cyber security

15 May SnoopWall Consumer Advisory: Stopping WannaCry – the Global RansomWorm Malware Epidemic

WannaCry – first of its kind “RansomWorm” to traverse the Globe must be stopped according to SnoopWall

SnoopWall, Inc., the global leader in breach prevention, today is announcing this consumer advisory not only as a warning about what may be the worst piece of ransomware traversing the globe and locking up computers in most major countries but how to stop it.

According to SnoopWall, Inc.’s CEO and as disclosed on their website, today, the United Kingdom’s National Health Service, www.NHS.uk was hit with a massive ransomware attack that demands $300 in bitcoins for each system it infects – in the NHS this could total $500,000 USD in ransomware demands so far, due to malware propagation across more than one thousand Windows computers.

“WannaCry opens the door for similar exploits on other operating systems such as SmartPhones and all Internet of Things (IoT) devices. Because these devices are sold with vulnerabilities and backdoors, expect worm-like ransomware outbreaks to spread to them next.”

GARY S. MILIEFSKY, CEO OF SNOOPWALL, INC.

According to the FBI.gov, the WannaCry attack has since spread across the globe to more than 74 countries and hitting additional targets such as the Russian Interior Ministry and US-based FedEx.

According to Gary S. Miliefsky, The Shadow Brokers leaked a bunch of NSA hacking tools onto the Internet. One of these tools is called EternalBlue, which, according to experts, is a perfect exploit for creating a Windows worm – software that attacks a Microsoft windows vulnerability and then installs on the next vulnerable windows system as it traverses the Internet.  WannaCry is the first piece of ransomware ever to propagate using this kind of worm technology.

According to Gary S. Miliefsky, the CEO of SnoopWall, Inc., a cybersecurity expert,  “this is a watershed moment in cyber crime history, when automated exploitation of vulnerabilities in an operating system are using a worm to spread ransomware.  This is the first, not the last, ransomworm.”

As shown on a map from another independent security researcher, MalwareTech, a large number of U.S. organizations have been hit.  Source:  https://intel.malwaretech.com/botnet/wcrypt According to the researcher, so far, at least 1,600 have been infected with WannaCry in America, compared to 11,200 in Russia and 6,500 in China as it continues to spread.

Miliefsky continued, “WannaCry opens the door for similar exploits on other operating systems such as SmartPhones and all Internet of Things (IoT) devices.  Because these devices are sold with vulnerabilities and backdoors, expect worm-like ransomware outbreaks to spread to them next.”

INSTRUCTIONS TO CONSUMERS, BUSINESSES AND GOVERNMENT AGENCIES

If you have not yet been exploited, move quickly to close the hole: WannaCry leverages a hole, Microsoft fixed 2 months ago. If you have not installed Windows Security Update MS17-010, please take the time to install the proper patch for your version of Windows and do it quickly: https://technet.microsoft.com/en-us/library/security/ms17-010.aspx

Any computing device that connects to the internet should be frequently hardened.  The latest patches should be installed.  Contact manufacturers of your ‘smart’ equipment and demand security by design and frequent security patches to avoid this kind of risk.

RANSOMWARE AVOIDANCE 101 SUGGESTIONS:

While WannaCry spreads by exploiting vulnerabilities, most ransomware has spread through SpearPhishing attacks.  SnoopWall has provided a simple training video to avoid these kinds of attaches.  Training link:https://www.youtube.com/watch?v=TiBlXZWotxY

Simply put, don’t’ click links and don’t download attachments.  Make sure you can trust the source before you do so.  Do daily backups and test them when you can.  If you know how to use encryption, it’s best to encrypt important information before it gets hacked or stolen.

About Gary Miliefsky
Gary is the CEO of SnoopWall, Inc. and a co-inventor of the company’s innovative breach prevention technologies. He is a cyber-security expert and a frequently invited guest on national and international media, commenting on mobile privacy, cyber security, cyber crime and cyber terrorism, also covered in both Forbes and Fortune Magazines. He has been extremely active in the INFOSEC arena, he is an active member of Phi Beta Cyber Society (http://cybersecurityventures.com/phi-beta-cyber/), an organization dedicated to helping high school students become cyber security professionals and ethical hackers. He founded and remains the Executive Producer of Cyber Defense Magazine. Miliefsky is a Founding Member of the US Department of Homeland Security (http://www.DHS.gov), the National Information Security Group (http://www.NAISG.org) and the OVAL advisory board of MITRE responsible for the CVE Program (http://CVE.mitre.org). He also assisted the National Infrastructure Advisory Council (NIAC), which operates within the U.S. Department of Homeland Security, in their development of The National Strategy to Secure Cyberspace, as well as the Center for the Study of Counter-Terrorism and Cyber Crime at Norwich University. Previously, Gary has been founder and/or inventor for technologies and corporations sold and licensed to Hexis Cyber, Intel/McAfee, IBM, Computer Associates and BlackBox Corporation. Gary is a member of ISC2.org and is a CISSP®. Learn more about him at http://www.snoopwall.com/media and http://www.garymiliefsky.com/

About SnoopWall
SnoopWall is the world’s first breach prevention security company delivering a suite of network, mobile and app security products as well as cloud-based services protecting all computing devices from prying eyes and new threats through patented counterveillance cloaking technology. SnoopWall secures mission critical and highly valuable confidential information behind firewalls with our award-winning patented NetSHIELD appliances and with WinSHIELD on windows and MobileSHIELD on Google Android and Apple iOS mobile devices with next generation technology that detects and blocks all remote control, eavesdropping and spying, based on the patented AppSHIELD SDK. SnoopWall’s software products and hardware appliances are all proudly made in the U.S.A.  Visit us at http://www.snoopwall.com and follow us on Twitter: @SnoopWallSecure.

Media Contact:
Brittany Thomas
News & Experts
Tel: 727-443-7115 Ext: 221
brittany@newsandexperts.com

Source: SnoopWall, Inc.

Read More

19 Mar Exclusive: DOJ probes allegations that Tiversa lied to FTC about data breaches

Things are finally starting to break through. This is the tip of the iceberg. Stay tuned.

Originally posted Thursday March 17th on Reuters

Federal agents are investigating whether cyber-security firm Tiversa gave the government falsified information about data breaches at companies that declined to purchase its data protection services, according to three people with direct knowledge of the inquiry.

The Federal Bureau of Investigation raided Tiversa’s Pittsburgh headquarters in early March and seized documents, the people said.

The Justice Department’s criminal investigation of Tiversa began after Richard Wallace, a former Tiversa employee, alleged in a 2015 Federal Trade Commission hearing that the cybersecurity firm gave the agency doctored evidence purporting to prove corporate data breaches, the people said.

Wallace testified that Tiversa falsified information to make it appear that sensitive data was being accessed by users across the country.
(more…)

Read More

26 Dec Steptoe Cyberlaw Podcast, Episode #94: An Interview with Mike Daugherty

The STEPTOE CYBERLAW PODCAST talked about in last week’s post is now live and a great listen!

Reblogged from Lawfare

With Wyndham’s surrender to the FTC after a brutal court of appeals opinion, the last outpost of resistance to the FTC’s cybersecurity agenda is Mike Daugherty, CEO of LabMD.  Daugherty refused to take the easy road and enter into a consent decree with the FTC to settle its claim that the company’s security was insufficient because of a file-sharing program installed on the corporate network.  That decision has cost Daugherty his company.  LabMD has ceased operations.  And it took him on an extraordinary odyssey through Washington that he has described in his book, The Devil Inside the Beltway, and in several speeches.  I caught up with Mike at the Black Hat Executive Summit where we were both speakers, and he kindly agreed to a short interview describing some of that odyssey.

Read More

16 Nov International Borders Mean Nothing When it Comes to Computer Hackers

Security_Breach_lg-300x168

Data breaches have become so commonplace that we almost expect them.

Credit cards are compromised when retail stores are hacked. Social Security numbers are at risk when government agencies or physician’s offices fall prey to phishing expeditions.

And those are just the perils the average American faces with domestic hackers. It’s just as easy for people from far-flung countries – some of whom may be working on the behest of their governments – to infiltrate our computer systems and disrupt our way of life.

“The Internet is taking down the borders around countries all over the world,” says Michael Daugherty, a cybersecurity expert and author of the book “The Devil Inside the Beltway: The Shocking Expose of the U.S. Government’s Surveillance and Overreach into Cybersecurity, Medicine and Small Business” (www.michaeljdaugherty.com).

This year, the federal Office of Personnel Management was hacked, putting the data of more than 22 million Americans at risk. That hack reportedly originated in China. In another case, four people were arrested this summer in Israel and Florida in connection with fraud schemes related to a 2014 hack of JPMorgan Chase & Co.

Meanwhile, The Wall Street Journal just recently reported that 29 countries have formal military or intelligence units dedicated to offensive hacking efforts.

“It’s scary what the possibilities are, because this isn’t quite the same as securing our borders against a military attack,” Daugherty says. “Not every country has a powerful military, but it’s so much easier to wage a cyber war.”

He suggests several reasons why this can be a concern for everyone.

• All individuals are at risk. Maybe no one in North Korea or Pakistan is targeting you personally, but that doesn’t keep you from being affected. “The downside of technology is that it pools everything together, and if someone breaks into it, there’s just a whole lot there to take,” Daugherty says. “Your information is there. My information is there. Everyone else’s information is there. That’s the problem from an individual American’s standpoint.”

Advances happen too quickly. The development of technology has moved so fast that government and laws have struggled to keep up. “We are still in a very early stage of an explosive new era of technology, almost like medicine was 150 years ago,” Daugherty says. “So we’re going to have governments behind. Everyone is behind. While on my recent speaking and book tour in Australia, I was saying there that it’s all the more reason why we have to help each other, co-educate and collaborate.”

Cyber attacks don’t need to be sophisticated. A hacker can use the email address of an employee of a federal agency to send emails with a malicious link to other employees. Those employees, thinking the email comes from someone they know and trust, open the email and the link, allowing the breach to occur. “This all boils down to knowledge and training,” Daugherty says. “You are only as strong as your weakest employee.”

About Michael J. Daugherty

Michael J Daugherty is Founder, President & CEO of LabMD, a cancer detection laboratory based in Atlanta, Georgia, as well as the author of the book “The Devil Inside the Beltway, The Shocking Expose of the US Government’s Surveillance and Overreach into Cybersecurity, Medicine and Small Business.” The book details Daugherty’s battle with the Federal Trade Commission over its investigation into LabMD’s data security practices. It is an insider’s look at how agencies exploit the Administrative Procedure Act to grab for power by exploiting the small and weak to control the big and powerful.

Because of his work, Daugherty has testified before the House of Representatives House Oversight Committee and regularly keynotes in front of healthcare, law, business and technology audience educating them on what to expect when the Federal Government investigates you. He spoke at the Gartner Security Summit in Washington, D.C., in June and in August also spoke at a Black Hat USA security gathering in Las Vegas. He holds a BA in Economics from University of Michigan-Ann Arbor, regularly blogs at www.michaeljdaugherty.com and sits on the board of Snoopwall, a privacy company based in Nashua, N.H. He is also a pilot and resides in Atlanta, Ga. He can be followed on Twitter at @DaughertyMJ.

Reblogged from IT Briefcase

 

Read More

21 Sep The Game Begins. Episode 2: The Devil Inside the Beltway

Screen Shot 2015-09-21 at 6.51.57 AM

 

Welcome back for Episode 2: The Game Begins


The phone rings out of the blue. It’s a company out of Pennsylvania that says they found one file with 9,000 of our patients billing information in it.
Episode Two of an eight part saga based on the book by Michael J. Daugherty, The Devil Inside the Beltway – The Shocking Exposé of the US Government’s Surveillance and Overreach into Cybersecurity, Medicine and Small Business.

Read More

18 Aug Cybersecurity Expert Michael Daugherty To Speak At Gartner Summit In Australia

 

Screen Shot 2015-08-18 at 1.57.16 PM

 

ATLANTA, Ga. – Michael Daugherty, a cybersecurity expert and author of the book “The Devil in Inside the Beltway” (www.michaeljdaugherty.com), will be a case-study speaker at the Gartner Security & Risk Management Summit in Sydney, Australia.

The summit, scheduled Aug. 24-25, is Daugherty’s first stop on a speaking tour of Australia.

Daugherty’s speech at the Gartner summit is titled “A Matter of Style – How America’s FTC’s Tricks, Tactics and Agenda Impact World Cybersecurity.”

The Gartner summit is designed to equip security and risk managers with the skills, knowledge, strategies and tactics that enable cost-effective security and risk management programs.

Daugherty, speaking on day two of the summit, will discuss the story told in his book of his experience with the Federal Trade Commission. That experience began in 2008 after his company, LabMD, received a call from Tiversa, a technology security firm. Tiversa claimed that LabMD patient-billing information was vulnerable and offered its services, for a fee, to fix the problem, Daugherty says.

He viewed the call as a shakedown and declined. Tiversa turned over its information to the FTC, which launched an investigation. In August 2013, the FTC filed a formal complaint, alleging that LabMD failed to reasonably protect the security of consumers’ personal data, including medical information.

Daugherty scored a significant victory May 5 when a former Tiversa employee testified in the FTC case that Tiversa did not find LabMD patient information on Internet sites, but instead hacked into LabMD’s computer system.

Daugherty recently spoke on cybersecurity and healthcare at a Black Hat USA security gathering in Las Vegas and at the annual DefCon hacking conference.

For more details and an events summary, click here.

Read More

30 Jun Cybersecurity Firm Tiversa Accused of Extortion

mafia-620x420

Reblogged from Hacked – written by Neil Sandesai – to view the original post, click HERE

Large corporations and government organizations are often targets for hackers, and as a result, rely on cybersecurity firms to provide security guidance. However, in an ironic twist, one cybersecurity firm may have actually hacked its own clients. Tiversa is a Pittsburgh-based security consultancy, and according to an ex-employee, Tiversa stages data breaches to extort clients.  

Tiversa’s Mafia-Style Tactics

According to Richard Wallace, the whistleblower accusing Tiversa of fraud, Tiversa engages in mafia-style shakedowns to pressure potential clients. Wallace gave his testimony in a federal court in May, and according to a transcript obtained by CNNMoney, Tiversa’s strategy can be summed up as, “Hire us or face the music.”

Wallace describes how Tiversa ruined at least one company – LabMD, a small Georgia-based cancer testing laboratory. While working as an investigator at Tiversa, Wallace hacked LabMD’s servers and obtained a file containing patient data. His then-boss, Tiversa CEO Robert Boback, asked Wallace to make it look as if the breach had originated from IP addresses associated with known identity thieves. Tiversa then approached LabMD, informing the company that it had been hacked, and offered “incident response” services. However, LabMD refused to pay up, and Tiversa threatened to notify the Federal Trade Commission of the (staged) data breach. Soon afterwards, Tiversa carried out the threat, and the FTC ended up taking LabMD to court. LabMD ultimately had to let go of its staff as the long legal battle bankrupted the company. According to Michael Daugherty, CEO of the now-dead cancer lab,

We were a small company…It’s not like we had millions of dollars to fight this and tons of employees.

There was reputation assassination. There was intimidation. We thought we were extorted. My staff and management team was demoralized. My VP left. My lawyer left.

Furthermore, the LabMD incident isn’t the only example of Tiversa making up a hack, says Wallace. Tiversa also made up information pointing to Iran for allegedly stealing blueprints for Marine One, President Obama’s helicopter. If Wallace’s story is true, LabMD and other companies may have been destroyed by fraudulent “evidence.”

Tiversa has firmly denied Wallace’s allegations, dismissing them as “baseless” claims from a disgruntled former employee. Tiversa’s CEO told CNNMoney,

This is an overblown case of a terminated employee seeking revenge…Tiversa has received multiple awards from law enforcement for our continued efforts to help support them in cyber activities.

However, if the allegations against Tiversa are true, they will be very embarrassing for the company and its highly-decorated board members, including Wesley K. Clark, former NATO Supreme Allied Commander in Europe, and Howard Schmidt, former cyber-security coordinator for the Obama administration.

Read More

06 May Analyst Backs LabMD In FTC Row, Alleges Fraud At Tiversa

image

Originally posted on Law 360

By Jimmy Hoover

Screen shot 2014-08-22 at 5.55.03 AM

Law360, Washington (May 05, 2015, 9:16 PM ET) — LabMD Inc. on Tuesday scored a major hit in its data security fight with the Federal Trade Commission after a former analyst at the cybersecurity firm Tiversa Inc. testified that his company lied to the agency about the extent of LabMD’s data leaks after the medical testing firm turned down its services.

Richard E. Wallace said in a hearing that during his time as one of the company’s chief forensic analysts from 2007 to 2014, he helped Tiversa and CEO Robert J. Boback spin lies to the FTC about the “proliferation” of LabMD-held insurance records among identity thieves — which LabMD claims is the sole basis for the agency’s 2013 administrative complaint against it for alleged data protection failures.

Wallace said that, rather than a proliferation, he merely downloaded a file off of LabMD’s own server and manufactured those claims per Boback’s orders, who he said wanted to steer LabMD into using Tiversa’s monitoring and remedial services.

According to Wallace, Boback became infuriated that LabMD’s president and CEO, Michael J. Daugherty, rejected their services.

“[Boback] basically said F-him, make sure he’s at the top of the list,” Wallace said at the hearing, describing the Tiversa CEO’s reaction to LabMD’s refusal of services.

Atlanta-based LabMD conducts laboratory tests on samples that physicians obtain from patients and also performs medical testing for consumers around the country.

Tuesday’s proceedings before Administrative Law Judge D. Michael Chappell had stalled for several months after Wallace revealed that Tiversa had emerged as the subject of an investigation from the House Committee on Oversight and Government Reform and that he was pursuing immunity for his testimony in the FTC proceedings — immunity he finally received.

Wallace said that he left the company in February 2014 after Boback had pressured him to lie under oath in a planned deposition from LabMD’s attorneys about the extent of LabMD’s data leaks.

According to LabMD’s attorney Reed Rubinstein of Dinsmore & Shohl LLP, the testimony marked a “remarkable day” in the case and vindicated the company’s assertion that “the FTC action was based on manufactured evidence.” At the close of the hearing Tuesday, Rubenstein announced that LabMD will seek a criminal investigation against the Tiversa.

“Obviously the FTC never checked what came in from Tiversa,” Rubinstein said in an interview with Law360.

Under direct examination from William A. Sherman II of Dinsmore & Shohl, Wallace outlined a pattern of fraud and deception at his former company and said it was “common practice” at Tiversa to deceive companies into believing identity thieves had stolen their files off of peer-to-peer networks in an effort to charge for remedial services.

Wallace said Tiversa carried out the scheme by inserting the IP addresses of known identity thieves into a “data store” and making it appear to the companies that the identity thieves had pilfered their files, despite the fact that they had already been shut down by law enforcement. Because their computers were down, Wallace said, “there was no way to contradict what Tiversa was saying.”

During a re-direct examination Tuesday from his own attorney, Mary Beth Buchanan of Bryan Cave LLP, Wallace also recounted an episode in which Boback allegedly forced him to conjure up a report claiming that trade secrets related to the avionics found in the cockpit of Marine One, the helicopter for presidential transport, had been stolen by Iranian nationals — a fake story later plastered in headlines across major news outlets including, CBS News, NBC News and Fox News.

“It was very big press for Tiversa. And believe it or not, it was not easy to find an active Iranian IP address that law enforcement couldn’t get a hold of,” Wallace said.

The FTC declined an opportunity to depose as well as cross-examine Wallace on Tuesday, though FTC attorney Laura Riposo VanDruff indicated that she may file a motion to introduce a rebuttal witness within the next week.

Counsel for Tiversa and Boback could not be immediately reached Tuesday for comment.

LabMD is represented by William A. Sherman II, Reed Rubinstein and Sunni Harris of Dinsmore & Shohl LLP and Hallee Morgan, Kent Huntington, Daniel Epstein, Patrick Massari and Prashant K. Khetan of Cause of Action.

The FTC is represented by Alain Sheer, Laura Riposo VanDruff, Megan Cox, Ryan Mehm, John Krebs and Jarad Brown.

The case is In the Matter of LabMD Inc., docket number 9357, before the Federal Trade Commission Office of the Administrative Law Judges.

–Editing by Emily Kokoll.

To download your own copy of this article, click here

Read More

17 Oct Cyber-Sleuth or Cyber-Thief? LabMD Case Continues to Expose the Good, the Bad, and the Downright Ugly in Cyber-Security Developments

Screen Shot 2014-10-17 at 9.10.21 AM
header

LabMD and Michael Daughterty made the HIPAA, HITECH & HIT this week!

Elizabeth Litten, esq., of the firm Fox Rothschild, writes in her article dated Oct 15th, about the recent news regarding the FTC vs LabMD case. Read below about allegations that the LabMD file was never anywhere but the LabMD computer until Tiversa took it…and wasn’t after they took it either.

 

LabMD, Inc. CEO Michael J. Daugherty continues to doggedly defend LabMD against an action brought by the Federal Trade Commission (FTC) against LabMD based on Section 5 of the FTC Act.  He now has an opportunity to prove himself the “good guy” following last week’s decision by Chief Administrative Law Judge D. Michael Chappell granting LabMD’s motion that Chappell formally request an order from the U.S. Attorney General to compel testimony from, and provide immunity to, a key witness expected to expose the dirty investigative tactics and tainted facts relied upon by the government in bringing the action against LabMD.  The key witness is a former employee of Tiversa Holding Company, Inc. (“Tiversa”), the company that dredged up a patient data file, leading the FTC to claim LabMD had “unreasonable data security practices” that were “likely to result in unauthorized exposure of data” in violation of Section 5.   So who’s the “bad guy” here?

The witness is expected to testify that, contrary to allegations that form the bedrock of the FTC’s action, Tiversa did not find LabMD’s patient data file on four separate internet addresses as the result of a LabMD employee’s unauthorized download of a peer-to-peer (“P2P”) music-sharing app on a company computer.  Rather, using what Tiversa has referred to as its high-powered, patent-pending search engine technology, Tiversa found the patient data file only on a LabMD computer.

 

To quote the last sentence of the article:

“…this case is ugly and certainly does not create a high level of confidence in the cyber-security investigation and enforcement tactics utilized by the FTC.”

To read more of the article, click  HERE

Read More
The FTC is Suing me...

27 Apr The FTC is Suing Me…..Rerun

Now that I am about one month away from our trial in front of the FTC’s court, I thought it would be a good idea to rerun this blog post. I will be bringing everyone up to date later this week on what has been going on lately. Government Overreach and draining victims dry is not the most effective way to protect consumers. As a matter of fact, it wastes resources and drives healthcare providers away from trusting the government. But nothing ever stopped a lawyer in need of job security and an employee of the month award. Fasten your seatbelts.

This post was originally posted HERE

 

The cat has finally come flying out of the bag. In 2008, someone (and we know exactly who it is) took our file without authorization. We believe it has always been secure and still is. Why do we believe this? Because the people who took it were subsidized by U.S. government agencies.

Since January 2010, the FTC has been sniffing around, wondering if our practices are up to snuff. Notice I say practices and not standards. The Feds have not pointed out any standards! Also, we are quite up to snuff, thanks very much. It’s hard to break a law when there isn’t one. Unfortunately, my MindReader3000 broke just hours before they showed up. Don’t you hate that?

Judging by the FTC’s practices, they seem to have opened their playbook to the page on digging in and driving a good citizen nuts. As houseguests, they are rude, silent, and terrible. Run the other way if you see them in your neighborhood. They hover like a dinner guest who stays for months—the epitome of rude and selfish. Did I mention they are also poor conversationalists? Aside from asking for another helping of whatever they want, the FTC doesn’t say much, but it’s not a pretty picture if you don’t have the steak cooked exactly to their liking. Apparently nothing we’ve served has been to their liking, yet we are positive that we did what they asked.

Are they trying to drive us so nuts that we’ll finally do and say anything necessary to make them leave? They don’t even really have a reason to stick around aside from “just doing their jobs.” Since this administration showed up, it seems like all the government agencies have been “just doing their jobs” in this manner. It’s almost like being cyber-waterboarded.

We’ll never give in! Self-appointed savior of the world or not, the FTC is a rude houseguest, and we won’t make up a lie about our cooking just to get them out. That would be giving them exactly what they want. Why validate such vile behavior from these occupiers?

So, what exactly does one do when big brother is hovering, knocking, poking, not playing nice, and won’t go home? Speaking for myself, I shine a light on how “he” conducts himself and scream from the rooftop to alert the neighbors. Of course, I still mind my manners–go along hoping the growling dog won’t attack or bite. I’ll throw them all the treats they want! We’ve always conducted business in an honest, sincere manner, so there’s nothing to hide. Despite our efforts to get the FTC to laugh and wag its tail, nothing seems to work. Sigh….

This is a LONG story so I am writing a book titled “The Devil Inside the Beltway.” I don’t want to write a book; I HAVE to write a book. There is way too much juicy stuff to cram into a sound bite or two-minute video. A book is a LOT of work. I started in April. Now that the cat is out, I have to finish ASAP, so I am flying to London next week to get it done. Then the editors dig in — developmental, copy, line, and all sorts of prep work prior to launch.

Soooooo…welcome to my website!

As the story unfolds, I will bring to you my experience of just “how they do it;” how our property (a data file with patient information) was taken, how it was presented to the U.S. Congress, how it ended up in the Congressional record without our knowledge or permission, how we were extorted, questioned, investigated, and manipulated. I will tell you how they don’t like it one bit if they have to break a sweat.

Yeah. The bad houseguest sued me last week, so my author page had to turn into a landing page. Spread the word. Turn on the lights. Ask me questions as I unfold the scary and true story of how one fluke after another, combined with an agency of the self-righteous, brought me to this place.

 

I want to tell you so you know. I want to tell you so it won’t happen to you. I want to tell you so, if it does happen to you, you will know what to do. Trust me, when this happens, dialing 911 or 1-800-LAWYER will not summon Superman. However, we are doing well. Our customers support us 100%. We are going to make it, and I look forward to sharing our story with you.

You won’t have to choose to believe me; most of this is in writing.

Until we meet again,

Mike

 

Michael Daugherty is President & CEO of LabMD, an Atlanta-based clinical and anatomic medical laboratory with a national client base. Mike founded LabMD in 1996 after 14 years in surgical device sales with U.S. Surgical Corp. and Mentor Corporation.

Outside of LabMD, enjoys playing tennis, travel, and flying his Cirrus SR22 Turbo single engine aircraft.

Mike can be found:

FacebookTwitter * LinkedIn * Pinterest

Google+ Michael J Daugherty

Read More