Welcome! Are you a Victim of Cybercrime? I will show you how to Check plus more on Tech Talk with Craig Peterson on WGAN
Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity
Release Date: 08/08/2020
Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity
Welcome to today's episode where we dive into the rapidly evolving world of technology and its impact on privacy, history, democracy, and consumer behavior. Join us as we explore the implications of Google FLoC cookies on online privacy, the dangers posed by AI Gemini in altering historical narratives, the role of technology in ensuring election integrity, and the influence of platforms like Temu on the online shopping experience. Google FLoC Cookies: Understand how Google's FLoC technology is reshaping online privacy and targeted advertising. Dangers of AI Gemini Changing History: Discover...
info_outline Solar Storm Apocalypse? Myth or Reality? Protect Your Grid (and Life)Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity
Have you ever considered the impact of a powerful solar storm or an unexpected Electromagnetic Pulse (EMP) on our way of life? This article dives deep into the resilience of our electric grid in the face of these potential threats, exploring the concerning "what ifs." Solar Flares and EMPs: Disrupting Our Connected World Solar Flares: These are massive eruptions of energy from the sun's surface. A powerful enough solar flare can induce electrical currents in our power grids, potentially causing widespread blackouts and damage to transformers. Electromagnetic Pulses (EMPs): These are bursts of...
info_outline eSIM Exposed: Safeguarding Mobile Privacy & Combatting HacksCraig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity
Chris's $10,000 smartphone hack is just one instance of a concerning trend of cyberattacks. Today, we're delving deep into eSIM technology, a game-changer in mobile privacy and security. Cybersecurity Concerns: The rise in hacking incidents highlights the urgent need for robust cybersecurity measures, especially in the mobile space. eSIM Technology: Exploring the intricacies of eSIMs reveals both their potential and the security challenges they present. Online Privacy: With eSIMs becoming more prevalent, understanding their impact on online privacy is crucial for users. Combatting...
info_outline Disappear Online: Expert Tips for Digital Cleansing!Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity
In today's digital age, our online presence can become cluttered and overwhelming, affecting not just our digital identity but also our cybersecurity and privacy. Let's delve into the expert secrets of digital cleansing to ensure a safer and more secure online journey: Understanding Digital Clutter: Learn how digital clutter impacts your life and why it's essential to tidy up your online presence. Cybersecurity Concerns: Uncover the risks posed by unchecked emails, unused accounts, and shares, and how they can compromise your cybersecurity. The Importance of Online Privacy:...
info_outline Defend Your Digital Domain: Transforming Home Networks for CybersecurityCraig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity
Hey there! Is your home Wi-Fi a potential cyber threat? Let’s bolster your network's defenses! Here's what you'll find in this guide: Privacy Concerns: Understand the risks associated with a vulnerable home network and the importance of safeguarding your personal information. Wi-Fi Security: Learn how to secure your home Wi-Fi network to prevent unauthorized access and protect your devices. Smart Devices: Explore the security challenges posed by smart devices and how to mitigate these risks effectively. Network Segregation: Delve into the concept of dividing your home network for...
info_outline Unlocking the Secrets of Online Privacy: Cracking the Code to Secure ChatsCraig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity
Have you ever paused mid-message, wondering who might be lurking in the digital shadows? I've delved deep into the realms of online privacy, spam prevention, encryption, and the intricacies of organizing your digital life to keep your conversations secure. Join me on this thrilling journey through cyberspace as we unravel the secrets of safeguarding your chats. Here's what you'll discover in our expedition: Privacy in the Digital Age: Uncover the nuances of online privacy and learn how to navigate the digital landscape confidently. Combatting Cyber Threats: Dive into the world of...
info_outline Defend Your Inbox: The Ultimate Plus Addressing Privacy Solution!Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity
Hey there! Ever find yourself drowning in a sea of spam emails? 📧 Fret not! I've got the perfect solution to not only declutter your inbox but also fortify your online privacy and cybersecurity. 🛡️ Introducing the ultimate guide to digital clean up, with a focus on plus addressing for enhanced privacy and organization. No more sifting through unwanted emails – this guide is your ticket to a streamlined and secure email experience. 📥 Here's what you'll find in this comprehensive guide: Privacy Reinforcement: Learn how plus addressing can act as a shield, allowing you to...
info_outline Online Advertising Transformed: Google's Move Beyond Cookie DependencyCraig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity
Hold onto your hats, tech enthusiasts! 🎩💻 Get ready for a seismic shift in the digital landscape as Google bids farewell to cookies, ushering in a new era where privacy is more than just wishful thinking. Say goodbye to the cookie craze! 🍪🚫 In my latest deep dive, "Digital Clean Up: Navigating Google's Game-Changing Shift in Online Advertising," I'm unraveling the intricacies of this groundbreaking move and what it means for all of us navigating the vast realms of the internet. 🌐🔍 Here's what you can expect in this enlightening journey: Advertising Evolution: Explore...
info_outline Crack the Code: Mastering Windows Security and Digital Clean-Up TacticsCraig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity
In the fast-paced world of technology, your Windows device needs the ultimate defense against cyber threats. I've revamped the guide, diving deep into the realms of anti-virus protection, cybersecurity, and online privacy. Here's your roadmap to a digitally clean and secure future: Windows Defender vs. Norton vs. Malwarebytes: Uncover the strengths and limitations of each superhero in the battle against cyber villains. The War Against Malware: Arm yourself with knowledge on the latest malware trends and the tools to combat them effectively. Guarding Your Cyber Fortress: Explore...
info_outline Boost Online Privacy: A Cyber Spring CleanCraig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity
Is your digital realm resembling a messy attic? Files overflowing like forgotten knick-knacks, an inbox resembling a confetti blizzard, and social media feeds choked with digital dust bunnies? Fear not, fellow data denizens, for spring cleaning season has arrived – and this year, we're reclaiming our online peace of mind! But unlike dusting cobwebs and decluttering drawers, taming our digital wilderness requires a different arsenal. Forget brooms and vacuum cleaners – we're talking AI-powered assistants, data-detective hounds, and even a digital shredder for those long-dormant devices...
info_outlineWelcome!
Craig discusses How to check and see if you have been a victim of Cybercrime.
For more tech tips, news, and updates visit - CraigPeterson.com
---
Read More:
Average Cost of a Data Breach: $3.86 Million
The Future's Biggest Cybercrime Threat May Already Be Here
Election Interference: Google Purges Breitbart from Search Results
Google Has Been Purging Breitbart Content from Search Results Since the 2016 Election
Heads roll at Intel after 7nm delay
Out-of-Date and Unsupported Cloud Workloads Continue as a Common Weakness
Three people have been charged for Twitter’s huge hack, and a Florida teen is in jail
Remote Work Isn’t Working? Maybe Your Company Is Doing It Wrong
FBI Releases Flash Alert on Netwalker Ransomware
Electric car startup Lucid is challenging Tesla’s anti-lidar stance
---
Automated Machine-Generated Transcript:
[00:00:00] We've been going through the IBM data breach and we're bound to talk about nation States. What are they doing to us?
Stick around. Here we go.
Hey, Craig Peterson here. I want to thank you guys for joining me. If you are interested in this sort of thing in security in general, whether you're a home user. You're a small business owner. Maybe you're the person responsible for cybersecurity in the organization. Right? Who am I? I'm the operations manager, I am the general business manager and you got stuck with security as part of your job description. Hey, this is the place to be and make sure you are on. My email list, Craigpeterson.com/subscribe, because I want to keep everybody up to date on that. I also enjoy talking about
[00:01:00] some of the cool stuff that's out there and the consumer. So, you know, it's there for kind of everybody that likes the technology. I am somebody that tends to go kind of deep. I don't go so deep here I go a lot deeper in my courses, but I go deeper than anybody else on the radio. I get comments every week from people just so thankful that I do that, right?
It's a bit of a risk. You gotta be really good at explaining things. If you are going to be able to go deep at all, especially on some of these technical topics.
So let's get back to our friends here over at IBM and the latest report that they have released. And let's talk about nation-state attacks. These are a little less common than they used to be. But they come and they go, and I think they're less common because the COVID-19 frankly, but they are also the costliest. IBM saying that
[00:02:00] nation-state actors caused 13% of malicious breaches while 50. 3% were caused by financially motivated attackers, but again, nation-States were the costliest.
So here's what we're looking at here. This is the average total cost in US dollars. And over on the side of you watching this on the video side, you'll see the share malicious breaches per thread, actor type. So nation-States four and a half million dollars average cost. Unknown where it came from. Right.
And the nation-States are pretty good about hiding who they are. A 4.2, $9 million hacktivists 4.28 million. And these are the people who are trying to push their agenda. Right. They have a religion about, uh, you name it global warming or socialism, communism, fascism. Right?
[00:03:00] Those are the hacktivist people and financially motivated.
Right? 4.2, 3 million. Now you notice that although the nation-state actors are the most costly, it's not by much. Okay. So what do we learn from this? Any sort of compromise where they have broken into your systems and stolen data is going to cost you no matter who does it now, the effectiveness of incident response grew over the last year and that's really good.
Really good thing. You should have an incident response team. And I have, if you're interested, I have a handout that we put together. It's I can't remember. It's like eight or 10 pages, just kind of high level, who should be on that incident response team. And I'd be glad to send that to you can just email me M [email protected], but it explains incident response in
[00:04:00] case this again is kind of new to you.
What the titles of the people who are part of this should be how you should integrate legal human resources. The business owner or CEO. Okay. So I'd be glad to send that to you. M [email protected], but, uh, you know, organizations that had an incident response team and tested it, average breach costs of 3.29 million.
And. If you didn't have an incident response team or you weren't drilling your incident response within the organization, it costs you $2 million more, 5.29 million for business organizations with neither incident response teams nor testing. That's pretty darn big. A mega-breach. Oh, I should point out too, by the way, the car savings for having an incident response team and I are testing $2 million.
Right. And that's,
[00:05:00] that's the number I just gave you, but I wanted to drive that point. Home is not going to cost you $2 million. I have a good incident response team and to practice incident response drills with everybody in the organization, mega breaches. Now, these are where you have more than one.
Million records that are stolen. That's called a mega breach. It doesn't happen very often, but it happens every year, multiple times. So the average cost for a mega breach of 50 million records, which is nothing. Look at Equifax, right? It was over 200 million people's personally identifiable information. So the average cost of a mega-breach is.
Through almost $400 million. So we'll leave it there. Um, This goes into how many records. So if you just have one to 10 million records that are breached well, that's a $50 million cost to you. Uh, and it goes up from
[00:06:00] there. Okay. So you can find all of this. I've got it up on the screen at the ibm.com/data breach.
I hope you do check it out. Cause this is important information for everybody. Okay. So data breaches are a very, very big deal. And we have to understand them. We have to work with them. And as consumers let's put on a different hat, you really need to be looking and something else. So let me show you something here.
Uh, okay. So I'm going to pull this up. I'm going to put it on the camera so that those people. Who is watching this on video can see it, but this is a site called have I been pawned? So let me pull up puppy here and you can put in your own email address. Now. Some people. Pay for services that are like this.
And you know, if you want to pay for
[00:07:00] them, I guess. Yeah. Go ahead and makes you feel better. Uh, this is absolutely free. In fact, you can sign up and get alerts when things happen. I remember I told you 12th, these mega breaches look at these largest breaches. This particular one had 772 million records. So, what I'm going to do is I'm going to enter my Craig.
At Craig peterson.com email address. Okay. And a, you could certainly send me an email there if you do. I may or may not see it, right. You're better off using me at Craig Peterson, but this is my old address that had been up there for a long time. So have I been pawned is all spelled out, but I shouldn't say pwned, it's spelled Let H A V E I B E EN like, have I been, and then pwned misspelled, P w N E D P w N E D. So, check it out right now! How have I been
[00:08:00] poned.com? So I'm going to check and see, has my email address shown up? So it's saying, Oh no, pwned okay. So it says there were four breached sites and no pastes. Now the pace is a completely different thing, but it's just a different way, of the bad guys sharing your information online.
So it's telling you who I'll look at this one. The password is what you should use. You should have two-factor authentication, which I talk about all the time as well, and subscribe to notifications. Cause he will. Provide with notifications. I suspect his start using one password.com button is probably, he makes a couple of bucks off of it.
So why not? Right. Because poor guy doing all of this, he's trying to sell the company, but he says you're if you buy it, the, have I been pwned you have to continue to make free. So it's saying that Apollo in July 2018, the sales engagement
[00:09:00] startup Apollo luck database containing billions of data points publicly exposed without a password.
There's a subset of the data that had 126 million unique email addresses. And it tells you also what data was compromised. So email addresses, employers, geographical locations, job titles, all kinds of stuff. B2B USA, business data, enrichment exposure from PDL and verifications dot I O. All right. So that's it for now, but we're going to be, be right back.
And we're going to be talking about our next topic for the day, which is going to be. The future and cybercrime. Did you know that the biggest threat may already be here?
Listening to Craig Peterson, stick around. We'll be right back.
---
More stories and tech updates at:
Don't miss an episode from Craig. Subscribe and give us a rating:
Follow me on Twitter for the latest in tech at:
For questions, call or text:
855-385-5553