Cybersecurity Investing: The “Let ’Em In” Strategy

Coming Tomorrow: Big announcement by Dr. Weiss and Sean Brodrick on precisely WHEN gold, silver, copper, oil, and three other commodities will bottom and when they will EXPLODE higher. For their 30-minute emergency briefing, be sure to go here at 2:00 PM Eastern Time tomorrow.

It happened again — another giant-sized hack.

Except this time, it’s not a retailer or a credit reporting agency (or a movie studio), as we’ve seen in the last few years.

And the hackers weren’t out to steal credit card numbers, Social Security numbers or unreleased theater films.

Instead, their goal was more like a digital bank heist — $31 million worth of cryptocurrency reportedly stolen from Tether, a company that helps bitcoin traders convert U.S. dollars into crypto assets and vice versa.

The theft points out why cybersecurity is so hard: It’s next to impossible to prevent an attack by a skilled hacker (or a team of them).

Instead, more big companies are employing what I like to call the “Let ’em in” strategy.

You know … from the lyrics of that old (OK, ancient) Paul McCartney & Wings song where he keeps singing: “Open the door, and let ’em in?”

And that’s the point.

In Cybersecurity, Monitor and Mitigate

Cybersecurity attacks are impossible to prevent. As Harvard Business Review put it recently: “If the end game is preventing something bad from happening, companies typically waste time and money on futile attempts to build an impenetrable wall of systems.”

So why not focus on the “Let ’em in” strategy?

“Let ’em in” — where you can monitor and mitigate the threat of hackers.

Don’t think “fortress” — think “modern apartment building” (without a doorman).

It might be easy enough for an intruder on the street to fool a resident into “buzzing” him into the lobby. Once inside, though, he’s tracked on security cameras. He’ll need a coded key to access the elevator. And in order to steal something, he’ll need a way — brute force, trickery or a purloined key — to open the front door of someone’s residence.

It’s not impossible to do — just a lot harder (and probably not worth the thief’s time and risk).

In fact, that’s the business strategy behind a company I recommended in a recent special report issued exclusively to Total Wealth Insider subscribers back in September. The company’s shares are up more than 12% in the past two months and have a lot further to run.

The key point here?

With most of the major hack attacks, the damage isn’t so much the intrusion — it’s the fact that hackers are able to roam about the data networks of companies undetected for long periods of time.

In the case of this year’s massive Equifax breach, published reports say the hackers were able to penetrate the system for more than two months — between mid-May and late July — before their presence was finally detected.

As more cybersecurity companies adopt a “monitor and mitigate” attitude for their products, it should create even more profitable opportunities for investors.

Important: Be sure not to miss tomorrow’s big announcement: At 2:00 PM Eastern Time tomorrow, Martin and Sean will announce precisely when gold, silver, copper, oil, and three other commodities will bottom and WHEN they will explode higher.

They will give you their price targets. And they will give you specific numbers on the windfall profit potential in each market. A few minutes before 2 PM, click here for their 30-minute emergency briefing.

Kind regards,

Jeff L. Yastine
Editor, Total Wealth Insider


Leave a Reply

Your email address will not be published. Required fields are marked *

One comment on “Cybersecurity Investing: The “Let ’Em In” Strategy

  1. B Polus December 6, 2017

    Coinbase could be the next on the list???!!! I was attempted on Nov. 28, 2017 by a “refund scam.” Scammer used my E-Mail address with his password and opened an account with Coinbase before approval and verification was given. Coinbase Fraud Unit was not interested in my heads up warning!!!??? However, charges were debited on Coinbase Account.

    Reply