Trump’s Russia Crisis


Image of an American Eagle with wings the color of the American Flag and the caption #TheResistance
The Resistance – Image found on Twitter

Paying Rent With Poetry

from Living a Beautiful Life

Living a Beautiful Life

What a wonderful world it would be
If we could pay rent with poetry


There’s nothing to write.  I’m hung up by the balls.  The stories come back as fast as I can write them.  Of course, I land with poems.  But you can’t pay rent with poems…. First check in 2 months today — a lousy $50, story for a dirty magazine…. Hal, I’m down.  Can’t write.

~ Letter from Charles Bukowski to Harold Norse (excerpt), September 15, 1970.


What a wonderful world it would be
If we could pay rent with poetry

If we all had enough food to eat
If we all had a warm bed to sleep

If we all had shelter from life’s storm
If we were all protected from harm

What a wonderful world it would be
If we could pay rent with poetry

If we could all watch the setting sun
Resting after our day’s work is done


View original post 77 more words

Republicans at the First #Russiagate Hearing


Call your Senator(s). (202) 224-3121 and say no to .

No Supreme Court nominations for Trump without a full
investigation of #Russiagate!

Understanding Business Data Vulnerabilities and Protecting the Company’s Data and CCTV Systems

A couple of months ago a security expert in the UK asked about
writing an article for Art by Rob Goldstein.

Simon Parker is Director of the UK-Based Security Industry for Minerva Integrated Security Services Ltd, which specializes in designing and installing CCTV systems.

At first I thought the request odd because I think of Art by Rob Goldstein is
primarily a mental health blog, but after reviewing the material I decided  I might have readers for whom this material is relevant.

I also found it interesting.

The publication of this post on Art by Rob Goldstein is not an
endorsement of Minerva Integrated Security Services Ltd.


Image of a combination lock on a chain link fence around a map of the World
Image provided by Minerva Security
Understanding Business Data Vulnerabilities and Protecting the Company’s Data and CCTV Systems


Running any business operation in the midst of the latest technological releases and the growing cyber theft activities, is a challenge within itself. In fact, investing in the most innovative software products and hardware systems is not only expensive to a business organization, but also time consuming. This is because the cost of buying new updated hardware and software can easily add up, especially when trying to support both small and large businesses. Therefore, business owners and their representatives must have the resources available to provide their operations with the most advanced technology and the best data security protection in their industry.

That said, here is some information that business owners and the employees that support their organizations must be aware of in order to ensure their company’s systems are not unduly compromised by hackers.

Reasons hackers may want to steal a business’s data and Gain Access to CCTV Systems

First of all, everyone needs to know why hackers want to steal their data and gain access to their systems. This topic will help everyone involved to understand why this subject matter is so important. For instance, recently, there have been many different reports of large corporations being hacked by intruders. In fact, there are reports online that gives the names of the companies that have been affected as well as how much money that they have lost due to these intrusions. From Yahoo and AOL to Ebay and JP Morgan Chase, there appears to be no company that is safe from the hackers’ devices. While the amounts of money lost can vary, the reasons for hacking a system to gain access to data are relatively the same. Some of the top reasons have been noted below.

Vulnerability Scanning

One of the top reasons for gaining access to a company’s networks involve vulnerability scanning. In these cases, the person or organization that taps into these systems are simply opening up the doors to scan the company’s data when they want to. Meaning once the doors are opened, they have a gateway in for more attacks.

Server Disruption

Server disruption is a very malicious act that is usually done for specific purposes. Mainly, the motive for such attacks is to cause the site intentional disruption and lost in finances. Therefore, when someone targets a site, their primary reason is to shut the site’s server completely down.

Monetary Gain

Since no company or industry is exempt from these acts, cyber thieves can have a range of motives for gaining access into a system. Selling information is one reason that can make this kind of activity quite attractive, sifting money out of bank accounts on a continuous basis is another. So, monetary gain is high on the list as well. This is one of the main reasons why JP Morgan Chase and other banks are on the list. Ranging from brick and mortar banks that people visit on a daily basis to financial institutions that services their consumers online, the money in these databases and networks can be quite profitable over time or all in one bang.

CCTV System Hacks

In addition to vulnerability scanning, it is important for companies to know that all systems on site are fair game in the hacker’s world. This is one of the main reasons why companies that have simple to robust CCTV systems must be aware of the hackers devices. Though there are many reasons for a hacker to target a specific company, one of the primary reasons for gaining access to these systems is for unauthorized surveillance. Therefore, once a hacker gets into a business’ CCTV systems, they can also watch and monitor what is going on on site in their targets facilities. What they do with this power is up to the hacker since they can use these cameras to see what they are really looking for.

How Can Companies protect their business data

Today, companies all over the globe are collecting huge amounts of information in their databases. Some of this information may not be sensitive so there is nothing that an intruder can do with the data when they steal. On the other hand, there’s a lot of information that is sensitive and confidential that should not be leaked out or disclosed to anyone outside of that company’s structure. From social security numbers and birth dates of people who work at a specific company to how much money an employee makes on an annual basis, there is a vast amount of data that can cause a massive amount of harm to others. Therefore, with this mind, companies must be aware of these particular vulnerabilities so that they can protect their data. Some of the more notable are provided below.

New System Installations

In order for a company to properly protect their data, there are a number of
safety measures that they can take. Starting with the installation of a new business systems, which is one the first and most important opportunities to keep hacker invasions at bay. For instance, when new systems are installed, the developers must have code in their programs to address the possibilities of hacker. Meaning the code must involve security customization like the use of firewalls. In fact, many of the large companies have specific data protection rules that they implement, specifically to make sure all security risks within a new system is completely closed to external users.

Additional Preventive Measures to CCTV System and Other Networks

In addition to making sure new system installations have specific data security rules embedded in their code, it is also important for business owners to take various kinds of preventive measures to protect their data and their operation activities as a whole. Some of the best ways to make sure a company’s’ security meets these requirements involves the following:

Establish Set Guidelines for Employees

There are many different ways for employees in an organization to expose the company to certain risks. Some of which can disrupt entire operations. To minimize these situations from occurring, the business must have guidelines in place that restrict access to certain network systems. Meaning access to server databases must be confined to only a few approved authorized resources.

Monitor Server Networks and Keeping Intruders

It is not uncommon for some companies to have a specialized technical staff to monitor their networks. Thereby, providing an extra level of security to keep intrusions from happening inside their operations before they occur or cause irreversible damage to the company. For instance, in addition to incorporating anti-virus code in a CCTV systems, specific technical members of the staff will check their CCTV Systems regularly to make sure no one gains unauthorized surveillance of the company’s data or their property.


Running a successful business in the midst of growing technologies and cyber theft is not as easy as some may think. So, business owners and their employees must be made aware of what’s happening around them as well as what can be done to protect their business data systems and their CCTV systems at all times. Fortunately, there are a number of safety measures that can be put in place. Some of the most effective include educating everyone involved on cyber activities, developing new systems that have firewalls built into the code, and actively monitoring CCTV systems from hacker intrusions.

Simon Parker is Director of UK-Based Security Industry for Minerva Integrated Security Services Ltd., which provides a range of access control systems trusted by some of the biggest companies in industries including healthcare, finance and government. Learn more here: