‘Covid-19’ Coronavirus| Cybersecurity Overview

Coronavirus Cyber Security Concerns, Covid-19 + Cybersecurity, Cybersecurity of Covid-19, Digital Defense, Digital Shield, Gov 2.0, Personal Cyber security, Reputation Security | Coronavirus
Covid-19. Coronavirus. Cybersecurity. That is a lot of words beginning with C. Unfortunately, as the Covid-19 or Coronavirus pandemic sweeps the globe in March 2020, we are also seeing massive increase in cybersecurity threats multiplying as well. While China, Italy, Iran, South Korea and other countries have all been slammed with the pandemic crisis, they have also been slammed with hackers trying to take advantage of the situation. I have given many speeches around the world about cybersecurity. Anyone who has heard me speak has also undoubtedly heard me talk about cyber hygiene. There are many parallels with healthcare and cybersecurity. One is proper hygiene. If there is any common lesson to everyone around the world, it is the importance of clean hands, not touching your face, using sanitizer or…
Read More

5 Key #CyberSecurity Trends for 2020

Cyber Security, Cyber Warfare, IoT Security, Online Reputation Control, Online Reputation Security, Reputation Security, Social Engineering, Social Media Cyber Security, Weaponized Media
5 Key Cyber Security trends of 2020 by Digijaks CEO Alan W. Silberberg 2020 is going to be lit, at least in the cyber world. We are not talking about the fireworks from New Year's Eve celebrations. Nor are we talking about the circus in Washington, DC, or any other world capitol. One day snapshot of Digijaks CEO Twitter account @ideagov So, what is coming in 2020? What do we need to be looking for? Polymorphic Malware + Artificial Intelligence. Continued at #1 from 2019 trends due to ever increasing use and now fully automated attacks as well. What the heck is polymorphic malware you may be asking? Basically, in the most simple terms, it is malware that changes upon detection, or "morphs" into a new form, or goes into…
Read More
#CyberSecurity #DigitalDiplomacy 2017

#CyberSecurity #DigitalDiplomacy 2017

Cyber Reputation Control, Cyber Reputation Management, Cyber Warfare, Cybersecurity, cyberwar, Digital Diplomacy, Gov 2.0, Online Reputation Control, Reputation Control, Reputation Control and Management, Reputation Security, Social Engineering, Social Media Cyber Security
#Digitaldiplomacy and #Cybersecurity on a Rough Patch in 2017. The last several years have seen an explosion of digital diplomacy tools and techniques. This is driven by an ongoing growth in technology platforms; and social media combined with the increased numbers of world Governments adopting open data and open government principles. There has also been a parallel explosion in fake social media, fake news and fake information being propagated globally. The effect of the combined forces is that cybersecurity is now playing an even more vital role in digital diplomacy. Where digital diplomacy just a few years back was between recognized principals of Governments, now there are lots of other players trying to make that communication much more failure prone. Additionally we now have leaders using Twitter and other tools…
Read More
Reputation Control. Who Controls Your Cyber Reputation?

Reputation Control. Who Controls Your Cyber Reputation?

Cyber Reputation Control, Cyber Security, Cybersecurity, Digijaks Reputation Control, Online Reputation Control, Reputation Control, Reputation Control and Management, Reputation Management, Reputation Security, Social Engineering, Social Media Cyber Security, Venture Capital
Every day we hear of more stories of people's Reputation getting smashed instantly online. On a personal level it just plain sucks, and causes mounds of heartache, headache, paperwork, and costs. To a business or a brand, there are risk mitigation and compliance issues, trademark defense costs, and reputations getting taken down, despite having been built up over years or decades. It could be any trigger. Even, a mistaken identity or you share the same name as someone who gets in trouble. Or it could be malicious from criminals, or cyber hackers looking to steal your identity, or file false tax returns to claim fake refunds, or to make it appear you were the one who did something when in reality it was someone pretending to be you. The problem…
Read More