Technology 2017-12-08T14:32:46+00:00

Technology Overview

Cyber Privacy

Data & Identity Theft Protection

Privacy is all about Trust

"Trust, but Verify"

- Ronald Reagan, 40th US President

Data Loss & Identity Theft

  • The biggest issue in Identity Theft is Data Loss
  • Data Loss is caused by 3 main vectors
  • 1. Rogue processes & applications

    2. OS Level Telemetry

    3. Network based data profiling

    How is Identity Theft different from Security?

  • Identity Theft is an important part of Security
  • Identity Theft focuses specifically on preventing data loss.
  • Security is about preventing incoming threats.
  • Existing Solutions

    Perimeter Defense

  • Firewalls
  • Intrusion Prevention (IPS)
  • Anti-Virus

  • Anti-Virus, Anti-Malware
  • Useful only after infection
  • BlackFog Solution

    Focuses on multiple points of data loss

    Device Defense

  • Stops Application, OS data collection
  • Network Defense

  • Stops outbound data loss
  • Focuses on prevention
  • Why BlackFog?

  • Lightweight protection
  • Stops threat vectors
  • Improves performance
  • Detects unknown threats
  • When perimeter defense fails
  • The OSI Model

    How does it work?

  • Works at Layer 3 packets
  • Every packet is Geolocated
  • Intercepts in real-time
  • Rules updated to prevent new threats
  • Blocks active data collection
  • Microphone activation alerts
  • Protecting your online Privacy – Prevention

    In the previous article we discussed how Perimeter Defense and Anti-Virus solutions are an important part of your overall security regime to protect your online privacy. These solutions focus specifically on known vulnerabilities rather than [...]

    By | April 21st, 2016|Categories: Online Safety, Privacy, Technology|0 Comments

    Protecting your online Privacy – Known Vulnerabilities

    Cyber Privacy is an important subset of your computer security regime which includes Anti-Virus, Anti-Malware and perimeter defense tools like Firewalls and Intrusion Prevention Systems (IPS). Most security products today focus on resolving problems based [...]

    By | April 11th, 2016|Categories: Online Safety, Privacy, Technology|0 Comments

    Malvertising – the next wave of malware distribution

    Malware, that malicious software that infects our computers may have just found a new distribution mechanism. Traditionally spread through so called Phishing techniques, like emails that promise to make you rich or links to free software, malware is just a fact of life these days.

    By | March 22nd, 2016|Categories: Online Safety, Privacy, Technology|0 Comments
    Download Now