-
#cyberinsurance2
-
#cybersecurityinsurance2
-
#moveit1
-
#moveit hack1
-
5 Key Cybersecurity Trends of 20234
-
AI Cybersecurity Risk16
-
AI Tabletop Fail1
-
Anti-Corruption5
-
Artificial Intelligence Cybersecurity14
-
Attack Surface Areas31
-
Board of Director Cybersecurity Risk1
-
Board of Directors Cybersecurity1
-
Bots Against Us4
-
Celebrities Cybersecurity31
-
Celebrities Reputation32
-
Celebrity Cybersecurity31
-
Celebrity Reputation27
-
Celebrity Reputation and You3
-
Coronavirus Cyber Security Concerns2
-
Corprorate Cyber Security.43
-
Covid-19 + Cybersecurity2
-
Crisis Security30
-
Critical Infrastructure Cyber Risk15
-
Crypto4
-
Crypto Currency Market Meltdown3
-
Crypto Cybersecurity5
-
Cyber0
-
Cyber + Reputation Risk26
-
Cyber Reputation20
-
Cyber Reputation Control51
-
Cyber Reputation Management40
-
Cyber Reputation Risk34
-
Cyber Reputation Wealth21
-
Cyber risk0
-
Cyber Risk + Hazards1
-
Cyber Security41
-
Cyber Security Venture Capital19
-
Cyber Stalking5
-
Cyber Warfare24
-
Cyberinsurance by Digjjaks3
-
cybersecurity55
-
Cybersecurity + Reputation Management28
-
Cybersecurity for Water Utilities8
-
Cybersecurity in Time of Cyberwar11
-
Cybersecurity Insurance3
-
Cybersecurity Insurance Governance1
-
Cybersecurity of Covid-191
-
Cybersecurity of Mobile26
-
Cybersecurity Risk Vectors In Crypto7
-
Cybersecurity Trends10
-
Cybersecurity Wealth Reputation15
-
cyberwar25
-
Dalai VC1
-
Deep Fakes18
-
Developed by Digijaks6
-
Digijaks0
-
Digijaks Group Cybersecurity Insurance2
-
Digijaks Reputation Control21
-
Digijaks Services4
-
DigijaksAI0
-
Digital Defense20
-
Digital Diplomacy4
-
Digital Shield11
-
Disinformation4
-
Family Reputation Management19
-
Gov 2.013
-
Gov 3.010
-
Hack Schools1
-
Hacking Schools1
-
Hacking Unversities1
-
Identity5
-
Identity Reputation5
-
IoT Devices10
-
IoT Security30
-
Law Firm Cyber Risks3
-
Mobile Cybersecurity24
-
Navigating Privacy Security2
-
Online Reputation Control40
-
Online Reputation Management29
-
Online Reputation Security39
-
Personal Cyber security31
-
Platform/Service6
-
Quantum Computing15
-
Quantum Security4
-
Ransomware3
-
Renewable Energy Cyber7
-
Renewable Energy Reputations4
-
reputation0
-
Reputation + Cyber Risk17
-
Reputation + Cyber Risk of Quantum Computing12
-
Reputation and Cyber Personal Defenses8
-
Reputation Control36
-
Reputation Control and Management38
-
Reputation Management23
-
Reputation Management for Families15
-
Reputation Risk16
-
Reputation Security50
-
Reputation Security | Coronavirus2
-
Reputational Wealth Management21
-
School Hacking1
-
Social Engineering26
-
Social Media Cyber Security30
-
The Growing Threat1
-
US National Cyber Defense15
-
Venture Capital2
-
Venture Capital Cyber Security8
-
Wealth Repuation Cybersecurity10
-
Wealth Reputation Cybersecurity2
-
wealth security1
-
Weaponized Media7
#panamapapers + Reputation Control + Cyber Security

The Panama Papers as released this past week are a really huge data dump, in fact one much larger in scale than that of Wikileaks, and the largest to date in history.
The project that resulted in this massive public disclosure, was essentially a cyber security lapse leading to a breach. Following the breach, data exfiltration was executed through leveraging a long known critical failure in the operating system and email servers that were used by the law firm, Mossack Fonseca.
Not only are the Panama Papers a stunning example of a hack that resulted in massive data exfiltration; thus consequently leading to a global reputation breach. But they are also representative of a slow to change cyber security environment in law firms, corporations and organizations globally.
Drupal, a widely used language for databases and other programs has been constantly been providing critical updates since it’s inception. Users of Drupal have to make the choice to keep their systems up to date, or as in this case, not.
The utter lack of cyber security protocols like updating a server, or dealing with over 25 issued critical updates to the operating system/servers bring to mind other major hacks like the Target Corporation hack where 60,000 alerts were ignored by corporate IT staff. This is the opposite of what cyber security protocols would dictate.
Law firm IT staff need to be amongst the first to adopt these basics; but often times are not, and many international law firms have mediocre to poor network security. In that area, the Panama Papers could be any law firm, anywhere. The reputation loss suffered by the cyber security lapse and breach could be any law firm’s clients, anywhere.
Digijaks has been working with clients for years to address the undeniable link between cyber security and reputation control. The Panama Papers simply serve as one more reason why these issues are so connected and so important to both people and organizations.