Episode Transcript
WEBVTT
1
00:00:02.240 --> 00:00:05.320
Alright, alright, it's that time
of the day, time of the month.
2
00:00:05.400 --> 00:00:07.919
Yadi Hadda. He had a rich
casting over here in the Global Podcast
3
00:00:07.960 --> 00:00:11.679
studios in Atlanta, and joining me
as always on this episode is the man
4
00:00:11.679 --> 00:00:17.160
of the our, Mr Dwayne Hart. Today's topic, We're always regarding cybersecurity
5
00:00:17.199 --> 00:00:21.600
as online scam starting vetans, veterans, and active duty members. We've talked
6
00:00:21.640 --> 00:00:27.559
about cybersecurity of the military and government
agencies and a lot of other sandboxes,
7
00:00:27.839 --> 00:00:31.120
but this one's kind of unique.
Why do you think this one stands out?
8
00:00:32.039 --> 00:00:35.399
Guys? I'm a twenty of view
have veter or another United States Navy
9
00:00:35.479 --> 00:00:41.439
myself, and when I go back
and think about my twenty years that I've
10
00:00:41.439 --> 00:00:47.240
served in the military, and you
know, outside of cyber crime, right,
11
00:00:47.439 --> 00:00:51.200
thinking about some of the other crime
that has happened to military veterans.
12
00:00:51.280 --> 00:00:56.159
Even so military veterans that goes to
purchase of car and you know, in
13
00:00:56.240 --> 00:01:00.439
a fifth percent interest rate on that
car, right, So so it deer.
14
00:01:00.159 --> 00:01:03.400
It is hard to me because I
was a veteran, and I will
15
00:01:03.519 --> 00:01:10.439
say that partially of the reason that
it served so important to me is that
16
00:01:10.519 --> 00:01:15.799
I know that there probably certain groups
of veterans now that will probably be in
17
00:01:15.879 --> 00:01:19.200
scam as we speak. Yeah,
we talked about before we went on the
18
00:01:19.239 --> 00:01:25.439
air about um obviously cybersecurity, online
scams and so forth. But well,
19
00:01:25.480 --> 00:01:30.359
I think what's unique about this is
we talked about like the military, all
20
00:01:30.400 --> 00:01:32.959
branches of the military, I have
some version of boot camp, right,
21
00:01:33.319 --> 00:01:36.640
but it's more like in the real
world, you know, uh, not
22
00:01:36.719 --> 00:01:40.040
so much online. Right. Uh. So you talked about there is a
23
00:01:40.079 --> 00:01:47.040
cyber uh warfare as well component and
obviously there's branches or segments of the military
24
00:01:47.040 --> 00:01:52.480
that specializes in online, but it's
really dealing with you know, another agency
25
00:01:52.560 --> 00:01:57.239
or government agency or another um uh, somebody else attacking the platform you know,
26
00:01:57.319 --> 00:02:00.959
housed and responsible for you know,
their job at their role in the
27
00:02:01.120 --> 00:02:05.480
as the military. Right. But
like you said, once they leave that
28
00:02:05.560 --> 00:02:10.439
military base, um, they have
that personal life. And we're the newest
29
00:02:10.479 --> 00:02:15.360
I don't know if it's how new
it is, but the cyber criminals are
30
00:02:15.400 --> 00:02:21.120
increasingly targeting then because if if a
active military for example, gets an email
31
00:02:21.400 --> 00:02:25.360
that appears from some government agency,
they're gonna for the most part figure it's
32
00:02:25.439 --> 00:02:30.719
legit and there's some urgency to it, and they're used to responding to a
33
00:02:30.759 --> 00:02:36.479
lot of military communication. So it's
not uncommon and so they fall into the
34
00:02:36.560 --> 00:02:39.639
FTC right now says there's two hundred
and sixty seven million in total losses among
35
00:02:39.680 --> 00:02:44.280
the military community, um, just
in a single year. Well, you
36
00:02:44.319 --> 00:02:46.479
know what, let's just let's just
take this way action in here for a
37
00:02:46.479 --> 00:02:51.639
minute, because I want to dive
into the mindset of a military person.
38
00:02:51.759 --> 00:02:55.960
Okay, military personnail taught to be
responsible. Okay, if you have a
39
00:02:57.039 --> 00:03:00.919
bill that you need to pay,
you don't want your commanding officer to get
40
00:03:00.960 --> 00:03:09.039
that right. So so because military
personnel or talked to maintain their responsibility,
41
00:03:09.080 --> 00:03:15.599
they may be more apt and quick
to respond and say I go take care
42
00:03:15.639 --> 00:03:19.360
of it, because in the email
it could say that if you don't pay
43
00:03:19.360 --> 00:03:23.240
this in three days, then I'm
gonna call your commanding officer, and you
44
00:03:23.280 --> 00:03:27.439
don't want that to happen. So
you know, between the process, I
45
00:03:27.439 --> 00:03:31.919
think military valance still kind of have
to uh be wise about the way that
46
00:03:32.000 --> 00:03:38.960
they approach sober security because most military
people are talked about combat webfare and trying
47
00:03:38.960 --> 00:03:44.879
to protect the ship or to or
to protect a squadron or to or to
48
00:03:44.960 --> 00:03:49.960
protect their units. Now now,
when it comes to cyber welfare, it's
49
00:03:49.960 --> 00:03:55.960
about trying to protect your individual personal
life or to protect the military cybersecurity efforts.
50
00:03:58.000 --> 00:04:02.240
So so I think that when I
look at a military person and knowing
51
00:04:02.319 --> 00:04:08.080
that your entire life isn't closed into
the government and you're safe and you're taken
52
00:04:08.120 --> 00:04:12.400
care of and it's only a small
fraction of your life, have to really
53
00:04:12.479 --> 00:04:16.040
deal with the personal side. And
that's when you leave a military base,
54
00:04:16.079 --> 00:04:23.439
all right. So part of that
is to have that transitional mindset. And
55
00:04:23.480 --> 00:04:28.000
they said, Okay, I'm not
I'm not working on the military base.
56
00:04:28.120 --> 00:04:30.399
Yeah, you're not in that bubble
anymore. Right. Once you leave the
57
00:04:30.399 --> 00:04:34.519
bubble, right now, what happens
is I'm at Walmart. Yeah, this
58
00:04:34.600 --> 00:04:40.160
is this is not a ship,
not yet. I'm sure Walmart will be
59
00:04:40.600 --> 00:04:45.720
housed on some aircraft soon, coming
soon. But yeah, So that's the
60
00:04:45.800 --> 00:04:51.560
type of mindset that has to be
deployed, right, Yeah, like keep
61
00:04:51.600 --> 00:04:56.480
the military hackers hat on, right, Which when you're in in uniform and
62
00:04:56.480 --> 00:05:00.199
you're on that base and you're active
military, I think you're um your antenna
63
00:05:00.279 --> 00:05:02.720
and your alert is so much higher, right, and when you leave,
64
00:05:03.360 --> 00:05:06.759
um, you're thinking you're still kind
of covered into that umbrella, but but
65
00:05:06.879 --> 00:05:10.720
not in fact, not true at
all. A matter of fact, we
66
00:05:10.720 --> 00:05:15.000
were talking about an article beforehand about
UM typically a red flag is something you
67
00:05:15.000 --> 00:05:18.279
have to do immediately, and that's
how the UM the cyber criminals are now
68
00:05:18.360 --> 00:05:23.879
approaching these active military of getting that
and saying, in essence, click on
69
00:05:23.920 --> 00:05:27.360
this link or something bad's gonna happen
to you. But in reality, you
70
00:05:27.399 --> 00:05:30.199
know, banks and credit unions will
never reach out to you, right.
71
00:05:30.439 --> 00:05:32.879
Government agencies are not going to reach
out making a demand. They say that
72
00:05:33.000 --> 00:05:36.519
being the lookout for example of anyone
claiming to be from the v A or
73
00:05:36.519 --> 00:05:42.240
other government agencies. UM, they're
never gonna threaten you or or pressure you
74
00:05:42.519 --> 00:05:46.600
to send information or money. Right. Um, you brought up something that
75
00:05:46.759 --> 00:05:53.319
was very important, you know,
talking about the Veterans Administration and looking at
76
00:05:53.360 --> 00:05:58.279
the amount of veterans they have to
go there, and and you know,
77
00:05:58.560 --> 00:06:01.360
just think about the cyber criminals is
trying to grab information from its veterans and
78
00:06:01.680 --> 00:06:06.079
send them a vogus website and you
need to put your information in here for
79
00:06:06.160 --> 00:06:11.199
your next appointment at the eight Well
I'm just citing an example. Now,
80
00:06:11.199 --> 00:06:15.560
I don't know if that ever happened. Okay, but but it's something to
81
00:06:15.439 --> 00:06:19.040
think about. All right. Now, if you're a military veteran, and
82
00:06:19.040 --> 00:06:26.360
if you're sitting there listening now,
um, you're probably saying to yourself,
83
00:06:26.439 --> 00:06:30.240
wow, okay, well I didn't
know that. And see, this is
84
00:06:30.279 --> 00:06:34.240
the purpose of these podcasts is to
go put information out because you know,
85
00:06:34.360 --> 00:06:38.920
there are people that spend their whole
entire life in the military for twenty years
86
00:06:39.000 --> 00:06:44.279
and and and you imagine a scam
that comes through and you know it's kind
87
00:06:44.319 --> 00:06:48.720
of um takes their retirement check or
their via disability paycheck away. Right.
88
00:06:48.800 --> 00:06:57.240
That's that's that is not great position
to be in. But I can say
89
00:06:57.319 --> 00:07:01.360
for sure is that as a military
veteran, I know for a fact that
90
00:07:01.399 --> 00:07:05.079
when I was in uniform, there
were people trying to give me all kind
91
00:07:05.120 --> 00:07:10.879
of things for free. But you
know they wasn't free. Okay, discounts
92
00:07:10.879 --> 00:07:15.240
on cars and apartments and and there
are legitimate businesses that, um that want
93
00:07:15.240 --> 00:07:19.040
to honor their service and the military
duty would write and there's very legit.
94
00:07:19.160 --> 00:07:24.639
But um, not that any cyber
criminal is a good criminal. But this
95
00:07:24.720 --> 00:07:28.959
has got to be the lowest rung
of the ladder. The most disgusting amongst
96
00:07:29.240 --> 00:07:32.800
in addition to like praying on senior
citizens, right because rather than honoring the
97
00:07:32.839 --> 00:07:38.040
sacrifices them made by the active duty
members you know and veterans and their families,
98
00:07:38.120 --> 00:07:43.759
cyber criminals are increasingly targeting them.
I mean that's just beyond imagination,
99
00:07:43.920 --> 00:07:47.519
right, Like, well we think
about this is what will you know?
100
00:07:47.560 --> 00:07:53.399
The bigger question is what would it
draws the attention to military better? Right?
101
00:07:53.439 --> 00:07:58.560
Okay? What what what is this
soul unique about them being being a
102
00:07:58.639 --> 00:08:01.519
honeypot? Is I'm a all that
right, right? Okay? And and
103
00:08:01.600 --> 00:08:07.879
I have to say that because one
factor is that the way that the monetary
104
00:08:07.920 --> 00:08:13.199
system works for military people, right, because they have a guarantee paychecks.
105
00:08:13.480 --> 00:08:15.839
If so, if you find a
way to scam them, then you can
106
00:08:15.879 --> 00:08:20.560
pretty much just you know, get
them caught up into spending money every month
107
00:08:20.639 --> 00:08:24.439
because see the obligated to do it
because maybe they signed a piece of documentation.
108
00:08:24.519 --> 00:08:26.759
Maybe it's an online scam or something
like that. Right, But at
109
00:08:26.800 --> 00:08:31.919
the end of the day, um, it is. It is bad,
110
00:08:33.200 --> 00:08:37.240
especially if you have a military personnel
that is deployed and you know they get
111
00:08:37.240 --> 00:08:39.519
an email. You know, they
can be on a ship, or they
112
00:08:39.519 --> 00:08:43.840
can be deployed with a unit somewhere
in South America, maybe on our training
113
00:08:43.919 --> 00:08:48.200
exercise, and you get an email
talking about well, you know, like
114
00:08:48.240 --> 00:08:52.080
we didn't receive your car payment,
and someone sends you picture your car and
115
00:08:52.120 --> 00:08:56.320
say, okay, well we're gonna
take your cars, you know, you
116
00:08:56.320 --> 00:09:00.919
know, send us you know,
expeedily a thousand. Obviously this account,
117
00:09:00.919 --> 00:09:07.799
well you know what, UM,
that could be hard fun, especially if
118
00:09:07.879 --> 00:09:13.519
someone really really doesn't understand the financial
system. But I will say for sure,
119
00:09:13.960 --> 00:09:18.600
if the military does a great job
of educating people on the financial system
120
00:09:18.320 --> 00:09:24.200
and trying to protect themselves away from
crime. Okay, but you know the
121
00:09:24.320 --> 00:09:31.440
cyber criminals, UM steel likes to
find those soft targets. Well, and
122
00:09:31.480 --> 00:09:35.600
you mentioned about act of military when
they're UM deployed, you know, around
123
00:09:35.639 --> 00:09:39.080
the world. But the other side
of that piece of the puzzle is there's
124
00:09:39.120 --> 00:09:46.600
probably UM activity targeting targeting the family
members, spouses, its home. And
125
00:09:46.639 --> 00:09:52.120
if if your spouse is serving overseas
and UM it's difficult to reach them,
126
00:09:52.200 --> 00:09:56.039
that's open. That's a floodgate,
you know, a door opening for the
127
00:09:56.960 --> 00:10:01.279
cyber criminals, because then they could
potentially contact phone or email what have you
128
00:10:01.399 --> 00:10:07.960
the spouse and say you know your
spouse needs some form some paperwork filled out
129
00:10:07.039 --> 00:10:11.960
right, Um, and obviously you're
gonna want to take action if it looks
130
00:10:11.960 --> 00:10:15.320
like from an agency. So the
general correctly if you're wrong. But the
131
00:10:15.360 --> 00:10:18.720
general rule of thumb here applies to
you know, civilians or you know employees,
132
00:10:18.960 --> 00:10:24.039
you know kids, families, elderly
obviously including the military we're talking about
133
00:10:24.039 --> 00:10:26.440
today. The rule of thumb is
if you got if you get contacted from
134
00:10:26.600 --> 00:10:31.600
your bank, credit union, and
agency, a government, what have you,
135
00:10:31.639 --> 00:10:35.639
it could be legit nine times that
of tend they're not going to contact
136
00:10:35.679 --> 00:10:39.360
you with this on some urgency and
and threats whatever. Right, but even
137
00:10:39.360 --> 00:10:43.320
if it's non threatening, it just
seems like pretty straightforward. The rule of
138
00:10:43.320 --> 00:10:48.080
thumb is always, uh, remove
yourself from that email, in that link
139
00:10:48.120 --> 00:10:52.120
or that phone call and contact that
agency the I R S for example,
140
00:10:52.240 --> 00:10:56.559
or whoever it is, the v
A office, contact them directly and talk
141
00:10:56.639 --> 00:11:01.639
to someone so you're proactively and confirm. And uh, I mean I remember
142
00:11:01.679 --> 00:11:05.200
I lived in California and occasionally I
get letters from some business activity had in
143
00:11:05.240 --> 00:11:09.279
California, and I wouldn't respond to
that letter that came in the mail,
144
00:11:09.320 --> 00:11:11.960
I would, And you don't call
the phone number that's in the letter,
145
00:11:13.120 --> 00:11:16.279
right, you actually go online and
find the agency in that town of that
146
00:11:16.320 --> 00:11:18.840
city and contact them, yes or
no? I mean, isn't that that
147
00:11:20.399 --> 00:11:22.639
uh rule of thumb? Well,
that's the rule of thumb. And I
148
00:11:22.679 --> 00:11:28.759
can tell you for sure is this
is that is that we also have to
149
00:11:28.799 --> 00:11:33.279
look at the fact is that military
spouses are probably at home and to care
150
00:11:33.360 --> 00:11:39.759
the family, and then that spouses
deployed and um, you know there is
151
00:11:39.879 --> 00:11:46.720
email and there is communication, but
still the probability of cybercrime occur into that
152
00:11:46.840 --> 00:11:52.039
spouse there. Now. I also
would say that that's why a lot of
153
00:11:52.080 --> 00:11:58.679
military personnel stay very close to military
um installations and try to take advantage of
154
00:11:58.720 --> 00:12:03.000
opportunities such as as if you have
a naval like a nave exchange, or
155
00:12:03.120 --> 00:12:07.120
you have an a force exchange,
or if you have a commerce survey located
156
00:12:07.120 --> 00:12:11.200
on basis. Yeah, there's a
community there. Yes, yes, so
157
00:12:11.279 --> 00:12:15.480
you're not you know, you're not
dealing with any of the cyber crime.
158
00:12:15.559 --> 00:12:18.000
And also to most of the vendors
that come on a military base and operate,
159
00:12:18.399 --> 00:12:22.919
well you're vet it first, Okay, So So I'm just here to
160
00:12:24.039 --> 00:12:31.159
say that part of the cybercrime community
is not so much in the interests of
161
00:12:31.240 --> 00:12:35.600
military personnel and veterans. I think
that as a military person and as a
162
00:12:35.679 --> 00:12:39.879
veteran, you just have to be
wise about what you do, because at
163
00:12:39.919 --> 00:12:43.720
the end of the day, a
cybercriminal is a cyber criminal. Okay,
164
00:12:43.799 --> 00:12:48.279
they're They're not They're not there for
the love of your life. They don't
165
00:12:48.279 --> 00:12:54.120
have any of your interests at heart. UM. Another top of two more
166
00:12:54.600 --> 00:12:58.840
topics I would i'd like to cover
is about you know, freezing the credit
167
00:12:58.840 --> 00:13:03.440
card are setting up alerts and an
email passwords. In this UM article there
168
00:13:03.559 --> 00:13:07.480
is another tip about email passwords that
we hadn't discussed in the past. But
169
00:13:07.919 --> 00:13:11.279
first of all, talking about you
know, their credit cards and so forth,
170
00:13:11.360 --> 00:13:16.440
right and loans. UM, they
were talking about suggesting potentially, you
171
00:13:16.440 --> 00:13:20.080
know, using the ability short term
if you're on a short term assignment,
172
00:13:20.320 --> 00:13:26.320
even just a two week training session, rather than doing a permanent freeze,
173
00:13:26.399 --> 00:13:31.120
you can contact your credit union or
credit card companies and acts asked for an
174
00:13:31.120 --> 00:13:37.759
active duty alert. Right. So
I will say this for sure, UM.
175
00:13:37.960 --> 00:13:43.000
There are some institutions such as UM, Navy, Federal Credit Union,
176
00:13:43.000 --> 00:13:48.039
which is really good at senning alerts. If you are located in Norfolk,
177
00:13:48.159 --> 00:13:54.000
Virginia, and if you have a
credit card and somebody, um did a
178
00:13:54.080 --> 00:14:01.240
transaction over and Los Angeles, California. Right. Uh. Most other times
179
00:14:01.960 --> 00:14:07.279
they will send you an email if
it's back to back transaction, especially if
180
00:14:07.320 --> 00:14:11.399
you located in Norful, right and
you just spent fifty dollars and then what
181
00:14:13.600 --> 00:14:20.080
right you know it has five being
spent out in Los Angeles, California.
182
00:14:20.320 --> 00:14:22.919
Um, you will probably get a
text message from Navy for the Union,
183
00:14:24.399 --> 00:14:26.919
which is which is good. Yeah, And if you use that type of
184
00:14:26.960 --> 00:14:33.720
military institution, they're hard wired for
these types of alerts whatever. Right.
185
00:14:33.159 --> 00:14:37.919
Uh. They know that if you're
active, you're likely be traveled the station
186
00:14:37.960 --> 00:14:39.960
of different places, and your spouses
may be using the same credit card in
187
00:14:39.960 --> 00:14:46.320
their city. A lot of uh
contingency built into that. The other thing
188
00:14:46.320 --> 00:14:50.000
that was interesting is talking about email
and passwords. Um, this should be
189
00:14:50.039 --> 00:14:52.960
like, uh, an obvious thing, but when I read it, it
190
00:14:54.039 --> 00:14:58.679
was interesting saying the email accounts,
the email account that you use on social
191
00:14:58.720 --> 00:15:01.720
media should never be the same the
tied to your bank accounts. And I
192
00:15:01.759 --> 00:15:07.200
know someone that's potentially guilty of that, right because the so actually we were
193
00:15:07.240 --> 00:15:13.480
talking today on a on another meeting
about hacking on social media and apparently it's
194
00:15:13.480 --> 00:15:18.000
a lot easier than most people would
think. Um And once they have that
195
00:15:18.759 --> 00:15:24.080
uh email and UM and password,
they can basically just do a search through
196
00:15:24.120 --> 00:15:28.080
your bank accounts and if it lines
up, you have what we call a
197
00:15:28.120 --> 00:15:31.159
Scooby Doo moment, right bro.
Yeah, but you know what, this
198
00:15:31.360 --> 00:15:37.200
goes back to one of the previous
podcasts that I have, and it was
199
00:15:37.279 --> 00:15:43.279
called Individual Protection Standards, and looking
back at that podcast and how how I
200
00:15:43.360 --> 00:15:50.039
brought into attention about when you're using
social media, you've got to make sure
201
00:15:50.120 --> 00:15:54.120
that you use grown passwords. You
know, you can't use a four a
202
00:15:54.159 --> 00:15:58.120
full character password. You know.
Last week I posted some information on my
203
00:15:58.240 --> 00:16:03.200
chief of cybersey you the Facebook page
which shows you that that if you have
204
00:16:03.360 --> 00:16:07.919
a four charactor password, it only
really takes about two minutes to crack it.
205
00:16:08.200 --> 00:16:12.679
Okay, if you have a sixteen
character password to take about three years.
206
00:16:12.879 --> 00:16:18.240
Yeah, that was that was a
surprising stat I've actually repeated that a
207
00:16:18.320 --> 00:16:22.320
number of people since we had that
conversation of um, you know that that
208
00:16:22.440 --> 00:16:27.240
finite number three to six characters.
It can take up like three seconds for
209
00:16:27.279 --> 00:16:30.840
them to hack you go to sixteen
characters, which sounds annoying as a consumer
210
00:16:30.919 --> 00:16:36.399
or the person. But once you
store and save that and uh yeah,
211
00:16:36.440 --> 00:16:38.799
somewhere like three thousand years or something
insane, right, so they're probably not
212
00:16:38.919 --> 00:16:41.799
given. It's like you talk a
lot about, like, uh, the
213
00:16:41.840 --> 00:16:45.159
analogies to your front door. If
you have the depth bowl dead bolt on
214
00:16:45.200 --> 00:16:48.960
it, and you have the light
let outside and you have the security sign
215
00:16:49.039 --> 00:16:53.639
on your window or in the front
yard, Um, it's gonna cause that
216
00:16:53.639 --> 00:16:57.960
that uh you know, attacker that
in that case a robbery to pause,
217
00:16:59.440 --> 00:17:02.639
and if they go next door next
door, there's no light on, there's
218
00:17:02.679 --> 00:17:06.599
no security thing out there. You
know, they're gonna go for the path
219
00:17:06.640 --> 00:17:10.160
at least resistance. Well, what
it's called is right, it's called a
220
00:17:10.279 --> 00:17:17.240
soft targets. Okay. What we
have in the cybersecurity industry is that that
221
00:17:17.359 --> 00:17:22.200
we have these attack vectors. Okay, you know when you think of and
222
00:17:22.200 --> 00:17:26.480
and attack vector, it is an
entrance to a network. Okay, Hackers
223
00:17:26.559 --> 00:17:33.440
like different types of attack factors.
Maybe it may be a user are maybe
224
00:17:33.480 --> 00:17:37.279
it maybe a computer, maybe be
a flaw and a vulnerability, right,
225
00:17:37.000 --> 00:17:41.640
and they can serve as an attack
vector. But you know, the idea
226
00:17:41.839 --> 00:17:45.400
is not to become a soft target, okay, because a soft target is
227
00:17:45.559 --> 00:17:52.279
like unprotected and very vulnerable. So
if you're a military veteran, you don't
228
00:17:52.279 --> 00:17:56.599
want to become a soft target because
you know, the analogy I like to
229
00:17:56.640 --> 00:18:02.119
put in place, it's that all
military and better have been through a training
230
00:18:02.160 --> 00:18:07.039
based on combat warfare. Okay.
So in the nature of combat warfare,
231
00:18:07.160 --> 00:18:12.480
you are taught about risk, right
that you know, before you engage the
232
00:18:12.559 --> 00:18:17.559
enemy, you need to have an
understanding of the type of risk that you
233
00:18:17.640 --> 00:18:21.319
face, because you know, you
want to look at the vulnerable, vulnerabilities
234
00:18:21.359 --> 00:18:26.039
and threats you gotta face. So
so if you take that concept of combat
235
00:18:26.039 --> 00:18:30.559
warfare, and if you apply that
to your personal life, okay, and
236
00:18:30.640 --> 00:18:36.720
say that before I engage Walmart,
right, So you're not going to be
237
00:18:36.720 --> 00:18:41.599
a sponsored the show anytimes, Okay, I need to have an understanding of
238
00:18:42.240 --> 00:18:45.200
how I need to protect myself before
I go in there and use my credit
239
00:18:45.240 --> 00:18:51.480
card, right, right, and
um, you know to give give information
240
00:18:51.480 --> 00:18:57.920
out right. So so because we're
so accustomed to just using our social security
241
00:18:59.000 --> 00:19:03.440
numbers, so much when we around
our military installations, but when you leave
242
00:19:03.519 --> 00:19:07.240
out that front gate, or you
leave your ship, or you leave your
243
00:19:07.240 --> 00:19:14.839
squadront, you know, you really
have to think that that the same um
244
00:19:15.039 --> 00:19:18.920
people that you deal with on the
military base are not the same people that
245
00:19:18.480 --> 00:19:25.119
that you're dealing with when you go
to um one of the public stories or
246
00:19:25.119 --> 00:19:29.240
grocery store there, because they don't
have interests and you, I would say
247
00:19:29.240 --> 00:19:33.880
some, let's just say some,
some do not care the same interests as
248
00:19:33.920 --> 00:19:37.759
your military um comrades. And uh, well they may, but it's not
249
00:19:37.880 --> 00:19:42.759
just as high a priority. But
yeah, yeah, yeah some so,
250
00:19:42.759 --> 00:19:47.920
so I'd like to use the words
some because you know, it's not everybody
251
00:19:47.960 --> 00:19:52.640
that is a cyber criminal. Yeah
right, exactly. UM. But speaking
252
00:19:52.680 --> 00:19:56.000
of some stats I should have shared
earlier on this topic of military vets.
253
00:19:56.039 --> 00:20:00.880
Before I share that, I just
want to remind our listeners you're listening UM
254
00:20:00.880 --> 00:20:04.599
too Rich casting over here alongside Dwayne
hart Um in our global podcast studios here
255
00:20:04.640 --> 00:20:07.640
in Atlanta. We're talking all things
cybersecurity. In this case, this episode
256
00:20:07.720 --> 00:20:14.039
dedicated just to online scams targeting veterans
and active military duties and to learn more
257
00:20:14.039 --> 00:20:17.359
about our guests Um, it's very
simple. Um. He's got all the
258
00:20:17.400 --> 00:20:19.559
social media handles. He's got his
YouTube channel, he's got now his Facebook,
259
00:20:19.599 --> 00:20:22.400
he's got his podcast, he's got
a book. But instead of giving
260
00:20:22.400 --> 00:20:25.920
out all that, all you have
to do is do what Just go to
261
00:20:26.000 --> 00:20:29.839
Dwayne Hart dot com. Right there, you're gonna find links to his podcast
262
00:20:30.400 --> 00:20:33.200
which we record here in the studio
on a regular basis. Um is your
263
00:20:33.279 --> 00:20:37.200
new YouTube. You can find a
link on there as well as social media,
264
00:20:37.240 --> 00:20:40.480
and I'm sure there's a contact form
you can reach out and uh reach
265
00:20:40.599 --> 00:20:45.160
Mr Hart and with any questions are
follow up. Um. So with that
266
00:20:45.240 --> 00:20:49.119
being sent again, Dwayne Heart dot
com for everything we're talking about today and
267
00:20:49.200 --> 00:20:56.519
more. But stats are interesting.
Um seven it says seven and ten staggering
268
00:20:56.599 --> 00:21:00.680
stat Seven in ten military or military
vets and ative duty service members have been
269
00:21:00.680 --> 00:21:07.799
a victim of a at least one
digital crime according to recent Paul that's staggering
270
00:21:08.000 --> 00:21:12.799
seven out of ten. Yeah,
that's you know, if I don't think
271
00:21:12.839 --> 00:21:18.119
the average civilian would would align with
that. So so I like to take
272
00:21:18.160 --> 00:21:25.720
that number and I look at that
based on some of the smaller UM units
273
00:21:25.720 --> 00:21:30.720
in the military. Okay, and
knowing you've got four people, right,
274
00:21:30.319 --> 00:21:36.799
and there was about two hundred and
eighty people that are victim of some type
275
00:21:36.799 --> 00:21:41.920
of cyber crime. That's that is
an alarment number. Um, you know
276
00:21:41.960 --> 00:21:45.240
what. But but but it can
be fixed. Okay, So so it's
277
00:21:45.240 --> 00:21:51.400
not like, um, you know, it has to beat up forever because
278
00:21:52.279 --> 00:21:56.599
because we're smart enough to beat the
hackers to the finish line. Okay.
279
00:21:56.400 --> 00:22:00.400
So if you're a military veteran,
go out there and put on your hack
280
00:22:00.440 --> 00:22:06.720
his hat, think about combat warfare, and beat them to the finish line.
281
00:22:07.440 --> 00:22:12.039
And two of those tips on this
line would be for example, um,
282
00:22:12.359 --> 00:22:17.400
there's there's a number of services that
uh, for example, encrypted email
283
00:22:17.400 --> 00:22:23.960
platform like proton mail. Um,
because sometimes I get a business communication from
284
00:22:25.000 --> 00:22:29.119
somebody we're working with and there it
has their email address. But at proton
285
00:22:29.240 --> 00:22:33.880
mail, and it's different than your
gmails or your Yahoo's or a O l
286
00:22:33.920 --> 00:22:37.920
s would are right where Um,
you really can't respond directly to the people
287
00:22:37.960 --> 00:22:41.200
there. There's a buffer, there's
a barrier between you know, the two,
288
00:22:41.559 --> 00:22:45.079
which is a little bit again kind
of an annoyance. But um,
289
00:22:45.119 --> 00:22:48.799
but they really don't have access to
like your Gmail and they really can't track
290
00:22:48.839 --> 00:22:51.960
and you have to, like when
you respond to them, they have to
291
00:22:52.079 --> 00:22:55.880
verify that you're the person they're communicating
with. It's a it's an interesting level
292
00:22:55.960 --> 00:23:00.440
of another layer of security. Another
thing I was learning before we went on
293
00:23:00.480 --> 00:23:03.960
the air, and actually I did
it well, um a little bit earlier
294
00:23:03.000 --> 00:23:07.319
today is uh, and I've used
Google Voice. Like we're talking about phones,
295
00:23:07.359 --> 00:23:12.680
because there's a whole another level of
scam happening on your mobile device right
296
00:23:12.720 --> 00:23:15.559
now. We've been talking about email
and letters and phone calls, right,
297
00:23:17.000 --> 00:23:19.680
but there's text messaging and so forth
on your mobile device. And I've been
298
00:23:19.799 --> 00:23:22.240
using a Google Voice for a long
time. So pretty much, if you
299
00:23:22.279 --> 00:23:26.519
have a Gmail account, which is
free, you can claim a phone number
300
00:23:26.680 --> 00:23:32.200
that's not related to your your actual
mobile phone at all, right, and
301
00:23:32.279 --> 00:23:34.279
you can kind of screen all those
whenever you give out your phon number.
302
00:23:34.279 --> 00:23:38.559
Because a lot of websites and even
purchases you make online or offline, it
303
00:23:38.680 --> 00:23:41.759
requires you can't go to the next
step without a phone number because they want
304
00:23:41.759 --> 00:23:45.359
to send you text alerts and which
is sometimes helpful to get the reminders when
305
00:23:45.400 --> 00:23:48.279
the service person is going to show
up at your house whatever. Right when
306
00:23:48.279 --> 00:23:52.359
you're shipping is as arriving or when
you register for an event, you have
307
00:23:52.440 --> 00:23:56.279
to put in a and they won't
accept Like you know, most people don't
308
00:23:56.319 --> 00:23:59.759
have a landline. It has to
be identified as a mobile phone number.
309
00:24:00.359 --> 00:24:03.880
I never give out my personal phone
number online. I use my Google phone
310
00:24:03.920 --> 00:24:07.559
number. But there's another service I
wasn't aware of and just registered for today
311
00:24:07.599 --> 00:24:12.480
as a result of you educating me
on this is called text now um and
312
00:24:12.519 --> 00:24:18.960
again they'll they'll issue a local phone
number based on your town, but it
313
00:24:18.039 --> 00:24:22.519
only rings to that number and you
can screen all those uh and I get
314
00:24:22.559 --> 00:24:26.359
a lot of robo calls and scams
into that and it never comes to my
315
00:24:26.440 --> 00:24:33.640
personal Another way to prevent these UMTA
cyber criminals attacking your personal information. Yeah,
316
00:24:33.799 --> 00:24:37.359
yeah, there's there's all type of
pro texting standards that you can put
317
00:24:37.359 --> 00:24:44.119
in place. Um, you know, speaking of see speaking of One of
318
00:24:44.160 --> 00:24:48.559
the things is that I always like
to look at the type of defense strategy.
319
00:24:48.440 --> 00:24:52.960
Speaking of defense, but that's wanted
live scream. You know I just
320
00:24:52.000 --> 00:24:59.359
completed, which is talking about being
a human firewall. Okay, and see
321
00:24:59.359 --> 00:25:03.799
that's part of that defensive mindset and
to know that that you have to be
322
00:25:03.880 --> 00:25:07.480
that protective shield and part of that
protective shield is to make sure that you
323
00:25:07.799 --> 00:25:12.119
follow best practices such as password protection, make sure you don't share your sub
324
00:25:12.160 --> 00:25:17.319
security number. If it seems like
something that is wrong, you know,
325
00:25:17.440 --> 00:25:22.319
you raise your cyber senses and do
not act upon it. Because it may
326
00:25:22.359 --> 00:25:25.039
sound like a really good deal,
okay, but at the end of the
327
00:25:25.160 --> 00:25:30.599
day, you know, once you
commit to that deal or to whatever type
328
00:25:30.640 --> 00:25:36.200
of offering there, you are probably
stuck in a contract. And it's been
329
00:25:36.200 --> 00:25:40.759
plenty of military personnel that gets,
you know, caught up in different contracts
330
00:25:40.839 --> 00:25:45.519
and they obligated to stay in those
contracts because of the contract language that is
331
00:25:45.559 --> 00:25:52.279
written. So so you really have
to think about cybercrime because cybercrime can be
332
00:25:52.759 --> 00:25:56.160
bad for the military as well,
because what if the cyber criminals are trying
333
00:25:56.200 --> 00:26:02.640
to gain top seecret information from a
military right all right, See, you
334
00:26:02.680 --> 00:26:07.160
can go through social media and it
could feed everywhere. Yeah, you hit
335
00:26:07.240 --> 00:26:10.920
on something new that just donna mean
you talked about early in the show,
336
00:26:11.000 --> 00:26:15.680
like you're commanding officer and so forth. So I think this is one of
337
00:26:15.680 --> 00:26:18.720
the unique things. Not discussing this
article we've been referencing, but it just
338
00:26:18.759 --> 00:26:25.559
came to uh, top of my
head is that when you're trained to um
339
00:26:26.519 --> 00:26:30.000
uh fall in line right with your
chain of command. Right, and when
340
00:26:30.000 --> 00:26:37.559
you get a command or from your
superior officers, you know, you're just
341
00:26:37.680 --> 00:26:40.920
wired, hard wired to do that, right, you don't really ask questions,
342
00:26:41.000 --> 00:26:44.799
right and um. And so this
could be another case of a cyber
343
00:26:44.799 --> 00:26:51.160
criminal saying that email of the communication
is coming from your commanding officer, and
344
00:26:51.440 --> 00:26:56.000
you're trained not to say no or
ignore that or right. That's another layer.
345
00:26:56.079 --> 00:27:00.319
Right. Well, well, I
think the most defensive way of looking
346
00:27:00.359 --> 00:27:03.880
at this kind of self is that
your command also probably would never send you
347
00:27:03.920 --> 00:27:11.279
an email to Gmail, okay,
hotmails. It's usually a military domain such
348
00:27:11.319 --> 00:27:15.039
as Navy dot MEO, at Force
dotvail or whatever. You're a military email
349
00:27:15.079 --> 00:27:19.079
address. But even when you get
that and it's asking you out of the
350
00:27:19.240 --> 00:27:22.680
out of the ordinary request, you
know, for something financial or what have
351
00:27:22.799 --> 00:27:26.160
you, Uh, it just behooves
you to say, let me blink,
352
00:27:26.640 --> 00:27:30.039
let me just call Tom or Ted
or Susan or whoever it is, right
353
00:27:30.400 --> 00:27:33.960
and say did you request this?
Like no, I have no idea what
354
00:27:33.960 --> 00:27:37.400
you're talking about, right or yes? And then you obviously you know if
355
00:27:37.400 --> 00:27:41.200
you get the confirmation from the person, not a bot or a digital you
356
00:27:41.240 --> 00:27:44.960
know, demand or command. What
I got something to say. I was
357
00:27:45.000 --> 00:27:48.880
in a nave for twenty years and
uh and sometimes you know the U.
358
00:27:48.000 --> 00:27:52.799
S. Navy sailors, right,
those invisions do not and do not like
359
00:27:52.880 --> 00:27:56.440
to spend money. So I'm pretty
sure if they own the ship, they're
360
00:27:56.480 --> 00:28:00.279
gonna go a route to the commanding
officer state room and not on the door,
361
00:28:00.440 --> 00:28:03.880
right Yeah, yeah, sir,
I have a question to ask you,
362
00:28:03.160 --> 00:28:10.519
right that five transfer you wanted me
to transfer to Ohio the city of
363
00:28:10.640 --> 00:28:14.279
Stay I've never been to. Yes, Um, okay to last times because
364
00:28:14.319 --> 00:28:18.119
we're almost running out of time here, so um, I'm gonna mention,
365
00:28:18.160 --> 00:28:22.720
um, you know another scam that
they're very aggressive about fraud, uh,
366
00:28:22.759 --> 00:28:26.200
increasing on Zell for example. But
I want you to maybe wrap up unless
367
00:28:26.200 --> 00:28:30.480
you have obviously any other points.
But you've referenced this before. But uh,
368
00:28:30.599 --> 00:28:34.799
talk to us in a second about
multi factor offic authentication. Right.
369
00:28:36.119 --> 00:28:40.119
But um, but speaking of zel, so I've I've I haven't used Zell
370
00:28:40.160 --> 00:28:41.440
a whole lot in the past,
but I'm seeing it seems like I'm using
371
00:28:41.440 --> 00:28:45.480
it more and more often. And
you have to type in that person's phone
372
00:28:45.559 --> 00:28:49.200
number or email, and when you
see the picture or something aligned, you
373
00:28:49.240 --> 00:28:55.119
figure it's legit, right, But
once it's been transferred digitally, it's you
374
00:28:55.160 --> 00:28:57.319
know, I'm sure they have safeguards
in place, but it's a whole more
375
00:28:57.400 --> 00:29:02.720
complicated to say, oh, you
know, Dwayne, that that transfer never
376
00:29:02.759 --> 00:29:07.599
got to you, so obviously it
got intercepted. Um and to contact those
377
00:29:07.640 --> 00:29:11.599
financial institutions get that money re routed. I mean, that's you're talking about
378
00:29:11.920 --> 00:29:15.319
Pandora's box right right. So you
know, the easiest way to approach any
379
00:29:15.359 --> 00:29:21.240
of this is too is to be
wise about what you do, because once
380
00:29:21.279 --> 00:29:23.799
the transaction go in place, it
is hard to we coop that more to
381
00:29:23.880 --> 00:29:29.960
reverse that, okay, because because
we know there are thousands and points in
382
00:29:30.000 --> 00:29:33.480
a digital world, right okay,
but to track money down as it goes
383
00:29:33.559 --> 00:29:40.720
through this digital world is increasingly hard. Okay, you probably would never receive
384
00:29:40.839 --> 00:29:45.480
that money back again, yeah,
because and there are some of those like
385
00:29:45.799 --> 00:29:48.599
um venmo and so forth that have
that built into maybe paypala some of these
386
00:29:48.839 --> 00:29:52.039
how built in it is that because
I I did it a while back,
387
00:29:52.079 --> 00:29:56.079
it was a small transaction. That's
another kind of um. You know again,
388
00:29:56.079 --> 00:29:59.599
a tip, because we talked about
a lot of the with the cyber
389
00:29:59.599 --> 00:30:03.319
criminals. So do here's how you
can react to that. Right, So
390
00:30:03.359 --> 00:30:06.920
say, hypothetically, Dwayne reaches out
to me and says, uh, rich,
391
00:30:07.039 --> 00:30:10.400
here's a request from ZL for five
dollars, right, And I know
392
00:30:10.519 --> 00:30:12.759
Dwayne sounds legit, and we did. We had something that you know,
393
00:30:12.960 --> 00:30:18.680
um uh, you know there was
some reason for five rings of bell whatever,
394
00:30:18.759 --> 00:30:19.960
right, some types of transaction?
What what have you? Right?
395
00:30:21.880 --> 00:30:23.319
And so I go, I want
to you know, pay him through Zel,
396
00:30:23.920 --> 00:30:27.559
But either I reach out to you
again directly, um from a phone
397
00:30:27.640 --> 00:30:30.240
number I know, and talk to
you. Is that the five requested?
398
00:30:30.319 --> 00:30:33.240
No, it was supposed to be
a hundred right or fifty dollars? They
399
00:30:33.279 --> 00:30:36.839
added a zero to it, right, and or which you can do.
400
00:30:36.880 --> 00:30:41.160
Another safeguard is a tip is if
it everything adds up, it makes sense.
401
00:30:41.559 --> 00:30:42.640
But you know, I'm not a
hundred percent sure if that's the right
402
00:30:42.680 --> 00:30:47.559
email, that's connected with your ZEL
account, that's connected to your bank account,
403
00:30:47.640 --> 00:30:49.279
rounding number, all that stuff.
I send you a simple transaction a
404
00:30:49.319 --> 00:30:52.400
dollar, right, and then you
confirm on your end, yes, I
405
00:30:52.400 --> 00:30:56.240
got the dollars. So now I
know you're gonna get the other four nine.
406
00:30:56.799 --> 00:31:00.160
You know what. That's that's a
very smart concept. Thank you everyone.
407
00:31:00.160 --> 00:31:03.559
So I have a bright idea.
I mean, we have the we
408
00:31:03.640 --> 00:31:08.000
have the studio lights turned on high
high beams. So maybe that helps superstar,
409
00:31:08.519 --> 00:31:15.440
you are the superstar rich I that
that works well, right, because
410
00:31:15.680 --> 00:31:18.279
if you send out a dollar,
right, and then I call you or
411
00:31:18.319 --> 00:31:22.440
see you, yeah, it's it's
it's like this, okay. So so
412
00:31:22.519 --> 00:31:26.079
you do a test first, you
know, you're testing it out first,
413
00:31:26.160 --> 00:31:29.920
just to go and make sure you
know, that's that's part of the cyber
414
00:31:30.000 --> 00:31:33.039
census there, okay, and trying
to use your cyber census and and to
415
00:31:33.160 --> 00:31:40.519
identify how can you minimize any any
issue because see the idea is that is
416
00:31:40.519 --> 00:31:44.000
that the person is trying to authenticate, right, okay, the first right,
417
00:31:44.359 --> 00:31:49.200
that's exactly what is happening. Okay, let me let me authenticate the
418
00:31:49.240 --> 00:31:53.160
person and in the account, because
you don't want to send out ten thousand
419
00:31:53.200 --> 00:31:56.039
dollars. Maybe you send out a
dollar. Yeah, but if you but
420
00:31:56.079 --> 00:32:00.279
if you lose a dollar, it's
not gonna hurt too much, not a
421
00:32:00.279 --> 00:32:02.079
game changer. You might have to
skimp on your coffee and not they have
422
00:32:02.200 --> 00:32:07.119
the extra vente latte or whatever you
are. But it reminds me of a
423
00:32:07.119 --> 00:32:14.200
famous quote by a famous president that
said trust but verify. Right, So
424
00:32:14.279 --> 00:32:17.359
you can't live in a cave and
not do anything online and just figure you
425
00:32:17.359 --> 00:32:20.640
know, you're gonna put all your
money on our mattress whatever. Right,
426
00:32:21.319 --> 00:32:25.039
um so uh yeah, okay,
so the last topic unless obviously you want
427
00:32:25.039 --> 00:32:30.640
to add anything to this, but
I think that topic that you've defined in
428
00:32:30.720 --> 00:32:37.880
previous podcasts, uh behooves to reiterate
again this this concept of multi factor authentication.
429
00:32:38.160 --> 00:32:42.160
Yeah, what does that mean in
layman's terms? Something that you know
430
00:32:42.319 --> 00:32:46.240
and something you have. Okay,
So so you think about, um,
431
00:32:46.359 --> 00:32:52.880
now, when you probably have to
log onto certain websites, right when you
432
00:32:52.960 --> 00:32:55.319
put in your music name of past
where then it will sent a code to
433
00:32:55.359 --> 00:33:00.400
your yeah or something like that,
right, which is a soft token.
434
00:33:00.599 --> 00:33:04.480
Okay, Well, you also can
have a hard token, which is a
435
00:33:04.519 --> 00:33:09.440
token device that will go and have
have a token code on there and and
436
00:33:09.480 --> 00:33:15.440
when you put your user name and
password in, it will go and um
437
00:33:15.480 --> 00:33:21.799
it will go and ask for that
code from your particular token device, which
438
00:33:21.839 --> 00:33:24.160
is a hard token. Right.
So, so when you think about multi
439
00:33:24.319 --> 00:33:30.480
factor authentication. It is about something
you know and something you have. Okay,
440
00:33:30.519 --> 00:33:34.559
all right, so so you know
you're using name and password, right,
441
00:33:34.759 --> 00:33:37.759
so what you have is a token. Yeah, okay, so it's
442
00:33:37.799 --> 00:33:40.839
two levels. Now. Now I
want to add on that too, is
443
00:33:40.880 --> 00:33:45.559
that there's a third level, which
is called something you are. It's where
444
00:33:45.599 --> 00:33:50.279
you add in some biometrics, okay, prints or whatever. You know,
445
00:33:50.400 --> 00:33:54.319
your eyes scanning your eyes, you
know, your fingerprints, or you put
446
00:33:54.400 --> 00:34:00.559
the palm or your hand down in
this little decoder or something that. Right.
447
00:34:00.599 --> 00:34:04.559
So so those are some ways to
protect yourself. But I will say
448
00:34:04.559 --> 00:34:12.000
that probably about of the website works
so much under m f A. I
449
00:34:12.079 --> 00:34:15.239
know for a fact they're probably a
few that do not use m f A.
450
00:34:16.039 --> 00:34:20.760
But I would tell to use it
to search options on that. Okay.
451
00:34:20.960 --> 00:34:24.920
Now, the shots with m f
A is that that you would need
452
00:34:24.960 --> 00:34:29.840
to have ass to your email or
cell phone so you can get a code
453
00:34:29.920 --> 00:34:31.800
or something like that. Right.
Yeah. Sometimes it's been annoying, Like
454
00:34:31.880 --> 00:34:36.239
we use the service Fiber and some
other services they do that that code,
455
00:34:36.679 --> 00:34:40.400
but I'm on my phone, um
respond to their email, but they send
456
00:34:40.440 --> 00:34:44.559
me a text. I have to
leave my email to check the text and
457
00:34:44.599 --> 00:34:47.159
get the code, and then I
go back to the email enter in that
458
00:34:47.239 --> 00:34:52.559
code, but it's um, it
doesn't accept it because I kind of left
459
00:34:52.559 --> 00:34:54.679
my email and you go in this
kind of circle. But they're kind of
460
00:34:54.679 --> 00:34:59.559
rectifying some of that. So,
UM, what you just want to mention
461
00:34:59.599 --> 00:35:02.559
about, UM, you know the
token. One of the newest trends I'm
462
00:35:02.599 --> 00:35:07.239
kind of seeing is when you're paying
online. A lot of these companies don't.
463
00:35:07.360 --> 00:35:12.239
There seems like only a handful of
them, but it's becoming more more
464
00:35:12.280 --> 00:35:14.800
prominent. A matter of fact,
that we're using a new widget and it
465
00:35:14.840 --> 00:35:17.360
was asking if we wanted to add
this feature to our service, and the
466
00:35:17.599 --> 00:35:23.280
premises it asked you you can type
in your your credit card number and so
467
00:35:23.360 --> 00:35:27.480
forth, expiration date, or they
ask you to scan your card take a
468
00:35:27.519 --> 00:35:31.639
picture of that card. That means
that because typically a cyber security UM,
469
00:35:31.880 --> 00:35:36.840
cyber's criminal is what it says.
They're on the cyber there on the internet,
470
00:35:36.920 --> 00:35:39.840
right, and they've access to your
information, but they typically don't won't
471
00:35:39.880 --> 00:35:43.880
have that physical card. You're the
person, the card holder that has it
472
00:35:43.960 --> 00:35:46.840
in your hand, right and and
UM, so it's more likely they have
473
00:35:46.960 --> 00:35:51.440
access to your digital assets rather than
your physical asset. Obviously, your card
474
00:35:51.480 --> 00:35:53.519
can be stolen and lost and then
you freeze it over right, But if
475
00:35:53.519 --> 00:35:57.559
your card is in your hand,
and that's the newest thing, you know,
476
00:35:57.599 --> 00:36:00.039
I grabbed my cell phone and I
just it's not even a QR code.
477
00:36:00.039 --> 00:36:04.000
It just scans the front of the
back of your card with all the
478
00:36:04.000 --> 00:36:09.559
digits that tells the company that you
actually have that card and it's not being
479
00:36:10.199 --> 00:36:15.760
hasn't been on the dark web,
you know, as a digital real estate,
480
00:36:15.920 --> 00:36:21.719
you know what I am a component
of digital advancement and living into a
481
00:36:21.920 --> 00:36:25.840
digital age. But I think you
just have to realize how forward they want
482
00:36:25.840 --> 00:36:30.360
to go into the digital age,
because you do have options. You know,
483
00:36:30.440 --> 00:36:37.039
it's out there, but try not
to expose yourself as much as possible
484
00:36:37.159 --> 00:36:44.239
and try to you know, and
being a soft target because the more you
485
00:36:44.360 --> 00:36:47.599
use these applications and other things like
that, you can be exposed. But
486
00:36:49.800 --> 00:36:53.119
you know, I just kind of
think that if someone wants to uh paid
487
00:36:53.119 --> 00:36:57.239
by their cell phones, you know, you swipe the QR code or whatever
488
00:36:57.280 --> 00:36:59.719
you know that's on you. But
at the same time, you know,
489
00:36:59.719 --> 00:37:01.760
for you need to understand the risk
that I impose because we live in a
490
00:37:01.800 --> 00:37:07.360
digital world, and I think probably
to each his own, but I think
491
00:37:07.360 --> 00:37:10.719
it's another good rule of thumb to
say, um, at this benchmark,
492
00:37:12.519 --> 00:37:15.960
I'm not gonna do a hundred percent
digital transaction, right, and set whatever
493
00:37:16.400 --> 00:37:22.199
money increment works for you. So
anything over fifty hundred five hundred, you
494
00:37:22.239 --> 00:37:29.880
know, I'm gonna add another personal
level of security or or authentication. Right.
495
00:37:30.280 --> 00:37:31.760
So if you're at a coffee shop
whatever, and you know, or
496
00:37:32.400 --> 00:37:37.519
making a transaction less than fifty bucks, um, you know, the worst
497
00:37:37.519 --> 00:37:42.079
case scenario, you lose that,
not recoup it. Right. But it's
498
00:37:42.079 --> 00:37:45.039
different if you're dealing with a mortgage
or something, or a car payment or
499
00:37:45.079 --> 00:37:47.039
it. Right. Yeah, you
know, you know rich a hundred of
500
00:37:47.920 --> 00:37:51.400
but you know the that's two in
a row. Well, you know,
501
00:37:52.239 --> 00:37:53.719
if we had more time, I
could reach the three, but we're almost
502
00:37:53.719 --> 00:37:55.760
out of time. Yeah, you
know, I'm gonna make this quick.
503
00:37:57.199 --> 00:38:01.119
The worst thing about using cash,
yeah, versus digital currency is that when
504
00:38:01.119 --> 00:38:07.320
you use cash and you know you
might not get your change back. You've
505
00:38:07.320 --> 00:38:08.920
been hold on that one for a
while. It sounds like it's like the
506
00:38:09.000 --> 00:38:14.360
Yogi Berra comment what it was.
It says cash is almost as good as
507
00:38:14.400 --> 00:38:17.880
money. Yeah, alright, on
that note, uh doing any closing uh
508
00:38:19.039 --> 00:38:22.519
comments are called action for us for
you and your listeners. Yeah. Yes,
509
00:38:22.719 --> 00:38:25.480
if you're a listener out there,
please please sign up for my Facebook
510
00:38:25.519 --> 00:38:30.760
page. It's called the Chief of
Cybersecurity and if you have any questions about
511
00:38:30.760 --> 00:38:35.280
cybersecurity. That is a repository so
that I can answer questions that you may
512
00:38:35.360 --> 00:38:40.480
have concerned and the cybersecurity echosystem and
you stay cyber safe. See you next time.