5 Key Cyber Security Trends for 2019

5 Key Cyber Security Trends for 2019

Cyber Reputation Control, Cyber Reputation Management, Cyber Security, Cybersecurity, Digijaks Reputation Control, Online Reputation Management, Reputation Control, Reputation Control and Management, Reputation Security, Social Engineering, Social Media Cyber Security
So what are the Cyber Security trends of 2019? Digjaks CEO Alan W. Silberberg lays out some areas we all need to be paying attention to in 2019.  2019 is going to be lit, at least in the cyber world. We are not talking about the fireworks from New Year's Eve celebrations. Nor are we talking about the circus in Washington, DC. Rather. The cyber security world is hopping. Hacks all around. Major companies revealing breaches affecting millions and hundreds of millions at once. Just to name a few companies this year that have actually admitted to breaches, with "admitted" being key phrase, as many companies still do not do timely breach reports: Marriot (500,000,000+) membership accounts breached. Google+ is being shut down after two breaches revealed affecting 50,000,000 +…
Read More
#CyberSecurity #DigitalDiplomacy 2017

#CyberSecurity #DigitalDiplomacy 2017

Cyber Reputation Control, Cyber Reputation Management, Cyber Warfare, Cybersecurity, cyberwar, Digital Diplomacy, Gov 2.0, Online Reputation Control, Reputation Control, Reputation Control and Management, Reputation Security, Social Engineering, Social Media Cyber Security
#Digitaldiplomacy and #Cybersecurity on a Rough Patch in 2017. The last several years have seen an explosion of digital diplomacy tools and techniques. This is driven by an ongoing growth in technology platforms; and social media combined with the increased numbers of world Governments adopting open data and open government principles. There has also been a parallel explosion in fake social media, fake news and fake information being propagated globally. The effect of the combined forces is that cybersecurity is now playing an even more vital role in digital diplomacy. Where digital diplomacy just a few years back was between recognized principals of Governments, now there are lots of other players trying to make that communication much more failure prone. Additionally we now have leaders using Twitter and other tools…
Read More

#panamapapers + Reputation Control + Cyber Security

Anti-Corruption, Corprorate Cyber Security., Cyber Reputation Control, Cyber Reputation Management, Cybersecurity, Digijaks Reputation Control, Online Reputation Control, Reputation Control, Reputation Management, Reputation Security
[caption id="attachment_2095" align="aligncenter" width="528"] Cyber Security, Social Media, You.[/caption] The Panama Papers as released this past week are a really huge data dump, in fact one much larger in scale than that of Wikileaks, and the largest to date in history. The project that resulted in this massive public disclosure, was essentially a cyber security lapse leading to a breach.  Following the breach, data exfiltration was executed through leveraging a long known critical failure in the operating system and email servers that were used by the law firm, Mossack Fonseca. Not only are the Panama Papers a stunning example of a hack that resulted in massive  data exfiltration; thus consequently leading to a global reputation breach. But they are also representative of a slow to change cyber security environment in…
Read More

Emergency Social Media and You in Crisis

Corprorate Cyber Security., Cyber Reputation Control, Cyber Reputation Management, Cyber Security Venture Capital, Cyber Warfare, Cybersecurity, Digijaks Reputation Control, Digital Defense, Gov 2.0, Online Reputation Control, Online Reputation Management, Online Reputation Security, Reputation Control, Reputation Control and Management, Reputation Management, Reputation Security, Social Engineering, Social Media Cyber Security, Venture Capital Cyber Security
Many people must feel the 2015 holiday break could not have arrived soon enough what with terrorism, crazy weather and other events that get covered rightly or wrongly in social media. While these can be scary and confusing times, they can also be times to educate, learn and help one another to understand a new reality we are all living in now. There are specific tactics and strategies for understanding how live events unfold in social media and these can be instructive to the general public about what you are seeing and when, during events like these past weeks that we have all experienced. Real life events almost always flow to the internet in a micro second. Knowing how to tell the difference between truth and fiction could be critical…
Read More

#cybersecurity The Gift everyone needs for the Holidays!

Cyber Reputation Control, Cyber Reputation Management, Cyber Security Venture Capital, Cybersecurity, cyberwar, Digijaks Reputation Control, Online Reputation Management, Online Reputation Security, Personal Cyber security, Reputation Control, Reputation Security, Social Engineering, Social Media Cyber Security, Venture Capital Cyber Security
Happy Holidays. It is, as is so commonly mentioned in the media: "That Time of Year Again." Yup. Packages. Shiny New Things. Cool Toys for the Kids and kid-adults alike. It is also the time of year of increased cyber crime attempts aimed at retailers. Add also the time of year when more families and organizations introduce new varieties of malware, ad-malware, viruses, worms, bad bots and devices that phone "home" into our homes, workplaces and civic spaces. https://twitter.com/IdeaGov/status/668911020937580544?ref_src=twsrc%5Etfw How? Because many devices are coming pre-loaded with malware. How many parents look into the workings of a cheap tablet before handing it off to the kids? How many people are checking new apps to see the permissions being requested on those new devices and old ones too? How many companies are…
Read More
Reputation Control for Kids by Social Media, Search Results

Reputation Control for Kids by Social Media, Search Results

Cyber Reputation Control, Cyber Reputation Management, Digijaks Reputation Control, Digital Defense, Online Reputation Control, Online Reputation Management, Online Reputation Security, Reputation Control, Reputation Management, Reputation Management for Families, Reputation Security
In Digijaks daily course of business with reputation management we come across a lot of people (adults) who have seen their life get turned upside down because of something appearing in search results that negatively affect them. This happens so much, and so often it has created a whole industry to deal with it. Search results leading to problems to people happen for many reasons. I recently wrote about this problem on the Huffington Post as it relates to adults. But this same correlation exists for kids, for families and the same problems may arise, but with lifelong implications. Imagine being an 11 year old who innocently posts a picture or a quote or a poem or a location, thinking nothing of it. Fast forward 6 years to college applications.…
Read More

Cybersecurity: Now the Crossover from Cyber to Real Life

Corprorate Cyber Security., Cyber Reputation Control, Cyber Reputation Management, Cyber Warfare, Cybersecurity, cyberwar, Developed by Digijaks, Digital Defense, Digital Shield, Gov 2.0, Online Reputation Control, Online Reputation Security, Personal Cyber security, Reputation Control, Reputation Control and Management, Reputation Management, Reputation Security, Social Engineering
[caption id="attachment_2095" align="aligncenter" width="300"] Cyber Security, Social Media, You.[/caption] Cybersecurity used to be be the geek's eagle's nest. it was hard to understand, hard to get to, hard to see the impact and need often times. If there was a CIO or CISO, he/she would not be in the board room too often, and usually the budgets were the first to go in any budget change environment. But the cycle switched. Now we are in the opposite cycle. The CIO and CISO are ruling the roost and commanding serious budgets and attention. But being missed in all the excitement is this: The Crossover from pure cyber crime to real world crime from the same instance. It is safe to say, times have changed. Now - Cybersecurity has become a word…
Read More

Reputation Control. Cybersecurity. Recent OPM Hacks and You.

Corprorate Cyber Security., Cyber Reputation Control, Cyber Reputation Management, Cyber Warfare, Cybersecurity, cyberwar, Digijaks Reputation Control, Digital Defense, Gov 2.0, Gov 3.0, Online Reputation Control, Online Reputation Management, Online Reputation Security, Reputation Control, Reputation Control and Management, Reputation Management, Reputation Management for Families, Reputation Security, Social Media Cyber Security, US National Cyber Defense
Reputation. Is hard to get, hard to maintain, hard to control; especially in an era of hacking by governments and criminals alke. Cybersecurity is something many people long put off as a back burner decision, or lower funded priority, but in actuality is a critical need, now at the forefront of many leaders' thinking due to the sheer number and audacity of the hacks from 2013 forward. There is a distinct triangulation between reputation control and cyber security and search results. The more things get hacked, the more information flows onto websites, both for sale, and for free, and the more the search engines index these results. Digijaks’ CEO Alan W Silberberg has written about this triangulation before as it relates to cyber security and how we all need to…
Read More

What the Hack of the US Government Means to You.

Anti-Corruption, Corprorate Cyber Security., Cyber Reputation Control, Cyber Reputation Management, Cyber Warfare, Cybersecurity, Online Reputation Control, Online Reputation Security, Personal Cyber security, Reputation Control, Reputation Control and Management, Reputation Management, Reputation Security, Social Engineering, Social Media Cyber Security, US National Cyber Defense
As the CEO of a cyber security and reputation company, I have to admit to not being surprised by the recent successful hacking and penetration of the US Government. While the scope of the recent events is most definitely shocking, myself and others have been researching, writing about it and trying to push and pull officials to focus on the whole set of threats, not just the known ones, and not just the data hardening ones. This recent set of hacking and penetration successes were definitely done by a Nation State, China in most probability. But guess what? The intrusion was apparently found by a Vendor doing a sales pitch to the US Government, and not by the billions of dollars of hardened equipment or custom platforms designed to stop…
Read More

Correlation of Wealth and Reputation Management

Anti-Corruption, Corprorate Cyber Security., Cyber Reputation Control, Cyber Reputation Management, Cyber Security Venture Capital, Cybersecurity, Developed by Digijaks, Digijaks Reputation Control, Digital Defense, Digital Shield, Online Reputation Control, Online Reputation Management, Online Reputation Security, Personal Cyber security, Reputation Control, Reputation Control and Management, Reputation Management, Reputation Management for Families, Reputation Security, Social Engineering, Social Media Cyber Security, Venture Capital Cyber Security
Wealth. We all want it, work for it and strive for it throughout lives and careers. Reputation. We all have one. It us up to us to define it, scale it and defend it. Which one is more valuable? Which one brings more of the other? This is a two sided question. To some people, money is everything. To others, their reputation is everything, with money or without. While most people might reflexively think that money is more important, others will emphatically state that reputation management is paramount. Some recent studies weigh in on the side of reputation. Reputation expert Michael Fertik recently weighed in on the issue in the UK's Guardian Paper. Digijaks CEO Alan W. Silberberg feels that money and reputation are completely intertwined; and that this effectively…
Read More