Friday, March 10, 2017

The Internet Does Not Equal Privacy! It is a Sewer, a Den of Inequity...

The Internet Does Not Equal Privacy!
It is a Sewer, a Den of Inequity...
by Nicholas Ashton, CEO/CIO, CommSmart Global Group

You should be thinking "Privacy Above All", yes, your privacy is your responsibility.  I know you think others, like Google, Amazon, Dropbox, Facebook, Twitter, Instagram and any other unsocial networks are protecting you.  They are not, they are exposing you every single millisecond of the day and placing your personal and corporate information in harm's way.  

You think they have got your back and they do NOT!

Every single company and government should be protecting any individual data that is collected in doing business today. They are NOT!

You cannot avoid using the Internet of Things (IoT) as everyone uses it for forming filling, banking and health data and every other thing you can think of.

There is No Six Degrees of Separation!  

We are all connected!

This means that any criminal or Cyber Terrorist is using so much of their ill gotten time to infiltrate any data site they can.  Data silos in the most case are insecure because their IT Department is out of touch with cyber reality.

When it comes to cyber protection, RED TAGGED is Straight Talking!

Cyber security has to start at the front door, the servers which contain the data and have checks and balances along the way to ensure we are all protected.  Knowing all the activity in "real time"!

Malware is being used continuously attacking the servers, trying to beat and enter the Information Technology sphere that has outdated security.

Having a database with access by your customers/clients, employees, third party data centers when not secured is like a red rag to a Hacking Bull!

Giving access to a database like this is like giving everyone a key and having no control on who they share it with.  Passwords are useless and foolish, no matter what their length or alpha/numeric they are.

Using a Dashboard/Portal for authorized access with Device DNA and a secondary code is more secure, especially with a military level encryption.

Your Smartphones are just as vulnerable, remember it is a computer!  Your voice, data in motion, emails, SMS/Text/Chat and documents on your Smartphone can be fully secure with high level encryption and it should be.

It is all about Privacy Above All!

That is what we do!


copyright 2017

Real Cyber Security Is A Three Letter Word; YOU!

Real CYBER Security Is A Three Letter Word; YOU!
By Nicholas Ashton, CEO/CTO, CommSmart Global Group 

Computer security, like securing you home or your car, is just the same, it is up to you to make sure the doors are locked and you know where the keys are.  Like everyone else, we have all locked ourselves out and had to have assistance to gain entry and paid for it.

Yes, it is up to you!  Not your Mother, Grandma or the wife, YOU!

The ease of someone gaining entry to your most inner secrets is partially the governments fault.  They have used something that you have been told to never divulge to anyone.  

In America, the Social Security Number.  That most sacred of digits that was applied for by your parents.  Since its inception it has been used as a way to identify you, your mark, so to speak.  It opens a Pandora’s Box, to which thieves, steal it, use it, and you pay the consequences. 

All because the government made you us your SSN#.

So what is the answer to this latch-key that is hanging out there for all to use?  

STOP using it!  Refuse to give it to anyone!

Passwords have been with us since the beginning of time and it has been the main method to secretly enter a myriad of locked secrets.  Even in the prohibition days at the Speak-Easy, the slot in the door would open and you gave the password of the night to gain entry.

Today, we have so many passwords to remember, that some even write them down, place them in their wallet or pocket book.  Or, heaven forbid, in a file on their computer, smart mobile phone or tablet!

The computer, that is what a smart mobile phone or tablet is, a computer, you have been indoctrinated to use a password to secure your precious information, the guarded secrets of you inner world.  So why do you share them with family members, business associates and even put them on a notice board?

Passwords have gone beyond being secure and the human element stepped in decades ago.  Yes, humans, you and I, are forgetful beasts and dumb in many ways in our actions. 

Time to dump the password!  I mean dump, get rid of, never use again.  Now that would be one bad headache to remove.

I know you are panicking and wondering how you are going to lock your information away from prying eyes.  Simple, just like key-locks have now moved into the computer age, we shall use something electronic.  A digital lock, you know, the one where you have a key pad and you type in your passw..., wait a minute, we just came full circle and have forgotten to dump the physical password system and…

No, there is another, proven method, Device DNA!  Not new, but solid and you are wondering why you have never heard of it!   Simple question and an even simpler answer, reason is, we are stuck in traditional ways that have been programmed over the decades, if not centuries. 

Just like a dog spins around before going to sleep in its bed, it is flattening the grass of the field where its ancestors slept to make a comfortable bed for the night. 

We have been spinning our proverbial wheels and done the same old same old and never thought to change.  Even accepting that it is not a secure method in the first place and suffering the consequences.

Firstly, you must scan your computer with one of the proven programs to check for virus etc.  Yes, take time to do it!  You are then starting from an even baseline and we can move forward.

Virus and malware software protection is available from folks like Microsoft and others and that is going to be the basis to stop infiltration of thieves placing a virus on your computer that will result in an issue.

There on out we must know that we are using a secure method in connecting to the Internet, especially corporate connections. 

Corporations use passwords and you know what we have already stated about those!  They also use tokens which generate certificates to gain access to the corporate database and all the wondrous company treasure, electronically stored. 

Secured by a password!

Corporate use of Device DNA is the answer and has been in use for decades by some of the largest corporations in the world and they do not advertise that they do so. 

Nor does the company that is behind the solution, state who their clients are, it is all very secure.  Only a few clients have admitted they use this logical method.

They are using an anonymous, invisible bullet resistant tube to connection both ends and allow secure data in motion.

If you wish to know more, then you have to ask.  Then, when you simply understand that all your fears and worries regarding using any device (BYOD) is not an issue anymore, you will be a user of Device DNA.  Inexpensive, secure and you will breathe easier at night, as will your IT Department.

I know, a cliff hanger, as you have to take the next step, call or email us and we shall discuss with you on how you will not have the burden of security just on your shoulders.

You, will have been listening to the Straight Talking of RED TAGGED… NOW, take action!

WE are in the NOW and
KEEP YOU; in the KNOW…

Worldwide Call: +1 (330) 366.6860

Copyright 2017

Thursday, March 9, 2017

Straight Talking... What If He Is Right?

Straight Talking
What If He Is Right?
by Nick Ashton, CEO/CIO, CommSmart Global Group 

I know some think that I take things to the extreme in the statements and it is all pure marketing hype.  


As I listen to Fox News,  with all the national and international concerns and headlines, it reminds of the silly chatter splurged with profound statements.  It is those statements that make all the difference as they form the structure of conversation and to whence and where it goes.

Many ask the questions of why climbers climb daunting mountains, placing their lives on the line with every move they make.  As the cyber news and terrorism news concerns pierce my ears with the shock and awe, I fully understand why they climb and accept the crevices and footholds of the mountain before and above them.  It is the power of the knowledge that they accepted the risk and professionally succeeded.

It is there and it challenges their human ability to overcome the complexities of mind over matter.  The physical extension of man against nature, knowing one false unprepared move is certain death. They have practiced, trained and making many life-threatening mistakes.  All whilst in a safety harness allowing them to experience and learn from the exceptional mindset of taunting death.

That is the power, to overcome successfully the challenges of life and winning!

Having been at the onset of commercial computing, watching the newborn industry, grow, make mistakes and allow users to become ignorant to what "real computing power" is sickening.

Like everything in life, there is good and evil in all we do.  No one is perfect and never will be.  That does not mean we must give up, cry and feel sorry for ourselves.  It is the drive to be the best at what you do, learning from those stupid mistakes and enacting change.

Cyber security is the perfect example of opinions, facts, and myths.  Since I started back in 1976, Information Technology Management has not changed, not one iota! Still, aloof know-it-alls who sadly understand only one way to do things and have never ventured outside of their timid comfort zones.

The black holes of thinking you have all the answers as you waste away in a cocoon abyss. 

Forgive me, for I do know what I say!

We are not here to take IT's pants down and show the zits on their rears.  

Our collective worldwide team has amassed "real time expertise" in all facets of commerce.  Yes, from analog information to digital data, HR to Production, Sales to Transportation, Customer Service to Change Management and lastly and importantly the Shareholders, Customers/Clients.

Our understanding impacts all.  It is one thing to recognize the issues, it is far different when you can resolve with perfected solutions.  

That is the Red Tagged Difference!

Sure, cyber security of entrusted data is at the lowest ebb ever.  Companies being hacked and compromised each and every day.  Your Information Technology department is overwhelmed, understaffed and deficient in the budget to complete the task at hand.

2017 is the year that YOU must protect all entrusted data, report any compromise or attempted a compromise of your servers. If not, the fines are massive! 

Any company that does business in Europe falls under the EU Data Protection Act.  Meaning you will be fined 4% of your gross if you fail and found guilty.

The positive note is simple, Red Tagged is available.  As Cyber Forensic Anthropologists, we go much deeper in understanding the issues, having the "real time tools" to fully understand and resolve your cyber security issues.

We not only speak English, we speak logic and not gobbledygook! All parties will have a full understanding, the CEO, C-Level Executives, Board and Shareholders alike.  All on one page for the betterment of all.

We await your call and are only restricted by time and availability.

First Come, First Protected...

My Bach is Worse than My Byte...

Telephone: +1 (330) 366.6860

CommSmart Global Group 

copyright 1996-2017

Wednesday, March 8, 2017

The Cyber Cull Is Real!

The Cyber Cull is Real!
by Nicholas Ashton, CEO/CIO, CommSmart Global Group

Your Own Governments are Hacking You!

Sadly, the majority of corporation's leadership worldwide, have no idea of the ramifications of the effects and implications of the normal day to day business of storing and accessing stored data.

The safety of writing with a pen and paper is long gone.  The physical filing room, with fireproof file cabinets under lock and key, have for the most part vanished.  It is the digital age of 1's and 0's.  With the so-called protection of a human made-up password, that is forgotten, shared, stolen and forgotten on too many occasions. 

The sacred sanctity of privacy is no more!

What, in a few short years has driven us to these times?  Stupidity, ignorance, or maybe we all have been lead to trust in others, instead of doing for ourselves.

Logic it seems has flown the coup and left a bubbling mindset of an unsocial world of "them" and "us".

Compuserve and AOL were the first for linking people as far back as the 1980's, with Bulletin Boards and means for people to connect with messaging and filing sharing.  A harmless means of communications using landline telephones and slow modems.

In 1983, I was the CEO of Commercial Databanks who was the first commercial means of electronic messaging.  Using Texas Instrument "dumb terminals" with a built-in 300 baud modem, that could use a landline phone anywhere to collect your messages from your assigned electronic pigeon hole.  No screen, it was printed on paper and could either be kept and filed or destroyed.

Pioneers so to speak, fully understanding the potential of information sharing and its capabilities.  Not like the disaster in anti-social activities we have today.

It was in 1976 that my first cyber steps were taken with computers, both hardware and software, limited to say the least for commercial opportunities. Thankfully our great team of Rod Smith, marketing, Alf Lilford and Colin Taplin, both ex-Royal Air Force computer technology "nerds", with an immense knowledge and foresight, worked in harmony and with an incredible vision of the road ahead.  I have never forgotten the gleaned knowledge of those days.

As we hyper travel back to today, the issues are not ones of looking forward and understanding the power of the computer, it is the complacency of those who are taking for granted the day to day activities and reliance of the cyber machine.

Boards and C-Level Executives have taken their finger off the button of logical understanding.  Not realizing, that the world of cyber is more important to be cohesive in working with marketing, production, transportation, accounting, customer service and significantly, shareholders and customers/clients.

When you are entrusted with information of a sensitive nature, you must, no, it is demanded that you take every available step to protect and secure from theft, prying eyes and misuse.

Your information technology individuals and departments can only execute the above rules if they are competent and have the budget to accomplish the procedures.  

The daily task of normal cyber maintenance is more than a run-of-the-mill operation.  With so many cyber front doors being opened and supposedly closed, just like us humans, we leave lights on, taps dripping and keys in locks. We are failures at so many simple daily tasks and it does not seem that anyone cares, let alone looks at the checks and balances.

A message to your IT department, "you might be secure today, but tomorrow is a whole different story".

You can ill-afford to be next headline, like Hyatt Hotels or whoever is front page cyber hacking news today!

That is why we at Red Tagged are so direct!  

We have amassed a worldwide diverse team with decades of knowledge in all areas of business and cyber concerns. Understanding the day-to-day running of a conglomerate, marketing, production, transportation, accounting, customer service and importantly, the Information Technology Department.

Red Tagged speaks your language, clearly, precisely and directly!

It is one thing to know about Malware threat potential and recognizing it once it has happened.  It is a totally different story when you can defend against it and maintain the cyber security that is demanded today.

There is the difference with Red Tagged, we not only know about, we have the solutions!

As Cyber Forensic Anthropologists, we understand the layers of complexity that have been unfortunately hidden for years. The changes in cyber management bring new ideas which are laid over existing issues which are never rectified. I can assure you, hidden inside your computer servers are programs still running, collecting information and not part of your cyber security solution today, leaving a vulnerability factor you can ill-afford.

Once the baseline is established and rectified by Red Tagged's team, you will be able to maintain the cyber security with continuing service and solutions that you will have in place and control.

Make 2017 your year to securely control the entrusted data of 
your important shareholders, customers, and clients.



North America: +1 (330) 366.6860

copyright 1996-2017

Monday, March 6, 2017

International Repository of Analysis for Terrorism/Cyber Crimes

International Repository of Analysis 
for Terrorism/Cyber Crimes

The communication barriers are removed!  No more excuses that one country or agency cannot share information in ‘real time’.  The major requisite for information sharing has never been so prevalent than today.

We have known the issues for decades and chosen to ignore or thought that costs would be prohibitive.  Not anymore!

CommSmart Global team with our Red Tagged division has the proven crime analytics solution for a secure global sharing repository for all information on terrorism and cyber-crime.  One centralized repository with full analytics and predictive analysis with each member. 

Each entity will be able to share information without changing their internal administrative software, saving billions in expenditure, which be used to fight the issues.

The attacks in Belgium have proven categorically that the lack of ‘real’ information and the ability to share with other agencies has hampered the investigations.  This is not just an isolated problem, it is a global communications pandemic.

The change is demanded in the uncivilized world.

It is time to dump the bureaucratic red tape once and for all.  If we care about fighting both terrorism and cyber-crime the time is NOW!

The time to change, is now…

Simple Overview


USA: +1 (330) 366.6860 - Europe: +31 611.303489 - U.K.   +44 72 405 9420

Copyright 2016