Much of the advice includes practices that should already be in place for federal contractors, such as using strong passwords, multi-factor authentication and automated tracking of unauthorized users on a network. ================================================================== automated tracking of unauthorized users on a network??? Didn't Wave have a better idea in not allowing unknown and unapproved (unauthorized) devices access to the network?! It would be better advice on how to stop nation-states!!! ================================================================== http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.