroke Encryption prevents the Malware from Gaining Access to the Username and Password.

The Malware is trapped inside the PC, with No way out. "The Roach Motel Syndrome"

Plus with ProductID MFA you would need access to the Users Mobile Device to perform another Factor for Access to the system. This is an Example of the Combined Products.

Even if Keystroke Encryption were not included, and the Malware had the User Name and Password, the Malware Hacker would need to get around the statement in Green above. Unless the Malware Hacker has access to the Person's Fingerprint or other Biometrics, needed for Authentication, the Hacker is not going to be able to Gain Access to the System.

And Again, I repeat what was stated in my Previous Post:


Attack would be Impossible to Protect Against.

If Operating System was not kept Updated.

This Ransomware Attack exploited a Hole in the Windows Operating System and it was by an NSA Program "ETERNALBLUE" somehow a copy of was stolen and being used by Hackers. And apparently the companies Hit by the Attack had not done Windows updates that would have prevented the attack or plugged the Hole.

Once inside the Operating system, you just need to create an Account and make yourself a System Administrator Acct. Then and you can do anything.








Think outside the Box