{"id":132,"date":"2011-03-14T08:45:54","date_gmt":"2011-03-14T12:45:54","guid":{"rendered":"http:\/\/techtonictimes.com\/?p=132"},"modified":"2011-03-14T08:45:54","modified_gmt":"2011-03-14T12:45:54","slug":"watch-the-fireworks","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/watch-the-fireworks\/","title":{"rendered":"Watch the fireworks"},"content":{"rendered":"<p style=\"text-align: justify;\">Common sense prevails when a woman knows she is being stalked right?<\/p>\n<p style=\"text-align: justify;\">We take busier routes, travel in groups, recruit an escort to ensure our safety and sometimes we just stay indoors period. And how could I forget? We call the cops. I love to call the cops.<\/p>\n<p style=\"text-align: justify;\">Isn&#8217;t it rather perplexing then that large enterprises play Russian Roulette with their reputations?<\/p>\n<p style=\"text-align: justify;\">According to last Saturday&#8217;s Wall Street Journal report entitled &#8220;Number of the Week: 1.9 trillion,&#8221;\u00a0 corportate America is raking in cash as businesses cut costs and boost profits. But it doesn&#8217;t seem to know what to do with the money. As of 2010, cash and other liquid assets made up 7% of the the total assets of nonfarm, nonfinancial corporations, according to the Federal Reserve&#8211;the highest level since late 1963.<\/p>\n<p><em>&#8220;It doesn&#8217;t seem to know what to do with the money.&#8221; <\/em>Laughable.<\/p>\n<p style=\"text-align: justify;\">Meanwhile, on Sunday, CNBC reported that an anonymous hacker group sympathetic to Wikileaks, plans to release e-mails obtained from Bank of America early Monday morning,\u00a0courtesy of\u00a0an\u00a0&#8216;FYI&#8217; on the group&#8217;s twitter feed.<\/p>\n<p style=\"text-align: justify;\">\u00a0<em>&#8220;It doesn&#8217;t seem to know what to do with the money.&#8221; <\/em><\/p>\n<p style=\"text-align: justify;\">However, hackers are never out of ideas. They just practice creative procrastination. Apparently,\u00a0 early Monday morning is one of their &#8216;many&#8217; moments in time when they will be all they can be. Will it be on your dime?\u00a0Or maybe, the fall out from the scandal will swallow up some of the profits that is being hoarded. More likely than not, though, it will be a combination of the two.<\/p>\n<p style=\"text-align: justify;\">So why do companies of the caliber and reputation of Bank of America leave themselves vulnerable to the hackers? I doubt it is because they are not aware that they are being stalked.\u00a0Certainly they know they are not exempt.\u00a0<em>\u00a0<\/em><\/p>\n<p style=\"text-align: justify;\">Yet\u00a0hesitance plagues corporate America.\u00a0They fear spending cash on hiring or expansion because managers still do not have a lot of faith in the economic recovery and want to have plenty of their own funds around in case the financial markets seize up again, the WSJ report said.<\/p>\n<p style=\"text-align: justify;\">Perhaps I should empathize. Maybe you should too. Aww&#8230; How about a little sympathy, huh? Maybe? Not.<\/p>\n<p style=\"text-align: justify;\">The fact is , corporations must come to terms with the reality that there\u00a0exist a uniformed and formidable foe, an army of stalkers that take no prisoners. To date &#8216;al Quaeda,&#8217; has established terrorist cells in every crevice of the tech industry. Sometimes, they are emboldened and claim responsibility for their conquests, other times they are shy and inhibited. But one thing is certain, these &#8216;cells&#8217; have been classified into seven malicious categories&#8211;that are <em>known:<\/em><\/p>\n<ul>\n<li>\n<div style=\"text-align: justify;\">Malicious hacker #1: Cyber criminals<\/div>\n<\/li>\n<li>\n<div style=\"text-align: justify;\">Malicious hacker #2: Spammers and adware spreaders<\/div>\n<\/li>\n<li>Malicious hacker#3: Advanced Persistent threats (APT) agents<\/li>\n<li>\n<div style=\"text-align: justify;\">Malicious hacker #4: Corporate spies<\/div>\n<\/li>\n<li>\n<div style=\"text-align: justify;\">Malicious hacker #5: Hacktivits<\/div>\n<\/li>\n<li>\n<div style=\"text-align: justify;\">Malicious hacker #6: Cyber warriors<\/div>\n<\/li>\n<li>\n<div style=\"text-align: justify;\">Malicious hacker #7: Rogue hackers<\/div>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Now that we have identified them, next time we will explore how they practice their stalk. And in so so doing,\u00a0goad corporate\u00a0America\u00a0into\u00a0practicing the old adage to &#8220;Know thine Cyber enemy.&#8221;<\/p>\n<p>Maybe, this is where Bank of America&#8217;s short-sightedness lies.<\/p>\n<p style=\"text-align: justify;\">Once we scale this wall, perhaps, they will figure out what to do with the money.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Common sense prevails when a woman knows she is being stalked right? We take busier routes, travel in groups, recruit an escort to ensure our safety and sometimes we just stay indoors period. And how could I forget? We call the cops. I love to call the cops. Isn&#8217;t it rather perplexing then that large [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[35,36,47,82,94],"class_list":["post-132","post","type-post","status-publish","format-standard","hentry","category-terror-cells","tag-cops","tag-corpate-america","tag-hackers","tag-procrastination","tag-stalkers"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Watch the fireworks - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/watch-the-fireworks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Watch the fireworks - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"Common sense prevails when a woman knows she is being stalked right? We take busier routes, travel in groups, recruit an escort to ensure our safety and sometimes we just stay indoors period. And how could I forget? We call the cops. I love to call the cops. Isn&#8217;t it rather perplexing then that large [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/watch-the-fireworks\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2011-03-14T12:45:54+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/watch-the-fireworks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/watch-the-fireworks\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"Watch the fireworks\",\"datePublished\":\"2011-03-14T12:45:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/watch-the-fireworks\/\"},\"wordCount\":537,\"commentCount\":0,\"keywords\":[\"cops\",\"corporate America\",\"hackers\",\"procrastination\",\"stalkers\"],\"articleSection\":[\"Terror Cells\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/watch-the-fireworks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/watch-the-fireworks\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/watch-the-fireworks\/\",\"name\":\"Watch the fireworks - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"datePublished\":\"2011-03-14T12:45:54+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/watch-the-fireworks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/watch-the-fireworks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/watch-the-fireworks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Watch the fireworks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Watch the fireworks - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/watch-the-fireworks\/","og_locale":"en_US","og_type":"article","og_title":"Watch the fireworks - TechTonic Times","og_description":"Common sense prevails when a woman knows she is being stalked right? We take busier routes, travel in groups, recruit an escort to ensure our safety and sometimes we just stay indoors period. And how could I forget? We call the cops. I love to call the cops. Isn&#8217;t it rather perplexing then that large [&hellip;]","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/watch-the-fireworks\/","og_site_name":"TechTonic Times","article_published_time":"2011-03-14T12:45:54+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/watch-the-fireworks\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/watch-the-fireworks\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"Watch the fireworks","datePublished":"2011-03-14T12:45:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/watch-the-fireworks\/"},"wordCount":537,"commentCount":0,"keywords":["cops","corporate America","hackers","procrastination","stalkers"],"articleSection":["Terror Cells"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.abrahamsconsulting.com\/blog\/watch-the-fireworks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/watch-the-fireworks\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/watch-the-fireworks\/","name":"Watch the fireworks - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"datePublished":"2011-03-14T12:45:54+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/watch-the-fireworks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/watch-the-fireworks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/watch-the-fireworks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Watch the fireworks"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/132","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=132"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/132\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=132"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=132"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}