USA Sourced #PPE for #Covid19 Response

Coronavirus Cyber Security Concerns, Covid-19 + Cybersecurity, Covid19 Supplies, Crisis Security, Cyber Security, Cybersecurity of Covid-19, Personal Cyber security, Reputation Control and Management, Reputation Security | Coronavirus
Digijaks Group Covid19 Response Digijaks Group started Covid19 response by working with our cybersecurity clients in February 2020. We were asked to help source and validate vendors for PPE (Personal Protective Equipment). The focus was naturally heavily on China based suppliers. This was basically because China was and still is the Worlds primary supplier of PPE, for now. Since then we have secured items like masks, gowns, sanitizer, face shields, as well as gloves, and more detailed equipment like Ventilators for clients across the Globe. We have helped Doctors, Dentists, Nursing Homes, Native American Tribes, as well as small first responder groups. The Covid19 crisis presents an ongoing dilemma for those medical groups in need of PPE. The pandemic is alive and spreading, and the global shortages of PPE has…
Read More
Digijaks has uncovered multiple Covid19 scams – #PPE fraud operations in use in 2020.

Digijaks has uncovered multiple Covid19 scams – #PPE fraud operations in use in 2020.

Coronavirus Cyber Security Concerns, Corprorate Cyber Security., Covid-19 + Cybersecurity, Covid19 Supplies, Crisis Security, Cyber Reputation Control, Cyber Security, Cybersecurity, Cybersecurity of Covid-19, Gov 2.0, Online Reputation Management, Online Reputation Security, Personal Cyber security, Reputation Control, Reputation Control and Management, Reputation Security
We have been involved directly in providing cyber and buyer security in the fight against the covid19 virus. However we have also been involved in the fight against the virus of fake vendors, fake merchandise and fraudulent operations targeting everyone in need of personal protection equipment, or #PPE as it is known. As such, we have encountered hundreds of companies in the past three months. In the USA. In China. In Europe. In other Asian countries. In UK. In Africa. We have been approached by Governments, and those pretending to be affiliated with one. We have been approached by Hospitals, and those pretending to be affiliated with one. We have been approached by legitimate companies offering to sell registered, certified materials, and we have been approached by companies offering to…
Read More
Crisis Security for Covid19

Crisis Security for Covid19

Covid-19 + Cybersecurity, Covid19 Supplies, Crisis Security, Cyber Security, Cybersecurity, Cybersecurity of Covid-19
Digijaks created the ability to obtain bulk medical supplies, from only the largest, certified medical equipment and materials companies, that already supply hospitals in the EU and some already in the US as well. Covid19 Supplies is part of our planning for crisis security. Please visit the Covid19 Supplies and Provisions store here. Sometimes is in the form of preventing hackers from getting deeper. Sometimes it is about assessing and preparing for something bigger coming. Sometimes it is quite literally what you say and how you say it. Other times it comes down to ability to get things in high demand during an emergency. So after listening to many news reports, and talking with dozens of health care specialists as well as logistics experts; we made the decision to add…
Read More

5 Key #CyberSecurity Trends for 2020

Cyber Security, Cyber Warfare, IoT Security, Online Reputation Control, Online Reputation Security, Reputation Security, Social Engineering, Social Media Cyber Security, Weaponized Media
5 Key Cyber Security trends of 2020 by Digijaks CEO Alan W. Silberberg 2020 is going to be lit, at least in the cyber world. We are not talking about the fireworks from New Year's Eve celebrations. Nor are we talking about the circus in Washington, DC, or any other world capitol. One day snapshot of Digijaks CEO Twitter account @ideagov So, what is coming in 2020? What do we need to be looking for? Polymorphic Malware + Artificial Intelligence. Continued at #1 from 2019 trends due to ever increasing use and now fully automated attacks as well. What the heck is polymorphic malware you may be asking? Basically, in the most simple terms, it is malware that changes upon detection, or "morphs" into a new form, or goes into…
Read More

Cyber Security | Reputation Control For Regular People

Cyber Security, Cybersecurity, Digijaks Reputation Control, Family Reputation Management, Online Reputation Control, Online Reputation Management, Online Reputation Security, Reputation Control, Reputation Management for Families, Reputation Security, Social Media Cyber Security
Cyber Security. Reputation Control. Two terms laden with secret meanings and often high (sometimes perceived) costs to remediate dangerous and or embarrassing situations. Bad things resulting from hacks of digital networks, devices, identity theft, corporate espionage and other digital crimes and forms of cyber attacks. After almost 9 years of offering cyber security and reputation control services to larger companies and governments; it has become clear that there is a very specific and unmet need for regular people to get access to premier cyber security services. I literally cannot count how many late night phone calls, emergency text messages and social media direct messages from regular people. They are people who are often part of a larger organization, but are not given access to the cyber security their company or…
Read More

Cyber Security of Weaponized Media in a Socially Engineered World

Corprorate Cyber Security., Cyber Security, Cyber Warfare, Cybersecurity, cyberwar, Digital Defense, Gov 2.0, IoT Security, Online Reputation Control, Reputation Security, Social Engineering, Social Media Cyber Security, US National Cyber Defense, Weaponized Media
I.     Introduction The world is seeing an ongoing multi-faceted cyber attack(s) (social engineering) that uses weaponized fake media, digital false flags and other digitally obfuscated materials. These attacks stem from nation states, paid hacker cartels and mercenary hackers globally. These cyber security attacks utilize social engineering, weaponized media and fake media. We have been studying these socially engineered attacks since 2009, and have created unique responses to them. II.    Main body The Green Revolution of 2009 in Iran marked the first known use of weaponized social media. The Government of Iran utilized Twitter to get western citizens to spread their propaganda. Fast forward to 2016, where USA itself was attacked through long term, dedicated weaponized media cyber assault on our democracy; and government alike by Russia and its agents. This…
Read More
Modern Information Warfare Hits Hard

Modern Information Warfare Hits Hard

Cyber Reputation Control, Cyber Security, Cyber Warfare, Cybersecurity, cyberwar, Digital Defense, Online Reputation Security, Reputation Control, Reputation Control and Management, Reputation Security, Social Engineering, Social Media Cyber Security, US National Cyber Defense
2016 was just the latest in #cyberwar; and #informationwarfare attacks where even bills were introduced in Congress. It has been ongoing as long as there have been digital mediums and technologies; and information distribution technology. My company saw it happening last year and got more and more concerned as the election grew closer. We literally wrote letters to people in government, people at the DNC and elsewhere, basically yelling as loudly as we could that the #USA was being cyber and information warfare attacked.   As a cyber security, and weaponized information expert - it was all too clear what was happening. It has left a feeling of being sick in the stomach for a year now, and this feeling has not abated. Because it has not ended. For millions of Americans and millions of…
Read More

Digijaks CEO Speech at US Army CyberTalks NYC

Corprorate Cyber Security., Cyber Reputation Control, Cyber Security, Cyber Warfare, Cybersecurity, cyberwar, Digital Defense, Digital Diplomacy, Gov 2.0, IoT Security, Online Reputation Control, Reputation Control, Reputation Control and Management, Reputation Security, Social Engineering, Social Media Cyber Security, US National Cyber Defense
https://www.youtube.com/watch?v=eX5Rgp2QmoU&feature=youtu.be  
Read More
Reputation Control. Who Controls Your Cyber Reputation?

Reputation Control. Who Controls Your Cyber Reputation?

Cyber Reputation Control, Cyber Security, Cybersecurity, Digijaks Reputation Control, Online Reputation Control, Reputation Control, Reputation Control and Management, Reputation Management, Reputation Security, Social Engineering, Social Media Cyber Security, Venture Capital
Every day we hear of more stories of people's Reputation getting smashed instantly online. On a personal level it just plain sucks, and causes mounds of heartache, headache, paperwork, and costs. To a business or a brand, there are risk mitigation and compliance issues, trademark defense costs, and reputations getting taken down, despite having been built up over years or decades. It could be any trigger. Even, a mistaken identity or you share the same name as someone who gets in trouble. Or it could be malicious from criminals, or cyber hackers looking to steal your identity, or file false tax returns to claim fake refunds, or to make it appear you were the one who did something when in reality it was someone pretending to be you. The problem…
Read More