Fri, September 11, 2009
Thu, September 10, 2009
Wed, September 9, 2009
Tue, September 8, 2009
Mon, September 7, 2009
Sat, September 5, 2009
Fri, September 4, 2009
Thu, September 3, 2009
Wed, September 2, 2009
Tue, September 1, 2009
Mon, August 31, 2009
Fri, August 28, 2009
Thu, August 27, 2009
Wed, August 26, 2009
Tue, August 25, 2009
Mon, August 24, 2009

LIGATT Security International, Inc.: LIGATT Security International Tells Jay-Z and the Rest of the Entertainment Industry "


  Copy link into your clipboard //business-finance.news-articles.net/content/200 .. the-rest-of-the-entertainment-industry-quot.html
  Print publication without navigation Published in Business and Finance on by Market Wire
          🞛 This publication is a summary or evaluation of another publication

ATLANTA, GA--(Marketwire - September 2, 2009) - On Monday, August 31st, several tracks on Jay-Z's upcoming album, "The Blueprint 3," were allegedly leaked from Timbaland's computer by a hacker. Jay-Z originally planned to make his album available via the MTV website and Rhapsody, a digital music service, before its official release on September 11.

For years LIGATT Security International (PINKSHEETS: [ LGTT ]) CEO, Gregory Evans, has been saying that hackers break into music studios daily. "A hacker will sit outside a music studio, connect to the wireless network and load tracks onto their computer because there is no real security to prevent files from being taken through their network. The next day the music tracks are on the internet and the hacker has made more money off leaked tracks than the artist accrues from album sales. The sad part is that most hackers don't leak tracks for financial gain, but more so to exasperate the artist and dilute album sales. Artists who are beefing with other artist will hire a hacker to steal and release albums early just to misconstrue album sales," says Evans.

Music artists have high-tech, state-of-the-art equipment in their studios that require a large amount of security in order to get within the premises of the building, but, what about the security inside the building? Music artists create tracks in a studio and save the files on a computer which is connected to a network; the studio's network is connected to the internet. Most computer systems come with a basic firewall protection, which is standard on all machines. Artists believe the standard firewall will protect them from a hacker breaking in, but it won't.

In a recent issue of Rolling Out magazine, Evans stated, "Music artists spend way too much money on physical security, and not enough on cyber security. Artists have security guards and alarm systems, but they do not have a sufficient firewall in place to protect their networks; that is how hackers are able to get onto their computers and steal music. It was the result of the artist not having a good security system in place to protect themselves from such vulnerabilities."

According to Jay-Z there is the possibility that Timbaland or someone in his camp's email was hacked. Jay-Z said he is used to his music being leaked, as this occurred with all of his albums. Although Jay has learned to look at his albums leaking as a good thing, most artists despise their music being leaked prior to the album release date.

For more information on safeguarding music studio networks, visit [ www.ligattsecurity.net ]. For additional information on LIGATT Security International CEO, Gregory Evans, visit [ www.gregorydevans.com ].

Safe Harbor Act: This release includes forward-looking statements made pursuant to the safe harbor provisions of the Private Securities Litigation Reform Act of 1995 that involves risks and uncertainties including, but not limited to, the impact of competitive products, the ability to meet customer demand, the ability to manage growth, acquisitions of technology, equipment, or human resources, the effect of economic business conditions, and the ability to attract and retain skilled personnel. The Company is not obligated to revise or update any forward-looking statements in order to reflect events or circumstances that may arise after the date of this release.


Publication Contributing Sources

Similar Business and Finance Publications