Friday, March 14, 2014

Ignorance is not an excuse to circumvent the law!

The Failure Of Corporate Governance Will Cost YOU,         Your Board, Shareholders & Customers Dearly
By Nick Ashton, Founder, CEO, Tracometry Group of Companies.

As they say in the law courts, “Ignorance is not an excuse to circumvent the law

So who is charge?  Is it the Board of Directors, the shareholders or is it the CEO, CFO and other management team members?  The CEO’s etc. are just the hired help and they can be fired at will, but they do have the daily running of the company to handle and have been trusted to do so.

Just like the guy or girl who cleans the toilets, they have a job to do and importantly they must do it well!  If not, it stinks, is unhealthy and the word spreads, as do the germs!

The power of the office of the CEO is massive!  It also changes people to think they are above being human, talking to people outside of their “click”.  Some say they do not have the time in the day to effectively look at understand all the information that is directed at them.

They have a Gate Keeper, who, in most case is a “pain in the ass” and in their own mind have to stop those that call dead in their tracks and get rid of them, no matter what they have to say. 

WOW! 

So who is in charge of the information from the real world and not allowing it to get through?

Let us get right into Liability.  As supposedly the “buck stops” at the desk of the CEO, he or she is last in line and liable for all the company does, doesn’t do and fails to protect its customers/clients.

Let me put it another way, Duty of Care.  I believe it is a simple way of saying the same thing and brings it into a realm that most we hope understand.

For instance, theft of data is occurring at an ever increasing rate and is more important than you can ever think!  The Board Room should not be a room of them and us, but it is!  The IT Department should be involved in that room and management in the computer room.  Stop this building of Kingdoms!

Back in the day, all the information was on paper and stored in filing cabinets, the cabinets no one could find the key for when it was important to get the information.  Now, it is on servers or supposed clouds and not even really in the building.  It is sitting somewhere and is accessible by a key stroke and a monitor.  Which is hackable by cyber-terrorists.

By the way, it is not IF you going to get hacked, it is WHEN!

Your IT Department is not just some department that has special air-conditioning and a bunch of geeky nerds, who speak a whole new language that you do not understand! 

Your Trust & Security Director is more important than you, as they should have those keys to unlock the information, proactively continue this important work. Sadly as they are always being reactionary, the important protection gets pushed to the wayside.  Yes doors are left open and hackers get in!

In this case it is a username and password.  Which are not secure by any means!  Most CEO’s do not understand the technology and the computer department gets treated in very demeaning manner. 

They should not!

Today, Hacking, Phishing, Man in the Middle Brutal Attackers want what you have and when they get inside the core of your company, the data, they then have access to the lifeblood of the company, the client/customer.

If you do not believe it, ask the CEO of Target and his former Trust & Security Director, did they understand what was going on and how vulnerable they were?  No, it is the after the fact, facts that sink you.  Ask the millions of customers how they feel and if they trust Target or anyone who takes a debit/credit bank card. 

Target heard loud and clear with 46% drop in profits in the 4th quarter!

I can assure you, KEYTALK is not all mouth and just wanting to sell you something and make you pay us a fee.

KEYTALK has the solution and is a solution that has been protecting data in motion in all of Europe for over twenty years.  Now, the rest of the world can be protected as well!  Please ask us the question of how we can protect you!

In respect to Duty of Care, our responsibility to others has always been a high priority and logically you would think everybody would understand the need for this important factor in our society.

Duty of Care requires everything reasonably practicable to be done to protect the health and safety of others in the workplace. This duty is placed on all employers, their employees and any others who have an influence on hazards, security and day-to-day activities in a workplace.

The latter includes contractors and those who design, manufacture, import, supply or install plant, equipment or materials used within a workplace.

Reasonable practicable means that the requirements of the law vary with the degree of risk in a particular activity or environment, which must be balanced against the time, trouble and cost of taking, measures to control the risk.  It allows the duty of care holder requiring change in technology and knowledge to be incorporated but only as and when it is efficient to do so.  The duty holder must show that it was not reasonably practicable to do more than what was done or that they have taken reasonable precautions and exercised due diligence.

Pretty straight forward, you know about it and do nothing or ignore it, you are liable and will pay!  It does not have to be that way!

In terms of Corporate Governance, it is said “Corporate governance refers to the set of systems, principles and processes by which the said company is governed. They provide the rules as to how the company can be directed or controlled such that it can fulfill its goals and objectives in a manner that adds to the value of the company and is also beneficial for all stakeholders in the long term. Stakeholders in this case would include everyone ranging from the board of directors, management, shareholders to customers, employees and society. The management of the company hence assumes the role of a trustee for all the others.”

I was once told by a very successful account, that company is a dumb, deaf and mute innate object and has to have humans guide it from A to B.  There lies the problem!

In researching the responsibility of all those involved in running a large or small corporation, they are exactly the same in principle. 

Corporate governance or Duty of Care is based on principles such as conducting the business with all integrity and fairness, being transparent with regard to all transactions, making all the necessary disclosures and decisions, complying with all the laws of the land, accountability and responsibility towards the stakeholders and commitment to conducting business in a most ethical manner. 

Corporate governance is the need for those in control to be able to distinguish between what are personal and corporate funds whilst managing a company.

Your largest threat is the security of your information that is desperately wanted, at no matter what cost by others, who will illegally steal it from you. 

Doing nothing is foolish!

KEYTALK will STOP IT, Just Ask!


WE are in the NOW and
KEEP YOU; in the KNOW…


Worldwide Call: +1 (317) 426.0110


Key Talk – Man-In-The-Middle, Hacking & Phishing Solutions
Straight Talking Key Talking…  KEYTALK!


Galveston, Texas, Indianapolis, Indiana, London & North Wales, U.K., Netherlands, Lithuania, K.L. Malaysia
Tracometry Group of Companies – Reg. Office. Dorrington Farm, Rye Hill Road, Harlow, Essex CM18 7jF


Copyright 2014

Thursday, March 13, 2014

You Lock Your Doors, Keeping Your Keys Safe, What Has Happened Regarding Your Digital Information?


You Lock Your Doors, Keeping Your Keys Safe,
What Has Happened Regarding Your Digital Information?
By Nick Ashton, Founder, CEO, Tracometry Group of Companies.

By using a username and password opens the door for the uninvited to access your data, interfere with your transactions and or take over your identity.

Nobody seems to understand that using your log-in human credentials, like username and password, those two factors and or bio-metric authentication, you are the total opposite of secure!  Your data, transactions and or your Identity is at major risk to be stolen by hackers, phishers and man in the middle brutal attackers.

KeyTalk, fully understands that by using your log-in credentials they should prove who you are, but this is no guarantee. Phishers and hackers are challenging us to share these credentials, harassing us with fake emails, telephone marketing calls and other clever idea’s to get your very personal log-in details. Once collecting these details cyber-criminals will use and sell them and make your life extremely miserable.

KeyTalk recognized this dangerous vulnerability and developed a bullet resistant solution which is proprietary software and patented globally.

When using KeyTalk, if they steal your log-in credentials and attempt to gain access, they will not get authentication!  Your data, transactions and or identity is totally secure. In other words, your log-in and password are no longer important and therefore not critical anymore.

KeyTalk takes security to a whole different sphere and out of those human hands into the workings of our Desktop PC/Mac’s, Laptops, Tablets and Smart Mobile Phones. KeyTalk takes a combination of your devices components as they then become a unique DNA to identify the device first, before being authenticated and gaining access to your data, transactions and or enterprise.

With the device recognized, the bullet resistant connection is built between client and server. It is likened to a secure tube, which is solid and impenetrable.  Only after the connection is verified, than the transaction will occur.

The connection is built for a predefined period of time, seconds to hours, the Encrypted Keys for this transaction are totaled deleted afterwards. For any separate access a new dedicated and new encrypted key will be made available automatically. This way, the encrypted keys are not existing anymore and therefore not available for others with wrong defined criminal intentions.

No matter where you are, regardless of what type Internet connection or hotspots you are using, hotel or public hotspot, KeyTalk builds that bullet resistant tunnel between your device and the target server, bypassing all hardware obstacles like routers, bridges and firewalls to give a secure freeway to your data, transaction and or the connection.

Using KeyTalk, your own device (BYOD) can be connected to the enterprise relatively easily and simply by installing KeyTalk as a single sign-on secure connection, using KeyTalk’s patented temporary automatically distributed access encrypted keys. 

In short, KeyTalk gives your device, Desktop PC/Mac’s, Laptops, Tablets and Smart Mobile Phones or a combination, a temporary key to connect to your target. After the transaction or when the predefined access time is passed, the key will disappear, closing the connection. To reopen the connection, a new key is needed, which will be sent when the user will activate KeyTalk the next time and only on the device that is already known, approved and authentication is established, in relation to the planned connection.

No more human usernames and passwords on their own, they can still be used but have no bearing on the ability to connect.  Your users do not have to be informed of any change and continue in safety to use your now solidly secure data in motion system.

Straight Talking, Key Talking… KeyTalk!

The KEYTALK Video Overview

WE are in the NOW and
KEEP YOU; in the KNOW…


Worldwide Call: +1 (317) 426.0110


Key Talk – Man-In-The-Middle, Hacking & Phishing Solutions
Straight Talking Key Talking… KEYTALK!


Galveston, Texas, Indianapolis, Indiana, London & North Wales, U.K., Netherlands, Lithuania, K.L. Malaysia
Tracometry Group of Companies – Reg. Office. Dorrington Farm, Rye Hill Road, Harlow, Essex CM18 7jF


Copyright 2014

Tuesday, March 11, 2014

Is Your Castle Really That Safe? Hast Thou A Hacker In Thou Midst?

Is Your Castle Really That Safe?
Hast Thou A Hacker In Thou Midst?
By Nick Ashton, Founder, CEO, Tracometry Group of Companies.

You believe you are safe in your home from those Hackers, Phishers and Man in the Middle Brutal Attackers, you are NOT!

It is funny, most CEO’s and other management have been ignoring the Technology War, the Cyber Terrorists, thinking it can never happen to them and someone else will take care of the 0101010’s and the $$$$’s take care of themselves.  

Very wrong thought pattern!

We have foolishly still been using passwords to protect our inner most corporate and personal secrets.  You know, birthdays, 123456, #SS, children’s names or your lotto ticket #’s.  So easy to hack, crack and become lucky for a hacker!

We must be thinking DNA, yes making our devices, Desktop PC/Mac, Laptop, Tablet and all important, Smart Mobile Phone.  Your access to all information stored on servers and our computers will be your Device DNA

Sounds cool and far-fetched, right?

KEYTALK has already done it!  

Yep, they are soooo far way ahead of the
curve and protecting all data.  You, know, you worked hard for it, it is your company or you work for a great company and some slime ball is trying to steal what is rightful yours. 

When they do steal it, hacking into your computer systems, you will wonder what the heck happened and remember we told you can be protected, no matter what devices you have, whether they are your own or the companies. 

Yes, KEYTALK enables secure (BYOD), Bring Your Own Device in total!

Meanwhile, back to the castle!  Smart Home technology is not that safe!  It is as flimsy as corporate security regarding hacking, phishing and man in the middle attacks.

Starting at the lock on all of your exterior doors.  Electronic digital locks are becoming all the rage and the technology terrorists’ thank you for it!

The likes of ADT, AT&T, Comcast, Schlage, Nexia and other so called home security companies are selling you technology and mystifying you with WOW! 


Yes, it is wonderful that you can secure your castle/home:
  • lock the doors and windows
  • turn the air conditioning/heating thermostat up and down
  • turn the water thermostat hotter or off
  • switch the outside lights on
  • control the digital television
  • see on the cameras when the kids come home or dog or cat goes out to pee
  • look at the baby alarm/camera while the baby sitter is asleep on the couch
  • unlock your doors

Guess what?  So can the hackers!  They can know your every move and your life patterns.  Then, they come at their hearts content, robbing the hell out of you!

That is technology if you do not secure yourselves for the 21st century.

So Who Is Watching Whom?

KEYTALK can stop them dead in their tracks, stopping them coming across the moat to your castle, business and give you that piece of mind.  Not just for the family, but if you are a business, your clients and customers too!

A password is an insecure human element that is hands of the most accident prone individuals.  Forgotten, stolen and used over and over again for a myriad of reasons of access to more than one account.  Why?  It is because we are lazy and take short cuts and thieves like that!

Hackers and Phishers are look for turmoil, distractions and that low hanging fruit to attack and make your life a misery.

KEYTALK will stop that!  We lock the door and through away the key, well the demand to use a password that is.  Although a password can still be used, it is not really the key that will open the door.  It is the creation of a bomb-proof tube that connects end to end and all information now travels in a totally secure environment.

That Data in Motion is the most vulnerable as that unsecured open door allows in all types of miscreants with tools to take down your systems and spread harm to all you come in contact with via the Internet.  Remember we are all connected!

You can bring any device to KEYTALK, all are protected.  A user may have several devices, Desktop PC/Mac, Laptop, Tablet and Smart Mobile Phone, each and every one will have a secure connection.

When the device is trusted, a password is not needed anymore. KeyTalk takes a DNA from your device based on a minimum of 10 and up to 17 components. When the device is known a key, a (short lived certificate) is sent to your device automatically when needed, to complete the transaction or to stay on-line with your enterprise data transaction. With the certificate KeyTalk creates a 2 way SSL connection excluding the man in the middle attacks.

Many organizations use KeyTalk to connect to the device in just a few minutes and to the enterprise using a Single Sign On as a bonus.

Management and installation of the systems is simplistic.  When have a massive volume of users and devices, with KeyTalk corporate integrations are completed in a far shorter period compared with any other security change.

For more information email us, we will send you a link to see this in action.



WE are in the NOW and
KEEP YOU; in the KNOW…


Worldwide Call: +1 (317) 426.0110


Key Talk – Man-In-The-Middle, Hacking & Phishing Solutions
Straight Talking Key Talking… KEYTALK!


Galveston, Texas, Indianapolis, Indiana, London & North Wales, U.K., Netherlands, Lithuania, K.L. Malaysia
Tracometry Group of Companies – Reg. Office. Dorrington Farm, Rye Hill Road, Harlow, Essex CM18 7jF


Copyright 2014

Monday, March 10, 2014

So Who Has Your Corporate & Personal Dossier? The Data Brokers Are Selling Your Information Every Minute!

So Who Has Your Corporate & Personal Dossier?
The Data Brokers Are Selling Your Information Every Minute!
By Nick Ashton, Founder, CEO, Tracometry Group of Companies.

When you log on to the Internet, you have more followers watching every single move you make!  They are Data Brokers or Farmers who have built a dossier on you, that you will not believe.

There are thousands of firms watching every key stroke, website address and information you give willing to those sites you join.  Sharing you inner most personal secrets which are cataloged, categorized and SOLD!  

You will be stunned on what they know about you and being profited from by over a thousand so called Data Brokers.  

Your Internet behavior is so documented it will fright you, concern you and make you want to stop surfing the Internet or will it?
  • Buying Habits
  • Food Preferences
  • Drinking Habits
  • Health Issues
  • Sexuality and Preference
  • Geo Location and Tracking
  • Travel and Work Habits, including when you leave and return to and from work.

All being collected minute by minute that you are striking those keys.  Yes, your Click Stream is recorded and sold!

Every App you load on your Smart Mobile Phone is collecting information on YOU!  

From Angry Birds, Candy Crush, Weight Watchers, the Flash Light program are tracking your every move and action you do all day long.  Have you noticed that Smart Mobile Phone Apps update themselves far too often?  Some just update, collect their winnings, (your information) and then sell it.

It was stated on CBS’s 60 Minutes that this was the “Dark Side of American Life.”

We have seen more complaints about the NSA snooping on the public and these Data Brokers are not even mentioned.  They are by government, who believe there needs to be new rules and governance of this industry.

Are you happy that there are people collecting information on your business and personal habits?

You need to be PROACTIVE on securing what is yours!

That you can do with KEYTALK!

The Data Broker has been given permission to collect your information by YOU!  Everyone clicks and agrees to the terms and conditions, especially supposed productivity and games Apps.

Then we have the Hackers, Phishers and Man in the Middle Attackers!

You think you are protected by your personal password you are NOT!

A password is an insecure human element that is hands of the most accident prone individuals.  Forgotten, stolen and used over and over again for a myriad of reasons of access to more than one account.  Why?  It is because we are lazy and take short cuts and thieves like that!

Hackers and Phishers are look for turmoil, distractions and that low hanging fruit to attack and make your life a misery.

KEYTALK will stop that!  We lock the door and through away the key, well the demand to use a password that is.  Although a password can still be used, it is not really the key that will open the door.  It is the creation of a bomb-proof tube that connects end to end and all information now travels in a totally secure environment.

That environment includes Hotel and Public Hotspots.  Secure Public Wi-Fi at all times with KEYTALK.  That means all of your enterprise data in motion is traveling down that secure bomb-proof tube we create and maintain the necessary level of protection for all.

That Data in Motion is the most vulnerable as that unsecured open door allows in all types of miscreants with tools to take down your systems and spread harm to all you come in contact with via the Internet.  Remember we are all connected!

To explain and also inform, you can bring any device to KEYTALK, all are protected.  A user may have several devices, Desktop PC/Mac, Laptop, Tablet and Smart Mobile Phone, each and every one will have a secure connection.

When the device is trusted, a password is not needed anymore. KeyTalk takes a DNA from your device based on a minimum of 10 and up to 17 components. When the device is known a key, a (short lived certificate) is sent to your device automatically when needed, to complete the transaction or to stay on-line with your enterprise data transaction. With the certificate KeyTalk creates a 2 way SSL connection excluding the man in the middle attacks.

Many organizations use KeyTalk to connect to the device in just a few minutes and to the enterprise using a Single Sign On as a bonus.

Management and installation of the systems is simplistic.  When have a massive volume of users and devices, with KeyTalk corporate integrations are completed in a far shorter period compared with any other security change.

For more information email us, we will send you a link to see this in action.





WE are in the NOW and
KEEP YOU; in the KNOW…


Worldwide Call: +1 (317) 426.0110


Key Talk – Man-In-The-Middle, Hacking & Phishing Solutions
Straight Talking, Key Talking…  KEYTALK!


Galveston, Texas, Indianapolis, Indiana, London & North Wales, U.K., Netherlands, Lithuania, K.L. Malaysia
Tracometry Group of Companies – Reg. Office. Dorrington Farm, Rye Hill Road, Harlow, Essex CM18 7jF


Copyright 2014