Online Scams Target Veterans and Active Duty Members

December 14, 2022 00:38:48
Online Scams Target Veterans and Active Duty Members
Chief of Cybersecurity
Online Scams Target Veterans and Active Duty Members

Dec 14 2022 | 00:38:48

/

Hosted By

Dewayne Hart

Show Notes

Online Scams Target Veterans and Active Duty Members

The U.S. has the most robust and powerful military in the world, and though its fighting men and women can win wars, they often appear defenseless against popular online scams. In the military, you have a young population on the web. Service members are targeted by websites that claim to offer special military discounts on everything from cars to apartments for rent.

But the low-priced car never arrives, and the easy-to-find apartment they rented is already occupied. This podcast will focus on safety measures and protection standards for military personnel.

View Full Transcript

Episode Transcript

WEBVTT 1 00:00:02.240 --> 00:00:05.320 Alright, alright, it's that time of the day, time of the month. 2 00:00:05.400 --> 00:00:07.919 Yadi Hadda. He had a rich casting over here in the Global Podcast 3 00:00:07.960 --> 00:00:11.679 studios in Atlanta, and joining me as always on this episode is the man 4 00:00:11.679 --> 00:00:17.160 of the our, Mr Dwayne Hart. Today's topic, We're always regarding cybersecurity 5 00:00:17.199 --> 00:00:21.600 as online scam starting vetans, veterans, and active duty members. We've talked 6 00:00:21.640 --> 00:00:27.559 about cybersecurity of the military and government agencies and a lot of other sandboxes, 7 00:00:27.839 --> 00:00:31.120 but this one's kind of unique. Why do you think this one stands out? 8 00:00:32.039 --> 00:00:35.399 Guys? I'm a twenty of view have veter or another United States Navy 9 00:00:35.479 --> 00:00:41.439 myself, and when I go back and think about my twenty years that I've 10 00:00:41.439 --> 00:00:47.240 served in the military, and you know, outside of cyber crime, right, 11 00:00:47.439 --> 00:00:51.200 thinking about some of the other crime that has happened to military veterans. 12 00:00:51.280 --> 00:00:56.159 Even so military veterans that goes to purchase of car and you know, in 13 00:00:56.240 --> 00:01:00.439 a fifth percent interest rate on that car, right, So so it deer. 14 00:01:00.159 --> 00:01:03.400 It is hard to me because I was a veteran, and I will 15 00:01:03.519 --> 00:01:10.439 say that partially of the reason that it served so important to me is that 16 00:01:10.519 --> 00:01:15.799 I know that there probably certain groups of veterans now that will probably be in 17 00:01:15.879 --> 00:01:19.200 scam as we speak. Yeah, we talked about before we went on the 18 00:01:19.239 --> 00:01:25.439 air about um obviously cybersecurity, online scams and so forth. But well, 19 00:01:25.480 --> 00:01:30.359 I think what's unique about this is we talked about like the military, all 20 00:01:30.400 --> 00:01:32.959 branches of the military, I have some version of boot camp, right, 21 00:01:33.319 --> 00:01:36.640 but it's more like in the real world, you know, uh, not 22 00:01:36.719 --> 00:01:40.040 so much online. Right. Uh. So you talked about there is a 23 00:01:40.079 --> 00:01:47.040 cyber uh warfare as well component and obviously there's branches or segments of the military 24 00:01:47.040 --> 00:01:52.480 that specializes in online, but it's really dealing with you know, another agency 25 00:01:52.560 --> 00:01:57.239 or government agency or another um uh, somebody else attacking the platform you know, 26 00:01:57.319 --> 00:02:00.959 housed and responsible for you know, their job at their role in the 27 00:02:01.120 --> 00:02:05.480 as the military. Right. But like you said, once they leave that 28 00:02:05.560 --> 00:02:10.439 military base, um, they have that personal life. And we're the newest 29 00:02:10.479 --> 00:02:15.360 I don't know if it's how new it is, but the cyber criminals are 30 00:02:15.400 --> 00:02:21.120 increasingly targeting then because if if a active military for example, gets an email 31 00:02:21.400 --> 00:02:25.360 that appears from some government agency, they're gonna for the most part figure it's 32 00:02:25.439 --> 00:02:30.719 legit and there's some urgency to it, and they're used to responding to a 33 00:02:30.759 --> 00:02:36.479 lot of military communication. So it's not uncommon and so they fall into the 34 00:02:36.560 --> 00:02:39.639 FTC right now says there's two hundred and sixty seven million in total losses among 35 00:02:39.680 --> 00:02:44.280 the military community, um, just in a single year. Well, you 36 00:02:44.319 --> 00:02:46.479 know what, let's just let's just take this way action in here for a 37 00:02:46.479 --> 00:02:51.639 minute, because I want to dive into the mindset of a military person. 38 00:02:51.759 --> 00:02:55.960 Okay, military personnail taught to be responsible. Okay, if you have a 39 00:02:57.039 --> 00:03:00.919 bill that you need to pay, you don't want your commanding officer to get 40 00:03:00.960 --> 00:03:09.039 that right. So so because military personnel or talked to maintain their responsibility, 41 00:03:09.080 --> 00:03:15.599 they may be more apt and quick to respond and say I go take care 42 00:03:15.639 --> 00:03:19.360 of it, because in the email it could say that if you don't pay 43 00:03:19.360 --> 00:03:23.240 this in three days, then I'm gonna call your commanding officer, and you 44 00:03:23.280 --> 00:03:27.439 don't want that to happen. So you know, between the process, I 45 00:03:27.439 --> 00:03:31.919 think military valance still kind of have to uh be wise about the way that 46 00:03:32.000 --> 00:03:38.960 they approach sober security because most military people are talked about combat webfare and trying 47 00:03:38.960 --> 00:03:44.879 to protect the ship or to or to protect a squadron or to or to 48 00:03:44.960 --> 00:03:49.960 protect their units. Now now, when it comes to cyber welfare, it's 49 00:03:49.960 --> 00:03:55.960 about trying to protect your individual personal life or to protect the military cybersecurity efforts. 50 00:03:58.000 --> 00:04:02.240 So so I think that when I look at a military person and knowing 51 00:04:02.319 --> 00:04:08.080 that your entire life isn't closed into the government and you're safe and you're taken 52 00:04:08.120 --> 00:04:12.400 care of and it's only a small fraction of your life, have to really 53 00:04:12.479 --> 00:04:16.040 deal with the personal side. And that's when you leave a military base, 54 00:04:16.079 --> 00:04:23.439 all right. So part of that is to have that transitional mindset. And 55 00:04:23.480 --> 00:04:28.000 they said, Okay, I'm not I'm not working on the military base. 56 00:04:28.120 --> 00:04:30.399 Yeah, you're not in that bubble anymore. Right. Once you leave the 57 00:04:30.399 --> 00:04:34.519 bubble, right now, what happens is I'm at Walmart. Yeah, this 58 00:04:34.600 --> 00:04:40.160 is this is not a ship, not yet. I'm sure Walmart will be 59 00:04:40.600 --> 00:04:45.720 housed on some aircraft soon, coming soon. But yeah, So that's the 60 00:04:45.800 --> 00:04:51.560 type of mindset that has to be deployed, right, Yeah, like keep 61 00:04:51.600 --> 00:04:56.480 the military hackers hat on, right, Which when you're in in uniform and 62 00:04:56.480 --> 00:05:00.199 you're on that base and you're active military, I think you're um your antenna 63 00:05:00.279 --> 00:05:02.720 and your alert is so much higher, right, and when you leave, 64 00:05:03.360 --> 00:05:06.759 um, you're thinking you're still kind of covered into that umbrella, but but 65 00:05:06.879 --> 00:05:10.720 not in fact, not true at all. A matter of fact, we 66 00:05:10.720 --> 00:05:15.000 were talking about an article beforehand about UM typically a red flag is something you 67 00:05:15.000 --> 00:05:18.279 have to do immediately, and that's how the UM the cyber criminals are now 68 00:05:18.360 --> 00:05:23.879 approaching these active military of getting that and saying, in essence, click on 69 00:05:23.920 --> 00:05:27.360 this link or something bad's gonna happen to you. But in reality, you 70 00:05:27.399 --> 00:05:30.199 know, banks and credit unions will never reach out to you, right. 71 00:05:30.439 --> 00:05:32.879 Government agencies are not going to reach out making a demand. They say that 72 00:05:33.000 --> 00:05:36.519 being the lookout for example of anyone claiming to be from the v A or 73 00:05:36.519 --> 00:05:42.240 other government agencies. UM, they're never gonna threaten you or or pressure you 74 00:05:42.519 --> 00:05:46.600 to send information or money. Right. Um, you brought up something that 75 00:05:46.759 --> 00:05:53.319 was very important, you know, talking about the Veterans Administration and looking at 76 00:05:53.360 --> 00:05:58.279 the amount of veterans they have to go there, and and you know, 77 00:05:58.560 --> 00:06:01.360 just think about the cyber criminals is trying to grab information from its veterans and 78 00:06:01.680 --> 00:06:06.079 send them a vogus website and you need to put your information in here for 79 00:06:06.160 --> 00:06:11.199 your next appointment at the eight Well I'm just citing an example. Now, 80 00:06:11.199 --> 00:06:15.560 I don't know if that ever happened. Okay, but but it's something to 81 00:06:15.439 --> 00:06:19.040 think about. All right. Now, if you're a military veteran, and 82 00:06:19.040 --> 00:06:26.360 if you're sitting there listening now, um, you're probably saying to yourself, 83 00:06:26.439 --> 00:06:30.240 wow, okay, well I didn't know that. And see, this is 84 00:06:30.279 --> 00:06:34.240 the purpose of these podcasts is to go put information out because you know, 85 00:06:34.360 --> 00:06:38.920 there are people that spend their whole entire life in the military for twenty years 86 00:06:39.000 --> 00:06:44.279 and and and you imagine a scam that comes through and you know it's kind 87 00:06:44.319 --> 00:06:48.720 of um takes their retirement check or their via disability paycheck away. Right. 88 00:06:48.800 --> 00:06:57.240 That's that's that is not great position to be in. But I can say 89 00:06:57.319 --> 00:07:01.360 for sure is that as a military veteran, I know for a fact that 90 00:07:01.399 --> 00:07:05.079 when I was in uniform, there were people trying to give me all kind 91 00:07:05.120 --> 00:07:10.879 of things for free. But you know they wasn't free. Okay, discounts 92 00:07:10.879 --> 00:07:15.240 on cars and apartments and and there are legitimate businesses that, um that want 93 00:07:15.240 --> 00:07:19.040 to honor their service and the military duty would write and there's very legit. 94 00:07:19.160 --> 00:07:24.639 But um, not that any cyber criminal is a good criminal. But this 95 00:07:24.720 --> 00:07:28.959 has got to be the lowest rung of the ladder. The most disgusting amongst 96 00:07:29.240 --> 00:07:32.800 in addition to like praying on senior citizens, right because rather than honoring the 97 00:07:32.839 --> 00:07:38.040 sacrifices them made by the active duty members you know and veterans and their families, 98 00:07:38.120 --> 00:07:43.759 cyber criminals are increasingly targeting them. I mean that's just beyond imagination, 99 00:07:43.920 --> 00:07:47.519 right, Like, well we think about this is what will you know? 100 00:07:47.560 --> 00:07:53.399 The bigger question is what would it draws the attention to military better? Right? 101 00:07:53.439 --> 00:07:58.560 Okay? What what what is this soul unique about them being being a 102 00:07:58.639 --> 00:08:01.519 honeypot? Is I'm a all that right, right? Okay? And and 103 00:08:01.600 --> 00:08:07.879 I have to say that because one factor is that the way that the monetary 104 00:08:07.920 --> 00:08:13.199 system works for military people, right, because they have a guarantee paychecks. 105 00:08:13.480 --> 00:08:15.839 If so, if you find a way to scam them, then you can 106 00:08:15.879 --> 00:08:20.560 pretty much just you know, get them caught up into spending money every month 107 00:08:20.639 --> 00:08:24.439 because see the obligated to do it because maybe they signed a piece of documentation. 108 00:08:24.519 --> 00:08:26.759 Maybe it's an online scam or something like that. Right, But at 109 00:08:26.800 --> 00:08:31.919 the end of the day, um, it is. It is bad, 110 00:08:33.200 --> 00:08:37.240 especially if you have a military personnel that is deployed and you know they get 111 00:08:37.240 --> 00:08:39.519 an email. You know, they can be on a ship, or they 112 00:08:39.519 --> 00:08:43.840 can be deployed with a unit somewhere in South America, maybe on our training 113 00:08:43.919 --> 00:08:48.200 exercise, and you get an email talking about well, you know, like 114 00:08:48.240 --> 00:08:52.080 we didn't receive your car payment, and someone sends you picture your car and 115 00:08:52.120 --> 00:08:56.320 say, okay, well we're gonna take your cars, you know, you 116 00:08:56.320 --> 00:09:00.919 know, send us you know, expeedily a thousand. Obviously this account, 117 00:09:00.919 --> 00:09:07.799 well you know what, UM, that could be hard fun, especially if 118 00:09:07.879 --> 00:09:13.519 someone really really doesn't understand the financial system. But I will say for sure, 119 00:09:13.960 --> 00:09:18.600 if the military does a great job of educating people on the financial system 120 00:09:18.320 --> 00:09:24.200 and trying to protect themselves away from crime. Okay, but you know the 121 00:09:24.320 --> 00:09:31.440 cyber criminals, UM steel likes to find those soft targets. Well, and 122 00:09:31.480 --> 00:09:35.600 you mentioned about act of military when they're UM deployed, you know, around 123 00:09:35.639 --> 00:09:39.080 the world. But the other side of that piece of the puzzle is there's 124 00:09:39.120 --> 00:09:46.600 probably UM activity targeting targeting the family members, spouses, its home. And 125 00:09:46.639 --> 00:09:52.120 if if your spouse is serving overseas and UM it's difficult to reach them, 126 00:09:52.200 --> 00:09:56.039 that's open. That's a floodgate, you know, a door opening for the 127 00:09:56.960 --> 00:10:01.279 cyber criminals, because then they could potentially contact phone or email what have you 128 00:10:01.399 --> 00:10:07.960 the spouse and say you know your spouse needs some form some paperwork filled out 129 00:10:07.039 --> 00:10:11.960 right, Um, and obviously you're gonna want to take action if it looks 130 00:10:11.960 --> 00:10:15.320 like from an agency. So the general correctly if you're wrong. But the 131 00:10:15.360 --> 00:10:18.720 general rule of thumb here applies to you know, civilians or you know employees, 132 00:10:18.960 --> 00:10:24.039 you know kids, families, elderly obviously including the military we're talking about 133 00:10:24.039 --> 00:10:26.440 today. The rule of thumb is if you got if you get contacted from 134 00:10:26.600 --> 00:10:31.600 your bank, credit union, and agency, a government, what have you, 135 00:10:31.639 --> 00:10:35.639 it could be legit nine times that of tend they're not going to contact 136 00:10:35.679 --> 00:10:39.360 you with this on some urgency and and threats whatever. Right, but even 137 00:10:39.360 --> 00:10:43.320 if it's non threatening, it just seems like pretty straightforward. The rule of 138 00:10:43.320 --> 00:10:48.080 thumb is always, uh, remove yourself from that email, in that link 139 00:10:48.120 --> 00:10:52.120 or that phone call and contact that agency the I R S for example, 140 00:10:52.240 --> 00:10:56.559 or whoever it is, the v A office, contact them directly and talk 141 00:10:56.639 --> 00:11:01.639 to someone so you're proactively and confirm. And uh, I mean I remember 142 00:11:01.679 --> 00:11:05.200 I lived in California and occasionally I get letters from some business activity had in 143 00:11:05.240 --> 00:11:09.279 California, and I wouldn't respond to that letter that came in the mail, 144 00:11:09.320 --> 00:11:11.960 I would, And you don't call the phone number that's in the letter, 145 00:11:13.120 --> 00:11:16.279 right, you actually go online and find the agency in that town of that 146 00:11:16.320 --> 00:11:18.840 city and contact them, yes or no? I mean, isn't that that 147 00:11:20.399 --> 00:11:22.639 uh rule of thumb? Well, that's the rule of thumb. And I 148 00:11:22.679 --> 00:11:28.759 can tell you for sure is this is that is that we also have to 149 00:11:28.799 --> 00:11:33.279 look at the fact is that military spouses are probably at home and to care 150 00:11:33.360 --> 00:11:39.759 the family, and then that spouses deployed and um, you know there is 151 00:11:39.879 --> 00:11:46.720 email and there is communication, but still the probability of cybercrime occur into that 152 00:11:46.840 --> 00:11:52.039 spouse there. Now. I also would say that that's why a lot of 153 00:11:52.080 --> 00:11:58.679 military personnel stay very close to military um installations and try to take advantage of 154 00:11:58.720 --> 00:12:03.000 opportunities such as as if you have a naval like a nave exchange, or 155 00:12:03.120 --> 00:12:07.120 you have an a force exchange, or if you have a commerce survey located 156 00:12:07.120 --> 00:12:11.200 on basis. Yeah, there's a community there. Yes, yes, so 157 00:12:11.279 --> 00:12:15.480 you're not you know, you're not dealing with any of the cyber crime. 158 00:12:15.559 --> 00:12:18.000 And also to most of the vendors that come on a military base and operate, 159 00:12:18.399 --> 00:12:22.919 well you're vet it first, Okay, So So I'm just here to 160 00:12:24.039 --> 00:12:31.159 say that part of the cybercrime community is not so much in the interests of 161 00:12:31.240 --> 00:12:35.600 military personnel and veterans. I think that as a military person and as a 162 00:12:35.679 --> 00:12:39.879 veteran, you just have to be wise about what you do, because at 163 00:12:39.919 --> 00:12:43.720 the end of the day, a cybercriminal is a cyber criminal. Okay, 164 00:12:43.799 --> 00:12:48.279 they're They're not They're not there for the love of your life. They don't 165 00:12:48.279 --> 00:12:54.120 have any of your interests at heart. UM. Another top of two more 166 00:12:54.600 --> 00:12:58.840 topics I would i'd like to cover is about you know, freezing the credit 167 00:12:58.840 --> 00:13:03.440 card are setting up alerts and an email passwords. In this UM article there 168 00:13:03.559 --> 00:13:07.480 is another tip about email passwords that we hadn't discussed in the past. But 169 00:13:07.919 --> 00:13:11.279 first of all, talking about you know, their credit cards and so forth, 170 00:13:11.360 --> 00:13:16.440 right and loans. UM, they were talking about suggesting potentially, you 171 00:13:16.440 --> 00:13:20.080 know, using the ability short term if you're on a short term assignment, 172 00:13:20.320 --> 00:13:26.320 even just a two week training session, rather than doing a permanent freeze, 173 00:13:26.399 --> 00:13:31.120 you can contact your credit union or credit card companies and acts asked for an 174 00:13:31.120 --> 00:13:37.759 active duty alert. Right. So I will say this for sure, UM. 175 00:13:37.960 --> 00:13:43.000 There are some institutions such as UM, Navy, Federal Credit Union, 176 00:13:43.000 --> 00:13:48.039 which is really good at senning alerts. If you are located in Norfolk, 177 00:13:48.159 --> 00:13:54.000 Virginia, and if you have a credit card and somebody, um did a 178 00:13:54.080 --> 00:14:01.240 transaction over and Los Angeles, California. Right. Uh. Most other times 179 00:14:01.960 --> 00:14:07.279 they will send you an email if it's back to back transaction, especially if 180 00:14:07.320 --> 00:14:11.399 you located in Norful, right and you just spent fifty dollars and then what 181 00:14:13.600 --> 00:14:20.080 right you know it has five being spent out in Los Angeles, California. 182 00:14:20.320 --> 00:14:22.919 Um, you will probably get a text message from Navy for the Union, 183 00:14:24.399 --> 00:14:26.919 which is which is good. Yeah, And if you use that type of 184 00:14:26.960 --> 00:14:33.720 military institution, they're hard wired for these types of alerts whatever. Right. 185 00:14:33.159 --> 00:14:37.919 Uh. They know that if you're active, you're likely be traveled the station 186 00:14:37.960 --> 00:14:39.960 of different places, and your spouses may be using the same credit card in 187 00:14:39.960 --> 00:14:46.320 their city. A lot of uh contingency built into that. The other thing 188 00:14:46.320 --> 00:14:50.000 that was interesting is talking about email and passwords. Um, this should be 189 00:14:50.039 --> 00:14:52.960 like, uh, an obvious thing, but when I read it, it 190 00:14:54.039 --> 00:14:58.679 was interesting saying the email accounts, the email account that you use on social 191 00:14:58.720 --> 00:15:01.720 media should never be the same the tied to your bank accounts. And I 192 00:15:01.759 --> 00:15:07.200 know someone that's potentially guilty of that, right because the so actually we were 193 00:15:07.240 --> 00:15:13.480 talking today on a on another meeting about hacking on social media and apparently it's 194 00:15:13.480 --> 00:15:18.000 a lot easier than most people would think. Um And once they have that 195 00:15:18.759 --> 00:15:24.080 uh email and UM and password, they can basically just do a search through 196 00:15:24.120 --> 00:15:28.080 your bank accounts and if it lines up, you have what we call a 197 00:15:28.120 --> 00:15:31.159 Scooby Doo moment, right bro. Yeah, but you know what, this 198 00:15:31.360 --> 00:15:37.200 goes back to one of the previous podcasts that I have, and it was 199 00:15:37.279 --> 00:15:43.279 called Individual Protection Standards, and looking back at that podcast and how how I 200 00:15:43.360 --> 00:15:50.039 brought into attention about when you're using social media, you've got to make sure 201 00:15:50.120 --> 00:15:54.120 that you use grown passwords. You know, you can't use a four a 202 00:15:54.159 --> 00:15:58.120 full character password. You know. Last week I posted some information on my 203 00:15:58.240 --> 00:16:03.200 chief of cybersey you the Facebook page which shows you that that if you have 204 00:16:03.360 --> 00:16:07.919 a four charactor password, it only really takes about two minutes to crack it. 205 00:16:08.200 --> 00:16:12.679 Okay, if you have a sixteen character password to take about three years. 206 00:16:12.879 --> 00:16:18.240 Yeah, that was that was a surprising stat I've actually repeated that a 207 00:16:18.320 --> 00:16:22.320 number of people since we had that conversation of um, you know that that 208 00:16:22.440 --> 00:16:27.240 finite number three to six characters. It can take up like three seconds for 209 00:16:27.279 --> 00:16:30.840 them to hack you go to sixteen characters, which sounds annoying as a consumer 210 00:16:30.919 --> 00:16:36.399 or the person. But once you store and save that and uh yeah, 211 00:16:36.440 --> 00:16:38.799 somewhere like three thousand years or something insane, right, so they're probably not 212 00:16:38.919 --> 00:16:41.799 given. It's like you talk a lot about, like, uh, the 213 00:16:41.840 --> 00:16:45.159 analogies to your front door. If you have the depth bowl dead bolt on 214 00:16:45.200 --> 00:16:48.960 it, and you have the light let outside and you have the security sign 215 00:16:49.039 --> 00:16:53.639 on your window or in the front yard, Um, it's gonna cause that 216 00:16:53.639 --> 00:16:57.960 that uh you know, attacker that in that case a robbery to pause, 217 00:16:59.440 --> 00:17:02.639 and if they go next door next door, there's no light on, there's 218 00:17:02.679 --> 00:17:06.599 no security thing out there. You know, they're gonna go for the path 219 00:17:06.640 --> 00:17:10.160 at least resistance. Well, what it's called is right, it's called a 220 00:17:10.279 --> 00:17:17.240 soft targets. Okay. What we have in the cybersecurity industry is that that 221 00:17:17.359 --> 00:17:22.200 we have these attack vectors. Okay, you know when you think of and 222 00:17:22.200 --> 00:17:26.480 and attack vector, it is an entrance to a network. Okay, Hackers 223 00:17:26.559 --> 00:17:33.440 like different types of attack factors. Maybe it may be a user are maybe 224 00:17:33.480 --> 00:17:37.279 it maybe a computer, maybe be a flaw and a vulnerability, right, 225 00:17:37.000 --> 00:17:41.640 and they can serve as an attack vector. But you know, the idea 226 00:17:41.839 --> 00:17:45.400 is not to become a soft target, okay, because a soft target is 227 00:17:45.559 --> 00:17:52.279 like unprotected and very vulnerable. So if you're a military veteran, you don't 228 00:17:52.279 --> 00:17:56.599 want to become a soft target because you know, the analogy I like to 229 00:17:56.640 --> 00:18:02.119 put in place, it's that all military and better have been through a training 230 00:18:02.160 --> 00:18:07.039 based on combat warfare. Okay. So in the nature of combat warfare, 231 00:18:07.160 --> 00:18:12.480 you are taught about risk, right that you know, before you engage the 232 00:18:12.559 --> 00:18:17.559 enemy, you need to have an understanding of the type of risk that you 233 00:18:17.640 --> 00:18:21.319 face, because you know, you want to look at the vulnerable, vulnerabilities 234 00:18:21.359 --> 00:18:26.039 and threats you gotta face. So so if you take that concept of combat 235 00:18:26.039 --> 00:18:30.559 warfare, and if you apply that to your personal life, okay, and 236 00:18:30.640 --> 00:18:36.720 say that before I engage Walmart, right, So you're not going to be 237 00:18:36.720 --> 00:18:41.599 a sponsored the show anytimes, Okay, I need to have an understanding of 238 00:18:42.240 --> 00:18:45.200 how I need to protect myself before I go in there and use my credit 239 00:18:45.240 --> 00:18:51.480 card, right, right, and um, you know to give give information 240 00:18:51.480 --> 00:18:57.920 out right. So so because we're so accustomed to just using our social security 241 00:18:59.000 --> 00:19:03.440 numbers, so much when we around our military installations, but when you leave 242 00:19:03.519 --> 00:19:07.240 out that front gate, or you leave your ship, or you leave your 243 00:19:07.240 --> 00:19:14.839 squadront, you know, you really have to think that that the same um 244 00:19:15.039 --> 00:19:18.920 people that you deal with on the military base are not the same people that 245 00:19:18.480 --> 00:19:25.119 that you're dealing with when you go to um one of the public stories or 246 00:19:25.119 --> 00:19:29.240 grocery store there, because they don't have interests and you, I would say 247 00:19:29.240 --> 00:19:33.880 some, let's just say some, some do not care the same interests as 248 00:19:33.920 --> 00:19:37.759 your military um comrades. And uh, well they may, but it's not 249 00:19:37.880 --> 00:19:42.759 just as high a priority. But yeah, yeah, yeah some so, 250 00:19:42.759 --> 00:19:47.920 so I'd like to use the words some because you know, it's not everybody 251 00:19:47.960 --> 00:19:52.640 that is a cyber criminal. Yeah right, exactly. UM. But speaking 252 00:19:52.680 --> 00:19:56.000 of some stats I should have shared earlier on this topic of military vets. 253 00:19:56.039 --> 00:20:00.880 Before I share that, I just want to remind our listeners you're listening UM 254 00:20:00.880 --> 00:20:04.599 too Rich casting over here alongside Dwayne hart Um in our global podcast studios here 255 00:20:04.640 --> 00:20:07.640 in Atlanta. We're talking all things cybersecurity. In this case, this episode 256 00:20:07.720 --> 00:20:14.039 dedicated just to online scams targeting veterans and active military duties and to learn more 257 00:20:14.039 --> 00:20:17.359 about our guests Um, it's very simple. Um. He's got all the 258 00:20:17.400 --> 00:20:19.559 social media handles. He's got his YouTube channel, he's got now his Facebook, 259 00:20:19.599 --> 00:20:22.400 he's got his podcast, he's got a book. But instead of giving 260 00:20:22.400 --> 00:20:25.920 out all that, all you have to do is do what Just go to 261 00:20:26.000 --> 00:20:29.839 Dwayne Hart dot com. Right there, you're gonna find links to his podcast 262 00:20:30.400 --> 00:20:33.200 which we record here in the studio on a regular basis. Um is your 263 00:20:33.279 --> 00:20:37.200 new YouTube. You can find a link on there as well as social media, 264 00:20:37.240 --> 00:20:40.480 and I'm sure there's a contact form you can reach out and uh reach 265 00:20:40.599 --> 00:20:45.160 Mr Hart and with any questions are follow up. Um. So with that 266 00:20:45.240 --> 00:20:49.119 being sent again, Dwayne Heart dot com for everything we're talking about today and 267 00:20:49.200 --> 00:20:56.519 more. But stats are interesting. Um seven it says seven and ten staggering 268 00:20:56.599 --> 00:21:00.680 stat Seven in ten military or military vets and ative duty service members have been 269 00:21:00.680 --> 00:21:07.799 a victim of a at least one digital crime according to recent Paul that's staggering 270 00:21:08.000 --> 00:21:12.799 seven out of ten. Yeah, that's you know, if I don't think 271 00:21:12.839 --> 00:21:18.119 the average civilian would would align with that. So so I like to take 272 00:21:18.160 --> 00:21:25.720 that number and I look at that based on some of the smaller UM units 273 00:21:25.720 --> 00:21:30.720 in the military. Okay, and knowing you've got four people, right, 274 00:21:30.319 --> 00:21:36.799 and there was about two hundred and eighty people that are victim of some type 275 00:21:36.799 --> 00:21:41.920 of cyber crime. That's that is an alarment number. Um, you know 276 00:21:41.960 --> 00:21:45.240 what. But but but it can be fixed. Okay, So so it's 277 00:21:45.240 --> 00:21:51.400 not like, um, you know, it has to beat up forever because 278 00:21:52.279 --> 00:21:56.599 because we're smart enough to beat the hackers to the finish line. Okay. 279 00:21:56.400 --> 00:22:00.400 So if you're a military veteran, go out there and put on your hack 280 00:22:00.440 --> 00:22:06.720 his hat, think about combat warfare, and beat them to the finish line. 281 00:22:07.440 --> 00:22:12.039 And two of those tips on this line would be for example, um, 282 00:22:12.359 --> 00:22:17.400 there's there's a number of services that uh, for example, encrypted email 283 00:22:17.400 --> 00:22:23.960 platform like proton mail. Um, because sometimes I get a business communication from 284 00:22:25.000 --> 00:22:29.119 somebody we're working with and there it has their email address. But at proton 285 00:22:29.240 --> 00:22:33.880 mail, and it's different than your gmails or your Yahoo's or a O l 286 00:22:33.920 --> 00:22:37.920 s would are right where Um, you really can't respond directly to the people 287 00:22:37.960 --> 00:22:41.200 there. There's a buffer, there's a barrier between you know, the two, 288 00:22:41.559 --> 00:22:45.079 which is a little bit again kind of an annoyance. But um, 289 00:22:45.119 --> 00:22:48.799 but they really don't have access to like your Gmail and they really can't track 290 00:22:48.839 --> 00:22:51.960 and you have to, like when you respond to them, they have to 291 00:22:52.079 --> 00:22:55.880 verify that you're the person they're communicating with. It's a it's an interesting level 292 00:22:55.960 --> 00:23:00.440 of another layer of security. Another thing I was learning before we went on 293 00:23:00.480 --> 00:23:03.960 the air, and actually I did it well, um a little bit earlier 294 00:23:03.000 --> 00:23:07.319 today is uh, and I've used Google Voice. Like we're talking about phones, 295 00:23:07.359 --> 00:23:12.680 because there's a whole another level of scam happening on your mobile device right 296 00:23:12.720 --> 00:23:15.559 now. We've been talking about email and letters and phone calls, right, 297 00:23:17.000 --> 00:23:19.680 but there's text messaging and so forth on your mobile device. And I've been 298 00:23:19.799 --> 00:23:22.240 using a Google Voice for a long time. So pretty much, if you 299 00:23:22.279 --> 00:23:26.519 have a Gmail account, which is free, you can claim a phone number 300 00:23:26.680 --> 00:23:32.200 that's not related to your your actual mobile phone at all, right, and 301 00:23:32.279 --> 00:23:34.279 you can kind of screen all those whenever you give out your phon number. 302 00:23:34.279 --> 00:23:38.559 Because a lot of websites and even purchases you make online or offline, it 303 00:23:38.680 --> 00:23:41.759 requires you can't go to the next step without a phone number because they want 304 00:23:41.759 --> 00:23:45.359 to send you text alerts and which is sometimes helpful to get the reminders when 305 00:23:45.400 --> 00:23:48.279 the service person is going to show up at your house whatever. Right when 306 00:23:48.279 --> 00:23:52.359 you're shipping is as arriving or when you register for an event, you have 307 00:23:52.440 --> 00:23:56.279 to put in a and they won't accept Like you know, most people don't 308 00:23:56.319 --> 00:23:59.759 have a landline. It has to be identified as a mobile phone number. 309 00:24:00.359 --> 00:24:03.880 I never give out my personal phone number online. I use my Google phone 310 00:24:03.920 --> 00:24:07.559 number. But there's another service I wasn't aware of and just registered for today 311 00:24:07.599 --> 00:24:12.480 as a result of you educating me on this is called text now um and 312 00:24:12.519 --> 00:24:18.960 again they'll they'll issue a local phone number based on your town, but it 313 00:24:18.039 --> 00:24:22.519 only rings to that number and you can screen all those uh and I get 314 00:24:22.559 --> 00:24:26.359 a lot of robo calls and scams into that and it never comes to my 315 00:24:26.440 --> 00:24:33.640 personal Another way to prevent these UMTA cyber criminals attacking your personal information. Yeah, 316 00:24:33.799 --> 00:24:37.359 yeah, there's there's all type of pro texting standards that you can put 317 00:24:37.359 --> 00:24:44.119 in place. Um, you know, speaking of see speaking of One of 318 00:24:44.160 --> 00:24:48.559 the things is that I always like to look at the type of defense strategy. 319 00:24:48.440 --> 00:24:52.960 Speaking of defense, but that's wanted live scream. You know I just 320 00:24:52.000 --> 00:24:59.359 completed, which is talking about being a human firewall. Okay, and see 321 00:24:59.359 --> 00:25:03.799 that's part of that defensive mindset and to know that that you have to be 322 00:25:03.880 --> 00:25:07.480 that protective shield and part of that protective shield is to make sure that you 323 00:25:07.799 --> 00:25:12.119 follow best practices such as password protection, make sure you don't share your sub 324 00:25:12.160 --> 00:25:17.319 security number. If it seems like something that is wrong, you know, 325 00:25:17.440 --> 00:25:22.319 you raise your cyber senses and do not act upon it. Because it may 326 00:25:22.359 --> 00:25:25.039 sound like a really good deal, okay, but at the end of the 327 00:25:25.160 --> 00:25:30.599 day, you know, once you commit to that deal or to whatever type 328 00:25:30.640 --> 00:25:36.200 of offering there, you are probably stuck in a contract. And it's been 329 00:25:36.200 --> 00:25:40.759 plenty of military personnel that gets, you know, caught up in different contracts 330 00:25:40.839 --> 00:25:45.519 and they obligated to stay in those contracts because of the contract language that is 331 00:25:45.559 --> 00:25:52.279 written. So so you really have to think about cybercrime because cybercrime can be 332 00:25:52.759 --> 00:25:56.160 bad for the military as well, because what if the cyber criminals are trying 333 00:25:56.200 --> 00:26:02.640 to gain top seecret information from a military right all right, See, you 334 00:26:02.680 --> 00:26:07.160 can go through social media and it could feed everywhere. Yeah, you hit 335 00:26:07.240 --> 00:26:10.920 on something new that just donna mean you talked about early in the show, 336 00:26:11.000 --> 00:26:15.680 like you're commanding officer and so forth. So I think this is one of 337 00:26:15.680 --> 00:26:18.720 the unique things. Not discussing this article we've been referencing, but it just 338 00:26:18.759 --> 00:26:25.559 came to uh, top of my head is that when you're trained to um 339 00:26:26.519 --> 00:26:30.000 uh fall in line right with your chain of command. Right, and when 340 00:26:30.000 --> 00:26:37.559 you get a command or from your superior officers, you know, you're just 341 00:26:37.680 --> 00:26:40.920 wired, hard wired to do that, right, you don't really ask questions, 342 00:26:41.000 --> 00:26:44.799 right and um. And so this could be another case of a cyber 343 00:26:44.799 --> 00:26:51.160 criminal saying that email of the communication is coming from your commanding officer, and 344 00:26:51.440 --> 00:26:56.000 you're trained not to say no or ignore that or right. That's another layer. 345 00:26:56.079 --> 00:27:00.319 Right. Well, well, I think the most defensive way of looking 346 00:27:00.359 --> 00:27:03.880 at this kind of self is that your command also probably would never send you 347 00:27:03.920 --> 00:27:11.279 an email to Gmail, okay, hotmails. It's usually a military domain such 348 00:27:11.319 --> 00:27:15.039 as Navy dot MEO, at Force dotvail or whatever. You're a military email 349 00:27:15.079 --> 00:27:19.079 address. But even when you get that and it's asking you out of the 350 00:27:19.240 --> 00:27:22.680 out of the ordinary request, you know, for something financial or what have 351 00:27:22.799 --> 00:27:26.160 you, Uh, it just behooves you to say, let me blink, 352 00:27:26.640 --> 00:27:30.039 let me just call Tom or Ted or Susan or whoever it is, right 353 00:27:30.400 --> 00:27:33.960 and say did you request this? Like no, I have no idea what 354 00:27:33.960 --> 00:27:37.400 you're talking about, right or yes? And then you obviously you know if 355 00:27:37.400 --> 00:27:41.200 you get the confirmation from the person, not a bot or a digital you 356 00:27:41.240 --> 00:27:44.960 know, demand or command. What I got something to say. I was 357 00:27:45.000 --> 00:27:48.880 in a nave for twenty years and uh and sometimes you know the U. 358 00:27:48.000 --> 00:27:52.799 S. Navy sailors, right, those invisions do not and do not like 359 00:27:52.880 --> 00:27:56.440 to spend money. So I'm pretty sure if they own the ship, they're 360 00:27:56.480 --> 00:28:00.279 gonna go a route to the commanding officer state room and not on the door, 361 00:28:00.440 --> 00:28:03.880 right Yeah, yeah, sir, I have a question to ask you, 362 00:28:03.160 --> 00:28:10.519 right that five transfer you wanted me to transfer to Ohio the city of 363 00:28:10.640 --> 00:28:14.279 Stay I've never been to. Yes, Um, okay to last times because 364 00:28:14.319 --> 00:28:18.119 we're almost running out of time here, so um, I'm gonna mention, 365 00:28:18.160 --> 00:28:22.720 um, you know another scam that they're very aggressive about fraud, uh, 366 00:28:22.759 --> 00:28:26.200 increasing on Zell for example. But I want you to maybe wrap up unless 367 00:28:26.200 --> 00:28:30.480 you have obviously any other points. But you've referenced this before. But uh, 368 00:28:30.599 --> 00:28:34.799 talk to us in a second about multi factor offic authentication. Right. 369 00:28:36.119 --> 00:28:40.119 But um, but speaking of zel, so I've I've I haven't used Zell 370 00:28:40.160 --> 00:28:41.440 a whole lot in the past, but I'm seeing it seems like I'm using 371 00:28:41.440 --> 00:28:45.480 it more and more often. And you have to type in that person's phone 372 00:28:45.559 --> 00:28:49.200 number or email, and when you see the picture or something aligned, you 373 00:28:49.240 --> 00:28:55.119 figure it's legit, right, But once it's been transferred digitally, it's you 374 00:28:55.160 --> 00:28:57.319 know, I'm sure they have safeguards in place, but it's a whole more 375 00:28:57.400 --> 00:29:02.720 complicated to say, oh, you know, Dwayne, that that transfer never 376 00:29:02.759 --> 00:29:07.599 got to you, so obviously it got intercepted. Um and to contact those 377 00:29:07.640 --> 00:29:11.599 financial institutions get that money re routed. I mean, that's you're talking about 378 00:29:11.920 --> 00:29:15.319 Pandora's box right right. So you know, the easiest way to approach any 379 00:29:15.359 --> 00:29:21.240 of this is too is to be wise about what you do, because once 380 00:29:21.279 --> 00:29:23.799 the transaction go in place, it is hard to we coop that more to 381 00:29:23.880 --> 00:29:29.960 reverse that, okay, because because we know there are thousands and points in 382 00:29:30.000 --> 00:29:33.480 a digital world, right okay, but to track money down as it goes 383 00:29:33.559 --> 00:29:40.720 through this digital world is increasingly hard. Okay, you probably would never receive 384 00:29:40.839 --> 00:29:45.480 that money back again, yeah, because and there are some of those like 385 00:29:45.799 --> 00:29:48.599 um venmo and so forth that have that built into maybe paypala some of these 386 00:29:48.839 --> 00:29:52.039 how built in it is that because I I did it a while back, 387 00:29:52.079 --> 00:29:56.079 it was a small transaction. That's another kind of um. You know again, 388 00:29:56.079 --> 00:29:59.599 a tip, because we talked about a lot of the with the cyber 389 00:29:59.599 --> 00:30:03.319 criminals. So do here's how you can react to that. Right, So 390 00:30:03.359 --> 00:30:06.920 say, hypothetically, Dwayne reaches out to me and says, uh, rich, 391 00:30:07.039 --> 00:30:10.400 here's a request from ZL for five dollars, right, And I know 392 00:30:10.519 --> 00:30:12.759 Dwayne sounds legit, and we did. We had something that you know, 393 00:30:12.960 --> 00:30:18.680 um uh, you know there was some reason for five rings of bell whatever, 394 00:30:18.759 --> 00:30:19.960 right, some types of transaction? What what have you? Right? 395 00:30:21.880 --> 00:30:23.319 And so I go, I want to you know, pay him through Zel, 396 00:30:23.920 --> 00:30:27.559 But either I reach out to you again directly, um from a phone 397 00:30:27.640 --> 00:30:30.240 number I know, and talk to you. Is that the five requested? 398 00:30:30.319 --> 00:30:33.240 No, it was supposed to be a hundred right or fifty dollars? They 399 00:30:33.279 --> 00:30:36.839 added a zero to it, right, and or which you can do. 400 00:30:36.880 --> 00:30:41.160 Another safeguard is a tip is if it everything adds up, it makes sense. 401 00:30:41.559 --> 00:30:42.640 But you know, I'm not a hundred percent sure if that's the right 402 00:30:42.680 --> 00:30:47.559 email, that's connected with your ZEL account, that's connected to your bank account, 403 00:30:47.640 --> 00:30:49.279 rounding number, all that stuff. I send you a simple transaction a 404 00:30:49.319 --> 00:30:52.400 dollar, right, and then you confirm on your end, yes, I 405 00:30:52.400 --> 00:30:56.240 got the dollars. So now I know you're gonna get the other four nine. 406 00:30:56.799 --> 00:31:00.160 You know what. That's that's a very smart concept. Thank you everyone. 407 00:31:00.160 --> 00:31:03.559 So I have a bright idea. I mean, we have the we 408 00:31:03.640 --> 00:31:08.000 have the studio lights turned on high high beams. So maybe that helps superstar, 409 00:31:08.519 --> 00:31:15.440 you are the superstar rich I that that works well, right, because 410 00:31:15.680 --> 00:31:18.279 if you send out a dollar, right, and then I call you or 411 00:31:18.319 --> 00:31:22.440 see you, yeah, it's it's it's like this, okay. So so 412 00:31:22.519 --> 00:31:26.079 you do a test first, you know, you're testing it out first, 413 00:31:26.160 --> 00:31:29.920 just to go and make sure you know, that's that's part of the cyber 414 00:31:30.000 --> 00:31:33.039 census there, okay, and trying to use your cyber census and and to 415 00:31:33.160 --> 00:31:40.519 identify how can you minimize any any issue because see the idea is that is 416 00:31:40.519 --> 00:31:44.000 that the person is trying to authenticate, right, okay, the first right, 417 00:31:44.359 --> 00:31:49.200 that's exactly what is happening. Okay, let me let me authenticate the 418 00:31:49.240 --> 00:31:53.160 person and in the account, because you don't want to send out ten thousand 419 00:31:53.200 --> 00:31:56.039 dollars. Maybe you send out a dollar. Yeah, but if you but 420 00:31:56.079 --> 00:32:00.279 if you lose a dollar, it's not gonna hurt too much, not a 421 00:32:00.279 --> 00:32:02.079 game changer. You might have to skimp on your coffee and not they have 422 00:32:02.200 --> 00:32:07.119 the extra vente latte or whatever you are. But it reminds me of a 423 00:32:07.119 --> 00:32:14.200 famous quote by a famous president that said trust but verify. Right, So 424 00:32:14.279 --> 00:32:17.359 you can't live in a cave and not do anything online and just figure you 425 00:32:17.359 --> 00:32:20.640 know, you're gonna put all your money on our mattress whatever. Right, 426 00:32:21.319 --> 00:32:25.039 um so uh yeah, okay, so the last topic unless obviously you want 427 00:32:25.039 --> 00:32:30.640 to add anything to this, but I think that topic that you've defined in 428 00:32:30.720 --> 00:32:37.880 previous podcasts, uh behooves to reiterate again this this concept of multi factor authentication. 429 00:32:38.160 --> 00:32:42.160 Yeah, what does that mean in layman's terms? Something that you know 430 00:32:42.319 --> 00:32:46.240 and something you have. Okay, So so you think about, um, 431 00:32:46.359 --> 00:32:52.880 now, when you probably have to log onto certain websites, right when you 432 00:32:52.960 --> 00:32:55.319 put in your music name of past where then it will sent a code to 433 00:32:55.359 --> 00:33:00.400 your yeah or something like that, right, which is a soft token. 434 00:33:00.599 --> 00:33:04.480 Okay, Well, you also can have a hard token, which is a 435 00:33:04.519 --> 00:33:09.440 token device that will go and have have a token code on there and and 436 00:33:09.480 --> 00:33:15.440 when you put your user name and password in, it will go and um 437 00:33:15.480 --> 00:33:21.799 it will go and ask for that code from your particular token device, which 438 00:33:21.839 --> 00:33:24.160 is a hard token. Right. So, so when you think about multi 439 00:33:24.319 --> 00:33:30.480 factor authentication. It is about something you know and something you have. Okay, 440 00:33:30.519 --> 00:33:34.559 all right, so so you know you're using name and password, right, 441 00:33:34.759 --> 00:33:37.759 so what you have is a token. Yeah, okay, so it's 442 00:33:37.799 --> 00:33:40.839 two levels. Now. Now I want to add on that too, is 443 00:33:40.880 --> 00:33:45.559 that there's a third level, which is called something you are. It's where 444 00:33:45.599 --> 00:33:50.279 you add in some biometrics, okay, prints or whatever. You know, 445 00:33:50.400 --> 00:33:54.319 your eyes scanning your eyes, you know, your fingerprints, or you put 446 00:33:54.400 --> 00:34:00.559 the palm or your hand down in this little decoder or something that. Right. 447 00:34:00.599 --> 00:34:04.559 So so those are some ways to protect yourself. But I will say 448 00:34:04.559 --> 00:34:12.000 that probably about of the website works so much under m f A. I 449 00:34:12.079 --> 00:34:15.239 know for a fact they're probably a few that do not use m f A. 450 00:34:16.039 --> 00:34:20.760 But I would tell to use it to search options on that. Okay. 451 00:34:20.960 --> 00:34:24.920 Now, the shots with m f A is that that you would need 452 00:34:24.960 --> 00:34:29.840 to have ass to your email or cell phone so you can get a code 453 00:34:29.920 --> 00:34:31.800 or something like that. Right. Yeah. Sometimes it's been annoying, Like 454 00:34:31.880 --> 00:34:36.239 we use the service Fiber and some other services they do that that code, 455 00:34:36.679 --> 00:34:40.400 but I'm on my phone, um respond to their email, but they send 456 00:34:40.440 --> 00:34:44.559 me a text. I have to leave my email to check the text and 457 00:34:44.599 --> 00:34:47.159 get the code, and then I go back to the email enter in that 458 00:34:47.239 --> 00:34:52.559 code, but it's um, it doesn't accept it because I kind of left 459 00:34:52.559 --> 00:34:54.679 my email and you go in this kind of circle. But they're kind of 460 00:34:54.679 --> 00:34:59.559 rectifying some of that. So, UM, what you just want to mention 461 00:34:59.599 --> 00:35:02.559 about, UM, you know the token. One of the newest trends I'm 462 00:35:02.599 --> 00:35:07.239 kind of seeing is when you're paying online. A lot of these companies don't. 463 00:35:07.360 --> 00:35:12.239 There seems like only a handful of them, but it's becoming more more 464 00:35:12.280 --> 00:35:14.800 prominent. A matter of fact, that we're using a new widget and it 465 00:35:14.840 --> 00:35:17.360 was asking if we wanted to add this feature to our service, and the 466 00:35:17.599 --> 00:35:23.280 premises it asked you you can type in your your credit card number and so 467 00:35:23.360 --> 00:35:27.480 forth, expiration date, or they ask you to scan your card take a 468 00:35:27.519 --> 00:35:31.639 picture of that card. That means that because typically a cyber security UM, 469 00:35:31.880 --> 00:35:36.840 cyber's criminal is what it says. They're on the cyber there on the internet, 470 00:35:36.920 --> 00:35:39.840 right, and they've access to your information, but they typically don't won't 471 00:35:39.880 --> 00:35:43.880 have that physical card. You're the person, the card holder that has it 472 00:35:43.960 --> 00:35:46.840 in your hand, right and and UM, so it's more likely they have 473 00:35:46.960 --> 00:35:51.440 access to your digital assets rather than your physical asset. Obviously, your card 474 00:35:51.480 --> 00:35:53.519 can be stolen and lost and then you freeze it over right, But if 475 00:35:53.519 --> 00:35:57.559 your card is in your hand, and that's the newest thing, you know, 476 00:35:57.599 --> 00:36:00.039 I grabbed my cell phone and I just it's not even a QR code. 477 00:36:00.039 --> 00:36:04.000 It just scans the front of the back of your card with all the 478 00:36:04.000 --> 00:36:09.559 digits that tells the company that you actually have that card and it's not being 479 00:36:10.199 --> 00:36:15.760 hasn't been on the dark web, you know, as a digital real estate, 480 00:36:15.920 --> 00:36:21.719 you know what I am a component of digital advancement and living into a 481 00:36:21.920 --> 00:36:25.840 digital age. But I think you just have to realize how forward they want 482 00:36:25.840 --> 00:36:30.360 to go into the digital age, because you do have options. You know, 483 00:36:30.440 --> 00:36:37.039 it's out there, but try not to expose yourself as much as possible 484 00:36:37.159 --> 00:36:44.239 and try to you know, and being a soft target because the more you 485 00:36:44.360 --> 00:36:47.599 use these applications and other things like that, you can be exposed. But 486 00:36:49.800 --> 00:36:53.119 you know, I just kind of think that if someone wants to uh paid 487 00:36:53.119 --> 00:36:57.239 by their cell phones, you know, you swipe the QR code or whatever 488 00:36:57.280 --> 00:36:59.719 you know that's on you. But at the same time, you know, 489 00:36:59.719 --> 00:37:01.760 for you need to understand the risk that I impose because we live in a 490 00:37:01.800 --> 00:37:07.360 digital world, and I think probably to each his own, but I think 491 00:37:07.360 --> 00:37:10.719 it's another good rule of thumb to say, um, at this benchmark, 492 00:37:12.519 --> 00:37:15.960 I'm not gonna do a hundred percent digital transaction, right, and set whatever 493 00:37:16.400 --> 00:37:22.199 money increment works for you. So anything over fifty hundred five hundred, you 494 00:37:22.239 --> 00:37:29.880 know, I'm gonna add another personal level of security or or authentication. Right. 495 00:37:30.280 --> 00:37:31.760 So if you're at a coffee shop whatever, and you know, or 496 00:37:32.400 --> 00:37:37.519 making a transaction less than fifty bucks, um, you know, the worst 497 00:37:37.519 --> 00:37:42.079 case scenario, you lose that, not recoup it. Right. But it's 498 00:37:42.079 --> 00:37:45.039 different if you're dealing with a mortgage or something, or a car payment or 499 00:37:45.079 --> 00:37:47.039 it. Right. Yeah, you know, you know rich a hundred of 500 00:37:47.920 --> 00:37:51.400 but you know the that's two in a row. Well, you know, 501 00:37:52.239 --> 00:37:53.719 if we had more time, I could reach the three, but we're almost 502 00:37:53.719 --> 00:37:55.760 out of time. Yeah, you know, I'm gonna make this quick. 503 00:37:57.199 --> 00:38:01.119 The worst thing about using cash, yeah, versus digital currency is that when 504 00:38:01.119 --> 00:38:07.320 you use cash and you know you might not get your change back. You've 505 00:38:07.320 --> 00:38:08.920 been hold on that one for a while. It sounds like it's like the 506 00:38:09.000 --> 00:38:14.360 Yogi Berra comment what it was. It says cash is almost as good as 507 00:38:14.400 --> 00:38:17.880 money. Yeah, alright, on that note, uh doing any closing uh 508 00:38:19.039 --> 00:38:22.519 comments are called action for us for you and your listeners. Yeah. Yes, 509 00:38:22.719 --> 00:38:25.480 if you're a listener out there, please please sign up for my Facebook 510 00:38:25.519 --> 00:38:30.760 page. It's called the Chief of Cybersecurity and if you have any questions about 511 00:38:30.760 --> 00:38:35.280 cybersecurity. That is a repository so that I can answer questions that you may 512 00:38:35.360 --> 00:38:40.480 have concerned and the cybersecurity echosystem and you stay cyber safe. See you next time.

Other Episodes

Episode 3

February 26, 2024 00:20:49
Episode Cover

CISA Has Healthcare Covered, This Podcast Tells You Why

In this informative video, we delve into the crucial role played by the Cybersecurity and Infrastructure Security Agency (CISA) in safeguarding public health care....

Listen

Episode

September 20, 2021 00:30:47
Episode Cover

Cybersecurity Mindset

This podcast session brings into existence of how having a cybersecurity mindset resolves industry problems by being cyber-focused. It provides a chance for listeners...

Listen

Episode 2

January 23, 2024 00:24:25
Episode Cover

How Does The Federal Government Modernization Strategy Affect Cybersecurity?

Cybersecurity modernization has several connectors and outcomes. The methodology requires the federal government to consider change, protection, and return on investment. Many agencies, such...

Listen