SlideShare a Scribd company logo
1 of 4
Download to read offline
Defend—Discover—Remediate | www.2Secure.biz
646-755-3933
In today’ s world of rampant
cybercrime, every savvy business
owner knows the necessity of locking
down their data. However, we find
that the cyber security technologies
used by the vast majority of
businesses are woefully out of date.
Sure, your current solution may have
worked great, but digital threats to the
safety of your company are constantly
evolving. Criminals will eventually
attempt to breach your data — and
your barriers are not as secure as you
might think.
Before World War II, the Germans
developed a technology that would
prove to be a key player in the
conflict: its family of infamous Enigma
machines. These devices, about the
size of a small microwave, were
composed primarily of a typewriter
and a series of three or four rotors. By
using a set of rules contained in a
corresponding codebook, German
soldiers would use the machine to
encode vital messages to be sent
covertly over the airwaves. The
number of potential permutations —
and thus solutions — for the code was
in the tens of millions. The Germans
were confident that the code could
never be broken and used it for a vast
array of top-secret communications.
The code’s impenetrability didn’t last.
Via photographs of stolen Enigma
operating manuals, the Polish Cipher
Bureau reconstructed one of the
stubborn Enigma machines, internal
wiring and all, enabling them to
decrypt the Wehrmacht’s messages
from 1933 to 1938. Facing an
impending German invasion, Poland
decided to share these secrets with the
British. But, at the outbreak of the war,
Your
Image
Here
STAYING ON TOP
The Blockchain Revolution
"Biockchain has the potential to transform
the economy, society and our personal
lives And, to help me better understand
how such a transformation might evolve
over the years.
I’ve found it quite useful to compare the
current state of blockchain to that of the
internet in its early years.”- WSJ
And now for the security angle.
"Biockchain technologies should help us
enhance the security of dig1tal
transact1ons and data by developing the
required common services for secure
communication, storage and data access
along with open source software
implementations of these standard
services. As was the case w1th key
internet protocols. we would expect
such standard blockchain services to be
supported by all blockchain platforms,
such as Hyperledger and Ethereum”
WSJ
This monthly
publication
provided courtesy
of Yigal Behar,
President of
2Secure Corp
September 2017
What Will You Do When This Disaster
Hits Your Business?
>
WE PRACTICALLY GUARANTEE IT WILL HAPPEN TO YOU
Continued on pg.2
Striving to become the leading Cyberse-
curity firm, specializing in malicious
threat prevention using methods both
conventional and unconventional to resist
these attacks, while always keeping the
bigger picture in mind.
The Cybersecurity Insider September 2017
Discover the undisclosed, off-the-record issues of today's emerging security threats.  
From the secretive profiling initiatives of large data aggregators to Nation States sifting through your
most valuable intellectual property.
Find out what Yigal Behar has discovered in his many interviews with top security experts and SMB
business leaders:
 The false sense of security. Find out what it is and how to fix it.
 There’s one major mistake just about every company is making with security. Find out what it is
and how to fix it.
 And much more
FREE eBook: Digital War—The One Cybersecurity Strategy You Need to Implement Now to
Secure Your Business
Defend—Discover—Remediate | www.2Secure.biz
646-755-3933
the Germans increased the security of the Enigma
initiative by changing the cipher system daily. In
response, a British code-breaking team, led by
genius English computer scientist Alan Turing,
constructed primitive computers, known as
“bombes,” that allowed them to decrypt the
incredibly complicated ciphers faster than ever
before. But it wasn’t until the capture of the U-110
warship and the seizure of its Enigma machine and
codebooks that the British were able to decrypt the
most complicated cipher of the war, the
Kriegsmarine Enigma.
The information gleaned from these decrypts are
believed to have shortened the war by more than
two years, saving over 14 million lives.
Just like you, the Germans believed the systems they
had put in place to defend their secrets were
impenetrable. And it’s true: the system had few
cryptographic weaknesses. However, there were flaws in
German procedure, mistakes made by Enigma operators,
and failures to introduce changes into the Enigma formula
— along with the Allied capture of key equipment and
intelligence — that ultimately allowed the Allies to crack
the code once and for all.
Take this as a cautionary tale: the most advanced, complex
cryptography system in the world became obsolete within
10 years. The same goes for your potentially outdated
cyber security measures.
Though they may not be led by Alan Turing and his crack
team, you can bet criminals are constantly chipping away
at the defenses of even the most powerful firewalls. The
arms race between cyber security companies and
cybercriminals rages on behind the scenes, and you can
bet that they’ve already cracked your business’s
“Enigma.” Just look at the massive European cyber attack
this past June, which infected computers from over 27
companies across the continent, including those of the
largest oil company in Russia, with ransomware. The
unimaginable cost of that attack is something you
certainly don’t want your business to shoulder.
As technology evolves, so does crime. New threats arise
each and every day. While solutions are available (and
needed), they are notably absent in older software
developed at a time before these constantly morphing
attacks even existed.
Once the enemy has found a way to pick your lock, you
need a new lock. Luckily, you have your trusty IT
provider, constantly on the lookout for cutting-edge
solutions that protect our clients from even the nastiest
malware.
“TAKE THIS AS A
CAUTIONARY TALE: the
most advanced, complex
cryptography system in the
world became obsolete within
10 years. The same goes for
your potentially outdated
cyber security measures.”
Claim Your FREE Copy Today at www.2Secure.biz
Continued from pg.1
The Cybersecurity Insider September 2017
Defend—Discover—Remediate | www.2Secure.biz
646-755-3933
Recently, while working on a program for
a company that has been in business for over
64 years, I came across a particularly
compelling value statement: “In the pursuit of
excellence, adequacy is unacceptable.” It’s
stuck with me since then as a perfect
encapsulation of forward-thinking business
philosophy.
Facebook, Twitter, Yelp, Google, and
thousands of other digital tools have
completely changed the way companies must
do business if they plan on surviving. With
two taps on their smartphone, anybody can
go online and check out your company. In 10
seconds they can see everything that’s being
said about you and your team. In an instant,
potential prospects can type your company’s
name into the search bar and sift through
your dirty laundry. If people are complaining
about your service, your demeanor, or your
product, you can say goodbye to this
potential customer, because they’re moving
on. Sometimes, all it takes is a single colorful
review to stop us from ever doing business
with that company.
So where does “adequacy is unacceptable”
enter the mix?
The truth is, people don’t go online and
write comments about adequate experiences
they have with companies. When a customer
decides to take time out of their busy day to
write a review, you can bet they’re going to
either rave and rant about their fantastic
experience, or go far out of their way to drag
your company’s name through the mud after
the horrible time they had. The smartest
companies realize this and bend over
backwards to elicit descriptors like
“superior,” “awesome,” “amazing” and
“excellent.” If your business is doing a
middling job, or even a “good” one, it might
as well be invisible.
“Adequacy is unacceptable” is a perfect
ideal not only for the hugely successful
business I worked with recently, but for all
companies. “Adequate” is just another word
for average — are you looking to hire average
people or do business with average
companies? Of course you’re not. The
consequence of being merely adequate is
always disappointment. An adequate
experience captivates no one, does nothing
exceptional, and has no distinctive qualities.
There is no way to differentiate yourself from
the competition while doing an adequate job.
Instead, consider what your company can
do to impress, astound and excite those for
whom you are working. The company that
consistently not only exceeds expectations,
but blows them totally out of the water, will
always be in high demand. Do more, be more,
give more, and you’re sure to achieve more.
This isn’t third-grade soccer; nobody’s going
to give you a trophy for an adequate
performance.
Adequacy Is Unacceptable
Robert Stevenson, along with being a best-selling author, is among the most
successful public speakers in the world. His years of service-minded experience
owning and running numerous companies have given him the real-world
knowledge to help fellow business owners thrive.
Shiny New Gadget Of
The Month:
Building A
The cutting-edge U by Moen
Smart Shower is looking to
revolutionize your shower
experience. With digital valves
and a corresponding controller,
the U by Moen can make any
shower a lot smarter.
After users install the digital
valves and controller — a task
that takes a few tools and a little
bit of handiwork — the U by
Moen allows them to sync their
showers with their smartphone.
The system then makes it easy to
customize the showering
experience, choosing the perfect
temperature and saving
preferences for future use. Start
the shower remotely, and it will
let you know when it’s ready,
automatically shutting off until
you step in. Available for
showers with either two or four
outlets, the U by Moen is the
perfect addition for those
looking to digitize every aspect
of their home.
Is It You?
“Half of ransomware vic ms are likely to get hit again as threat actors change their strategies to 
target servers and accelerate the spread of ransomware.”‐DarkReading 
 
“[cybercrime] data was consistent across business of all sizes and all are struggling with the same 
issues.”...DarkReading 
The Cybersecurity Insider September 2017
Your Copier Is Spying On
You It may sound paranoid,
but it’s true: the machines
you use every day around the
office could be spying on
your data. Copiers and
multifunction printers,
particularly, are some of the
leading causes of business
data breaches. When you
consider it, it makes sense.
They’re among the only
devices on the network that
rarely have their default
password changed. But these
advanced copiers and
printers often house images
of all the pages they’ve ever
scanned on an internal hard
drive, making them the
perfect target for thieves.
Make sure to change the
password from the default on
every network-connected
device in your office. This
one simple step can save you
a costly headache down the
road. intellisystems.com
01/31/2017
Your Best Employee WILL
Quit ... Are You Prepared?
Employee churn is a fact of
business. It’s important to
take steps to ensure that
regardless of an employee’s
importance, their loss won’t
be catastrophic. Consider
everyone on your team. If
they left, what would it do to
your business? Make sure to
document indispensable
knowledge. In the end, you
should keep your team as
happy as possible, but be
supportive if they make the
decision to leave.
Groovehq.com 12/10/15
Fight Traffic Tickets
WITHOUT Leaving the
Comforts of Home “Off the
Record” is a new app that
allows you to contest those
pesky speeding tickets
without ever leaving your
house. All you have to do is
take a picture of your ticket,
answer a couple questions,
and pay a fee (ranging from
$53 to $599, depending on
your area). The app will then
assign the case to a local
lawyer to contest the charge.
It may sound too good to be
true, until you consider its
97% success rate. Best of all, if
the ticket is not dismissed,
deferred, or reduced to a
nonmoving violation, you’ll
get a full refund! lifehacker.com
7/7/17
Defend—Discover—Remediate | www.2Secure.biz
646-755-3933
Did You Know?
Your e-mail account credentials are sold on the Internet!!!
We now have a new service that will look for your e-mail account on
hackers’ sites, forums and other places that you don’t even know exists.
In-addition we will create your “Threat Intelligence Threat Risk Index™”
by searching and analyzing wealth of open source information, this may
include:
 Internal Software In-Use
 Web Technologies
 User-Accounts Used On External Sites
 User Names
Above represents a partial list of what we can
find… Want to Know More? Call 646-755-3933

More Related Content

Recently uploaded

Recently uploaded (20)

How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Buy Epson EcoTank L3210 Colour Printer Online.pdf
Buy Epson EcoTank L3210 Colour Printer Online.pdfBuy Epson EcoTank L3210 Colour Printer Online.pdf
Buy Epson EcoTank L3210 Colour Printer Online.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
Buy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptxBuy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptx
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreel
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

2Secure Corp The Cybersecurity Insider September 2017 Printed Newsletter

  • 1. Defend—Discover—Remediate | www.2Secure.biz 646-755-3933 In today’ s world of rampant cybercrime, every savvy business owner knows the necessity of locking down their data. However, we find that the cyber security technologies used by the vast majority of businesses are woefully out of date. Sure, your current solution may have worked great, but digital threats to the safety of your company are constantly evolving. Criminals will eventually attempt to breach your data — and your barriers are not as secure as you might think. Before World War II, the Germans developed a technology that would prove to be a key player in the conflict: its family of infamous Enigma machines. These devices, about the size of a small microwave, were composed primarily of a typewriter and a series of three or four rotors. By using a set of rules contained in a corresponding codebook, German soldiers would use the machine to encode vital messages to be sent covertly over the airwaves. The number of potential permutations — and thus solutions — for the code was in the tens of millions. The Germans were confident that the code could never be broken and used it for a vast array of top-secret communications. The code’s impenetrability didn’t last. Via photographs of stolen Enigma operating manuals, the Polish Cipher Bureau reconstructed one of the stubborn Enigma machines, internal wiring and all, enabling them to decrypt the Wehrmacht’s messages from 1933 to 1938. Facing an impending German invasion, Poland decided to share these secrets with the British. But, at the outbreak of the war, Your Image Here STAYING ON TOP The Blockchain Revolution "Biockchain has the potential to transform the economy, society and our personal lives And, to help me better understand how such a transformation might evolve over the years. I’ve found it quite useful to compare the current state of blockchain to that of the internet in its early years.”- WSJ And now for the security angle. "Biockchain technologies should help us enhance the security of dig1tal transact1ons and data by developing the required common services for secure communication, storage and data access along with open source software implementations of these standard services. As was the case w1th key internet protocols. we would expect such standard blockchain services to be supported by all blockchain platforms, such as Hyperledger and Ethereum” WSJ This monthly publication provided courtesy of Yigal Behar, President of 2Secure Corp September 2017 What Will You Do When This Disaster Hits Your Business? > WE PRACTICALLY GUARANTEE IT WILL HAPPEN TO YOU Continued on pg.2 Striving to become the leading Cyberse- curity firm, specializing in malicious threat prevention using methods both conventional and unconventional to resist these attacks, while always keeping the bigger picture in mind.
  • 2. The Cybersecurity Insider September 2017 Discover the undisclosed, off-the-record issues of today's emerging security threats.   From the secretive profiling initiatives of large data aggregators to Nation States sifting through your most valuable intellectual property. Find out what Yigal Behar has discovered in his many interviews with top security experts and SMB business leaders:  The false sense of security. Find out what it is and how to fix it.  There’s one major mistake just about every company is making with security. Find out what it is and how to fix it.  And much more FREE eBook: Digital War—The One Cybersecurity Strategy You Need to Implement Now to Secure Your Business Defend—Discover—Remediate | www.2Secure.biz 646-755-3933 the Germans increased the security of the Enigma initiative by changing the cipher system daily. In response, a British code-breaking team, led by genius English computer scientist Alan Turing, constructed primitive computers, known as “bombes,” that allowed them to decrypt the incredibly complicated ciphers faster than ever before. But it wasn’t until the capture of the U-110 warship and the seizure of its Enigma machine and codebooks that the British were able to decrypt the most complicated cipher of the war, the Kriegsmarine Enigma. The information gleaned from these decrypts are believed to have shortened the war by more than two years, saving over 14 million lives. Just like you, the Germans believed the systems they had put in place to defend their secrets were impenetrable. And it’s true: the system had few cryptographic weaknesses. However, there were flaws in German procedure, mistakes made by Enigma operators, and failures to introduce changes into the Enigma formula — along with the Allied capture of key equipment and intelligence — that ultimately allowed the Allies to crack the code once and for all. Take this as a cautionary tale: the most advanced, complex cryptography system in the world became obsolete within 10 years. The same goes for your potentially outdated cyber security measures. Though they may not be led by Alan Turing and his crack team, you can bet criminals are constantly chipping away at the defenses of even the most powerful firewalls. The arms race between cyber security companies and cybercriminals rages on behind the scenes, and you can bet that they’ve already cracked your business’s “Enigma.” Just look at the massive European cyber attack this past June, which infected computers from over 27 companies across the continent, including those of the largest oil company in Russia, with ransomware. The unimaginable cost of that attack is something you certainly don’t want your business to shoulder. As technology evolves, so does crime. New threats arise each and every day. While solutions are available (and needed), they are notably absent in older software developed at a time before these constantly morphing attacks even existed. Once the enemy has found a way to pick your lock, you need a new lock. Luckily, you have your trusty IT provider, constantly on the lookout for cutting-edge solutions that protect our clients from even the nastiest malware. “TAKE THIS AS A CAUTIONARY TALE: the most advanced, complex cryptography system in the world became obsolete within 10 years. The same goes for your potentially outdated cyber security measures.” Claim Your FREE Copy Today at www.2Secure.biz Continued from pg.1
  • 3. The Cybersecurity Insider September 2017 Defend—Discover—Remediate | www.2Secure.biz 646-755-3933 Recently, while working on a program for a company that has been in business for over 64 years, I came across a particularly compelling value statement: “In the pursuit of excellence, adequacy is unacceptable.” It’s stuck with me since then as a perfect encapsulation of forward-thinking business philosophy. Facebook, Twitter, Yelp, Google, and thousands of other digital tools have completely changed the way companies must do business if they plan on surviving. With two taps on their smartphone, anybody can go online and check out your company. In 10 seconds they can see everything that’s being said about you and your team. In an instant, potential prospects can type your company’s name into the search bar and sift through your dirty laundry. If people are complaining about your service, your demeanor, or your product, you can say goodbye to this potential customer, because they’re moving on. Sometimes, all it takes is a single colorful review to stop us from ever doing business with that company. So where does “adequacy is unacceptable” enter the mix? The truth is, people don’t go online and write comments about adequate experiences they have with companies. When a customer decides to take time out of their busy day to write a review, you can bet they’re going to either rave and rant about their fantastic experience, or go far out of their way to drag your company’s name through the mud after the horrible time they had. The smartest companies realize this and bend over backwards to elicit descriptors like “superior,” “awesome,” “amazing” and “excellent.” If your business is doing a middling job, or even a “good” one, it might as well be invisible. “Adequacy is unacceptable” is a perfect ideal not only for the hugely successful business I worked with recently, but for all companies. “Adequate” is just another word for average — are you looking to hire average people or do business with average companies? Of course you’re not. The consequence of being merely adequate is always disappointment. An adequate experience captivates no one, does nothing exceptional, and has no distinctive qualities. There is no way to differentiate yourself from the competition while doing an adequate job. Instead, consider what your company can do to impress, astound and excite those for whom you are working. The company that consistently not only exceeds expectations, but blows them totally out of the water, will always be in high demand. Do more, be more, give more, and you’re sure to achieve more. This isn’t third-grade soccer; nobody’s going to give you a trophy for an adequate performance. Adequacy Is Unacceptable Robert Stevenson, along with being a best-selling author, is among the most successful public speakers in the world. His years of service-minded experience owning and running numerous companies have given him the real-world knowledge to help fellow business owners thrive. Shiny New Gadget Of The Month: Building A The cutting-edge U by Moen Smart Shower is looking to revolutionize your shower experience. With digital valves and a corresponding controller, the U by Moen can make any shower a lot smarter. After users install the digital valves and controller — a task that takes a few tools and a little bit of handiwork — the U by Moen allows them to sync their showers with their smartphone. The system then makes it easy to customize the showering experience, choosing the perfect temperature and saving preferences for future use. Start the shower remotely, and it will let you know when it’s ready, automatically shutting off until you step in. Available for showers with either two or four outlets, the U by Moen is the perfect addition for those looking to digitize every aspect of their home. Is It You? “Half of ransomware vic ms are likely to get hit again as threat actors change their strategies to  target servers and accelerate the spread of ransomware.”‐DarkReading    “[cybercrime] data was consistent across business of all sizes and all are struggling with the same  issues.”...DarkReading 
  • 4. The Cybersecurity Insider September 2017 Your Copier Is Spying On You It may sound paranoid, but it’s true: the machines you use every day around the office could be spying on your data. Copiers and multifunction printers, particularly, are some of the leading causes of business data breaches. When you consider it, it makes sense. They’re among the only devices on the network that rarely have their default password changed. But these advanced copiers and printers often house images of all the pages they’ve ever scanned on an internal hard drive, making them the perfect target for thieves. Make sure to change the password from the default on every network-connected device in your office. This one simple step can save you a costly headache down the road. intellisystems.com 01/31/2017 Your Best Employee WILL Quit ... Are You Prepared? Employee churn is a fact of business. It’s important to take steps to ensure that regardless of an employee’s importance, their loss won’t be catastrophic. Consider everyone on your team. If they left, what would it do to your business? Make sure to document indispensable knowledge. In the end, you should keep your team as happy as possible, but be supportive if they make the decision to leave. Groovehq.com 12/10/15 Fight Traffic Tickets WITHOUT Leaving the Comforts of Home “Off the Record” is a new app that allows you to contest those pesky speeding tickets without ever leaving your house. All you have to do is take a picture of your ticket, answer a couple questions, and pay a fee (ranging from $53 to $599, depending on your area). The app will then assign the case to a local lawyer to contest the charge. It may sound too good to be true, until you consider its 97% success rate. Best of all, if the ticket is not dismissed, deferred, or reduced to a nonmoving violation, you’ll get a full refund! lifehacker.com 7/7/17 Defend—Discover—Remediate | www.2Secure.biz 646-755-3933 Did You Know? Your e-mail account credentials are sold on the Internet!!! We now have a new service that will look for your e-mail account on hackers’ sites, forums and other places that you don’t even know exists. In-addition we will create your “Threat Intelligence Threat Risk Index™” by searching and analyzing wealth of open source information, this may include:  Internal Software In-Use  Web Technologies  User-Accounts Used On External Sites  User Names Above represents a partial list of what we can find… Want to Know More? Call 646-755-3933