Saturday, July 2, 2016

Tabula Rosa Systems Blog Of 7/2/2016 - Ransomware and Cyber Extortion Are on the Rise – What Can Be Done?



Ransomware and Cyber Extortion Are on the Rise – What Can Be Done?
By Thomas B. Caswell and Rory D. Zamansky of Zelle LLP | www.claimsjournal.com/June 27, 2016
Ransomware is evolving from a relatively low-dollar extortion racket, into a more sophisticated, more expensive, and more prevalent major criminal activity. Hardly a day goes by anymore without ransomware or cyber extortion making the news. A seeming turning point in the severity of this crime was the mid-February 2016, cyber extortion of a large Los Angeles hospital chain where a reported ransom of $3 million was originally demanded. Although the ransom ultimately paid was 40 bitcoins (about $17,000, a far cry from $3 million), its payment nevertheless represents a substantial and noteworthy increase from the hundred dollar ransoms that were previously commonplace. Among those taking note are insurers providing cyber coverage, who often will include ransomware coverage in their policies. Since this manner of cybercrime is going to be with us for the foreseeable future, insurers and their insureds are best served by proactively managing, and thereby perhaps eliminating, the harm that may result from a ransomware attack.
What is ransomware?

In a nutshell, ransomware is a type of malware (a computer virus) that prevents users from accessing files and data on their computer, and threatens permanent encryption or deletion of that data if a sum of money—a ransom—is not paid. For individuals and businesses that do not back up their essential data, the only real option is to pay the ransom.
The goal of the hackers is not to destroy or permanently encrypt the data, but to secure fast payment of the ransom. That is the ransomware business model – quick cash. Historically, the amount of ransom demanded by the perpetrators has been relatively low in order to make its payment the logical choice for the victim; pay a nuisance sum and have access to one’s data restored quickly. In the early ransomware incidents of several years ago, the ransom was often as low as $100. According to the recent Crypto-Ransomware Survey of IT Experts performed by Researchscape International, the median amount of ransoms paid more recently is approximately $250, with one quarter of the ransoms paid amounting to $551 or more. Despite these still relatively modest ransom amounts, future demands will certainly seek even larger amounts of money, if for no other reason than simply because the hackers can get it. Indeed, the $17,000 ransom payment made in the Los Angeles hospital case demonstrates a significantly steeper price that companies are willing to pay for the return of access to their data.
While ransomware is not a new concept, it has become considerably more prevalent in recent years, and will endure as a serious and escalating threat for the foreseeable future. In the Crypto-Ransomware Survey, one-third of IT experts were “extremely” or “very” concerned about ransomware attacks and 61 percent were “moderately” or “slightly” concerned. Only 6 percent of IT experts were not at all concerned about ransomware. Moreover, of the IT experts concerned about ransomware attacks, 59 percent expect the number of ransomware attacks to increase in 2016. In 2016, McAfee Labs, one of the world’s leading sources for threat research and cybersecurity, released a Threat Predictions forecast that predicted ransomware will remain a “major and rapidly growing threat in 2016.” Indeed, data from the FBI Internet Crime Complaint Center (IC3) shows that ransomware with cyber extortion is one of the most serious cyber threats infecting devices around the globe.
CryptoLocker is thought to be the first ransomware spread via email through social engineering techniques, and it has infected tens of thousands—if not hundreds of thousands—of computers since its release in September 2013. A seemingly innocuous email message appears on the user’s computer, appearing to have been sent by a legitimate company. However, when the recipient attempts to open a file attachment embedded in the email, CryptoLocker causes a Trojan bot to encrypt certain types of files on the recipient’s hard drive or networked drives. The malware then displays a message offering to decrypt the data if a ransom is paid online by a stated deadline. Typically, payment in bitcoin or a pre-paid cash voucher is required. Once the ransom is paid, the data is decrypted and access restored.
CryptoLocker also demonstrates the creativity and resourcefulness cybercriminals will employ to capture the maximum amount of dollars from their crimes. Shortly after CryptoLocker launched, the crooks behind it discovered that some victims were having trouble completing the online ransom payments. In response, the enterprising CryptoLocker hackers created a customer service website to help victims pay their ransom – a criminal help desk! The hackers did not want to leave a single ransom dollar on the table.
What are the insurance implications of ransomware?


With the increased prevalence of cybersecurity breaches and hacking attacks, more and more companies look to the insurance marketplace to manage their cyber and data breach risks. Given the recent increase in demand, many insurance companies have jumped into the marketplace and offer cyber insurance or data breach policies. A number of these policies provide coverage for the insured’s ransom payments following such extortions. As more and more insurance companies write coverage for cyber extortion, what is going to happen? How will that change the ransomware landscape? Will the increasing availability of cyber extortion coverage increase the prevalence of ransomware attacks and, as well, the dollar amounts of those ransom demands? These questions will only be answered precisely in due course. However, we do know that as victims continue to pay the hackers for the return of their data and files, the cycle will not stop. Indeed, on June 8, 2016, the University of Calgary paid $16,000 (U.S.) ($20,000 CDN), as ransom in order to restore data following a ransomware attack.
The availability of ransomware insurance does not mark the first time insurance has been made available to cover ransom payments. Nearing a century ago, coverage for kidnapping ransoms came into existence. Kidnappings for ransom share many parallels to ransomware attacks. Both are accomplished to obtain ransom, and in many instances that ransom is paid. The earliest kidnap insurance policies are believed to date back to the 1930s, after the abduction of the 20-month old son of the trans-Atlantic aviator, Charles Lindbergh. The kidnap insurance market further increased in the 1960s and 1970s after a series of well-publicized kidnappings, and, in more recent times, the market again expanded after 2001 following the terrorist attack on 9/11. Indeed, the Guardian reported that at least seven percent of Fortune 500 companies in 2014 took out kidnap and ransom insurance. While the exact figures are unknown, it is estimated that more than $1 billion has been paid out in ransom to release kidnapped executives. Not surprisingly, the vast majority of ransom payments go unreported.
With kidnap insurance, it is a very debatable point whether the existence of such coverage and the resulting payments has led to more kidnapping and ransom demands. However, in the ransomware context, we contend the increased prevalence of cyber extortion coverage will very much, and necessarily, lead to even more cyber extortion events and an increase in the dollar amounts of such demands. The barriers to entry into the cyber extortion arena are substantially less than exist for human kidnapping; cyber extortion can be done from a basement half a world away from the victim, and involves only keystrokes rather than physical confrontations or inherent danger. There is little, if any, reason for the cyber criminals to stop their attacks on distant computers and increasing their ransom demands when those attacks are successful. The profits made by initial entrants to cyber extortion will drive additional hackers to the business model. If the insurance market, or the extorted businesses themselves, continue to pay these increasingly larger sums for the release of data, the cyber criminals will continue to push their ransom demands higher and higher.
This is not at all to suggest that ransomware coverage should not be available to insureds. As with kidnap insurance, there are a variety of ways insurance companies can mitigate cyber risk. For example, secrecy is usually a paramount term in kidnap and ransom policies. The fewer people who know a ransom might be insured and paid quickly by an insurance company, the better. This makes sense. Criminals will prefer victims who they know are insured, so knowledge as to coverage must be limited.
Perhaps more importantly, however, is an insured’s focus on prevention and planning for a potential incident. With kidnap and ransom insurance, carriers typically educate their clients on prevention and the importance of having procedures and a pre-established kidnap crisis management team in place. Similarly, cyber insurance carriers ought to consider requiring their insureds to have proper backup systems and cyber security training for all employees before they issue insurance policies covering cyber extortion.
Companies can minimize or eliminate the need to pay a ransom by making sure they have robust and efficient backup procedures and data restoration plans. With a solid backup system in place, a company need not pay any ransom to the hackers—the company’s data may be encrypted by hackers, but that same data is then recoverable from the company’s own backup systems. Companies must also minimize cyber extortion risk by training their employees about the risks of ransomware. Ransomware enters a computer system when a user accidentally and unknowingly clicks on a file or attachment that contains a ransomware virus. Through training, employees can be taught to avoid suspicious looking websites and emails, and to not click on accompanying attachments.
Unfortunately, the end of ransomware is not near. Even as companies employ more resources to prepare for a ransomware attack, ransomware is not going away any time soon. It is simply too profitable at the moment. The hackers will become more sophisticated and their technology will continue to evolve. Accordingly, businesses and the insurance market must work together to explore new approaches to address these risks and work toward eliminating, or at least substantially reducing, the need to put these ransom dollars in hackers’ pockets.
Thomas Caswell’s insurance coverage litigation practice is focused on first party property, liability, cyber coverage, construction defect claims, bad faith, time element and boiler & machinery claims. He has made substantial recoveries for his clients following their losses arising out of fires, explosions and mechanical failures in refineries, power plants, foundries, hotels and large manufacturing facilities. His email address is tcaswell@zelle.com
============================================================        For a great satire on email, please see the following: https://www.youtube.com/watch?v=HTgYHHKs0Zwscoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618================================================================ 
Good Netiquette And A Green Internet To All! 

Special Bulletin - My just released book

"You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...) 

is now on sales at Amazon.com 

Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecisin.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.

 =================================

**Important note** - contact our company for very powerful solutions for IP
 management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
==================================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================

Thursday, June 30, 2016

Tabula Rosa Systems Blog Of 6/30/2016 - Reasons Your Boss Doesn't Want You To Telecommute


3 reasons your boss doesn't want you to work from home ... and why she's wrong
by Jeanne Sahadi   @CNNMoney June 21, 2016: 11:02 AM ET
A lot of companies have flexible work policies on the books that allow for telecommuting.
But without serious buy-in from higher-ups, no one will feel it's truly okay to work from home, said experts gathered at a recent conference sponsored by FlexJobs.
And it's not just top level management. Your immediate supervisor needs to be on board, too, since she needs to sign off on where you work.
What might be holding some bosses back from embracing remote working?
Here are three of the biggest myths about letting staff work from home:
1. If I can't see you, you're not really working
While slacking off is always a concern for managers, it's no more likely to happen at home than in the office.
"No manager stands over a worker in the office for 8 hours a day to make sure he's working," said Rose Stanley, a senior practice leader for WorldatWork, a human resources association.
And yet the work gets done anyway.
What's more, much of it is done virtually -- even when someone is in the office.
Instead of walking down the hall, you're more likely to email or message colleagues and direct reports.
At multinational corporations, you're already working with team members scattered across the globe.
And if you work at a domestic firm or government office? You're probably dealing with staff in regional offices all the time, noted Mika Cross, a flexible workplace strategist for the U.S. government.
Bottom line: "Whether we're 9 feet, 9 floors or 9 time zones away, we're working virtually. The employees have already left the building," said Kate Lister, president of Global Workplace Analytics.
2. People who work at home aren't as productive.
Assuming telecommuters have the right equipment and space to work from home efficiently, productivity loss isn't an issue.
In fact, one of the benefits of telecommuting is the ability to concentrate.
"We really do want to get our jobs done. With the cacophony at the office -- especially in an open office -- you just can't do it," Lister said.
Dell, for instance, has noticed no drop-off in productivity even though a quarter of its workforce already telecommutes at least part-time. In fact, it hopes to double that share by 2020.

What's more, productivity is easier to generate when you're not exhausted and stressed. Getting to skip that long, aggravating commute can save everyone's "three most precious commodities: time, money and sanity," Lister noted.

An employee with a 15-mile commute who works from home half the time can save two to three weeks a year, she said.
And some of that time is likely to be devoted to work. A Gallup report found remote workers log an average of four more hours of work a week than on-site employees.
Then there's the business continuity bonus. Having employees experienced in telecommuting can help preserve the company's productivity when events such as a crippling storm or other disaster would normally hobble operations.
3. If everyone telecommutes, company culture and collaboration will fall off a cliff.
Most employers today probably wouldn't thrive if everyone works off-site all the time.
Nor would many employees. Working from home all the time can be very isolating.
But engagement surveys and analyses by Gallup and Ernst & Young find that workers who have the option to telecommute one to two days a week have higher levels of employee engagement than colleagues who hoof it to the office every day.
=============================================================        For a great satire on email, please see the following:
https://www.youtube.com/watch?v=HTgYHHKs0Zwscoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
================================================================ 
Good Netiquette And A Green Internet To All! 

Special Bulletin - My just released book

"You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...) 

is now on sales at Amazon.com 

Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecisin.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.

 =================================

**Important note** - contact our company for very powerful solutions for IP
 management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
==================================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================

Tuesday, June 28, 2016

Tabula Rosa Systems Blog Of 6/23/2016 - Facebook Leads The Way Against Cyberbullying




Facebook leads the way against cyberbullying, but others need to follow
·MADHUMITA MURGIAHEAD OF TECHNOLOGY
19 JUNE 2016 • 4:23b www.telegrahp.co.uk

PMSocial networks need to practice proactive compassion CREDIT: ALAMY
This week Prince William joined the ranks of the tech-savvy royals when he attended Founders Forum, an invitation-only event for tech founders held at an 18th century mansion in the depths of Hertfordshire.
Surrounded by the heads of Google, Facebook and Twitter, the Duke of Cambridge didn’t choose to advocate for entrepreneurship or celebrate Britain’s role in the digital revolution – instead he picked a surprisingly buzzword-free topic usually avoided at self-congratulatory events like these: cyberbullying. 
The Duke was speaking to an audience including influential tech entrepreneurs CREDIT: PA
The Prince said he had become “alarmed” by the rise of cyber trolls, particularly since becoming a parent, and called on social media giants to tackle bullying more actively. As a parent, he said, he was appalled at the news of teenage suicides and eating disorders borne out of online cruelty.
If there’s any indication of how mainstream the issue has become, it’s this. Last year, BullyingUK saw calls relating to cyberbullying increase by 77pc over a 12-month period. In an online survey, BullyingUK also found that 43.5pc of respondents aged between 11 and 16 had been bullied via social networks. 
And while children are most vulnerable, adults and celebrities are equally exposed. Earlier this month, Uber’s UK head Jo Bertram said she didn’t use Twitter anymore because of the torrential abuse she received from black cab drivers who have compared her to Jimmy Saville, and also said they wished she would get run over by a car.
Monica Lewinsky, in her electric Ted Talk about online shame, said that after her affair with President Bill Clinton became public, she almost lost her life to the “mobs of virtual stone-throwers” who publicly humiliated her for more than a decade.
The thing about online bullies is that they are faceless: on the web, gutless tormentors don’t have to face up to their victims as they would in a school playground or in an office. Instead, they hide behind anonymous usernames and disappearing messages, a virtual mob loath to get their hands dirty. 
It’s time we brought some compassion to the internet, but whose responsibility is it?
The average person has five social media accounts, and we spend almost 30pc of our time online using these networks – about 1 hour and 40 minutes every day. Facebook is by far the largest online community, with 82pc of the world’s population, excluding China, having a Facebook account and 40pc using it regularly. Twitter has roughly 350m people signed up. 
Their immense scale also means social networks have got a finger on the pulse of humanity – the perfect vantage point from which to help.
My opinion, like Prince William’s, is that no one is better placed to encourage compassion than social media companies – after all, their networks have facilitated this new social phenomenon through their very existence. And it's not good enough just to solve a crime after it's committed - tech companies must start to police their vast virtual domains more proactively. 
Back in 2013, a study suggested Facebook was the worst network for teenage cyberbullying; 87pc of teens who reported cyber abuse said they were targeted on Facebook, while 20pc blamed Twitter.
Despite its smaller size, Twitter has a particularly dark side, with harassment and trolling driving away even celebrity users, including Stephen Fry and the Great British Bakeoff’s Sue Perkins. Some believe it's the central reason that the platform is bleeding users. 
Its former chief executive, Dick Costolo, made a very frank apology on an internal forum last year, admitting that the microblogging service “suck(s) at dealing with abuse and trolls on the platform and we've sucked at it for years”. 
The bare minimum responsibility would be to provide a channel for users to report direct abuse, threats and bullying. Last year, Twitter addressed this by allowing third parties to flag abuse rather than waiting for victims to do it themselves. It also broadened the criteria by which it assessed threats.
For example, where previously it would have required a troll to explicitly state details of a threat – such as wanting to commit sexual violence at the person’s home – before it could act on it, it now acts on more generalised threats such as those of physical violence. 
Last week, it also made it easier for users to block trolls effectively. 
Starting today, we're making Block easier to help you control your Twitter experience. https://about.twitter.com/safety/three-tools-to-control-your-twitter-experience …pic.twitter.com/gCzkTwoglP
Facebook has been particularly driven in an effort to foster compassion within its vast network - one step forward from resolving complaints.
For example, take the "reporting" tool on Facebook that allows you to report a photo or comment that you want taken down. To make people engage directly with each other and resolve conflict,Facebook’s compassion team created take-down requests to communicate why the user wanted a post removed.
Human articulations such as "It’s embarrassing” increased the requests hugely. And of those requests, 85pc of the time, the person who posted the photo took it down or sent a reply, forcing bullies to talk directly to their victims. 
Changing 'embarrassing' to 'it's embarassing' made engagement rise by 1.5 times
Reporting abuse is the bedrock of online safety, but large social networks have to move to a more proactive form of compassion.
The most cutting-edge technologies such as machine learning are being used to make these products more fun, engaging and useful, but they could equally be applied to making these spaces more inclusive and empathetic.
For instance, hateful speech should be filtered by abuse-spotting algorithms and removed before it has the chance to inflict pain. Behavioural algorithms might be able to learn from profiles who is more likely to be a troll or a harasser and flag them up to community officers.
This week, Facebook took a big step in this direction by rolling out its Suicide Prevention tools globally. The Compassion team worked with 50 partners, including the Samaritans in Britain, to provide mental health resources for those at risk of suicide or self-harm.
Facebook's suicide prevention tools
The tool allows third parties to report posts that seemed like distress signals. If Facebook’s large community monitoring team deems the reported post a cry for help, the person’s normal Facebook experience will be paused when they next log in.
Instead, they will get a message saying one of their friends thought they might be going through a tough time, and an offer to help. Resources shared include contact details of local helplines, self-help tips and reminders of friends who could help. The person who reported the post receives a set of support resources as well. 
For the most part, social networks, like the internet itself, have been a unifying force, connecting everyone from angst-ridden teens to lonely grandparents around the world. Through them, we can engage with strangers, broadcast repressed ideas and ideologies, and record our lives for posterity.
But their immense scale also means social networks have got a finger on the pulse of humanity – the perfect vantage point from which to help. It's time they took their lead from the world's largest online community, and stepped up. 
==============================================        For a great satire on email, please see the following:
https://www.youtube.com/watch?v=HTgYHHKs0Zwscoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
=============================================== 
Good Netiquette And A Green Internet To All! 

Special Bulletin - My just released book

"You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...) 

is now on sales at Amazon.com 

Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecisin.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.

 =================================

**Important note** - contact our company for very powerful solutions for IP
 management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
==================================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================