InvestorsHub Logo
Followers 5
Posts 2522
Boards Moderated 0
Alias Born 09/06/2006

Re: None

Friday, 08/16/2019 7:49:47 PM

Friday, August 16, 2019 7:49:47 PM

Post# of 248741
3,813 breaches were reported through June 30, exposing over 4.1 billion records

https://www.helpnetsecurity.com/2019/08/16/2019-midyear-quickview-data-breach-report/

The number of reported breaches has gone up by 54% and the number of exposed records by 52% compared to the first six months of 2018 according to the 2019 MidYear QuickView Data Breach Report, released by Risk Based Security.

The research shows that eight breaches reported within Q1 and Q2 of 2019 accounted for 3.2 billion records exposed; three of these being among the largest breaches of all time.

“Looking over the first six months of 2019, it is hard to be optimistic on the outlook for the year,” commented Inga Goddijn, Executive Vice President of Risk Based Security. “The number of breaches is up and the number of records exposed remains stubbornly high. Despite best efforts and awareness among business leaders and defenders, data breaches continue to take place at an alarming rate.”

The MidYear QuickView Data Breach Report tracks publicly disclosed breaches and records exposed within 2019 so far. The key findings state that The Business Sector accounted for 67% of reported breaches, which continues the trend observed in the Q1 2019 report. From these breaches, further analysis states that The Business Sector was then responsible for 84.6% of records exposed.

When asked about her observations on this activity, Ms. Goddijn commented, “Quarter after quarter the pattern has repeated itself. The vast majority of incidents are attributable to malicious actors outside an organization. Unauthorized access of systems or services, skimmers and exposure of sensitive data on the Internet have been the top three breach types since January of 2018. However, insider actions, both malicious and accidental, have driven the number of records exposed.”

Unauthorized access of systems or services, referred to as hacking in the report, is still the number one breach type with phishing being a tried and true first step for gaining access to systems and services. Interestingly enough, phishing for credentials often leads to providing attackers with access to users’ email accounts.

While the data held in email may not be as easily monetized as other datasets, it does lead to the exposure of unusual or unexpected types of data. Some of the more unusual data elements exposed this year include electronic signatures, calendars, marriage certificates, and company issued employee ID numbers.

Ms. Goddijn concluded, “While the landscape does look bleak, we have seen bright spots this year. Some organizations are choosing to report incidents that might have gone unreported in the past. The most recent example of this came up just a few days ago, when Monzo Bank opted to report customers’ account PINs being inadvertently stored in internal logs that were accessible to their engineering teams. Once the issue was identified, the bank had it corrected and disclosed within 5 days. A breach is rarely good news but a fast response coupled with open communication speaks well of the organization. We hope to see more organizations following Monzo’s lead as the year unfolds.”
==================================================================
If Wave VSC 2.0 makes up a small part of the two factor authentication market (it shouldn't!), it's safe to assume that 3,813 breaches were a result of the other two factor authentication products not being able to protect like Wave has tested successfully in well renowned organizations!! One two factor authentication product covers 25,000 organizations and there are 3,813 BREACHES IN SIX MONTHS!! How effective are products like these at protecting organizations from breaches?! Wave VSC 2.0 is better security at less than half the cost!!!
==================================================================
Please read the Wave Virtual Smart Card White Paper link within the link below.

https://www.wavesys.com/virtual-smart-card-2.0-from-wave
==================================================================
Unauthorized access shouldn't happen. Please read the '1. known devices on the network' - (enabling Trusted Computing) below.

https://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management

Secure device & user authentication

Sometimes it feels like security is more effective at deterring your users than hackers. But you still have to protect your enterprise resources, and we’re here to help. We take pride in securing your network, data, and resources to an unprecedented level, without causing a revolt from either IT or your users. In fact, your users probably won’t even know we’re there.

Here’s how it works:

Trusted Platform Module (TPM) + Wave’s ERAS for TPM Management = hardware-secured, fully-managed authentication

Most of your devices already come with TPMs (check out our “What is a TPM?” brochure if you’re not sure why this is exciting). This security chip comes attached to the motherboard of most enterprise-class PCs. There’s nothing “add-on” about it. The TPM provides a verifiable, unique identity for each machine.

Wave’s ERAS for TPM Management gives IT remote, centralized management of all TPMs on enterprise computers and tablets.

With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.

Token-free, password-free user authentication

We know you’ve dreamt about shredding your list of passwords. Go on and do it.

Because you are starting the authentication process in the device’s hardware, the user doesn’t have to interact with it. All users see is their usual Windows log-in screen – no more additional passwords to access the VPN or other resources. They just sign in once, and the secure credentials in their TPMs securely and quickly connect them to everything they need. Say goodbye to user frustration and slow OS performance.

Decrease expenses with virtual smart cards

You know what else happens when you take passwords out of the equation? A lot fewer calls to IT. Imagine if you took password resets out of the picture – that frees up a chunk of IT time, lowering your operating expenses significantly.

If your organization currently uses traditional tokens or smart cards, switching to virtual smart cards takes an even bigger burden off of IT – we use the hardware-protected credentials in the TPM to create a virtual smart card, which performs the same functionality as traditional smart cards. That means no need to purchase, deploy, replace or maintain external tokens, smart cards or smart card readers. Because virtual smart cards are already on your machines and can’t be forgotten, lost or stolen, you have lower capital expenses and lower operating expenses.
==================================================================

The links below can help organizations with enabling better cybersecurity solutions:

https://www.wavesys.com/

https://www.wavesys.com/contact-information












Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.