{"id":1196,"date":"2013-01-31T15:41:58","date_gmt":"2013-01-31T20:41:58","guid":{"rendered":"http:\/\/techtonictimes.com\/?p=1196"},"modified":"2015-07-26T11:48:49","modified_gmt":"2015-07-26T11:48:49","slug":"armstrong-dope-and-it-security","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/","title":{"rendered":"Armstrong, Dope And IT Security"},"content":{"rendered":"<p><a href=\"http:\/\/abrahamsconsulting.com\/blog\/wp-content\/uploads\/2013\/01\/Main_Armstrong_010412.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignleft size-medium wp-image-1198\" src=\"http:\/\/abrahamsconsulting.com\/blog\/wp-content\/uploads\/2013\/01\/Main_Armstrong_010412-259x300.jpg\" alt=\"Main_Armstrong_010412\" width=\"259\" height=\"300\" srcset=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2013\/01\/Main_Armstrong_010412-259x300.jpg 259w, https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2013\/01\/Main_Armstrong_010412.jpg 639w\" sizes=\"(max-width: 259px) 100vw, 259px\" \/><\/a>Seduced by infidelity, indiscretions, and fierce inconsistencies from the highest levels of government to the boardroom and sports, our decade has been leveled.<\/p>\n<p>From General Pratreus to Lance Armstrong, Tiger Woods to Elliot Spitzer,\u00a0 underscored by the global financial melt down,\u00a0 millions have been ravaged, and the remnant has been left groping in the dark.<\/p>\n<p>Perhaps, it is time for integrity to become the ultimate &#8216;bff.&#8217;<\/p>\n<p>Unfortunately, though, we are a people, with an insatiable appetite for\u00a0 &#8216;right now&#8217; rather than what is right. Our generation is riddled with schemes to evade, elude and escape truth, accountability and integrity. And for the schemes that do not yet exist, we are formidable innovators.<\/p>\n<h3><a href=\"http:\/\/www.dnaindia.com\/sport\/interview_my-cocktail-was-epo-lance-armstrong_1790306\">Generation EPO.<\/a><\/h3>\n<p>The Information Technology landscape, is like a double-edged sword. We need it but we can&#8217;t handle it. It is fertile ground for deflecting responsibility, caressing mistrust, while <strong><a href=\"http:\/\/www.csoonline.com\/article\/727110\/storify-shows-facebook-privacy-more-illusion-than-fact\">impersonating security<\/a>.<\/strong><\/p>\n<p>Just this month, Facebook&#8217;s questionable security measures has bubbled up to the top yet again.<\/p>\n<p><em>Again<\/em>.<\/p>\n<p>Because, as\u00a0 Antone Gonsalves, reiterated in his<a href=\"http:\/\/www.csoonline.com\/article\/727110\/storify-shows-facebook-privacy-more-illusion-than-fact\"> <span style=\"text-decoration: underline;\">CSO Online<\/span>\u00a0<\/a> article, &#8216;the ability of third-party sites or apps to breach Facebook privacy has been a concern for sometime.&#8217;<\/p>\n<p>Except you no longer need to be\u00a0 &#8216;concerned.&#8217;<\/p>\n<p>Try alarmed.<\/p>\n<p>Storify rejects Facebook&#8217;s flimsy security measures by copying all of your privacy settings.<\/p>\n<h2>And what is Storify?<\/h2>\n<blockquote><p>Storify is a free content curation tool wherein users can pull social elements like photos, videos, and status updates from social networks, combining them into one single embeddable widget that is perfect for bloggers and digital publishers, telling the story of an event in its entirety through social reactions. It\u2019s a clever and popular service that brags, \u201cstreams flow, but stories last.\u201d<\/p><\/blockquote>\n<p>So, how do you feel about your private information &#8216;lasting&#8217; in other people&#8217;s hands?<\/p>\n<h5><strong>\u00a0Read:\u00a0<\/strong> <a href=\"http:\/\/www.csoonline.com\/article\/504793\/6-ways-we-gave-up-our-privacy\">6 Ways we give up our privacy.<\/a><\/h5>\n","protected":false},"excerpt":{"rendered":"<p>Unfortunately, though, we are a people, with an insatiable appetite for  &#8216;right now&#8217; rather than what is right. Our generation is riddled with schemes to evade, elude and escape truth, accountability and integrity. And for the schemes that do not yet exist, we are formidable innovators.<\/p>\n","protected":false},"author":2,"featured_media":1198,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[21,43,54],"class_list":["post-1196","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information-security-tips","tag-armstrong","tag-facebook","tag-it-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Armstrong, Dope &amp; IT Security<\/title>\n<meta name=\"description\" content=\"Integrity needs to become our new &#039;bff,&#039; then perhaps IT security will follow.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Armstrong, Dope &amp; IT Security\" \/>\n<meta property=\"og:description\" content=\"Integrity needs to become our new &#039;bff,&#039; then perhaps IT security will follow.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2013-01-31T20:41:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-07-26T11:48:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2013\/01\/Main_Armstrong_010412.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"639\" \/>\n\t<meta property=\"og:image:height\" content=\"739\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"Armstrong, Dope And IT Security\",\"datePublished\":\"2013-01-31T20:41:58+00:00\",\"dateModified\":\"2015-07-26T11:48:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/\"},\"wordCount\":306,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2013\/01\/Main_Armstrong_010412.jpg\",\"keywords\":[\"Armstrong\",\"Facebook\",\"IT Security\"],\"articleSection\":[\"Information Security Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/\",\"name\":\"Armstrong, Dope & IT Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2013\/01\/Main_Armstrong_010412.jpg\",\"datePublished\":\"2013-01-31T20:41:58+00:00\",\"dateModified\":\"2015-07-26T11:48:49+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"description\":\"Integrity needs to become our new 'bff,' then perhaps IT security will follow.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2013\/01\/Main_Armstrong_010412.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2013\/01\/Main_Armstrong_010412.jpg\",\"width\":639,\"height\":739},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Armstrong, Dope And IT Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Armstrong, Dope & IT Security","description":"Integrity needs to become our new 'bff,' then perhaps IT security will follow.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/","og_locale":"en_US","og_type":"article","og_title":"Armstrong, Dope & IT Security","og_description":"Integrity needs to become our new 'bff,' then perhaps IT security will follow.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/","og_site_name":"TechTonic Times","article_published_time":"2013-01-31T20:41:58+00:00","article_modified_time":"2015-07-26T11:48:49+00:00","og_image":[{"width":639,"height":739,"url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2013\/01\/Main_Armstrong_010412.jpg","type":"image\/jpeg"}],"author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"Armstrong, Dope And IT Security","datePublished":"2013-01-31T20:41:58+00:00","dateModified":"2015-07-26T11:48:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/"},"wordCount":306,"commentCount":0,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2013\/01\/Main_Armstrong_010412.jpg","keywords":["Armstrong","Facebook","IT Security"],"articleSection":["Information Security Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/","name":"Armstrong, Dope & IT Security","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2013\/01\/Main_Armstrong_010412.jpg","datePublished":"2013-01-31T20:41:58+00:00","dateModified":"2015-07-26T11:48:49+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"description":"Integrity needs to become our new 'bff,' then perhaps IT security will follow.","breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2013\/01\/Main_Armstrong_010412.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2013\/01\/Main_Armstrong_010412.jpg","width":639,"height":739},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/armstrong-dope-and-it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Armstrong, Dope And IT Security"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/1196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=1196"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/1196\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/1198"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=1196"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=1196"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=1196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}