loader from loading.io

Data Privacy and Computer Repair plus more on this Tech Talk with Craig Peterson Podcast

Craig Peterson - America's Leading Security Coach

Release Date: 10/23/2020

AS HEARD ON - The Jim Polito Show - WTAG 580 AM: Alternative Social Media Platforms show art AS HEARD ON - The Jim Polito Show - WTAG 580 AM: Alternative Social Media Platforms

Craig Peterson - America's Leading Security Coach

Welcome! Good morning, everybody. I was on WTAG this morning with Jim Polito.  We discussed alternatives to big tech social media platforms and why they should big tech should lose section 230 protections. Here we go with Jim. For more tech tips, news, and updates, visit - . ---  Automated Machine Generated Transcript: Craig Peterson: [00:00:00] Parler. They have committed to not blocking the things that you want to say. They're not going to hire people who hate you to somehow do something called fact-checking, which doesn't mean fact-checking, which just, again, it's so Orwellian to...

info_outline
AS HEARD ON NH Today WGIR-AM 610: Parler and Other New Social Sites, Emerging Risks and Vulnerabilities and more show art AS HEARD ON NH Today WGIR-AM 610: Parler and Other New Social Sites, Emerging Risks and Vulnerabilities and more

Craig Peterson - America's Leading Security Coach

Welcome, Craig Peterson here. I was on with Jeff Chidester on NH Today. We hit a number of interesting tech topics this morning with Jeff Chidester.  We started off with Bitcoin, Silk Road, and the IRS, then we discussed California Prop 22 and the Gig Economy, then The Hammer and Scorecard Software developed by the CIA and how it may have been used in the election last week here in the USA. Then we got into business use of Cell Phones and Employees using their personal phones for business and the problem with misconfigured VPNs. Here we go with Jeff.  These and more tech tips, news,...

info_outline
Tech Talk with Craig Peterson Podcast: Bitcoin and Ransomware Connection, The Gig Economy, Prop 22 and More show art Tech Talk with Craig Peterson Podcast: Bitcoin and Ransomware Connection, The Gig Economy, Prop 22 and More

Craig Peterson - America's Leading Security Coach

Welcome!   This week I am spending a bit of time discussing Bitcoin and other crypto-currency and their tie to Ransomware and a couple of things the Feds are doing from the IRS to DOJ.  Then we go into the Gig Economy and thru the ramifications of CA Prop 22 and More so listen in. For more tech tips, news, and updates, visit - CraigPeterson.com. --- Tech Articles Craig Thinks You Should Read: --- Automated Machine-Generated Transcript: Craig Peterson: [00:00:00] The silk road is back in the news as a billion dollars was just taken from their account. We're going...

info_outline
AS HEARD ON: WGAN Mornings News with Matt Gagnon: Elections, Hacking, USB Safety show art AS HEARD ON: WGAN Mornings News with Matt Gagnon: Elections, Hacking, USB Safety

Craig Peterson - America's Leading Security Coach

Good morning everybody!  Happy Veterans Day to all who have served and are serving! I was on WGAN this morning with Matt Gagnon and started off this morning talking about electoral issues that are taking front and center in the result counts going on.  I discussed some of the known weaknesses in our Electoral system and how it looks like they may actually have used that as a way in. Then we discussed how a Biden administration would deal with technology and a bit about Section 230 protections for Big Tech. Then we got into CA Prop 22 and the ramifications that it could have...

info_outline
AS HEARD ON - The Jim Polito Show - WTAG 580 AM: Voting and Tesla Driver Assist. show art AS HEARD ON - The Jim Polito Show - WTAG 580 AM: Voting and Tesla Driver Assist.

Craig Peterson - America's Leading Security Coach

Welcome! Good morning, everybody. I was on WTAG this morning with Jim Polito.  We discussed how technology would be affected under a Biden Presidency in Re: Fairness Doctrine. Then we got into 5G and finished up with Apple's new search engine. Here we go with Jim. For more tech tips, news, and updates visit - ---  Automated Machine Generated Transcript: Craig Peterson: [00:00:00] Hey, you had another fun time with Mr. Jim Polito this morning, and we went a little off-script, right? If you get my newsletter, you see all of the articles that I sent you now to Jim and the other radio...

info_outline
AS HEARD ON NH Today WGIR-AM 610: Bitcoin, IRS, Silk Road and Implications for CryptoTraders, CA Prop 22 and the Gig Economy  and More show art AS HEARD ON NH Today WGIR-AM 610: Bitcoin, IRS, Silk Road and Implications for CryptoTraders, CA Prop 22 and the Gig Economy and More

Craig Peterson - America's Leading Security Coach

Welcome, Craig Peterson here. I was on with Jeff Chidester on NH Today. We hit a number of interesting tech topics this morning with Jeff Chidester.  We started off with Bitcoin, Silk Road, and the IRS, then we discussed California Prop 22 and the Gig Economy, then The Hammer and Scorecard Software developed by the CIA and how it may have been used in the election last week here in the USA. Then we got into business use of Cell Phones and Employees using their personal phones for business and the problem with misconfigured VPNs. Here we go with Jeff.  These and more tech tips, news,...

info_outline
Fileless Malware, Credential Stuffing, Advanced Malware Protection plus more on this Tech Talk with Craig Peterson Podcast show art Fileless Malware, Credential Stuffing, Advanced Malware Protection plus more on this Tech Talk with Craig Peterson Podcast

Craig Peterson - America's Leading Security Coach

Welcome!  This is a "best of Craig."  I have included the current articles that you should read this week in the article section so check that out.  In this podcast, we cover Fileless Malware is on the rise, How covid is affecting the financial traders, Why you must find out what is on your Enterprise network, and more. For more tech tips, news, and updates, visit - CraigPeterson.com. ---   --- Automated Machine-Generated Transcript: Craig Peterson: [00:00:00] Massive changes ahead. We've even got traders who used to be on the floor of the stock...

info_outline
AS HEARD ON NH Today WGIR-AM 610: Printer Technology, Identifying Fraudulent Ballots and Social Engineering show art AS HEARD ON NH Today WGIR-AM 610: Printer Technology, Identifying Fraudulent Ballots and Social Engineering

Craig Peterson - America's Leading Security Coach

Welcome, It's Friday, everybody. Craig Peterson here. I was on with Jeff Chidester on NH Today. We discussed the Fraudulent Ballots and Printing Technology and how they can tell not only that it was printed. Then we got into social media and social engineering.   Here we go with Jeff.  These and more tech tips, news, and updates visit. -  ---  Automated Machine Generated Transcript: Craig Peterson: [00:00:00] That it prints on everything. And that grid has all that information. The idea is we don't want people using color copiers or printers to print money, which is why the...

info_outline
AS HEARD ON - The Jim Polito Show - WTAG 580 AM: Voting and Tesla Driver Assist. show art AS HEARD ON - The Jim Polito Show - WTAG 580 AM: Voting and Tesla Driver Assist.

Craig Peterson - America's Leading Security Coach

Welcome! Good morning, everybody. I was on WTAG this morning with Jim Polito.  Since it was Voting day, of course, we had to talk about that but then we got into a discussion about Tesla, Alpha and Beta tests, how they are perfecting their software, and what we can really expect.  Here we go with Jim. For more tech tips, news, and updates visit - ---  Automated Machine Generated Transcript: Craig Peterson: [00:00:00] There's been a lot of speculation about what that second computer is being used for and without getting into the nitty-gritty too much, the Teslas are connecting,...

info_outline
IT Wages are down, Big Tech and HIB Visas, Ransomware and the National Guard plus more on this Tech Talk with Craig Peterson Podcast show art IT Wages are down, Big Tech and HIB Visas, Ransomware and the National Guard plus more on this Tech Talk with Craig Peterson Podcast

Craig Peterson - America's Leading Security Coach

Welcome!  Craig has an exciting podcast that covers quite a few interesting topics this week including USB safety, Properly disposing of your smartphone before getting a new one, Why the National Guard is being used to investigate Cybersecurity incidents in Louisiana, Iran, and threatening mail sent to democrat voters, Phishing is back in the news and why you must train your employees to watch for it.  Then he talks about IT Wages and problems with the H1B Visa program. For more tech tips, news, and updates, visit - CraigPeterson.com. ---       U     ...

info_outline
 
More Episodes

Craig continues his explanation about computer repairs and what you can and must do to protect your data and privacy. Back up your data! Also, the proper way to destroy old disks.

For more tech tips, news, and updates, visit - CraigPeterson.com

---

FBI, DHS says hackers have gained access to election systems

The IRS Is Being Investigated for Using Location Data Without a Warrant

Clear Conquered U.S. Airports. Now It Wants to Own Your Entire Digital Identity.

5G in the US averages 51Mbps while other countries hit hundreds of megabits

IRS may put cryptocurrency question at the top of 1040 to catch cheaters

Publishers worry as ebooks fly off libraries’ virtual shelves

25% of BEC Cybercriminals Based in the US

What's Really Happening in Infosec Hiring Now?

---

Automated Machine-Generated Transcript:

Craig Peterson: [00:00:00] Do you know, what's on your computer? Do you know what they do with it? At some of these repair shops that you take your computer when it gets slow and something breaks? When you're just trying to figure it out? What the heck is happening here, man? We've got an eye-opener for you right now.

Hi everybody. Craig Peterson here. Thanks for joining me.

We talked a little bit about what it's on your computer. You may not remember everything that's on it. It may just be some malicious stuff a third party has put on there. You might have bank account information. You might have password information. You might have intellectual property on it.

If you are trying to take in a computer, that's badly broken. You're in a little bit of a hard spot here because that computer can't be cleaned up. Can't be cleaned very well at all. You can be just totally stuck with it and you can remove stuff, right?

Let's, roll back a little bit before your computer broke. The first thing is what I teach in my cybersecurity mastery course, which is something we call a three, two, one backup.

Make sure you have a data backup.  Three, two, one talks about the number of copies, the different types of media, the different locations to store it. Having a data backup is crucial. I've been using Backblaze for a while. I have a Backblaze little partner thing, so I get literally a dollar for referring people. Just so that you know. Note:  If you go to backblaze.com they'll know I referred you because they won't.  I use it. It's six bucks a month and it'll back up a computer and all of the directly attached hard disks for six bucks a month.

Now my main computer has many, many, many terabytes of data on it. I think it's. 40 something terabytes and it cost me $6 a month. It is amazing. So check them out online, make sure you got a backup. It needs to be a solid backup, needed to have multiple copies. And this is something that people always forget, test it. Make sure you can restore that backup. This is a really good practice to follow it's something that is a part of disaster recovery. There are other parts as well.

If you are a public company or you are owned by a public company, the bottom line you have four hours under the law to get back online. It's only for four hours. What we have done for companies and we could do it for yours too, we go ahead and make sure we have additional hardware on-site in case something goes extremely wrong. That way we can get them up and running in a matter of minutes. In most cases, if they have a major crash, if the building burns to the ground, we can get them up and running in four hours. If that's what's needed.

 Of course, that costs a lot more than just doing it mean a Backblaze back up, but that's okay at the beginning. That's the start. Make sure you can restore and as always. I go over this a lot in my cybersecurity master course and on the module on backups, make sure you realize how long it will take to restore your backup. It may take weeks to back everything up. In my case, it took months, right? It may take a long time to back everything up.

How long is it going to take to restore?  Does that data backup company have an offer where they will go ahead and either restore your data to a hard drive that you can then hook up to your new computer and copy everything over that's fast? Some may even overnight that drive to you or will they take them back up and put it onto a brand new machine. That's what we do for our customers so they have it. It's not a disaster.

They have a computer that isn't working anymore. It's just totaled time for a new one. We'll go ahead and restore it, new machine, and then install that machine for them or send it to them, depending on who they are.

That is ultimately highly important. So make sure that happens before it's time to take your computer to a repair shop. Because you never know that repair shop while they're trying to fix your computer may just toast it, or maybe already toast in this case. Meaning. It is no good anymore.

So that's number one before anything. Okay.

So if your hard disk just toasts out on you and you need to take that computer now to a repair shop to get a new hard disk in it, make sure that you remove the hard disk first. Then take it in say, yeah, my hard disk is toast. You're going to need to start from scratch.

Now you're going to need to have your windows license for them. If it's a Windows computer, if it's a Mac, it just is going to work, right?  The Macintosh, I'll go ahead and do a network install, or if they know what they're doing, they can do a local install of all that Mac software, as well, to a new disk.

In this day and age, of course, the recommendation is don't use spinning media disk. Use an SSD. There are a number of different types of SSDs and the cheap ones fall apart quickly because you can only write to them so many times. The pricing has gotten a lot better for consumers.

You might have heard this week, Intel got out of the flash memory business because there just isn't the margin in it anymore. So shop around a little bit, make sure you got the best price on that.

So there you go. Number one. Good backup.

 Number two, make sure that if your disk fails, you remove it. Because you cannot do the next step, which is okay.

Make sure you remove any personal data from the computer or make sure it's encrypted.

Now, what we do because customers are regulated. If a disk is bad, we remove the disk, we break it down and we have a special furnace that we can melt those disks. Most of the platters are aluminum nowadays. There are also glass platters, but we will melt them down at extremely high temperatures and then certify that yes, indeed it is now a slag of aluminum and has been completely destroyed. That's the only way that you can meet the federal regulations if you are one of those types of companies.

 If you are someone that's just a small, basic company, you're worried, but you're not worried about China getting at it or somebody else. Right. A real bad actor. Then what you need to do is get a half-inch drill bit and make three holes. Holes in that hard disk right around the little circle. You'll see a circle in that hard disk. That's usually where the spinning media is. That's usually the central bearing. So go out an inch or two. Probably a couple of inches from that bearing and drill all the way through that will destroy the data on there. So that will help to protect your intellectual property. If you want to do it the best way, it is to melt that disk down and that's what we do for our clients as well.

Okay. So back to if the disk is still working no matter how trustworthy you think that this business is you took the computer too, is there's always a chance. There's a bad egg amongst all of the staff members there. So delete it, remove it. Again, hopefully, you have a backup. Hopefully, that backup is tested.

You can restore it afterward if your disk is encrypted and that can be true on Windows or on a Mac. There are a few different ways to do this, then.

Remember that they're going to have to boot that computer. And that may mean almost certainly mean that they're going to have to, if they, to do an end to end check boot from the disk that media that's in it.

What we tend to do is we booted off of a USB drive so that we don't have to have the decryption password for the hard disks. That way there's no temptation, right? None of my techs have that temptation because they can't get at the data anyways. 

Make sure again, boot encryptions turned on.

Stick around. We'll be back. We've got a couple more things to cover here. This is all spawned by Hunter Biden and his computer that he dropped off at the repair shop.

If you sign that little contract, in 90 days, the computer and everything on it is theirs.

Stick around.

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553