-
#cyberinsurance2
-
#cybersecurityinsurance2
-
#moveit1
-
#moveit hack1
-
5 Key Cybersecurity Trends of 20234
-
AI Cybersecurity Risk16
-
AI Tabletop Fail1
-
Anti-Corruption5
-
Artificial Intelligence Cybersecurity14
-
Attack Surface Areas31
-
Board of Director Cybersecurity Risk1
-
Board of Directors Cybersecurity1
-
Bots Against Us4
-
Celebrities Cybersecurity31
-
Celebrities Reputation32
-
Celebrity Cybersecurity31
-
Celebrity Reputation27
-
Celebrity Reputation and You3
-
Coronavirus Cyber Security Concerns2
-
Corprorate Cyber Security.43
-
Covid-19 + Cybersecurity2
-
Crisis Security30
-
Critical Infrastructure Cyber Risk15
-
Crypto4
-
Crypto Currency Market Meltdown3
-
Crypto Cybersecurity5
-
Cyber0
-
Cyber + Reputation Risk26
-
Cyber Reputation20
-
Cyber Reputation Control51
-
Cyber Reputation Management40
-
Cyber Reputation Risk34
-
Cyber Reputation Wealth21
-
Cyber risk0
-
Cyber Risk + Hazards1
-
Cyber Security41
-
Cyber Security Venture Capital19
-
Cyber Stalking5
-
Cyber Warfare24
-
Cyberinsurance by Digjjaks3
-
cybersecurity55
-
Cybersecurity + Reputation Management28
-
Cybersecurity for Water Utilities8
-
Cybersecurity in Time of Cyberwar11
-
Cybersecurity Insurance3
-
Cybersecurity Insurance Governance1
-
Cybersecurity of Covid-191
-
Cybersecurity of Mobile26
-
Cybersecurity Risk Vectors In Crypto7
-
Cybersecurity Trends10
-
Cybersecurity Wealth Reputation15
-
cyberwar25
-
Dalai VC1
-
Deep Fakes18
-
Developed by Digijaks6
-
Digijaks0
-
Digijaks Group Cybersecurity Insurance2
-
Digijaks Reputation Control21
-
Digijaks Services4
-
DigijaksAI0
-
Digital Defense20
-
Digital Diplomacy4
-
Digital Shield11
-
Disinformation4
-
Family Reputation Management19
-
Gov 2.013
-
Gov 3.010
-
Hack Schools1
-
Hacking Schools1
-
Hacking Unversities1
-
Identity5
-
Identity Reputation5
-
IoT Devices10
-
IoT Security30
-
Law Firm Cyber Risks3
-
Mobile Cybersecurity24
-
Navigating Privacy Security2
-
Online Reputation Control40
-
Online Reputation Management29
-
Online Reputation Security39
-
Personal Cyber security31
-
Platform/Service6
-
Quantum Computing15
-
Quantum Security4
-
Ransomware3
-
Renewable Energy Cyber7
-
Renewable Energy Reputations4
-
reputation0
-
Reputation + Cyber Risk17
-
Reputation + Cyber Risk of Quantum Computing12
-
Reputation and Cyber Personal Defenses8
-
Reputation Control36
-
Reputation Control and Management38
-
Reputation Management23
-
Reputation Management for Families15
-
Reputation Risk16
-
Reputation Security50
-
Reputation Security | Coronavirus2
-
Reputational Wealth Management21
-
School Hacking1
-
Social Engineering26
-
Social Media Cyber Security30
-
The Growing Threat1
-
US National Cyber Defense15
-
Venture Capital2
-
Venture Capital Cyber Security8
-
Wealth Repuation Cybersecurity10
-
Wealth Reputation Cybersecurity2
-
wealth security1
-
Weaponized Media7
Reputation Control. Cybersecurity. Recent OPM Hacks and You.
Reputation. Is hard to get, hard to maintain, hard to control; especially in an era of hacking by governments and criminals alke.
Cybersecurity is something many people long put off as a back burner decision, or lower funded priority, but in actuality is a critical need, now at the forefront of many leaders’ thinking due to the sheer number and audacity of the hacks from 2013 forward. There is a distinct triangulation between reputation control and cyber security and search results. The more things get hacked, the more information flows onto websites, both for sale, and for free, and the more the search engines index these results. Digijaks’ CEO Alan W Silberberg has written about this triangulation before as it relates to cyber security and how we all need to look at the this inter-relationship, and it’s effects on all of us.
The recent OPM hacks were so huge, the numbers are simply staggering that it is hard to process for most people, especially “regular people” who feel this does not affect them or their friends or family.
But in addition to the 21+ million social security numbers that were stolen in the OPM hack, so were over 1.1 million sets of people’s fingerprints. People who serve the US Government in all sorts of capacities, some secret, some not. So in addition to the notion of identity theft through the means we have become unfortunately accustomed to, like credit, social security and personally identifiable information (PII) — we now have to contend with the theft of biometrics.
It means every citizen, whether they believe the OPM hacks relate to them or not, have to start taking on steps to protect themselves. When a nation state can combine vast databases of personal information with biometrics for some of those same people; it means that nation state, or proxies or vendors it sells to could become one of us through surreptitious methods. It means identity theft is potential on a massive scale, as is exploiting people through their information in security clearance documents or medical records.
It means the push to make encryption weaker or illegal should actually be reversed to become a push to make encryption a standard for citizens; and one that is supported by our Government ln light of attacks and theft of information from tens of millions of US Citizens. The US Government through the Congress should adopt stringent laws making it hard not to encrypt personal information.
It means, think about what information you put in the cloud. Think about what information you put in social media. What information you never put into digital form. It means think about carrying a second and or even third form of identity in case you are ever challenged with not being you.
