Forbes Technology Council recently proclaimed “CyberSecurity is Dead”:

“The data is in: Cybersecurity is dead. Even as global cybersecurity spending is expected to balloon to over $100 billion by 2020, the frequency and severity of cyberattacks continue to grow, with seemingly no end in sight. While exploits and hacking tools become even more widely available and simple to deploy, there has been little commensurate progress in beating back attackers, who continue to find success striking at persistent, common weak points. How is this possible?”

“The answer is one that must chagrin any CISO spending exorbitant amounts of money on cybersecurity programs: The entire conception upon which cybersecurity rests — of constructing a castle, against which any marauding attackers stand little chance of breaching — is barely of use.” — “CyberSecurity is Dead” (

Forbes is correct on both accounts. First, despite $100 billion spent, successful hacking attacks only increase in frequency and severity. Second, the entire CyberSecurity paradigm is fundamentally flawed — since hackers will always be able to breach software and hardware (as the first point proves).

The solution to this dilemma is actually straightforward: You need to keep your digital life private even after the inevitable breach occurs. That’s where CyberPrivacy comes in.

CyberPrivacy Solution

You’ve already seen how CyberPrivacy protects you even after your browser has been breached. So how can CyberPrivacy keep your digital life protected when trojans inject themselves into non-browser apps such as Microsoft Word, Adobe PhotoShop, and IBM’s Lotus Notes? Here’s an even more intriguing question: How can CyberPrivacy keep your digital life protected when trojans inject themselves into your antivirus software?

While non-browser trojans pose a seemingly insurmountable problem for CyberSecurity, they are effortlessly neutralized from a CyberPrivacy perspective. In fact, the CyberPrivacy solution to non-browser trojans can be fully explained in a single sentence:

Only allow apps to talk to their makers.

That’s it! Only allow Microsoft Word to talk to Microsoft Corp (its maker); only allow Adobe PhotoShop to talk to Adobe Systems (its maker); only allow IBM’s Lotus Notes to talk to IBM (its maker). If Microsoft Word can only talk to Microsoft then trojans injected inside it can only talk to Microsoft as well. Therefore, these trojans can no longer use Microsoft Word to communicate with hacker control centers. Problem solved.

Trojans inside Adobe Photoshop can only talk to Adobe. Trojans inside IBM’s Lotus Notes can only talk to IBM. Trojans inside Norton Security Suite can only talk to Norton.

CyberPrivacy finds elegant solutions because it asks very different questions. CyberSecurity asks, “How can I stop trojans from getting in?” Whereas CyberPrivacy asks, “How can I stop data from getting out?” Very different questions. Very different answers.

Terra Privacy LLC’s Hacker Deterrent Suite neutralizes trojans after they’ve breached your browsers, and it neutralizes trojans after they’ve breached your non-browsers as well. Terra Privacy LLC’s unique approach to stopping hackers has recently been discussed in a report from IDC — the premiere global provider of market intelligence and advisory services for the information technology, telecommunications, and consumer technology markets. To read the IDC report click here.

Trojans and Beyond

The hacker’s favorite tool for initiating attacks is email. Emails can be used in two ways: embed trojans inside attachments and/or trick users into handing over secret credentials via fake websites. Email trojans are readily neutralized through the CyberPrivacy approaches already discussed. But what about phishing websites?

Phishing websites are a tremendous problem for CyberSecurity. After all, nearly 1.5 million new phishing sites are created each month. Therefore, CyberSecurity blacklists are always out of date.

Can CyberPrivacy offer a genuine solution to this problem regardless of how many new phishing sites are created each month? Can CyberPrivacy offer a genuine solution regardless of how many phishing emails get inside the inbox?

Here’s the very good news: CyberPrivacy has a genuine solution to the problem of malicious websites. If you’re curious how this seemingly unsolvable problem is reliably overcome continue reading.



IDC Reports