<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Categories | XQ Message Forum — XQ Message Forum</title>
        <link>https://community.xqmsg.com/</link>
        <pubDate>Sun, 12 Apr 2026 22:45:13 +0000</pubDate>
        <language>en</language>
            <description>Categories | XQ Message Forum — XQ Message Forum</description>
    <atom:link href="https://community.xqmsg.com/categories/blog/feed.rss" rel="self" type="application/rss+xml"/>
    <item>
        <title>Ohmvvö</title>
        <link>https://community.xqmsg.com/discussion/123/ohmvvoe</link>
        <pubDate>Tue, 04 Oct 2022 04:42:19 +0000</pubDate>
        <category>Blog</category>
        <dc:creator>Gordon</dc:creator>
        <guid isPermaLink="false">123@/discussions</guid>
        <description><![CDATA[<p>Mvv&ouml;bl&ouml;g</p>]]>
        </description>
    </item>
    <item>
        <title>Protect Your Video Surveillance Data From Hackers</title>
        <link>https://community.xqmsg.com/discussion/62/protect-your-video-surveillance-data-from-hackers</link>
        <pubDate>Wed, 24 Mar 2021 21:15:55 +0000</pubDate>
        <category>Blog</category>
        <dc:creator>Lauren</dc:creator>
        <guid isPermaLink="false">62@/discussions</guid>
        <description><![CDATA[<p>As reported by <a href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams" rel="nofollow">Bloomberg News</a> earlier this month, a group of hackers breached security camera data collected by a startup in Silicon Valley. An international hacker collective claimed responsibility with the goal to demonstrate how simple it was to carry out a data breach of this magnitude. Using a compromised &ldquo;Super Admin&rdquo; account, the hackers easily gained access to 150,000 live feed cameras from hospitals, police departments, schools, prisons, and other companies. Footage included police/suspect interrogations and live video from inside women&rsquo;s health clinics and psychiatric hospitals.&nbsp;</p><p>It&rsquo;s still too early to determine what the long-term consequences of the hack will be, and if there will be any legal ramifications. But the video breach is a reminder that data protection for cloud-based services is critical for safe operation.&nbsp;</p><p>That&rsquo;s where XQ comes in. If the cameras had the XQ agent installed both live and stored video would be protected.&nbsp; XQ works by encrypting video right on the camera with an ephemeral key.&nbsp; The key is posted to a cache with specific policies on who can access it.&nbsp; In this case, even a Super Admin would not be able to access the data unless they were authorized to do so.&nbsp; Moreover every transaction in XQ is logged in real time.&nbsp; Thus if there was an unexpected authorized access that would also be flagged.&nbsp;</p><p>Earlier this year the Indiana 5G Zone demonstrated encrypted video using XQ technology. In the video below you will learn about XQ&rsquo;s API based architecture that encrypts data on the edge to ensure that large-scale breaches don&rsquo;t happen. Check it out!</p><p><a href="https://www.youtube.com/watch?v=cWFClm2hm1I&amp;t=11s" rel="nofollow">Click here for the video</a></p><div>
    <div>
        <a href="https://community.xqmsg.com/uploads/804/CUBLAMM0YI0Z.png" rel="nofollow noopener" target="_blank">
            <img src="https://community.xqmsg.com/uploads/804/CUBLAMM0YI0Z.png" alt="Screen Shot 2021-03-24 at 2.15.08 PM.png" />
        </a>
    </div>
</div>
<p><br /></p>]]>
        </description>
    </item>
    <item>
        <title>First American Title Faces First Charges and Fines Under New Cybersecurity Law</title>
        <link>https://community.xqmsg.com/discussion/54/first-american-title-faces-first-charges-and-fines-under-new-cybersecurity-law</link>
        <pubDate>Tue, 28 Jul 2020 16:49:51 +0000</pubDate>
        <category>Blog</category>
        <dc:creator>Danny</dc:creator>
        <guid isPermaLink="false">54@/discussions</guid>
        <description><![CDATA[<div>
    <div>
        <a href="https://community.xqmsg.com/uploads/011/G18IWMPV2DUV.jpg" rel="nofollow noopener" target="_blank">
            <img src="https://community.xqmsg.com/uploads/011/G18IWMPV2DUV.jpg" alt="bill-oxford-OXGhu60NwxU-unsplash.jpg" />
        </a>
    </div>
</div>
<p>American regulators have crossed the rubicon with the <a href="https://www.dfs.ny.gov/reports_and_publications/press_releases/pr202007221" rel="nofollow">bringing of charges</a> against First American Title by New York State for violating its cybersecurity regulations. First American, the country&rsquo;s second-largest real estate title insurer, is accused of allowing hundreds of millions of files containing sensitive customer information (Social Security numbers, bank account information, etc.) to be illicitly accessed. The company could face a $1,000 fine for each instance of exposed customer information. With anywhere from hundreds of thousands to millions of records compromised, fines could stretch into billions of dollars.</p><p>For title insurance firms, a $16.5 billion industry, predatory behavior by cybercriminals and regulators is a particularly acute issue. Title insurers store a wealth of customer information (often exchange several times by email in a single transaction) and are prime targets for cybercriminals. Further, the regulatory structure is relatively diffused and overlapping. Consider First American&rsquo;s data breach. The company&rsquo;s primary regulator is the Nebraska Department of Finance, who were informed of the data breach and ruled that the company acted appropriately. New York regulators found that the company had breached its guidelines and have brought charges. Other states with stringent privacy laws, like California, may also take action. For insurers, among other sectors, the results from cyber attacks can be dually devastating: first cyber criminals ruin your reputation with your customers, then regulators bankrupt you.</p><p>At XQ Message, we&rsquo;re making it possible for businesses and consumers to take control of their privacy. We&rsquo;ve developed a cross-platform quantum encryption system that is designed to combat the privacy issues of today and the emerging threats of tomorrow. XQ has taken a radical new approach to cybersecurity by making military-grade quantum encryption accessible to businesses of all sizes and consumers. XQ isn&rsquo;t just another messaging app, but a cross-platform encryption solution that works across the most commonly used business messaging platforms. XQ&rsquo;s embedded quantum encryption software is available for Gmail, Outlook, Slack, iMessage, and Android, with Zoom on the way. XQ&rsquo;s enterprise product allows businesses to create a secure environment for internal and external communications to co-workers, clients, and vendors. With XQ, businesses need not worry about being bankrupted by cybercriminals and regulators.</p>]]>
        </description>
    </item>
    <item>
        <title>A Single Email Breach Can Bankrupt A Small Business. Here’s How to Prevent It.</title>
        <link>https://community.xqmsg.com/discussion/45/a-single-email-breach-can-bankrupt-a-small-business-here-s-how-to-prevent-it</link>
        <pubDate>Fri, 24 Jul 2020 23:53:16 +0000</pubDate>
        <category>Blog</category>
        <dc:creator>Brian Wane</dc:creator>
        <guid isPermaLink="false">45@/discussions</guid>
        <description><![CDATA[<p><br /></p><div>
    <div>
        <a href="https://community.xqmsg.com/uploads/778/B54MIR2LQZU8.png" rel="nofollow noopener" target="_blank">
            <img src="https://community.xqmsg.com/uploads/778/B54MIR2LQZU8.png" alt="image.png" />
        </a>
    </div>
</div>
<p><br /></p><p>Companies across the U.S. are in lockdown mode: employees working from home, offices shuttered, client interactions happening online. Amid this disruption to business as usual, one group sees a <strong>wealth of opportunity</strong>: cybercriminals.</p><div><div><p>Amid this disruption to business as usual, one group sees a <strong>wealth of opportunity</strong>: cybercriminals.</p></div></div><p>&nbsp;Even in non-pandemic times, the cost of cyber fraud to small businesses is devastating.&nbsp;Estimates run as high as $200,000 per cyberattack for U.S. companies on average, with 43% of all attacks aimed at small businesses (1). A 2019 study of companies with 500 or fewer employees that had suffered a data breach found that <strong>10% went out of business and 25% had to file for bankruptcy </strong>(2). Smaller companies often don&rsquo;t have the resources to implement cybersecurity measures, buy specialized protection software, or hire team members with expertise in defending against such threats (3).&nbsp;</p><p>&nbsp;</p><p>Relying on email for external communications makes a company vulnerable at the best of times. But in the era of COVID-19, <strong>increased sharing of confidential data over email</strong> translates to even higher risk. Documents that would normally be shared as hard copies in an office are now being sent back and forth as PDFs through free applications like Gmail or Dropbox.</p><p>&nbsp;</p><p>Tech-savvy business owners&nbsp; may believe they&rsquo;re safe if they&rsquo;ve created a 15-character password with all the bells and whistles&nbsp;&ndash;&nbsp;capital and lowercase letters, an ampersand and an exclamation point, a few out-of-sequence numbers. But if they send sensitive information to someone who has &ldquo;password&rdquo; or &ldquo;123456&rdquo; as&nbsp;<em>their</em>&nbsp;password, both parties are sitting ducks for hackers.&nbsp;</p><p><br /></p><p>By the way, those aren&rsquo;t parodies of bad passwords: <strong>they&rsquo;re alarmingly common</strong>. Annual rankings of the year&rsquo;s worst passwords, based on frequency of appearances in data breaches, confirm that far too many Internet users fail to create more complex passwords (4). According to a 2019 Harris Poll/Google <a href="https://storage.googleapis.com/gweb-uniblog-publish-prod/documents/PasswordCheckup-HarrisPoll-InfographicFINAL.pdf" rel="nofollow">survey</a>, nearly a quarter of Americans have used easy-to-guess passwords like password, 123456, abc123, or iloveyou, or qwerty. More than half have used either a pet&rsquo;s name or their own name. Only 37% said they&rsquo;d used two-factor authentication. Alarmingly, up to two thirds of Americans use the same password for banking, email, and social media (5).</p><p>&nbsp;</p><p><strong>Small and medium-sized businesses are only as secure as the weakest link in their communication chain.</strong> With a circle of contacts that includes customers, vendors, business associates, partner organizations, and contractors, sensitive data that&rsquo;s been sent over email can be compromised regardless of what precautions the sender took. Think bank account numbers, invoices, social security numbers, tax returns, medical records,&nbsp;investment holdings of mortgage applicants &ndash; information clients count on businesses to keep secure.</p><p>&nbsp;</p><p>A cache of emails obtained by a hacker can lead to <strong>severe financial and reputational losses.</strong> As too many businesses have discovered, a cybercriminal who has access to a past invoice can <a href="https://www.zdnet.com/article/these-sneaky-email-scammers-are-making-it-even-harder-for-workers-to-spot-fake-invoices/" rel="nofollow">create a convincing fake one</a>, using real account numbers and wording that sounds legitimate. Invoice fraud and <a href="https://www.consumer.ftc.gov/blog/2018/02/phishers-send-fake-invoices" rel="nofollow">phishing scams</a> have cost businesses billions &ndash; even <a href="https://www.cnbc.com/2019/03/28/how-to-avoid-invoice-theft-scam-that-cost-google-facebook-123m.html" rel="nofollow">Google and Facebook</a> were tricked by a Lithuanian cybercriminal into paying $23 million and $100 million, respectively.</p><p><br /></p><p>If a business is tricked into paying false bills, that&rsquo;s costly in itself. But if the hacker has accessed private, personally identifiable client information and makes it public, the costs could grow exponentially: government fines, loss of clients, negative publicity. The <a href="https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=201720180AB375" rel="nofollow">California Consumer Privacy Act</a>, which went into effect this year, assesses fines on companies doing business in the state of between $100 and $750 per consumer per incident, or actual damages &ndash; whichever is greater &ndash; in cases of theft or unauthorized disclosure of data.&nbsp;</p><p><br /></p><p>A <a href="https://www.security.org/resources/data-breach-awareness/" rel="nofollow">survey</a> of consumers&rsquo; reactions to 2018 data breaches revealed that 67% trusted a company less after it had experienced a data breach, and 22% stopped doing business with a company after such a breach.&nbsp;</p><p><strong>&nbsp;</strong></p><p>Establishing adequate protection against cyber attacks can be an overwhelming prospect, considering the costs, the time and effort it takes to implement security upgrades, and weighing the risks. For companies looking for simpler interventions that can still make a difference, encryption of communications is a good place to start.</p><p><br /></p><ol><li><a href="https://www.cnbc.com/2019/10/13/cyberattacks-cost-small-companies-200k-putting-many-out-of-business.html" rel="nofollow">https://www.cnbc.com/2019/10/13/cyberattacks-cost-small-companies-200k-putting-many-out-of-business.html</a></li><li><a href="https://www.scmagazine.com/home/security-news/data-breach/data-breach-causes-10-percent-of-small-businesses-to-shutter/" rel="nofollow">https://www.scmagazine.com/home/security-news/data-breach/data-breach-causes-10-percent-of-small-businesses-to-shutter/</a></li><li><a href="https://www.business.com/articles/small-business-data-breaches/" rel="nofollow">https://www.business.com/articles/small-business-data-breaches/</a></li><li><a href="https://www.securitymagazine.com/articles/91461-the-worst-passwords-of-2019" rel="nofollow">https://www.securitymagazine.com/articles/91461-the-worst-passwords-of-2019</a></li><li><a href="https://www.inc.com/jason-aten/google-says-66-of-americans-still-do-this-1-thing-that-puts-their-personal-information-at-a-huge-risk-heres-how-google-wants-to-help.html" rel="nofollow">https://www.inc.com/jason-aten/google-says-66-of-americans-still-do-this-1-thing-that-puts-their-personal-information-at-a-huge-risk-heres-how-google-wants-to-help.html</a></li></ol><p><br /></p>]]>
        </description>
    </item>
    <item>
        <title>Beware of what you say on the Internet!   by Bob Flores</title>
        <link>https://community.xqmsg.com/discussion/35/beware-of-what-you-say-on-the-internet-by-bob-flores</link>
        <pubDate>Tue, 17 Mar 2020 19:00:26 +0000</pubDate>
        <category>Blog</category>
        <dc:creator>Admin</dc:creator>
        <guid isPermaLink="false">35@/discussions</guid>
        <description><![CDATA[<p>Beware of what you say on the Internet! </p><p>Bob Flores, Former CTO of the CIA, XQ Advisor</p><p>Over the past year there has been a stream of news about social networks and messaging services listening into private conversations.&nbsp;The typical response from online services is that user monitoring is covered by the terms of service to support their advertising business.&nbsp;Yet some of the services have been caught selling identities to advertisers.&nbsp;More recently even VPN and ad blocking services have been caught selling data on their users.&nbsp;&nbsp;</p><p>The lack of transparency by online services has resulted in Western governments, including the US, to consider stronger privacy laws. While online services are promising better privacy, it&rsquo;s too early to tell how they will balance this with the needs of their ad business.&nbsp;For now, users must take a more proactive role to protect their own data. Here are some practical steps to consider:</p><p>Anything you say on the Internet can be used against you.</p><p>1/ Your first thought must be whether you want to publicly stand behind your statements. People have gone to jail and lost jobs for jokes made between friends.&nbsp;Unfortunately, humor is not legal defense.</p><p>2/ Consider the &ldquo;old school&rdquo; phone call for sensitive information. Given the bulk of messaging now takes place on mobile devices, it&rsquo;s fairly easy just to call the other party (on their mobile device) when sharing sensitive information.&nbsp;There is no shame on using a phone to talk.</p><p>3/ If you must transmit sensitive data, encrypt it. There is a range of free encryption apps such as Wickr and Signal that create a dedicated secure channel between users.&nbsp;Additionally, there is a new service called XQ Message that creates a private channel inside apps such as iMessage, Gmail, and Slack.&nbsp;Use one of them for secure your sensitive messages.</p><p>Being aware of the dangers of Internet services is the first step to guarding your privacy.</p>]]>
        </description>
    </item>
   </channel>
</rss>
