top of page

EndpointLock™ Keystroke1 Encryption Software & Employee ID Theft Coverage from Advanced Cyber Security Corp. 
 

In a Meeting


 

Help protect your employees' PC and mobile devices from risks associated with data-stealing keyloggers by encrypting all text typed into devices with EndpointLock Keystroke Encryption Software App. EndpointLock comes with built-in unlimited Dark Web Scanning. Add Fully Managed Recovery and $25,000 in personal ID theft coverage for a comprehensive ID Theft plan.

About EndpointLock Keystroke Encryption:

Corporate security typically includes strong endpoint protection as part of a data protection security plan. Unfortunately, rarely does the perimeter extend to the keystrokes, where undetected polymorphic keyloggers steal the credentials often leveraged to advance a breach. Polymorphic malware is a type of malicious software that changes its code and appearance to evade detection. Studies show that today, over 90% of malware has polymorphic capabilities. With the rapid growth of open-source AI and its ability for hackers to create polymorphic keyloggers, the perimeter must be expanded again to include the vulnerable area where data is created, at the keystroke level. This protection is now called “Keystroke Transport Layer Security” or KTLS. 

 

Freely available AI like ChatGPT expanded rapidly with 100M customers and 1B site visitors in just the first two months of its launch and has changed the landscape of cybersecurity. AI is an important tool when used by businesses and employees, but it comes with a new risk. It provides hackers the perfect tool to create polymorphic keyloggers and deploy to endpoints at record speed. These keyloggers cannot be detected by anti-virus and they capture all sensitive data before a VPN ever has a chance to protect the data.

 

Keyloggers have become increasingly evasive, as shown in a recent breach of one of the most popular password protection managers, LastPass. This was accomplished by exploiting a vulnerability in a third-party software package and installing a keylogger on one of the four individuals who had access to the secured environment that protected millions of passwords. This keylogger allowed the hacker to bypass the multifactor authentication and all other security systems in place and take control of the decryption keys required to access the protected storage environment.

 

Keystroke Transport layer Security “KTLS” is very different and should not be confused with anti-virus , VPN’s, SSL, TLS Encryption or file and database encryption. Even with all other encryption protocols in place everything the user types is vulnerable to being captured by an undetected keylogger. By adopting the KTLS protocol, you will be utilizing EndpointLock™ Keystroke Encryption Software and encrypt everything typed into the device. This will make the keystrokes unreadable to all undetected keyloggers hiding on a device waiting to steal data as it is being created. Read more on the AI story and the LastPass breach in the links below.

 

*Third-party service providers discussed herein, though not affiliates of The Hartford, are pre-approved by The Hartford to provide cyber-related services. You are not required to avail yourself of their services. Sharing any information with any such vendor is at your sole discretion. References to any vendor are provided for your convenience only and are not intended as a substitute for your own due diligence and selection of vendors to suit your company’s needs. The vendors are independent contractors that charge their own rates. Discounted rates offered by any vendor are not offered by The Hartford, nor on any premium for a policy of insurance. Any such vendor discount is subject to change without notice and is not guaranteed by The Hartford. The Hartford does not warrant the performance or services of the vendors or their websites. The Hartford assumes no responsibility for the control, correction or legal compliance of your cyber security measures or other business practices and operations. Notice of any claim, act, fact or circumstance to a vendor does not constitute notice thereof to The Hartford. Approved vendors are current as of June 2023 and may change at our discretion at any time, with or without notice.

 

**Identity Theft Insurance underwritten by insurance company subsidiaries or affiliates of American International Group, Inc. The description herein is a summary and intended for informational purposes only and doesnot include all terms, conditions and exclusions of the policies described. Please refer to the actual policies for terms, conditions, and exclusions of coverage. Coverage may not be available in all jurisdictions.
 

Reference: Digital Guardian

The Hartford Logo - Square.jpg

Download the latest literature:

Contact Michael Swift direct:

631.848.3553

mswift@advancedcybersecurity.com


 
Contact Steve Stone direct:

973.342.8956

sstone@advancedcybersecurity.com

© 2023, Advanced Cyber Security Corp.

bottom of page