Testimonials

You were hacked. When did it happen? How did it happen? Why didn’t I get any notification that I was Hacked? Today we rely on technology for more of the operations than we did even 10 years ago. Much of our daily life is dependent on technology to work, bank, play or communicate.

We have become so dependent with technology that it is important the we begin to understand what it is that is helping us, and what needs to be worked on in order to better protect us. Our real issues are aligned with what will it take for us to continue to be up? Businesses cannot afford to be down, and neither can consumers.

  • What are you trying to protect?
  • What are the relevant THREATS?
  • How comfortable are you with your ability to detect and respond before damage is done?

Protecting your Data (both business and personal) is the issue that is top of mind. Protecting you and keeping the attacker out, is essential to everyone. That’s what we will discuss to help you protect yourself from getting #HACKED!

“We are dropping cyber bombs… and just like we have an air campaign, I want to have a cyber campaign. These words by former Deputy Secretary of Defense Robert Work were a wakeup call for me as I reported to work for the Under Secretary of Defense for Intelligence.

Since, “cyber domain” has become a source of potential conflict, earning the interest of the world’s military powers.  During my studies at the Naval War College, I penned a monograph positing how cyber capabilities could be used as an instrument of national power in lieu of kinetic strikes. This thesis has since been reinforced by the development of the “Integrated Tasking Order” and “Cyber Tasking Order” – tools to synchronize kinetic and non-kinetic operations across all domains.

To be sure, cyber operations can have significant effects on not only the functioning of government but the confidence of societies and markets as well. The technical ability to conduct a cyber-attack has decreased significantly.  Malicious cyber tools and exploits are easily found on the Internet and can be used by anyone. Not only are attacks more sophisticated, but attribution is difficult.

From my humble perspective, this book is a must-read for anyone looking to learn more about the critically important threat of cyber warfare. As a practical guide, it helps prepare cyber security practitioners as well as policymakers interested in the historical, technical, and strategic context in the cyber domain. LCDR Douglas Ramsdell, USN (Ret.)

Cyber Research and Intelligent Solutions Provider (CRISP) - https://crisp-llc.com/

Emerging technologies are here and we need to prepare to combat all the challenges that it offers.  Along with our mobile and social media lifestyles, we are bombarded with all different social media ads and tactics on how to phish on our daily social media activities.  Albert demystifies all different techniques, security tips and awareness on how to be secure, vigilant and knowledgeable in defending and safeguarding our personal data.

I have known Albert Whale for a number of years and with his involvement as one of EC-Council University CIS Board Advisor. He is one of my resources when it comes to cyber security careers and cyber workforce success. Dr. Charline F. Nixon

Professor of Computer Science/Cyber Security Overseas Collegiate Faculty - Europe Faculty Coordinator - Math/Stats/CompSci.

“I have known Albert since grade school, he is generally the smartest guy in the room and if the subject matter is Cybersecurity, he is always the smartest guy in the room. In his bio it states that within days of 9/11 the FBI called Albert to garner his experience as it pertains to Cybersecurity. You must ask yourself, what did he know that prompted the FBI to call him in 2001, and what does he know now? I accompanied Albert when he has been on TV and the Radio many times. He has done speaking engagements at trade shows, seminars, and Universities and he always wows his audience, even if the audience is full of highly credentialed Cybersecurity experts. At every engagement, here is always something new. Lastly, most computer geniuses are either flaky, intolerable or have no communication skills. Surprisingly, Albert is a pleasure to work with whether he’s in front of a thousand people or engaged in a one-on-one conversation.” - Hugh Haggerty, Longtime Friend

Before I met Albert Whale, I lived, what I thought, was a secure life on the web. To know Albert is to realize what most of us understand with our Google email accounts, our Facebook accounts, and other social media accounts is absolutely wrong! And to work with that misunderstanding in the freewheeling world of online data puts our respective businesses in great danger.

Now, I call Albert whenever I consider doing anything with my data. Most of the time, I have a general idea of what could go wrong. But a lot of times, I don’t. And that’s a scary thought!

Anyone contemplating doing anything in business today needs to read Albert’s two books. I have, and I am still scared to make a move without talking to Albert first.

It is not all doom and gloom, however. But with the things that I don’t know, I’m glad that I do know Albert because when I get finished consulting him, I then go back to whatever company it is that I am talking to and pose cyber security questions to them that make them understand that I am serious about making sure that my business ventures are going to be as secure as possible.

Gone are the days when we don’t have to be appreciative of the subject of cybersecurity, even I you are in my situation – growing food. That’s right; even farmers need a cybersecurity expert to help them to manage their business!

So, I hope you will appreciate this book and consider both the tone and specifics Albert brings to the table. We can no longer live without making cybersecurity is in the right hands and that no one else will have access to it. - Juan Lacey (Founder & CEO of Farms close by)

“I met Albert Whale several years ago and must say that his insights into cybersecurity have completely supported my work efforts, and potentially that of national security. Albert has turned cybersecurity on its head while offering a fresh approach to subjects that most people gloss over. I have used his ITS Safe product, and have seen how it fills the need for cybersecurity support in businesses from small to global. I’m thankful to call Albert a resource and a friend.” - Kevin Harding, Dir., Technical Services

Hands of Support, LLC - http://hands of support.com

#HACKED2

Practical Guidance for Dealing with Threats to Your Business and Privacy.

Get the book NOW on Amazon!!!

Your FREE Bonus

 

Enter Your Details Below to Get Access To Your FREE Bonus

You have Successfully Subscribed!

 

Step 1: Buy the Book Now on Amazon

and...

 

Step 2: Enter Your Name and Email to get Your Bonuses

You have Successfully Subscribed!

Like This Book?

Share this post with your friends!