loader from loading.io

Welcome! Why Hackers Like Outsourced MSPs plus more on Tech Talk with Craig Peterson on WGAN

Craig Peterson - America's Leading Technology News Commentator

Release Date: 09/18/2020

Learn how to protect yourself online - featuring tips on haveibeenpwned, AI demos and 2FA/MFA authentication. show art Learn how to protect yourself online - featuring tips on haveibeenpwned, AI demos and 2FA/MFA authentication.

Craig Peterson - America's Leading Technology News Commentator

First up, I have some sobering news. Almost all of our personal information has likely been stolen at one point or another. This could include our names, addresses, phone numbers, email addresses, and even passwords. Cybercriminals are constantly searching for vulnerabilities in systems where this information is stored, and unfortunately, they often find them. However, there are steps we can take to protect ourselves. One tool that can help is called "haveibeenpwned." It's a website where you can check if your email address has been compromised in any data breaches. If it has been compromised,...

info_outline
The Truth About ChatGPT and A.I. - Discover the Secrets of Internet Anonymity and Protect Your Privacy show art The Truth About ChatGPT and A.I. - Discover the Secrets of Internet Anonymity and Protect Your Privacy

Craig Peterson - America's Leading Technology News Commentator

Welcome to this week's episode of The AI Revolution! In this episode, join us as we explore the world of Artificial Intelligence and its potential to revolutionize business and life. We'll discuss how to use AI for free, what it can do well, and when and where you should never use it. We'll also talk about how to generate emails, blog posts, and content for Facebook, Twitter, LinkedIn, Instagram, and YouTube live! Tune in now to learn more about how AI is transforming the world. Discover the Secrets of Internet Anonymity and Protect Your Privacy The best way to protect yourself from...

info_outline
Protect Your Business and Home from the Most Dangerous Cyber Threats - Uncover the Risks and Steps You Can Take to Stay Secure show art Protect Your Business and Home from the Most Dangerous Cyber Threats - Uncover the Risks and Steps You Can Take to Stay Secure

Craig Peterson - America's Leading Technology News Commentator

Cyber security is no longer an option for small business owners – it's a necessity. Cyber threats are rising, and small businesses must stay ahead of the curve to protect their data and networks from malicious actors. This show will uncover the most dangerous cyber threats to small businesses and what steps you can take to stay secure. Ransomware Attacks Ransomware attacks are one of the most dangerous cyber threats to small businesses. Ransomware is malicious software (malware) that's typically delivered via malicious links or email attachments. Once installed on a network, the...

info_outline
Artificial Intelligence Search Engines You Can Use For Free Today - Robot Kicked Out of Court - CNET and BuzzFeed Using AI show art Artificial Intelligence Search Engines You Can Use For Free Today - Robot Kicked Out of Court - CNET and BuzzFeed Using AI

Craig Peterson - America's Leading Technology News Commentator

Artificial Intelligence Search Engines You Can Use For Free Today Robot Kicked Out of Court CNET and BuzzFeed Using AI Biden Signs Go-Ahead to Use Child Labor to Make E-Car Batteries The Biden administration has issued a 20-year ban on new mining claims in the upper Midwest's famed Iron Range, and it is turning to foreign supply chains as it pushes green energy projects. The move comes as the U.S. continues to rely on foreign suppliers for critical minerals used in wind turbines and electric vehicles. The ban is part of a broader effort by the White House to reduce reliance on imported...

info_outline
A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint - Generation Z is the least cyber secure - Security and the Electric Vehicle Charging Infrastructure Failing US show art A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint - Generation Z is the least cyber secure - Security and the Electric Vehicle Charging Infrastructure Failing US

Craig Peterson - America's Leading Technology News Commentator

A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint The process for clearing your Internet browser history can vary depending on your browser. However, here are the general steps for removing your browser history on some popular browsers… Generation Z is the least cyber secure because they are the most tech-savvy generation but also the least experienced in cyber security.  They are likelier to take risks online, such as clicking on suspicious links or downloading unknown files and are less likely to use strong passwords or two-factor...

info_outline
ChatGPT's Technology Will Be Part of Everything This Year - How AI chatbot ChatGPT changes the phishing game - Microsoft Looking to Invest $10 billion More show art ChatGPT's Technology Will Be Part of Everything This Year - How AI chatbot ChatGPT changes the phishing game - Microsoft Looking to Invest $10 billion More

Craig Peterson - America's Leading Technology News Commentator

ChatGPT's Technology Will Be Part of Everything This Year ChatGPT is a new text-generation tool trained on 40GB of Reddit's data. It can generate long passages of text virtually indistinguishable from human-written prose, which could have enormous implications for everything from customer service chatbots to fake social media accounts. The company behind ChatGPT is also working on ways to detect if the text was generated by ChatGPT or a human—though some experts worry about how bad actors could misuse this technology. The technology has generated random plot descriptions for video games to...

info_outline
Google Ads Were Weaponized - Identifying Criminals Using Cell Phone Location Data - WhatsApp Was Hacked By an Israeli Company – US Supreme Court Allows WhatsApp to Sue NSO Group - Identity Thieves Bypassed Experian Security to View Credit Reports show art Google Ads Were Weaponized - Identifying Criminals Using Cell Phone Location Data - WhatsApp Was Hacked By an Israeli Company – US Supreme Court Allows WhatsApp to Sue NSO Group - Identity Thieves Bypassed Experian Security to View Credit Reports

Craig Peterson - America's Leading Technology News Commentator

Google Ads were weaponized in a way that made them appear like any other ad – Allowed hackers to infect computers with malware via a single click. Hackers have weaponized Google Ads to spread malware to unsuspecting users by disguising them as regular ads. They do this by cloning the official websites of popular software products, such as Grammarly, Audacity, μTorrent, and OBS, and distributing trojanized versions of the software when users click the download button. This tactic allows hackers to infect users' computers with malware through a single click. Google Ads, also known as Google...

info_outline
The Newest Artificial Intelligence Is About to Change Your Life! And It's Code Red for Google. show art The Newest Artificial Intelligence Is About to Change Your Life! And It's Code Red for Google.

Craig Peterson - America's Leading Technology News Commentator

Artificial Intelligence is changing the world. Right Now! In just a few years, it's possible that you might be chatting with a support agent who doesn't have a human body. You'll be able to ask them anything you want and get an answer immediately. Not only that, but they'll be able to help you with things like scheduling appointments, making payments, and booking flights—without any human intervention necessary. This is just one of the many ways that Artificial Intelligence will change our lives this year. We will see more businesses using AI technology to make their processes more efficient...

info_outline
Ring Cameras Hacked - LastPass finally admits crooks stole your info - How to use Password Managers - Which are the best for you? show art Ring Cameras Hacked - LastPass finally admits crooks stole your info - How to use Password Managers - Which are the best for you?

Craig Peterson - America's Leading Technology News Commentator

Privacy… Ring Cameras Hacked in 'Swatting' Scheme Critics and researchers say the Ring cameras are used to surveil gig economy drivers and delivery people and that they give law enforcement too much power to survey everyday life. The pair would hack people's Yahoo email accounts, then their Ring accounts, find their addresses, call law enforcement to the home with a bogus story, and then stream police's response to the call. Often, they would harass the first responders at the same time using Ring device capabilities. ++++++++ LastPass finally admits: Those crooks who got in? They did steal...

info_outline
Slave Labor in China - Apple Moves Out - Spyware posing as VPN apps - Darknet markets generate millions in revenue by selling stolen personal data - Voice-scamming site “iSpoof” seized show art Slave Labor in China - Apple Moves Out - Spyware posing as VPN apps - Darknet markets generate millions in revenue by selling stolen personal data - Voice-scamming site “iSpoof” seized

Craig Peterson - America's Leading Technology News Commentator

Craig Peterson  Insider Show NotesDecember 5 to December 11, 2022 China… Apple Makes Plans to Move Production Out of China In recent weeks, Apple Inc. has accelerated plans to shift some of its production outside China, long the dominant country in the supply chain that built the world’s most valuable company, say people involved in the discussions. It is telling suppliers to plan more actively for assembling Apple products elsewhere in Asia, particularly India and Vietnam, they say and looking to reduce dependence on Taiwanese assemblers led by Foxconn Technology Group. After a year...

info_outline
 
More Episodes

Welcome!

Craig explains why Hackers have found a new target that they love and why it might put you in jeopardy.

For more tech tips, news, and updates visit - CraigPeterson.com

---

Read More:

Managed IT Providers: The Cyber-Threat Actors' Gateway to SMBs

Think You're Spending Enough on Security?

DHS Braces For 'Potential EMP Attack' As Presidential Election Nears

US Sanctions Russian Attackers for 2020 Election Interference

Cyber-Risks Explode With Move to Telehealth Services

Why online voting is harder than online banking

Price gouging and defective products rampant on Amazon, reports find

Ransomware Has Gone Corporate—and Gotten More Cruel

---

Automated Machine-Generated Transcript:

Craig Peterson: [00:00:00] Welcome everybody. Hey, if you think that your IT being outsourced is going to somehow protect you from the bad guys. Unless they are a security service provider, I've got some news for you.

Hello everybody. Craig Peterson here. A welcome and glad you joined us here on news radio 98.5 And AM 560. I also want to remind everybody that you can find me online. You can listen to this as you are a hold of radio range, even just go ahead and. Ask your favorite platform, whether it's Google or Alexa to play, WGAN we'll give you some more or details a little bit later on in the show today, but let's start with our top story of the day today.

 That has to do with managed IT providers. Now, a lot of businesses are trying to do the whole information technology thing themselves. You've probably heard different ads. In fact, there's one group that advertises frequently here on WGAN, and this is kind of a big deal when you get right down to it. Are you better off taking care of your IT yourself? Or are you better off having someone else do it?

Then when you really dig into it, the bigger question I think is, does it make sense to just use a regular IT company to outsource everything? Or should you again have specialties? No, it's like you've got a department inside your business that might do the finance stuff. You've got another department that obviously handles IT. You got sales, you got marketing. They're all fine-tuned. It is very difficult to find a third party that's fine-tuned, if you will, to cover everything that you might need from an IT side.

Well, we have been finding out some very interesting numbers lately. There's a great article I have up on my website from DarkReading. That's talking about this.

Basically, most of these MSPs or managed IT providers managed services providers. Have become a major gateway for the bad guys to break into small and medium businesses. I mean major gateway.

We've seen this ourselves just as recently as last week. We've been working with some managed service providers now to provide them with managed service security services because it's impossible for them to do the best job.

I just saw a mailing I got today from a company called SonicWall. They make firewalls, which are just fine for businesses that aren't heavily regulated, but they do not meet the requirements for more heavily regulated businesses. SonicWall's out there sending out these mailings saying, We've got it all. All you need is us.

That also reminds me of a mailing I got from Microsoft and I saved it. I just could not believe this. This must have been 20 years ago now maybe a little longer, actually, when I think of it, we're saying, Hey, listen, security is a real problem, but if you have Windows XP and Microsoft office, rest assured that your security is virtually guaranteed. I shook my head at that, decades ago in this sort of stuff still happening today. So many companies are out there lying and misrepresenting.

Now. I get it, you guys, this is not your forte. It's not the forte, cybersecurity of most managed services providers. Frankly, I think the vast majority of these companies that are trying to help you out with the IT, just don't realize what they should be doing and what's required of you, right?

You go to them because they are the experts. They tell you what you need, right. Isn't that the reason to write the checks.  I've found the same thing being true inside a lot of companies where you have your own IT people and those IT people are trying to keep things straight.

And man, I've been working on this cybersecurity quiz thing. What are the main activators behind cybersecurity and where are you at? It's a self-evaluation thing that you can do as a business. Right now I've got the technical ones all done, and I'm working on one for the business owner C-level to understand where they're at and where they might need to go with it.

For years, cybersecurity has really been the area that big businesses, enterprises, what we used to call them here. And the enterprise was like a big business, a publicly-traded company. Nowadays we're adopting more of the European definition of enterprise, which is any business out there, but cybersecurity is been really the area that large businesses don't have to worry about.

What the bad guys have found that small and midsize businesses have also been the target of attacks, but historically those attacks have been the broad-based phishing attacks, or they're trying to run a worm around the internet. It's just a target of opportunity. From small business and medium business standpoint, the number of times they might be hacked or the damages caused were probably reasonable, you could get insurance for it.

But that has all changed now. The insurance companies and we've talked about a couple of these on the show before, are not paying out the policies. If you have a cyber insurance rider, for instance, as a regular end user,  just a home user, many home policies now come with a cyber insurance rider. So if your identity is stolen, they will help you to recover the damage that was done, right. You can never really recover identity. You're not going to get it. Back. It's not gonna all of a sudden become safe, but they all help you with the damage. So anything that was bought in your name it'll,  they'll back it out, any bad credit report backs them out. The same thing was available for the small, medium, and, even the large business markets where you pay a rider, and then if you do get attacked then okay, the insurance will pay for it.

When you look at the numbers, I think you might come to a different realization. Where right now about a year, a quarter of all businesses are hacked per year. There is some security event that occurs in about a quarter of all, all businesses. That's a lot. What was the fee for your premium as a small business? Was that fee just an add on, an extra 25 bucks a year, a quarter a month, whatever is, I, I know biggie. Well, what's happened is the insurance companies have realized that they can put requirements on you. That's one of the things we do. We have special scanning software that allows us to scan a network and look for standard insurance requirements. You know, the stuff the insurance companies usually want. No, we're not the only ones, I'm not the lone ranger out here.

There are other companies that have these tools. There are some free checklists you can find online. I would encourage you to use them. Nowadays, if your information is stolen, if you are hacked, they're going to go through that list and say, did you comply with this? Did you comply with that? Did you comply with the other thing? If not, they're going to fight you.

That's true for the mega-breaches like Equifax has been fighting their insurance company in the courts. We've seen everything all the way down to little companies that are fighting it in the courts. Then on top of it, not only is a cyber insurance stuff, a threat, and a problem. It goes to the next level. And the next level, when it comes to all of this is. Is your business going to survive?

You got hacked and you have to fight with the insurance company.  If the regulators find out, if your business is regulated, which nowadays is pretty much every business out there, what is it 300 million? Oh, it, you won't get into that right now. All of the people here in the US plus the businesses and all of the hundreds of thousands of regulations anyways.

What's going to happen when the regulators find out you were hacked? That's when the real problems come up. The regulators are going to come in and there is a checklist, whether it's a NIST checklist, the CMMC, the HIPAA/HITECH, whatever it is, you are going to be held responsible.

So. What are the bad guys found? It's kind of like going back to the Willie Sutton misquote, right? Which is why did he Rob banks all that's where the money was. Turns out that isn't a legitimate quote, but you know, that's okay. He, he robbed the banks or bank robbers, Rob banks, because they keep cash there. They keep gold. They keep silver, back in the day. So they'd go in and Rob them.

Well, where are all of the keys to the kingdom when it comes to your computers? Well, they live in the IT department. Don't they, IT can get on, can give you access to stuff. They can take away access from staff, right? That's what it does. And they can be pissed off and leave your employ. If they leave your employment, what happens? Do you have automated systems that remove access for the IT people?

Cybercriminals have now figured out that these low-end small businesses that are out there calling themselves managed services providers, managed IT providers are a great way.  If they break into one of those, we've seen major security holes for the tools almost all of these companies are using. If they break into one, those, they now have the keys to the kingdom for 50-100 companies out there. So be very, very, very careful.

Cybercriminals understand the average managed services provider cannot keep your data safe internally inside their own networks or in yours. So just like that Pandora's box is open.

Hey, you're listening to Craig Peterson. If you're going to hop in the car, the truck, and drive, hopefully, you've got Siri with you, maybe Google, maybe Alexa can listen to us there.

Just say, Hey, Alexa, play WGAN stick around. Cause we'll be right back.

You're listening to Craig Peterson.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553