Tag Archives: Security

SkyRFID strengthens support for U.S. customers with the completion of assets and management transfer from Canada to the U.S.A.

SkyRFID Inc. announces new USA incorporated firm, SkyRFID, LLC

Lansdowne, Virginia, United States, 2022-Jan-19 — /REAL TIME PRESS RELEASE/ — SkyRFID Inc. recently completed the transfer of assets and management from Canada to the U.S.A. advancing the support of U.S. customers, including the U.S. government. Long-time technology and equity partners, Geoff Dewhurst and Tim Shinbara, received approval from their respective Boards to continue the 30+ years of SkyRFID development, fulfillment, and operations from within the U.S. in early 2020 and founded SkyRFID, LLC in Lansdowne, Virginia in November of 2020. For SkyRFID, Inc., 2021 was a winddown and dissolution period. The two partners will continue to operate SkyRFID, LLC with Mr. Shinbara being named CEO and President and Mr. Dewhurst retaining Chief Architect duties and responsibilities.

Having merged the talent and resources from Mr. Shinbara’s ventures and experience into SkyRFID, LLC the firm will now be headquartered and operated from Lansdowne, Virginia, U.S.A. The Canadian dissolution transferred all assets from Ontario-based SkyRFID, Inc. to the new Virginia-based SkyRFID, LLC.

All Global Sky Partner channels conveyed to SkyRFID, LLC as well as current contracts, purchase agreements/orders, and projects which will all be subject to US and Virginia laws and policies as applicable.

SkyRFID, LLC continues the decades-long operation of solving asset management challenges, covering more than 135 countries. Solution integrations will continue to include NFC, RFID, RTLS, Wi-Fi, and IoT-based communication protocols and may support further interoperability with mobile cellular protocols such as GSM, GPRS, HSPDA+, 4G-LTE, and upcoming 5G protocols.

About SkyRFID, LLC
SkyRFID, LLC, the leader in Dynamic Asset Management, has become the “go-to” resource for security and tracking for real-time management of high-value, critical assets.

Having 30+ years of continuous improvement toward providing full scope capability, SkyRFID’s differentiation is realized in our consistent and reliable quality, optimal-cost hardware components end-to-end real-time tracking and reporting solutions; all which include our global consulting team supporting multiple industry verticals.

With its established global network of engineers, consultants, resellers, and system integrators, SkyRFID has become the premier partner for developing, implementing, and managing enterprise solutions.

SkyRFID assists at any or all levels from technical design to implementation of hundreds of RFID, sensor, and IoT technology projects each year, using its Global Sky Partner channel of over 500 companies in more than 135 countries to service local implementations and support.

For more information visit: www.SkyRFID.com

For sales information contact SkyRFID, LLC at +1 571-512-5262
E-mail: sales@skyrfid.com

Media contact:

Tim Shinbara
SkyRFID, LLC
19309 Winmeade Drive, Suite 900
Lansdowne, Virginia, 20176
+1 (561) 512-5262
TimS@SkyRFID.com
www.skyrfid.com

USBLockit.com releases Free App to “Password Protect the USB Flash Drive” for Android

USBLockit.com has released the World’s First App to Password Protect the USB Flash Drive for Android users on Google Play Store.

PADOVA, Italy, 2020-Jun-03 — /REAL TIME PRESS RELEASE/ — USBLockit.com has released a powerful security app for Android users on Google Play Store called ‘USB Lockit’. The app allows you to password protect the USB flash drive keeping it safe from unauthorized access.

This application enables you to set a pin-code protection to your USB flash drive. Once this has been done, the drive is effectively locked until the correct pin is entered. Once the drive is locked, one cannot read no write to it without the correct pin.

With this software, all your photos, audio, videos and other files stored on a FAT32/exFAT formatted USB flash drive can be easily protected from prying eyes. When you lock the drive, unauthorized access is prevented in all Operating Systems.

“We are happy to announce the new app release which is user-friendly and protects the USB flash drive with the private files effectively. The fact that the software is available for Windows and Android means that it is ideal for anyone who works with PC or Smartphone”, says Nicola Bezze, CEO of USBLockit.com

Compatible with your Android phones, Install USB Lockit from Google Play Store and password protect your USB flash drive:

https://play.google.com/store/apps/details?id=com.usblockit.app

About:

USBLockit.com offers users a friendly yet extremely powerful security software to protects the private files stored on USB flash drive. It has a large user-base in Europa followed by several countries in America and Asia. For more information, please visit www.usblockit.com

Media contact:

USBLockit.com
contact@usblockit.com

FOURTEEN ADDITIONAL COMPANIES ENTER INTO PATENT LICENSE AGREEMENTS WITH CHRIMAR

Longview, Texas, 2017-Oct-05 — /REAL TIME PRESS RELEASE/ — Chrimar Holding Company, LLC today announced that fourteen (14) more technology companies and/or certain divisions within these companies have entered into non-exclusive licenses for certain equipment under certain Chrimar patents including certain Power over Ethernet (PoE) equipment designed for deployment within a BaseT Ethernet network.

”We are very pleased to see that the trend of taking licenses for this critical technology is  again continuing to increase, with the number of licensees totaling forty (40)” said John F. Austermann III, President & CEO of Chrimar.

ABOUT CHRIMAR
Chrimar was the first company to employ DC current within a BaseT network in the early 1990s and has received a number of US patents for this very important technology. Chrimar continues to market its EtherLock™ family of products for asset control, management and security. The Chrimar portfolio includes US patents numbers 7,457,250, 8,155,012, 8,902,760, 8,942,107, 9,019,838 and 9,049,019.

Chrimar Contacts:

Amanda N. Henley, 903-500-2021
John F. Austermann III, 248-478-4400
Steve W. Dawson, Sales and Marketing 248-478-4400

911 NW Loop 281, Suite 211-30, Longview, Texas 75604
Phone: 903-500-2021
Email: Amanda@chrimarholding.com

Collavate DLP Offers Security to Encompass all Levels of G Suite

Affordable Data Loss Prevention Solutions for Google Drive Tools Now Available

San Jose, CA, August 16, 2017 – According to Gartner CISO, a security and risk assessment organization, data loss prevention is a top priority of businesses today. As corporate data has an increasingly high risk of being targeted and breached, Collavate DLP (Data Loss Prevention) has stepped up to offer Google Drive security protection for all Google Drive users.

“With online communication more prevalent than ever and corporate applications being so popular, it is imperative to keep the information within the applications from getting into the wrong hands,” stated a Collavate DLP representative. “Google Drive security has been limited and costly in the past because it was only available for the more expensive G Suite Enterprise. We are pleased to introduce Collavate DLP which can be used with G Suite Basic and G Suite Business as well.”

Google Drive is a popular tool that many businesses use for real-time collaboration and data storage. However, since Drive lacks data loss prevention tools, the breach of information can easily devastate a business.

Until now, Google Drive users have been forced to go with the elite, most expensive collaboration package (G Suite Enterprise) if they wished to invoke Google Drive security measures. Collavate DLP now makes it possible to have data loss prevention services with any Google Drive platform, including G Suite Basic and G Suite Business.

It is estimated that the cost of cybercrime worldwide will top two trillion dollars by 2019, triple the estimated cost reported in 2015. Gartner CISO has identified risks imposed by point-of-sale devices, flash drive, mobile devices, file servers, databases, PCs and virtual servers. Potential access points include wirelines, wireless devices, VPNs and other similar avenues. Source codes, documents of product design, financial documents, customer data and other top-security data are all at risk of being breached.

It is increasingly imperative to have Google Drive security in place because the use of the collaboration tool often includes storage of critical information such as medical records, social security numbers, and credit card information. In many cases, just one breach may cripple a company.  Furthermore, upstanding businesses desire to be trustworthy with their employee and customer information.

Collavate DLP provides security detection in real-time, a key feature. The program also predefines keywords in files in order to monitor activity on viewing trends, another important measure. Rule setting and regular expressions are also defined for even stronger security.

All Google Drive suite editions, even SMB’s, are eligible to take advantage of Collavate DLP. Introducing Collavate DLP to the market serves as a welcome relief to collaborators who are aware of the the importance of cybersecurity.

To find out more about the services offered or to purchase, visit the Collavate DLP website.

PR Contact:

Claire Lin

claire@collavate.com

About Collavate Inc.

Collavate is a cutting-edge enterprise social network with workflow management capabilities. Completely integrated with Google Drive, Collavate allows you to assign deadlines, share ideas, and review documents—all through a secure platform. Implement Collavate’s free seven-day trial from the G Suite Marketplace.

Contact:

Claire Lin

Collavate Inc

San Jose, CA 95129

+1 (650) 515-3733

claire@collavate.com

http://www.collavate.com

AsTech Consulting Identifies Security Assessment as the Missing Piece in Merger & Acquisition Due Diligence

San Francisco Security Firm Working with Investment Advisors to Uncover Critical Security Flaws that Present Added Risk for Corporate Acquisitions.

San Francisco, CA, USA — Hidden security flaws in software and network infrastructure pose great risks to successful mergers and acquisitions, and yet assessing the security of target companies is commonly omitted from the M&A due diligence process. According to the team at AsTech Consulting-independent cyber security experts specializing in software and IT infrastructure security-unidentified vulnerabilities can heavily influence the value of an acquisition, and more investment advisors and corporations are working with AsTech to uncover hidden security issues to guide valuation and deal negotiations.

“A few years ago security audits were just for ‘tech’ companies but today almost every business is dependent on increasingly vulnerable, interconnected technology. Buyers no longer see this as an isolated ‘IT’ issue, it’s become a boardroom issue,” said David Fox, Managing Director, Strategic Value Advisors.

Assessing security issues and overall cyber risk is seldom considered as part of due diligence in merger and acquisition discussions, but this is changing. Negotiating parties examine revenue, assets, inventory, channels, and partnerships, but fail to recognize that a security weakness in the network infrastructure or source code may compel remediation costs that annihilate a significant percentage of the subject valuation. Security breach remediation and customer notification routinely cost companies hundreds of thousands of dollars, if not millions. For example, there are 47 states with “breach notification” laws and, according to the National Conference of State Legislatures, the average cost of a security breach customer notification alone in 2014 was $500,000.

“Hidden security issues can have a profound impact on any merger. In one recent case, the acquisition target discovered a breach during negotiations that affected their customers as well as the company itself. The acquiring company simply walked away from the table,” said Greg Reber, founder and CEO of AsTech Consulting. “To meet the market’s need, AsTech has launched an M&A Security Due Diligence Practice. Developed with M&A advisors, venture capital investors and security practitioners, this service focuses on getting useful information to the right players quickly, before it’s too late to have an effect on negotiations.”

Dr. Martin Carmichael, former CISO of TD Ameritrade and McAfee, agrees, stating: “As CISO of TD Ameritrade, I engaged AsTech to perform a security evaluation after an acquisition deal was done. They discovered critical security flaws, which required significant remediation costs. This information would have affected the valuation, and negotiations.”

Guy Henshaw, board member of payroll company Evolution HCM notes: “AsTech has helped our company assess the cyber risk of potential acquisitions on three occasions. They are adept at quickly assessing and analyzing risks: distilling results into very succinct reporting with recommendations. We will not go into a deal without the AsTech Due Diligence Cyber Risk Assessment.”

Depending on ‘deal-specific variables,’ there is a range of scrutiny that may be applied to this type of due diligence. A software company being acquired for the software itself doesn’t need an IT infrastructure assessment, but rather a software security analysis which in most cases could produce key results within a few business days.

“The business climate is changing and chief executives and board members are being held accountable by shareholders, employees, and others for costly security breaches,” Reber said. “Legal disclaimers no longer excuse liability. Smart executives are scrutinizing security in advance, rather than waiting for hidden problems to emerge that can create costly remediation. Assessing security vulnerabilities in advance strengthens your negotiating position, regardless of which side of the table you’re on.”

About AsTech Consulting
AsTech Consulting has been helping Fortune 1000 companies manage risk and protect vital information assets since 1997. AsTech’s technical team are true Internet security experts, providing a full suite of services focused on risk management and mitigation including Vulnerability Discovery and Remediation, Secure Development Training, Secure Software Development Lifecycle Consulting and Security Architectural Design.

For more information, visit http://www.astechconsulting.com.

Contact:
Tom Woolf
Public Relations Director, Gumas Advertising
415-259-5638
twoolf@gumas.com

AsTech Consulting Security Expert Sees 2016 as “The Year of Board Accountability”

New Cyber Security Assessment Framework from FFIEC and High-Profile Security Breaches Will Lead to Shareholders Demanding Answers.

San Francisco, CA, USA (January 19, 2016) — The year 2016 promises to be the Year of Accountability as corporate boards have to address serious questions about their companies’ defenses against security breaches and cybercrime. That’s the prediction of Greg Reber, CEO of AsTech Consulting, an 18-year-old cyber security consulting firm. Reber warns that board members as well as chief executives are going to be held more accountable by shareholders and regulatory agencies for inattention to cyber security weaknesses.

Last year the Federal Financial Institution Examination Council (FFIEC) released a new cyber-security assessment tool to help financial institutions move from a simple, “check-the-box” approach to security assessment to a more risk-based methodology, including specific milestones that boards have to meet at different maturity levels. This marks a new era in financial institution security oversight due to the specificity of the compliance framework. This move by the FFIEC puts corporate boards on notice as well as chief executives that cyber security is their responsibility.

“Data security breaches will continue to be more spectacular and more costly to business,” said Reber. “What is changing is the demand for more accountability. In addition to requiring that high level executives step down (such as the CEO of Target), we are going to see more boards of directors held responsible for security failures. Cyber security is a problem that will continue to escalate, resulting from emerging technologies being applied to cybercrime coupled with a lack of due diligence by senior management.”

Reber notes that there are multiple reasons that 2016 will become a year of increasing cyber security attacks:

1. Aging Internet applications – The World Wide Web is 23 years old in 2016 and many of today’s Web applications are built using source code that was developed before security risks were understood. These applications propagate security weaknesses unless they are specifically addressed in the source code, or by other means.

2. The rush to introduce new technology – Emerging technologies are creating new cyber security risks that are not well understood. The Internet of Things (IoT), for example, is driving a rush to market and many times cyber security is an afterthought. Adding security to new technology later rather than making it part of the initial development will leave ‘seams’ for security flaws.

3. Malicious ecommerce – Social media sites such as Facebook, Twitter, and Pinterest have announced that they will be adding “buy” buttons to their sites. While this may attract more users and promote customer retention, it also will create new opportunities for cyber-fraud and identify theft.

Conversely, the good news for the coming year is that better analytics with more accurate predictive capabilities are coming to market every quarter. It is becoming easier to identify where hackers are likely to strike next, supplementing traditional enterprise security safeguards with predictive analytics and analytics-driven security methods.

“We have better analytics and predictive capability to head off more security problems, but companies still need to make cyber security a priority before they have to pay for the consequences of a cyber breach,” added Reber. “It’s more than a matter of adding more security detection tools; companies have to scrub their infrastructure to uncover legacy vulnerabilities. In the current regulatory climate, vulnerability discovery and remediation is much less expensive than paying the fines and legal fees, not to mention equity losses, that follow a systems hack.”

About AsTech Consulting
AsTech Consulting has been helping Fortune 1000 companies manage risk and protect vital information assets since 1997. AsTech’s technical team are true security experts, providing a full suite of services focused on risks to information including Vulnerability Discovery and Remediation, Secure Development Training, Secure Development Lifecycle Consulting, and Security Architectural Design.

For more information, visit http://www.astechconsulting.com.

Contact:
Tom Woolf
Public Relations Director, Gumas Advertising
415-259-5638
twoolf@gumas.com

Global Technology Solutions provider Netswitch launches product to Maximize Network Security for all Businesses and Company COO and Chief Security Officer Launches eBook

When a computer virus infected the network at Crouse and Associates in San Francisco, the insurance services company ground to a halt during a weeklong outage — costing a significant amount of time and money to resolve.

San Francisco, CA, August 31, 2014 – When a computer virus infected the network at Crouse and Associates in San Francisco, the insurance services company ground to a halt during a weeklong outage — costing a significant amount of time and money to resolve. The company does not have a large IT staff or a chief information security officer, it can’t afford to employ security experts and it doesn’t have the time or expertise to wade through the complicated Internet security landscape filled with intimidating terminology like “botnets,” “kill-chains,” “application firewalls” and “advanced persistent threats.”

So the busy company left it all up to global technology solutions provider Netswitch and its innovative MADROC® Integrated Security Platform that maximizes network security for more than 2,500 global businesses, large and small. MADROC® provides complete intrusion detection and prevention along with event management and immediate alerting and remediation — complete peace of mind within a monthly subscription plan.

The future is very clear: Cyber-crime is growing rapidly and as security gets better, the criminals get smarter. To respond to this real problem, Netswitch has revolutionized the way IT security is delivered — controlling and monitoring a heterogeneous mix of IT technology from top to bottom at every touch point; a true Defense in Depth security strategy. A MADROC® subscription includes all engineering, configuration, tuning, licenses and maintenance, along with a dedicated Security Operations Control Center providing support around the clock, with 15 minute response and immediate remediation.

“Netswitch is applying technology to important security and social issues that I care deeply about,” said Ken Chrisman, Board Member of Netwitch. “This is an important opportunity to use technology to protect personal information and doctor/patient confidentiality. I believe MADROC® is poised to revolutionize the personal information security space with enhanced security protection through advanced behavioral analytics while leveraging the cloud to manage the massive data being generated.”

For more information go to http://www.netswitch.net/.

MADROC® Integrated Security Platform Customer Testimonial:

Pam Quilici, executive vice president of Crouse and Associates

“We chose MADROC® to ensure that our network will be secure and that we are protected from similar attacks in the future,” said Pam Quilici, executive vice president of Crouse and Associates. “Netswitch has been a trusted supplier of IT services for years. We love the way the MADROC® service is designed and we know we can always count on Netswitch for the smartest and most professionally responsive support.”

Shane Isaaks, the CIO of the Peninsula Hotel Group and Hongkong and Shanghai Hotels Group:  (See detailed information on this case study below)

“We have used Netswitch Security Services and their experts for years to insure that the Peninsula Hotels are protected against data breaches and other security threats. Their new MADROC program is revolutionary in that it combines all levels of protection in a single service package that is amazingly affordable. We are looking forward to a threat-free future.”

e-Book Breach Launches
In addition to the launch of MADROC® Integrated Security Platform, Netswitch COO and Chief Security Officer Steve King has launched an eBook called “Breach” that describes the current state of data breaches, and what you can do to protect your company.

Excerpt from eBook Breach: We have seen the trends in cyber-crime and malware attacks. With these attacks evolving at such an astounding pace, your organization needs security solutions today that address head-on every attack vector from the surface to the core, aka Defense in Depth. We believe that the principle of Defense in Depth should be the foundation strategy for any and all business security policies and approaches. Defense in Depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.

In terms of computer network defense, Defense in Depth measures should not only prevent security breaches, but will also buy an organization time to detect and respond to an attack, thereby reducing and mitigating the consequences of a breach.

“I wrote this book because I wanted to help business leaders sort through all of the jargon and arcane references in the data security world so that they could understand both the actual threats, the dangers of doing nothing and the easiest, simplest and lowest cost ways to insure against the inevitable data breaches that will occur in the future,” said King.  “One of the many dangers in doing nothing is that it will invite the government (both) to insert themselves into the process of “protecting consumer personal information”. The costs of compliance with Sarbanes-Oxley have risen more than 60% over the last 10 years and have had significant unintended consequences in area like IPOs and increased compensation for lawyers, auditors and run-away consulting fees. It would be much worse with a Federal Security Compliance Act.”

NOTE:  On Tuesday, August 26th the first of many bills to come is on Jerry Brown’s desk imposing government rules and protection legislation on businesses (who do not do it themselves) to insure against the loss of consumer and personal information and to offer one year free credit access to consumers whose financial information has been compromised.
The book is complimentary and can be downloaded at http://www.netswitch.net/ebook-breach-by-steve-king/.

Background on Steve King, Chief Operating Officer, COO and Chief Security Officer and eBook Author

After college, Steve turned down an offer to be a copy-writer on the Hoover Vacuum account for Hoefer-Dieterich and Brown to pursue a career in IT, but never lost sight of the future impact of consumerization on Information Technology. Steve subsequently logged over 30 years of computer industry experience in sales and marketing, software engineering, product development and professional services. Steve also has extensive market experience in Information Security Management Internet, Digital Media, Business Intelligence, Document Management, eCommerce, and Business Process Reengineering.

Steve has managed product development with UNIX, Windows and Java platforms, founded three software and services startups and raised $32m in venture capital. Steve has held a variety of executive management positions in development, sales, and marketing  for ConnectandSell, Whittman-Hart, marchFIRST, the Cambridge Systems Group, Memorex, Health Application Systems, Endymion Systems, Blackhawk Systems Group and IBM.

He has also led digital marketing engagements for Abercrombie & Fitch, Tommy Bahama, REI, Harley Davidson and wrote a best-selling business book on Retail Web Marketing.

As a co-founder of the Cambridge Systems Group, Steve led the marketing effort for ACF2, which would become the leading Enterprise Data Security product for IBM mainframe computers. As a direct result, Steve is now known as the God-father of Information Security. Over the years, Steve has been issued multiple engineering patents encompassing contextual semantic search technologies, web-enabled multimedia audio transfers, imaging capture and database smart query processing.

Steve studied toward a B. S. in Mathematical Probability and Statistics from the University of California at Berkeley with a Minor in Journalism and studied Social Justice Law at the Santa Clara University School of Law.

Contact:
Marci Bracco Cain
Chatterbox
Carmel, CA 93923
831-747-7455
http://www.netswitch.net

CloudeAssurance and Data Privacy Network to Present “Adopting the Cloud Safely and Securely” Webinar

Comprehensive webinar will explore how to safely and securely adopt the cloud to maximize its benefits for business.

Tempe, AZ (USA), November 05, 2013 — Black Dog Promotions is proud to announce a dynamic new webinar that will be produced jointly with CloudeAssurance and Data Privacy Network. With the explosion of the “cloud” recently, it is increasingly being embraced by businesses worldwide. In taking it to the next level–security of data, files and information need to be of the utmost importance. Founder Taiye Lambo and Lead Cloud Security Analyst Jordan Flynn of CloudeAssurance and Co-Founder of Data Privacy Network, Phil Alexander will conduct this vitally important webinar on Wednesday, November 20th, 11:00 a.m. EST/8:00 a.m. PST.

“What we’re going to focus on are the real world benefits of the cloud,” said Alexander. “There are definite benefits. You have worldwide collaboration, rapid deployment and reduced cost. It’s much easier to go through an established cloud service provider than to try and create a cloud environment in your own network.” There are also risks that are involved with using a cloud environment. “We will ask the attendee to consider several things,” noted Alexander. Questions to consider will be: 1) What level of security is right for your company? 2) What’s the nature of your data? 3) How sensitive is that data? 4) Is data co-mingled? “If it’s just non-sensitive, fully-disclosed data, security is less of an issue.” The webinar will utilize three state-of-the-industry experts to help walk business owners and IT experts through the myriad of security exposure scenarios and give valuable strategies and solution ideas to help organizations protect their data. An attendee Q&A session will also take place towards the end of the webinar.

“We’ll be exchanging a lot of ideas. The main thing we’ll be talking about are the benefits of adopting the cloud for business and then the potential security issues of putting your information in the cloud,” stated Lambo. There are also some other important issues that businesses will be made aware of and how best to handle various security issues. “We’ll be sharing our high level research and explaining our Top 10 cloud service provider independent benchmark study information,” Lambo said. Flynn added, “This webinar focuses on how to enable the benefits of the cloud securely.” The webinar is free of charge and attendees can sign up here https://www.brighttalk.com/webcast/9459/91376.

The collaboration between CloudeAssurance and Data Privacy Network will continue beyond their initial webinar, too. “We’re so like-minded. It’s one of those things that you can’t have privacy without security,” said Lambo. “And we share the same philosophy.” The ultimate goal is for the two companies together to increase awareness of online security while conducting webinars and speaking engagements designed to give businesses valuable knowledge and strategies to protect their business information.

About Black Dog Promotions:
Black Dog Promotions is a media and business development agency and also provides digital marketing and publicity consulting for regional and national brands. Black Dog’s team has a long history of success in the entertainment, sports, technology and finance industries. Founder, Scott Kelly is a Principal and business partner with Data Privacy Network in helping businesses and protect their valuable data. Black Dog Promotions has taken companies from concept to millions of dollars in sales and billions of dollars in market capitalization. Find out more at www.BlackDogPromotions.com – The Intersection of PR, Digital Marketing and Sales.

About CloudeAssurance:
The CloudeAssurance platform is the industry’s first risk-intelligent rating, continuous education and continuous monitoring system assuring cloud service provider’s cloud security and governance, risk and compliance. Customers learn which cloud providers have the best cloud assurance score and history, a measure of cloud trust they can depend on. This platform enables safe and secure adoption of cloud computing. www.CloudeAssurance.com.

About Data Privacy Network:
Data Privacy Network was founded on a mission to raise awareness about the perils of unsecured data and the dangers of online predators, Founder and CEO, Philip Alexander has authored three books and numerous articles on the topics. He writes a popular blog, and expresses his zeal as the nation’s data security evangelist, speaking to business and parenting groups throughout the country. Data Privacy Network has developed a network of consultants, speakers, products and services to help individuals and businesses of all sizes secure their data, protect their identity and maximize online security. www.DataPrivacyNetwork.com.

Press & Media Contact:
Scott Kelly
Black Dog Promotions
9920 S. Rural Rd., Ste 108
Tempe, AZ 85284 – USA
480-206-3435
scott@blackdogpromotions.com
http://www.blackdogpromotions.com

Data Privacy and Security Gurus Partner with Black Dog Promotions to Launch Data Privacy Network

Black Dog Promotions announced it has partnered with leading data privacy and security experts to form Data Privacy Network to take advantage of the rapidly growing market for data and online privacy and security.

Tempe, AZ (USA), August 14, 2013 — Black Dog Promotions, a digital marketing, public relations and business development agency announced it has partnered with leading data privacy and security experts to form Data Privacy Network (http://DataPrivacyNetwork.com) to take advantage of the rapidly growing market for data and online privacy and security.

Whether it’s social media, cloud computing, the internet, or foreign hackers, the challenges to protect sensitive data are becoming more daunting by the day. With the average cost of a data breach estimated to be $500,000, companies need to be armed with the knowledge to secure their data in order to protect themselves. Data Privacy Network is on a mission to raise awareness of the risks that put our data privacy in peril. DPN can help companies better protect their sensitive data, which in turn protects their customers, and themselves from being the victim of a data breach.

The experts at Data Privacy Network note that, While no computer is completely ‘hack-proof’ and no one vendor solution is the holy grail of computer security, companies can take steps to better protect themselves. In fact, when done correctly, data security can be eloquent. Properly use the equipment you have, and maximize your data security ROI. I am thrilled to align ourselves with ‘Best of Breed’ consultants, products and services to provide the best solutions to individuals and businesses of all sizes”

Black Dog Promotions CEO Scott Kelly added, “Eight months ago we submitted an article on online security to the media and the response was overwhelming and we knew we were on to something. Since then we have assembled a team of highly qualified consultants and speakers along with outstanding products and services to help solve the data privacy and security issues that are talked about daily in the media. We look forward to becoming a leading resource for data privacy and security solutions.”

To learn more DPN’s products and services, visit http://DataPrivacyNetwork.com Contact Scott Kelly to explore partnership opportunities at: scott@blackdogpromotions.com

Press & Media Contact:
Scott Kelly
Black Dog Promotions
9920 S. Rural Rd., Ste 108
Tempe, AZ 85284
480-206-3435
scott@blackdogpromotions.com
http://www.blackdogpromotions.com

School Security Threat Assessment Program helps Schools Identity Weaknesses in Security after Sandy Hook Shootings

Schools around the U.S. have found it difficult to put strong security controls in place because of lack of funding and resistance by parents and staff, who, unfortunately, saw physical security controls as too restrictive.

Boca Raton, FL (USA), December 22, 2012 — Schools around the U.S. have found it difficult to put strong security controls in place because of lack of funding and resistance by parents and staff, who, unfortunately, saw physical security controls as too restrictive.

After the recent tragedy in Newtown, CT, it is critically important that every school do a security threat/risk assessment to see where their own vulnerabilites may be.

To address the situtuation and make it easier to do a simple, effective school security asssessment, Risk and Security LLC has announced a new School Security app, which can run on a tablet, smart phone or laptop.

The Risk-Pro for School Security© app is available for only $ 495.00 for non-profit healthcare organizations ($595.00 for others), and comes with an on-line user guide and free training.

The program is looks at the entire school, addressing areas like access control, entry controls, and incident response. The program was developed by Caroline Hamilton with the National Institute of Justice and Eastern Kentucky University to create an easy way for schools to use FEMA 428, How to have Safe Schools.

The web 2.0 program, Risk-Pro for School Security©, is affordable and simple to use. It includes fully-updated threat databases, and automated web-surveys based on security requirements from FEMA 428.

“With 3-year old twins in my family, I was high motivated to make sure they are safe at their pre-school, and have fielded calls from dozens of security professionals who are worried about their children’s school security posture. The Risk-Pro© model has been used for easy software applications with the Department of Defense and over fifty hospitals, health plans and government agencies.

About Risk & Security LLC:
Risk & Security LLC is a security risk assessment and risk analysis company with over 30 years of combined expertise in security risk. It specializes in consulting on risk assessment projects and global application development of risk solutions. Risk & Security partners with security companies around the world to provide state-of-the-art security expertise to analyze risk and recommend cost-effective countermeasures.

The team of risk and security experts is led Caroline Ramsey-Hamilton, who has created more than 18 security assessment software programs, and conducted more than 200 specialized security risk assessments in a variety of environments, including companies in the United States and around the world.

Press & Media Contact:
Risk & Security LLC
Boca Raton, FL – USA
1-800-860-8735
caroline@riskandsecurityllc.com
http://www.riskandsecurityllc.com