Category - Cyber Reputation Management

Cyber Security of Weaponized Media in a Socially Engineered World

The world is seeing an ongoing multi-faceted cyber attack(s) (social engineering) that uses weaponized fake media, digital false flags and other digitally obfuscated materials. These attacks stem from nation states, paid hacker cartels and mercenary hackers globally.
Read More

Digijaks CEO Speech at US Army CyberTalks NYC

Digijaks CEO Alan W. Silberberg addresses U.S. Army Cyber Talks NYC 2016
Read More

Reputation Cyber Security of IoT.

There is no current "IOT cybersecurity standard" or anything close. As a result, the apps and tools that seemingly make your life so easy, are in most probability leaking, if not pouring personal information about you or your family onto the internet in ways you may or may not be aware of.
Read More

Reputation Management and Control

Face it. The Internet is a hostile place for your reputation and your brand, whether that is personal, corporate or government. The control and management of your reputation start and end with you. As we enter 2015, it is worth paying attention to, in fact it is important to take stock of your online reputation, the management of it and the control of it. It is yours. Not anyone else.
Read More
Reputation Control and Cybersecurity

Reputation Control for Kids by Social Media, Search Results

We all need to work with our kids to help them understand the direct linkage between social media use and search results that can and will last a lifetime.
Read More

Reputation Control. Cybersecurity. Recent OPM Hacks and You.

It means, think about what information you put in the cloud. Think about what information you put in social media. What information you never put into digital form. It means think about carrying a second and or even third form of identity in case you are ever challenged with not being you.
Read More