AS HEARD ON - The Jim Polito Show - WTAG 580 AM: The Reality of Our Security Problems
Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity
Release Date: 06/24/2020
Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity
Have you ever paused mid-message, wondering who might be lurking in the digital shadows? I've delved deep into the realms of online privacy, spam prevention, encryption, and the intricacies of organizing your digital life to keep your conversations secure. Join me on this thrilling journey through cyberspace as we unravel the secrets of safeguarding your chats. Here's what you'll discover in our expedition: Privacy in the Digital Age: Uncover the nuances of online privacy and learn how to navigate the digital landscape confidently. Combatting Cyber Threats: Dive into the world of...
info_outline Defend Your Inbox: The Ultimate Plus Addressing Privacy Solution!Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity
Hey there! Ever find yourself drowning in a sea of spam emails? 📧 Fret not! I've got the perfect solution to not only declutter your inbox but also fortify your online privacy and cybersecurity. 🛡️ Introducing the ultimate guide to digital clean up, with a focus on plus addressing for enhanced privacy and organization. No more sifting through unwanted emails – this guide is your ticket to a streamlined and secure email experience. 📥 Here's what you'll find in this comprehensive guide: Privacy Reinforcement: Learn how plus addressing can act as a shield, allowing you to...
info_outline Online Advertising Transformed: Google's Move Beyond Cookie DependencyCraig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity
Hold onto your hats, tech enthusiasts! 🎩💻 Get ready for a seismic shift in the digital landscape as Google bids farewell to cookies, ushering in a new era where privacy is more than just wishful thinking. Say goodbye to the cookie craze! 🍪🚫 In my latest deep dive, "Digital Clean Up: Navigating Google's Game-Changing Shift in Online Advertising," I'm unraveling the intricacies of this groundbreaking move and what it means for all of us navigating the vast realms of the internet. 🌐🔍 Here's what you can expect in this enlightening journey: Advertising Evolution: Explore...
info_outline Crack the Code: Mastering Windows Security and Digital Clean-Up TacticsCraig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity
In the fast-paced world of technology, your Windows device needs the ultimate defense against cyber threats. I've revamped the guide, diving deep into the realms of anti-virus protection, cybersecurity, and online privacy. Here's your roadmap to a digitally clean and secure future: Windows Defender vs. Norton vs. Malwarebytes: Uncover the strengths and limitations of each superhero in the battle against cyber villains. The War Against Malware: Arm yourself with knowledge on the latest malware trends and the tools to combat them effectively. Guarding Your Cyber Fortress: Explore...
info_outline Boost Online Privacy: A Cyber Spring CleanCraig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity
Is your digital realm resembling a messy attic? Files overflowing like forgotten knick-knacks, an inbox resembling a confetti blizzard, and social media feeds choked with digital dust bunnies? Fear not, fellow data denizens, for spring cleaning season has arrived – and this year, we're reclaiming our online peace of mind! But unlike dusting cobwebs and decluttering drawers, taming our digital wilderness requires a different arsenal. Forget brooms and vacuum cleaners – we're talking AI-powered assistants, data-detective hounds, and even a digital shredder for those long-dormant devices...
info_outline Beyond Delete: The Ultimate Guide to Shredding Sensitive Digital TrailsCraig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity
Hey there cyber enthusiasts! Ever wondered how to transform your digital space into a fortress of security? Well, buckle up, because we've crafted the ultimate guide to help you declutter, fortify, and defend your digital realm. Our mission: to make cybersecurity engaging and effective, without drowning you in techno-jargon. Check out these key points we've covered: Wi-Fi Wonders: Unveiling the mysteries of Wi-Fi security to ensure your online activities remain secure from prying eyes. Password Power: Dive into the world of password protection, unlocking the secrets to crafting...
info_outline Securing Your Digital Realm: The Ultimate Cybersecurity First-Aid Kit Unveiled!Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity
In the vast landscape of the digital world, safeguarding your online presence is paramount. Welcome to another episode of TechTalk with Craig Peterson, where today, we unravel the secrets to fortifying your digital realm with "The Ultimate Cybersecurity First-Aid Kit." Decrypting Wi-Fi Woes Our journey begins with the cornerstone of your digital fortress: Wi-Fi encryption. No secret stays safe forever, and that includes your Wi-Fi password. We delve into the importance of encrypting your Wi-Fi, ensuring that your digital stronghold remains impenetrable. Password Party Extravaganza "abc123"...
info_outline The Mobile Malware Menace: Protecting Against Evolving ThreatsCraig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity
In today's fast-paced digital age, staying ahead of the curve is not just an advantage; it's a necessity. From the electrifying world of electric vehicles to the intricate web of mobile security, and the visionary influence of Elon Musk, there's a lot to unpack. Join us on this insightful journey as we explore key topics that are shaping the future of technology. 1. Electric Vehicles (EVs): Paving the Way for a Green Future The surge in popularity of electric vehicles is undeniable. We delve into the latest advancements, innovations, and the environmental impact of EVs, providing you with a...
info_outline Scan Smart, Stay Safe: Mastering the Art of QR Code DefenseCraig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity
In a world dominated by QR codes, the risk of falling prey to digital tricksters is on the rise. Fear not, fellow entrepreneurs, for we've decoded the secrets to outsmarting these cyber hosers and keeping your digital fortress secure! QR Code Unveiled: Understanding the Basics Let's kick things off with a deep dive into the world of QR codes. Learn what makes them tick and how scammers exploit these seemingly innocent codes to compromise your cybersecurity. The Rise of AI and Its Role in QR Code Shenanigans Artificial Intelligence (AI) has ushered in a new era, and unfortunately,...
info_outline Digital Media Ownership Debunked: The Tactical Octopus UnveiledCraig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity
In the ever-evolving landscape of digital media, the illusion of ownership can be shattered with a single tactical move. Recently, the PlayStation community experienced a rude awakening when paid content was abruptly removed - and no refunds were given. This underscores a widespread issue: do you own the digital shows and movies you 'bought'? Topics Explored in the Article: Tactical Octopus Unveiled: Delve into the intricate tactics used in the digital realm that challenge the perception of ownership. IRS Alert: Explore the unexpected connection between the IRS and your digital...
info_outlineWelcome!
Good morning, everybody. I was on with Jim Polito and we discussed the reality of business security problems today, how they are getting worse and why we have to fix them. Here we go with Jim.
For more tech tips, news, and updates visit - CraigPeterson.com
---
Automated Machine Generated Transcript:
Craig Peterson: The way you do that type of cyber attack in this day and age is you don't come out and say, Hey, it's time.
[00:00:11] Hi everybody. Craig Peterson here. That's S O N you'll find me [email protected]. That was me with Mr. Jim Polito we talked about how things are much worse than we may realize. I got into real-world stuff what's happening right now to our businesses and to our homes. This is, this is something I think everybody needs to be really aware of. And maybe trying to something about it.
[00:00:47]Jim Polito: He is the man. He is the myth. He is the legend. I'm talking about our good friend and tech talk guru. Craig Peterson. Good morning, Craig.
[00:01:01] Hey, next Tuesday will be our Canada day Eve edition of our visit with the tech talk guru. Oh, you didn't think I would forget Canada day. Did you?
[00:01:16] Craig Peterson: No Canada got its independence kind of in 1967. I remember that when I was in elementary school and, you know, they taught us the communist song. You know, This land is your land.
[00:01:28] Okay. Canadian version. And we all stood there singing it and, you know, heralding the, our fellow comrades. but yeah, comrades. Yeah.
[00:01:41] Jim Polito: No, that was a Canada day. Yeah, I know. No, believe me. I, I know. Well, speaking of comrades, our comrade, the little guy, rocket man. Has assembled a shall we say an army of 7,000 highly trained, highly skilled individuals.
[00:02:02] Now people may say 7,000. What, what could they do? How about bringing about an Armageddon close to what a nuclear weapon could do. Am I correct that Kim Jong-UN now has a force that could bring about Armageddon.
[00:02:23] Craig Peterson: Oh, you are dead on there. Jim, this is a scary thing, frankly, you know, we think of North Korea and we, we think about all of these people who are in everything are in concentration camps, through the cities, many people out in the rural areas, infected with all kinds of diseases.
[00:02:43] And I don't want to get too gross about this, but if we think of it as really a. Third or maybe fourth world country and in many ways it is. But what has been going on in North Korea is apparently they've been receiving training in China or in Russia to build this massive cyber army. When you talk about bringing about a kind of an Armageddon, it is absolutely the case.
[00:03:16] Look at what's happened with the Wuhan virus shutdown that we have right now. Right. Nobody wants to get Covid-19, which makes a whole lot of sense. Right. But now what these guys and gals could potentially do is go after our power systems and other infrastructure. If they got to the right place at the right time, they could bring our electric grid back to the 18 hundreds.
[00:03:48]It could take months in order to recover. That would have.
[00:03:54] Jim Polito: Yeah, no, it's bad. It's bad.
[00:03:56] Craig Peterson: So, Kim Jung Un, rocket man, the little guy, while he can't develop the expertise to put together an Intercontinental ballistic missile and, he may have a bomb. Well, he's definitely got a bomb. You know, we can't put all that technology together.
[00:04:17] He can go to his big brother in China. And say, teach me how to do all of this stuff. and we know that he's already really been successful. Remember, what was it? The Sony films hack after that movie, the interview came out. That was a spoof on him. And, to get even he set his dogs on a Hollywood and boy, they, they, they were effective.
[00:04:44] Well, you might remember too, that the White House blamed North Korea for unleashing the Wanna Cry cyberattack back in 2017, three years ago. It was absolutely massive. It caused devastation worldwide. Now here's part of the problem with this, obviously. We don't want North Korea to be getting in and taking over systems or bringing various systems down, but they're a way you do this type of cyber attack in this day and age is you don't come out and say, Hey, it's like black lives matter. You've got people in the street who really are there, their hearts are in it. It's really because they care about black lives and, and who doesn't. Right. Behind all of these people are the Marxists who are throwing the firebombs. So we're doing various things to really stir up and foment all kinds of turmoil.
[00:05:46] That's what we're seeing with North Korea because they can hop onto a computer. That's been taken over, let's say in wherever Eastern Europe, somewhere and from that computer, they hop onto a computer here in the United States. Somebody's own computer for instance and the person whose home computer they're using has no clue any of this is going on.
[00:06:11] Even if they're on their computer at the time. And then they'll hop from that computer to another computer, to another computer. They'll use our computers as what are called botnets to attack our military, to attack our infrastructure. And in reality, Jim, we don't really know where it's coming from.
[00:06:32] Jim Polito: Yeah.
[00:06:33] Craig Peterson: Big because it's very difficult to trace.
[00:06:35] Now we're talking with our tech talk guru friend, Craig, Peterson. and at the end of this segment, we'll give you a number that you can text my name to and get other information from Craig. Don't think that I'm the genius doing great show prep. He sent me the stuff about Kim Jong-UN and, and I've been reading through it and been and been quite concerned. Okay. I do sometimes hear from people.
[00:06:57] Oh my God, Jim, when you and Craig talk about this stuff, you get me very concerned. Now I'm not talking about like a, business's being hacked. I'm talking about this kind of stuff, shutting down our power grid and things like that.
[00:07:11] Jim Polito: Now, Craig, we have to assume that our government has a counter to this. Is it reasonable for me to assume that
[00:07:24] Craig Peterson: Yeah, it absolutely is. We have first strike offensive capabilities in the cyber world and all branches of our military have Cyber teams that put the 7,000 North Korea have to shame. So we have both defensive capabilities, which frankly we're not using as much as we should because incompetence runs rampant in every field, but we also have both defensive capabilities.
[00:07:57] Jim Polito: God. it's just so the real war in the future, remember that Star Trek episode where the computers. You know, there was war between the computers and the, and the enterprise was attacked and X amount of, members of their crew were supposed to walk off to be executed because, in this war games where there's no, the actual firing of weapons, the computers had determined that they had lost that the enterprise had been hit well in the room.
[00:08:31] Well, I mean here with us, we're not too far away from it.
[00:08:34] Craig Peterson: Yeah. That's one of my favorite episodes is called a taste of Armageddon, the original Star Trek series. And we are not in some ways very far away from that, because most countries don't want to lob a nuclear weapon. Pretty easy to tell where it came from, especially now that almost everybody can look down from space to see where it was.
[00:08:55] Jim Polito: Yeah.
[00:08:56]Craig Peterson: It's, it's very hard to trace, these attacks that are going on. Now, part of what Kim Jong loon apparently had done, he was able to break into some South Korean defense contractors stole about 40,000 of these things, including information on F 16 fighters and drones. Now, I, I hate to say this next part.
[00:09:22] Because, you know, what I do for a living is I help businesses put their security together.
[00:09:28] Jim Polito: Okay.
[00:09:29] Craig Peterson: So we get calls from businesses every week and saying, Hey, you know, we've got these new CMMC regulations, which are part of the department of defense. You know, ITAR, DFARS, all these different things. we, can you come in and help us out with this and the part I don't want it to say is
[00:09:50] I'm not going to say this is every time we go in but we're seeing nowadays not only a lot of attacks against these extremely small defense contractors, but I'm also not talking about the Raytheon's of the world. I'm talking about the local business that makes an assembly. That sold to a defense contractor that is sold maybe to another defense contractor and sold to the department of defense.
[00:10:17] I'm not going to say that I go into these businesses and every time, but over the last, basically, since at least the beginning of the year, we have found it Chinese back doors wide open. And what's that mean? Is, yes, our defense contractors. You look at this, right. And then, apparently, North Korea bought these plans for the F 16 fighters and drones.
[00:10:45] Well, how do they do that? Well, they get these back doors installed and then. Every case we have where we found these things. And in fact, we found a very small defense contractor that I had the worst infection ever seen by the Boston FBI office. And they all had antivirus software. They all had walls. They all thought the word safe.
[00:11:16] Jim Polito: And they're not. Wow.
[00:11:18] Craig Peterson: So you didn't hear from me, but that's the real skinny on what we're seeing out there on the streets right now.
[00:11:26] Jim Polito: Okay. Yeah. this is not good. This is not good, but what you need to do. Is to protect yourself by getting the latest information. And that's by listening to the segment with Craig Peterson, but that is also getting on his list, his good list where he will not try to sell you stuff or hack you.
[00:11:44] And all that you have to do is tax my name to this number (855) 385-5553.
[00:11:53] Craig Peterson: So you can text Jim to (855) 385-5553. And I also answer questions. It may take me a few days. We're pretty busy, but just send an email to [email protected] about any questions, whether you're a defense contractor or you're a home user, right. I'm helping people in their eighties every day as well. Jim.
[00:12:16] Jim Polito: All right. And standard data and tax rates apply Craig. An excellent segment as usual, and we look forward to talking with you on Canada day Eve. Next Tuesday.
[00:12:30] Craig Peterson: Thanks, Jim. I'll buy the Molson.
[00:12:32] Jim Polito: Thanks, buddy. Bye-bye. All right. When we return a final word.
[00:12:36] Craig Peterson: Awesome. All right, everybody, we'll be having a great week. We have some amazing stuff planned. this Karen and I were sitting down. Trying to figure out how can we help the most people, what's the most important thing for us to do. And we are going to be teaching that we've got all of the basics put together.
[00:12:56] It's going to take us probably a couple more weeks. I know it's always a couple of weeks, right. And we're going to show you exactly. How to tell if your computer needs a little bit more security or maybe a lot more security. So keep an ear to the ground. This is going to be absolutely free training and it's coming up.
[00:13:18] I Got you guys.
[00:13:20] Take care. I'll be back tomorrow. Bye-bye.
---
More stories and tech updates at:
Don't miss an episode from Craig. Subscribe and give us a rating:
Follow me on Twitter for the latest in tech at:
For questions, call or text:
855-385-5553