Cyber Security | Reputation Control For Regular People

Cyber Security, Cybersecurity, Digijaks Reputation Control, Family Reputation Management, Online Reputation Control, Online Reputation Management, Online Reputation Security, Reputation Control, Reputation Management for Families, Reputation Security, Social Media Cyber Security
Cyber Security. Reputation Control. Two terms laden with secret meanings and often high (sometimes perceived) costs to remediate dangerous and or embarrassing situations. Bad things resulting from hacks of digital networks, devices, identity theft, corporate espionage and other digital crimes and forms of cyber attacks. After almost 9 years of offering cyber security and reputation control services to larger companies and governments; it has become clear that there is a very specific and unmet need for regular people to get access to premier cyber security services. I literally cannot count how many late night phone calls, emergency text messages and social media direct messages from regular people. They are people who are often part of a larger organization, but are not given access to the cyber security their company or…
Read More

Cyber Security of Weaponized Media in a Socially Engineered World

Corprorate Cyber Security., Cyber Security, Cyber Warfare, Cybersecurity, cyberwar, Digital Defense, Gov 2.0, IoT Security, Online Reputation Control, Reputation Security, Social Engineering, Social Media Cyber Security, US National Cyber Defense, Weaponized Media
I.     Introduction The world is seeing an ongoing multi-faceted cyber attack(s) (social engineering) that uses weaponized fake media, digital false flags and other digitally obfuscated materials. These attacks stem from nation states, paid hacker cartels and mercenary hackers globally. These cyber security attacks utilize social engineering, weaponized media and fake media. We have been studying these socially engineered attacks since 2009, and have created unique responses to them. II.    Main body The Green Revolution of 2009 in Iran marked the first known use of weaponized social media. The Government of Iran utilized Twitter to get western citizens to spread their propaganda. Fast forward to 2016, where USA itself was attacked through long term, dedicated weaponized media cyber assault on our democracy; and government alike by Russia and its agents. This…
Read More
Modern Information Warfare Hits Hard

Modern Information Warfare Hits Hard

Cyber Reputation Control, Cyber Security, Cyber Warfare, Cybersecurity, cyberwar, Digital Defense, Online Reputation Security, Reputation Control, Reputation Control and Management, Reputation Security, Social Engineering, Social Media Cyber Security, US National Cyber Defense
2016 was just the latest in #cyberwar; and #informationwarfare attacks where even bills were introduced in Congress. It has been ongoing as long as there have been digital mediums and technologies; and information distribution technology. My company saw it happening last year and got more and more concerned as the election grew closer. We literally wrote letters to people in government, people at the DNC and elsewhere, basically yelling as loudly as we could that the #USA was being cyber and information warfare attacked.   As a cyber security, and weaponized information expert - it was all too clear what was happening. It has left a feeling of being sick in the stomach for a year now, and this feeling has not abated. Because it has not ended. For millions of Americans and millions of…
Read More
Digijaks CEO Speech at US Army CyberTalks NYC

Digijaks CEO Speech at US Army CyberTalks NYC

Corprorate Cyber Security., Cyber Reputation Control, Cyber Security, Cyber Warfare, Cybersecurity, cyberwar, Digital Defense, Digital Diplomacy, Gov 2.0, IoT Security, Online Reputation Control, Reputation Control, Reputation Control and Management, Reputation Security, Social Engineering, Social Media Cyber Security, US National Cyber Defense
https://www.youtube.com/watch?v=eX5Rgp2QmoU&feature=youtu.be  
Read More
#CyberSecurity #DigitalDiplomacy 2017

#CyberSecurity #DigitalDiplomacy 2017

Cyber Reputation Control, Cyber Reputation Management, Cyber Warfare, Cybersecurity, cyberwar, Digital Diplomacy, Gov 2.0, Online Reputation Control, Reputation Control, Reputation Control and Management, Reputation Security, Social Engineering, Social Media Cyber Security
#Digitaldiplomacy and #Cybersecurity on a Rough Patch in 2017. The last several years have seen an explosion of digital diplomacy tools and techniques. This is driven by an ongoing growth in technology platforms; and social media combined with the increased numbers of world Governments adopting open data and open government principles. There has also been a parallel explosion in fake social media, fake news and fake information being propagated globally. The effect of the combined forces is that cybersecurity is now playing an even more vital role in digital diplomacy. Where digital diplomacy just a few years back was between recognized principals of Governments, now there are lots of other players trying to make that communication much more failure prone. Additionally we now have leaders using Twitter and other tools…
Read More

#panamapapers + Reputation Control + Cyber Security

Anti-Corruption, Corprorate Cyber Security., Cyber Reputation Control, Cyber Reputation Management, Cybersecurity, Digijaks Reputation Control, Online Reputation Control, Reputation Control, Reputation Management, Reputation Security
[caption id="attachment_2095" align="aligncenter" width="528"] Cyber Security, Social Media, You.[/caption] The Panama Papers as released this past week are a really huge data dump, in fact one much larger in scale than that of Wikileaks, and the largest to date in history. The project that resulted in this massive public disclosure, was essentially a cyber security lapse leading to a breach.  Following the breach, data exfiltration was executed through leveraging a long known critical failure in the operating system and email servers that were used by the law firm, Mossack Fonseca. Not only are the Panama Papers a stunning example of a hack that resulted in massive  data exfiltration; thus consequently leading to a global reputation breach. But they are also representative of a slow to change cyber security environment in…
Read More
Cybersecurity Dilemna -A Conundrum-

Cybersecurity Dilemna -A Conundrum-

Corprorate Cyber Security., Cyber Reputation Control, Cyber Security Venture Capital, Cyber Warfare, Cybersecurity, Digital Defense, Online Reputation Control, Online Reputation Security, Reputation Control, Reputation Control and Management, Reputation Management, Reputation Security, Social Engineering, Venture Capital Cyber Security
  co·nun·drum kəˈnəndrəm/ noun noun: conundrum; plural noun: conundrums a confusing and difficult problem or question. "one of the most difficult conundrums for the experts" This is the conundrum of the digital age. One one hand executives of a company will be the first to state they think their systems are secure, and if there are any problems they are small. or Maybe they think their information, data and business relationships are not important to hackers because, "too small", "not on radar screen", or "we have nothing worth taking." But both of these are clearly conundrums: The first is pretty basic, if you think you are secure but have not brought in outsiders to test your systems and people and facilities, then how do you know? The second is also…
Read More

Reputation Cyber Security of IoT.

Corprorate Cyber Security., Cyber Reputation Control, Cyber Security Venture Capital, Cybersecurity, Dalai VC, Digijaks Reputation Control, Online Reputation Control, Online Reputation Security, Reputation Control, Reputation Control and Management, Reputation Security, Social Media Cyber Security, Venture Capital, Venture Capital Cyber Security
Ah, the Internet of Things. Just the sound of it sends thrills, chills and huge question marks through both technologists and regular people alike. Just think, you can already do the following: Track your health. Track your kids. Track your home. Talk to your fridge. Talk to your car. Have your fridge, oven, and tv connected to your smartphone, not to mention the video doorbell. I could go on with this list. But why bother? The Internet of Things, or IOT as it is called in the media, by analysts and techies alike is an amorphous concept and does not easily translate into everyday speak for the average person. There are cybersecurity concerns with the overlapping inter-connectedness that are growing exponentially by the month; as more and more devices come…
Read More