Secret Tips On Addressing The Cybercrime Growth Part 2

January 09, 2023 00:28:09
Secret Tips On Addressing The Cybercrime Growth Part 2
Chief of Cybersecurity
Secret Tips On Addressing The Cybercrime Growth Part 2

Jan 09 2023 | 00:28:09

/

Hosted By

Dewayne Hart

Show Notes

While many online scams have originated out of older schemes, scammers are always finding new ways to play them out. Scammers love to pose as legitimate organizations like banks, hoping to trick you into handing over details, but as we’ve become accustomed to dealing with organizations online, the potential for trickery has grown exponentially.This podcast extends information on cybercrime towards scams, criminals stealing information, and persistent criminals.

View Full Transcript

Episode Transcript

WEBVTT 1 00:00:05.080 --> 00:00:09.279 Wow, it's three. Can you believe it? Rich casting over here in 2 00:00:09.320 --> 00:00:13.919 Atlanta in our Global Podcasts Studios headquarters, and we've got the man of the 3 00:00:13.919 --> 00:00:19.079 hour, Dwayne Hart. I'm gonna call you Mr Cybersecurity or Mayor of Cybersecurity 4 00:00:19.160 --> 00:00:22.239 or the Governor of the President. But this guy wears lots of hats in 5 00:00:22.280 --> 00:00:25.600 this industry, and we've got some great ground to cover what we had a 6 00:00:25.600 --> 00:00:29.559 phenomenal twenty two. I hope you listen to that wrap up episode what happened 7 00:00:29.600 --> 00:00:35.479 in two? But happy New Year man, welcome Dwayne to Can you believe 8 00:00:35.520 --> 00:00:40.840 It's Yes, I can believe its three. There was a lot of success 9 00:00:40.920 --> 00:00:47.280 in two. What the cyberge gonna mindset? But but in three we're gonna 10 00:00:47.280 --> 00:00:53.880 take it to the next level because as technology grows, the podcast has to 11 00:00:53.920 --> 00:00:57.200 grow as well. Exactly want to take it to the next level? Yeah, 12 00:00:57.320 --> 00:01:02.560 So again, Um, anything piques your interest during this show, just 13 00:01:02.640 --> 00:01:06.040 check out Dwayne Heart dot com. Allow it to always give the call to 14 00:01:06.079 --> 00:01:10.319 accent the opening the show because as a podcast listeners, UM sometimes that I'll 15 00:01:10.319 --> 00:01:11.719 make it in the show where I'm waiting to find out how how do I 16 00:01:11.719 --> 00:01:15.799 reach this dude? Right? So um. But speaking of Dwayne Hart so 17 00:01:15.920 --> 00:01:19.480 UM, he's our guests here in the studio. UM, and we just 18 00:01:19.519 --> 00:01:23.480 can't believe it's got some exciting news to announce some announcements. But first let's 19 00:01:23.680 --> 00:01:26.640 pick back up where we left off our last episode last year. We were 20 00:01:26.680 --> 00:01:33.239 talking about in the last episode about cybercrime, why it's growing, and why 21 00:01:33.239 --> 00:01:37.560 criminals are succeeding UM, and we talked about the analogy of UH. We 22 00:01:37.640 --> 00:01:44.319 think about cybercrime as something completely outside the box, but it's really basic business 23 00:01:44.319 --> 00:01:49.120 one oh one, right, what you're doing in business. These guys and 24 00:01:49.159 --> 00:01:53.319 gals are doing in quote air quotes their business, which is the business of 25 00:01:53.359 --> 00:01:57.319 trying to hack and make a profit off of you, your industry or you 26 00:01:57.840 --> 00:02:00.560 as an individual. So the six top picks UH real quick and bullet point. 27 00:02:00.719 --> 00:02:05.239 In our last episode, we talked about number one, how they're targeting 28 00:02:05.239 --> 00:02:07.280 people and finding the weakest link. They're doing their homework, much like in 29 00:02:07.280 --> 00:02:10.360 business, you've got to find your customers, research them. And then finally 30 00:02:10.400 --> 00:02:14.199 we talked about the numbers game. So much like in business, it's a 31 00:02:14.240 --> 00:02:16.479 matter of how many phone calls or emails you're gonna send. That's what they're 32 00:02:16.479 --> 00:02:20.840 doing so uh. Today, in the second part of this series, we're 33 00:02:20.840 --> 00:02:24.919 gonna talk about um the remaining three points, which are scams keep evolving. 34 00:02:25.520 --> 00:02:30.560 Uh. Patients pays off in criminal operating from anywhere. So let's talk about 35 00:02:30.599 --> 00:02:35.960 scams much like a business. So technology advances, so in cybersecurity, you 36 00:02:35.960 --> 00:02:39.599 know, they're looking at new opportunities for um, you know, ways to 37 00:02:39.680 --> 00:02:45.639 scam. So what are some examples of um, uh you know, techniques 38 00:02:45.680 --> 00:02:47.759 they use in terms of scams. What are some uh, you know, 39 00:02:47.840 --> 00:02:53.879 schemes and that kind of thing. Okay, Now everyone is all custom tottle 40 00:02:53.960 --> 00:03:00.000 emails that they get and stayed and that that somebody has a check and um 41 00:03:00.080 --> 00:03:02.199 that that they're not from the US, and there's a million dollars in the 42 00:03:02.240 --> 00:03:06.759 bank account that they're trying to get rid of. So so I think the 43 00:03:06.840 --> 00:03:10.080 citizens and the people have gotten smarter and not to engage into that scap. 44 00:03:10.919 --> 00:03:15.840 Here goes another part of the scams that are happening is that people need assets 45 00:03:15.879 --> 00:03:20.840 to your personal information, like your banking account. All right, So you 46 00:03:20.879 --> 00:03:25.159 get a Bogos web link and you go up there and and if you're told 47 00:03:25.199 --> 00:03:29.240 that you need to change your password, you need to update your information. 48 00:03:29.840 --> 00:03:32.319 Right, then you put the information in the Buggles website and it says in 49 00:03:32.360 --> 00:03:39.560 a repository somewhere where someone can have someone can carry out a cyber cyber attack. 50 00:03:39.719 --> 00:03:45.560 Now, now, the other type of schemes out there too, is 51 00:03:45.599 --> 00:03:53.639 that if you are you are using online um site the shop okay, and 52 00:03:53.879 --> 00:03:55.960 you know it sounds like a really good deal, and it's usually have from 53 00:03:57.000 --> 00:04:00.080 because your profile. You know, someone profiles you and learns that you like 54 00:04:00.159 --> 00:04:02.680 a certain pair of shoes and something like that, and so they send your 55 00:04:02.680 --> 00:04:06.639 email and and so you go to this website, and and you think it's 56 00:04:06.680 --> 00:04:12.120 a deal, right, and it's kind of not a not a deal. 57 00:04:12.879 --> 00:04:16.519 It's really a honeypot that you've fallen into, you know, which is a 58 00:04:16.560 --> 00:04:23.680 criminal honey pot. I always like to think that the type of crimes that 59 00:04:23.720 --> 00:04:30.639 are curring mostly targeted for personal or financial game. So, you know, 60 00:04:30.680 --> 00:04:34.079 without going into deep and talking about all the different type of crimes out there, 61 00:04:34.480 --> 00:04:38.120 just think about all the ways that someone can steal your money. Just 62 00:04:38.160 --> 00:04:43.439 think about all the ways someone can gain your personal information. And usually it 63 00:04:43.519 --> 00:04:51.240 happens because either a ransomware attack or somebody go to a bogus website. I 64 00:04:51.360 --> 00:04:59.399 think that now citizens are probably over the fact of letting their laptops stay open 65 00:05:00.079 --> 00:05:01.800 right in a public setting or even in their office. Right. Yes, 66 00:05:01.879 --> 00:05:06.839 WiFi, WiFi settings and Starbucks. You know, they are some other features 67 00:05:06.879 --> 00:05:12.879 as for ads, say passwords, um, you know, for password managers 68 00:05:13.120 --> 00:05:18.040 using Google and so forth. That's I think that's an that sent in like 69 00:05:18.079 --> 00:05:23.920 an enclosed environment and um, you know it's optional, but you know you 70 00:05:23.959 --> 00:05:26.639 still have to be careful about that. Yeah, I'm thinking two things for 71 00:05:26.680 --> 00:05:30.519 the new year. Right, So, um, often you know, when 72 00:05:30.560 --> 00:05:35.800 you're engaging with a uh, some type of organization, you know, it's 73 00:05:35.839 --> 00:05:40.240 likely that they can say, hey, we're updating our new policies and procedure 74 00:05:40.240 --> 00:05:43.639 for for the new year three right, and so you need to update your 75 00:05:43.680 --> 00:05:46.360 you know, agreed to these terms. A lot of those are legitimate. 76 00:05:46.519 --> 00:05:49.839 But that's another opportunity for that that window that cyber hacker can you know, 77 00:05:49.879 --> 00:05:55.959 access for information. And then um, and then secondly, they're as excited 78 00:05:56.000 --> 00:05:58.639 about the new year as well, a new I don't know if you saw 79 00:05:58.680 --> 00:06:00.360 this. This is a recent article. I thought this was you know, 80 00:06:00.480 --> 00:06:04.160 fascinating in a kind of a crazy kind of sense. But talking about how 81 00:06:04.319 --> 00:06:11.800 um, these bad actors have grown in boldness innovation. Talk about touch screens, 82 00:06:12.240 --> 00:06:18.040 so um they've actually there's another hack for cyberski. The experts have even 83 00:06:18.079 --> 00:06:24.000 seen what appears what on your digital touch screen laptop, what appears like a 84 00:06:24.839 --> 00:06:28.879 human hair follicle they're gonna swipe, or a flea or dust particle that you 85 00:06:28.879 --> 00:06:32.160 want to clean your screen with. They actually create that, um like on 86 00:06:32.199 --> 00:06:35.839 a website that looks like there's a piece of hair on your screen, see 87 00:06:35.879 --> 00:06:40.439 what I'm saying, and you swipe to get that that um, that hair 88 00:06:40.519 --> 00:06:44.720 off your screen, and it downloads malware. That's pretty wild, right, 89 00:06:44.800 --> 00:06:49.639 talk about innovation, I mean yeah, yeah, that part of innovation. 90 00:06:50.160 --> 00:06:56.399 But you know there's something that I always like to say, is that that 91 00:06:56.439 --> 00:07:00.759 you just have to be careful. Okay, spice about using different difference technology. 92 00:07:00.839 --> 00:07:04.360 Now, maybe turn off your computer when you're cleaning your screen, you 93 00:07:04.399 --> 00:07:09.279 know. Start there. Well, well, that's some scams going around, 94 00:07:09.360 --> 00:07:15.240 like the imposta scam. Okay, uh, you know it's just you know, 95 00:07:15.279 --> 00:07:19.480 it's faking to be a femine member so that you can wire money, 96 00:07:19.680 --> 00:07:25.040 right all right, you know, if you are a parent and you get 97 00:07:25.079 --> 00:07:29.279 this little text metchage or let's say an email your college kid is in trouble. 98 00:07:29.720 --> 00:07:32.839 College kids in trouble, call your kid right first before you start, 99 00:07:33.360 --> 00:07:38.439 right, yeah, yeah, yeah, but you know that's that's what she 100 00:07:38.480 --> 00:07:42.519 would occur. You know, not only that, it's another one called you've 101 00:07:42.600 --> 00:07:46.160 won scams. Right, okay, you just want a million dollars. You 102 00:07:46.160 --> 00:07:50.800 need to switch information in here because you went to the concert and your ticket 103 00:07:50.879 --> 00:07:57.360 was drawing as a potential winner or something like that. Right, and um, 104 00:07:57.399 --> 00:08:01.560 you know the health healthcare scams as well too. Okay, you know, 105 00:08:01.720 --> 00:08:05.040 well you need to report to your doctor's office. You need to go 106 00:08:05.120 --> 00:08:07.959 to this website. You need to put this information in. Um if you 107 00:08:09.079 --> 00:08:11.879 reply back which are so security number, then then you know we can update 108 00:08:11.920 --> 00:08:16.319 your record. Does that this one? Oh? I got another one too. 109 00:08:18.000 --> 00:08:22.120 Tech support scams. Now those other ones that you have to watch out 110 00:08:22.600 --> 00:08:30.519 because someone caused you and state that you have a problem with your laptop that 111 00:08:30.600 --> 00:08:37.519 has not been identified and so they're calling from HP tech support and usually with 112 00:08:37.679 --> 00:08:43.080 tech support they want remote access to the laptop so to get your road assets. 113 00:08:43.159 --> 00:08:48.279 So you're giving a foul link that is actually emailed to you and if 114 00:08:48.320 --> 00:08:52.759 you hit the file link, then it automatically creates a connection with the other 115 00:08:54.039 --> 00:08:58.879 person on the other end, which is the tech support person. And yeah, 116 00:09:00.720 --> 00:09:03.840 okay, so you so you have to be careful about that. That's 117 00:09:03.879 --> 00:09:05.759 got to be probably almost the worst, right, that's the holy grail because 118 00:09:05.759 --> 00:09:11.240 literally at that point you might as well just handed over your computer and your 119 00:09:11.759 --> 00:09:15.679 credit cards and everything to the right because what people have stored access as the 120 00:09:15.679 --> 00:09:18.440 computer. Basically it's like just handing them your computer with all of your passwords. 121 00:09:18.919 --> 00:09:22.519 Um, okay, so we got two more items to cover. We 122 00:09:22.559 --> 00:09:26.240 want to jump to three. So let's talk about Um, you know, 123 00:09:26.399 --> 00:09:31.399 it's again business one oh one practice and patients pays off. Right. These 124 00:09:31.440 --> 00:09:37.200 guys are persistent, yes, or yes they are. They are persistent because 125 00:09:37.240 --> 00:09:43.519 eventually, out of ten thousand people, you're gonna find one weakness. You're 126 00:09:43.519 --> 00:09:48.200 gonna find one person that's gonna follow to pray and to fall into track. 127 00:09:48.480 --> 00:09:52.120 And that's all you need, especially if there as an organization. And let's 128 00:09:52.159 --> 00:09:58.080 say if your user base is about three thousand people, right, and you 129 00:09:58.159 --> 00:10:03.720 have a very large footprint of that three thousand, imagine if one person you're 130 00:10:03.759 --> 00:10:09.039 tricked into giving assets to a hacker to the system. See, that's all 131 00:10:09.080 --> 00:10:13.639 it takes. So if they're persistent enough, eventually they're gonna find one person. 132 00:10:13.679 --> 00:10:18.519 But the way you counter that is to have that con is to have 133 00:10:18.799 --> 00:10:28.399 that consistent and continuous cybersecurity engagement where you are making employees aware of their surroundings 134 00:10:28.519 --> 00:10:37.360 and preventing those types of cyber texts from occurrent. Likewise, the larger your 135 00:10:37.399 --> 00:10:41.559 I T infrastructure, the more problems you're gonna have, all right, and 136 00:10:41.600 --> 00:10:46.200 it becomes increasing harder because that's a lot of cyber attacks that happen every day, 137 00:10:46.240 --> 00:10:48.840 but we don't know about them because companies don't publicize that all the time. 138 00:10:50.960 --> 00:10:54.759 Many many times these breaches take can take weeks to be discovered. So 139 00:10:54.840 --> 00:11:00.360 meanwhile, they're gleaning all your information and talk about patients. A lot of 140 00:11:00.360 --> 00:11:03.799 times they'll access your information, but they don't leverage it immediately, right or 141 00:11:03.879 --> 00:11:09.000 it's kind of a trickle effect, right, So they was drawing small amounts 142 00:11:09.000 --> 00:11:13.159 just to make sure everything's legit, and then out of nowhere proof you know, 143 00:11:13.360 --> 00:11:18.120 it's they're all in right. Well, you know what, because you 144 00:11:18.159 --> 00:11:22.720 know, the longer you reside on the system. It makes it seem like 145 00:11:22.759 --> 00:11:28.360 that you are legitimate, right, so so so on this obersecurity industry, 146 00:11:28.519 --> 00:11:33.519 there's something called rogue devices. Right. These are deemed as assets that just 147 00:11:33.600 --> 00:11:39.639 pop upon enterprise and you've never seen before. And imagine the enterprise that has 148 00:11:39.080 --> 00:11:45.159 about three hundred thousand assets. Right, And if you're a threat intelligent platform 149 00:11:45.360 --> 00:11:50.440 or if you're artificial intelligent platform and you're talking, people have not identified that 150 00:11:50.480 --> 00:11:54.720 asset and it sists there for three weeks. Well, you know, a 151 00:11:54.759 --> 00:12:01.159 person that works into threat monitoring and pretty much in it's cured operations center may 152 00:12:01.159 --> 00:12:03.240 say, okay, well it's been on the network for three weeks, and 153 00:12:03.279 --> 00:12:09.559 they may assume that it's okay, right, yeah, because it's been adapted 154 00:12:09.600 --> 00:12:13.399 as the norm motor. Yes, yes, yes, it has become a 155 00:12:13.440 --> 00:12:18.639 part of the infrascription. Now all right, so it's sitting there and oh 156 00:12:18.679 --> 00:12:22.840 wow, yes, yes, yeah, so it is legit. But this 157 00:12:22.919 --> 00:12:28.159 is why, this is why I've always thought of that that when someone has 158 00:12:28.240 --> 00:12:35.720 that human firewall concept, they're gonna investigate the information. Okay, you just 159 00:12:35.759 --> 00:12:39.240 don't look at an indicator and say that it's right or wrong. Now, 160 00:12:39.279 --> 00:12:43.519 this is part of the situational awareness and I and I always talk about the 161 00:12:43.559 --> 00:12:50.519 cyber senses and the environmental knowledge and knowing your surroundings because if you don't know 162 00:12:50.600 --> 00:12:58.080 your surroundings and cybersecurity, you can't identify what's right or wrong. Yeah, 163 00:12:58.159 --> 00:13:01.039 yeah, you don't know, um at if this is a good analogy, 164 00:13:01.080 --> 00:13:03.440 But kind of like what they're talking about is kind of this this drip approach 165 00:13:03.480 --> 00:13:09.279 where it's small and incremental. So maybe especially in a large organization, they're 166 00:13:09.279 --> 00:13:15.320 taking out relatively small withdrawals or small hacks, right, and it's not gonna 167 00:13:15.840 --> 00:13:18.480 become a blip on the radar, right, because they're they're balancing so many 168 00:13:18.559 --> 00:13:20.639 numbers. It's almost like, I don't know if this is a good analogy, 169 00:13:20.639 --> 00:13:24.960 but imagine you have a medium or small somewhat boat, right, and 170 00:13:24.000 --> 00:13:26.960 you have a handful of people in there, and they start adding one person 171 00:13:28.039 --> 00:13:30.519 at a time doesn't say like a big deal, but as to add more 172 00:13:30.559 --> 00:13:31.879 people, all of a sudden, the boat's gonna sink. But they don't 173 00:13:31.919 --> 00:13:35.799 attack it with a torpedo, right. Because again, if if you got 174 00:13:35.840 --> 00:13:39.720 if your entire system was hacked, you shut everything down, you go into 175 00:13:39.759 --> 00:13:43.480 insurance mode, and you go into recovery mode. But if it happens over 176 00:13:43.600 --> 00:13:48.120 weeks, months, or even years, it's too late at some point. 177 00:13:48.200 --> 00:13:50.480 Right, well, well, just going back to my theory there, when 178 00:13:50.519 --> 00:13:56.200 you when you look at these assets and people that on a system for about 179 00:13:56.440 --> 00:13:58.279 three weeks, stan, see, they become a part of the environment, 180 00:13:58.279 --> 00:14:03.360 which is the first stage. Right, let me build my profile like I'm 181 00:14:03.440 --> 00:14:07.639 legitimate, and then after that, let me see if I can get a 182 00:14:07.720 --> 00:14:13.320 dollar. If you find a thousand people and you take out a dollar, 183 00:14:13.919 --> 00:14:16.919 right, then you move on and you say, okay, then I'm gonna 184 00:14:18.000 --> 00:14:22.000 find fifty people and I'm gonna get ten cents out of the account, or 185 00:14:22.000 --> 00:14:26.480 even ten dollars. For a longer organization, nobody's gonna It's more of an 186 00:14:26.480 --> 00:14:30.279 annoyance to like figure out where is that ten dollars membership thing I signed up 187 00:14:30.279 --> 00:14:33.600 for or whatever. Yeah, if you got a bank account with what about 188 00:14:33.759 --> 00:14:37.080 two million dollars, I mean, are you trying you know that ten cents 189 00:14:37.080 --> 00:14:41.799 they came out of your account? Yeah? Yeah. But but see, 190 00:14:41.840 --> 00:14:48.159 the idea is that the presence if you are consistently engaged and if you look 191 00:14:48.320 --> 00:14:54.200 legitimate, and if you just draw smaller amounts over a particular time and it 192 00:14:54.240 --> 00:15:00.600 makes it looks like it's legit. And then one day you decided to greedy, 193 00:15:00.720 --> 00:15:05.159 right right, yeah, okay, you want to hit the lottery, 194 00:15:05.399 --> 00:15:11.840 and that's when the major disruptions happened. And when investigation happens, it funds 195 00:15:11.879 --> 00:15:16.480 out that somebody was on the asset printed much day, was on the network 196 00:15:16.559 --> 00:15:20.200 for three weeks and it was never identified. And especially if it goes on 197 00:15:20.320 --> 00:15:26.639 for that period of a year or there accounting year. In theory, once 198 00:15:26.639 --> 00:15:31.159 it's off the books, they're not going to revisit you know, last year's 199 00:15:31.200 --> 00:15:35.159 once they file those taxes and closed the books on that year, that hundred 200 00:15:35.200 --> 00:15:39.519 thousand that's you know the hackers got access to. They're not gonna revisit that, 201 00:15:39.600 --> 00:15:41.039 right because they've kind of closed the books and move on, right, 202 00:15:41.399 --> 00:15:43.879 Um, speaking of moving on, so we have one more topic before we 203 00:15:43.919 --> 00:15:48.840 jump into and what's happening again. You're listening to Rich Casting over here alongside 204 00:15:48.879 --> 00:15:52.240 Dayne Hart in the Global Podcast Studios and we're talking all things hybersecurity. UH. 205 00:15:52.240 --> 00:15:56.519 For these topics and more, check out Dwayne heart dot COM's our last 206 00:15:56.519 --> 00:16:02.480 topic, Dwayne about criminals and cyber crime and why they're succeeding is criminals can 207 00:16:02.519 --> 00:16:07.879 operate from anywhere, right They've so, so I think that most of the 208 00:16:07.960 --> 00:16:14.559 communities is definitely aware of the remote workforce. Okay, So you know, 209 00:16:14.639 --> 00:16:21.639 with the remote workforce, it has opened up um different type of attack vectors. 210 00:16:21.639 --> 00:16:23.600 Okay, when you think of an attack vectors, uh, you know 211 00:16:23.759 --> 00:16:30.759 that just saying that the interest into a network has has changed, not so 212 00:16:30.840 --> 00:16:36.440 much looking at all of the all of the devices that you have, okay, 213 00:16:36.519 --> 00:16:38.759 but just going and looking at the footprint of all the different assets that 214 00:16:38.840 --> 00:16:42.720 you have, okay, because the gateway is not open, you know. 215 00:16:44.000 --> 00:16:49.039 So, so when you have a remote workforce, you have a dispersed group 216 00:16:49.039 --> 00:16:55.759 of people that are located in different regions of the US, and and so 217 00:16:55.840 --> 00:17:00.720 what happens is that you have to ensure that that their wife, I and 218 00:17:00.000 --> 00:17:06.640 UM, that that communication channel channel is secure. But but most organizations are 219 00:17:06.759 --> 00:17:12.039 used on VPN, a virtual private network anyway is to kind of remediate that 220 00:17:12.079 --> 00:17:17.079 concern. But but if you think about actors, they can go operating in 221 00:17:17.119 --> 00:17:18.799 the middle of the ocean. Yeah, I mean as long as they have 222 00:17:19.359 --> 00:17:23.400 however WiFi something like that, they can they can be in a basement. 223 00:17:23.759 --> 00:17:26.000 You know, they can be in a cave. You know, they don't 224 00:17:26.039 --> 00:17:30.039 have to be down the street, oh no, or in your building. 225 00:17:30.440 --> 00:17:34.880 They can virtually be anywhere at any time. And uh. And they've been 226 00:17:34.920 --> 00:17:41.079 operating mostly in that in that space for for many many years. It's relatively 227 00:17:41.119 --> 00:17:45.119 new to most of the workforce. But now I think it should be more 228 00:17:45.160 --> 00:17:48.240 in your radar. If you can work from anywhere for your job, for 229 00:17:48.319 --> 00:17:51.880 your business, they can do the same, right, right, right. 230 00:17:52.079 --> 00:17:59.559 I've always brought into discussion and cybersecuted mindset when I talked about the hackers hack 231 00:18:00.359 --> 00:18:07.240 is that hackers operated in sales. A sale is a secret location and they 232 00:18:07.240 --> 00:18:11.559 share information. Right. They can be in a basement, they can be 233 00:18:12.279 --> 00:18:15.480 you know, I hate to say it is they can be they can be 234 00:18:17.440 --> 00:18:18.920 under Walmart somewhere. You know, I don't know if that's true. And 235 00:18:18.920 --> 00:18:25.039 now I'm just bringing up they can discussion. They can be an old building 236 00:18:25.160 --> 00:18:30.400 somewhere and and kara a cyber attack. Right. They can be in a 237 00:18:30.400 --> 00:18:32.799 foreign country where you're not gonna be able to track them. You know, 238 00:18:32.839 --> 00:18:36.880 they keep changing their IP addresses and so forth. So um so great great 239 00:18:36.920 --> 00:18:41.279 topics along this line. I think um uh, I think this will kind 240 00:18:41.279 --> 00:18:44.960 of summarize much of what we talked about is you should almost have this bumper 241 00:18:44.960 --> 00:18:48.240 sticker on or on your laptop, probably a post it note, if not 242 00:18:48.279 --> 00:18:52.799 some type of permanent on your post think before you click. Yeah, right, 243 00:18:52.119 --> 00:18:57.400 that's that would that would kind of like that would prevent probably upwards of 244 00:18:57.759 --> 00:19:02.680 your challenges, um, the headaches he might have as a result of a 245 00:19:02.759 --> 00:19:07.160 hacker. Well, what I think that I think the I think when people 246 00:19:07.200 --> 00:19:15.160 become more so accustomed to thinking, it becomes first nature. All right. 247 00:19:15.240 --> 00:19:18.960 It's it's it's something that is part of you every day. There's just like 248 00:19:18.039 --> 00:19:22.440 people get up and eat every day, right right, Well, well, 249 00:19:22.519 --> 00:19:27.599 to think before you click would be you know, at first nature to you, 250 00:19:29.079 --> 00:19:33.279 all right, so you automatically know not to click on that. See, 251 00:19:33.319 --> 00:19:37.759 it's like a growing process, you know, and and and just thinking 252 00:19:37.799 --> 00:19:42.039 about how their mindset operates. Because I will say that that if a reader 253 00:19:42.079 --> 00:19:47.920 engages into the cybergecuate of mindset, it becomes part of you as you start 254 00:19:47.920 --> 00:19:52.000 off talking about the cyber security culture and then moving on to a situation wherein 255 00:19:52.039 --> 00:19:56.279 it's and looking at risk bace thinking and then then it talks about transforming your 256 00:19:56.279 --> 00:20:02.119 mindset. And then the last piece is you put sobersecurity and action and what 257 00:20:02.240 --> 00:20:06.720 you need to do. All of this becomes part of a person and then 258 00:20:06.839 --> 00:20:11.799 they can think proactly about how they engage cybersecurity. Because I've had people that 259 00:20:11.359 --> 00:20:17.079 have inboxed me on LinkedIn and said, you know you've you made it very 260 00:20:17.119 --> 00:20:22.480 simple to understand how cybersecurity offers. I mean, but if you're unaware, 261 00:20:22.839 --> 00:20:26.960 as we all are at some point in our life. As a kid, 262 00:20:26.960 --> 00:20:30.000 you're unaware how to tie your shoe right. But once you learn that, 263 00:20:30.759 --> 00:20:33.680 you don't think, uh, you just do it right. You don't think 264 00:20:33.720 --> 00:20:37.359 about what uh string goes over the right hand the left hand, and how 265 00:20:37.400 --> 00:20:41.279 you're tying the knot right. Driving a car, I mean, it's kind 266 00:20:41.279 --> 00:20:45.200 of crazy. We've all been in that situation where you drive home and your 267 00:20:45.240 --> 00:20:48.680 mind is thinking elsewhere and you just you're on an autopilot and you just get 268 00:20:48.680 --> 00:20:52.319 home, get to your destination right. So you should have that mind repetition 269 00:20:52.359 --> 00:20:55.519 to putting in the reps, as they say, right for um and uh, 270 00:20:55.599 --> 00:20:57.559 what's great about this new year? In three? This is a great 271 00:20:57.599 --> 00:21:03.119 point um to kind of revisit, reevaluate. Um, uh, what may 272 00:21:03.119 --> 00:21:07.559 have happened in your business where hackers or there was a cyber issue. But 273 00:21:07.640 --> 00:21:11.039 more importantly to kind of you know, check in with Dwayne Hart. Go 274 00:21:11.079 --> 00:21:15.160 to the website, UM, check out the podcast, get a copy of 275 00:21:15.160 --> 00:21:18.559 the book. Whatever you need to do, um to do some research and 276 00:21:18.599 --> 00:21:22.480 prepare for right. So this is a good one whenever in business or in 277 00:21:22.480 --> 00:21:26.599 personal life. With all those New Year's resolutions, one of your New Year's 278 00:21:26.240 --> 00:21:33.960 resolutions should be what to engage into cybersecurity. I call it active involvement and 279 00:21:33.039 --> 00:21:38.200 operating cybersecurity from the front line. Just like before someone comes through your front 280 00:21:38.200 --> 00:21:44.359 door, you go check them out. Right, Well, guess what before 281 00:21:44.440 --> 00:21:49.720 you open that door, or pretty much before you even engage your laptop, 282 00:21:51.559 --> 00:21:56.519 then cybersecurity ship be in the front piece of your brain sales. Time to 283 00:21:56.559 --> 00:22:00.720 refresh things and probably a good time. Maybe much like they say, like 284 00:22:00.279 --> 00:22:03.880 daylight saving, it's time to change the battery and your smoke alarm. Um. 285 00:22:04.079 --> 00:22:07.160 The new year, at the very least, time to change all your 286 00:22:07.200 --> 00:22:10.519 passwords, right, you know, kind of reboot. So speaking of the 287 00:22:10.519 --> 00:22:12.519 new year, uh, kind of a rapid fire here, just a quick 288 00:22:12.559 --> 00:22:17.880 recap of something we talked about last episode, but it's coming up in So 289 00:22:18.000 --> 00:22:22.200 for your podcast, The Chap of Cybersecurity Podcast, you're going into season three 290 00:22:22.680 --> 00:22:26.400 right so, UM and we're gonna we're gonna close with a teaser about what's 291 00:22:26.400 --> 00:22:30.640 happening for book sales were um are rocking and rolling and you can get a 292 00:22:30.640 --> 00:22:34.160 copy again at Dwayne Haart dot com. Um and I'm gonna put you to 293 00:22:34.200 --> 00:22:37.440 ten seconds. I'm gonna start the timer right now, UM, talk to 294 00:22:37.480 --> 00:22:42.640 me in ten seconds about the book. The book itself has been doing outstanding. 295 00:22:44.240 --> 00:22:48.200 If you want to learn how to think correctly about trying to engage obvious 296 00:22:48.240 --> 00:22:53.000 security, go out and process the cybersecurity mindset great. And then conferences. 297 00:22:53.000 --> 00:22:56.839 You attended a number of conferences. I'm sure you're gonna be tending some of 298 00:22:56.839 --> 00:23:00.920 those again this year. UM live stream an UM that was a big hit 299 00:23:02.000 --> 00:23:06.720 and very interesting lunching in two. So you're gonna be doing more of the 300 00:23:06.759 --> 00:23:10.279 lime streams for this year as well. Oh yes, I want to bring 301 00:23:10.400 --> 00:23:15.720 influential people on the live scream because this year on the live screams is about 302 00:23:15.920 --> 00:23:18.680 the community. It's about you. What is it that you are doing in 303 00:23:18.720 --> 00:23:25.200 the world of cybersecurity that is so critical and that everyone wants to hear because 304 00:23:25.240 --> 00:23:29.440 I know you have a story to tell. Maybe you maybe you can share 305 00:23:29.559 --> 00:23:34.279 some knowledge on workforce development and have o those channel their career through the cybersecurity 306 00:23:34.480 --> 00:23:42.160 market. And maybe you're on LinkedIn and maybe you have a hundred thousand connections 307 00:23:42.160 --> 00:23:45.640 on LinkedIn and you have a lot of information to share for the community. 308 00:23:47.000 --> 00:23:51.160 So I would enjoy for you to come on my podcast session so I can 309 00:23:51.359 --> 00:23:56.960 engage with you and to take cybersecurity to the next level. Because there are 310 00:23:56.960 --> 00:24:00.599 some smart people at the end of the world in UM, I want to 311 00:24:00.640 --> 00:24:03.400 see who they are. Yeah, that's what's great about the livestream. Get 312 00:24:03.440 --> 00:24:07.079 to actually interact in real time, one on one with some of your your 313 00:24:07.119 --> 00:24:11.720 audience and um you know new members of the community, so to speak. 314 00:24:11.000 --> 00:24:15.359 But what's interesting for the podcast as well as live stream, UM is you're 315 00:24:15.359 --> 00:24:19.400 gonna be incorporating in twenty and this year three some industry experts as guests. 316 00:24:19.880 --> 00:24:23.920 Uh so doing someone on one interviewing and gleaning some of their information. UH 317 00:24:25.039 --> 00:24:27.960 talk to us about Also, UM, your you just created uh you're creating 318 00:24:29.000 --> 00:24:33.599 a sizzler reel um in front of a TV camera set experience talk to us 319 00:24:33.799 --> 00:24:37.920 in uh just a minute. Less about that. Here's a little secret from 320 00:24:37.920 --> 00:24:41.359 the audience. When it comes to a podcasting a live scream, I'm a 321 00:24:41.440 --> 00:24:45.799 very nervous person. And now it may not sound that I'm nervous, but 322 00:24:45.960 --> 00:24:49.000 trust me, when I walk into the studio and and it's lights, camera, 323 00:24:49.079 --> 00:24:55.279 actually I'm not nervous anymore. So I figured it out when I was 324 00:24:55.319 --> 00:24:59.920 doing my reel. Okay, and you know, the Realist designed to folk. 325 00:25:00.000 --> 00:25:02.960 It was more towards speaking because for this year, I want to get 326 00:25:03.000 --> 00:25:10.559 involved with more speaking engagements and to take the cybersecurity mindset concept onto the speaking 327 00:25:10.599 --> 00:25:14.880 stage, all right, because there are a great number of people that like 328 00:25:14.960 --> 00:25:18.839 to hear a great story. And you know, ever since I have been 329 00:25:18.039 --> 00:25:22.720 a youngster in this world, you know, my family tells me that I 330 00:25:22.799 --> 00:25:26.519 talked too much. So I decided to say, Okay, if I like 331 00:25:26.640 --> 00:25:30.079 to talk too much, then why why don't I go to a stage somewhere? 332 00:25:30.359 --> 00:25:34.440 Okay, exactly? We talk. Yeah, And that's what's exciting for 333 00:25:34.440 --> 00:25:37.319 this new year is that this has all been building towards that, right, 334 00:25:37.400 --> 00:25:41.759 the book, the podcast, the conferences, the livestream. What's exciting for 335 00:25:41.839 --> 00:25:48.400 this year is um UH taking the Sizzler Rule, which we were excited to 336 00:25:48.440 --> 00:25:53.039 help participate in creating that for you and now UM looking for speaking engagements and 337 00:25:53.079 --> 00:25:56.680 gigs. So, if you have an organization that would like to have Dwayne 338 00:25:56.720 --> 00:26:00.240 Heart speak at your event, this is your call to action. This is 339 00:26:00.279 --> 00:26:03.839 your invite to reach out to Dwayne at Dwayne Heart dot com. UM just 340 00:26:03.920 --> 00:26:07.079 contact him there. UM. Whether it's a organization, a nonprofit, whether 341 00:26:07.119 --> 00:26:11.519 it's a church, a government agency, military agency, UM, a company, 342 00:26:11.640 --> 00:26:18.759 right, UM, even some UM social organizations communities, banks for example, 343 00:26:18.799 --> 00:26:22.400 but also UM you know, any faith based organization. If you or 344 00:26:22.400 --> 00:26:29.720 your organization UM are concerned about cybersecurity or misinformed or want to learn more, 345 00:26:30.240 --> 00:26:33.079 this is an opportunity to engage with Dwayne and UH invite him out to speak 346 00:26:33.079 --> 00:26:37.160 at your event. UM. Maybe it's your your family's Fourth of July, 347 00:26:38.279 --> 00:26:42.319 whatever it is, right, So I'm gonna wrap things up, Dwayne and 348 00:26:42.519 --> 00:26:48.160 UH closing thoughts or UM comments you may have for the new year. Always 349 00:26:48.359 --> 00:26:52.559 oh yes, the any of the speaking topics I have. You can go 350 00:26:52.640 --> 00:26:57.119 to www dot Dwayne Heart dot com and as a link call speaking, and 351 00:26:57.400 --> 00:27:00.960 uh, there's the information on the topics that I'll be discussing, and I'm 352 00:27:00.960 --> 00:27:07.079 gonna bring up one I think that you would like the most. Okay, 353 00:27:07.119 --> 00:27:10.960 all right, here we go. It's called you heard it once, now 354 00:27:11.039 --> 00:27:15.680 here it again. Stop feeding the hackers appetite. That's a good one. 355 00:27:17.279 --> 00:27:22.559 Onto onto those. I am also doing some workshops and some seminars um pretty 356 00:27:22.599 --> 00:27:32.079 much on vulnerability management and the and the cybersecurity um leadership, and also focusing 357 00:27:32.240 --> 00:27:37.599 on the career development career development pipeline as well too. So so there's a 358 00:27:37.599 --> 00:27:41.960 lot of speaking engagements that actually can occur. So you go to my web 359 00:27:41.960 --> 00:27:47.519 page, book me and you can hear me talk on stage. He has 360 00:27:47.720 --> 00:27:51.079 very affordable speaking of fees, they're way less than a million dollars, so 361 00:27:52.039 --> 00:27:56.240 reach reach out right, all right, Dwayne. So look forward to having 362 00:27:56.240 --> 00:27:59.839 you back in the studio, and happy new Year to you, your family, 363 00:28:00.480 --> 00:28:03.640 um, all the people in your life. And uh we'll see you 364 00:28:03.640 --> 00:28:08.119 next time on the show. Thank you, m hm.

Other Episodes

Episode

June 13, 2022 00:33:40
Episode Cover

Building Security Engagements Into The Cyber Workforce

Every security steward has been challenged to obtain multiple certifications, gain professional experience, and further their knowledge by attending educational institutions. Each resume includes...

Listen

Episode 6

April 12, 2024 00:20:05
Episode Cover

Why AI and Hackers Are Becoming Closer

With technology rapidly advancing, hackers have adopted AI-driven tactics to carry out their cyber attacks with unprecedented sophistication. Join us on this captivating journey...

Listen

Episode

October 18, 2021 00:28:24
Episode Cover

Security Compliance and Risk Management – Why Are They Failing?

The technology industry engages challenges and concerns when compliance and risk management initiatives are developed. This podcast session brings into attention and outlines why...

Listen