Emergency Social Media and You in Crisis

Corprorate Cyber Security., Cyber Reputation Control, Cyber Reputation Management, Cyber Security Venture Capital, Cyber Warfare, Cybersecurity, Digijaks Reputation Control, Digital Defense, Gov 2.0, Online Reputation Control, Online Reputation Management, Online Reputation Security, Reputation Control, Reputation Control and Management, Reputation Management, Reputation Security, Social Engineering, Social Media Cyber Security, Venture Capital Cyber Security
Many people must feel the 2015 holiday break could not have arrived soon enough what with terrorism, crazy weather and other events that get covered rightly or wrongly in social media. While these can be scary and confusing times, they can also be times to educate, learn and help one another to understand a new reality we are all living in now. There are specific tactics and strategies for understanding how live events unfold in social media and these can be instructive to the general public about what you are seeing and when, during events like these past weeks that we have all experienced. Real life events almost always flow to the internet in a micro second. Knowing how to tell the difference between truth and fiction could be critical…
Read More

Cybersecurity: Now the Crossover from Cyber to Real Life

Corprorate Cyber Security., Cyber Reputation Control, Cyber Reputation Management, Cyber Warfare, Cybersecurity, cyberwar, Developed by Digijaks, Digital Defense, Digital Shield, Gov 2.0, Online Reputation Control, Online Reputation Security, Personal Cyber security, Reputation Control, Reputation Control and Management, Reputation Management, Reputation Security, Social Engineering
[caption id="attachment_2095" align="aligncenter" width="300"] Cyber Security, Social Media, You.[/caption] Cybersecurity used to be be the geek's eagle's nest. it was hard to understand, hard to get to, hard to see the impact and need often times. If there was a CIO or CISO, he/she would not be in the board room too often, and usually the budgets were the first to go in any budget change environment. But the cycle switched. Now we are in the opposite cycle. The CIO and CISO are ruling the roost and commanding serious budgets and attention. But being missed in all the excitement is this: The Crossover from pure cyber crime to real world crime from the same instance. It is safe to say, times have changed. Now - Cybersecurity has become a word…
Read More

What the Hack of the US Government Means to You.

Anti-Corruption, Corprorate Cyber Security., Cyber Reputation Control, Cyber Reputation Management, Cyber Warfare, Cybersecurity, Online Reputation Control, Online Reputation Security, Personal Cyber security, Reputation Control, Reputation Control and Management, Reputation Management, Reputation Security, Social Engineering, Social Media Cyber Security, US National Cyber Defense
As the CEO of a cyber security and reputation company, I have to admit to not being surprised by the recent successful hacking and penetration of the US Government. While the scope of the recent events is most definitely shocking, myself and others have been researching, writing about it and trying to push and pull officials to focus on the whole set of threats, not just the known ones, and not just the data hardening ones. This recent set of hacking and penetration successes were definitely done by a Nation State, China in most probability. But guess what? The intrusion was apparently found by a Vendor doing a sales pitch to the US Government, and not by the billions of dollars of hardened equipment or custom platforms designed to stop…
Read More

Correlation of Wealth and Reputation Management

Anti-Corruption, Corprorate Cyber Security., Cyber Reputation Control, Cyber Reputation Management, Cyber Security Venture Capital, Cybersecurity, Developed by Digijaks, Digijaks Reputation Control, Digital Defense, Digital Shield, Online Reputation Control, Online Reputation Management, Online Reputation Security, Personal Cyber security, Reputation Control, Reputation Control and Management, Reputation Management, Reputation Management for Families, Reputation Security, Social Engineering, Social Media Cyber Security, Venture Capital Cyber Security
Wealth. We all want it, work for it and strive for it throughout lives and careers. Reputation. We all have one. It us up to us to define it, scale it and defend it. Which one is more valuable? Which one brings more of the other? This is a two sided question. To some people, money is everything. To others, their reputation is everything, with money or without. While most people might reflexively think that money is more important, others will emphatically state that reputation management is paramount. Some recent studies weigh in on the side of reputation. Reputation expert Michael Fertik recently weighed in on the issue in the UK's Guardian Paper. Digijaks CEO Alan W. Silberberg feels that money and reputation are completely intertwined; and that this effectively…
Read More
Control Reputation and Search With Social Media

Control Reputation and Search With Social Media

Corprorate Cyber Security., Cyber Reputation Control, Cyber Reputation Management, Cyber Security, Digijaks Reputation Control, Online Reputation Control, Online Reputation Management, Online Reputation Security, Reputation Control, Reputation Control and Management, Reputation Management, Reputation Security, Social Media Cyber Security
When it comes to reputation management and control, there are many techniques that can be employed, depending on the person, the brand, or the situation. What works in a digital crisis environment does not always translate to a long term digital branded environment. The same is true in reverse. An older article from 2013 examined this correlation and there has been a ton of blog posts and other material written about it, but still very few understand or practice this type of specific tactical methodology to achieve their long term strategic goals for search and or social media. Here is an example from my own search results, searching for my name. Note in order: 1. Twitter 2. Linkedin 3. Huffington Post (As I am a blogger and have a byline)…
Read More