loader from loading.io

AS HEARD ON - The Jim Polito Show - WTAG 580 AM: A One Second Victim - Business Email Compromise and more

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Release Date: 03/04/2020

eSIM Exposed: Safeguarding Mobile Privacy & Combatting Hacks show art eSIM Exposed: Safeguarding Mobile Privacy & Combatting Hacks

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

  Chris's $10,000 smartphone hack is just one instance of a concerning trend of cyberattacks. Today, we're delving deep into eSIM technology, a game-changer in mobile privacy and security. Cybersecurity Concerns: The rise in hacking incidents highlights the urgent need for robust cybersecurity measures, especially in the mobile space. eSIM Technology: Exploring the intricacies of eSIMs reveals both their potential and the security challenges they present. Online Privacy: With eSIMs becoming more prevalent, understanding their impact on online privacy is crucial for users. Combatting...

info_outline
Disappear Online: Expert Tips for Digital Cleansing! show art Disappear Online: Expert Tips for Digital Cleansing!

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

  In today's digital age, our online presence can become cluttered and overwhelming, affecting not just our digital identity but also our cybersecurity and privacy. Let's delve into the expert secrets of digital cleansing to ensure a safer and more secure online journey: Understanding Digital Clutter: Learn how digital clutter impacts your life and why it's essential to tidy up your online presence. Cybersecurity Concerns: Uncover the risks posed by unchecked emails, unused accounts, and shares, and how they can compromise your cybersecurity. The Importance of Online Privacy:...

info_outline
Defend Your Digital Domain: Transforming Home Networks for Cybersecurity show art Defend Your Digital Domain: Transforming Home Networks for Cybersecurity

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey there! Is your home Wi-Fi a potential cyber threat? Let’s bolster your network's defenses! Here's what you'll find in this guide: Privacy Concerns: Understand the risks associated with a vulnerable home network and the importance of safeguarding your personal information. Wi-Fi Security: Learn how to secure your home Wi-Fi network to prevent unauthorized access and protect your devices. Smart Devices: Explore the security challenges posed by smart devices and how to mitigate these risks effectively. Network Segregation: Delve into the concept of dividing your home network for...

info_outline
Unlocking the Secrets of Online Privacy: Cracking the Code to Secure Chats show art Unlocking the Secrets of Online Privacy: Cracking the Code to Secure Chats

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Have you ever paused mid-message, wondering who might be lurking in the digital shadows? I've delved deep into the realms of online privacy, spam prevention, encryption, and the intricacies of organizing your digital life to keep your conversations secure. Join me on this thrilling journey through cyberspace as we unravel the secrets of safeguarding your chats. Here's what you'll discover in our expedition: Privacy in the Digital Age: Uncover the nuances of online privacy and learn how to navigate the digital landscape confidently. Combatting Cyber Threats: Dive into the world of...

info_outline
Defend Your Inbox: The Ultimate Plus Addressing Privacy Solution! show art Defend Your Inbox: The Ultimate Plus Addressing Privacy Solution!

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey there! Ever find yourself drowning in a sea of spam emails? πŸ“§ Fret not! I've got the perfect solution to not only declutter your inbox but also fortify your online privacy and cybersecurity. πŸ›‘οΈ Introducing the ultimate guide to digital clean up, with a focus on plus addressing for enhanced privacy and organization. No more sifting through unwanted emails – this guide is your ticket to a streamlined and secure email experience. πŸ“₯ Here's what you'll find in this comprehensive guide: Privacy Reinforcement: Learn how plus addressing can act as a shield, allowing you to...

info_outline
Online Advertising Transformed: Google's Move Beyond Cookie Dependency show art Online Advertising Transformed: Google's Move Beyond Cookie Dependency

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hold onto your hats, tech enthusiasts! πŸŽ©πŸ’» Get ready for a seismic shift in the digital landscape as Google bids farewell to cookies, ushering in a new era where privacy is more than just wishful thinking. Say goodbye to the cookie craze! πŸͺ🚫 In my latest deep dive, "Digital Clean Up: Navigating Google's Game-Changing Shift in Online Advertising," I'm unraveling the intricacies of this groundbreaking move and what it means for all of us navigating the vast realms of the internet. πŸŒπŸ” Here's what you can expect in this enlightening journey: Advertising Evolution: Explore...

info_outline
Crack the Code: Mastering Windows Security and Digital Clean-Up Tactics show art Crack the Code: Mastering Windows Security and Digital Clean-Up Tactics

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In the fast-paced world of technology, your Windows device needs the ultimate defense against cyber threats. I've revamped the guide, diving deep into the realms of anti-virus protection, cybersecurity, and online privacy. Here's your roadmap to a digitally clean and secure future: Windows Defender vs. Norton vs. Malwarebytes: Uncover the strengths and limitations of each superhero in the battle against cyber villains. The War Against Malware: Arm yourself with knowledge on the latest malware trends and the tools to combat them effectively. Guarding Your Cyber Fortress: Explore...

info_outline
Boost Online Privacy: A Cyber Spring Clean show art Boost Online Privacy: A Cyber Spring Clean

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Is your digital realm resembling a messy attic? Files overflowing like forgotten knick-knacks, an inbox resembling a confetti blizzard, and social media feeds choked with digital dust bunnies? Fear not, fellow data denizens, for spring cleaning season has arrived – and this year, we're reclaiming our online peace of mind! But unlike dusting cobwebs and decluttering drawers, taming our digital wilderness requires a different arsenal. Forget brooms and vacuum cleaners – we're talking AI-powered assistants, data-detective hounds, and even a digital shredder for those long-dormant devices...

info_outline
Beyond Delete: The Ultimate Guide to Shredding Sensitive Digital Trails show art Beyond Delete: The Ultimate Guide to Shredding Sensitive Digital Trails

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey there cyber enthusiasts! Ever wondered how to transform your digital space into a fortress of security? Well, buckle up, because we've crafted the ultimate guide to help you declutter, fortify, and defend your digital realm. Our mission: to make cybersecurity engaging and effective, without drowning you in techno-jargon. Check out these key points we've covered: Wi-Fi Wonders: Unveiling the mysteries of Wi-Fi security to ensure your online activities remain secure from prying eyes. Password Power: Dive into the world of password protection, unlocking the secrets to crafting...

info_outline
Securing Your Digital Realm: The Ultimate Cybersecurity First-Aid Kit Unveiled! show art Securing Your Digital Realm: The Ultimate Cybersecurity First-Aid Kit Unveiled!

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In the vast landscape of the digital world, safeguarding your online presence is paramount. Welcome to another episode of TechTalk with Craig Peterson, where today, we unravel the secrets to fortifying your digital realm with "The Ultimate Cybersecurity First-Aid Kit." Decrypting Wi-Fi Woes Our journey begins with the cornerstone of your digital fortress: Wi-Fi encryption. No secret stays safe forever, and that includes your Wi-Fi password. We delve into the importance of encrypting your Wi-Fi, ensuring that your digital stronghold remains impenetrable. Password Party Extravaganza "abc123"...

info_outline
 
More Episodes

Welcome!

Good morning, everybody. I was on with Mr. Jim Polito this morning and we discussed a one-second mistake that can cost millions - Business Email Compromise. So, here we go with Mr. Polito.

For more tech tips, news, and updates visit - CraigPeterson.com

--- 

Automated Machine Generated Transcript:

Craig
Millions transferred electronically. I have a copy of the email in front of me right now I'm looking at it. It seems like it's from a German company. Supposedly, it's for some renovations in the building. It is what scammers do. They look at you, and they look at your business, they looked at what would be a kind of typical ask for your business. In this case, that's what they did. They knew Barbara, and they found out who her executive assistant is and what the executive assistant email address is, who bookkeeper is, and the bookkeeper's email addresses.

Craig
Good morning, everybody. It is something that really could happen.
It happened to Barbara, and I don't want to happen to you. So listen in as we go through some details. I hope again that this is going to help you from becoming a victim.

Jim
Here he is. He is our tech talk guru, and he is our good friend, and it's great to have him on our side. I'm talking about Craig Peterson. Good morning, sir.

Craig
Good morning, Mr. James.

Jim
How are you, buddy?

Craig
I'm doing great. I'm excited. Today's Super Tuesday. Maybe Finally we can finalize of this stuff today. Well, I don't know.

Jim
I think we're heading into a brokered convention. But we'll see. We'll see. But I wanted to start with you today with something exciting. My wife is a big fan of Shark Tank. I understand that one of the sharks got tanked out of $400,000 and didn't have any equity in that $400,000

Craig
Oh man, I wonder what trades you made. Yeah. It is an example of what, Jim, you and I have talked about for how long now? It is the whole concept of business email compromise.

Jim
Yeah, you have said, it happens to the smaller businesses too. That is the weak point, the weak link in the chain, and they are more susceptible to the hacks.

Craig
They are. There tends to be less training for the employees. One of the most significant risks you have, and I've seen people who've analyzed this who stay maybe 80% of a company's risk. One of the most significant risks out there is our employees. It's our not typically lower-paid, but not necessarily, who will click on stuff. Now this story about Barbara is interesting. Barbara Corcoran is one of these investors over there on Shark Tank. She's a big-time real estate investor. That's what she's been doing forever. That's how she made her money. It's interesting to read through what happened, and this one, Jim, it did have a happy ending. We typically don't see this at all. There was an invoice that forwarded to her bookkeeper that supposedly came from her executive assistant. Now, there was one minor difference here. Maybe the bookkeeper should have noticed. There was one character different in the email address that sent it.

Jim
So, a difference you've taught us about this before?

Craig
Yeah, exactly. The scammer posing as her executive assistant, forwarded this fake invoice earlier last week, requesting that a payment of $388,700 and 11 cents be transferred electronically. I have a copy of the email in front of me right now I'm looking at it. It seems like it's from a German company. Supposedly, it's for some renovations in the building. It is what scammers do. They look at you, and they look at your business, they looked at what would be a kind of typical ask for your business. In this case, that's what they did. They knew Barbara, and they found out who her executive assistant is and what the executive assistant email address is, who bookkeeper is, and the bookkeeper's email addresses. Now, you know, Jim, it's pretty easy to find most of this stuff out. It was interesting to me that I sat down with the FBI because we had pulled them in on an investigation where we found that some criminal activities going on against a small local company. They have eight employees. I sat down with the FBI. The first thing the FBI did when I did the report was they went to my website, my business website. They just tried to find out the lay of the land? Who are the people that work there? Who are the executives who are the accountants? You know, they were impressed because I didn't have any of it on my website. If you go to @mainstream.net, you'll see that under who works here, who are executives are it says due to security concerns, we don't post any of it. Yeah, exactly. But you know, what people do, right? Look at your website, or Facebook,

Jim
All that information is right there.

Craig
Now, what do we give out? Then when talking about Facebook, but you and I mentioned our wives on our Facebook page. Yeah, you and I know, well, I think both of us know not to say, Hey, I'm going to Italy. I'm going to Ireland. Next week, although obviously in your case, yeah, you're tied in with the business. Yeah. Typically, we don't mention anything like that until after the fact, so right here, that means we are relatively safe. In this case, what happened is they invested what probably amounted to 10 or 20 hours doing some research. It was thought that they're probably from Eastern Europe will tell you what happened here specifically.

Jim
Big surprise, Eastern Europe. What a big surprise.

Craig
Yeah, exactly. And 400 grand How long will that last? You know, if you're in a country where the average person makes five grand a year, do a little mental math on that. That's going to last you and your family for a long time. For what? Divide that 400,000 by 20 hours, how much an hour? That's a nice payday. It is. Barbara said, Hey, listen, when talking to experts, I'm not counting on getting me this money back. She had an excellent attitude about this whole thing because, indeed, her accountant did wire it. How they found out about this was that when the accountant wired the money, the accountant CC'ed the executive assistant, and using the correct address. Okay, so initially, the bookkeeper just replied to the email from the scammers thinking it was the legitimate executive assistant, and she wires the money. After wiring the money, she copies the real address of executive assistant who says wait a minute, hold-on now, let's stop this. People, when this happens, you don't get your money back. The FBI says it's 90 seconds. It's 90 seconds from the time that they get that wired money that it is out of the country. And pretty much gone.

Jim
90 seconds. It just reminds me of like, what was that movie?


Craig
Gone 90 seconds. Yeah. Like, boom, there it is. You can watch it go by on the computer screen.

Jim
That's it. I like to think that Steve McQueen's version was better than the remake of Nicolas Cage. Yeah.

Craig
Yeah, exactly. So here's the good news and the weird news, it never happened. They were able to contact the bank that the bookkeeper had wired the money to, and they responded quickly, right? So the German bank was able to freeze the funds in the account. Before the scammer knew it was in the account and transferred it out. Here's where it was going. In this case, it was going to China.

Jim
Oh, so it wasn't our friends in Eastern Europe.

Craig
It wasn't in this case, and it is not common, it was China. It makes you kind of wonder who in China? Much of the criminal activity in China is, of course, sponsored by their socialist government. So here's the bottom line. One hundred fourteen thousand people reported being a victim of this type of scam last year. We're talking 10s of millions of dollars in losses. According to the FBI's internet crime report. It is huge. It is a common way hackers are going after you. If it is in China or Eastern Europe, do you know who the next most person probably knows?

Jim
Right, it's your roommate. It's someone you know, who's going to hack. Yeah, right, right. Yeah, we're talking with Craig Peterson, Tech Talk guru, and at the end will tell you how you can get more information from him. Craig, you know what, before we run out of time, I want to talk about this because it caught my fancy here, this VHS vault? Pretty, pretty good idea. Why don't you explain it to everyone?

Craig
Yeah, there's a web service out there that, when started, was called the Wayback Machine. Now it's called archive.org. It is the coolest thing ever. I go on there, and I looked at old versions of my website. One time, I lost my website, and the Wayback Machine had a copy of it. It clones all of the websites, and you can go back to your favorite website and look at it as it evolved over now decades. And they got this cool new thing that you just mentioned, which is what's called the VHS vault. And if you go org, you'll see they have several different types of vaults there are. I use this one all the time where there are these ink drawings. Yeah, the 1800s of patent pictures and other things, and they've got them all there. But the VHS vault as of right now has 20,701 videos in there. And these are old VHS tapes from the years gone by some of them back, not the tapes, but the content in 1922. And wow, you can watch it in its original brilliant 480 lines if you're lucky, worth of resolution right. None of it is the stuff that you can generally find out there. It is such a cool flashback right near the top. The Beatles Let it be, and the original 35 millimeter was you know, put up there, and They're in their collection. It's called the VHS vault. You'll find it and all this other cool stuff at archive.org

Jim
Sounds pretty cool. All right, Craig, they can find more. And when I mean they I mean our audience, if they text My name to this number

Craig
855-385-5553. Text Jim to 855-385-5553

Jim
Standard data and text rates apply, Craig Peterson will provide you with updates. There's no charge for this. He won't try to sell you anything, and he won't hack you, Craig, thanks so much.
We look forward to talking with you next week.

Unknown Speaker 12:41
Take care, Jim. Bye-bye. All right, a final word about Hillary Clinton. When we return, you're listening to the Jim Polito show, your safe space.

Transcribed by https://otter.ai

--- 

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553