Revolutionary, Affordable and Agnostic Cybersecurity Solution for small to large businesses

:white_small_square:At the end of 2019, the customer data and personal health information of over 30,000 was reportedly exposed including names, address, email address, dob, phone, and medical ID numbers through a cannabis software. The cannabis dispensaries that used the software were also reported publicly in this fallout.

:white_small_square:A medical referral agency in Alberta was attacked by hackers who were able to access their clients’ health records in 2018 through the start of 2019.

:white_small_square:In 2017, a well-funded marijuana delivery service had a data breach in which hackers reportedly demanded 70 million dollars in ransom for the data. The theft was from a former employee of Don Davidson, MD. Don Davidson MD is a company that shared data with the delivery service company.

:white_small_square:In a well-known news story from 2017, MJ Freeway, a tracking system for the cannabis industry, was hacked twice within the same year.

:white_small_square:In 2018, the state of Washington’s database had a cyber incident leading to stolen sensitive data.

:white_small_square:Hackers breached information of almost 5,000 customers from an Ontario Cannabis Store during g a recent cyberattack.

:white_small_square:Impact of Cyber-crime for cannabis businesses

:white_small_square:What would be the impact to your business if a cybercriminal was able to attack successfully?

:white_small_square:A study by IBM and the Ponemon Institute determined that the average cost of a data breach exceeded $3 million. The $3 million includes all costs, such as remediation, notifying clients, and following all state laws for resolving the situation. The outcome, according to the national cybersecurity alliance, is that 60% of small businesses go out of business within six months after their security breach.

:white_small_square:Even if one was able to handle the fallout financially, there is irreparable damage to one’s reputation and brand resulting in lost revenue for years to come. For example: Imagine you are a patient deciding between two dispensaries to get your medicine. Upon your research, you’ve discovered one has an excellent reputation, and the other has news stories about their patient data breach, which would you choose?

:white_small_square:I’m happy to announce that I’m working with a new company that provides cybersecurity/network security. They have developed a device that will break the current mold of cybersecurity services.
This device scans up to 250 devices on a single network daily for all known exploits and suggests solutions.
:white_small_square:For more complex issues technical support based here in America is included in the service.
Currently the inventor of the technology himself is at the end of the other line when you call support. The database of exploits updates daily from the most trusted and widely used sources known to the cybersecurity industry.
:white_small_square:The device does not utilize long term cloud based data logging like most cybersecurity platforms currently available. This means we do not sell your data or even store it longer than necessary to address the exploits detected.
:white_small_square:I am not a computer programmer or engineer so I can’t answer many tech questions but the inventor of this device has an impressive resume providing security to large financial institutions and his demo is highly intuitive and comprehensible.
:white_small_square:This device replaces the need for an entity to employ a team of cybersecurity specialists with just a single device and monthly subscription fee.
:white_small_square:Anyone interested in a demo should text me their email address at…
:calling:512.921.7033
…and I’ll schedule a demo with my team.

:white_small_square:We’ve had great feedback from some big players in Fintech and Cybersecurity already and anticipate our product flying off the shelves after launch in a few weeks. Hit me up!

3 Likes

as someone reasonably familiar with this subject matter, I question immediately a magic box that is supposed to fix ones security problems.

First off, the box at best is running an IDS or packet sniffer checking for signs of malware. It cannot be doing any active scanning for malware on systems as it lacks permissions to touch low level stuff where malware lives.

furthermore, adding a random box you got from a phone number on a website essentially based around federally illegal products/processes is the exact, polar opposite of a good security practice. The box could be doing the exact opposite of providing security, either via malice or introducing its own attack surface to the network

A good security practice would be to look at an established commercial or Free Open Source solution, such as OSSEC Documentation — OSSEC

the benefits of established commercial products are customer support and reputation, the benefits of FOSS are code auditing. I personally feel more comfortable working with code that myself or others can inspect and make sure its secure rather than a black box security solution, but that’s just me. FOSS can be more work to get working.

12 Likes

Considering that the person pitching this magic box is a well known fraud, I’d say that your instincts are very much valid.

5 Likes

its a great look for the GLG to have its members be selling the modern equivalent of a cable descrambler. So sketch

5 Likes

Could be a lot of things at this point, we dont have any info.
Heck, Could be a security gateway / firewall and not just some device scanning the subnet but doing the PF/DNS/IDS for the whole network. Might be a device paired with client software that does AV/HIDS, and could also help with client VPNs/IPSEC where applicable.

Still doesn’t sound open source but maybe @Mosaic_Co-Labs has the pitch he has prepared for IT guys?
If they are open to a honest review from me I don’t mind taking a look. sidco@future4200.com

5 Likes

same i’d love to actually see what they are offering

info@ihp.solutions

2 Likes

Questions?

Schedule a demo.

@RedundantAlexithymia, @sidco

I’ll email you both invites.

I always :heart: the positivity in these conversations:call_me_hand:

Honest feedback is all we ask

1 Like

My cousin got a job slingin similar boxes recently, to water companies, government agencies who get a refund for using it or something like that. Seems like a bucha malarkey

2 Likes

Seriously… Not one of these products has ever been more than fancy bullshittery. Why is the cannabis industry gonna be any different?

I call useless scam, speaking from a meager amount of experience with the tech industry, and single day in the canna industry. You’d be selling it to the tech industry first, if there was single thing here noteworthy. Instead you rely on the technological ignorance of this industry to sell a magic box

Sorry that I’m not using toxic positivity to sell my belief or lack of belief, but yeah, sounds vague and bullshit. (toxic positivity is gaslighting tactics 101 by sellers)

5 Likes

I’m selling water filters, if anyone is in the market.

100% guaranteed to reduce dihydrogen monoxide consumption by reduced GPM through a smaller flow restriction technology ™

If your product broke the mold, you’d be selling it… just about anywhere else than Future4200.

Currently the inventor of the technology himself is at the end of the other line when you call support

Jesus, that’s not normal, and sounds sketchy as hell.

@CARTO.GRAPHER tell us more about this guys fraud. Anyone offering a security solutions needs to have that DUG into.

3 Likes

Why do i have to agree to schedule time to have a high pressure sales pitch? i want info, not marketing.

also, you are not getting my name. Especially when you are offering to sell a mystery box that you don’t even understand, and likely is a scam

4 Likes

Where does the box go in the network?
What does the box do, exactly?
Basically just the sales pitch that you (or the owner of the box) would give an IT guy.

Did you get an email, did they ask for your name, or?
Did you hear anything about the product other than what was posted here? I wouldn’t be so quick to call BS when we have literally 0 info from someone who isn’t a tech guy. The box could be entirely legitimate (although probably proprietary). No need to jump on anyone until we hear the story.

2 Likes

Damn bruh, if u hate me just say it

6 Likes

I’m an ex network security professional. What your describing sounds like a very basic version of one if the Qualys brand vulnerability scanners.

I believe Nessus still offers there’s for free (damn only lets you scan 16 ips for free it appears) Download Nessus Vulnerability Assessment | Nessus® | Tenable®.

It will require you to learn a bit about the software but it’s not a bad thing.

About 9 years ago i did a project that used the, at the time free Nessus vulnerability scanner, to run scans on 400,000 servers every month. It’s very robust software is my point.

What is the hardware solution you are offering. Is it a vulnerability scanner and if so what’s your stream/source for CVEs? Are you guys providing the definitions for the scan yourselves or buying/using others?

5 Likes

No he asked for this in PM

1 Like

Re: no need to jump on the guy

I would swallow a bag of razor blades before i swallow this being a legit, good product. Good it products are not marketed by hemp brokers on skechy forums about cannabis. Good products dont toss up a bunch of red flags. Honest companies dont ask for your personal info to give any information about their product. I may have been born at night but not last night. Thats a scam because it walks and talks like one

4 Likes

Cyber security isn’t.

You know me, all about that open source. We didn’t even get a website or anything other than ‘the box’ in OP. I’ll us you know how the demo goes on 2021-06-21T00:00:00Z

4 Likes

please do, id love to eat my words up here

2 Likes

I’ll just set @sidco up with a demo and let him report back to you guys. Thanks for all the comments