The “Tagging Myself” Post

I saw this on The Militant Negro and tagged myself with his questions:

Q: Have you ever been in love?  Twice

Q: What is your favorite drink?  Coffee, black

Q: What is your favorite song?  The second side of Abbey Road, by the Beatles.

Q: What is your zodiac sign? Scorpio

Q: What is your favorite show?  Foyles War 

Q: What is your favorite band?  Cold Play.


Q: Something you really miss.  Working with mental health clients.

Q: Where do you go when you are sad? Into my head.

Q: Have you ever been in a physical fight? Many times.

Q: What is your favorite color?  Blue

Q: Loud music or soft?  Loud

Q: Favorite actor. Ryan Gosling

Q: Do you have any fears? What are they?  I have agoraphobia, which makes going outside a challenge.

Q: Meaning behind your blog name.  I sometimes make art. My name is Rob Goldstein.

Q: Last time you said you loved someone.  10 minutes ago.

Q: Last book you read. I just finished re-reading ‘Miss Lonely Hearts’ by Nathaniel West.

Q: The book you are currently reading.  The PDR.

Q: Last sport you played.  Weight Lifting.

Q: Last song you sang.  “Tu Voz” by Ramon Cabrera

Q: Favorite food.  Greek Yogurt.

Q: Place you want to visit.  Downtown San Francisco.

Q: Favorite flavor of sweet.  Chocolate

Q: What instruments do you play?  The harmonica, very badly.

Q: Favorite piece of jewelry.  None.


Giphy animated gif of Gloria Swanson as Norma Desmond saying 'Shut up, I'm Rich.



Thank you to The Militant Negro for providing the questions!

Rob Goldstein 2018

The TMI Tag

Get a Damned Flue Shot!

So here’s the deal. I have the flu.

If I let myself I would sleep 24 hours a day.

I’m all over the place emotionally, I mean,
“Why is my body doing this to me?”

animated gif that reads I'm in a glass case of emotion

The flu is hitting the U.S. early this year.

The header image is a CDC map of flu outbreaks in the United States.

Here’s stuff you need to know about the Flue Vaccine:

Myths about the flu vaccine
Flu Vaccine, facts and myths


A Map of where the flu is hitting hardest as of December 10, 2017
A Map of where the flu is hitting hardest as of December 10, 2017

Now back to my feverish hallucinations:

An animated Gif of make up being drawn on on a photo of Vladimir Putin
Say hi to Aunt Vlad!

Note: I do not own the images in this post, they were all found on Google image.

Heat Wave

The last things I do as a San Franciscan is check the weather.

I go out ready for all seasons; most San Franciscans
I know carry backpacks.

Friday morning, ready for autumn, winter and spring,
I took a circuitous 3-mile hike to see my therapist.

I arrived for the 12:30 session drenched in sweat.

I later learned I’d taken that hike as the temperature climbed
to 106 degrees.

By the time I got home, I had a throbbing headache and was sick.

It was almost worse in the apartment and the temperature didn’t
drop by much overnight.

At midnight, the temperature was still 90 degrees Fahrenheit.

“If the temperature remains elevated overnight, that’s when we see
the increase in deaths. The body becomes overwhelmed because it
doesn’t get the respite that it needs.” The Scientific American.

This was Saturday’s nights alert:

Screen shot of an excessive heat warning in San Francisco at 9 PM Saturday Night
September 2nd Excessive Heat Warning – 6 PM

I spent most of Saturday cooling down under frequent showers
and watching the recent season of MST3K on Netflix or going
off on anti-trump twitter rants, which seem to require less energy
than blogging.

By ten pm, the temperature dropped and I was able to sleep.

This morning the headache is gone and I can think and work.

If you’re in a heat wave avoid 3-mile hikes.

Here are some tips from the CDC:

CDC Guidelines for self care in a Heatwave
Take Care of yourself in a Heat Wave

(c) Rob Goldstein 2017 All Rights Reserved

CDC info-graphic from Multomah County


Understanding Business Data Vulnerabilities and Protecting the Company’s Data and CCTV Systems

A couple of months ago a security expert in the UK asked about
writing an article for Art by Rob Goldstein.

Simon Parker is Director of the UK-Based Security Industry for Minerva Integrated Security Services Ltd, which specializes in designing and installing CCTV systems.

At first I thought the request odd because I think of Art by Rob Goldstein is
primarily a mental health blog, but after reviewing the material I decided  I might have readers for whom this material is relevant.

I also found it interesting.

The publication of this post on Art by Rob Goldstein is not an
endorsement of Minerva Integrated Security Services Ltd.


Image of a combination lock on a chain link fence around a map of the World
Image provided by Minerva Security
Understanding Business Data Vulnerabilities and Protecting the Company’s Data and CCTV Systems


Running any business operation in the midst of the latest technological releases and the growing cyber theft activities, is a challenge within itself. In fact, investing in the most innovative software products and hardware systems is not only expensive to a business organization, but also time consuming. This is because the cost of buying new updated hardware and software can easily add up, especially when trying to support both small and large businesses. Therefore, business owners and their representatives must have the resources available to provide their operations with the most advanced technology and the best data security protection in their industry.

That said, here is some information that business owners and the employees that support their organizations must be aware of in order to ensure their company’s systems are not unduly compromised by hackers.

Reasons hackers may want to steal a business’s data and Gain Access to CCTV Systems

First of all, everyone needs to know why hackers want to steal their data and gain access to their systems. This topic will help everyone involved to understand why this subject matter is so important. For instance, recently, there have been many different reports of large corporations being hacked by intruders. In fact, there are reports online that gives the names of the companies that have been affected as well as how much money that they have lost due to these intrusions. From Yahoo and AOL to Ebay and JP Morgan Chase, there appears to be no company that is safe from the hackers’ devices. While the amounts of money lost can vary, the reasons for hacking a system to gain access to data are relatively the same. Some of the top reasons have been noted below.

Vulnerability Scanning

One of the top reasons for gaining access to a company’s networks involve vulnerability scanning. In these cases, the person or organization that taps into these systems are simply opening up the doors to scan the company’s data when they want to. Meaning once the doors are opened, they have a gateway in for more attacks.

Server Disruption

Server disruption is a very malicious act that is usually done for specific purposes. Mainly, the motive for such attacks is to cause the site intentional disruption and lost in finances. Therefore, when someone targets a site, their primary reason is to shut the site’s server completely down.

Monetary Gain

Since no company or industry is exempt from these acts, cyber thieves can have a range of motives for gaining access into a system. Selling information is one reason that can make this kind of activity quite attractive, sifting money out of bank accounts on a continuous basis is another. So, monetary gain is high on the list as well. This is one of the main reasons why JP Morgan Chase and other banks are on the list. Ranging from brick and mortar banks that people visit on a daily basis to financial institutions that services their consumers online, the money in these databases and networks can be quite profitable over time or all in one bang.

CCTV System Hacks

In addition to vulnerability scanning, it is important for companies to know that all systems on site are fair game in the hacker’s world. This is one of the main reasons why companies that have simple to robust CCTV systems must be aware of the hackers devices. Though there are many reasons for a hacker to target a specific company, one of the primary reasons for gaining access to these systems is for unauthorized surveillance. Therefore, once a hacker gets into a business’ CCTV systems, they can also watch and monitor what is going on on site in their targets facilities. What they do with this power is up to the hacker since they can use these cameras to see what they are really looking for.

How Can Companies protect their business data

Today, companies all over the globe are collecting huge amounts of information in their databases. Some of this information may not be sensitive so there is nothing that an intruder can do with the data when they steal. On the other hand, there’s a lot of information that is sensitive and confidential that should not be leaked out or disclosed to anyone outside of that company’s structure. From social security numbers and birth dates of people who work at a specific company to how much money an employee makes on an annual basis, there is a vast amount of data that can cause a massive amount of harm to others. Therefore, with this mind, companies must be aware of these particular vulnerabilities so that they can protect their data. Some of the more notable are provided below.

New System Installations

In order for a company to properly protect their data, there are a number of
safety measures that they can take. Starting with the installation of a new business systems, which is one the first and most important opportunities to keep hacker invasions at bay. For instance, when new systems are installed, the developers must have code in their programs to address the possibilities of hacker. Meaning the code must involve security customization like the use of firewalls. In fact, many of the large companies have specific data protection rules that they implement, specifically to make sure all security risks within a new system is completely closed to external users.

Additional Preventive Measures to CCTV System and Other Networks

In addition to making sure new system installations have specific data security rules embedded in their code, it is also important for business owners to take various kinds of preventive measures to protect their data and their operation activities as a whole. Some of the best ways to make sure a company’s’ security meets these requirements involves the following:

Establish Set Guidelines for Employees

There are many different ways for employees in an organization to expose the company to certain risks. Some of which can disrupt entire operations. To minimize these situations from occurring, the business must have guidelines in place that restrict access to certain network systems. Meaning access to server databases must be confined to only a few approved authorized resources.

Monitor Server Networks and Keeping Intruders

It is not uncommon for some companies to have a specialized technical staff to monitor their networks. Thereby, providing an extra level of security to keep intrusions from happening inside their operations before they occur or cause irreversible damage to the company. For instance, in addition to incorporating anti-virus code in a CCTV systems, specific technical members of the staff will check their CCTV Systems regularly to make sure no one gains unauthorized surveillance of the company’s data or their property.


Running a successful business in the midst of growing technologies and cyber theft is not as easy as some may think. So, business owners and their employees must be made aware of what’s happening around them as well as what can be done to protect their business data systems and their CCTV systems at all times. Fortunately, there are a number of safety measures that can be put in place. Some of the most effective include educating everyone involved on cyber activities, developing new systems that have firewalls built into the code, and actively monitoring CCTV systems from hacker intrusions.

Simon Parker is Director of UK-Based Security Industry for Minerva Integrated Security Services Ltd., which provides a range of access control systems trusted by some of the biggest companies in industries including healthcare, finance and government. Learn more here: