My Smart Privacy
  • Home
  • News & Events
  • About
  • More
    • Home
    • News & Events
    • About
My Smart Privacy
  • Home
  • News & Events
  • About

Device & End Point Cybersecurity Threats!

The Android OS, Apple iOS, & Microsoft Windows OS Support Intrusive Apps!

   Apps are the biggest threat to connected devices supported by the Android OS, Apple iOS, and Microsoft Windows 8, 10, & 11 OS due to the fact that apps today are intentionally designed to be intrusive, addictive and manipulative posing numerous threats to the end user, plus end user business, employment, and personal information.  


At risk are devices that include:


  • Smartphones
  • Tablet PCs
  • Connected Vehicles
  • IoT/IIoT Devices
  • PCs
  • Connected Products
  • Connected Appliances

Surveillance & Data Mining Apps: "Legal Malware"!

Threat Landscape: Confidential Business & Personal Information!

  Intrusive apps can be classified as "Legal Malware" supported by exploitive terms of use that include:


  • Online Terms & Conditions
  • Online Privacy Policies
  • Online End User Licensing Agreements (EULAs)
  • Hidden (In-device) Application Permissions & Product Warnings


The predatory terms of use can include up to 3,000 pages of complicated legalese enabling the app developer, including those from China and Russia, to lawfully conduct surveillance on the end user data mining over 5,000 highly confidential data points associated with the end user's confidential business and personal information that includes:

  • Text, SMS, Instant, & Social Media Messages
  • Contact Address Book
  • Email & Email Attachments
  • Account Information (Business, Medical, Banking, Social Media, etc.)
  • Calendar Events
  • Location Information
  • Motion Data
  • Biometric Data
  • Photos & Videos
  • Audio/Video Recordings of the End User
  • And The List Goes On....

Business & Government Cybersecurity Threats!

Google, Apple, & Microsoft Distribute Surveillance & Data Mining Apps!

     Governments, corporations, small businesses, and individuals are investing billions of dollars into network cybersecurity while not realizing huge threats posed by intrusive app & platform developers, including those from China and Russia.


This means that Google, Apple, & Microsoft are actively distributing surveillance & data mining technology in the form of intrusive apps.  


Intrusive App Developers Include:


  • Alphabet (Google)
  • Apple
  • Microsoft
  • Amazon
  • JD.Com (Main Investor is Walmart- China)
  • Meta (Facebook)
  • Twitter
  • ByteDance (TikTok- China)
  • Tencent (WeChat-China)
  • Baidu (Android App Developer- China)
  • Prisma Labs (Android App Developer- China)
  • And The List Goes On...

Doing Business With Your Competitors & Adversaries!

The Threat Landscape: Competition, Innovation, Cybersecurity, Privacy, & National Security!

Business executives, board members, and government officials need to realize that many multinational app & platform developers, including those from China and Russia, compete in many industries worldwide posing massive threats to:

 

  • Competition
  • Innovation
  • Cybersecurity
  • Network Security
  • Critical Infrastructure
  • End User Privacy
  • Confidential Personal & Business Information
  • End User Safety
  • Intellectual Property (IP)
  • National Security


Companies, governments, hospitals, legal firms, academic institutions, and medical professionals using intrusive apps are inadvertently exposing highly confidential and protected information, including IP, to existing and future business competitors, including those from adversarial countries such as China & Russia.

 

Confidential and protected information includes information protected/regulated by:

  

  • Employment Agreements
  • Nondisclosure Agreements (NDAs)
  • Business Legal Agreements (MSAs, Proposals, Etc.)
  • Government & Federal Cybersecurity Standards
  • Federal Information Protection Standards (FIPS)
  • Legal Information Protected by Client Attorney Privilege
  • Medical Information Protected by HIPPA & HL7 Data Standards
  • Classified Information

Threats To Networks & Critical Infrastructure!

The Threat Landscape: Networks, IoT/IIoT Devices, & Critical Infrastructure!

  Intrusive apps can even launch attacks on networks such as DDoS and Man-in-the Middle attacks putting networks, assets, critical infrastructure, and people at risk.

Hybrid Warfare: Every Business & Person Is A Target!

The Threat Landscape: Govt./Elected Officials, Board Members, C-Suite Executives, & Employees!

  How Much of Your Business & Personal Information is on Chinese & Russian Servers?


Google, Apple, & Microsoft are distributing Chinese & Russian surveillance and data mining technology in the form of apps and platforms that are preinstalled into:

 

  • Smartphones
  • Tablet PCs
  • Connected Vehicles
  • IoT/IIoT Devices
  • PCs
  • Connected Products
  • Connected Appliances


Billions of connected product users have no idea how many of the apps and platforms that support their devices are developed by Chinese and Russian companies who develop addictive, intrusive, and manipulative apps & platforms such as:


  • TikTok (ByteDance- China)
  • Baidu Apps (Android App Developer/Google Partner-China)
  • Prisma Labs (Android App Developer- Russia)
  • WeChat (Tencent- China) 
  • And The List Goes On...


These intrusive apps and platforms are distributed by Google, Apple, & Microsoft enable companies from China and Russia to monitor, track, and data mining the Android OS, Apple iOS, and Microsoft Windows OS end user for financial gain 24x7/365 days per year whether the end user is an:


  • Adult, Teen, or Child
  • Professional- Doctor, Attorney, Judge, Journalist, etc.
  • Govt./Elected Official
  • Member of the Military or Law Enforcement
  • Business Leader or Business End User
  • And The List Goes On...


How protected is your business, government agency, or organization from hybrid warfare?

Addictive, Manipulative, Exploitive, & Dangerous Apps!

The Threat Landscape: End User Privacy, Safety, & Productivity!

According to former executives & product developers for Google & Facebook*, apps are intentionally designed to be highly addictive and manipulative posing massive safety threats to the end user whether the end users is an adult, teen, child, or business professional.

  

App developers use highly addictive “Brain Hijacking” technology associated with suggestive and manipulative advertising technologies that are designed to make sure that end users spend maximum time on social media platforms so that the app developer can exploit the end user for financial gain as admitted by numerous tech industry professionals and executives*.

   

Due to highly addictive apps designed to provide the end user with a "social validation feedback loop", many business users of connected products are becoming unproductive during work hours while having the urge to constantly check social media feeds costing businesses billions of dollars in lost productivity annually.


*Reference the Netflix documentaries the Great Hack & The Social Dilemma.   

contact rex m. lee for more information!

Rex M. Lee- Cybersecurity & Privacy Advisor/Tech Journalist

Email: RLee@MySmartPrivacy.com

Phone: (210) 639-6035

Take Control of Your Business & Personal Information!

Join The PRIVACY CO-OP & Know Your Digital Rights

 Multinational corporations such as AT&T, Google, Microsoft, Meta (Facebook), Bank of America and MasterCard are exploiting their paying customer/end user's business and personal information for profits at the expense of privacy.


Predatory corporations have been exploiting their customers/end users for profits by banking of the fact that their customers/end users are unaware of the fact that individuals own the rights to their information (business/personal).


Consumers can now stop companies, including multinational corporations, from exploiting their confidential business and personal information for financial gain by enforcing their digital rights which will enable individuals to control how their confidential information is used.


You have the power over your information, now we give you a resource to exercise your digital rights and stop your valuable information from being exploited for financial gain at the expense of your privacy, after all you are the customer not the product.


Your information rights are the great equalizer. Make businesses stop using your information by opting-out of "secondary purposes" until they are forced to license your valuable information for use.


  • You own the rights to your information
  • Businesses desire your direction
  • Until you tell them, bad things can happen
  • Search for any business/agency you use
  • Make them stop in less than 3 minutes
  • Then protect your whole family


As your authorized agent working on your behalf, The Privacy CO-OP will tell them to stop, and then negotiate a license for all of our opt-ins per our Terms and Conditions. 

As a nonprofit co-op, we split all profits as equals. You can stay opted-out of whatever business you like.

Join Privacy CO-OP

Private & Secure OS, Smartphones, & PCs!

Learn How to Secure Apps, Smartphones, Connected Products & PCs

No Surveillance Or Data Mining


Tired of Big Tech Tracking and Data Mining You for Profits at the Expense of your Privacy, Security, and Safety?


Buy smartphones, PCs, and Servers Supported by PureOS that supports private and secure apps. 


Whether you are a technology enthusiast, someone looking to protect the digital life of your family, or an enterprise IT/security department, you can use PureOS freely for any purpose, study and share its source code, and adapt it to your needs.


PureOS is a fully auditable operating system: you don’t have to trust our word that it respects and protects you—it is independently verifiable by security experts and software developers around the world.

Contact My Smart Privacy

Lifecycle Mobility & Security Management!

Learn Best Practices For Mobile Device & Security Mangement

Offload mobility management and end-user support while cutting your wireless costs by 40% without switching carriers. 


Intratem and My Smart Privacy will take on all mobility-related management, security and support to free up your team from the burden of wireless, without costing your company any additional money. 


Through proactive bill management, Intratem will analyze the behaviors of your devices and user from day 1 to day 30 of the billing cycle and right size plans before they close. 


Eliminating overspending and covering any possibilities of overages. All on the same contract with the same carrier, reducing your spend by around 40% with the very first bill.


My Smart Privacy will provide best practices regarding cybersecurity and privacy to help protect the most valuable commodity on the planet, your business and personal information while helping to protect your network, including critical infrastructure, from attacks that are associated with leaky operating systems supported by intrusive apps and social media platforms.


Together, Intratem and My Smart Privacy can give you complete support regarding mobile device management, cybersecurity and privacy while saving you money on your recurring monthly voice and data charges.


 

Look at everything you’ll get:

 

  • Cost reduction 
  • Comprehensive 100% custom reports 
  • Procurement  
  • Device staging and kitting 
  • Real-time provisioning and shipping info 
  • Internal and end-user support 
  • API integration into your existing support platform – no need for another portal
  • Cybersecurity & Privacy Best Practices


 Take the Mobility Self-Assessment to see how you can save money and time by clicking on the button below:


Mobility Self-Assessment

Security Advisory Services!

Learn How to Secure Apps, Smartphones, Connected Products, & PCs

Since 2016, My Smart Privacy has provided security advisory services to the U.S. Government, Major Corporations, Oil & Gas Companies, Healthcare Providers, Cybersecurity Professionals, Defense Contractors, and Lawmakers.


My Smart Privacy can help your company, organization, or government agency implement a top/down security strategy to protect the board, C-Suite, management, front line employees, and supply chain from security threats. 


Nation-state hackers are launching numerous attacks on networks by way of intrusive apps and operating systems that include the Android OS, Apple iOS, and Microsoft Windows.


Smartphones, tablet PCs, connected products and PCs are supported by intrusive apps and addictive social media platforms enabling the developers to monitor, track and data mine end users for financial gain posing threats to highly confidential information that includes:


  • Personal
  • Business
  • Medical
  • Legal
  • Employment
  • Intellectual Property (IP)


Operating systems today are supported by an ad-based business model that supports predatory surveillance and data mining business practices rooted in Surveillance Capitalism posing numerous threats to OS end users, plus the end user's employer.


Additionally, Intrusive app developers, including those from China and Russia, pose massive security, privacy and safety threats to:


  • Businesses & Corporations
  • Healthcare Providers
  • Academic Institutions
  • Government Agencies
  • Journalists & News Organizations
  • Business Leaders & Professionals
  • Attorneys & Legal Professionals
  • Government & Elected Officials


My Smart Privacy can help you protect your confidential information through security and privacy advisory services that include:


  • Executive Briefing- Threat Overview & Landscape
  • Needs Analysis
  • Implementing Best Practices
  • Solutions to Mitigate or Eliminate Threats


My Smart Privacy is here to help protect the most valuable commodity on the planet, your business and personal information.


Contact My Smart Privacy for more information.

Contact My Smart Privacy

Speaking Services!

Hire Rex M. Lee for Speaking Engagements!

Rex M. Lee, Security Advisor/Tech Journalist, is an accomplished public speaker with over 10 years of experience that includes:


  • Keynote Addresses for Trade Shows/Conferences
  • Teaching Sessions for Trade Shows/Conferences
  • Moderator/Panelist for Trade Shows/Conferences
  • Talk Show Appearances
  •  Subject Matter Expert for TV, Radio Programs, & Podcasts
  • Private Sessions for Businesses, Government Agencies, Academic Institutions, Medical Providers/Hospitals, and Other Institutions/Organizations


Contact Rex for More Information!

Contact Rex M. Lee

Copyright © 2024 RML Business Consulting, LLC  - All Rights Reserved.

Powered by

  • Home
  • News & Events
  • About