What We Are Doing is NOT Working

Hundreds of billions of dollars are spent annually for layer upon layer of active defenses, yet not a day goes by without new headlines and personal experiences of successful attacks that continue to multiply.   

network nodes

Cameras

  • 13% of Home Security Cameras Have Been Hacked

    13% of home security users have experienced their security cameras being hacked, emphasizing the importance of using cameras with end-to-end encryption, frequent firmware updates, and secure authentication methods to enhance security
    Read more
  • Security flaws in two major brands of Chinese-made surveillance cameras enables hackers to take control

    Security flaws involving the two top brands of Chinese-made surveillance cameras enables hackers to take control for both spying and further intrusion into networks
    Read more
  • Over 43% of security camera owners are worried they have been hacked

    A recent survey by U.S. News & World Report revealed a startling statistic: over 43% of security camera owners are worried that they have been hacked.
    Read more
  • Amazon Ring Fined $5.8M for allowing employees to spy

    Amazon.com’s doorbell camera unit Ring was fined $5.8 million for allowing its employees to spy on customers camera feeds.
    Read more

Data

  • Average Cost for Data Breach for SMB nearly $3M in 2022

    The average cost of a data breach for a small-to-midsized business can vary depending on the size of the business. For small businesses with fewer than 500 employees, the average cost was around $2.98 million in 2023.
    Read more
  • On average, only 3 percent of SME’s data folders are protected

    On average, only five percent of a company’s folders are protected for businesses overall, and this figure drops to 3% for small-to-midsized businesses
    Read more
  • 79% of organizations have lost data from a cloud service more than one time in the last 18 months

    In the last 18 months, 79% of companies have faced at least one cloud breach, with 43% reporting more than 10 breaches in that period
    Read more
  • Since 2020, healthcare breach costs have increased 53.3 percent to $10.93 million

    Since 2020, healthcare breach costs have increased 53.3 percent to $10.93 million
    Read more

Green Energy

  • 57% Attacked: Why Small Businesses Need to Rethink Cybersecurity

    An alarming 57% of Small and medium-sized enterprises (SMEs) have experienced a cyberattack, according to recent reports, highlighting that they face a disproportionate cybersecurity challenge.
    Read more
  • 73% Of Black Hat Hackers See Standard Firewalls and Antivirus programs as obsolete

    73% Of Black Hat Hackers See Standard Firewalls and Antivirus programs as obsolete
    Read more
  • The average ransom demand for an SMB was $1.62 million in the first half of 2023

    The average ransom demand for an SMB was $1.62 million in the first half of 2023, a 47% increase from the previous six months and a 74% increase over the past year,
    Read more
  • Catastrophic Risks To EV Charging Station Security

    As electric vehicle adoption surges, Experts are stressing the urgent concerns regarding the security and privacy of charging stations and the need to fortify charging infrastructure to protect customer data, ensure Wi-Fi network integrity, and prevent potential disruptions to power grids.
    Read more

Healthcare

  • 73% Of Black Hat Hackers See Standard Firewalls and Antivirus programs as obsolete

    73% Of Black Hat Hackers See Standard Firewalls and Antivirus programs as obsolete
    Read more
  • Rate of Attacks on Small Physician Groups and Hospitals Rose five fold in 2022

    The number of attacks on physician groups and small hospitals rose from 2% in the first half of 2021 to 12% in the same period of 2022. 
    Read more
  • 83% of 1,300 physician practices surveyed have already experienced a cyberattack

    83% of 1,300 physician practices surveyed have already experienced a cyberattack according to a recent survey by the American Medical Association
    Read more
  • 57% Attacked: Why Small Businesses Need to Rethink Cybersecurity

    An alarming 57% of Small and medium-sized enterprises (SMEs) have experienced a cyberattack, according to recent reports, highlighting that they face a disproportionate cybersecurity challenge.
    Read more

Manufacturing

  • 73% Of Black Hat Hackers See Standard Firewalls and Antivirus programs as obsolete

    73% Of Black Hat Hackers See Standard Firewalls and Antivirus programs as obsolete
    Read more
  • The average ransom demand for an SMB was $1.62 million in the first half of 2023

    The average ransom demand for an SMB was $1.62 million in the first half of 2023, a 47% increase from the previous six months and a 74% increase over the past year,
    Read more
  • Businesses with 10 to 49 employees saw a nearly fourfold rise in the average number of attacks in 2022

    Businesses with 10 to 49 employees saw a nearly fourfold rise in the average number of attacks in 2022 hackers have directed more of their attention to mid- and small-sized businesses according to Insurance provider Hiscox's 2022 Cyber Readiness Report
    Read more
  • 57% Attacked: Why Small Businesses Need to Rethink Cybersecurity

    An alarming 57% of Small and medium-sized enterprises (SMEs) have experienced a cyberattack, according to recent reports, highlighting that they face a disproportionate cybersecurity challenge.
    Read more

We need the Internet. But the Internet and telecommunications networks are insecure and NOT PRIVATE. 

  • No device, data or digital asset of value is safe from criminals and hackers
  • Authoritarian governments and hostile state actors around the world can spy upon and sabotage companies and organizations, infrastructure and individuals with unprecedented ease and efficiency
    • Defending against this threat matrix has become too complex and costly for average users and SMBs, so they just give up

    How Did We Get Here?

    This didn't just happen by accident. There are root causes for the current state of affairs.

    Centralized servers, with human access and control

    The "Cloud" infrastructure that you rely on today - and the security solutions that attempt to defend it - all rely upon:

    • Centralized servers
    • Centralized Certificate Authorities

    These servers, certificates and people can all be compromised. Or no need to bother since certificates can be purchased on the Dark Web!

    Visible for study and attack

    With Internet Protocol, network addresses and traffic are visible, and connections are insecure by default. So the Bad Guys always have the advantage

    Data is Vulnerable

    Because:

    • it is either not encrypted or someone else has the access to and control of the keys; and
    • encryption UX is too complex and painful so it is rarely used

    The Costs of Insecurity Are High and Growing

    We need the Internet. But the Internet and telecommunications networks are insecure and NOT PRIVATE. Because of this:

  • Remote distributed workforce with BYODHas made traditional defences like VPNs irrelevant
  • Everything is Getting ConnectedIt is no longer just your data at risk
  • Al is expanding both the sophistication and breadth of attacksExponentially lowering the costs and increasing the power of decentralized attacks
  • Most Average Users and SMBs Are Just Hoping They Are Not Next

    Because they lack an understanding of the threat and existing tools are both vulnerable and too complex and expensive
     

    VPNs Are Simply Not Sufficient

    It's not that they are bad. They just do not address the actual root causes of the problem and suffer from the same 3 foundational vulnerabilities.

    • Centralized servers with human access
    • Castle and Moat architecture 
    • Visible for study and attack

    And they still integrate and rely upon the rest of Web infrastructure - and its vulnerabilities.

    SDNs / ZTNA Are Too Complex and Expensive - and Still Vulnerable

  • Still Have Centralized Control and Vulnerabilities
  • Complex and Hard for End Users and IT
  • Expensive Enterprise Solutions & Support
  • So SMBs avoid them entirely or use them only for selective, high risk users - leaving the rest of their networking unprotected or on VPNs.

    unsafe fear

    Neither Protect Our Critical Smart and Dumb Devices

    Because they lack:
    • sufficient resources for encryption; and/or
    • programmable interfaces to connect to encrypted networks.
    • So organizations rely upon firewalls and other tools to try to block the gateways to them.  But so long as they are on the Internet, they are vulnerable.

    unsafe fear

    Neither Protect Your Data

    • VPNs and SDNs / ZTNA only protect data in transit.
    • Data encryption solutions can be layered on, but have many pain points.
    • Centralized admininistration and access
    • Don't scale, rigid and brittle
    • Complex and Hard for End Users and IT
    • So your data just lies around on endpoint devices and cloud servers waiting for the next hack.

    "Just Trust Us"

    Today, you always have to trust the Privacy Policies and ability of Web platforms, application providers – including VPN companies, service providers and your own staff – to defend their platforms and infrastructure from outside and inside attacks. But they can always be compromised easily.
    Read More

    None of Us Would Have Agreed to This

    Like the proverbial frog in the pot of boiling water, we’ve been numbed into submitting to a state of affairs that no one would have conceived, much less accepted, 20 years ago!
    Read More