How Surveillance Capitalism Can Impact Public-Safety and CII Users

How #Surveillance #Capitalism Can Impact #PublicSafety and CII Users | #ESC_LLC #Privacy | Mission-critical communications users must be aware that personal devices and applications are subject to data surveillance. To read this informative article about Digital DNA and how service providers can put your data at risk, go to: and turn to page 20.

Please follow and like us:

April showers bring May flowers, so get the website you want from TpromoCom

April showers bring May flowers| #TpromoCom #Website #LimitedTime #Marketing | Get a new website (up to five pages) for $50 a page and a hosting fee of $20 per month. There’s a limited number of websites available at this price, so act now! For a 1-page website, build and the first year’s hosting: $290.00; 2-page website: $340.00; 3-page website: $390.00; 4-page website: $440.00; and for a 5-page website: $490.00. For more information and to make your purchase: Expires 05-15-18


Please follow and like us:


AN ELABORATE HACK SHOWS HOW MUCH DAMAGE IoT BUGS CAN DO | #TpromoCom #IoT #Hacker #Security #Data | The bulk of major corporate hacks follow time-tested strategies, like phishing emails that trick employees into giving up their credentials, or hackers exploiting a bug in a web portal. While effective, these strategies also open an attacker to early detection. So increasingly, hackers have taken the scenic route—through the Internet of Things.

Vulnerabilities in internet-connected devices are well-documented by this point, but the most common exploitations generally involve conscripting thousands of vulnerable IoT devices into botnets, or getting onto a network through a weak IoT device for ransomware attacks. These aren’t using data-stealing missions. But researchers from the IoT security firm Senrio have shown that a company’s publicly exposed IoT devices can form an unsupervised backroad path into networks. Attackers can jump from one vulnerable IoT device to the next, totally bypassing mainstream devices like PCs and servers, and charting a course that’s much harder to detect.

“No matter what we do, no matter how good our IT people may be, there’s going to be a hacker out there with more skill, more criminality ingrained into his being than all of us put together. When it comes right down to it, like physical security, it’s not a matter of ‘if’ there’ll be a data breach in our network, but rather ‘when.'” –Al Colombo

To read the remainder of this informative article, click here.

Please follow and like us:

UK’s NCSC says national security risk from equipment from China’s ZTE cannot be mitigated

UK’s NCSC says national security risk from equipment from China’s ZTE cannot be mitigated  | #TpromoCom #China #Telco #Spy |  Britain’s main cyber security agency said on Monday it had written to organizations in the UK’s telecommunications sector warning them about using services or equipment from Chinese telecom equipment maker ZTE Corp.

“NCSC assess that the national security risks arising from the use of ZTE equipment or services within the context of the existing UK telecommunications infrastructure cannot be mitigated,” said Ian Levy, the Technical Director of the National Cyber Security Center.

As the cold war with China heats up, it’s obvious that there’s no length to which either side will go to stay ahead of the other. And then again, I recall shipments of digital telco switches that were shipped to  China from the United  States in the 1990’s that had “back doors” installed in the software. Tit for tat is the name of the game and we’re going to see a whole lot more of this in the near future. –Al Colombo

To read the original news story, click here.

Please follow and like us:

Alarm.Com for Business

Alarm.Com for Business | #TpromoCom #CentralStation #AlarmSystem #HomeAutomation | has launched for Business, a fully integrated, smarter security solution for small-to-medium sized businesses (SMBs). for Business is the first offering to combine intelligent intrusion detection, video surveillance, access control and energy management into a single solution, the company said. Easily controlled through’s app and online interfaces, the solution offers proactive security safeguards, visibility and awareness, and efficient automation of everyday tasks. for Business gives service providers a highly differentiated offering for SMB customers, delivering exceptional value to business owners and generating RMR for the service provider while simplifying installation and ongoing customer service.

To read the remainder of this news story, click here.

Please follow and like us:

Robot Lures Industrial Hackers to Help ID Them

Robot Lures Industrial #Hackers to Help ID Them | #TpromoCom #Industry #Hacker #CyberSecurity |  Hey, hackers: The Georgia Institute of Technology wants you to know that your attempts at industrial espionage will not be taken lying down. You just might not realize you’re being attacked back when lulled into a false sense of security by the adorable, shoebox-sized HoneyBot.

Researchers have designed a way for industrial companies to prevent their robots from being overtaken by cyber threats. Recent advancements in automation within the Industrial Internet of Things (IIoT) mean more and more robots are at-risk, with the possibility of hackers taking control of a product or manufacturing process, resulting in damage or – even worse – trying to harm nearby humans. To read the remainder of this  news story, click here.

Please follow and like us:

Would Facebook and Cambridge Analytica be in Breach of GDPR?

Would Facebook and Cambridge Analytica be in Breach of GDPR? | #TpromoCom #Facebook #GDPR #CyberSecurity |  The Cambridge Analytica (CA) and Facebook accusations over the U.S. 2016 presidential election campaign, and to a lesser extent between CA and the UK’s Brexit VoteLeave campaign, are — if proven true — morally reprehensible. It is not immediately clear, however, whether they are legally reprehensible. The matter is currently under investigation on both sides of the Atlantic.

On March 26, both Apple and IBM called for more regulatory oversight on the use of personal data. “I’m personally not a big fan of regulation because sometimes regulation can have unexpected consequences to it, however I think this certain situation is so dire, and has become so large, that probably some well-crafted regulation is necessary,” said Apple chief Tim Cook on March 24, 2018. To read the remainder of this news story, click here.

GDPR - European Data Protection

Please follow and like us: