previous arrow
next arrow
BLAKFX: In Math We Trust – Helix22 End-to-End Post Quantum Encryption
BlakFXCrypto SecurityCurrency MarketCybersecurityHackingNSASecurity AuditUncategorizedWork

Helix22 Could Have Saved Colonial Pipeline $5 Million…and Avoided the Pipeline Disruption

Amid gas shortages in the wake of a ransomware cyberattack that exposed critical infrastructure vulnerabilities in the U.S. come reports that Colonial Pipeline paid hackers a $5 million ransom to unfreeze its computers. Bloomberg first reported the ransom payment.

The FBI has historically discouraged, but not prohibited, American ransomware victims from paying hackers, as a payment isn’t guaranteed to work and can encourage criminals to continue attacking others. In a press conference Monday, Anne Neuberger, the White House’s deputy national security adviser for cyber and emerging technologies, acknowledged that some organizations might find paying the criminals off can be in their best interest.

Crowdstrike survey provides some interesting insights on the impact of ransomware attacks.

  • 71% of organizations fear of nation-state intrusions and ransomware attacks in the wake of COVID-19
  • 56% of organizations report a ransomware attack within the last 12 months
  • 87% of respondents indicated that nation-state attacks are much more common than most people think.
  • 73% say these attacks are the single biggest threat to their organizations.
  • 27% of organizations which fall victim to ransomware attacks opt to pay the ransom
  • The average ransom payout amount is now over $1 million

With Helix22 your firm will never even have to consider paying a ransom

The obvious costs of data breaches beyond ransomware payouts is in terms of fines. Here is a list of some recent fines. In these cases, fines are levied as part of a negligence settlement for a firm failing to adequately protect customer personal identifiable information (PII).

As many of us know, these are just obvious costs of a data breach and usually the last costs to be incurred.

The cost of a data breach not only refers to the monetary value of such an incident, but also the implications regarding loss of respect and credibility as a business. A severe data breach can be hugely detrimental to a company, particularly where stakeholders are concerned.

The Actual Average Cost of a Breach is $3.86 Million

After analyzing data breaches that happened across the world between April 2018 and April 2020, researchers at IBM reported that the average, total cost of a data breach to a business is a phenomenal $3.86 million. They also found that companies in the US had the highest average cost of all countries, at around $8.64 million. To reach these figures, the researchers considered the monetary losses that were incurred in the four areas involved in a data breach:

  • Detection and escalation – this refers to any costs resulting from detecting and reporting a cybersecurity incident, such as auditing and investigation.
  • Notification – this aspect includes the financial cost of having to notify people of the incident, such as time spent making calls or writing letters to customers.
  • Response – this relates to the costs involved with the company’s response to the breach. This could be anything from legal advice to free gifts and discounts for customers.
  • Business losses – when a breach occurs, it will usually cause disruption and even downtime to a business. This area relates to the loss of revenue experienced as a result.

The cost of losing credibility

Even when a business can make it through the financial difficulties that are associated with a data breach, sadly there are still further problems to contend with. When a business suffers from a cybersecurity incident, this can often deter new and existing customers, who feel that their personal information is not in safe hands with your company. For small businesses in particular, this damaged reputation can be extremely hard, or even impossible to recover from.

Rebuilding a business reputation is vital in order to attract new customers, and keep existing clients on the books. After a breach, these stakeholders need to know that the business has taken the incident seriously, and is doing as much as possible to guarantee the protection of sensitive information going forwards.

Damaged stakeholder relationships

As customers lose faith in a business after a data breach, so may other stakeholders – including investors and employees. The cost of these damaged relationships can also be profound, as these individuals, who are imperative to the business’ existence, may seek to part ways.

A data breach can lead to discontentment, or even the departure, of employees – particularly if it was their personal information that was leaked. Such an incident will certainly lead to doubt and anxiety, causing employees to be distrustful of the employer. The publicity of such a data leak is also likely to put off potential new recruits in the future.

Where investors are concerned, many are likely to lose faith in the company simply because a breach has been allowed to happen. This is because a data breach demonstrates that the business is vulnerable, and ill-prepared for cyber-attacks. It is not uncommon for share value to drop following a data breach, though from our anecdotal observation, it does not seem to have a long-term impact. This is likely due to the fact, that cyber breaches are usually considered one time occurrences. Robbers don’t hit the same bank twice right??? Research has shown though, that repeat attacks are becoming much more common.

So, What Can Be Done?

As Colonial Pipeline has found out, the bottom-line is that any breach can have a devasting impact on your operations.

What we understand better than anyone else is the new era of data security is one that requires new solutions. The era of perimeter defenses is over as it is proving impossible to keep hackers from breaching the perimeter and accessing data. Further E2E encryption based on old models of RSA cryptography will be obsolete when quantum computing becomes mainstream.

Helix22 is Designed To Be Quantum Immune – Start Your Integration on our Git

Helix22 delivers perfect security assurance due to our genius engineering team that has invented a new model for data security that required an innovative look at the problem. The approach we took was to protect the data itself. Almost all other data security products try to build a perimeter or being fanatic on user credentials. However, once the product is breached or a password is stolen, even if it is 2FA or encrypted, your firms data is in the clear.

You see, the Helix22 cryptography is embedded with the data itself through our inventive and patented cryptography of DNA BindingTM. Therefore, even if credentials are stolen the data cannot be exfiltrated. This means that all data is 100% protected regardless of the type of attack.

Another substantial advantage of Helix22, is that it protects all data whether at rest, in use or in transit. All communication apps for example, only encrypt data while in transit. Therefore, that encryption become useless for internal IT security or Artificial Intelligence or Machine Learning experimentation. All data generated during these massive computing exercises is equally protected in real time. Plus, the latency period for the Helix22 is exponentially less than any other security product, so it actually contributes to faster processing times.

The Helix22 is easy to install and runs on all platforms, programming languages, networks and devices.

              Our Motto

      “In Math We Trust”

In this protocol, we are truly a “zero-knowledge” server so your private communications and transmissions remain completely top secret. Even in the event that BLAKFX were subpoenaed, we can honor the request by just handing over the encrypted content…as that is literally all we have. Helix22 also only use keys just one-time and then destroys them. This way the data security is future forward prefect. Therefore, in our unique user-to-user encryption (U2U) world, there is no opportunity ever for any data leak.

The Helix22 data security SDK accomplishes the following:

  • Protects all your firms data at rest, in use and in transit
  • Renders ransomware threats obsolete
  • Eliminates human error
  • Eliminates all malicious or interior attacks
  • Verifies original content i.e. minimizes the threat of impersonation attacks and deep fakes
  • Reduces latency
  • Installs with 5 lines of code
  • Runs on any platform, network, device and in any programming language
  • Provides perfect future/forward secrecy
  • Delivers “zero-knowledge” encryption
  • Compatible with all cloud, 3rd party and vendor services
  • Is quantum ready – so there’s no need to upgrade when the time comes
  • Requires no employee training
  • Exceeds all gov’t and banking standards
  • Meets all international compliance regulations

D2D encryption

We can make this claim as the tech engineers at BLAKFX invented and patented a genuine device2device (D2D) encryption. We manage data security transmission through the truly brilliant and also patented universal Helix22 key service. The Helix22 encryption originates on your network or device, not just when the app is opened. This means, that when data arrives to our key server, it is already encrypted so all it needs to do is issue another key. Signal and Telegram cannot claim this level of security. This key will then only work with the intended device, which generates a matching key required to open the data. In this protocol, we are truly a “zero-knowledge” server so your communications and transmissions remain completely top secret. Even in the event that BLAKFX were subpoenaed, we can honor the request by just handing over the encrypted content…as that is literally all we have. Helix22 also only use keys just one-time and then destroys them. This way the data security is future forward prefect. Therefore, in our unique device-to-device encryption (D2D) world, there is no opportunity at all for any data leak.

This same protocol just described, can be the same with all your 3rd party vendors and suppliers. It does not matter in the least what platform they are running or what device they are using or even the type of data, it is all 100% protected. We do however, strongly advise that all firms involved be utilizing Helix22 due to the nature of the data content. Helix22 can ensure that whatever data they are generating is protected as well.

Let’s take it a step further. Even if your organization were a victim of an internal attack or a victim of malicious open source downloads, there is no reason for concern. Any data that has been forwarded, downloaded, copied or saved cannot be exfiltrated. Period.  We have the technology industries foremost data packets which are protected with multi-layered, military grade encryption algorithms that have already proven the ability to withstand penetration testing from MI5 and quantum computing attacks.

One final practical genius of DNA BindingTM is in that it is immediately compatible with whichever system or software you are utilizing. Therefore, any organization can forward information to another and then discuss it and there is immediate privacy.

The BLAKFX Suite of Data Security Products

In addition to the fastest and most secure data protection product available in Helix22, we provide a full range of security products for an holistic approach.

We are on a mission to stop ransomware threats in 2021

Ransomware Auditing as a Service (RaaS): ransomware attacks have skyrocketed in the past year and currently represents the biggest threat to the data of government agencies, military, intelligence agencies as well as private enterprises. BLAKFX developed the first in the world Ransomware Auditing as a Service (RaaS) platform which allows our cyber security engineers to scan your network and simulate real-world ransomware attacks to determine the test the prevention, detection and mitigation strategies of your organization and establish how resilient your network is to real ransomware attacks. After the scan we provide a comprehensive report and our recommendations for remediation.

If you are the victim of an actual ransomware attack, we are able to recover the data that has been hi-jacked during the attack and due to Helix22’s DNA BindingTM cryptography, restore it to its original state.

DARKHYDRA3 – Auditing/Penetration Testing: we provide cyber auditing & penetration testing services in order to identify the gaps in your network, cloud, communications, network appliances, wireless networks, laptops, desktops & mobile devices, website, backup and 3rd party applications and services. Once we scan your systems, we provide a comprehensive report and our recommendations for remediation.

MSS & Insider Threat Prevention: BLAKFX has a national security level Secure Operations Center that can monitor your network (via our Managed Security Service) for threats & vulnerabilities as well as your employees via threat behavioral analysis techniques in order to stop threats (including insider threats) before they become a problem for your network, data and organization.

TSCM: many organizations and government agencies are aware of the threats posed by hacking surveillance and data theft but are not aware that Technical Surveillance Counter Measures and Electronic Security are an essential component of overall risk mitigation. BLAKFX’s access to the most sophisticated equipment, military and intelligence community level RF frequencies monitoring expertise is unique in the world.

Physical Security: we offer overall physical security services and designs for your buildings, data centers, cloud providers, airplanes, vehicles and personnel security. We provide full physical security planning, insider threat detection and prevention, physical security audits, certification, and security awareness training.

Global Governments: (restrictions apply) Click here to request information & quotes

*Katim Ultra Secure Smartphone: part of the BLAKFX’s suite of secure products, we are pleased to offer governments, law enforcement, intelligence agencies, military forces globally and enterprises, a fully user2user encrypted phone, with secure messenger, secure email, secure news, secure audio/video calling & secure conference calling.

Blacklight & CyAn – OSINT: the Collection Platform provides real time comprehensive view of collected intelligence from various sources. The system allows for more effective operation management by allowing the operators to control all available intelligence gathering tools from a single, unified dashboard. By allowing centralized control, alongside presentation of key intelligence and insights the overall operational effectiveness is significantly increased.

The Analytics Platform system fuses all field intelligence meta-data and cyber intelligence content, as well as other data sources, to highlight and identify suspicious activity, important events and analyze suspects’ relationships and communications. The system can provide in-depth operational understanding in near-real-time to the field operations teams.

Pre-Crime, Data Fusion and Big-Data Analysis: a full range of capacity for big data analytics. Analyze billions of events, merge data from heterogeneous sources, reveal weak signals and understand the digital behavior of a target are some of the numerous features of the Analytics Center. It’s composed of modules like Analytics, Profile, Relational and Predictive.

LLDDS: Low Level Defender Drone System consists of three essential elements, the first of which is our Ground Based Sensor Node (GBSN). The GBSN employs a very low power, high sensitivity FMCW radar system, functionally integrated with a complementary video/IR detection and confirmation system. The GBSN is controlled by AI and by either a single on-site operator or via remote operator control over our fully secure Command, Control and Communications (C3) SatComm-based network. The second element in the System is a medium endurance, low-level, missile-armed defender drone. This critical airborne asset will provide: persistent or on-demand zone protection including airborne patrol, target identification, target confirmation, and attack. This unmanned, very capable platform is the attack and deterrent end of the LLDD defense chain. It is continuously and closely monitored and controlled by AI and a Controller/Operator – in real-time – via the LLDD C3 SatComm Network. Our highly automated and minimally manned concept employs proven off-the-shelf, ground-based and airborne sensors and platforms combined with proprietary BLAKFX technology.

Note: Items marked with * are available for enterprises as well


BLAKFX is Based on Success

Our founders, Robert Statica PhD and Kara Coppa, also founded Wickr, which is used by the US military and has never been hacked since its inception in 2012. The Helix22 data security SDK is several generations enhanced since then. Dr. Statica also delivered the encryption for the world’s most secure phone, Katim.


Founder – Robert Statica PhD            Founder – Kara Coppa                   Founder – Alex Maslov MS, MBA                    



Co-Founders of Wickr                    KatimTM Ultra Secure Smartphone


Finally, the Helix22 encryption is quantum computing ready so no need to redo all your data security methodologies in a couple of years when everything else becomes obsolete.

We like to refer to Helix22 as “22nd Century Data Security.”

The wrold's foremost B2B and B2G data security product.

Helix22 – Zero Risk