Saturday, September 21, 2019

Tabula Rosa Systems Blog Of 9/21/2019 - Angry Replies In Email







In my books, noted below, I often lament about the lack of civility, deterioration of written communication and abuse of the power of the Internet. Electronic communication, in my opinion, breeds negativity and behavior which does not exist in direct communication. 

The following is an except from my first book which addresses angry email replies.

Enjoy the article and check out the website!
================================================== 

Angry replies

          Before you react to in anger, consider some of the following points, and then take appropriate actions. Foremost, remember that an angry reply will seldom result in anything positive. The best approach is to consider the three Zs: namely, zero tolerance reaction, zeal in replying, and Zen attitude and tone. To begin with, it is critical to understand what the cost of a flame war can be to all involved. A flame war is a term often used to describe email arguments that are unfriendly. Many escalate into increasingly intensive language or tone. The second consideration is by creating a zero tolerance toward situations or persons. This attitude may prove to have or cause far more loss than gain. The first step should be to pause and not reply rapidly, which will benefit both sides (more of a Zen approach or the old count-to-ten approach).
        By refraining from using zeal caused by anger, turn this instead into a situation where positives can occur. Consider the facts that prompted what is or appears to be an angry communication. Consideration should also be taken for any known or likely reasons that evoked an immediate negative reaction. Attempt also to visualize before you send a reply how to minimize any further irritation for everyone. When finally replying after a cooling-down session, ensure that, no matter what the outcome may be, matters are not made worse.
          Alea jacta est.
—Julius Caesar
        The above words (The die is cast were spoken when Julius Caesar crossed the Rubicon. In his day, gambling with dice was very popular.  The clearer meaning here is that once rolled, the dice result cannot be changed. 

Before email correspondence, parties crossed to a situation from which there is no return. One is better served to attempt to get clarification, inquiring in such a way as to seek further information, rather than to assume the worst. It is almost always best to ensure that no additional parties are brought into the communication, which could scarcely be of benefit for anyone involved and can only exacerbate the situation. Mail flame-wars or multiple, back-and-forth, hostile email exchanges end up bringing in additional people, which makes it far more difficult to resolve what was started. Keep in mind that it is easier and less painful to resolve what may initially be simple or innocent misunderstandings.
        Sometimes, it may prove best not to respond to an angry email. This may provide a useful cooling-down interval and let a potentially time- consuming and damaging situation dissipate harmlessly. This situation can also contribute to increased anger from the original sender. There are several items to keep in mind when weighing this option of waiting. First, determine if a true question was asked or if an answer was asked for. Second, consideration should be given as to whether this is a personal, business, or necessary contact to maintain. Is the person or persons of significance to cause damage or continue a flame war with others you know? Perhaps the sender was bluffing or blowing off steam regarding a situation. Any of these considerations might have enough value to provide a logical reason to choose not to reply.
        Finally, if one selects to reply, ensure that there is not a clouding of judgment. Take any steps, such as a delay of an hour or even a day, to provide for this. Consider also direct contact. The personal reaching-out and contact may be just the solution. Additionally, make sure all reasonable considerations have been made to understand everyone’s point of view. Realize that attempting to change another’s opinion, philosophy, or feeling of being may be misunderstood.
        If and when one does reply, one should keep true to the Zen of the three Zs. Senders should seek to appreciate and understand the position or condition that caused the situation. When objective reasoning is in place, then a reply can be created. Senders should also go over any important items step by step. Keep the text at a minimum, with proper attention given to tone, attitude, and normal Netiquette considerations. Ask if your reply is deemed satisfactory, or if it requires more information, and inquire if a further response is necessary.
        If a determination has been made that an angry email sender is correct, it is essential to quickly reply and acknowledge what has been in error. If corrective action needs to be taken, good Netiquette is to clearly state what this is and provide a reasonable time line and explanation with all the particulars. If an apology is in order, it is important that it is done without delay. When this has been accomplished, a response for status is good Netiquette. If no response is given, one should not take offense. The recipient may believe the matter is closed. Lastly, decide if it is a reasonable action to inquire again, after an interval of at least several days, if all is in order. If no response again occurs, state that the matter will be considered closed if no further communication regarding this matter is tendered. At this point it is best to let the matter rest.
======================    
 For a great satire on email, please see the following:
https://www.youtube.com/watch?v=HTgYHHKs0Zwscoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
=============================================== 
Good Netiquette And A Green Internet To All! 

Special Bulletin - My just released book

"You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...) 

is now on sales at Amazon.com 

Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecision.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.

 =================================

**Important note** - contact our company for very powerful solutions for IP
 management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
==================================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================


Thursday, September 19, 2019

Tabula Rosa Systems Blog For 3/19/2019Whaling Attack (whaling phishing)



Whaling Attack (whaling phishing)
A whaling attack, also known as whaling phishing or a whaling phishing attack, is a specific type of phishing attack that targets high-profile employees, such as the CEO or CFO, in order to steal sensitive information from a company, as those that hold higher positions within the company typically have complete access to sensitive data. In many whaling phishing attacks, the attacker's goal is to manipulate the victim into authorizing high-value wire transfers to the attacker.
The term whaling stems from the size of the attacks, and the whales are thought to be picked based on their authority within the company.

Due to their highly targeted nature, whaling attacks are often more difficult to detect than standard phishing attacks. In the enterprise, security administrators can help reduce the effectiveness of whaling attacks by encouraging the corporate management staff to undergo information security awareness training.

How whaling attacks work

The goal of a whaling attack is to trick an individual into disclosing personal or corporate information through social engineering, email spoofing and content spoofing efforts. For example, the attackers may send the victim an email that appears to be from a trusted source; some whaling campaigns include a customized malicious website that has been created especially for the attack.
Whaling attack emails and websites are highly customized and personalized, and they often incorporate the target's name, job title or other relevant information gleaned from a variety of sources. This level of personalization makes it difficult to detect a whaling attack.
Whaling attacks often depend on social engineering techniques, as attackers will send hyperlinks or attachments to infect their victims with malware or to solicit sensitive information. By targeting high-value victims, especially CEOs and other corporate officers, attackers may also induce them to approve fraudulent wire transfers using business email compromise techniques. In some cases, the attacker impersonates the CEO or other corporate officers to convince employees to carry out financial transfers.

These attacks can fool victims because attackers are willing to spend more time and effort constructing them due to their potentially high returns. Attackers will often use social media, such as Facebook, Twitter and LinkedIn, to gather personal information about their victim to make the whaling phishing attack more plausible.

Differences between phishing, whaling phishing and spear phishing

Because ordinary phishing attacks, whaling phishing attacks and spear phishing attacks are all online attacks on users in order to gain sensitive information or to social engineer the victim into taking some harmful action, the three are often confused.

A whaling attack is a special form of spear phishing that targets specific high ranking victims within a company. Spear phishing attacks can target any specific individual. Both types of attack generally require more time and effort on the part of the attacker than ordinary phishing attacks.

Phishing is a broader term that covers any type of attack that tries to fool a victim into taking some action, including sharing sensitive information, such as usernames, passwords and financial records for malicious purposes; installing malware; or completing a fraudulent financial payment or wire transfer. While ordinary phishing attacks usually involve sending emails to a large number of individuals without knowing how many will be successful, whaling phishing attacks usually target one specific individual at a time -- typically a high-ranking individual -- with highly personalized information.

Examples of whaling attack

One notable whaling attack occurred in 2016 when a high-ranking employee at Snapchat received an email from an attacker pretending to be the CEO. The employee was tricked into giving the attacker employee payroll information; ultimately, the FBI investigated the attack.

Another whaling attack from 2016 involved a Seagate employee who unknowingly emailed the income tax data of several current and former company employees to an unauthorized third party. After reporting the phishing scam to the IRS and the FBI, it was announced that thousands of people's personal data was exposed in that whaling attack.



           Let's remove this guy once and for all!
++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Good Netiquette And A Green Internet To All! 
=====================================================================Tabula Rosa Systems - Tabula Rosa Systems (TRS) is dedicated to providing Best of Breed Technology and Best of Class Professional Services to our Clients. We have a portfolio of products which we have selected for their capabilities, viability and value. TRS provides product, design, implementation and support services on all products that we represent. Additionally, TRS provides expertise in Network Analysis, eBusiness Application Profiling, ePolicy and eBusiness Troubleshooting. We can be contacted at:
sales@tabularosa.net  or 609 818 1802.


Buy the books at

 www.amazon.com/author/paulbabicki
====================================================















Catfishing
From Wikipedia, the free encyclopedia
Catfishing is a type of deceptive activity where a person creates a sock puppet social networking presence, or fake identity on a social network account, usually targeting a specific victim for deception.
Catfishing is often employed for romance scams on dating websites. Catfishing may be used for financial gain, to compromise a victim in some way, or simply as a form of trolling or wish fulfillment.
Catfishing media has been produced, often centering around victims who wish to identify their catfisher

We can be contacted at:

sales@tabularosa.net  or 609 818 1802.
 ===============================================================
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


Additionally, I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.



Monday, September 16, 2019

Tabula Rosa Systens Vulnerability Summary for the Week of September 9, 2019



National Cyber Awareness System:
09/16/2019 10:47 AM EDT

Original release date: September 16, 2019
 The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available



           Let's remove this guy once and for all!
++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Good Netiquette And A Green Internet To All! 
=====================================================================Tabula Rosa Systems - Tabula Rosa Systems (TRS) is dedicated to providing Best of Breed Technology and Best of Class Professional Services to our Clients. We have a portfolio of products which we have selected for their capabilities, viability and value. TRS provides product, design, implementation and support services on all products that we represent. Additionally, TRS provides expertise in Network Analysis, eBusiness Application Profiling, ePolicy and eBusiness Troubleshooting. We can be contacted at:
sales@tabularosa.net  or 609 818 1802.


Buy the books at

 www.amazon.com/author/paulbabicki
====================================================















Catfishing
From Wikipedia, the free encyclopedia
Catfishing is a type of deceptive activity where a person creates a sock puppet social networking presence, or fake identity on a social network account, usually targeting a specific victim for deception.
Catfishing is often employed for romance scams on dating websites. Catfishing may be used for financial gain, to compromise a victim in some way, or simply as a form of trolling or wish fulfillment.
Catfishing media has been produced, often centering around victims who wish to identify their catfisher

We can be contacted at:

sales@tabularosa.net  or 609 818 1802.
 ===============================================================
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


Additionally, I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.



National Cyber Awareness System:
09/16/2019 10:47 AM EDT

Original release date: September 16, 2019
 The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available
=======================================================     

For a great satire on email, please see the following:
https://www.youtube.com/watch?v=HTgYHHKs0Zwscoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
=============================================== 
Good Netiquette And A Green Internet To All! 

Special Bulletin - My just released book

"You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...) 

is now on sales at Amazon.com 

Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecisin.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.

 =================================