loader from loading.io

AS HEARD ON - The Jim Polito Show - WTAG 580 AM: Tracking Stolen IPhones and New Coronavirus Business Threat

Craig Peterson - America's Leading CyberSecurity Strategist

Release Date: 06/09/2020

Do You Trust Homeland Security And The FBI For Your Cyber Security? show art Do You Trust Homeland Security And The FBI For Your Cyber Security?

Craig Peterson - America's Leading CyberSecurity Strategist

Do You Trust Homeland Security And The FBI For Your Cyber Security? What a week the FBI got hacked, Homeland Security supposedly is sending out emails about hackers in your network. This is what we're going to talk about to start with today. What are these new emails and how are they trying to con you? And can we trust the Feds for our Cyber Security? [Following is an automated transcript] This is a little bit concerning. We know that the FBI's email system got hacked. And for everyone that's sitting there saying gee, if the FBI gets hacked, there's no way my business can possibly survive an...

info_outline
Are You Ready For Your Car to Spy On You? It's Already the Law show art Are You Ready For Your Car to Spy On You? It's Already the Law

Craig Peterson - America's Leading CyberSecurity Strategist

Are You Ready For Your Car to Spy On You? It's Already the Law They pass the infrastructure bill, which means now it's time to figure out what is in the infrastructure bill. And we're going to talk about the technology that they decided to fund the technology that will win the game because it has billions of dollars of federal money behind it. [Following is an automated transcript] [00:00:16] This is disappointing, but it's normal, right? [00:00:20] It's absolutely normal because the federal government has always been one that picks winners and losers. If you're old enough, you remember, of...

info_outline
Do You Have a Smartspeaker? Another Danger Comes Your Way! show art Do You Have a Smartspeaker? Another Danger Comes Your Way!

Craig Peterson - America's Leading CyberSecurity Strategist

Do You Have a Smartspeaker? Another Danger Comes Your Way! By now, you've heard of tick talk. You might use Tik TOK. Many people do. It's their go-to site online, especially if you're a little on the younger side. Here is a danger of some of these tick talk challenges and combine that with Alexa. Oh my [Following is an automated transcript] This is a little bit on the scary side. We built our house some 25 years ago, we contacted a builder, and I put together all of the specs, and I made sure that the wood he used was better than average. [00:00:30] It's all plywood. It's not particle board or...

info_outline
Have You Checked If Your Email Is On The Dark Web? Let's Do It Now! show art Have You Checked If Your Email Is On The Dark Web? Let's Do It Now!

Craig Peterson - America's Leading CyberSecurity Strategist

Have You Checked If Your Email Is On The Dark Web? Let's Do It Now! Do you know how to find out if you have had your private information stolen? Well, you know, the odds are probably pretty bad, but where was it stolen? When? What has been stolen? How about your password and how safe is that password? We're going to show you real hard evidence, and what you can do to fix things! [Following is an automated transcript] [00:00:16] Knowing whether or not your data has been stolen and what's been stolen is very important. [00:00:24] And there is a service out there that you can go to. They don't...

info_outline
Are You Ready For the Next Hacker Wave? It's Going to Be Brutal! show art Are You Ready For the Next Hacker Wave? It's Going to Be Brutal!

Craig Peterson - America's Leading CyberSecurity Strategist

Are You Ready For the Next Hacker Wave? It's Going to Be Brutal! Right now, we're going to talk about this vulnerability, this huge vulnerability in almost the entire internet that will affect your life over the following number of years. And if you're a business, you better pay close attention. [Following is an automated transcript] [00:00:16] Well, we are looking at what is being called the single most significant, most critical vulnerability ever. [00:00:24] And if you want more information on this, have a look at last week's show, you'll find it up on my website. I talked quite a bit about...

info_outline
The Worst Internet Vulnerability Ever? And It Isn't Going Away Soon. What's Log4J? show art The Worst Internet Vulnerability Ever? And It Isn't Going Away Soon. What's Log4J?

Craig Peterson - America's Leading CyberSecurity Strategist

2021-12-18 1144 [00:00:00] Well, the tech world is all a buzz with this log for J or log for shell. However you want to call it because we are looking at what is probably the biggest security vulnerability the internet has had in a long time. [00:00:16] This is huge, huge, huge to chew. [00:00:19] I don't know how to express it anymore, but there are multiple problems here. And even the patch that was released to fix this problem was broken as being exploited in the last 24 hours. There've been no less than 30 different new. Variations of the exploit. So what is going on? There is a computer...

info_outline
Did Your Computer Have Did Your Computer Have "Intel Inside"? It Won't For long!

Craig Peterson - America's Leading CyberSecurity Strategist

Did Your Computer Have "Intel Inside"? It Won't For long! We're going to talk a little bit about shopping right now. Then we'll get into our chip crunch, and why Intel is being left on the side of the computer road. [Following is an automated transcript.] [00:00:16] There's lots of fun stuff to do. And it's kind of fun getting out of the house. Isn't it getting out, going out, going around? There's a, an outlet store close by where I live and it's kind of one of these outdoor. Outlet things. And it was fun. Just walking around, enjoying the little bit of fresh air, no matter what the weather...

info_outline
Do You Think There's Nothing You Can Do to Keep the Bad Guys Out? show art Do You Think There's Nothing You Can Do to Keep the Bad Guys Out?

Craig Peterson - America's Leading CyberSecurity Strategist

Do You Think There's Nothing You Can Do to Keep the Bad Guys Out? What a week. The FBI got hacked. Homeland security supposedly is sending out emails about hackers in your network. This is what we're going to talk about to start with today. What are these new emails, and how are they trying to con you? [Automated Transcript Follows] This is a little bit concerning. We know that the FBI's email system got hacked. And for everyone sitting there saying, well, gee, if the FBI gets hacked, there's no way my business can survive an attack. Remember that the FBI is a huge, huge target. They have so...

info_outline
Is Your Firewall Actually Protecting You? What Should You Be Doing? show art Is Your Firewall Actually Protecting You? What Should You Be Doing?

Craig Peterson - America's Leading CyberSecurity Strategist

Is Your Firewall Actually Protecting You? What Should You Be Doing? New stats are out this week. So what's the number one vector of attack against us? Our Firewalls. And they're failing. So, what's going on. And what can you do about it? [Automated transcript follows] [00:00:16] And of course, I'm always talking about cyber security, because if you ask me that is one of the biggest problems we have in business. [00:00:27] Today. Well, yeah, you got to find employees. In fact, uh, it's almost impossible to find them in the cyber security space as well. And it's been hard for years. So I try to...

info_outline
You Know How To Use Fake Email Addresses to Stay Safe? show art You Know How To Use Fake Email Addresses to Stay Safe?

Craig Peterson - America's Leading CyberSecurity Strategist

If you follow my newsletter, you probably saw what I had in the signature line the last few weeks: how to make a fake identity. Well, we're going to take it a little bit differently today and talk about how to stop spam with a fake email. [Automated transcript follows] [00:00:16] Email is something that we've had for a long time. [00:00:19] I think I've told you before I had email way back in the early eighties, late seventies, actually. So, yeah, it's been a while and I get tens of thousands of email every day, uh, sent to my domain, you know, mainstream.net. That's my company. I've had...

info_outline
 
More Episodes

Welcome!

Good morning, everybody. I was on with Jim Polito and we discussed how Apple is tracking stolen phones from their stores and a new threat due to the aftereffects of Coronavirus for businesses.  Here we go with Jim.

For more tech tips, news, and updates visit - CraigPeterson.com

--- 

Automated Machine Generated Transcript:

Craig Peterson: Think about your sales guy, walking out with your entire client list, order history, everything they've done and going to a competitor. Think about your, it, people that might've been designing things or your engineers or the people who put together your systems, whatever it might be, having all of your designs in their hand.

[00:00:22] Hey, good morning, everybody. Craig Peterson here. I had a little bit of a different tack this morning with Jim and talked about the, the real risk here right now to businesses. About Coronavirus, but you know, I've never explained it this way. It came to me yesterday when we were talking about one of the clients and what the right thing was for us to do to help them out. So here we go with Jim. Here he is.

[00:00:57] Jim Polito: Wow. We've got some great stuff for you today. with our tech talk guru and all around. Great guy, Craig Peterson morning, sir.

[00:01:09] Craig Peterson: Hey, good morning, Jim.

[00:01:11] Jim Polito: Hey, you're getting ready for a Canada day. It's you know, July 1st is right around the corner. You gotta, you gotta celebrate.

[00:01:20] Craig Peterson: Yeah, I know. I know. I know you can't even cross the border. Can't do anything. Nothing. Yeah. One of my daughters was married on Friday, out in Kentucky. We were out there in Kentucky and it was interesting times. Let me tell ya.  They were all disappointed. I of course, set up the streaming and we streamed the whole ceremony and stuff.

[00:01:42]You know, Canadians just not allowed down here. You know, some might think maybe they should have done that years ago, before I made it down. I just don't.

[00:01:52] Jim Polito: Well, I meant to ask you about the wedding. Cause I know you were down there in bourbon country and, trying to put on a wedding in the, in the age of the Rona, you know? So I'm glad you were able to share it. With all the folks from Canada, but it seems to me that the Molson trucks are still rolling across the border though, you know.

[00:02:13] Craig Peterson: Important stuff. Yeah.

[00:02:14] Jim Polito: Well, I was just kinda thinking you could have, like they do from Mexico. You could have smuggled the whole family up in a truck.

[00:02:25]Craig Peterson: Laughing

[00:02:25] Jim Polito: Why not? No, it is Royal, crown Royal. Seagram's all that stuff. Alright. Hey, this is, this is making me laugh so hard. the the folks who smashed the windows at the Apple stores and they stole iPhone devices. And now, well, we'll, I'll, I'll let you finish the story, Craig. Cause I think this is, this is sweet justice.

[00:02:57] Craig Peterson: You had mentioned earlier that these stolen iPhones or now essentially useless.  If you asked me Jim, I would say that they're more than useless, much worse, because Apple, in case you don't know, all of the phones that are on the displays in the store, Will only work in the store, ever. They have a special operating system on them that allows the phone to keep track of where it is. If it leaves the store, it will stop working.

[00:03:29] So, all of the phones have stopped working, but there is one part of the phone, Jim, that still works when it's outside the store.

[00:03:37] Jim Polito: And that is the tracking. Isn't it?

[00:03:41] Craig Peterson: You got it? Absolutely. So the pictures that have been posted on Twitter, which by the way, is another great way to find out who the guy that stole the phone is, showing the displays on some of these phones saying, please return to Apple Walnut street.

[00:03:58] This device has been disabled and is being tracked. Local authorities will be alerted. They are passing the information over to the authorities. Unlike some of these cities that have asked, Hey, send pictures of looters and ended up with K-pop pictures and videos coming in to report to the police.

[00:04:18] The police are actually following up on this because Apple will give them the absolute precise location of all of these stolen phones.

[00:04:28] Jim Polito: Oh, I love it. That is fantastic. I love to hear that stuff. All right. Here's something I don't want to hear. You know, Craig, you've done an excellent job on educating our listening audience to, on how to protect themselves, protect their privacy, protect their personal information, all that.

[00:04:50] But, you sent me a piece here that, Basically the biggest threat to your personal data is an employee leaving the company that has your personal data. Is that that's an accurate statement. Isn't it?

[00:05:13] Craig Peterson: Yeah, it absolutely is. In many of our businesses trying to stay alive took some kind of knee jerk actions in order to do that.

[00:05:23]We were just at a pizza shop right out there in a Wooster.  I've fixed a bunch of security problems. This is a pizza shop. I was shocked how much money they're making right now, by the way. Thank God. So many restaurants are just struggling so badly, but their business has doubled since the Coronavirus thing came in.

[00:05:44] And, they have the credit card processing clean machine, a little server there that keeps track of all of their sales, point of sale stuff, et cetera. They got audited by the payment card industry, the PCI people. And they said, Hey, we have two weeks here before they show up again.

[00:06:04]We've got to get all our security together. So we went in there and had a look at that payment card industry, little report, and we cleaned everything up. Now we found on their server had some malicious back doors that have been installed, because again, they just had the local computer guys set it up for them.

[00:06:25] Jim Polito: Yeah, exactly.

[00:06:26]Craig Peterson: Apparently all out the credit card data had been stolen from their machine. That means, now ,that there's, I think it's $120 fine per credit card that they've processed over the last year. So incredible, fine. Well, again, part of this is because people are sent home, businesses set up VPNs.

[00:06:49] We've got another one. This is a government subcontractor that we went to last week. And they had set up a VPN so people could work from home  Isn't this wonderful, isn't that wonderful. It turns out that what he had done was not compliant at all. If they had been audited by the government contractor, they would have lost all of the government contracts because again, malicious software all over the place, backdoors Chinese back doors.

[00:07:19] So I really want to warn businesses. Yeah, you had to stay afloat. You had to do something. Pull up your socks now !This is the time to do it. What Jim was talking about here is employees stealing our business information when they leave your employ. So think about all of the employees that brought it from drive into the office, copied the files onto the some drive and went home to work.

[00:07:50]Well now they have your business, personal information your intellectual property, personal information about your customers, et cetera, et cetera, et cetera, et cetera. more than 80% of employees that are planning to leave their job, bring the business's data with them. Guess what we just did by giving them some drives and letting them have full access to all of this data from home. Number one, they've got the data and 60% of insider threats to businesses are from insiders and they already have your data. And then number two, we allow those employees to connect from home heaven forbid. And do you using their home computers to connect to our business offices? When we are in for a major problem for most small businesses coming up.

[00:08:47] Jim Polito: And, you know, the old expression, it's a cliche. Oh, it was an inside job, you know, like it looks like, a jewelry store was robbed, but it wasn't, you know, somebody who worked there set it up. It was an inside job. this is what you're talking about here. Only the theft of data, which is just as valuable as jewelry.

[00:09:11] Craig Peterson: Yeah. Think about your sales guy, walking out with your entire client list, order history, everything they've done and going to a competitor. Think about your IT people that might've been designing things or your engineers or the people who put together your systems, whatever it might be, having all of your designs in their hands.

[00:09:34] This is huge. And, and we've seen it with Tesla. Where again in the autonomous auto business, people walked out the door with the plan of their employer and took them to the next employer or folks who I can test all of these guys lost due to everywhere they can afford it. How about you? You've got to make sure that you pull up your socks on this thing, because this is another way Coronavirus is going to be destroying businesses.

[00:10:06] This insider threat, where we were just trying to keep our head above water.

[00:10:12] Jim Polito: All right. You heard it all here and there's a lot more and you can get your hands on it easily. All that you have to do is text my name, Jim, to this number.

[00:10:27] Craig Peterson: Well, you can text it to (855) 385-5553, or when you can just email [email protected] That's M E @craigpeterson.com. That's a pretty easy address. M E at Craig peterson.com.

[00:10:45] Jim Polito: Craig, congratulations on the wedding. And, I'm not surprised that you pulled it off as  a technical celebration and we look forward to catching up with you next week. All right.

[00:10:58] Craig Peterson: Take care of Jim.

[00:10:59] Jim Polito: All right. Take care. Craig, Craig Peterson, everybody all around. Great guy. Okay. Today.

 

--- 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553