Skip to content
info@johnstek.com Corporate HQ: Coral Gables, FL, USA +1.786.375.9020 Latin American HQ: Asuncion, Paraguay +595.213.277.395
Search:
Search
JohnsTek
Strategic Technology Engineering
JohnsTekJohnsTek
  • About
  • Products & Services
  • Cyber Risk
    • Managed Security Services Provider (MSSP)
    • Cyber Risk Management Solution
  • Markets
    • Commercial
    • Government
  • Resource Center
  • Contact
  • About
  • Products & Services
  • Cyber Risk
    • Managed Security Services Provider (MSSP)
    • Cyber Risk Management Solution
  • Markets
    • Commercial
    • Government
  • Resource Center
  • Contact

The Intel Brief 02OCT17 ~ By JohnsTek

You are here:
  1. Home
  2. Emails
  3. Intel Brief
  4. The Intel Brief 02OCT17 ~…
Sep282017
Intel Brief

The past month has been a challenge for many of us as we faced down Hurricanes, Tornadoes, Earthquakes, and, yes, even snow in California! With this version of The Intel Brief we are informing you that challenges still lie ahead…but there is time to prepare! You will want to read through both, the Cyber Risk Management, and Systems Integration sections to learn what to expect, and how to safeguard against the threats.

 

Cyber Risk Management

So we have gotten through the ravages of Hurricanes Harvey, Irma, and Maria; the three Earthquakes in Mexico; flooding; tornadoes; hail; and snow in California…what a busy month we have had! And now here come the blood suckers trying to take advantage of our plight with phishing attacks, fraudulent donation phone calls, false collection websites, and other forms of thievery from the victims of these terrible acts of Mother Nature. To add insult to injury, Equifax, one the Nation’s largest credit reporting agencies, was breached and over 143 million Americans personal information were exposed to criminals intent on stealing identities.

 

The best advice that can be given is, take precautions:

 

First, make yourself aware of the cyber world that surrounds you. Listen on the news for discussions of emails circulating that are known to carry phishing attempts, or sites that have been cloned. Read blogs reporting on Cyber News. The account you save could be your own…

 

Second, do not assume that the person calling you and says they are from your bank, insurance carrier, or local charity organization really are your bank, insurance carrier, or local charity organization…assume they are trying to extract information from you over the phone in order to exploit that information for their gain. Politely tell them you will call them back before you confirm anything or provide any information with this stranger. Call the organization back using a preprinted number on the back of your credit or membership card. You can look up charity organizations on the internet, carefully making certain that the address in the browser is correct. Explain to the customer service representative that you received a call and you are calling back over a known phone number to be safe. They will understand and appreciate your effort, and will go out of their way to help you.

 

Third, ignore the text messages and emails you get from charity organizations. Well, don’t ignore them, just don’t use the link embedded in the message to go to their website. Instead, type in the web address to that organization from your browser. There is no need to type out the lengthy string that you see in the email or text, usually. Just go to the Home page, then navigate to the area that you wish to visit for offering a donating or other form of support.

 

Fourth, now is not the time to pinch a penny when it comes to securing your financial accounts. Assume your information is compromised and act now to purchase Identity Theft Protection from one of the known offerors. They work! Just search for “Identity Theft Protection” on the internet and select a known company. Be sure the address in your browser address bar clearly is the company that you were trying to reach before you start to fill out any forms with sensitive personal information.

 

Fifth, start to review your bank statements regularly. Any unclear transactions should be addressed immediately!

 

For more information visit our Cyber Risk Management page, Click Here.

 

johnstekDo Not Forget the Firmware! Firmware is everywhere; from the largest data center to the smallest networked LED light bulb. It is the most powerful code on any system because it controls how devices operate. Compromised firmware can be used to corrupt or steal data, spy on your environment or even destroy the system it is controlling. Firmware is powerful code that persists from device restart to restart, sitting below operating systems and driver layers where it can fool anything else on the system – including existing security tools – into thinking everything is working fine. Read the entire article by clicking here.

 

 

System Integration

Heroes and Systems, what a fantastic combination! To say that the past six weeks have been difficult for many on this side of the globe is an understatement! Mother Nature certainly through everything she had at us…and then some!

 

While we were “battening down the hatches” and raiding the food markets with any available supply, they were out there working for us. The spotlight certainly shined on the heroes. There were The Cajun Navy, armed with boats and Zello, an online communications tool that operates like a radio through an app on your smart phone. It was real impressive how well they were organized to support the areas hit by Hurricane Harvey. Volunteers from the four corners of the country jumped in to help, working long, arduous shifts. I listened for hours, pride swelling inside, as I heard the volunteer dispatchers, or moderators as they call themselves, organize assets, reassuring stranded people and controlling the airwaves. They directed rescuers to locations where victims were waiting to be saved. Boat operators communicating with the moderators were as determined and disciplined as any soldier I have ever served with. Under the harshest of conditions, they were there, and for that, we all owe them a great debt of gratitude!

 

I listened as local Police and Fire Rescue authorities, also out there in the floods, rain and lightening, directed rescues, organized assets, safeguarded the volunteer civilian rescuers, and kept the airwaves clear of the occasional heckler. Teams of adhoc volunteers working seamlessly with First Responders was a beautiful site to bear witness to! Guts, the will to succeed, and a heightened sense of humanity were emanating from these heroes! Simple technology, a fabric of internet capabilities woven with radio etiquette, information exchanges and emergency communications infrastructure, won out the day in support of these heroes. Well done all!

 

For more information visit our website, Click Here.

 

johnstekEmpowering Emergency Response with Technology: Emergency Response during a natural or man-made disaster could be rated as one of the most stressful and dangerous activities a professional could face in his or her lifetime. There are thousands of brave men and women that, besides their normal day to day jobs, offer their services as rescuer. Every emergency is unique and presents its own set of challenges, and the rescuers are faced with the daunting task of making decisions on the fly, decisions that if made wrong, could put their lives or the lives of others in danger. Providing and equipping the rescuer force with “best of breed” resources available could mean more lives spared and reduction of risk to the safety of the rescuers themselves.

 

During an emergency, many agencies are faced with an influx of personnel willing to lend a helping hand, however organizing and managing all of those volunteers and professional workers is not an easy task, unless an effective communication architecture is established allowing for many different types of communication devices to talk to each other, providing the much needed command and control of the efforts. Click here to read the complete article.

Category: Intel BriefBy Scott JohnstonSeptember 28, 2017

Author: Scott Johnston

https://johnstek.com

Post navigation

PreviousPrevious post:Firmware Not To Be Overlooked in Cyber Risk ManagementNextNext post:Near Reality Crisis Simulation

Related posts

The Intel Brief 16AUG17 ~ By JohnsTek
August 16, 2017
The Intel Brief 16JUN17 ~ By JohnsTek
June 16, 2017
The Intel Brief 22MAY17 ~ By JohnsTek
May 22, 2017
The Intel Brief 10FEB17 ~ By JohnsTek
February 10, 2017
Shortcuts
  • About Us
  • Offerings
  • Products & Services
  • Commercial
  • Government
  • Privacy
  • Terms
JohnsTek News
  • CyberShield
    Stay Secure During the Holiday Season!
    December 13, 2020
  • Cafe Photo
    Data Protection In Cafes And Restaurants
    February 10, 2019
  • JohnsTek Capability Statement 2019
    February 9, 2019
Security Alerts
  • Alert Dispatch 23JUN17 ~ By JohnsTek
    June 23, 2017
  • Alert Dispatch 5JUN17 ~ By JohnsTek
    June 5, 2017
  • Alert Dispatch 18MAY17 ~ By JohnsTek
    May 18, 2017
Intel Brief
  • The Intel Brief 02OCT17 ~ By JohnsTek
    September 28, 2017
  • The Intel Brief 16AUG17 ~ By JohnsTek
    August 16, 2017
  • The Intel Brief 16JUN17 ~ By JohnsTek
    June 16, 2017
Press Releases
  • JohnsTek Capability Statement 2019
    February 9, 2019
  • IBM_JohnsTek
    JohnsTek Partners with IBM Security!
    November 19, 2018
  • Veterans Day
    JOHNSTEK WISHES YOU A HAPPY VETERAN’S DAY!
    November 10, 2017
Copyright © 2022 JohnsTek | All Rights Reserved.
  • About Us
  • Offerings
  • Products & Services
  • Commercial
  • Government
  • Privacy
  • Terms
Footer