InvestorsHub Logo
Followers 5
Posts 2748
Boards Moderated 0
Alias Born 09/06/2006

Re: None

Tuesday, 02/05/2019 5:01:39 PM

Tuesday, February 05, 2019 5:01:39 PM

Post# of 249083
Charges Against Chinese Hackers Are Now Common. Why Don't They Deter Cyberattacks?

https://www.npr.org/2019/02/05/691403968/charges-against-chinese-hackers-are-now-common-why-dont-they-deter-cyberattacks
==================================================================
Important Tweet below which could help shape a new direction in the article above. The synopsis below hopefully makes it easier to understand known/unknown devices if not already understood.

If the Chinese hackers had to logon to computers/devices that were unknown with stolen credentials (passwords), the network wouldn't recognize them, and they wouldn't be allowed on. If the computer had an activated Trusted Platform Module (TPM) that was recognized by the network (known device) and the user put in the proper PIN they would get onto the network (sensitive possibly) via a product like Wave VSC 2.0. Basically, this keeps attackers who are in possession of stolen credentials (passwords) from being able to get onto a sensitive network by using their computer/device since their device is unknown.

Why not use Steven Sprague's recent tweet while also including other critical industries? Unfortunately, his tweet was probably suggested by him many years ago, and the Chinese are still beating out the United States' cybersecurity and the arrests seem to not faze them.

The tweet was:

The previous post has an article that really sums up why the market should put Steven Sprague's statement into action!
=================================================================
https://www.wavesys.com/products/wave-virtual-smart-card

https://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management

Here’s how it works:

Trusted Platform Module (TPM) + Wave’s ERAS for TPM Management = hardware-secured, fully-managed authentication

Most of your devices already come with TPMs (check out our “What is a TPM?” brochure if you’re not sure why this is exciting). This security chip comes attached to the motherboard of most enterprise-class PCs. There’s nothing “add-on” about it. The TPM provides a verifiable, unique identity for each machine.

Wave’s ERAS for TPM Management gives IT remote, centralized management of all TPMs on enterprise computers and tablets.

With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.



Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.