loader from loading.io

Data Privacy and Computer Repair plus more on this Tech Talk with Craig Peterson Podcast

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Release Date: 10/23/2020

Crack the Code: Mastering Windows Security and Digital Clean-Up Tactics show art Crack the Code: Mastering Windows Security and Digital Clean-Up Tactics

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In the fast-paced world of technology, your Windows device needs the ultimate defense against cyber threats. I've revamped the guide, diving deep into the realms of anti-virus protection, cybersecurity, and online privacy. Here's your roadmap to a digitally clean and secure future: Windows Defender vs. Norton vs. Malwarebytes: Uncover the strengths and limitations of each superhero in the battle against cyber villains. The War Against Malware: Arm yourself with knowledge on the latest malware trends and the tools to combat them effectively. Guarding Your Cyber Fortress: Explore...

info_outline
Boost Online Privacy: A Cyber Spring Clean show art Boost Online Privacy: A Cyber Spring Clean

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Is your digital realm resembling a messy attic? Files overflowing like forgotten knick-knacks, an inbox resembling a confetti blizzard, and social media feeds choked with digital dust bunnies? Fear not, fellow data denizens, for spring cleaning season has arrived – and this year, we're reclaiming our online peace of mind! But unlike dusting cobwebs and decluttering drawers, taming our digital wilderness requires a different arsenal. Forget brooms and vacuum cleaners – we're talking AI-powered assistants, data-detective hounds, and even a digital shredder for those long-dormant devices...

info_outline
Beyond Delete: The Ultimate Guide to Shredding Sensitive Digital Trails show art Beyond Delete: The Ultimate Guide to Shredding Sensitive Digital Trails

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey there cyber enthusiasts! Ever wondered how to transform your digital space into a fortress of security? Well, buckle up, because we've crafted the ultimate guide to help you declutter, fortify, and defend your digital realm. Our mission: to make cybersecurity engaging and effective, without drowning you in techno-jargon. Check out these key points we've covered: Wi-Fi Wonders: Unveiling the mysteries of Wi-Fi security to ensure your online activities remain secure from prying eyes. Password Power: Dive into the world of password protection, unlocking the secrets to crafting...

info_outline
Securing Your Digital Realm: The Ultimate Cybersecurity First-Aid Kit Unveiled! show art Securing Your Digital Realm: The Ultimate Cybersecurity First-Aid Kit Unveiled!

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In the vast landscape of the digital world, safeguarding your online presence is paramount. Welcome to another episode of TechTalk with Craig Peterson, where today, we unravel the secrets to fortifying your digital realm with "The Ultimate Cybersecurity First-Aid Kit." Decrypting Wi-Fi Woes Our journey begins with the cornerstone of your digital fortress: Wi-Fi encryption. No secret stays safe forever, and that includes your Wi-Fi password. We delve into the importance of encrypting your Wi-Fi, ensuring that your digital stronghold remains impenetrable. Password Party Extravaganza "abc123"...

info_outline
The Mobile Malware Menace: Protecting Against Evolving Threats show art The Mobile Malware Menace: Protecting Against Evolving Threats

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In today's fast-paced digital age, staying ahead of the curve is not just an advantage; it's a necessity. From the electrifying world of electric vehicles to the intricate web of mobile security, and the visionary influence of Elon Musk, there's a lot to unpack. Join us on this insightful journey as we explore key topics that are shaping the future of technology. 1. Electric Vehicles (EVs): Paving the Way for a Green Future The surge in popularity of electric vehicles is undeniable. We delve into the latest advancements, innovations, and the environmental impact of EVs, providing you with a...

info_outline
Scan Smart, Stay Safe: Mastering the Art of QR Code Defense show art Scan Smart, Stay Safe: Mastering the Art of QR Code Defense

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In a world dominated by QR codes, the risk of falling prey to digital tricksters is on the rise. Fear not, fellow entrepreneurs, for we've decoded the secrets to outsmarting these cyber hosers and keeping your digital fortress secure! QR Code Unveiled: Understanding the Basics Let's kick things off with a deep dive into the world of QR codes. Learn what makes them tick and how scammers exploit these seemingly innocent codes to compromise your cybersecurity. The Rise of AI and Its Role in QR Code Shenanigans Artificial Intelligence (AI) has ushered in a new era, and unfortunately,...

info_outline
Digital Media Ownership Debunked: The Tactical Octopus Unveiled show art Digital Media Ownership Debunked: The Tactical Octopus Unveiled

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In the ever-evolving landscape of digital media, the illusion of ownership can be shattered with a single tactical move. Recently, the PlayStation community experienced a rude awakening when paid content was abruptly removed - and no refunds were given. This underscores a widespread issue: do you own the digital shows and movies you 'bought'? Topics Explored in the Article: Tactical Octopus Unveiled: Delve into the intricate tactics used in the digital realm that challenge the perception of ownership. IRS Alert: Explore the unexpected connection between the IRS and your digital...

info_outline
Digital Armor: Safeguarding Your Online Presence with Chrome, Firefox, and Safari show art Digital Armor: Safeguarding Your Online Presence with Chrome, Firefox, and Safari

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Securing your online activities in today’s digital world is a top priority, and the trio of web browsers—Google Chrome, Firefox, and Safari—stand as formidable guardians against cyber threats. Let's embark on a journey into the intricacies of these browsers' advanced protection features to fortify your online experience. Chrome's Shielding Arsenal Google Chrome takes the lead with robust security measures. From safeguarding against phishing attempts to fortifying defenses against ransomware attacks, Chrome stands tall as a digital fortress. Explore its advanced protection features to...

info_outline
Unmasking Gift Card Scams: A Growing Online Threat Exposed! show art Unmasking Gift Card Scams: A Growing Online Threat Exposed!

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Unmasking Gift Card Scams: A Growing Online Threat Exposed! Gift card scams are prowling the digital landscape, targeting unsuspecting online shoppers like never before. In this article, we'll dive deep into the murky waters of online scams involving gift cards, Amazon, credit cards, and more. Buckle up, because the world of online shopping is not as secure as it seems. Signs You're Being Scammed These online tricksters have mastered the art of deception: Too-good-to-be-true offers Urgent demands for payment via gift cards Threatening legal action if you don't pay up - yikes! (It isn’t the...

info_outline
Click Like a Pro: Insider Tips for Safe Online Shopping show art Click Like a Pro: Insider Tips for Safe Online Shopping

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey savvy shoppers, gather 'round for a tale as vital as your grandma's pie recipe! Ever felt the sting of an online shopping scam? Fear not, I've got the lowdown on dodging those traps. Let's kick things off with a cautionary yarn and dive into the nitty-gritty. Spotting a Phony Website: Detective hat on! Check URLs for weird symbols and misspellings. A padlock symbol next to the URL is a good sign. Evaluating Sellers on eBay and Etsy: eBay and Etsy, our online treasure troves! Check seller ratings, reviews, and authentic photos. Don't fall for smoke and mirrors. Buying Big Ticket Items:...

info_outline
 
More Episodes

Craig continues his explanation about computer repairs and what you can and must do to protect your data and privacy. Back up your data! Also, the proper way to destroy old disks.

For more tech tips, news, and updates, visit - CraigPeterson.com

---

FBI, DHS says hackers have gained access to election systems

The IRS Is Being Investigated for Using Location Data Without a Warrant

Clear Conquered U.S. Airports. Now It Wants to Own Your Entire Digital Identity.

5G in the US averages 51Mbps while other countries hit hundreds of megabits

IRS may put cryptocurrency question at the top of 1040 to catch cheaters

Publishers worry as ebooks fly off libraries’ virtual shelves

25% of BEC Cybercriminals Based in the US

What's Really Happening in Infosec Hiring Now?

---

Automated Machine-Generated Transcript:

Craig Peterson: [00:00:00] Do you know, what's on your computer? Do you know what they do with it? At some of these repair shops that you take your computer when it gets slow and something breaks? When you're just trying to figure it out? What the heck is happening here, man? We've got an eye-opener for you right now.

Hi everybody. Craig Peterson here. Thanks for joining me.

We talked a little bit about what it's on your computer. You may not remember everything that's on it. It may just be some malicious stuff a third party has put on there. You might have bank account information. You might have password information. You might have intellectual property on it.

If you are trying to take in a computer, that's badly broken. You're in a little bit of a hard spot here because that computer can't be cleaned up. Can't be cleaned very well at all. You can be just totally stuck with it and you can remove stuff, right?

Let's, roll back a little bit before your computer broke. The first thing is what I teach in my cybersecurity mastery course, which is something we call a three, two, one backup.

Make sure you have a data backup.  Three, two, one talks about the number of copies, the different types of media, the different locations to store it. Having a data backup is crucial. I've been using Backblaze for a while. I have a Backblaze little partner thing, so I get literally a dollar for referring people. Just so that you know. Note:  If you go to backblaze.com they'll know I referred you because they won't.  I use it. It's six bucks a month and it'll back up a computer and all of the directly attached hard disks for six bucks a month.

Now my main computer has many, many, many terabytes of data on it. I think it's. 40 something terabytes and it cost me $6 a month. It is amazing. So check them out online, make sure you got a backup. It needs to be a solid backup, needed to have multiple copies. And this is something that people always forget, test it. Make sure you can restore that backup. This is a really good practice to follow it's something that is a part of disaster recovery. There are other parts as well.

If you are a public company or you are owned by a public company, the bottom line you have four hours under the law to get back online. It's only for four hours. What we have done for companies and we could do it for yours too, we go ahead and make sure we have additional hardware on-site in case something goes extremely wrong. That way we can get them up and running in a matter of minutes. In most cases, if they have a major crash, if the building burns to the ground, we can get them up and running in four hours. If that's what's needed.

 Of course, that costs a lot more than just doing it mean a Backblaze back up, but that's okay at the beginning. That's the start. Make sure you can restore and as always. I go over this a lot in my cybersecurity master course and on the module on backups, make sure you realize how long it will take to restore your backup. It may take weeks to back everything up. In my case, it took months, right? It may take a long time to back everything up.

How long is it going to take to restore?  Does that data backup company have an offer where they will go ahead and either restore your data to a hard drive that you can then hook up to your new computer and copy everything over that's fast? Some may even overnight that drive to you or will they take them back up and put it onto a brand new machine. That's what we do for our customers so they have it. It's not a disaster.

They have a computer that isn't working anymore. It's just totaled time for a new one. We'll go ahead and restore it, new machine, and then install that machine for them or send it to them, depending on who they are.

That is ultimately highly important. So make sure that happens before it's time to take your computer to a repair shop. Because you never know that repair shop while they're trying to fix your computer may just toast it, or maybe already toast in this case. Meaning. It is no good anymore.

So that's number one before anything. Okay.

So if your hard disk just toasts out on you and you need to take that computer now to a repair shop to get a new hard disk in it, make sure that you remove the hard disk first. Then take it in say, yeah, my hard disk is toast. You're going to need to start from scratch.

Now you're going to need to have your windows license for them. If it's a Windows computer, if it's a Mac, it just is going to work, right?  The Macintosh, I'll go ahead and do a network install, or if they know what they're doing, they can do a local install of all that Mac software, as well, to a new disk.

In this day and age, of course, the recommendation is don't use spinning media disk. Use an SSD. There are a number of different types of SSDs and the cheap ones fall apart quickly because you can only write to them so many times. The pricing has gotten a lot better for consumers.

You might have heard this week, Intel got out of the flash memory business because there just isn't the margin in it anymore. So shop around a little bit, make sure you got the best price on that.

So there you go. Number one. Good backup.

 Number two, make sure that if your disk fails, you remove it. Because you cannot do the next step, which is okay.

Make sure you remove any personal data from the computer or make sure it's encrypted.

Now, what we do because customers are regulated. If a disk is bad, we remove the disk, we break it down and we have a special furnace that we can melt those disks. Most of the platters are aluminum nowadays. There are also glass platters, but we will melt them down at extremely high temperatures and then certify that yes, indeed it is now a slag of aluminum and has been completely destroyed. That's the only way that you can meet the federal regulations if you are one of those types of companies.

 If you are someone that's just a small, basic company, you're worried, but you're not worried about China getting at it or somebody else. Right. A real bad actor. Then what you need to do is get a half-inch drill bit and make three holes. Holes in that hard disk right around the little circle. You'll see a circle in that hard disk. That's usually where the spinning media is. That's usually the central bearing. So go out an inch or two. Probably a couple of inches from that bearing and drill all the way through that will destroy the data on there. So that will help to protect your intellectual property. If you want to do it the best way, it is to melt that disk down and that's what we do for our clients as well.

Okay. So back to if the disk is still working no matter how trustworthy you think that this business is you took the computer too, is there's always a chance. There's a bad egg amongst all of the staff members there. So delete it, remove it. Again, hopefully, you have a backup. Hopefully, that backup is tested.

You can restore it afterward if your disk is encrypted and that can be true on Windows or on a Mac. There are a few different ways to do this, then.

Remember that they're going to have to boot that computer. And that may mean almost certainly mean that they're going to have to, if they, to do an end to end check boot from the disk that media that's in it.

What we tend to do is we booted off of a USB drive so that we don't have to have the decryption password for the hard disks. That way there's no temptation, right? None of my techs have that temptation because they can't get at the data anyways. 

Make sure again, boot encryptions turned on.

Stick around. We'll be back. We've got a couple more things to cover here. This is all spawned by Hunter Biden and his computer that he dropped off at the repair shop.

If you sign that little contract, in 90 days, the computer and everything on it is theirs.

Stick around.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553