5 Key Cyber Security Trends for 2019

5 Key Cyber Security Trends for 2019

Cyber Reputation Control, Cyber Reputation Management, Cyber Security, Cybersecurity, Digijaks Reputation Control, Online Reputation Management, Reputation Control, Reputation Control and Management, Reputation Security, Social Engineering, Social Media Cyber Security
So what are the Cyber Security trends of 2019? Digjaks CEO Alan W. Silberberg lays out some areas we all need to be paying attention to in 2019.  2019 is going to be lit, at least in the cyber world. We are not talking about the fireworks from New Year's Eve celebrations. Nor are we talking about the circus in Washington, DC. Rather. The cyber security world is hopping. Hacks all around. Major companies revealing breaches affecting millions and hundreds of millions at once. Just to name a few companies this year that have actually admitted to breaches, with "admitted" being key phrase, as many companies still do not do timely breach reports: Marriot (500,000,000+) membership accounts breached. Google+ is being shut down after two breaches revealed affecting 50,000,000 +…
Read More
Digijaks CEO Speech at US Army CyberTalks NYC

Digijaks CEO Speech at US Army CyberTalks NYC

Corprorate Cyber Security., Cyber Reputation Control, Cyber Security, Cyber Warfare, Cybersecurity, cyberwar, Digital Defense, Digital Diplomacy, Gov 2.0, IoT Security, Online Reputation Control, Reputation Control, Reputation Control and Management, Reputation Security, Social Engineering, Social Media Cyber Security, US National Cyber Defense
https://www.youtube.com/watch?v=eX5Rgp2QmoU&feature=youtu.be  
Read More

#panamapapers + Reputation Control + Cyber Security

Anti-Corruption, Corprorate Cyber Security., Cyber Reputation Control, Cyber Reputation Management, Cybersecurity, Digijaks Reputation Control, Online Reputation Control, Reputation Control, Reputation Management, Reputation Security
[caption id="attachment_2095" align="aligncenter" width="528"] Cyber Security, Social Media, You.[/caption] The Panama Papers as released this past week are a really huge data dump, in fact one much larger in scale than that of Wikileaks, and the largest to date in history. The project that resulted in this massive public disclosure, was essentially a cyber security lapse leading to a breach.  Following the breach, data exfiltration was executed through leveraging a long known critical failure in the operating system and email servers that were used by the law firm, Mossack Fonseca. Not only are the Panama Papers a stunning example of a hack that resulted in massive  data exfiltration; thus consequently leading to a global reputation breach. But they are also representative of a slow to change cyber security environment in…
Read More
Cybersecurity Dilemna -A Conundrum-

Cybersecurity Dilemna -A Conundrum-

Corprorate Cyber Security., Cyber Reputation Control, Cyber Security Venture Capital, Cyber Warfare, Cybersecurity, Digital Defense, Online Reputation Control, Online Reputation Security, Reputation Control, Reputation Control and Management, Reputation Management, Reputation Security, Social Engineering, Venture Capital Cyber Security
  co·nun·drum kəˈnəndrəm/ noun noun: conundrum; plural noun: conundrums a confusing and difficult problem or question. "one of the most difficult conundrums for the experts" This is the conundrum of the digital age. One one hand executives of a company will be the first to state they think their systems are secure, and if there are any problems they are small. or Maybe they think their information, data and business relationships are not important to hackers because, "too small", "not on radar screen", or "we have nothing worth taking." But both of these are clearly conundrums: The first is pretty basic, if you think you are secure but have not brought in outsiders to test your systems and people and facilities, then how do you know? The second is also…
Read More

Reputation Cyber Security of IoT.

Corprorate Cyber Security., Cyber Reputation Control, Cyber Security Venture Capital, Cybersecurity, Dalai VC, Digijaks Reputation Control, Online Reputation Control, Online Reputation Security, Reputation Control, Reputation Control and Management, Reputation Security, Social Media Cyber Security, Venture Capital, Venture Capital Cyber Security
Ah, the Internet of Things. Just the sound of it sends thrills, chills and huge question marks through both technologists and regular people alike. Just think, you can already do the following: Track your health. Track your kids. Track your home. Talk to your fridge. Talk to your car. Have your fridge, oven, and tv connected to your smartphone, not to mention the video doorbell. I could go on with this list. But why bother? The Internet of Things, or IOT as it is called in the media, by analysts and techies alike is an amorphous concept and does not easily translate into everyday speak for the average person. There are cybersecurity concerns with the overlapping inter-connectedness that are growing exponentially by the month; as more and more devices come…
Read More

Reputation Control. Who Controls Your Cyber Reputation?

Cyber Reputation Control, Cyber Security, Cybersecurity, Digijaks Reputation Control, Online Reputation Control, Reputation Control, Reputation Control and Management, Reputation Security, Social Engineering, Social Media Cyber Security, Venture Capital, Venture Capital Cyber Security
Every day we hear of more stories of people's Reputation getting smashed instantly online. On a personal level it just plain sucks, and causes mounds of heartache, headache, paperwork, and costs. To a business or a brand, there are risk mitigation and compliance issues, trademark defense costs, and reputations getting taken down, despite having been built up over years or decades. It could be any trigger. Even, a mistaken identity or you share the same name as someone who gets in trouble. Or it could be malicious from criminals, or cyber hackers looking to steal your identity, or file false tax returns to claim fake refunds, or to make it appear you were the one who did something when in reality it was someone pretending to be you. The problem…
Read More

#cybersecurity The Gift everyone needs for the Holidays!

Cyber Reputation Control, Cyber Reputation Management, Cyber Security Venture Capital, Cybersecurity, cyberwar, Digijaks Reputation Control, Online Reputation Management, Online Reputation Security, Personal Cyber security, Reputation Control, Reputation Security, Social Engineering, Social Media Cyber Security, Venture Capital Cyber Security
Happy Holidays. It is, as is so commonly mentioned in the media: "That Time of Year Again." Yup. Packages. Shiny New Things. Cool Toys for the Kids and kid-adults alike. It is also the time of year of increased cyber crime attempts aimed at retailers. Add also the time of year when more families and organizations introduce new varieties of malware, ad-malware, viruses, worms, bad bots and devices that phone "home" into our homes, workplaces and civic spaces. https://twitter.com/IdeaGov/status/668911020937580544?ref_src=twsrc%5Etfw How? Because many devices are coming pre-loaded with malware. How many parents look into the workings of a cheap tablet before handing it off to the kids? How many people are checking new apps to see the permissions being requested on those new devices and old ones too? How many companies are…
Read More

#IoT Security Is Just Not.

Cyber Reputation Control, Cybersecurity, Digital Defense, IoT Security, Online Reputation Security, Reputation Control, Reputation Security
A few weeks ago I wrote this piece about #IOT Cybersecurity and how it affects personal and brand reputations. I got a lot of criticism for basically speaking the truth. I appreciate all the tweets, emails and Linkedin posts engaging on this piece, including all the people who attempted to say I was wrong. But the points raised in that piece are simply the opening salvo in a multi front disruption. The disruption is NOT IoT. The disruption is to switch from product leading first with security as an afterthought in the rush to go to market. What needs to change is the mindset to build in design security from the beginning, Last week I sat on a panel at the California Cyber Security Task Force meeting. The panelists were…
Read More
Reputation Control for Kids by Social Media, Search Results

Reputation Control for Kids by Social Media, Search Results

Cyber Reputation Control, Cyber Reputation Management, Digijaks Reputation Control, Digital Defense, Online Reputation Control, Online Reputation Management, Online Reputation Security, Reputation Control, Reputation Management, Reputation Management for Families, Reputation Security
In Digijaks daily course of business with reputation management we come across a lot of people (adults) who have seen their life get turned upside down because of something appearing in search results that negatively affect them. This happens so much, and so often it has created a whole industry to deal with it. Search results leading to problems to people happen for many reasons. I recently wrote about this problem on the Huffington Post as it relates to adults. But this same correlation exists for kids, for families and the same problems may arise, but with lifelong implications. Imagine being an 11 year old who innocently posts a picture or a quote or a poem or a location, thinking nothing of it. Fast forward 6 years to college applications.…
Read More

Cybersecurity: Now the Crossover from Cyber to Real Life

Corprorate Cyber Security., Cyber Reputation Control, Cyber Reputation Management, Cyber Warfare, Cybersecurity, cyberwar, Developed by Digijaks, Digital Defense, Digital Shield, Gov 2.0, Online Reputation Control, Online Reputation Security, Personal Cyber security, Reputation Control, Reputation Control and Management, Reputation Management, Reputation Security, Social Engineering
[caption id="attachment_2095" align="aligncenter" width="300"] Cyber Security, Social Media, You.[/caption] Cybersecurity used to be be the geek's eagle's nest. it was hard to understand, hard to get to, hard to see the impact and need often times. If there was a CIO or CISO, he/she would not be in the board room too often, and usually the budgets were the first to go in any budget change environment. But the cycle switched. Now we are in the opposite cycle. The CIO and CISO are ruling the roost and commanding serious budgets and attention. But being missed in all the excitement is this: The Crossover from pure cyber crime to real world crime from the same instance. It is safe to say, times have changed. Now - Cybersecurity has become a word…
Read More