<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/atom+xml" href="https://feeds.transistor.fm/stupid-or-just-irresponsible" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Stupid... or Just Irresponsible?</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/stupid-or-just-irresponsible</itunes:new-feed-url>
    <description>People do the dumbest things! (Myself included) And then get so upset when it blows up in their face. We're here to break down the stupid, the irresponsible, the reckless, and the absurd where technology is concerned. As an added bonus, we'll see if we can't learn something in the process.</description>
    <copyright>© 2025 Master Computing</copyright>
    <podcast:guid>7dd689ff-f813-5723-aad3-e39cd2c99cad</podcast:guid>
    <podcast:locked owner="justin@master-computing.com">no</podcast:locked>
    <language>en</language>
    <pubDate>Wed, 23 Jul 2025 09:36:31 -0500</pubDate>
    <lastBuildDate>Tue, 02 Dec 2025 15:18:40 -0600</lastBuildDate>
    <link>http://stupidorirresponsible.com</link>
    <image>
      <url>https://img.transistor.fm/qfuT19n7tveovAza80QCVkYL-EkEJtD4awqjGe611LE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzExMTE1LzE1OTA2/MTE0MDItYXJ0d29y/ay5qcGc.jpg</url>
      <title>Stupid... or Just Irresponsible?</title>
      <link>http://stupidorirresponsible.com</link>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="Business"/>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Master Computing</itunes:author>
    <itunes:image href="https://img.transistor.fm/qfuT19n7tveovAza80QCVkYL-EkEJtD4awqjGe611LE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzExMTE1LzE1OTA2/MTE0MDItYXJ0d29y/ay5qcGc.jpg"/>
    <itunes:summary>People do the dumbest things! (Myself included) And then get so upset when it blows up in their face. We're here to break down the stupid, the irresponsible, the reckless, and the absurd where technology is concerned. As an added bonus, we'll see if we can't learn something in the process.</itunes:summary>
    <itunes:subtitle>People do the dumbest things.</itunes:subtitle>
    <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
    <itunes:owner>
      <itunes:name>Justin Shelley</itunes:name>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>Yes</itunes:explicit>
    <item>
      <title>32. It's Scary What Kids Can See Online</title>
      <itunes:episode>32</itunes:episode>
      <podcast:episode>32</podcast:episode>
      <itunes:title>32. It's Scary What Kids Can See Online</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">76b90683-b8ce-47f7-95f5-d0b05f64fe30</guid>
      <link>https://share.transistor.fm/s/99ca0e60</link>
      <description>
        <![CDATA[<p><strong>UPDATE to last week's Headlines:<br></strong>Kaseya's universal REvil decryption key leaked on a hacking forum by a poster, who is believed to be affiliated with the REvil ransomware gang, on a hacking forum, tests successfully. </p><ul><li>On July 22nd, Kaseya obtained a universal decryption key for the ransomware attack from a mysterious "trusted third party" and began distributing it to affected customers.</li><li>Before sharing the decryptor with customers, CNN reported that Kaseya required them to sign a non-disclosure agreement, which may explain why the decryption key hasn't shown up until now.</li></ul><p>On July 13, CrowdStrike successfully detected and prevented attempts at exploiting the PrintNightmare vulnerability from Cogni and Magniber Ransomware groups, all in south Asia, protecting customers before any encryption takes place, They have seen almost 600 submissions in the last 30 days (July 12-Aug 12th).  Also, Vice Society ransomware, which targets small and midsize schools.</p><p><br></p><p><strong>This Week's Security Tip:<br></strong>It’s scary what kids can see online. Here are some little-known ways to see if your kid is doing things and visiting sites you don’t want them to:</p><ol><li>They’ve deleted their browsing history. What are they hiding?</li><li>The ads showing up are questionable. Marketers use retargeting to get you to come back to their websites. So if you’re seeing ads that make you go “hmmmm,” that’s a sign they’ve been visiting those sites.</li><li>They hide when using the device. A good rule of thumb is NO devices in bedrooms, or in any room that is not out in the open.</li></ol><p><br></p><p><strong>Today's Headlines:<br></strong>On Tuesday, just over $600 million in cryptoassets were stolen from Poly Network, a system that allows users to transfer digital tokens from one blockchain to another.  The threat actor who hacked Poly Network's cross-chain interoperability protocol yesterday to steal over $600 million worth of cryptocurrency assets is now returning the stolen funds.  He then sent multiple transactions to the same with text embedded in each transaction, he included a Q&amp;A explaining his motives, including the line "why hack? For fun 😊"</p><p><br>Sentinel One has detected another AdLoad malwarevariant that Apple's YARA signature-based XProtect built-in antivirus undetected for at least 10 months, and currently still undetected.  Variations of this strain have been detected since 2017, and is used to deploy various payloads, mostly adware and PUAs (potentially unwanted apps), and harvest sytem info.  </p><ul><li>To put things into perspective, Shlayer, another common macOS malware strain that has also been able to bypass XProtect before and infect Macs with other malicious payloads, has hit over 10% of all Apple computers monitored by Kaspersky.</li></ul><p><br></p><p><strong>Next Week's Teaser:<br></strong>NEVER use the same password twice<strong></strong></p><p>Call to Action: Book a 10-minute Discovery Call right now. I’ll ask some key questions and give you a quick score. If you’re doing everything right, you can sleep better at night. If there’s room for improvement, we’ll discuss options. NO PRESSURE, NO STRINGS. JUST BOOK THE CALL!</p><p><a href="https://www.mastercomputing.com/discoverycall/">www.mastercomputing.com/discovery</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>UPDATE to last week's Headlines:<br></strong>Kaseya's universal REvil decryption key leaked on a hacking forum by a poster, who is believed to be affiliated with the REvil ransomware gang, on a hacking forum, tests successfully. </p><ul><li>On July 22nd, Kaseya obtained a universal decryption key for the ransomware attack from a mysterious "trusted third party" and began distributing it to affected customers.</li><li>Before sharing the decryptor with customers, CNN reported that Kaseya required them to sign a non-disclosure agreement, which may explain why the decryption key hasn't shown up until now.</li></ul><p>On July 13, CrowdStrike successfully detected and prevented attempts at exploiting the PrintNightmare vulnerability from Cogni and Magniber Ransomware groups, all in south Asia, protecting customers before any encryption takes place, They have seen almost 600 submissions in the last 30 days (July 12-Aug 12th).  Also, Vice Society ransomware, which targets small and midsize schools.</p><p><br></p><p><strong>This Week's Security Tip:<br></strong>It’s scary what kids can see online. Here are some little-known ways to see if your kid is doing things and visiting sites you don’t want them to:</p><ol><li>They’ve deleted their browsing history. What are they hiding?</li><li>The ads showing up are questionable. Marketers use retargeting to get you to come back to their websites. So if you’re seeing ads that make you go “hmmmm,” that’s a sign they’ve been visiting those sites.</li><li>They hide when using the device. A good rule of thumb is NO devices in bedrooms, or in any room that is not out in the open.</li></ol><p><br></p><p><strong>Today's Headlines:<br></strong>On Tuesday, just over $600 million in cryptoassets were stolen from Poly Network, a system that allows users to transfer digital tokens from one blockchain to another.  The threat actor who hacked Poly Network's cross-chain interoperability protocol yesterday to steal over $600 million worth of cryptocurrency assets is now returning the stolen funds.  He then sent multiple transactions to the same with text embedded in each transaction, he included a Q&amp;A explaining his motives, including the line "why hack? For fun 😊"</p><p><br>Sentinel One has detected another AdLoad malwarevariant that Apple's YARA signature-based XProtect built-in antivirus undetected for at least 10 months, and currently still undetected.  Variations of this strain have been detected since 2017, and is used to deploy various payloads, mostly adware and PUAs (potentially unwanted apps), and harvest sytem info.  </p><ul><li>To put things into perspective, Shlayer, another common macOS malware strain that has also been able to bypass XProtect before and infect Macs with other malicious payloads, has hit over 10% of all Apple computers monitored by Kaspersky.</li></ul><p><br></p><p><strong>Next Week's Teaser:<br></strong>NEVER use the same password twice<strong></strong></p><p>Call to Action: Book a 10-minute Discovery Call right now. I’ll ask some key questions and give you a quick score. If you’re doing everything right, you can sleep better at night. If there’s room for improvement, we’ll discuss options. NO PRESSURE, NO STRINGS. JUST BOOK THE CALL!</p><p><a href="https://www.mastercomputing.com/discoverycall/">www.mastercomputing.com/discovery</a> </p>]]>
      </content:encoded>
      <pubDate>Mon, 16 Aug 2021 06:00:00 -0500</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/99ca0e60/d51ec3c0.mp3" length="42508276" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>1769</itunes:duration>
      <itunes:summary>Here are some ways to see if your kid is doing things and visiting sites you don’t want them to</itunes:summary>
      <itunes:subtitle>Here are some ways to see if your kid is doing things and visiting sites you don’t want them to</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>31. Your Copier Is Spying On You</title>
      <itunes:episode>31</itunes:episode>
      <podcast:episode>31</podcast:episode>
      <itunes:title>31. Your Copier Is Spying On You</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">42e32193-4337-45e0-8b41-ef03b69a6539</guid>
      <link>https://share.transistor.fm/s/7b197eea</link>
      <description>
        <![CDATA[]]>
      </description>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <pubDate>Mon, 09 Aug 2021 06:00:00 -0500</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/7b197eea/03efe911.mp3" length="49850259" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>2075</itunes:duration>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>Yes</itunes:explicit>
    </item>
    <item>
      <title>30. E-mail is NOT Private</title>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:title>30. E-mail is NOT Private</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">261cc705-2be1-4fdc-b98a-d501d9ec216f</guid>
      <link>https://share.transistor.fm/s/4d5eaef5</link>
      <description>
        <![CDATA[]]>
      </description>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <pubDate>Mon, 26 Jul 2021 06:00:00 -0500</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/4d5eaef5/d5373218.mp3" length="35725577" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>1486</itunes:duration>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>29. What Is An AUP, And Why Do You Need One?</title>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:title>29. What Is An AUP, And Why Do You Need One?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">75ec7b75-5ae3-4a08-81a1-47a090925b4f</guid>
      <link>https://share.transistor.fm/s/ed620192</link>
      <description>
        <![CDATA[<p><strong>This Week's Security Tip: </strong>Make sure EVERY employee knows what is acceptable and what is not, regarding company technology. </p><p>With so many access points, from cell phones to laptop and home computers, how can anyone hope to keep their network safe from hackers, viruses and other unintentional security breaches? The answer is not “one thing” but a series of things you have to implement and constantly be vigilant about, such as installing and constantly updating your firewall, antivirus, spam-filtering software and backups. This is why clients hire us – it’s a full-time job for someone with specific expertise (which we have!).</p><p>Once that basic foundation is in place, the next most important thing you can do is create an Acceptable Use Policy (AUP) and TRAIN your employees on how to use company devices and other security protocols, such as never accessing company e-mail, data or applications with unprotected home PCs and devices (for example). Also, how to create good passwords, how to recognize a phishing e-mail, what websites to never access, etc. NEVER assume your employees know everything they need to know about IT security. Threats are ever-evolving and attacks are getting more sophisticated and clever by the minute.</p><p><strong>UPDATE to last week's Headlines:</strong></p><ul><li>Kasaya VSA breach – has been on their CVE for 3 months, also upon a third party security incidence response evaluation, they found their billing and customer support site, portal.kasaya.net, was, and has been since July 2015, susceptible to CVE 2015-2862, a "directory transversal attack – basically, even without credentials you could access server files and locations, including the web.config file, which includes usernames, passwords, and locations to other sensitive information..  Kasaya had updated their customer portal in 2018, but left their legacy portal alive.<p></p></li><li>Microsoft issues Emergency patch for PrintNightmare – We briefly mentioned this last episode, but the story goes:<p>A security researcher publicly announced the initial vulnerability, allowing for the print spooler, which by default runs on all Windows versions by default with kernel level administrative rights, could be maliciously used to run remote executable code, potentially take over the entire domain.   In the next update, Microsoft issued a weak patch that only addressed the point of concept, but didn't really address the actual vulnerability.  Another research team then publicly reported a point of concept they too had reported to MS: a different CVE than the other, which in summary was an active exploit – so basically they published a how-to on a zero day.  SO then MS had to patch both the first CVE and second as fast as they could, and finally after a couple days did offer an out of band update which covers both</p><p></p></li><li>WD – to recap, A flaw for all WD MyBook external drives of a zero-day exploit was reported in 2020 prior to Pwn2Own Tokyo, but WD replied that the bug had been resolved in their new OS5 software.  The research team then posted a video of the proof of concept.  Go figure, tons of them in the wild were then (and probably still are) being wiped by malicious hackers. WD's initial response in March was to advise eveyrone with a MyBook on v3 upgrade to a dvice that can use v5 (basically a new one), and that they would not update the old versions with security patches.  Facing a backlash of angry customers, Western Digital also <a href="https://www.westerndigital.com/support/productsecurity/wdc-21008-recommended-security-measures-wd-mybooklive-wd-mybookliveduo">pledged</a> to provide data recovery services to affected customers starting this month. “MyBook Live customers will also be eligible for a trade-in program so they can upgrade to MyCloud devices,” Goodin wrote. “A spokeswoman said the data recovery service will be free of charge.”</li></ul><p><strong>Next Week's Teaser:<br></strong>What the heck is an AUP…and why do you want it?<strong></strong></p><p>Call to Action: We talk a lot about stupid (nothing bad ever happens to me; head in the sand; too busy; I’ll do it later). So what’s smart? Taking this seriously TODAY. Book a 10-minute Discovery Call right now. I’ll ask some key questions and give you a quick score. If you’re doing everything right, you can sleep better at night. If there’s room for improvement, we’ll discuss options. NO PRESSURE, NO STRINGS. JUST BOOK THE CALL!</p><p><a href="https://www.mastercomputing.com/discoverycall/">www.mastercomputing.com/discovery</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>This Week's Security Tip: </strong>Make sure EVERY employee knows what is acceptable and what is not, regarding company technology. </p><p>With so many access points, from cell phones to laptop and home computers, how can anyone hope to keep their network safe from hackers, viruses and other unintentional security breaches? The answer is not “one thing” but a series of things you have to implement and constantly be vigilant about, such as installing and constantly updating your firewall, antivirus, spam-filtering software and backups. This is why clients hire us – it’s a full-time job for someone with specific expertise (which we have!).</p><p>Once that basic foundation is in place, the next most important thing you can do is create an Acceptable Use Policy (AUP) and TRAIN your employees on how to use company devices and other security protocols, such as never accessing company e-mail, data or applications with unprotected home PCs and devices (for example). Also, how to create good passwords, how to recognize a phishing e-mail, what websites to never access, etc. NEVER assume your employees know everything they need to know about IT security. Threats are ever-evolving and attacks are getting more sophisticated and clever by the minute.</p><p><strong>UPDATE to last week's Headlines:</strong></p><ul><li>Kasaya VSA breach – has been on their CVE for 3 months, also upon a third party security incidence response evaluation, they found their billing and customer support site, portal.kasaya.net, was, and has been since July 2015, susceptible to CVE 2015-2862, a "directory transversal attack – basically, even without credentials you could access server files and locations, including the web.config file, which includes usernames, passwords, and locations to other sensitive information..  Kasaya had updated their customer portal in 2018, but left their legacy portal alive.<p></p></li><li>Microsoft issues Emergency patch for PrintNightmare – We briefly mentioned this last episode, but the story goes:<p>A security researcher publicly announced the initial vulnerability, allowing for the print spooler, which by default runs on all Windows versions by default with kernel level administrative rights, could be maliciously used to run remote executable code, potentially take over the entire domain.   In the next update, Microsoft issued a weak patch that only addressed the point of concept, but didn't really address the actual vulnerability.  Another research team then publicly reported a point of concept they too had reported to MS: a different CVE than the other, which in summary was an active exploit – so basically they published a how-to on a zero day.  SO then MS had to patch both the first CVE and second as fast as they could, and finally after a couple days did offer an out of band update which covers both</p><p></p></li><li>WD – to recap, A flaw for all WD MyBook external drives of a zero-day exploit was reported in 2020 prior to Pwn2Own Tokyo, but WD replied that the bug had been resolved in their new OS5 software.  The research team then posted a video of the proof of concept.  Go figure, tons of them in the wild were then (and probably still are) being wiped by malicious hackers. WD's initial response in March was to advise eveyrone with a MyBook on v3 upgrade to a dvice that can use v5 (basically a new one), and that they would not update the old versions with security patches.  Facing a backlash of angry customers, Western Digital also <a href="https://www.westerndigital.com/support/productsecurity/wdc-21008-recommended-security-measures-wd-mybooklive-wd-mybookliveduo">pledged</a> to provide data recovery services to affected customers starting this month. “MyBook Live customers will also be eligible for a trade-in program so they can upgrade to MyCloud devices,” Goodin wrote. “A spokeswoman said the data recovery service will be free of charge.”</li></ul><p><strong>Next Week's Teaser:<br></strong>What the heck is an AUP…and why do you want it?<strong></strong></p><p>Call to Action: We talk a lot about stupid (nothing bad ever happens to me; head in the sand; too busy; I’ll do it later). So what’s smart? Taking this seriously TODAY. Book a 10-minute Discovery Call right now. I’ll ask some key questions and give you a quick score. If you’re doing everything right, you can sleep better at night. If there’s room for improvement, we’ll discuss options. NO PRESSURE, NO STRINGS. JUST BOOK THE CALL!</p><p><a href="https://www.mastercomputing.com/discoverycall/">www.mastercomputing.com/discovery</a> </p>]]>
      </content:encoded>
      <pubDate>Mon, 12 Jul 2021 06:00:00 -0500</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/ed620192/fc1af334.mp3" length="46359700" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>1929</itunes:duration>
      <itunes:summary>Make sure EVERY employee knows what they can and cannot do with company technology. Ongoing training is crucial.</itunes:summary>
      <itunes:subtitle>Make sure EVERY employee knows what they can and cannot do with company technology. Ongoing training is crucial.</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>28. Keep Your Mobile Phone Safe</title>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:title>28. Keep Your Mobile Phone Safe</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0b9992be-f2b6-4b2a-a3d7-6bcf7416fb08</guid>
      <link>https://share.transistor.fm/s/707f8439</link>
      <description>
        <![CDATA[<p><strong>UPDATE to last week's Headlines:<br></strong>Microsoft officially releases Windows 11 announcement, preview.  Expected to arrive Oct 20</p><p><strong>This Week's Security Tip:<br></strong>10 easy tips for mobile phone security:</p><p>1. Lock your device with a PIN or password, and never leave it unattended in public <br>2. Uninstall apps you don’t use <br>3. ONLY download apps from trusted sources <br>4. Keep your phone’s operating system updated <br>5. Install antivirus software <br>6. Use your phone’s “find me” feature to prevent loss or theft <br>7. Cover the camera with a camera sticker when not in use <br>8. Back up your data <br>9. Encrypt the data if you have sensitive info stored on it <br>10. Don’t click on links or attachments from unsolicited e-mails or texts</p><p><strong>Today's Headlines:</strong></p><ul><li>Western Digital MyBook users urged to unplug devices from the network - malicious hackers are remotely wiping the drives using a critical flaw that can be triggered by anyone who knows the Internet address of an affected device.</li><li>Quickbooks Online opts users in to share payroll info of 1.4 million small businesses with Equifax, who has been and will be hacked again. (To disable sing-in to QBO, go to Payroll settings, uncheck "Shared Data.")</li><li>Eight unsecured databases were found leaking approximately 60 million records of LinkedIn user information. While most of the information is publicly available, the databases contain the email addresses of the LinkedIn users.</li><li>HSE, socialized public healthcare system of Ireland, breached in May and 700GB of patient and employee data, orders Virus total to reveal </li><li>Briefly mention PrintNightmare, security vulnerability that affect every version of Windows.  Much more in depth next week.<p></p></li><li>Kasaya ransom: $70,000,000 for universal decryptor ($5mill per individual compromise) <ul><li>fewer than 40 customers worldwide, though all MSPs with over 1000 clients</li><li>Supply chain attack on on-prem servers – all from US based hosting servers.  CISA and Biden announce almost immediately they are investigating and blame Revil/Russia.  This all comes weeks after FBI/DOJ seized ReVIL/Darkside servers.</li><li>Was allegedly a known exploit that Kasaya was in the process of patching, before the zero-day attack was carried out.</li></ul></li></ul><p><strong>Next Week's Teaser:<br></strong>What the heck is an AUP…and why do you want it?<strong></strong></p><p>Call to Action: We talk a lot about stupid (nothing bad ever happens to me; head in the sand; too busy; I’ll do it later). So what’s smart? Taking this seriously TODAY. Book a 10-minute Discovery Call right now. I’ll ask some key questions and give you a quick score. If you’re doing everything right, you can sleep better at night. If there’s room for improvement, we’ll discuss options. NO PRESSURE, NO STRINGS. JUST BOOK THE CALL!</p><p><a href="https://www.mastercomputing.com/discoverycall/">www.mastercomputing.com/discovery</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>UPDATE to last week's Headlines:<br></strong>Microsoft officially releases Windows 11 announcement, preview.  Expected to arrive Oct 20</p><p><strong>This Week's Security Tip:<br></strong>10 easy tips for mobile phone security:</p><p>1. Lock your device with a PIN or password, and never leave it unattended in public <br>2. Uninstall apps you don’t use <br>3. ONLY download apps from trusted sources <br>4. Keep your phone’s operating system updated <br>5. Install antivirus software <br>6. Use your phone’s “find me” feature to prevent loss or theft <br>7. Cover the camera with a camera sticker when not in use <br>8. Back up your data <br>9. Encrypt the data if you have sensitive info stored on it <br>10. Don’t click on links or attachments from unsolicited e-mails or texts</p><p><strong>Today's Headlines:</strong></p><ul><li>Western Digital MyBook users urged to unplug devices from the network - malicious hackers are remotely wiping the drives using a critical flaw that can be triggered by anyone who knows the Internet address of an affected device.</li><li>Quickbooks Online opts users in to share payroll info of 1.4 million small businesses with Equifax, who has been and will be hacked again. (To disable sing-in to QBO, go to Payroll settings, uncheck "Shared Data.")</li><li>Eight unsecured databases were found leaking approximately 60 million records of LinkedIn user information. While most of the information is publicly available, the databases contain the email addresses of the LinkedIn users.</li><li>HSE, socialized public healthcare system of Ireland, breached in May and 700GB of patient and employee data, orders Virus total to reveal </li><li>Briefly mention PrintNightmare, security vulnerability that affect every version of Windows.  Much more in depth next week.<p></p></li><li>Kasaya ransom: $70,000,000 for universal decryptor ($5mill per individual compromise) <ul><li>fewer than 40 customers worldwide, though all MSPs with over 1000 clients</li><li>Supply chain attack on on-prem servers – all from US based hosting servers.  CISA and Biden announce almost immediately they are investigating and blame Revil/Russia.  This all comes weeks after FBI/DOJ seized ReVIL/Darkside servers.</li><li>Was allegedly a known exploit that Kasaya was in the process of patching, before the zero-day attack was carried out.</li></ul></li></ul><p><strong>Next Week's Teaser:<br></strong>What the heck is an AUP…and why do you want it?<strong></strong></p><p>Call to Action: We talk a lot about stupid (nothing bad ever happens to me; head in the sand; too busy; I’ll do it later). So what’s smart? Taking this seriously TODAY. Book a 10-minute Discovery Call right now. I’ll ask some key questions and give you a quick score. If you’re doing everything right, you can sleep better at night. If there’s room for improvement, we’ll discuss options. NO PRESSURE, NO STRINGS. JUST BOOK THE CALL!</p><p><a href="https://www.mastercomputing.com/discoverycall/">www.mastercomputing.com/discovery</a> </p>]]>
      </content:encoded>
      <pubDate>Tue, 06 Jul 2021 12:44:43 -0500</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/707f8439/0f22abae.mp3" length="48646711" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>2024</itunes:duration>
      <itunes:summary>Top 10 (or 11) tips for protecting the information on your phone</itunes:summary>
      <itunes:subtitle>Top 10 (or 11) tips for protecting the information on your phone</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>27. Lie, Lie, Lie!</title>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>27. Lie, Lie, Lie!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a77ae04b-a9eb-42c2-b977-c01cfbbdcf5e</guid>
      <link>https://share.transistor.fm/s/2e6e4d90</link>
      <description>
        <![CDATA[<p><strong>UPDATE to last week's Headlines:<br></strong>US DOJ said it recovered $2.3Mil of Bitcoin sent to Darkside for the Colonial Piepeline attack "saying they were able to track the bitcoin to a wallet for which the FBI has the "private key." (appears to be the affiliate's take, the remainder of 15% going to developers.</p><p>Darkside sends message that they are now closed, after servers seized and money transferred.</p><p><strong>This Week's Security Tip:<br></strong>Social engineering is big business. What is it? Figuring out who you are and then using that information to make money off of it.</p><p>People list password challenge and identity verification publicly on their Instagram, Twitter and Facebook pages and feeds without giving it a second thought. Maiden name? Check. Favorite pet? Check. High school? Check. Town they grew up in? Check. Favorite or first car? Check. Throwback Thursday is a social engineer’s dream! They love this stuff.</p><p>Combat this by A) not posting that information online anywhere or B) always giving false password and identity challenge and verification information to the sites and services that require it. Keep the answer file offline. Remember, if it’s a handwritten list, you can still take a photo of it.</p><p><strong>Today's Headlines:<br></strong>JBS &amp; Pilgrims meat processing hacked – ransomware that the FBI attributes to REvil and Sodinokibi</p>The company's swift response, robust IT systems and encrypted backup servers allowed for a rapid recovery," JBS USA said in a press release on 6/3."  Later on June 10th, confirmed they paid $11mill of demanded $22.5mill to prevent stolen data from being leaked.<p>Amazon sidewalk goes live – Amazon Sidewalk creates a low-bandwidth network with the help of Sidewalk Bridge devices including select Echo and Ring devices. These Bridge devices share a small portion of your internet bandwidth which is pooled together to provide these services to you and your neighbors. </p>Mass media plays this up as terrible, specifically because Amazon has set this feature by default to "enabled". Reality is, Amazon actually did their homework.  A roaming wireless device that reaches out and connects to SideWalk has ZERO access to the hosting network it's connecting though, just as the hosting network has ZERO access to the roaming WiFi device's data, data is fully encrypted, and not even Amazon has access to that data.<p> </p><p>6 years ago, Microsoft promised Windows 10 would be the last OS, being "refreshed" twice a year forever.  A couple days ago, Windows 11 has been leaked. Some features – taskbar is centralized, similar to Mac vs. Curtrent left-side, no more tiles in start menu – instead , windows will be rounded, like MacOS, overall, a very MacOS vibe.</p><p><strong><br>Next Week's Teaser:<br></strong>These easy tips will keep your phone safe<strong></strong></p><p>Call to Action: We talk a lot about stupid (nothing bad ever happens to me; head in the sand; too busy; I’ll do it later). So what’s smart? Taking this seriously TODAY. Book a 10-minute Discovery Call right now. I’ll ask some key questions and give you a quick score. If you’re doing everything right, you can sleep better at night. If there’s room for improvement, we’ll discuss options. NO PRESSURE, NO STRINGS. JUST BOOK THE CALL!</p><p><a href="https://www.mastercomputing.com/discoverycall/">www.mastercomputing.com/discovery</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>UPDATE to last week's Headlines:<br></strong>US DOJ said it recovered $2.3Mil of Bitcoin sent to Darkside for the Colonial Piepeline attack "saying they were able to track the bitcoin to a wallet for which the FBI has the "private key." (appears to be the affiliate's take, the remainder of 15% going to developers.</p><p>Darkside sends message that they are now closed, after servers seized and money transferred.</p><p><strong>This Week's Security Tip:<br></strong>Social engineering is big business. What is it? Figuring out who you are and then using that information to make money off of it.</p><p>People list password challenge and identity verification publicly on their Instagram, Twitter and Facebook pages and feeds without giving it a second thought. Maiden name? Check. Favorite pet? Check. High school? Check. Town they grew up in? Check. Favorite or first car? Check. Throwback Thursday is a social engineer’s dream! They love this stuff.</p><p>Combat this by A) not posting that information online anywhere or B) always giving false password and identity challenge and verification information to the sites and services that require it. Keep the answer file offline. Remember, if it’s a handwritten list, you can still take a photo of it.</p><p><strong>Today's Headlines:<br></strong>JBS &amp; Pilgrims meat processing hacked – ransomware that the FBI attributes to REvil and Sodinokibi</p>The company's swift response, robust IT systems and encrypted backup servers allowed for a rapid recovery," JBS USA said in a press release on 6/3."  Later on June 10th, confirmed they paid $11mill of demanded $22.5mill to prevent stolen data from being leaked.<p>Amazon sidewalk goes live – Amazon Sidewalk creates a low-bandwidth network with the help of Sidewalk Bridge devices including select Echo and Ring devices. These Bridge devices share a small portion of your internet bandwidth which is pooled together to provide these services to you and your neighbors. </p>Mass media plays this up as terrible, specifically because Amazon has set this feature by default to "enabled". Reality is, Amazon actually did their homework.  A roaming wireless device that reaches out and connects to SideWalk has ZERO access to the hosting network it's connecting though, just as the hosting network has ZERO access to the roaming WiFi device's data, data is fully encrypted, and not even Amazon has access to that data.<p> </p><p>6 years ago, Microsoft promised Windows 10 would be the last OS, being "refreshed" twice a year forever.  A couple days ago, Windows 11 has been leaked. Some features – taskbar is centralized, similar to Mac vs. Curtrent left-side, no more tiles in start menu – instead , windows will be rounded, like MacOS, overall, a very MacOS vibe.</p><p><strong><br>Next Week's Teaser:<br></strong>These easy tips will keep your phone safe<strong></strong></p><p>Call to Action: We talk a lot about stupid (nothing bad ever happens to me; head in the sand; too busy; I’ll do it later). So what’s smart? Taking this seriously TODAY. Book a 10-minute Discovery Call right now. I’ll ask some key questions and give you a quick score. If you’re doing everything right, you can sleep better at night. If there’s room for improvement, we’ll discuss options. NO PRESSURE, NO STRINGS. JUST BOOK THE CALL!</p><p><a href="https://www.mastercomputing.com/discoverycall/">www.mastercomputing.com/discovery</a> </p>]]>
      </content:encoded>
      <pubDate>Mon, 28 Jun 2021 06:00:00 -0500</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/2e6e4d90/9a3799ae.mp3" length="40486645" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>1684</itunes:duration>
      <itunes:summary>Don't use real information when setting up security questions. That information is too easy to find online. Make something up. Get creative. Lie about your security questions!</itunes:summary>
      <itunes:subtitle>Don't use real information when setting up security questions. That information is too easy to find online. Make something up. Get creative. Lie about your security questions!</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>26. Are You Sure It's Handled?</title>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>26. Are You Sure It's Handled?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">875bb9a0-6aa6-49a0-8498-692d294fc447</guid>
      <link>https://share.transistor.fm/s/a384f16f</link>
      <description>
        <![CDATA[<p><strong>UPDATE to last week's Headlines:<br></strong>Darkside Ransomware breach on Colonial Pipeline – discuss what happened and the repercussions after our tech tip</p><p><strong>This Week's Security Tip:<br></strong>While most businesses understand the importance of backing up their server and files, many forget to back up their website!</p><p>Most sites are hosted on a third-party platform like HostGator or WordPress. However, these hosts have limits on what they back up, and the Terms and Conditions you agreed to most likely waive their responsibility to preserve and back up your files and data.</p><p>Therefore, if you’re posting a lot of new content, you should be backing up your site weekly if not daily. Hackers can (and do!) corrupt websites all the time. If you don’t want to have the cost of a down website and the cost of rebuilding it, back up your website!</p><p><strong>Today's Headlines:<br></strong>Darkside Ransomware breach on Colonial Pipeline </p><p><br>The first DarkSide ransomware attacks were all owner-operated, but after a few successful months, the owners began to expand their operations. On November 10, DarkSide operators announced on Russian-language forums XSS and Exploit the formation of their new DarkSide affiliate program providing partners with a modified form of their DarkSide ransomware to make use in their own operations. </p><p>It’s worth noting that DarkSide actors have pledged in the past to not attack organizations in the medical, education, nonprofit, or government sectors. At one point, they also advertised that they donate a portion of their profit to charities. However, neither claim has been verified and should be met with a heightened degree of scrutiny; these DarkSide operators would be far from the first cybercriminals to make such claims and not follow through.<br>  </p><p>DarkSide Operators Likely Former “REvil” Affiliates</p><p>Flashpoint assesses with moderate confidence that the threat actors behind DarkSide ransomware are of Russian origin and are likely former affiliates of the <a href="https://www.flashpoint-intel.com/cybercrime/revil-moves-to-ransomware-as-a-service/">“REvil” RaaS group</a>. Several facts support this attribution:</p><ul><li>Spelling mistakes in the ransom note and grammatical constructs of the sentences suggest that the writers are not native English speakers.</li><li>The malware checks the default language of the system to avoid infecting systems based in the countries of the former Soviet Union.</li><li>The design of the ransom note, wallpaper, file encryption extension and details, and inner workings bear similarities to “REvil” ransomware, which is of Russian origin and has an extensive affiliate program. This shows the evolution path of this ransomware and ties it to other Russian-origin ransomware families.</li><li>The affiliate program is offered on Russian-language forums XSS and Exploit.</li></ul><p>Timeline: </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>UPDATE to last week's Headlines:<br></strong>Darkside Ransomware breach on Colonial Pipeline – discuss what happened and the repercussions after our tech tip</p><p><strong>This Week's Security Tip:<br></strong>While most businesses understand the importance of backing up their server and files, many forget to back up their website!</p><p>Most sites are hosted on a third-party platform like HostGator or WordPress. However, these hosts have limits on what they back up, and the Terms and Conditions you agreed to most likely waive their responsibility to preserve and back up your files and data.</p><p>Therefore, if you’re posting a lot of new content, you should be backing up your site weekly if not daily. Hackers can (and do!) corrupt websites all the time. If you don’t want to have the cost of a down website and the cost of rebuilding it, back up your website!</p><p><strong>Today's Headlines:<br></strong>Darkside Ransomware breach on Colonial Pipeline </p><p><br>The first DarkSide ransomware attacks were all owner-operated, but after a few successful months, the owners began to expand their operations. On November 10, DarkSide operators announced on Russian-language forums XSS and Exploit the formation of their new DarkSide affiliate program providing partners with a modified form of their DarkSide ransomware to make use in their own operations. </p><p>It’s worth noting that DarkSide actors have pledged in the past to not attack organizations in the medical, education, nonprofit, or government sectors. At one point, they also advertised that they donate a portion of their profit to charities. However, neither claim has been verified and should be met with a heightened degree of scrutiny; these DarkSide operators would be far from the first cybercriminals to make such claims and not follow through.<br>  </p><p>DarkSide Operators Likely Former “REvil” Affiliates</p><p>Flashpoint assesses with moderate confidence that the threat actors behind DarkSide ransomware are of Russian origin and are likely former affiliates of the <a href="https://www.flashpoint-intel.com/cybercrime/revil-moves-to-ransomware-as-a-service/">“REvil” RaaS group</a>. Several facts support this attribution:</p><ul><li>Spelling mistakes in the ransom note and grammatical constructs of the sentences suggest that the writers are not native English speakers.</li><li>The malware checks the default language of the system to avoid infecting systems based in the countries of the former Soviet Union.</li><li>The design of the ransom note, wallpaper, file encryption extension and details, and inner workings bear similarities to “REvil” ransomware, which is of Russian origin and has an extensive affiliate program. This shows the evolution path of this ransomware and ties it to other Russian-origin ransomware families.</li><li>The affiliate program is offered on Russian-language forums XSS and Exploit.</li></ul><p>Timeline: </p>]]>
      </content:encoded>
      <pubDate>Mon, 21 Jun 2021 06:00:00 -0500</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/a384f16f/1a2d9123.mp3" length="53555812" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>2229</itunes:duration>
      <itunes:summary>Are you backing up your WEBSITE?</itunes:summary>
      <itunes:subtitle>Are you backing up your WEBSITE?</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>25. Strong Passwords Can Work Against You</title>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>25. Strong Passwords Can Work Against You</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">16f9fb5c-2739-4789-aca1-be54c1dac05e</guid>
      <link>https://share.transistor.fm/s/8c579861</link>
      <description>
        <![CDATA[<p><strong>UPDATE to last week's Headlines:<br></strong>US Gov formally accuses Russia for SolarWinds/Orion attack.  Biden issues state of Emergency, giving him the power to issue executive order: emphasizing an exploitation on US and Russian elections, kicks-out Russian diplomats in DC, prohibits US financial entities from trading in Rubles, issues sanctions against Russian networking infrastructure.<strong><br></strong><br></p><p><strong>This Week's Security Tip:<br></strong>There are two mistakes we see with usernames and passwords, even if they are GOOD strong ones. The first is using the SAME password across multiple sites. The second is using the same e-mail usernames and prefixes across multiple free e-mail services. For example: <br><a href="mailto:jimmy67chevy@aol.com">jimmy67chevy@aol.com </a><br> <a href="mailto:jimmy67chevy@gmail.com">jimmy67chevy@gmail.com </a><br> <a href="mailto:jimmy67chevy@yahoo.com">jimmy67chevy@yahoo.com </a><br> <a href="mailto:jimmy67chevy@icloud.com">jimmy67chevy@icloud.com </a><br> <br>When you use the same password and the same username across multiple sites, you make it easy for a cybercriminal to compromise multiple accounts of yours. With the first part easy to figure out, they can get access to other online services and data or even spoof your e-mail addresses to others. Variety is the spice of life, so make sure you’re using UNIQUE, strong passwords along with unique usernames on free e-mail accounts. </p><p><strong>Today's Headlines:</strong></p><ul><li>2 Google Chrome zero-day exploit dropped on twitter last week, both remote code executables, affects Chrome, Edge, and other Chromium-based borwsers</li><li>Google announced plans to roll out a new privacy-focused feature called Federated Learning of Cohorts (FLoC), Vivaldi, Brave, DuckDuckGo, and now WordPress reject it.  - Thousands of browsers with identical browsing history (belonging to the same "cohort") stored <em>locally</em> will have a shared "cohort" identifier assigned, which will be shared with a site when requested.  - "At Vivaldi, we stand up for the privacy rights of our users. We do not approve tracking and profiling, in any disguise. We certainly would not allow our products to build up local tracking profiles," says Jon von Tetzchner, Vivaldi CEO and co-founder. </li><li>Signal CEO and founder Moxie Marlinspike slams Cellebrite (company that police and gvmt uses to unlock Android and iOS phones ) after they say they can now access Signal data.</li></ul><p><strong>Next Week's Teaser:<br></strong>Here is what you should do with your data on your laptop..<strong></strong></p><p>Call to Action: We talk a lot about stupid (nothing bad ever happens to me; head in the sand; too busy; I’ll do it later). So what’s smart? Taking this seriously TODAY. Book a 10-minute Discovery Call right now. I’ll ask some key questions and give you a quick score. If you’re doing everything right, you can sleep better at night. If there’s room for improvement, we’ll discuss options. NO PRESSURE, NO STRINGS. JUST BOOK THE CALL!</p><p><a href="https://www.mastercomputing.com/discoverycall/">www.mastercomputing.com/discovery</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>UPDATE to last week's Headlines:<br></strong>US Gov formally accuses Russia for SolarWinds/Orion attack.  Biden issues state of Emergency, giving him the power to issue executive order: emphasizing an exploitation on US and Russian elections, kicks-out Russian diplomats in DC, prohibits US financial entities from trading in Rubles, issues sanctions against Russian networking infrastructure.<strong><br></strong><br></p><p><strong>This Week's Security Tip:<br></strong>There are two mistakes we see with usernames and passwords, even if they are GOOD strong ones. The first is using the SAME password across multiple sites. The second is using the same e-mail usernames and prefixes across multiple free e-mail services. For example: <br><a href="mailto:jimmy67chevy@aol.com">jimmy67chevy@aol.com </a><br> <a href="mailto:jimmy67chevy@gmail.com">jimmy67chevy@gmail.com </a><br> <a href="mailto:jimmy67chevy@yahoo.com">jimmy67chevy@yahoo.com </a><br> <a href="mailto:jimmy67chevy@icloud.com">jimmy67chevy@icloud.com </a><br> <br>When you use the same password and the same username across multiple sites, you make it easy for a cybercriminal to compromise multiple accounts of yours. With the first part easy to figure out, they can get access to other online services and data or even spoof your e-mail addresses to others. Variety is the spice of life, so make sure you’re using UNIQUE, strong passwords along with unique usernames on free e-mail accounts. </p><p><strong>Today's Headlines:</strong></p><ul><li>2 Google Chrome zero-day exploit dropped on twitter last week, both remote code executables, affects Chrome, Edge, and other Chromium-based borwsers</li><li>Google announced plans to roll out a new privacy-focused feature called Federated Learning of Cohorts (FLoC), Vivaldi, Brave, DuckDuckGo, and now WordPress reject it.  - Thousands of browsers with identical browsing history (belonging to the same "cohort") stored <em>locally</em> will have a shared "cohort" identifier assigned, which will be shared with a site when requested.  - "At Vivaldi, we stand up for the privacy rights of our users. We do not approve tracking and profiling, in any disguise. We certainly would not allow our products to build up local tracking profiles," says Jon von Tetzchner, Vivaldi CEO and co-founder. </li><li>Signal CEO and founder Moxie Marlinspike slams Cellebrite (company that police and gvmt uses to unlock Android and iOS phones ) after they say they can now access Signal data.</li></ul><p><strong>Next Week's Teaser:<br></strong>Here is what you should do with your data on your laptop..<strong></strong></p><p>Call to Action: We talk a lot about stupid (nothing bad ever happens to me; head in the sand; too busy; I’ll do it later). So what’s smart? Taking this seriously TODAY. Book a 10-minute Discovery Call right now. I’ll ask some key questions and give you a quick score. If you’re doing everything right, you can sleep better at night. If there’s room for improvement, we’ll discuss options. NO PRESSURE, NO STRINGS. JUST BOOK THE CALL!</p><p><a href="https://www.mastercomputing.com/discoverycall/">www.mastercomputing.com/discovery</a> </p>]]>
      </content:encoded>
      <pubDate>Mon, 14 Jun 2021 06:00:00 -0500</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/8c579861/edb6f219.mp3" length="44207866" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>1839</itunes:duration>
      <itunes:summary>Learn how even strong passwords can work against you</itunes:summary>
      <itunes:subtitle>Learn how even strong passwords can work against you</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>24. Protecting Data on Mobile Devices</title>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>24. Protecting Data on Mobile Devices</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">900d904a-9abf-40ac-81ab-374272cb064e</guid>
      <link>https://share.transistor.fm/s/af51c20d</link>
      <description>
        <![CDATA[<p><strong>UPDATE to last week's Headlines:</strong><br>Signal at it again, started Facebook campaign with ads showing the targeting being used to end users (You're seeing this ad.  Facebook then disabled their ad account.</p><p><strong>This Week's Security Tip: </strong>Keep sensitive and important data off DEVICES and in the cloud</p><p>If a laptop is stolen or lost, and the data is not backed up, you just lost it all. Worst of all, even if you had it locked with a strong password, it’s very likely to get cracked. Once the thief succeeds, any private data that is unencrypted is free for the taking.</p><p>One solution: keep sensitive and important data, files, pictures, contracts, etc., on a secure private cloud service, so it’s never on your employee’s hard drive in the first place. By storing this information in the cloud, you can immediately revoke access when a device goes missing.</p><p>Side Tip: If you have important family photos, store it in Shutterfly or some other photo-storing cloud application so those are backed up as well.</p><p><strong>Today's Headlines:</strong><br><em>U.S. Agency for Global Media (USAGM) breached by Phishing attack</em>, exposed information includes full names and Social Security numbers of employees and possibly their beneficiaries and dependents.  Account compromised 4 months prior to Phishing campaign.</p><p>USAGM operates broadcast networks, such as Voice of America, Radio Free Europe, Office of Cuba Broadcasting, Radio Free Asia, and Middle East Broadcasting Networks, to deliver news and information to people worldwide.</p><p><br><em>Vulnerable Dell driver puts hundreds of millions of systems at risk</em></p><p>A collection of five flaws, collectively tracked as CVE-2021-21551, have been discovered in DBUtil, a driver from that Dell machines install and load during the BIOS update process and is unloaded at the next reboot.  Pushed updates are blue-screening computers across the country/locking TPM chips.</p><p><strong>Next Week's Teaser:</strong><br>Are you sure that it’s handled? You may think it is, but it’s not…</p><p><strong>Call to Action</strong>. We talk a lot about stupid (nothing bad ever happens to me; head in the sand; too busy; I’ll do it later). So what’s smart? Taking this seriously TODAY. Book a 10-minute Discovery Call right now. I’ll ask some key questions and give you a quick score. If you’re doing everything right, you can sleep better at night. If there’s room for improvement, we’ll discuss options. NO PRESSURE, NO STRINGS. JUST BOOK THE CALL! </p><p><a href="https://www.mastercomputing.com/discoverycall/">www.mastercomputing.com/discovery</a> </p><p> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>UPDATE to last week's Headlines:</strong><br>Signal at it again, started Facebook campaign with ads showing the targeting being used to end users (You're seeing this ad.  Facebook then disabled their ad account.</p><p><strong>This Week's Security Tip: </strong>Keep sensitive and important data off DEVICES and in the cloud</p><p>If a laptop is stolen or lost, and the data is not backed up, you just lost it all. Worst of all, even if you had it locked with a strong password, it’s very likely to get cracked. Once the thief succeeds, any private data that is unencrypted is free for the taking.</p><p>One solution: keep sensitive and important data, files, pictures, contracts, etc., on a secure private cloud service, so it’s never on your employee’s hard drive in the first place. By storing this information in the cloud, you can immediately revoke access when a device goes missing.</p><p>Side Tip: If you have important family photos, store it in Shutterfly or some other photo-storing cloud application so those are backed up as well.</p><p><strong>Today's Headlines:</strong><br><em>U.S. Agency for Global Media (USAGM) breached by Phishing attack</em>, exposed information includes full names and Social Security numbers of employees and possibly their beneficiaries and dependents.  Account compromised 4 months prior to Phishing campaign.</p><p>USAGM operates broadcast networks, such as Voice of America, Radio Free Europe, Office of Cuba Broadcasting, Radio Free Asia, and Middle East Broadcasting Networks, to deliver news and information to people worldwide.</p><p><br><em>Vulnerable Dell driver puts hundreds of millions of systems at risk</em></p><p>A collection of five flaws, collectively tracked as CVE-2021-21551, have been discovered in DBUtil, a driver from that Dell machines install and load during the BIOS update process and is unloaded at the next reboot.  Pushed updates are blue-screening computers across the country/locking TPM chips.</p><p><strong>Next Week's Teaser:</strong><br>Are you sure that it’s handled? You may think it is, but it’s not…</p><p><strong>Call to Action</strong>. We talk a lot about stupid (nothing bad ever happens to me; head in the sand; too busy; I’ll do it later). So what’s smart? Taking this seriously TODAY. Book a 10-minute Discovery Call right now. I’ll ask some key questions and give you a quick score. If you’re doing everything right, you can sleep better at night. If there’s room for improvement, we’ll discuss options. NO PRESSURE, NO STRINGS. JUST BOOK THE CALL! </p><p><a href="https://www.mastercomputing.com/discoverycall/">www.mastercomputing.com/discovery</a> </p><p> </p>]]>
      </content:encoded>
      <pubDate>Mon, 07 Jun 2021 06:00:00 -0500</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/af51c20d/60c71a79.mp3" length="44642238" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>1858</itunes:duration>
      <itunes:summary>Keep sensitive and important data, files, pictures, contracts, etc., on a secure private cloud service, so it’s never on your employee’s hard drive in the first place. By storing this information in the cloud, you can immediately revoke access when a device goes missing.</itunes:summary>
      <itunes:subtitle>Keep sensitive and important data, files, pictures, contracts, etc., on a secure private cloud service, so it’s never on your employee’s hard drive in the first place. By storing this information in the cloud, you can immediately revoke access when a devi</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>23. Cover up your Webcam!</title>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>23. Cover up your Webcam!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f110e796-598a-4fcc-a9b8-41f35a4252ae</guid>
      <link>https://share.transistor.fm/s/a802ac3f</link>
      <description>
        <![CDATA[<p><strong>UPDATE to last week's Headlines:<br></strong>92% of Exchange servers worldwide have been patched (82k originally, now only 30k vulnerable)</p><p><strong>This Week's Security Tip:<br></strong>Here’s a disturbing, but very real, tactic for hackers: spying on you via your device’s camera. Some simply watch you for fun. Others attempt to catch incriminating photos and then blackmail you by threatening to release the photos or video (which they have) to all your Facebook friends, LinkedIn connections or e-mail address book (which they also have) unless you pay a ransom. If you pay, they can come back and ask for MORE because they now know you care AND that you’ll pay. If you don’t pay, they will release that picture of you doing, um, well…</p><p>As always, follow the various security strategies we’ve been sending you via these tips. As a backup, you can buy stickers that cover your camera with a slider so you can uncover it when you want to actually use it to take a picture or join a web meeting. These are really inexpensive and can be found on Amazon for under $10. Search for “webcam cover slider.”</p><p><strong>Today's Headlines:</strong></p><ul><li>533million Facebook user data, including phone numbers, leaked the data, which was allegedly obtained by exploiting a vulnerability Facebook advises they rectified in August 2019</li><li>Fortinet VPNs are being exploited by new CRING ransomware, Fortigate firewalls, though patch exists made back in August of 2019.  So many went unpatched, Fortinet has warned customers 4 times since, the latest this month.  They have had at least one report every day so far this year.</li><li>CISA released tool, dubbed Aviary, to analyze Azure and O365 post-compromise activity.</li><li>Windows 10 1909 reaches end of service next month<p>Your computer will still work, but it could become more vulnerable to security risks and viruses because you won’t receive new security updates or other quality updates</p></li></ul><p><strong>Call to Action: </strong>We talk a lot about stupid (nothing bad ever happens to me; head in the sand; too busy; I’ll do it later). So what’s smart? Taking this seriously TODAY. Book a 10-minute Discovery Call right now. I’ll ask some key questions and give you a quick score. If you’re doing everything right, you can sleep better at night. If there’s room for improvement, we’ll discuss options. NO PRESSURE, NO STRINGS. JUST BOOK THE CALL!</p><p><a href="https://www.mastercomputing.com/discoverycall/">www.mastercomputing.com/discovery</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>UPDATE to last week's Headlines:<br></strong>92% of Exchange servers worldwide have been patched (82k originally, now only 30k vulnerable)</p><p><strong>This Week's Security Tip:<br></strong>Here’s a disturbing, but very real, tactic for hackers: spying on you via your device’s camera. Some simply watch you for fun. Others attempt to catch incriminating photos and then blackmail you by threatening to release the photos or video (which they have) to all your Facebook friends, LinkedIn connections or e-mail address book (which they also have) unless you pay a ransom. If you pay, they can come back and ask for MORE because they now know you care AND that you’ll pay. If you don’t pay, they will release that picture of you doing, um, well…</p><p>As always, follow the various security strategies we’ve been sending you via these tips. As a backup, you can buy stickers that cover your camera with a slider so you can uncover it when you want to actually use it to take a picture or join a web meeting. These are really inexpensive and can be found on Amazon for under $10. Search for “webcam cover slider.”</p><p><strong>Today's Headlines:</strong></p><ul><li>533million Facebook user data, including phone numbers, leaked the data, which was allegedly obtained by exploiting a vulnerability Facebook advises they rectified in August 2019</li><li>Fortinet VPNs are being exploited by new CRING ransomware, Fortigate firewalls, though patch exists made back in August of 2019.  So many went unpatched, Fortinet has warned customers 4 times since, the latest this month.  They have had at least one report every day so far this year.</li><li>CISA released tool, dubbed Aviary, to analyze Azure and O365 post-compromise activity.</li><li>Windows 10 1909 reaches end of service next month<p>Your computer will still work, but it could become more vulnerable to security risks and viruses because you won’t receive new security updates or other quality updates</p></li></ul><p><strong>Call to Action: </strong>We talk a lot about stupid (nothing bad ever happens to me; head in the sand; too busy; I’ll do it later). So what’s smart? Taking this seriously TODAY. Book a 10-minute Discovery Call right now. I’ll ask some key questions and give you a quick score. If you’re doing everything right, you can sleep better at night. If there’s room for improvement, we’ll discuss options. NO PRESSURE, NO STRINGS. JUST BOOK THE CALL!</p><p><a href="https://www.mastercomputing.com/discoverycall/">www.mastercomputing.com/discovery</a> </p>]]>
      </content:encoded>
      <pubDate>Wed, 14 Apr 2021 11:24:19 -0500</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/a802ac3f/32ca4901.mp3" length="37274391" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>1551</itunes:duration>
      <itunes:summary>Why you might want to cover up your webcam with a sticker</itunes:summary>
      <itunes:subtitle>Why you might want to cover up your webcam with a sticker</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>Yes</itunes:explicit>
    </item>
    <item>
      <title>22. Shadow IT. Where does your data live?</title>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>22. Shadow IT. Where does your data live?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b73066c0-2054-4adc-a7c2-b1c5e3330904</guid>
      <link>https://share.transistor.fm/s/2d33bc59</link>
      <description>
        <![CDATA[<p><strong>UPDATE to last week's Headlines:<br></strong>Exchange server Mass-hack – timeline and scope:</p><ul><li>Early January Microsoft was made aware of active exploits; patch available in March</li><li>Made free patch available to Exchange Server 2010, both showing flaw is in base code 10yrs old, and how prevalent this is</li><li>Confirmed 30,000+ US servers, 100's of thousands worldwide have active backdoors.</li><li>CISA announces “widespread domestic and international exploitation of Microsoft Exchange Server flaws.” campaign blaming China, saying it's a China state-run exploit.  Security researchers confirm at least 4 other state actors currently exploiting, including Russia and North Korea</li><li>82k US servers still not patched as of Friday, backdoors still in patched servers</li><li>Concern that second wave of backdoor use still to come</li></ul><p><strong>This Week's Security Tip:<br></strong>So you have a big file you need to get over to your printer YESTERDAY and you can’t get it to “send” via e-mail because the file is too big. What should you do? The right thing to do is contact your IT department (us!) so we can assist by installing a secure, commercial-grade file-sharing application. What you shouldn’t do is download a free copy of Dropbox or some other file-sharing software without telling us. Dropbox and other free apps come with a price: SECURITY. These applications are known for security vulnerabilities and hacks. Plus, if we don’t know about it, we can’t manage it or secure it; so the golden rule is this: NEVER download any software or application without checking with your IT department first!</p><p><strong>Today's Headlines:</strong></p><ul><li>US DOJ indicted CEO of Sky Global (Sky ECC encrypted messaging app) for allegedly aiding criminal enterprises avoid detection by law enforcement."According to the indictment, Sky Global’s devices are specifically designed to prevent law enforcement from actively monitoring the communications between members of transnational criminal organizations involved in drug trafficking and money laundering. "As part of its services, Sky Global guarantees that messages stored on its devices can and will be remotely deleted by the company if the device is seized by law enforcement or otherwise compromised,"</li><li>Latest Windows 10 update causes BSOD when trying to print for all versions (1803, 1809, 1909, 2004, 20H2)</li><li>Molson Coors (Coors light, Miller Lite, Blue Moon, Killians, Foster's) March 11 ransomware attack, causing signifigant disruption to operations.</li></ul><p><strong>Next Week's Teaser:<br></strong>It’s disturbing but very real. It’s creepy.<strong></strong></p><p>Call to Action: We talk a lot about stupid (nothing bad ever happens to me; head in the sand; too busy; I’ll do it later). So what’s smart? Taking this seriously TODAY. Book a 10-minute Discovery Call right now. I’ll ask some key questions and give you a quick score. If you’re doing everything right, you can sleep better at night. If there’s room for improvement, we’ll discuss options. NO PRESSURE, NO STRINGS. JUST BOOK THE CALL!</p><p><a href="https://www.mastercomputing.com/discoverycall/">www.mastercomputing.com/discovery</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>UPDATE to last week's Headlines:<br></strong>Exchange server Mass-hack – timeline and scope:</p><ul><li>Early January Microsoft was made aware of active exploits; patch available in March</li><li>Made free patch available to Exchange Server 2010, both showing flaw is in base code 10yrs old, and how prevalent this is</li><li>Confirmed 30,000+ US servers, 100's of thousands worldwide have active backdoors.</li><li>CISA announces “widespread domestic and international exploitation of Microsoft Exchange Server flaws.” campaign blaming China, saying it's a China state-run exploit.  Security researchers confirm at least 4 other state actors currently exploiting, including Russia and North Korea</li><li>82k US servers still not patched as of Friday, backdoors still in patched servers</li><li>Concern that second wave of backdoor use still to come</li></ul><p><strong>This Week's Security Tip:<br></strong>So you have a big file you need to get over to your printer YESTERDAY and you can’t get it to “send” via e-mail because the file is too big. What should you do? The right thing to do is contact your IT department (us!) so we can assist by installing a secure, commercial-grade file-sharing application. What you shouldn’t do is download a free copy of Dropbox or some other file-sharing software without telling us. Dropbox and other free apps come with a price: SECURITY. These applications are known for security vulnerabilities and hacks. Plus, if we don’t know about it, we can’t manage it or secure it; so the golden rule is this: NEVER download any software or application without checking with your IT department first!</p><p><strong>Today's Headlines:</strong></p><ul><li>US DOJ indicted CEO of Sky Global (Sky ECC encrypted messaging app) for allegedly aiding criminal enterprises avoid detection by law enforcement."According to the indictment, Sky Global’s devices are specifically designed to prevent law enforcement from actively monitoring the communications between members of transnational criminal organizations involved in drug trafficking and money laundering. "As part of its services, Sky Global guarantees that messages stored on its devices can and will be remotely deleted by the company if the device is seized by law enforcement or otherwise compromised,"</li><li>Latest Windows 10 update causes BSOD when trying to print for all versions (1803, 1809, 1909, 2004, 20H2)</li><li>Molson Coors (Coors light, Miller Lite, Blue Moon, Killians, Foster's) March 11 ransomware attack, causing signifigant disruption to operations.</li></ul><p><strong>Next Week's Teaser:<br></strong>It’s disturbing but very real. It’s creepy.<strong></strong></p><p>Call to Action: We talk a lot about stupid (nothing bad ever happens to me; head in the sand; too busy; I’ll do it later). So what’s smart? Taking this seriously TODAY. Book a 10-minute Discovery Call right now. I’ll ask some key questions and give you a quick score. If you’re doing everything right, you can sleep better at night. If there’s room for improvement, we’ll discuss options. NO PRESSURE, NO STRINGS. JUST BOOK THE CALL!</p><p><a href="https://www.mastercomputing.com/discoverycall/">www.mastercomputing.com/discovery</a> </p>]]>
      </content:encoded>
      <pubDate>Tue, 16 Mar 2021 12:16:17 -0500</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/2d33bc59/887f949a.mp3" length="45128238" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>1878</itunes:duration>
      <itunes:summary>It's not just about downloading unauthorized software, but also about where your data lives. Everything is riding on the line!</itunes:summary>
      <itunes:subtitle>It's not just about downloading unauthorized software, but also about where your data lives. Everything is riding on the line!</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>21. Do this ONE Thing...</title>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>21. Do this ONE Thing...</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">98b137b2-f8a2-4033-a59f-db1e5876ed35</guid>
      <link>https://share.transistor.fm/s/66808170</link>
      <description>
        <![CDATA[<p><strong>UPDATE to last week's Headlines:</strong></p><ul><li>FireEye discovered a new "sophisticated second-stage backdoor"(SunShuttle) on the servers of an organization compromised by the threat actors behind the SolarWinds supply-chain attack.</li><li>If you're keeping track – 1.SunSpot (Orion backddor) 2. Sunburst (second Orion backdoor), 3.Teardrop (memory-dropper for Cobalt Strike beacon installs) 4. RainDrop (TearDrop alternative if it didn't work) 5. SuperNova (delivered through Orion trojan)</li></ul><p><br></p><p><strong>This Week's Security Tip:<br></strong>If you do online banking, NEVER access your online account with a PC or device that you use to log in to social media sites or free e-mail accounts (like Hotmail) or to surf the web. Since these are all highly hackable, keeping one PC dedicated to online banking reduces your chances of getting a bank-account-hacking virus. Of course, that PC should have antivirus installed, be behind a well-maintained and well-monitored firewall, have a strong password and be monitored for suspicious activity.</p><p><strong>Today's Headlines:</strong></p><ul><li>QNAP devices are being hacked to mine cryptocurrency - 4,297,426 potentially vulnerable QNAP NAS devices online.  Need to be patched with firmware after August 2020</li><li>Microsoft Exchange (2013, 16, and 19) servers patch 4 zero-days, at least 4 state-sponsored hacking groups now exploiting published un-patched machines.  30,000 confirmed US exploits (100's of thousands worldwide), including hospitals, banks, telecoms, utilities, police.</li></ul><p><strong>Next Week's Teaser: </strong>It’s tempting to do this and think it’s ok...<strong></strong></p><p>Call to Action: We talk a lot about stupid (nothing bad ever happens to me; head in the sand; too busy; I’ll do it later). So what’s smart? Taking this seriously TODAY. Book a 10-minute Discovery Call right now. I’ll ask some key questions and give you a quick score. If you’re doing everything right, you can sleep better at night. If there’s room for improvement, we’ll discuss options. NO PRESSURE, NO STRINGS. JUST BOOK THE CALL!</p><p><a href="https://www.mastercomputing.com/discoverycall/">www.mastercomputing.com/discovery</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>UPDATE to last week's Headlines:</strong></p><ul><li>FireEye discovered a new "sophisticated second-stage backdoor"(SunShuttle) on the servers of an organization compromised by the threat actors behind the SolarWinds supply-chain attack.</li><li>If you're keeping track – 1.SunSpot (Orion backddor) 2. Sunburst (second Orion backdoor), 3.Teardrop (memory-dropper for Cobalt Strike beacon installs) 4. RainDrop (TearDrop alternative if it didn't work) 5. SuperNova (delivered through Orion trojan)</li></ul><p><br></p><p><strong>This Week's Security Tip:<br></strong>If you do online banking, NEVER access your online account with a PC or device that you use to log in to social media sites or free e-mail accounts (like Hotmail) or to surf the web. Since these are all highly hackable, keeping one PC dedicated to online banking reduces your chances of getting a bank-account-hacking virus. Of course, that PC should have antivirus installed, be behind a well-maintained and well-monitored firewall, have a strong password and be monitored for suspicious activity.</p><p><strong>Today's Headlines:</strong></p><ul><li>QNAP devices are being hacked to mine cryptocurrency - 4,297,426 potentially vulnerable QNAP NAS devices online.  Need to be patched with firmware after August 2020</li><li>Microsoft Exchange (2013, 16, and 19) servers patch 4 zero-days, at least 4 state-sponsored hacking groups now exploiting published un-patched machines.  30,000 confirmed US exploits (100's of thousands worldwide), including hospitals, banks, telecoms, utilities, police.</li></ul><p><strong>Next Week's Teaser: </strong>It’s tempting to do this and think it’s ok...<strong></strong></p><p>Call to Action: We talk a lot about stupid (nothing bad ever happens to me; head in the sand; too busy; I’ll do it later). So what’s smart? Taking this seriously TODAY. Book a 10-minute Discovery Call right now. I’ll ask some key questions and give you a quick score. If you’re doing everything right, you can sleep better at night. If there’s room for improvement, we’ll discuss options. NO PRESSURE, NO STRINGS. JUST BOOK THE CALL!</p><p><a href="https://www.mastercomputing.com/discoverycall/">www.mastercomputing.com/discovery</a> </p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Mar 2021 15:23:25 -0600</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/66808170/495dbcbb.mp3" length="36726138" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>1528</itunes:duration>
      <itunes:summary>Keep your banking computer separate</itunes:summary>
      <itunes:subtitle>Keep your banking computer separate</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>Yes</itunes:explicit>
    </item>
    <item>
      <title>20. What a Secretary Did...</title>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>20. What a Secretary Did...</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b681e9dd-1b3f-4950-b330-86d747449f38</guid>
      <link>https://share.transistor.fm/s/7b207511</link>
      <description>
        <![CDATA[<p><strong>UPDATE to last week's Headlines:</strong></p><ul><li>SolarWinds hackers had access to over 3,000 US DOJ email accounts </li><li>A website named 'SolarLeaks' is selling data they claim was stolen from Microsoft (source code and repositories $600k), Cisco (source code multiple products $500k), FireEye (security tools – $50k), and SolarWinds (source code and customer portal $250k), or everything for $1mill.</li><li>Microsoft security teams release report on how Solarwinds hackers stayed hidden (nothing new)</li></ul><p><strong>This Week's Security Tip:<br></strong>In a recent incident reported in US news, an office secretary unknowingly gave some of her law firm’s most private data to a gentleman who had bought a Comcast Cable polo shirt off eBay. He dressed in khakis with a tool belt, and told the secretary he was there to audit their cable modem specifications and take pictures of the install for quality assurance. She had no reason to suspect he was part of a now-extinct hacker ring who would gain access to a business’s private network by going inside the office and noting the configuration details and passwords for their firewalls and cable modems. In some cases, they actually built a secure VPN private backdoor they later used to steal data. If someone dressed up in a utility-provider uniform, would you let them in?</p><p>Ask for identification and who they have spoken with about the service they are performing, and be “gracefully suspicious,” as they say in the South. Keep company policies about how visitors are allowed in the building, if such policies exist. If those kinds of policies don’t exist, work to define them. We can help, if needed – but this is a real problem your office needs to address.</p><p><strong>Today's Headlines:</strong></p><ul><li>Ticketmaster fined $10mil after hiring competitor's employee, then used his credentials that were still active to "choke-off" business and steal one of their high-end contracts</li><li>Nissan NA source code leaked after server hacked using default admin/admin login</li><li>Ubiquiti – security breach may have exposed all user data – sent mass email to reset pw – force you to create cloud login, which portal was breached,  instead of local account</li><li>Hacker leaks full database of 77 million Nitro PDF user records (email addresses, full names, bcrypt hashed passwords, titles, company names, IP addresses, and other system-related information</li><li>VLC Media Player 3.0.12 fixes multiple remote code execution flaws – very poular traffic cone icon for playing media,  "could trigger either a crash of VLC or an arbitrary code execution with the privileges of the target user."</li></ul><p><strong>Next Week's Teaser: </strong>Bank online? Do this ONE thing…<strong></strong></p><p>Call to Action: We talk a lot about stupid (nothing bad ever happens to me; head in the sand; too busy; I’ll do it later). So what’s smart? Taking this seriously TODAY. Book a 10-minute Discovery Call right now. I’ll ask some key questions and give you a quick score. If you’re doing everything right, you can sleep better at night. If there’s room for improvement, we’ll discuss options. NO PRESSURE, NO STRINGS. JUST BOOK THE CALL!</p><p><a href="https://www.mastercomputing.com/discoverycall/">www.mastercomputing.com/discovery</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>UPDATE to last week's Headlines:</strong></p><ul><li>SolarWinds hackers had access to over 3,000 US DOJ email accounts </li><li>A website named 'SolarLeaks' is selling data they claim was stolen from Microsoft (source code and repositories $600k), Cisco (source code multiple products $500k), FireEye (security tools – $50k), and SolarWinds (source code and customer portal $250k), or everything for $1mill.</li><li>Microsoft security teams release report on how Solarwinds hackers stayed hidden (nothing new)</li></ul><p><strong>This Week's Security Tip:<br></strong>In a recent incident reported in US news, an office secretary unknowingly gave some of her law firm’s most private data to a gentleman who had bought a Comcast Cable polo shirt off eBay. He dressed in khakis with a tool belt, and told the secretary he was there to audit their cable modem specifications and take pictures of the install for quality assurance. She had no reason to suspect he was part of a now-extinct hacker ring who would gain access to a business’s private network by going inside the office and noting the configuration details and passwords for their firewalls and cable modems. In some cases, they actually built a secure VPN private backdoor they later used to steal data. If someone dressed up in a utility-provider uniform, would you let them in?</p><p>Ask for identification and who they have spoken with about the service they are performing, and be “gracefully suspicious,” as they say in the South. Keep company policies about how visitors are allowed in the building, if such policies exist. If those kinds of policies don’t exist, work to define them. We can help, if needed – but this is a real problem your office needs to address.</p><p><strong>Today's Headlines:</strong></p><ul><li>Ticketmaster fined $10mil after hiring competitor's employee, then used his credentials that were still active to "choke-off" business and steal one of their high-end contracts</li><li>Nissan NA source code leaked after server hacked using default admin/admin login</li><li>Ubiquiti – security breach may have exposed all user data – sent mass email to reset pw – force you to create cloud login, which portal was breached,  instead of local account</li><li>Hacker leaks full database of 77 million Nitro PDF user records (email addresses, full names, bcrypt hashed passwords, titles, company names, IP addresses, and other system-related information</li><li>VLC Media Player 3.0.12 fixes multiple remote code execution flaws – very poular traffic cone icon for playing media,  "could trigger either a crash of VLC or an arbitrary code execution with the privileges of the target user."</li></ul><p><strong>Next Week's Teaser: </strong>Bank online? Do this ONE thing…<strong></strong></p><p>Call to Action: We talk a lot about stupid (nothing bad ever happens to me; head in the sand; too busy; I’ll do it later). So what’s smart? Taking this seriously TODAY. Book a 10-minute Discovery Call right now. I’ll ask some key questions and give you a quick score. If you’re doing everything right, you can sleep better at night. If there’s room for improvement, we’ll discuss options. NO PRESSURE, NO STRINGS. JUST BOOK THE CALL!</p><p><a href="https://www.mastercomputing.com/discoverycall/">www.mastercomputing.com/discovery</a> </p>]]>
      </content:encoded>
      <pubDate>Fri, 22 Jan 2021 15:18:29 -0600</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/7b207511/7996b9e3.mp3" length="37699234" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>1568</itunes:duration>
      <itunes:summary>Wait until you hear this story about what a secretary did</itunes:summary>
      <itunes:subtitle>Wait until you hear this story about what a secretary did</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>19. You're ASKING to be hacked!</title>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>19. You're ASKING to be hacked!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f490c76e-6636-429a-b8ba-afa8ff1c59bd</guid>
      <link>https://share.transistor.fm/s/78c83f50</link>
      <description>
        <![CDATA[<p>Want to know what every hacker hopes you believe? “We’re small…nobody wants to hack us.” This is the #1 reason why people (companies) get hacked. They dismiss the importance of IT security because they’re only a “small business.” This is a lazy, irresponsible excuse.</p><p>One thing is for certain: NO ONE is immune to cybercrime. In fact, one in five small businesses fall victim to cybercrime and that number grows every year. Plus, half of all cyber-attacks are aimed at small businesses BECAUSE they make themselves low-hanging fruit with sloppy or nonexistent security protocols.</p><p>And one more critical point to ponder: If YOU aren’t giving IT security the attention it deserves, how do you think your CLIENTS would feel about that? If for no other reason, you need to do it to protect your clients’ data, even if the only information about them you store is an e-mail address. If YOUR system gets compromised, hackers will now have access to your CLIENTS’ e-mail and can use that for phishing scams and virus-laden spam. I’m sure your clients want you to be a good steward of their information and privacy, so stop lying to yourself and get serious about putting essential security practices in place.</p><p>Have questions about cybersecurity or the technology at your company? I’m here to help. <a href="https://www.mastercomputing.com/discovery/"><strong>Fill out a form here</strong></a> to book a quick, 10-minute call with me. </p><p><strong>Show Notes:<br></strong>If you’ve ever said this, you’re ASKING to get hacked!</p><p>“We’re small nobody is going to hack us” </p><p>“Nobody cares about us or our data”</p><p>“We’re not big enough to be hacked” </p><p> </p><p>THIS is the #1 reason companies get hacked. Not because they’re small, but because they use that as an excuse, thinking you’re too small to get hacked. It’s stupid and irresponsible and you’re asking for trouble.  </p><p> </p><p>Thinking you’re “too small to get hacked” is <strong>stupid</strong>. </p><p> </p><p><strong>There are 2 primary targets: </strong></p><p>1.     The low hanging fruit </p><p>2.     Great big names</p><p> </p><p>It’s way easier to get the low hanging fruit, because if you’re the company that says “we don’t need that”</p><p> </p><p><strong>FACT: 1 in 5 small businesses fall victim to cybercrime every year. </strong></p><p> </p><p>The last time one of our clients got hacked was over a DECADE ago, and that is when we changed our security ways. We are living proof that if you put security measures in place you can mitigate the risks, at a minimum you can mitigate the risks.</p><p>   </p><p>No one is immune from cybercrime…</p><p>·      <strong>1 in 5</strong> small businesses fall victim to cybercrime every year</p><p>·      <strong>½ of all cyber-attacks are aimed at small businesses</strong> BECAUSE they make themselves low-hanging fruit. </p><p>·      Non-existing security protocols</p><p>·      You don’t have policies in place</p><p>·      The whole culture is backwards, generally it starts at the top. Meaning if you, as a business owner, don’t care about cybersecurity, then I guarantee your employees don’t care. Another thing to consider you get hacked, now you are responsible for all of your clients’ data</p><p> </p><p> </p><p><strong>What’s Irresponsible</strong>: Irresponsible is to not have information about whether your stuff is being monitored and maintained. </p><p> </p><p>Somebody needs to know what kind of firewall you have so when something bad comes up you can go patch that firewall.</p><p> </p><p>Whoever is responsible for security for this company should know this information. I’m looking from a business owner’s perspective. The owner of the company may not know what hardware he has in the IT closet, but better know the name of the person who is monitoring it, patching it, and making sure that guy is doing his job.</p><p> </p><p><strong>Coming up next week</strong>: Wait until you hear the story about what this sectary did…. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Want to know what every hacker hopes you believe? “We’re small…nobody wants to hack us.” This is the #1 reason why people (companies) get hacked. They dismiss the importance of IT security because they’re only a “small business.” This is a lazy, irresponsible excuse.</p><p>One thing is for certain: NO ONE is immune to cybercrime. In fact, one in five small businesses fall victim to cybercrime and that number grows every year. Plus, half of all cyber-attacks are aimed at small businesses BECAUSE they make themselves low-hanging fruit with sloppy or nonexistent security protocols.</p><p>And one more critical point to ponder: If YOU aren’t giving IT security the attention it deserves, how do you think your CLIENTS would feel about that? If for no other reason, you need to do it to protect your clients’ data, even if the only information about them you store is an e-mail address. If YOUR system gets compromised, hackers will now have access to your CLIENTS’ e-mail and can use that for phishing scams and virus-laden spam. I’m sure your clients want you to be a good steward of their information and privacy, so stop lying to yourself and get serious about putting essential security practices in place.</p><p>Have questions about cybersecurity or the technology at your company? I’m here to help. <a href="https://www.mastercomputing.com/discovery/"><strong>Fill out a form here</strong></a> to book a quick, 10-minute call with me. </p><p><strong>Show Notes:<br></strong>If you’ve ever said this, you’re ASKING to get hacked!</p><p>“We’re small nobody is going to hack us” </p><p>“Nobody cares about us or our data”</p><p>“We’re not big enough to be hacked” </p><p> </p><p>THIS is the #1 reason companies get hacked. Not because they’re small, but because they use that as an excuse, thinking you’re too small to get hacked. It’s stupid and irresponsible and you’re asking for trouble.  </p><p> </p><p>Thinking you’re “too small to get hacked” is <strong>stupid</strong>. </p><p> </p><p><strong>There are 2 primary targets: </strong></p><p>1.     The low hanging fruit </p><p>2.     Great big names</p><p> </p><p>It’s way easier to get the low hanging fruit, because if you’re the company that says “we don’t need that”</p><p> </p><p><strong>FACT: 1 in 5 small businesses fall victim to cybercrime every year. </strong></p><p> </p><p>The last time one of our clients got hacked was over a DECADE ago, and that is when we changed our security ways. We are living proof that if you put security measures in place you can mitigate the risks, at a minimum you can mitigate the risks.</p><p>   </p><p>No one is immune from cybercrime…</p><p>·      <strong>1 in 5</strong> small businesses fall victim to cybercrime every year</p><p>·      <strong>½ of all cyber-attacks are aimed at small businesses</strong> BECAUSE they make themselves low-hanging fruit. </p><p>·      Non-existing security protocols</p><p>·      You don’t have policies in place</p><p>·      The whole culture is backwards, generally it starts at the top. Meaning if you, as a business owner, don’t care about cybersecurity, then I guarantee your employees don’t care. Another thing to consider you get hacked, now you are responsible for all of your clients’ data</p><p> </p><p> </p><p><strong>What’s Irresponsible</strong>: Irresponsible is to not have information about whether your stuff is being monitored and maintained. </p><p> </p><p>Somebody needs to know what kind of firewall you have so when something bad comes up you can go patch that firewall.</p><p> </p><p>Whoever is responsible for security for this company should know this information. I’m looking from a business owner’s perspective. The owner of the company may not know what hardware he has in the IT closet, but better know the name of the person who is monitoring it, patching it, and making sure that guy is doing his job.</p><p> </p><p><strong>Coming up next week</strong>: Wait until you hear the story about what this sectary did…. </p>]]>
      </content:encoded>
      <pubDate>Thu, 07 Jan 2021 16:17:08 -0600</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/78c83f50/292e4dcb.mp3" length="30201377" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>1256</itunes:duration>
      <itunes:summary>I won’t tell your clients this, but you may be putting them at risk</itunes:summary>
      <itunes:subtitle>I won’t tell your clients this, but you may be putting them at risk</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>18. The Number One Threat to Cybersecurity</title>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>18. The Number One Threat to Cybersecurity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ea4798a5-25c8-4f77-9a26-559aadef8aaf</guid>
      <link>https://share.transistor.fm/s/feedbde0</link>
      <description>
        <![CDATA[<p><br>YOU! And your employees. Like it or not, human beings are our own worst enemies online, inviting hackers, viruses, data breaches, data loss, etc., through the seemingly innocent actions taken every day online. In most cases, this is done without malicious intent – but if you as a manager or owner aren’t monitoring what websites your employees are visiting, what files they’re sending and receiving, and even what they’re posting in company e-mail, you could be opening yourself up to a world of hurt.</p><p><br>That’s because employees’ actions can subject the company they work for to monetary loss, civil lawsuits, data theft and even criminal charges if they involve disclosure of confidential company information, transmission of pornography or exposure to malicious code.</p><p><br>Two things you can do: One, create an Acceptable Use Policy (AUP) to outline what employees can and cannot do with work devices, e-mail, data and Internet. That way they know how to play safe. Second, implement ongoing training (like these tips!) to keep security top of mind. We can also run phishing security tests and score your employees. That will truly show if they know how to spot a suspicious e-mail, and will make them realize how easy it is to be duped.</p><p>If you need help with setting up an AUP or employee training, give us a call at <strong>940-324-9400</strong>.</p><p><br>Have questions about cybersecurity or the technology at your company? I’m here to help. <a href="https://www.mastercomputing.com/discoverycall/"><strong>Access my calendar here</strong></a> to book a quick, 10-minute call with me. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><br>YOU! And your employees. Like it or not, human beings are our own worst enemies online, inviting hackers, viruses, data breaches, data loss, etc., through the seemingly innocent actions taken every day online. In most cases, this is done without malicious intent – but if you as a manager or owner aren’t monitoring what websites your employees are visiting, what files they’re sending and receiving, and even what they’re posting in company e-mail, you could be opening yourself up to a world of hurt.</p><p><br>That’s because employees’ actions can subject the company they work for to monetary loss, civil lawsuits, data theft and even criminal charges if they involve disclosure of confidential company information, transmission of pornography or exposure to malicious code.</p><p><br>Two things you can do: One, create an Acceptable Use Policy (AUP) to outline what employees can and cannot do with work devices, e-mail, data and Internet. That way they know how to play safe. Second, implement ongoing training (like these tips!) to keep security top of mind. We can also run phishing security tests and score your employees. That will truly show if they know how to spot a suspicious e-mail, and will make them realize how easy it is to be duped.</p><p>If you need help with setting up an AUP or employee training, give us a call at <strong>940-324-9400</strong>.</p><p><br>Have questions about cybersecurity or the technology at your company? I’m here to help. <a href="https://www.mastercomputing.com/discoverycall/"><strong>Access my calendar here</strong></a> to book a quick, 10-minute call with me. </p>]]>
      </content:encoded>
      <pubDate>Wed, 30 Dec 2020 15:21:40 -0600</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/feedbde0/424c07c4.mp3" length="43810312" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>1823</itunes:duration>
      <itunes:summary>You probably won’t guess what it is, but…</itunes:summary>
      <itunes:subtitle>You probably won’t guess what it is, but…</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>Yes</itunes:explicit>
    </item>
    <item>
      <title>17. Three Essential Rules for the Cloud</title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>17. Three Essential Rules for the Cloud</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">124cc0fb-173f-4d43-a3f7-25f2d82fb02a</guid>
      <link>https://share.transistor.fm/s/54a901b9</link>
      <description>
        <![CDATA[<p><br>If you’re using any kind of cloud application (and these days, who isn’t?), you are right to be concerned about data privacy and security. The company hosting your data is ultimately responsible for keeping hackers out of THEIR network, but most cloud breaches are due to USER ERROR. So it’s important that you, the user, are being smart about security. Here are a few things you can easily do to improve security in the cloud:</p><p><br>1. Maintain a STRONG password of at least eight characters with both uppercase and lowercase letters, numbers and symbols. Do NOT make it easy, such as “Password123!” While that technically meets the requirements, a hacker could easily crack that.</p><p><br>2. Make sure the device you’re using to access the application is secure. This is an area where you need professional help in installing and maintaining a strong firewall, antivirus and spam-filtering software. Don’t access your cloud application with a device you also use to check social media sites and free e-mail accounts like Hotmail.</p><p><br>3. Back up your data. If the data in a cloud application is important, make sure you’re downloading it from the application and backing it up in another safe and secure location. That way, if your account is hacked, if the data is corrupted OR if the cloud company shuts down your account, you have a copy.</p><p><br>Have questions about cybersecurity or the technology at your company? I’m here to help. <a href="https://www.mastercomputing.com/discoverycall/"><strong>Access my calendar</strong></a> here to book a quick, 10-minute call with me.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><br>If you’re using any kind of cloud application (and these days, who isn’t?), you are right to be concerned about data privacy and security. The company hosting your data is ultimately responsible for keeping hackers out of THEIR network, but most cloud breaches are due to USER ERROR. So it’s important that you, the user, are being smart about security. Here are a few things you can easily do to improve security in the cloud:</p><p><br>1. Maintain a STRONG password of at least eight characters with both uppercase and lowercase letters, numbers and symbols. Do NOT make it easy, such as “Password123!” While that technically meets the requirements, a hacker could easily crack that.</p><p><br>2. Make sure the device you’re using to access the application is secure. This is an area where you need professional help in installing and maintaining a strong firewall, antivirus and spam-filtering software. Don’t access your cloud application with a device you also use to check social media sites and free e-mail accounts like Hotmail.</p><p><br>3. Back up your data. If the data in a cloud application is important, make sure you’re downloading it from the application and backing it up in another safe and secure location. That way, if your account is hacked, if the data is corrupted OR if the cloud company shuts down your account, you have a copy.</p><p><br>Have questions about cybersecurity or the technology at your company? I’m here to help. <a href="https://www.mastercomputing.com/discoverycall/"><strong>Access my calendar</strong></a> here to book a quick, 10-minute call with me.</p>]]>
      </content:encoded>
      <pubDate>Fri, 18 Dec 2020 14:08:11 -0600</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/54a901b9/9611be18.mp3" length="68679600" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>2859</itunes:duration>
      <itunes:summary>Do these 3 things to make sure you’re not screwing up</itunes:summary>
      <itunes:subtitle>Do these 3 things to make sure you’re not screwing up</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>Yes</itunes:explicit>
    </item>
    <item>
      <title>16. You've Been HACKED! Now what?</title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>16. You've Been HACKED! Now what?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">17b4d911-5a05-417c-89ed-eea9cba76ce3</guid>
      <link>https://share.transistor.fm/s/bd8f416d</link>
      <description>
        <![CDATA[<p>No matter how diligent you are about security, there’s always a chance you can get hacked. That’s why you need to put a plan in place NOW to protect yourself and your CLIENTS, so damage is minimized. But what should you do if you find out you’ve been hacked?</p><p>First, contact your IT department (us) IMMEDIATELY. The faster we can address the attack – and determine the extent of the data, applications and machines compromised – the better your chances are of preventing much bigger problems. We’ll go to work on containing the attack and conducting a full scan of your network.</p><p>Based on what we discover, we may advise you to contact the local FBI office and your attorney. Your legal responsibilities depend greatly on the type of data accessed. For example, if medical, financial or other confidential records were stolen or accessed, you are legally responsible for notifying affected individuals that their data was compromised (your attorney can best direct you on what you need to do and how to do it).</p><p>Cybercrime is at an all-time high, and hackers are setting their sights on small and medium businesses who are “low hanging fruit.” Don’t be their next victim! </p><p><br>Have questions about cybersecurity or the technology at your company? I’m here to help. <a href="https://www.mastercomputing.com/discoverycall/"><strong>Book a quick, 10-minute call with me here</strong></a><strong>.</strong></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>No matter how diligent you are about security, there’s always a chance you can get hacked. That’s why you need to put a plan in place NOW to protect yourself and your CLIENTS, so damage is minimized. But what should you do if you find out you’ve been hacked?</p><p>First, contact your IT department (us) IMMEDIATELY. The faster we can address the attack – and determine the extent of the data, applications and machines compromised – the better your chances are of preventing much bigger problems. We’ll go to work on containing the attack and conducting a full scan of your network.</p><p>Based on what we discover, we may advise you to contact the local FBI office and your attorney. Your legal responsibilities depend greatly on the type of data accessed. For example, if medical, financial or other confidential records were stolen or accessed, you are legally responsible for notifying affected individuals that their data was compromised (your attorney can best direct you on what you need to do and how to do it).</p><p>Cybercrime is at an all-time high, and hackers are setting their sights on small and medium businesses who are “low hanging fruit.” Don’t be their next victim! </p><p><br>Have questions about cybersecurity or the technology at your company? I’m here to help. <a href="https://www.mastercomputing.com/discoverycall/"><strong>Book a quick, 10-minute call with me here</strong></a><strong>.</strong></p>]]>
      </content:encoded>
      <pubDate>Wed, 09 Dec 2020 17:00:00 -0600</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/bd8f416d/cc6d9424.mp3" length="47874585" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>1992</itunes:duration>
      <itunes:summary>Don’t think it won’t happen to you, because stats say it will...</itunes:summary>
      <itunes:subtitle>Don’t think it won’t happen to you, because stats say it will...</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>15. A Warning if you Handle, Process, or Store Credit Cards</title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>15. A Warning if you Handle, Process, or Store Credit Cards</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5ecb74ab-394b-43b2-bdb8-fd1f52c87ca0</guid>
      <link>https://share.transistor.fm/s/cfda071a</link>
      <description>
        <![CDATA[<p><b><br>If you handle, process or store credit cards in any manner, you are required to comply with PCI DSS, or Payment Card Industry Data Security Standards. This is a set of LEGAL requirements you must abide by to maintain a secure environment. If you violate them, you will incur serious fines and fees.</b></p><p><br>Are you subject to them if you take credit card payments over the phone? Absolutely! If you have clients that pay you direct by credit card, you’re subject to these laws. However, there are various levels of security standards – but thinking you don’t process enough to matter or that “no one would want to hack us” is dangerous. All it takes is an employee writing down a credit card number in an e-mail or on a piece of paper to violate a law; and then you’ll be left with legal fees, fines and the reputational damage incurred when you have to contact your clients to let them know you weren’t properly storing or handling their credit cards.</p><p><br>Getting compliant – or finding out if you ARE compliant – isn’t a simple matter I can outline in a 1-2-3-step checklist. It requires an assessment of your specific environment and how you handle credit card information.</p><p><br>A great resource is the PCI Security Standards Council, or www.pcisecuritystandards.org. If you want assistance in figuring out if you’re compliant, call us for a free assessment.</p><p><br>Have questions about cybersecurity or the technology at your company? I’m here to help. <a href="https://rz344.infusionsoft.com/app/bardEmailFunnel/~Link-4005~">Access my calendar here</a> to book a quick, 10-minute call with me.</p><p>Show Notes:</p><p>[00:00:30] Hey, everybody, I am Justin Shelly, CEO of Master Computing,</p><p> </p><p>[00:00:34] And I'm Joe Melot, CIO of Master Computing.</p><p> </p><p>[00:00:37] Welcome to Episode 15 of Stupid or Irresponsible. Joe, most important thing to happen to you this week?</p><p> </p><p>[00:00:48] That's a good question. I probably should have prepared.</p><p> </p><p>[00:00:50] Well, let me talk while you think about that.</p><p> </p><p> So, listen, it was last week or the week before, maybe both. I talked about getting stood up for a podcasting interview because I've had people start reaching out to me and want me to be on their podcast and stuff like that, which just makes me feel special. And they stood me up. Well, then they came back and they apologized profusely and set the whole thing up again.</p><p> </p><p>[00:01:19] I rearranged my entire schedule so that I can be here and do their 15-minute prescreening, meeting, Web meeting or whatever.</p><p> </p><p>[00:01:28] But I mean, we've been planning this thing talking about it sounds like now also last year they had a really dialed in process. And I mean, I'm at the doctor with my kid shuffling that shit then I get here for this interview. And within 30 seconds they're like, oh, well, we're not interested because the we had the wrong number of employees. And I just thought, are you kidding me right now that with all of the process you had in place, you couldn't have asked me this key question from day one and saved me about four weeks of fretting and hours and hours of prepping and whatever. So, I was I was pretty upset. But I'll tell you what, it it made me realize the importance of process and made me look at my own process as I bring guests and to, you know, some of our other podcasts. We've got DFW rock stars. I'll plug that real quick as we're trying to get more. I mean, that was one that struggled. We haven't had a lot of guests. So, building that back up, getting the process dialed in. But that was the most interesting thing to happen to me, is just yet again getting stiffed by this company that I am not happy about it. So, I hope that gave you enough time, Joe. You still got to come up with something on your end.</p><p> </p><p>[00:02:39] Oh, yeah.</p><p> </p><p>[00:02:40] I guess just this week is kind of playing with the old Christmas ideas of, you know, a lot of our clients are out of the office during this time of the year. So, getting everything set up there, you know, we're a little short staffed here at the office. Even so, just making sure everything's covered. Everybody's got all our rules, make sure all security for all our clients are working and, you know, make sure we're on the pulse. Everyone has time to play catch up, right. I wouldn't call it catch up so much. It's really, you know, move our oranges from one basket to the other, make sure everything's taken care of. Yeah. No rest for the weary.</p><p> </p><p>[00:03:15] Yeah. And I know you already talked about it, but you've got the new house you're getting in. You're settled. You've unpacked all your boxes.</p><p> </p><p>[00:03:20] Oh, yeah. They're all total impact that usually. I think I told you that usually takes me about a year. Well, that's good because we're on pace for about a decade, so.</p><p> </p><p>[00:03:28] Yeah, but it's got to be cool, man. Oh yeah. And the new plants really love it. All right. Excellent. All right.</p><p> </p><p>[00:03:34] Well, let's jump in, Joe.</p><p> </p><p>[00:03:37] You know, we kind of gotten into the habit of reminding people why we call this podcast's Stupid or Irresponsible comes from the marketing campaign. We've already talked about that. But I mean, the gist of it is we ultimately as business owners, executives, managers, we are responsible for the security of our organization. And it's a responsibility that should be taken seriously. And sometimes it's not.</p><p> </p><p>[00:04:03] And, you know, we went on the traveling the speaking circuit for about a year. We're giving away free stuff where we're just begging and pleading people to take this seriously and not getting a great response from it, you know, because unfortunately, if somebody has not had a cybersecurity incident, it's really hard to get them to take it seriously. And so, you know, I went from this kind of coddling, you know, we're all victims here of crime. And it is stupid because we are one of the few places where the government prosecutes the victims. You know that that was kind of my whole pitch before. Like, this is it. If you get broken into in your home, nobody comes in calling you stupid. But if your business gets hit at, you kind of get close to it. You know, I've changed my tune a little bit and there is a level of stupidity to just not paying attention and taking this seriously. So, you know, there we go. The reminder of why we call it that. I don't really think people are stupid, but I do think people get distracted.</p><p> </p><p>[00:05:00] You know, I'll go out on a limb. I guarantee there's a lot of stupid. Well, listen, yeah, you're right. You're right. There absolutely are.</p><p> </p><p>[00:05:11] Maybe we all just have our areas where we're stupid, you know, as I'm kind of trying to defend business owners who have so many things on their plate, you know, and it's easy for me to just jump on here and say they're stupid and they're going to be mad at me and run away and cry or whatever. I don't know. But, you know, there's just there's a lot going on, especially covid like. The world burning down, we've got so many problems, man, we can’t ignore this one. No, no. Yeah, absolutely not. I mean, people get hit. They we'll talk about it. I've got one. You go out of business like it's not recoverable. This isn't you don't get a do over. It's not a video game where you can reset. You know, it's like this is it. If we don't take this seriously, if you get hit hard enough, you're out of business. So there it is.</p><p> </p><p>[00:05:52] Security tip this week, Joe, we're going to talk about, you know, some of these things ar...</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><b><br>If you handle, process or store credit cards in any manner, you are required to comply with PCI DSS, or Payment Card Industry Data Security Standards. This is a set of LEGAL requirements you must abide by to maintain a secure environment. If you violate them, you will incur serious fines and fees.</b></p><p><br>Are you subject to them if you take credit card payments over the phone? Absolutely! If you have clients that pay you direct by credit card, you’re subject to these laws. However, there are various levels of security standards – but thinking you don’t process enough to matter or that “no one would want to hack us” is dangerous. All it takes is an employee writing down a credit card number in an e-mail or on a piece of paper to violate a law; and then you’ll be left with legal fees, fines and the reputational damage incurred when you have to contact your clients to let them know you weren’t properly storing or handling their credit cards.</p><p><br>Getting compliant – or finding out if you ARE compliant – isn’t a simple matter I can outline in a 1-2-3-step checklist. It requires an assessment of your specific environment and how you handle credit card information.</p><p><br>A great resource is the PCI Security Standards Council, or www.pcisecuritystandards.org. If you want assistance in figuring out if you’re compliant, call us for a free assessment.</p><p><br>Have questions about cybersecurity or the technology at your company? I’m here to help. <a href="https://rz344.infusionsoft.com/app/bardEmailFunnel/~Link-4005~">Access my calendar here</a> to book a quick, 10-minute call with me.</p><p>Show Notes:</p><p>[00:00:30] Hey, everybody, I am Justin Shelly, CEO of Master Computing,</p><p> </p><p>[00:00:34] And I'm Joe Melot, CIO of Master Computing.</p><p> </p><p>[00:00:37] Welcome to Episode 15 of Stupid or Irresponsible. Joe, most important thing to happen to you this week?</p><p> </p><p>[00:00:48] That's a good question. I probably should have prepared.</p><p> </p><p>[00:00:50] Well, let me talk while you think about that.</p><p> </p><p> So, listen, it was last week or the week before, maybe both. I talked about getting stood up for a podcasting interview because I've had people start reaching out to me and want me to be on their podcast and stuff like that, which just makes me feel special. And they stood me up. Well, then they came back and they apologized profusely and set the whole thing up again.</p><p> </p><p>[00:01:19] I rearranged my entire schedule so that I can be here and do their 15-minute prescreening, meeting, Web meeting or whatever.</p><p> </p><p>[00:01:28] But I mean, we've been planning this thing talking about it sounds like now also last year they had a really dialed in process. And I mean, I'm at the doctor with my kid shuffling that shit then I get here for this interview. And within 30 seconds they're like, oh, well, we're not interested because the we had the wrong number of employees. And I just thought, are you kidding me right now that with all of the process you had in place, you couldn't have asked me this key question from day one and saved me about four weeks of fretting and hours and hours of prepping and whatever. So, I was I was pretty upset. But I'll tell you what, it it made me realize the importance of process and made me look at my own process as I bring guests and to, you know, some of our other podcasts. We've got DFW rock stars. I'll plug that real quick as we're trying to get more. I mean, that was one that struggled. We haven't had a lot of guests. So, building that back up, getting the process dialed in. But that was the most interesting thing to happen to me, is just yet again getting stiffed by this company that I am not happy about it. So, I hope that gave you enough time, Joe. You still got to come up with something on your end.</p><p> </p><p>[00:02:39] Oh, yeah.</p><p> </p><p>[00:02:40] I guess just this week is kind of playing with the old Christmas ideas of, you know, a lot of our clients are out of the office during this time of the year. So, getting everything set up there, you know, we're a little short staffed here at the office. Even so, just making sure everything's covered. Everybody's got all our rules, make sure all security for all our clients are working and, you know, make sure we're on the pulse. Everyone has time to play catch up, right. I wouldn't call it catch up so much. It's really, you know, move our oranges from one basket to the other, make sure everything's taken care of. Yeah. No rest for the weary.</p><p> </p><p>[00:03:15] Yeah. And I know you already talked about it, but you've got the new house you're getting in. You're settled. You've unpacked all your boxes.</p><p> </p><p>[00:03:20] Oh, yeah. They're all total impact that usually. I think I told you that usually takes me about a year. Well, that's good because we're on pace for about a decade, so.</p><p> </p><p>[00:03:28] Yeah, but it's got to be cool, man. Oh yeah. And the new plants really love it. All right. Excellent. All right.</p><p> </p><p>[00:03:34] Well, let's jump in, Joe.</p><p> </p><p>[00:03:37] You know, we kind of gotten into the habit of reminding people why we call this podcast's Stupid or Irresponsible comes from the marketing campaign. We've already talked about that. But I mean, the gist of it is we ultimately as business owners, executives, managers, we are responsible for the security of our organization. And it's a responsibility that should be taken seriously. And sometimes it's not.</p><p> </p><p>[00:04:03] And, you know, we went on the traveling the speaking circuit for about a year. We're giving away free stuff where we're just begging and pleading people to take this seriously and not getting a great response from it, you know, because unfortunately, if somebody has not had a cybersecurity incident, it's really hard to get them to take it seriously. And so, you know, I went from this kind of coddling, you know, we're all victims here of crime. And it is stupid because we are one of the few places where the government prosecutes the victims. You know that that was kind of my whole pitch before. Like, this is it. If you get broken into in your home, nobody comes in calling you stupid. But if your business gets hit at, you kind of get close to it. You know, I've changed my tune a little bit and there is a level of stupidity to just not paying attention and taking this seriously. So, you know, there we go. The reminder of why we call it that. I don't really think people are stupid, but I do think people get distracted.</p><p> </p><p>[00:05:00] You know, I'll go out on a limb. I guarantee there's a lot of stupid. Well, listen, yeah, you're right. You're right. There absolutely are.</p><p> </p><p>[00:05:11] Maybe we all just have our areas where we're stupid, you know, as I'm kind of trying to defend business owners who have so many things on their plate, you know, and it's easy for me to just jump on here and say they're stupid and they're going to be mad at me and run away and cry or whatever. I don't know. But, you know, there's just there's a lot going on, especially covid like. The world burning down, we've got so many problems, man, we can’t ignore this one. No, no. Yeah, absolutely not. I mean, people get hit. They we'll talk about it. I've got one. You go out of business like it's not recoverable. This isn't you don't get a do over. It's not a video game where you can reset. You know, it's like this is it. If we don't take this seriously, if you get hit hard enough, you're out of business. So there it is.</p><p> </p><p>[00:05:52] Security tip this week, Joe, we're going to talk about, you know, some of these things ar...</p>]]>
      </content:encoded>
      <pubDate>Tue, 01 Dec 2020 14:00:00 -0600</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/cfda071a/0ad779a8.mp3" length="44497723" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>1852</itunes:duration>
      <itunes:summary>Use this simple checklist to make sure you’re compliant</itunes:summary>
      <itunes:subtitle>Use this simple checklist to make sure you’re compliant</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>Yes</itunes:explicit>
    </item>
    <item>
      <title>14. Your Firewall is USELESS unless...</title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>14. Your Firewall is USELESS unless...</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f62fa331-86ad-4b05-bdd3-d4856e8eda19</guid>
      <link>https://share.transistor.fm/s/f83106b5</link>
      <description>
        <![CDATA[<p><strong>Contact us today. Sleep soundly tonight. </strong>Schedule a quick 10-minute phone call here - www.mastercomputing.com/discovery </p><p><br>A firewall is a device that acts like a security cop watching over your computer network to detect unauthorized access and activity – and EVERY business and individual needs one.</p><p>However, your firewall is completely useless if it’s not set up or maintained properly. Your firewall needs to be upgraded and patched on a continual and consistent basis, and security policies and configurations set. This is not something you want to try and handle on your own – you are best served by letting the pros (us!) handle that for you.</p><p>If you’re a managed services client, we’ve got you covered. If not, you should call us immediately to correct the error of your ways: 940-324-9400</p><p>Have questions about cybersecurity or the technology at your company? I’m here to help. Access my calendar here - www.mastercomputing.com/discovery - to book a quick, 10-minute call with me.</p><ul><li><strong>Intro</strong>. </li></ul><p>Hey everybody, welcome to episode 14 of Stupid or irresponsible! We have host, Justin Shelley, CEO of Master Computing and co-host Joe Melot, CIO of Master Computing back with some updates, tips, headlines and more!</p><p> </p><ul><li><strong>What’s the most interesting thing that happened to you this week?</strong></li></ul><p><strong>Joe:</strong></p><ul><li>Different for sure. Been diving into CMMC Framework, excited about that for the SPRs for the DOD. Basically, a new PCI, stuff for the Department of Defense contracts, contractor vendors and that kind of stuff. Nothing exciting there. A lot of pencil pushing a lot of paperwork. My personal life, fixing things in the new house, fix some broken shit, some fun, some not so much.</li></ul><p><strong>Justin:</strong></p><ul><li>The most exciting thing that happened to me last week – was I got stood up for a podcast interview!</li></ul><p> </p><ul><li><strong>Reminder why we call it “Stupid or Irresponsible”</strong>. 4:50<br> <ul><li>It started with an ad campaign, saying how when you get hit or WHEN You Get Breached, Are They Going To Call Your Stupid…or Just Irresponsible?? <ul><li>I used to subscribe to the victim mentality, but that will get us nowhere. Also, I tried for a full year to give this away free of charge and very few took me up on the offer. That is stupid. If we are not giving this our full attention, we are stupid. We should know better. We should be ashamed of ourselves. Even BASIC security measures could be the difference of going out of business or not. </li></ul></li></ul></li></ul><p><br></p><ul><li><strong>Stupid Update</strong>. <ul><li>Justin’s stupid update “You’re looking at it…” I clicked on a stupid email this week, and sure enough it was a phishing email. <ul><li>We broke down phishing scams a few episodes ago and talked recently about just how outrageous they are becoming, and <strong>here I am</strong>, falling for one. Fell for the subject like “Check Number 01328” and I opened it. It got through numerous spam filters, It came from someone who I am acquainted with, and their email got breached. So, then open email and an there is this image of a check that is <em>small enough</em> that you do not really see it, so I click on it trying to figure out what the hell it is, and now THERE WE GO. The portal to login to your Microsoft account…stupid move on my part. </li><li>LUCKILY, we have been talking about this week after week during our podcasts and I was able to save it before it went any further. It could have been just as easily a link that I clicked and downloads malicious payloads, but <strong>luckily</strong> <strong>it was not.</strong> </li></ul></li></ul></li></ul><p> </p><ul><li><strong>Security/Productivity tip</strong>. 9:45:  <ul><li>Joe, we are talking about firewalls today and the title is kind of interesting. <strong>Your firewall is useless</strong>. Start Joe, break it down for people. <strong>What's a firewall? </strong></li></ul></li><li><strong>What is a firewall joe?</strong></li></ul><p>So, Firewalls. It is a device that kind of acts like the security cop that watches over your network. This is going to be like the very end of your network, logically and literally everything. Every Internet activity that happens within an organization of building your house, you name, it goes through this. That is the cop that is watching everything that is going back and forth. </p><p><strong> <br></strong><br></p><p><strong>The deal is, though, that your firewall is completely useless if it is not set up if it's not maintained properly</strong>. If it is not, <strong>you could buy the most top of the line firewall.</strong> You might also hear the word <em>router</em> that is kind of street lingo. But really, this is a router, But the technical jargon now is UTM. Basically, it's just the cop. Making sure that only the good stuff comes in. </p><p>But now all the bad guys are coming in. None of the good stuff's going out. You have got all kinds of problems, so it's <strong>worthless</strong>. What is the point? <strong>Why even spend the money in the first place?</strong> -  If you are not going to <strong>maintain it</strong>, you're not going to get it <strong>set up properly</strong>. If you’re not going to <strong>keep it patched.</strong> <strong>These things hackers are always looking for</strong> the <strong><em>biggest</em></strong><strong> </strong><strong><em>vulnerability</em></strong><strong>, and then once they get, this is basically your front door</strong>. If they get in through your front door, they have got full access to all your bedrooms. </p><ul><li>So, making sure that it is <strong>up to date</strong> that it has got the <strong>newest patches</strong> got the <strong>newest updates</strong>. It is <strong>set up correctly.</strong> You have got the right <strong>filtering engine</strong>, you have got the right, <strong>you are blocking the right things, etc.</strong></li></ul><p> </p><ul><li><strong>Stupid Headlines</strong>:<br> <ul><li><strong>Spam email campaigns – they are just going crazy. </strong>Like all over the place. I've been scouring all of our client’s spam filters kind of seeing, you know, because <strong><em>the fact that it got to your mailbox, it just that intrigued me. </em></strong>That is interesting because we have got so many filters, is so many blocks and stuff. <strong>But these guys are getting so smart. </strong>The latest thing they have been doing is having a website where it's <strong>just a link</strong>. There are no malicious payloads. There is no anything. <strong>All it is a redirect</strong>. <ul><li><strong>Problem is -</strong> You cannot make hyperlinks; you know <em>warning flag</em> for your spam filter. </li><li><strong>Why? -</strong>  Because half of the world uses in their signature. They have a link to their Facebook, their website, you name it. </li><li><strong>How hackers do this? -</strong> A lot of this times they are like <strong>legitimate links</strong>. Maybe it's a OneDrive. Or maybe it's, you go the OneDrive, and then THAT is the actual fake. So, it has been a breached OneDrive, page or OneDrive document that they make the look like a page really is just a credential steel or something like that. Asking you to log in.</li></ul></li></ul></li><li><strong>How do you fix that?</strong> <ul><li><strong>So, it is really down to user training</strong>. End user training. <ul><li>We have really been pushing that hard and again speaking to what I was talking about earlier. What I have been jumping into is, this CMMC this Department of Defense contracting stuff, and they <strong>require</strong></li></ul></li></ul></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Contact us today. Sleep soundly tonight. </strong>Schedule a quick 10-minute phone call here - www.mastercomputing.com/discovery </p><p><br>A firewall is a device that acts like a security cop watching over your computer network to detect unauthorized access and activity – and EVERY business and individual needs one.</p><p>However, your firewall is completely useless if it’s not set up or maintained properly. Your firewall needs to be upgraded and patched on a continual and consistent basis, and security policies and configurations set. This is not something you want to try and handle on your own – you are best served by letting the pros (us!) handle that for you.</p><p>If you’re a managed services client, we’ve got you covered. If not, you should call us immediately to correct the error of your ways: 940-324-9400</p><p>Have questions about cybersecurity or the technology at your company? I’m here to help. Access my calendar here - www.mastercomputing.com/discovery - to book a quick, 10-minute call with me.</p><ul><li><strong>Intro</strong>. </li></ul><p>Hey everybody, welcome to episode 14 of Stupid or irresponsible! We have host, Justin Shelley, CEO of Master Computing and co-host Joe Melot, CIO of Master Computing back with some updates, tips, headlines and more!</p><p> </p><ul><li><strong>What’s the most interesting thing that happened to you this week?</strong></li></ul><p><strong>Joe:</strong></p><ul><li>Different for sure. Been diving into CMMC Framework, excited about that for the SPRs for the DOD. Basically, a new PCI, stuff for the Department of Defense contracts, contractor vendors and that kind of stuff. Nothing exciting there. A lot of pencil pushing a lot of paperwork. My personal life, fixing things in the new house, fix some broken shit, some fun, some not so much.</li></ul><p><strong>Justin:</strong></p><ul><li>The most exciting thing that happened to me last week – was I got stood up for a podcast interview!</li></ul><p> </p><ul><li><strong>Reminder why we call it “Stupid or Irresponsible”</strong>. 4:50<br> <ul><li>It started with an ad campaign, saying how when you get hit or WHEN You Get Breached, Are They Going To Call Your Stupid…or Just Irresponsible?? <ul><li>I used to subscribe to the victim mentality, but that will get us nowhere. Also, I tried for a full year to give this away free of charge and very few took me up on the offer. That is stupid. If we are not giving this our full attention, we are stupid. We should know better. We should be ashamed of ourselves. Even BASIC security measures could be the difference of going out of business or not. </li></ul></li></ul></li></ul><p><br></p><ul><li><strong>Stupid Update</strong>. <ul><li>Justin’s stupid update “You’re looking at it…” I clicked on a stupid email this week, and sure enough it was a phishing email. <ul><li>We broke down phishing scams a few episodes ago and talked recently about just how outrageous they are becoming, and <strong>here I am</strong>, falling for one. Fell for the subject like “Check Number 01328” and I opened it. It got through numerous spam filters, It came from someone who I am acquainted with, and their email got breached. So, then open email and an there is this image of a check that is <em>small enough</em> that you do not really see it, so I click on it trying to figure out what the hell it is, and now THERE WE GO. The portal to login to your Microsoft account…stupid move on my part. </li><li>LUCKILY, we have been talking about this week after week during our podcasts and I was able to save it before it went any further. It could have been just as easily a link that I clicked and downloads malicious payloads, but <strong>luckily</strong> <strong>it was not.</strong> </li></ul></li></ul></li></ul><p> </p><ul><li><strong>Security/Productivity tip</strong>. 9:45:  <ul><li>Joe, we are talking about firewalls today and the title is kind of interesting. <strong>Your firewall is useless</strong>. Start Joe, break it down for people. <strong>What's a firewall? </strong></li></ul></li><li><strong>What is a firewall joe?</strong></li></ul><p>So, Firewalls. It is a device that kind of acts like the security cop that watches over your network. This is going to be like the very end of your network, logically and literally everything. Every Internet activity that happens within an organization of building your house, you name, it goes through this. That is the cop that is watching everything that is going back and forth. </p><p><strong> <br></strong><br></p><p><strong>The deal is, though, that your firewall is completely useless if it is not set up if it's not maintained properly</strong>. If it is not, <strong>you could buy the most top of the line firewall.</strong> You might also hear the word <em>router</em> that is kind of street lingo. But really, this is a router, But the technical jargon now is UTM. Basically, it's just the cop. Making sure that only the good stuff comes in. </p><p>But now all the bad guys are coming in. None of the good stuff's going out. You have got all kinds of problems, so it's <strong>worthless</strong>. What is the point? <strong>Why even spend the money in the first place?</strong> -  If you are not going to <strong>maintain it</strong>, you're not going to get it <strong>set up properly</strong>. If you’re not going to <strong>keep it patched.</strong> <strong>These things hackers are always looking for</strong> the <strong><em>biggest</em></strong><strong> </strong><strong><em>vulnerability</em></strong><strong>, and then once they get, this is basically your front door</strong>. If they get in through your front door, they have got full access to all your bedrooms. </p><ul><li>So, making sure that it is <strong>up to date</strong> that it has got the <strong>newest patches</strong> got the <strong>newest updates</strong>. It is <strong>set up correctly.</strong> You have got the right <strong>filtering engine</strong>, you have got the right, <strong>you are blocking the right things, etc.</strong></li></ul><p> </p><ul><li><strong>Stupid Headlines</strong>:<br> <ul><li><strong>Spam email campaigns – they are just going crazy. </strong>Like all over the place. I've been scouring all of our client’s spam filters kind of seeing, you know, because <strong><em>the fact that it got to your mailbox, it just that intrigued me. </em></strong>That is interesting because we have got so many filters, is so many blocks and stuff. <strong>But these guys are getting so smart. </strong>The latest thing they have been doing is having a website where it's <strong>just a link</strong>. There are no malicious payloads. There is no anything. <strong>All it is a redirect</strong>. <ul><li><strong>Problem is -</strong> You cannot make hyperlinks; you know <em>warning flag</em> for your spam filter. </li><li><strong>Why? -</strong>  Because half of the world uses in their signature. They have a link to their Facebook, their website, you name it. </li><li><strong>How hackers do this? -</strong> A lot of this times they are like <strong>legitimate links</strong>. Maybe it's a OneDrive. Or maybe it's, you go the OneDrive, and then THAT is the actual fake. So, it has been a breached OneDrive, page or OneDrive document that they make the look like a page really is just a credential steel or something like that. Asking you to log in.</li></ul></li></ul></li><li><strong>How do you fix that?</strong> <ul><li><strong>So, it is really down to user training</strong>. End user training. <ul><li>We have really been pushing that hard and again speaking to what I was talking about earlier. What I have been jumping into is, this CMMC this Department of Defense contracting stuff, and they <strong>require</strong></li></ul></li></ul></li></ul>]]>
      </content:encoded>
      <pubDate>Tue, 24 Nov 2020 14:00:00 -0600</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/f83106b5/27c45381.mp3" length="40278106" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>1676</itunes:duration>
      <itunes:summary>Immediately do this, please! </itunes:summary>
      <itunes:subtitle>Immediately do this, please! </itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>13. Don't Just Close Your Browser</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>13. Don't Just Close Your Browser</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1155a1d8-7297-4b90-9eb5-aa41bb09d029</guid>
      <link>https://share.transistor.fm/s/fecc2d30</link>
      <description>
        <![CDATA[<p>Don't just close your browser! When online accessing a banking site or any other application containing sensitive data, make sure you log out of the site and THEN close your browser. If you simply close your browser, some of the session information that a hacker can use to gain entry is still running in the background. </p><p>Have questions about cybersecurity or the technology at your company? I am here to help.<strong> </strong><a href="https://www.mastercomputing.com/discovery-call/"><strong>Access my calendar here</strong></a><strong> to book a quick, 10-minute call with me. </strong></p><p><strong>Subscribe:<br></strong><a href="https://open.spotify.com/episode/52AlGX3ubVV3PK5ymCSMv3?si=dKjuZrQrQxqDmMEa5YaoLg">Spotify</a> | <a href="https://podcasts.apple.com/us/podcast/13-dont-just-close-your-browser/id1519838743?i=1000496522942">Apple</a> | <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy50cmFuc2lzdG9yLmZtL3N0dXBpZC1vci1qdXN0LWlycmVzcG9uc2libGU/episode/MTE1NWExZDgtNzI5Ny00YjkwLTllYjUtYWE0MWJiMDlkMDI5?sa=X&amp;ved=0CAUQkfYCahcKEwiwnenJu-LsAhUAAAAAHQAAAAAQAQ&amp;hl=en">Google Podcasts </a></p><p><em>Show Notes:</em></p><ul><li><strong>Intro</strong>.  Hey everybody, welcome to episode 13 of Stupid or irresponsible! I’m Justin Shelley, CEO of Master Computing and my co-host Joe Melot, CIO of Master Computing. </li><li><strong>Get to know us</strong>. Joe and Justin share a quick window into their personal lives, personality, what makes them tic, this week...  </li><li><strong>Justin reminds listeners of why we call it “Stupid or Irresponsible”</strong> <ul><li>I used to subscribe to the victim mentality. But that will get us nowhere. Also, I tried for a full year to give this away free of charge and very few took me up on the offer. That’s stupid. If we aren’t giving this our full attention, we’re stupid. We should know better. We should be ashamed of ourselves. </li></ul></li></ul><p><br></p><ul><li><strong>Stupid Update - [9:00]</strong>. We are introducing a <em>NEW segment to this podcast called the Stupid Update.</em> The update here is we are going to follow-up on any previous episodes where we might’ve left you hanging. For example, last week's episode there was an issue, and we promised we would follow up. So here it is:  <ul><li> UHS, a Giant Hospital System in America – Since last week, Oct. 12, they said they got all systems restored, users confirmed phones working again! However, does not say if they paid the ransom, a third party is believed to have paid the ransom for them. Because of this, a big announcement was made by OFAC requiring you to get permission through them, and if you go through third party – they are going to prosecute.   </li></ul></li></ul><p> </p><p> </p><ul><li><strong>IT Security/Productivity Tip of the week - [15:12]</strong>.  Don’t just close your browser! </li></ul><p>When online accessing a banking site or any other application containing sensitive data, make sure you log out of the site and THEN close your browser. If you simply close your browser, some of the session information that a hacker can use to gain entry is still running in the background. </p><p>Have questions about cybersecurity or the technology at your company? I’m here to help. Access my calendar here to book a quick, 10-minute call with me. Go to: MasterComputing.com/discovery</p><p><br></p><ul><li><strong>[21:30] - The different Layers of Security: </strong></li></ul><ol><li>Have an antivirus </li><li>Have a spam filter that’ll block spam from even getting to your email in the 1st place! </li><li>Make sure someone is <strong>monitoring </strong>that, and that it is blocking the RIGHT <em>level </em>of security. Make sure someone has your back and watching this 24/7 (like us!). </li></ol><p><br><strong>Stupid Headlines</strong>. Guys, we are a security company, we eat, sleep, and breathe this stuff. Here are a few recent headlines / events that resulted from stupid behavior.  </p><ul><li>EMOTET and the Trickbot campaigns are on overdrive. </li><li>Iran is going nuts, they hacked the BIG DOGS and have been sending the same email spam campaign </li><li>So much spam going on right now, trying to trick people into giving credentials, and succeeding.  </li><li>Whale Phishing attack – this is a certain type of <strong>spear </strong>phishing   </li><li>Vote from Home Ballots – if you know someone's mailing address and last name... you can change their vote. Print it out, mail it in and change their vote. [24:20] </li></ul><p>We’ve been covering this <strong>Layered approach </strong>to the technology / security aspect, but you MUST have the user education aspect also if you want any hope in not being the next victim of cybercrime.  </p><ul><li><strong>Stupid Teaser [ 26:10]. </strong>What’s coming up next week. The next stupid thing we’re going to break down is your router!  What to do, what not to do, and why you may have a giant false sense of security going on. </li></ul><p> </p><ul><li><strong>Joe’s Key Takeaways [ 26:45]:</strong> Turn on two-factor authentication! Keep your eyes peeled for these spam emails, they are EVERYWHERE. Unless you have someone like us blocking spam and monitoring the security levels, then probably just don’t open your emails...  </li></ul><p> </p><ul><li><strong>Smart Call to Action [27:35]</strong>. We talk a lot about stupid (nothing bad ever happens to me; head in the sand; too busy; I’ll do it later). So, what’s smart? Taking this seriously TODAY. Book a 10-minute Discovery Call right now. I’ll ask some key questions and give you a quick score. If you’re doing everything right, you can sleep better at night. If there’s room for improvement, we’ll discuss options. NO PRESSURE, NO STRINGS. JUST BOOK THE DAMN CALL! </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Don't just close your browser! When online accessing a banking site or any other application containing sensitive data, make sure you log out of the site and THEN close your browser. If you simply close your browser, some of the session information that a hacker can use to gain entry is still running in the background. </p><p>Have questions about cybersecurity or the technology at your company? I am here to help.<strong> </strong><a href="https://www.mastercomputing.com/discovery-call/"><strong>Access my calendar here</strong></a><strong> to book a quick, 10-minute call with me. </strong></p><p><strong>Subscribe:<br></strong><a href="https://open.spotify.com/episode/52AlGX3ubVV3PK5ymCSMv3?si=dKjuZrQrQxqDmMEa5YaoLg">Spotify</a> | <a href="https://podcasts.apple.com/us/podcast/13-dont-just-close-your-browser/id1519838743?i=1000496522942">Apple</a> | <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy50cmFuc2lzdG9yLmZtL3N0dXBpZC1vci1qdXN0LWlycmVzcG9uc2libGU/episode/MTE1NWExZDgtNzI5Ny00YjkwLTllYjUtYWE0MWJiMDlkMDI5?sa=X&amp;ved=0CAUQkfYCahcKEwiwnenJu-LsAhUAAAAAHQAAAAAQAQ&amp;hl=en">Google Podcasts </a></p><p><em>Show Notes:</em></p><ul><li><strong>Intro</strong>.  Hey everybody, welcome to episode 13 of Stupid or irresponsible! I’m Justin Shelley, CEO of Master Computing and my co-host Joe Melot, CIO of Master Computing. </li><li><strong>Get to know us</strong>. Joe and Justin share a quick window into their personal lives, personality, what makes them tic, this week...  </li><li><strong>Justin reminds listeners of why we call it “Stupid or Irresponsible”</strong> <ul><li>I used to subscribe to the victim mentality. But that will get us nowhere. Also, I tried for a full year to give this away free of charge and very few took me up on the offer. That’s stupid. If we aren’t giving this our full attention, we’re stupid. We should know better. We should be ashamed of ourselves. </li></ul></li></ul><p><br></p><ul><li><strong>Stupid Update - [9:00]</strong>. We are introducing a <em>NEW segment to this podcast called the Stupid Update.</em> The update here is we are going to follow-up on any previous episodes where we might’ve left you hanging. For example, last week's episode there was an issue, and we promised we would follow up. So here it is:  <ul><li> UHS, a Giant Hospital System in America – Since last week, Oct. 12, they said they got all systems restored, users confirmed phones working again! However, does not say if they paid the ransom, a third party is believed to have paid the ransom for them. Because of this, a big announcement was made by OFAC requiring you to get permission through them, and if you go through third party – they are going to prosecute.   </li></ul></li></ul><p> </p><p> </p><ul><li><strong>IT Security/Productivity Tip of the week - [15:12]</strong>.  Don’t just close your browser! </li></ul><p>When online accessing a banking site or any other application containing sensitive data, make sure you log out of the site and THEN close your browser. If you simply close your browser, some of the session information that a hacker can use to gain entry is still running in the background. </p><p>Have questions about cybersecurity or the technology at your company? I’m here to help. Access my calendar here to book a quick, 10-minute call with me. Go to: MasterComputing.com/discovery</p><p><br></p><ul><li><strong>[21:30] - The different Layers of Security: </strong></li></ul><ol><li>Have an antivirus </li><li>Have a spam filter that’ll block spam from even getting to your email in the 1st place! </li><li>Make sure someone is <strong>monitoring </strong>that, and that it is blocking the RIGHT <em>level </em>of security. Make sure someone has your back and watching this 24/7 (like us!). </li></ol><p><br><strong>Stupid Headlines</strong>. Guys, we are a security company, we eat, sleep, and breathe this stuff. Here are a few recent headlines / events that resulted from stupid behavior.  </p><ul><li>EMOTET and the Trickbot campaigns are on overdrive. </li><li>Iran is going nuts, they hacked the BIG DOGS and have been sending the same email spam campaign </li><li>So much spam going on right now, trying to trick people into giving credentials, and succeeding.  </li><li>Whale Phishing attack – this is a certain type of <strong>spear </strong>phishing   </li><li>Vote from Home Ballots – if you know someone's mailing address and last name... you can change their vote. Print it out, mail it in and change their vote. [24:20] </li></ul><p>We’ve been covering this <strong>Layered approach </strong>to the technology / security aspect, but you MUST have the user education aspect also if you want any hope in not being the next victim of cybercrime.  </p><ul><li><strong>Stupid Teaser [ 26:10]. </strong>What’s coming up next week. The next stupid thing we’re going to break down is your router!  What to do, what not to do, and why you may have a giant false sense of security going on. </li></ul><p> </p><ul><li><strong>Joe’s Key Takeaways [ 26:45]:</strong> Turn on two-factor authentication! Keep your eyes peeled for these spam emails, they are EVERYWHERE. Unless you have someone like us blocking spam and monitoring the security levels, then probably just don’t open your emails...  </li></ul><p> </p><ul><li><strong>Smart Call to Action [27:35]</strong>. We talk a lot about stupid (nothing bad ever happens to me; head in the sand; too busy; I’ll do it later). So, what’s smart? Taking this seriously TODAY. Book a 10-minute Discovery Call right now. I’ll ask some key questions and give you a quick score. If you’re doing everything right, you can sleep better at night. If there’s room for improvement, we’ll discuss options. NO PRESSURE, NO STRINGS. JUST BOOK THE DAMN CALL! </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 29 Oct 2020 14:50:46 -0500</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/fecc2d30/8faeb2bc.mp3" length="42473264" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>1767</itunes:duration>
      <itunes:summary>It will take 2 seconds but save you. </itunes:summary>
      <itunes:subtitle>It will take 2 seconds but save you. </itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>12. Bloatware Nightmare</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>12. Bloatware Nightmare</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7119bd9e-41bc-48a1-9902-7f300f693e63</guid>
      <link>https://share.transistor.fm/s/8542f5af</link>
      <description>
        <![CDATA[<p>IT Security Tip: REMOVE these from your laptop, tablet or smartphone</p><p> </p><p>Like it or not, device manufacturers LOVE to stuff your brand-new PC, tablet or phone full of “free” applications (they get paid to do it, so you’ve got a slim chance of getting one without a side of spamware). But clutter is the enemy of a speedy PC, and outdated apps are a breeding ground for hackers; so if you’re not using a particular software on a regular basis, it’s best to REMOVE it completely. That way you don’t have it sucking up processing speed AND leaving the door open to hackers and malware.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>IT Security Tip: REMOVE these from your laptop, tablet or smartphone</p><p> </p><p>Like it or not, device manufacturers LOVE to stuff your brand-new PC, tablet or phone full of “free” applications (they get paid to do it, so you’ve got a slim chance of getting one without a side of spamware). But clutter is the enemy of a speedy PC, and outdated apps are a breeding ground for hackers; so if you’re not using a particular software on a regular basis, it’s best to REMOVE it completely. That way you don’t have it sucking up processing speed AND leaving the door open to hackers and malware.</p>]]>
      </content:encoded>
      <pubDate>Wed, 14 Oct 2020 08:26:15 -0500</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/8542f5af/160b030c.mp3" length="46543251" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>1937</itunes:duration>
      <itunes:summary>Virtually every electronic device comes with "free" pre-installed software. Ask yourself one question: Why is anything free?</itunes:summary>
      <itunes:subtitle>Virtually every electronic device comes with "free" pre-installed software. Ask yourself one question: Why is anything free?</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>11. Fire Alarms and Bookmarks</title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>11. Fire Alarms and Bookmarks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">41fce529-6e3c-492f-9ce3-e5166849b6e4</guid>
      <link>https://share.transistor.fm/s/dd507093</link>
      <description>
        <![CDATA[<p><strong>Subscribe</strong><br><a href="https://open.spotify.com/episode/3enHHtztzCPaUumKhzW8u5?si=VOyz5PauSOeq4Z3RXo5TyQ">Spotify </a>| <a href="https://podcasts.apple.com/us/podcast/11-fire-alarms-and-bookmarks/id1519838743?i=1000492401015">Apple Podcasts</a> | <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy50cmFuc2lzdG9yLmZtL3N0dXBpZC1vci1qdXN0LWlycmVzcG9uc2libGU/episode/NDFmY2U1MjktNmUzYy00OTJmLTljZTMtZTUxNjY4NDliNmU0?sa=X&amp;ved=2ahUKEwiVntX9o6_sAhXNMs0KHQVMCrIQkfYCegQIARAF&amp;hl=en">Google Podcasts</a></p><p><strong>Resources<br></strong><a href="https://www.mastercomputing.com/discovery/">Book A 10-Minute Discovery Call <br></a><br>Backup Plan #1 - Use this FREE tool at www.virustotal.com </p><p><strong>IT Security Tip<br></strong>Here’s a sneaky trick used by many hackers: they purchase and set up a fraudulent website that is a close misspelling of a legitimate one. Example: www.faceboook.com (extra “o”) or www.dropbox.net (instead of .com). All you have to do is accidentally fat-finger ONE letter in the URL and up pops a very legitimate-looking fake copy of the site you were trying to get to – and the login and links are full of keylogger malware and virus landmines waiting for you to click on them. This is particularly important for any social networks you belong to.</p><p><br>Two Tips: One, bookmark key sites you frequently visit. But even better, have us install a web gateway security product that BLOCKS sites that are suspicious and fraudulent. That way, even if you click on a link to a phishing site, get directed to an infected site or accidentally type in the wrong URL, the site will be blocked, protecting you and your employees.</p><p><strong>Show Notes</strong> </p><p>[2:00] - We are going out of order today. Rather than end with our offer, we are going to start with it. The reason is, I feel like over the last couple episodes I’ve gone soft...  </p><p>Justin asks Joe some questions: </p><ul><li>What’s the title of this podcast?  </li><li>Do you remember why we name it Stupid or Irresponsible? </li></ul><p><br></p><ul><li>[3:35] - When I decided to call the podcast “Stupid or Irresponsible” I did it on purpose. To be inflammatory with the topic. I wanted to get people's attention, because this is one of those things we CAN’T take lightly.  We can’t just sit around and hope we don’t get hit with ransomware, hope we don’t get hacked by criminals in China and Russia.  </li></ul><p><br></p><ul><li>[5:10] - Here’s what’s stupid: Putting fire alarms in your house AFTER having a fire. The most frequent sales of fire alarms are after people had a fire. </li><li>When we are selling cybersecurity services, unless someone has had some sort of a cyber security event, they are very unlikely to buy...   </li></ul><p>[5:25] - What's STUPID is waiting for the event to happen and then taking preventive measure to prevent the event that just happened.  </p><p>[9:50] - If something doesn’t cause emotional response in us, we don’t take action. So yes, listeners, we are trying to scare you but trying to scare you in a way that will PREVENT something that is catastrophic. </p><p><br>[11:10] - When I started this off, we are going in a little reverse order, before we even dig into our topic today, we are going to talk about this offer for a free Security Assessment.  </p><p><br>How do I get my FREE Business Security Assessment?    </p><ul><li>Book a 10-Discovery call – jump on the phone, spend 10 minutes with Justin Shelley, CEO of Master Computing.  </li></ul><p>During this assessment, I will ask you some very <em>key questions</em>, and in just 10-minutes I can tell you what we need to do... A roadmap to success. 100% free.  </p><ul><li>What is a Key Question I will ask you in this Discovery Call? <ul><li>One of the very first questions I ask is if you are doing a regular consistent end-user education? Are your employees constantly going through some sort of cyber security program, and if they are, who is running it? When was the last time you went through an employee training program?  </li></ul></li></ul><p>Go to <a href="http://www.mastercomputing.com/discovery">www.mastercomputing.com/discovery</a> and book a 10-minute call before it’s too late! </p><p><br>[13:00] - Justin give Joe a POP QUIZ:</p><ul><li>How much does this Security Assessment I offer cost?  </li><li>How many strings are attached?  </li><li>Will we try to sell you something you don’t need? </li><li>Does anyone ever complain about me, Justin, being a high-pressure salesperson? </li></ul><p> </p><p>[32:55] - What is stupid: Buying a fire alarm after your house is burned down. Guys don’t wait. Please do not wait until you’ve been breached, hit with ransomware, until your business is vaporized. Because a lot of businesses aren't coming back from these attacks. They’re brutal. </p><p><br>A few simple measures. We can provide a roadmap that can <strong>protect you from 97% of this stuff. </strong> </p><ul><li>Take 10-minutes go to <a href="http://www.mastercomputing.com/discovery">www.mastercomputing.com/discovery</a> we’ll write a <strong>custom plan </strong>for you and we will help you put it into place if you’d like.  </li></ul><p> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Subscribe</strong><br><a href="https://open.spotify.com/episode/3enHHtztzCPaUumKhzW8u5?si=VOyz5PauSOeq4Z3RXo5TyQ">Spotify </a>| <a href="https://podcasts.apple.com/us/podcast/11-fire-alarms-and-bookmarks/id1519838743?i=1000492401015">Apple Podcasts</a> | <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy50cmFuc2lzdG9yLmZtL3N0dXBpZC1vci1qdXN0LWlycmVzcG9uc2libGU/episode/NDFmY2U1MjktNmUzYy00OTJmLTljZTMtZTUxNjY4NDliNmU0?sa=X&amp;ved=2ahUKEwiVntX9o6_sAhXNMs0KHQVMCrIQkfYCegQIARAF&amp;hl=en">Google Podcasts</a></p><p><strong>Resources<br></strong><a href="https://www.mastercomputing.com/discovery/">Book A 10-Minute Discovery Call <br></a><br>Backup Plan #1 - Use this FREE tool at www.virustotal.com </p><p><strong>IT Security Tip<br></strong>Here’s a sneaky trick used by many hackers: they purchase and set up a fraudulent website that is a close misspelling of a legitimate one. Example: www.faceboook.com (extra “o”) or www.dropbox.net (instead of .com). All you have to do is accidentally fat-finger ONE letter in the URL and up pops a very legitimate-looking fake copy of the site you were trying to get to – and the login and links are full of keylogger malware and virus landmines waiting for you to click on them. This is particularly important for any social networks you belong to.</p><p><br>Two Tips: One, bookmark key sites you frequently visit. But even better, have us install a web gateway security product that BLOCKS sites that are suspicious and fraudulent. That way, even if you click on a link to a phishing site, get directed to an infected site or accidentally type in the wrong URL, the site will be blocked, protecting you and your employees.</p><p><strong>Show Notes</strong> </p><p>[2:00] - We are going out of order today. Rather than end with our offer, we are going to start with it. The reason is, I feel like over the last couple episodes I’ve gone soft...  </p><p>Justin asks Joe some questions: </p><ul><li>What’s the title of this podcast?  </li><li>Do you remember why we name it Stupid or Irresponsible? </li></ul><p><br></p><ul><li>[3:35] - When I decided to call the podcast “Stupid or Irresponsible” I did it on purpose. To be inflammatory with the topic. I wanted to get people's attention, because this is one of those things we CAN’T take lightly.  We can’t just sit around and hope we don’t get hit with ransomware, hope we don’t get hacked by criminals in China and Russia.  </li></ul><p><br></p><ul><li>[5:10] - Here’s what’s stupid: Putting fire alarms in your house AFTER having a fire. The most frequent sales of fire alarms are after people had a fire. </li><li>When we are selling cybersecurity services, unless someone has had some sort of a cyber security event, they are very unlikely to buy...   </li></ul><p>[5:25] - What's STUPID is waiting for the event to happen and then taking preventive measure to prevent the event that just happened.  </p><p>[9:50] - If something doesn’t cause emotional response in us, we don’t take action. So yes, listeners, we are trying to scare you but trying to scare you in a way that will PREVENT something that is catastrophic. </p><p><br>[11:10] - When I started this off, we are going in a little reverse order, before we even dig into our topic today, we are going to talk about this offer for a free Security Assessment.  </p><p><br>How do I get my FREE Business Security Assessment?    </p><ul><li>Book a 10-Discovery call – jump on the phone, spend 10 minutes with Justin Shelley, CEO of Master Computing.  </li></ul><p>During this assessment, I will ask you some very <em>key questions</em>, and in just 10-minutes I can tell you what we need to do... A roadmap to success. 100% free.  </p><ul><li>What is a Key Question I will ask you in this Discovery Call? <ul><li>One of the very first questions I ask is if you are doing a regular consistent end-user education? Are your employees constantly going through some sort of cyber security program, and if they are, who is running it? When was the last time you went through an employee training program?  </li></ul></li></ul><p>Go to <a href="http://www.mastercomputing.com/discovery">www.mastercomputing.com/discovery</a> and book a 10-minute call before it’s too late! </p><p><br>[13:00] - Justin give Joe a POP QUIZ:</p><ul><li>How much does this Security Assessment I offer cost?  </li><li>How many strings are attached?  </li><li>Will we try to sell you something you don’t need? </li><li>Does anyone ever complain about me, Justin, being a high-pressure salesperson? </li></ul><p> </p><p>[32:55] - What is stupid: Buying a fire alarm after your house is burned down. Guys don’t wait. Please do not wait until you’ve been breached, hit with ransomware, until your business is vaporized. Because a lot of businesses aren't coming back from these attacks. They’re brutal. </p><p><br>A few simple measures. We can provide a roadmap that can <strong>protect you from 97% of this stuff. </strong> </p><ul><li>Take 10-minutes go to <a href="http://www.mastercomputing.com/discovery">www.mastercomputing.com/discovery</a> we’ll write a <strong>custom plan </strong>for you and we will help you put it into place if you’d like.  </li></ul><p> </p>]]>
      </content:encoded>
      <pubDate>Thu, 24 Sep 2020 11:18:24 -0500</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/dd507093/af15ced8.mp3" length="49081304" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>2043</itunes:duration>
      <itunes:summary>IT Security Tip: Bookmark the LEGITIMATE websites you frequently visit</itunes:summary>
      <itunes:subtitle>IT Security Tip: Bookmark the LEGITIMATE websites you frequently visit</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>10. What is the Dark Web?</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>10. What is the Dark Web?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5e0f0cca-76a8-4e79-91bc-bda43145301d</guid>
      <link>https://share.transistor.fm/s/bd15f248</link>
      <description>
        <![CDATA[<p><strong>Subscribe</strong></p><p><a href="https://podcasts.apple.com/us/podcast/10-what-is-the-dark-web/id1519838743"><strong>Apple</strong></a><strong> | </strong><a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy50cmFuc2lzdG9yLmZtL3N0dXBpZC1vci1qdXN0LWlycmVzcG9uc2libGU/episode/NWUwZjBjY2EtNzZhOC00ZTc5LTkxYmMtYmRhNDMxNDUzMDFk?hl=en&amp;ved=2ahUKEwjr55CYodDrAhUOVa0KHT5sCdgQieUEegQIDBAF&amp;ep=6"><strong>Google</strong></a><strong> | </strong><a href="https://open.spotify.com/episode/6Y4wmfRR4JsaAcpZEAsorq?si=3rC1h9UXQ3-bTi0rcgiYWw"><strong>Spotify </strong></a></p><p>The “Dark Web” or “Deep Web” is a part of the World Wide Web we know and love that is ONLY accessible via a special software that allows users and website operators to remain completely anonymous and untraceable. That’s why it’s the playground for hackers and cybercriminals.</p><p><br>Because hacking IS a for-profit business, there are criminal entities who steal, combine and sell personal information on the Dark Web, like passwords, social security numbers, bank account information and credit cards. There is a VERY HIGH probability YOUR information is being sold on the Dark Web – so how do you know?</p><p><br>Call us for a free Dark Web scan for your organization. You can also have us monitor the Dark Web so that when the login credentials for someone on your team are “for sale,” we can notify you so you can immediately change your password and avoid a breach. Also, be careful going to various sites OFFERING a free Dark Web scan. Many are scams designed to get your e-mail and potentially verify that your password is correct, where it’s active, etc.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Subscribe</strong></p><p><a href="https://podcasts.apple.com/us/podcast/10-what-is-the-dark-web/id1519838743"><strong>Apple</strong></a><strong> | </strong><a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy50cmFuc2lzdG9yLmZtL3N0dXBpZC1vci1qdXN0LWlycmVzcG9uc2libGU/episode/NWUwZjBjY2EtNzZhOC00ZTc5LTkxYmMtYmRhNDMxNDUzMDFk?hl=en&amp;ved=2ahUKEwjr55CYodDrAhUOVa0KHT5sCdgQieUEegQIDBAF&amp;ep=6"><strong>Google</strong></a><strong> | </strong><a href="https://open.spotify.com/episode/6Y4wmfRR4JsaAcpZEAsorq?si=3rC1h9UXQ3-bTi0rcgiYWw"><strong>Spotify </strong></a></p><p>The “Dark Web” or “Deep Web” is a part of the World Wide Web we know and love that is ONLY accessible via a special software that allows users and website operators to remain completely anonymous and untraceable. That’s why it’s the playground for hackers and cybercriminals.</p><p><br>Because hacking IS a for-profit business, there are criminal entities who steal, combine and sell personal information on the Dark Web, like passwords, social security numbers, bank account information and credit cards. There is a VERY HIGH probability YOUR information is being sold on the Dark Web – so how do you know?</p><p><br>Call us for a free Dark Web scan for your organization. You can also have us monitor the Dark Web so that when the login credentials for someone on your team are “for sale,” we can notify you so you can immediately change your password and avoid a breach. Also, be careful going to various sites OFFERING a free Dark Web scan. Many are scams designed to get your e-mail and potentially verify that your password is correct, where it’s active, etc.</p>]]>
      </content:encoded>
      <pubDate>Tue, 18 Aug 2020 17:04:03 -0500</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/bd15f248/e4e79df1.mp3" length="45105551" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>1877</itunes:duration>
      <itunes:summary>IT Security Tip: What is the “Dark Web” anyway?</itunes:summary>
      <itunes:subtitle>IT Security Tip: What is the “Dark Web” anyway?</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>9. Phishing For Dummies</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>9. Phishing For Dummies</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">96476c69-67a8-4bf6-b6b5-d53b5b5489ee</guid>
      <link>https://share.transistor.fm/s/114c1ffd</link>
      <description>
        <![CDATA[<p><strong>Subscribe<br></strong><a href="https://open.spotify.com/episode/5Ve9uW1HtAcxoY145G5j7W?si=qeIKCTGgRU6yqNMd9U25pw">Spotify</a> | <a href="https://podcasts.apple.com/us/podcast/9-phishing-for-dummies/id1519838743?i=1000487846242">Apple Podcasts</a> | <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy50cmFuc2lzdG9yLmZtL3N0dXBpZC1vci1qdXN0LWlycmVzcG9uc2libGU/episode/OTY0NzZjNjktNjdhOC00YmY2LWI2YjUtZDUzYjViNTQ4OWVl?sa=X&amp;ved=0CAUQkfYCahcKEwjg0pvXp9XrAhUAAAAAHQAAAAAQDA&amp;hl=en">Google Podcasts</a></p><p>A phishing e-mail is a bogus e-mail that is carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a particular website or to click and download a virus.</p><p><br>Often these e-mails look 100% legitimate and show up in the form of a PDF (scanned document) or a UPS or FedEx tracking number, bank letter, Facebook alert, bank notification, etc. That’s what makes these so dangerous – they LOOK exactly like a legitimate e-mail. So, how can you tell a phishing e-mail from a legitimate one? Here are a few telltale signs…</p><p><br>First, hover over the URL in the e-mail (but DON’T CLICK!) to see the ACTUAL website you’ll be directed to. If there’s a mismatched or suspicious URL, delete the e-mail immediately. In fact, it’s a good practice to just go to the site direct (typing it into your browser) rather than clicking on the link to get to a particular site. Another telltale sign is poor grammar and spelling errors. Another warning sign is that the e-mail is asking you to “verify” or “validate” your login or asking for personal information. Why would your bank need you to verify your account number? They should already have that information. And finally, if the offer seems too good to be true, it probably is.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Subscribe<br></strong><a href="https://open.spotify.com/episode/5Ve9uW1HtAcxoY145G5j7W?si=qeIKCTGgRU6yqNMd9U25pw">Spotify</a> | <a href="https://podcasts.apple.com/us/podcast/9-phishing-for-dummies/id1519838743?i=1000487846242">Apple Podcasts</a> | <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy50cmFuc2lzdG9yLmZtL3N0dXBpZC1vci1qdXN0LWlycmVzcG9uc2libGU/episode/OTY0NzZjNjktNjdhOC00YmY2LWI2YjUtZDUzYjViNTQ4OWVl?sa=X&amp;ved=0CAUQkfYCahcKEwjg0pvXp9XrAhUAAAAAHQAAAAAQDA&amp;hl=en">Google Podcasts</a></p><p>A phishing e-mail is a bogus e-mail that is carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a particular website or to click and download a virus.</p><p><br>Often these e-mails look 100% legitimate and show up in the form of a PDF (scanned document) or a UPS or FedEx tracking number, bank letter, Facebook alert, bank notification, etc. That’s what makes these so dangerous – they LOOK exactly like a legitimate e-mail. So, how can you tell a phishing e-mail from a legitimate one? Here are a few telltale signs…</p><p><br>First, hover over the URL in the e-mail (but DON’T CLICK!) to see the ACTUAL website you’ll be directed to. If there’s a mismatched or suspicious URL, delete the e-mail immediately. In fact, it’s a good practice to just go to the site direct (typing it into your browser) rather than clicking on the link to get to a particular site. Another telltale sign is poor grammar and spelling errors. Another warning sign is that the e-mail is asking you to “verify” or “validate” your login or asking for personal information. Why would your bank need you to verify your account number? They should already have that information. And finally, if the offer seems too good to be true, it probably is.</p>]]>
      </content:encoded>
      <pubDate>Tue, 11 Aug 2020 17:26:30 -0500</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/114c1ffd/c1eab152.mp3" length="66672689" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>2776</itunes:duration>
      <itunes:summary>IT Security Tip: How to spot a phishing e-mail</itunes:summary>
      <itunes:subtitle>IT Security Tip: How to spot a phishing e-mail</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>8. How to Protect Against Ransomware</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>8. How to Protect Against Ransomware</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">67b290ed-86d1-4372-9d81-9293d395a356</guid>
      <link>https://share.transistor.fm/s/88a03b55</link>
      <description>
        <![CDATA[<p><a href="https://www.master-computing.com/discovery/">Schedule a 10-minute Discovery Call </a><br>Master Computing will work with your business to develop a strategy that will provide you with peace of mind and will allow you to concentrate on growing your business instead of stressing about cybersecurity and data protection. Just go to <a href="https://www.master-computing.com/discovery/">www.master-computing.com/discovery</a> and schedule your free consultation. </p><p><strong>Subscribe</strong></p><p><a href="https://podcasts.apple.com/us/podcast/8-how-to-protect-against-ransomware/id1519838743?i=1000487124409"><strong>Apple</strong></a><strong> | </strong><a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy50cmFuc2lzdG9yLmZtL3N0dXBpZC1vci1qdXN0LWlycmVzcG9uc2libGU/episode/NjdiMjkwZWQtODZkMS00MzcyLTlkODEtOTI5M2QzOTVhMzU2?sa=X&amp;ved=2ahUKEwiJtszesc3rAhVaU80KHRsdDUoQkfYCegQIARAF&amp;hl=en"><strong>Google</strong></a><strong> | </strong><a href="https://open.spotify.com/episode/25sSTDG2EoSRbOlaZuz44g?si=SmcP7OCDTom9p02aeOTBRQ"><strong>Spotify </strong></a></p><p>In today’s episode Justin and Joe get into ransomware. We’re on episode 8 of Stupid or Irresponsible and for 7 episodes now we have been breaking down ransomware. Last week’s episode we talked about the ransomware attack on Garmin Connect, this week we are talking about one that is a little bit older (not making headlines anymore) but still very much out there in the wild. <strong>WannaCry Ransomware</strong>. </p><p>In this episode we discuss...</p><ul><li>What NOT to do if you want any hope at protecting against ransomware.</li><li>The background story of this virus (P.S. this is almost as interesting as the actual exploit itself) </li><li>How ransomware works - paralyzing machines and demanding bitcoin ransom, WannaCry jumping from one machine to the next</li><li> and the 5 different stages of this malware spread </li><li>Why cybersecurity researchers named the worm "WannaCry"</li></ul><p><br></p><p>Not too long ago, the WannaCry ransomware attack was all over the news, infecting over 400,000 computers. The threat was fairly straightforward: Pay us or we’ll erase your files. </p><p> </p><p>Ransomware, like the WannaCry attack, works by encrypting your files to prevent you from using or accessing them. After your files are compromised, the hackers behind the attack then pop up a demand screen asking for payment within a set time frame (e.g., 72 hours, three days, etc.) in order to get the key to decrypt your files. WannaCry forced many business owners to lose data or pay up since there was no other way to decrypt the files – and many paid without getting their files back.</p><p><br>Obviously the best way to foil a ransomware attack is to be incredibly diligent about IT security; but with hundreds of thousands of new attacks being created daily, there are no guarantees that you won’t get infected. Therefore, it’s critical to maintain a full, daily backup of your data so you never have to pay the ransom – AND your backup needs to be a professional-grade backup that is impervious to ransomware since hackers write their attacks to infect BOTH your PC/server AND your backups. </p><p><br><strong>Show Notes:</strong></p><ul><li>5:00 - Joe tells the story of WannaCry Ransomware </li><li>5:50 - How did this worm get the name "WannaCry"?  </li><li>6:10 - The background story of this virus (listen - this is almost as interesting as the actual exploit itself!) </li><li>6:25 - How did this virus start? (Hint: your employees are your weakest security link!)</li><li>6:50 – <strong>The different stages of ransomware: </strong><ul><li>1. Initial access</li><li>2. Execution </li><li>3. Escalation </li><li>4. Defense evasion – hiding around from your antivirus  </li><li>5. Then the exploit, the impact</li></ul></li><li><strong>Stupid: </strong>When it comes to cyber security stupid is thinking you can DIY. Thinking you can protect your business from these hackers by yourself. <em>“Thinking you can do this yourself, that cyber security is a DIY type activity is flat stupid”</em> - (16:00)</li><li><strong>Irresponsible</strong>: Is trusting your IT company / cyber security firm WITHOUT VERIFYING. - (16:55)</li><li><strong>The DIY approach to security</strong> - we are going to talk about DIY first to make the point we are giving this formula NOT as a formula to do it yourself, but to rate your current support system. Then, if these things aren't happening you know you’ve got to do something different now! - (20:00)</li><li>20:17 – If you can't <em>easily </em>answer these questions about the things happening in your company YOU HAVE A PROBLEM!<ul><li>For example – Is your backup running? Are there test restores going on? </li></ul></li></ul><p><br></p><ul><li><strong>Top 9 ways to protect against ransomware: -</strong> (21:40)</li><li>#9 -<strong> Data Backup (test restore) </strong><ul><li>Have a solid backup  - this used to be #1 most important on the list and the get out of jail free card</li><li>Now a backup alone is NOT ENOUGH!</li></ul></li><li>#8 - Get a good, <strong>enterprise-grade firewall</strong>  <ul><li>Get a good firewall, that is current, up-to-date security subscriptions, somebody monitoring the firewall. <em>Get a good firewall make sure somebody's watching it.</em> </li></ul></li><li>#7 – <strong>Password Management</strong> in place  <ul><li>(Listen to Episode 1: The Stupid things people do with passwords) </li></ul></li><li>#6 - <strong>Policies and Procedures</strong><ul><li>If your IT company isn’t doing this for you and doesn't have this place then you’ve got some questions to ask! </li></ul></li><li>#5 - <strong>Two factor authentication (2FA)</strong> in place<ul><li>If your IT company isn’t annoying you to death, then they aren’t doing their job!  </li></ul></li><li>#4 -<strong> SOC 24/7/365</strong> </li><li>#3 – <strong>Behavior-based anti-malware</strong><ul><li>You have to have a behavior-based anti-malware in place, but all this does when it finds something suspicious is it raises an alert. Which goes back to our point that someone needs to be <em>watching </em>this, getting alerts all day every day!</li><li>Most businesses don’t have the <em>capacity </em>to do this on their own, both in <em>time </em>&amp; <em>expertise</em>.  </li><li><em>Generally, this is something that is outsourced.</em> </li></ul></li><li>#2 – <strong>End User Training</strong> <ul><li>This is the 2nd most important thing you can do, it is CRITICAL! (28:30)  </li><li>Things are changing every day. Something new is going on, something changed, hackers are getting smarter (28:30) </li><li>By training your end-users, employees, this creates a culture of awareness and gives them refresher.</li><li>Phishing simulated attack – we have a security piece that will send us a fake email that says click this link – when we do click on it, it locks our computer down and makes us take a training course </li><li><strong>If you don’t have that in place you have questions to ask your IT company guys </strong></li></ul></li><li>#1 - <strong>3rd Party Review</strong><ul><li>This is the NUMBER 1 thing you NEED to do that is absolutely <em>critical </em>to protecting your network. Have a 3rd party audit and extra set of eyes checking others work.<strong> </strong>(30:10) </li></ul></li></ul><p> </p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://www.master-computing.com/discovery/">Schedule a 10-minute Discovery Call </a><br>Master Computing will work with your business to develop a strategy that will provide you with peace of mind and will allow you to concentrate on growing your business instead of stressing about cybersecurity and data protection. Just go to <a href="https://www.master-computing.com/discovery/">www.master-computing.com/discovery</a> and schedule your free consultation. </p><p><strong>Subscribe</strong></p><p><a href="https://podcasts.apple.com/us/podcast/8-how-to-protect-against-ransomware/id1519838743?i=1000487124409"><strong>Apple</strong></a><strong> | </strong><a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy50cmFuc2lzdG9yLmZtL3N0dXBpZC1vci1qdXN0LWlycmVzcG9uc2libGU/episode/NjdiMjkwZWQtODZkMS00MzcyLTlkODEtOTI5M2QzOTVhMzU2?sa=X&amp;ved=2ahUKEwiJtszesc3rAhVaU80KHRsdDUoQkfYCegQIARAF&amp;hl=en"><strong>Google</strong></a><strong> | </strong><a href="https://open.spotify.com/episode/25sSTDG2EoSRbOlaZuz44g?si=SmcP7OCDTom9p02aeOTBRQ"><strong>Spotify </strong></a></p><p>In today’s episode Justin and Joe get into ransomware. We’re on episode 8 of Stupid or Irresponsible and for 7 episodes now we have been breaking down ransomware. Last week’s episode we talked about the ransomware attack on Garmin Connect, this week we are talking about one that is a little bit older (not making headlines anymore) but still very much out there in the wild. <strong>WannaCry Ransomware</strong>. </p><p>In this episode we discuss...</p><ul><li>What NOT to do if you want any hope at protecting against ransomware.</li><li>The background story of this virus (P.S. this is almost as interesting as the actual exploit itself) </li><li>How ransomware works - paralyzing machines and demanding bitcoin ransom, WannaCry jumping from one machine to the next</li><li> and the 5 different stages of this malware spread </li><li>Why cybersecurity researchers named the worm "WannaCry"</li></ul><p><br></p><p>Not too long ago, the WannaCry ransomware attack was all over the news, infecting over 400,000 computers. The threat was fairly straightforward: Pay us or we’ll erase your files. </p><p> </p><p>Ransomware, like the WannaCry attack, works by encrypting your files to prevent you from using or accessing them. After your files are compromised, the hackers behind the attack then pop up a demand screen asking for payment within a set time frame (e.g., 72 hours, three days, etc.) in order to get the key to decrypt your files. WannaCry forced many business owners to lose data or pay up since there was no other way to decrypt the files – and many paid without getting their files back.</p><p><br>Obviously the best way to foil a ransomware attack is to be incredibly diligent about IT security; but with hundreds of thousands of new attacks being created daily, there are no guarantees that you won’t get infected. Therefore, it’s critical to maintain a full, daily backup of your data so you never have to pay the ransom – AND your backup needs to be a professional-grade backup that is impervious to ransomware since hackers write their attacks to infect BOTH your PC/server AND your backups. </p><p><br><strong>Show Notes:</strong></p><ul><li>5:00 - Joe tells the story of WannaCry Ransomware </li><li>5:50 - How did this worm get the name "WannaCry"?  </li><li>6:10 - The background story of this virus (listen - this is almost as interesting as the actual exploit itself!) </li><li>6:25 - How did this virus start? (Hint: your employees are your weakest security link!)</li><li>6:50 – <strong>The different stages of ransomware: </strong><ul><li>1. Initial access</li><li>2. Execution </li><li>3. Escalation </li><li>4. Defense evasion – hiding around from your antivirus  </li><li>5. Then the exploit, the impact</li></ul></li><li><strong>Stupid: </strong>When it comes to cyber security stupid is thinking you can DIY. Thinking you can protect your business from these hackers by yourself. <em>“Thinking you can do this yourself, that cyber security is a DIY type activity is flat stupid”</em> - (16:00)</li><li><strong>Irresponsible</strong>: Is trusting your IT company / cyber security firm WITHOUT VERIFYING. - (16:55)</li><li><strong>The DIY approach to security</strong> - we are going to talk about DIY first to make the point we are giving this formula NOT as a formula to do it yourself, but to rate your current support system. Then, if these things aren't happening you know you’ve got to do something different now! - (20:00)</li><li>20:17 – If you can't <em>easily </em>answer these questions about the things happening in your company YOU HAVE A PROBLEM!<ul><li>For example – Is your backup running? Are there test restores going on? </li></ul></li></ul><p><br></p><ul><li><strong>Top 9 ways to protect against ransomware: -</strong> (21:40)</li><li>#9 -<strong> Data Backup (test restore) </strong><ul><li>Have a solid backup  - this used to be #1 most important on the list and the get out of jail free card</li><li>Now a backup alone is NOT ENOUGH!</li></ul></li><li>#8 - Get a good, <strong>enterprise-grade firewall</strong>  <ul><li>Get a good firewall, that is current, up-to-date security subscriptions, somebody monitoring the firewall. <em>Get a good firewall make sure somebody's watching it.</em> </li></ul></li><li>#7 – <strong>Password Management</strong> in place  <ul><li>(Listen to Episode 1: The Stupid things people do with passwords) </li></ul></li><li>#6 - <strong>Policies and Procedures</strong><ul><li>If your IT company isn’t doing this for you and doesn't have this place then you’ve got some questions to ask! </li></ul></li><li>#5 - <strong>Two factor authentication (2FA)</strong> in place<ul><li>If your IT company isn’t annoying you to death, then they aren’t doing their job!  </li></ul></li><li>#4 -<strong> SOC 24/7/365</strong> </li><li>#3 – <strong>Behavior-based anti-malware</strong><ul><li>You have to have a behavior-based anti-malware in place, but all this does when it finds something suspicious is it raises an alert. Which goes back to our point that someone needs to be <em>watching </em>this, getting alerts all day every day!</li><li>Most businesses don’t have the <em>capacity </em>to do this on their own, both in <em>time </em>&amp; <em>expertise</em>.  </li><li><em>Generally, this is something that is outsourced.</em> </li></ul></li><li>#2 – <strong>End User Training</strong> <ul><li>This is the 2nd most important thing you can do, it is CRITICAL! (28:30)  </li><li>Things are changing every day. Something new is going on, something changed, hackers are getting smarter (28:30) </li><li>By training your end-users, employees, this creates a culture of awareness and gives them refresher.</li><li>Phishing simulated attack – we have a security piece that will send us a fake email that says click this link – when we do click on it, it locks our computer down and makes us take a training course </li><li><strong>If you don’t have that in place you have questions to ask your IT company guys </strong></li></ul></li><li>#1 - <strong>3rd Party Review</strong><ul><li>This is the NUMBER 1 thing you NEED to do that is absolutely <em>critical </em>to protecting your network. Have a 3rd party audit and extra set of eyes checking others work.<strong> </strong>(30:10) </li></ul></li></ul><p> </p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 04 Aug 2020 17:03:04 -0500</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/88a03b55/928d7a16.mp3" length="50545466" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:image href="https://img.transistor.fm/KpXY114WuFJZ7CHAHxijWB68FzSACEYpViflpY-tlaQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzMxMTUwNC8x/NTk3MzY5NzY0LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>2104</itunes:duration>
      <itunes:summary>Stupid: trying to be your own cybersecurity expert. Irresponsible: trusting your IT person without a 3rd party audit. We'll give you the top 9 things to look for to know if you are properly protected!</itunes:summary>
      <itunes:subtitle>Stupid: trying to be your own cybersecurity expert. Irresponsible: trusting your IT person without a 3rd party audit. We'll give you the top 9 things to look for to know if you are properly protected!</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>7. Popups Cause Global Outage and Impact Millions</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>7. Popups Cause Global Outage and Impact Millions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bdfcf1dd-e1b2-4592-ae57-3a4eb845a8ca</guid>
      <link>https://share.transistor.fm/s/13a34494</link>
      <description>
        <![CDATA[<p><a href="https://www.master-computing.com/discovery/">Book A 10-Minute Discovery Call Today!<br></a><br><strong>Subscribe</strong><br><a href="https://open.spotify.com/episode/7F7ZPFgJd4773vK4McQs0B">Spotify</a> | <a href="https://podcasts.apple.com/us/podcast/7-popups-cause-global-outage-and-impact-millions/id1519838743">Apple Podcasts</a> | <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy50cmFuc2lzdG9yLmZtL3N0dXBpZC1vci1qdXN0LWlycmVzcG9uc2libGU/episode/YmRmY2YxZGQtZTFiMi00NTkyLWFlNTctM2E0ZWI4NDVhOGNh?sa=X&amp;ved=0CAUQkfYCahcKEwjIu_XHxPrrAhUAAAAAHQAAAAAQAw&amp;hl=en">Google Podcasts</a></p><p><strong>Show Notes: </strong> </p><p>In this episode we discuss... </p><ul><li>A confirmed WastedLocker Ransomware attack on <strong>Garmin Connect </strong> <strong>- </strong>A GPS software, they run GPS infrastructure for a whole lot of devices all around the world</li><li>We are going to reverse engineer this ransomware attack on <strong>Garmin Connect </strong>and tell you exactly what hope we have for preventing this! (5:10)  </li><li>Joe is going to break this down for us with inside info from a couple discrete cyber security forums that he’s in. (3:30) </li><li><strong>Disclaimer</strong>: Official word from Garmin was that they’re having a network outage, doing some emergency repairs, something like that - </li><li>By default, we are not inclined to talk about our dirty laundry nobody wants to do that. But the tragedy in the industry is that we don’t get to learn from other’s mistakes because it’s always so hidden.  </li><li>Listen as we reverse engineer this situation with insider information and find out what went wrong and what can we do, what could Garmin have done to prevent this.</li></ul><p>So that is the <strong>value </strong>for me in trying to reverse engineer this situation and find out <strong>what went wrong</strong>  </p><ul><li>What most people will say in a case like this is: “Well if Garmin is going to get breached, and they have all the resources in the world what hope do I have?” (<strong>4:30)</strong> </li></ul><p><strong>We are going to give you some hope</strong> – we are going to talk about what you can do... What COULD Garmin have done to have prevented this outage? (4:50)  </p><p><br></p><p><strong>ABOUT THIS RANSOMWARE ATTACK</strong> </p><ul><li><strong>Confirmed WastedLocker ransomware attack </strong>- the new fancy name for this strain of ransomware (10:25) </li><li>They engineered this software for Garmen – it was a personal, TARGETED attack. It was so targeted that they knew specifically what users they were targeting. (11:00) </li></ul><p>Why you should NEVER click on popups: </p><ul><li><strong>They knew specifically what users they were targeting </strong>- This particular hack is from clicking on a java script code (so a pop-up on a website) and they knew this particular user would go to this particular website pretty frequently and would possibly click on a popup. (11:10) </li></ul><p><strong>POP QUIZ: </strong>if you see an alert to update something what do you do? (12:30)  </p><p><strong>Ransomware In the U.S.-</strong> We have sanctions in the US against paying ransomware – we can’t pay the ransom to a foreign entity, specifically Russia, and SPECIFICALLY we cab't pay the ransom to this guy - (hint: he created Evil-Corp)  </p><p><strong>BACKUPS: why the normal restore from backups does not cut it anymore</strong>. (19:00) </p><ul><li>What you normally do is restore from backups, but this was intelligent enough to get in and wipe out their backups too (19:00) </li><li>Cool thing about backups, if you are doing it right there are other, additional preventative measures that could have prevented this attack.... </li></ul><p>How offline backups could have PREVENTED this attack: (19:15) </p><ul><li>Offline backups – this is an additional preventative measure that we take here at Master Computing and therefore this would NOT have affected us or our clients. Because we keep offline backups for them.  </li></ul><p><strong>TIPS After Breaking Down This Attack:  (20:30)</strong> </p><ol><li>Don’t do updates that are pushed to you – go to the website/app directly and do it from there – initiate it yourself. </li><li>It starts with the site that they clicked on – so, make sure you have security on your website and someone looking out for these things.  </li><li>When you are hiring an IT firm to do your security – you may not want to go to the cheapest bidder - (23:55)   </li><li>Communication is KEY for the IT security world.  </li></ol><p>To the theme of our podcast - </p>When you get breached, are they going to call YOU the victim stupid or irresponsible? The reality is they are calling you one of these two, they are coming after you either way. So how do we deal with it?  <p><br></p><p><strong>So how do we deal with it? (26:55) </strong> </p><ul><li>Put a plan in place,  </li><li>Follow industry standards,  </li><li>Follow best practices, </li><li>If you do this, then you’ve got to know what they are and stay up to date on them.  </li></ul><p>“We can't do the head in the sand approach; this attack was PREVENTABLE” </p><ul><li>This attack was preventable – with the right software, it was PREVENTABLE – So, get a plan in place, check your plan on a regular basis  and for the love of all things,<strong> get someone else to check your plan.</strong> </li><li><strong>You CANNOT ASSUME that even if you hire the best IT company / Cyber security company out there that they know what they’re doing. You better get somebody to check their work.  </strong></li><li>At a <strong>minimum </strong>get someone to come in to look at what you're doing for security, your plan, your approach to protect your network, your customers, your employees.  </li></ul><p>Go to <a href="http://www.master-computing.com/discovery">www.master-computing.com/discovery</a> book a 10-minute call with me, Justin Shelley, and we will break it down and show you where the glaring holes in your security are, then give you a road map for success. (28:10) </p><p> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://www.master-computing.com/discovery/">Book A 10-Minute Discovery Call Today!<br></a><br><strong>Subscribe</strong><br><a href="https://open.spotify.com/episode/7F7ZPFgJd4773vK4McQs0B">Spotify</a> | <a href="https://podcasts.apple.com/us/podcast/7-popups-cause-global-outage-and-impact-millions/id1519838743">Apple Podcasts</a> | <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy50cmFuc2lzdG9yLmZtL3N0dXBpZC1vci1qdXN0LWlycmVzcG9uc2libGU/episode/YmRmY2YxZGQtZTFiMi00NTkyLWFlNTctM2E0ZWI4NDVhOGNh?sa=X&amp;ved=0CAUQkfYCahcKEwjIu_XHxPrrAhUAAAAAHQAAAAAQAw&amp;hl=en">Google Podcasts</a></p><p><strong>Show Notes: </strong> </p><p>In this episode we discuss... </p><ul><li>A confirmed WastedLocker Ransomware attack on <strong>Garmin Connect </strong> <strong>- </strong>A GPS software, they run GPS infrastructure for a whole lot of devices all around the world</li><li>We are going to reverse engineer this ransomware attack on <strong>Garmin Connect </strong>and tell you exactly what hope we have for preventing this! (5:10)  </li><li>Joe is going to break this down for us with inside info from a couple discrete cyber security forums that he’s in. (3:30) </li><li><strong>Disclaimer</strong>: Official word from Garmin was that they’re having a network outage, doing some emergency repairs, something like that - </li><li>By default, we are not inclined to talk about our dirty laundry nobody wants to do that. But the tragedy in the industry is that we don’t get to learn from other’s mistakes because it’s always so hidden.  </li><li>Listen as we reverse engineer this situation with insider information and find out what went wrong and what can we do, what could Garmin have done to prevent this.</li></ul><p>So that is the <strong>value </strong>for me in trying to reverse engineer this situation and find out <strong>what went wrong</strong>  </p><ul><li>What most people will say in a case like this is: “Well if Garmin is going to get breached, and they have all the resources in the world what hope do I have?” (<strong>4:30)</strong> </li></ul><p><strong>We are going to give you some hope</strong> – we are going to talk about what you can do... What COULD Garmin have done to have prevented this outage? (4:50)  </p><p><br></p><p><strong>ABOUT THIS RANSOMWARE ATTACK</strong> </p><ul><li><strong>Confirmed WastedLocker ransomware attack </strong>- the new fancy name for this strain of ransomware (10:25) </li><li>They engineered this software for Garmen – it was a personal, TARGETED attack. It was so targeted that they knew specifically what users they were targeting. (11:00) </li></ul><p>Why you should NEVER click on popups: </p><ul><li><strong>They knew specifically what users they were targeting </strong>- This particular hack is from clicking on a java script code (so a pop-up on a website) and they knew this particular user would go to this particular website pretty frequently and would possibly click on a popup. (11:10) </li></ul><p><strong>POP QUIZ: </strong>if you see an alert to update something what do you do? (12:30)  </p><p><strong>Ransomware In the U.S.-</strong> We have sanctions in the US against paying ransomware – we can’t pay the ransom to a foreign entity, specifically Russia, and SPECIFICALLY we cab't pay the ransom to this guy - (hint: he created Evil-Corp)  </p><p><strong>BACKUPS: why the normal restore from backups does not cut it anymore</strong>. (19:00) </p><ul><li>What you normally do is restore from backups, but this was intelligent enough to get in and wipe out their backups too (19:00) </li><li>Cool thing about backups, if you are doing it right there are other, additional preventative measures that could have prevented this attack.... </li></ul><p>How offline backups could have PREVENTED this attack: (19:15) </p><ul><li>Offline backups – this is an additional preventative measure that we take here at Master Computing and therefore this would NOT have affected us or our clients. Because we keep offline backups for them.  </li></ul><p><strong>TIPS After Breaking Down This Attack:  (20:30)</strong> </p><ol><li>Don’t do updates that are pushed to you – go to the website/app directly and do it from there – initiate it yourself. </li><li>It starts with the site that they clicked on – so, make sure you have security on your website and someone looking out for these things.  </li><li>When you are hiring an IT firm to do your security – you may not want to go to the cheapest bidder - (23:55)   </li><li>Communication is KEY for the IT security world.  </li></ol><p>To the theme of our podcast - </p>When you get breached, are they going to call YOU the victim stupid or irresponsible? The reality is they are calling you one of these two, they are coming after you either way. So how do we deal with it?  <p><br></p><p><strong>So how do we deal with it? (26:55) </strong> </p><ul><li>Put a plan in place,  </li><li>Follow industry standards,  </li><li>Follow best practices, </li><li>If you do this, then you’ve got to know what they are and stay up to date on them.  </li></ul><p>“We can't do the head in the sand approach; this attack was PREVENTABLE” </p><ul><li>This attack was preventable – with the right software, it was PREVENTABLE – So, get a plan in place, check your plan on a regular basis  and for the love of all things,<strong> get someone else to check your plan.</strong> </li><li><strong>You CANNOT ASSUME that even if you hire the best IT company / Cyber security company out there that they know what they’re doing. You better get somebody to check their work.  </strong></li><li>At a <strong>minimum </strong>get someone to come in to look at what you're doing for security, your plan, your approach to protect your network, your customers, your employees.  </li></ul><p>Go to <a href="http://www.master-computing.com/discovery">www.master-computing.com/discovery</a> book a 10-minute call with me, Justin Shelley, and we will break it down and show you where the glaring holes in your security are, then give you a road map for success. (28:10) </p><p> </p>]]>
      </content:encoded>
      <pubDate>Tue, 28 Jul 2020 16:58:34 -0500</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/13a34494/0c7af463.mp3" length="43253138" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>1800</itunes:duration>
      <itunes:summary>If large companies with seemingly unlimited resources still get hacked, what hope do the rest of us have? We'll tell you exactly what hope we have!</itunes:summary>
      <itunes:subtitle>If large companies with seemingly unlimited resources still get hacked, what hope do the rest of us have? We'll tell you exactly what hope we have!</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>6. 100% of Law Firms Targeted by Cyberattacks</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>6. 100% of Law Firms Targeted by Cyberattacks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f784a8b0-ed3b-4e45-bf1c-ffb0ec575ef6</guid>
      <link>https://share.transistor.fm/s/b1273cc0</link>
      <description>
        <![CDATA[<p><strong>Subscribe to Stupid or Irresponsible Podcast<br></strong><a href="https://open.spotify.com/episode/2GCCilwHJqKr1dtR579JGx">Spotify  </a>| <a href="https://podcasts.apple.com/us/podcast/stupid-or-just-irresponsible/id1519838743">Apple Podcasts</a> | <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy50cmFuc2lzdG9yLmZtL3N0dXBpZC1vci1qdXN0LWlycmVzcG9uc2libGU?ved=2ahUKEwiJ5t-swc3qAhUUOc0KHQ8fCNEQ4aUDegQIARAC&amp;hl=en">Google Podcasts </a></p><p><strong>Resources</strong>: <br>Go to <a href="http://www.master-computing.com/discovery">www.master-computing.com/discovery</a> and book a 10 minute call, and we will talk about this, we will create an action plan for you. </p><p><a href="https://event.webinarjam.com/register/1/oy11ksw">Join our FREE Security Webinar Here<br></a><br></p><p><strong>Show Notes</strong></p><p> </p><ul><li>Today’s episode we talk about this article by an info security magazine study.  In this study they show that 100% of law firms have been attacked or targeted between January - March of 2020. [2:30]</li></ul><p>You are probably thinking "100%? That is B.S." right? Listen now...</p><ul><li>In this study they are talking, specifically, about the Legal Industry is under attack. They make it sound like more so than anybody else. [3:40]</li><li><strong>We could do our own study and show that EVERYBODY is under attack 100% of the time </strong></li></ul><p><em>It is a matter of time before they get in,</em> that’s the bigger point here.</p><p> </p><p><strong>Interesting statistics from this study: </strong>[4:07]</p><ul><li><strong>15%</strong> of law firms were likely <strong>compromised</strong> (that’s a lot)</li><li>Nearly <strong>HALF</strong> <strong>of law firms</strong> had some other form of <strong>suspicious activity on their network.</strong></li></ul><p> <strong>Problem #1: </strong>The <strong>problem we face in security</strong> is that <strong>it is just</strong> <strong>rampant</strong>, the <strong>attacks</strong> <strong>are</strong> <strong>everywhere</strong>. They are <strong>automated</strong>. They are relatively <strong>easy to pull off</strong>. [5:58] </p><ul><li>“If I’m an amateur hacker and I want to break into your network what do I have to do? How hard is it? What is the learning curve on this?”[6:25]  </li></ul><p><br></p><p>[7:30] – <strong>Problem #2:</strong></p><p>“<strong>As a business owner</strong> (<em>theoretically say I do not own an IT company or have any experience in IT)</em>. Maybe I own a law firm and I am the managing partner of the Law firm. Maybe I’m the primary doctor or physician at a local clinic. Maybe I own an accounting firm. I am the guy, I started it, I filed all the paperwork and my specialty is in my craft…<strong> How do I prevent a cyber-attack, Joe? “<br></strong><br><strong>What to look for in IT support:</strong></p><ul><li> Businesses operate on some pretty slim margins. So, when I’m out <strong>looking for tech support</strong> and 3 people show up at my door saying hey, we can all do the same thing, <strong>how do I choose? </strong>[8:20]<strong> </strong></li></ul><p><strong>Point #1:</strong> I as a business owner of any industry outside the IT world, I DON'T KNOW HOW to pick a good IT company. </p><p><strong>Point #2: </strong>Just because I found a good IT company doesn’t necessarily mean I found somebody that knows anything about security. </p><p><br></p><strong>Cyber Security</strong> is more of a <strong>specialty</strong>. Whereas IT consultants are kind of generalist – think of your family physician.<p> </p><ul><li>“Like Joe said in the beginning, statistics could be made up, could be manipulated, BUT Every time I look at the statistics it’s about 20% of businesses get hacked.”</li><li>I’ve seen it a bunch of different ways, but...The reality is, <strong>if you play the odds long enough</strong>, the <strong>real likelihood of some sort of a breach </strong>is probably <strong>approaching that dreaded 100%</strong>.</li></ul><p><br></p>As a business owner, as a managing partner at a law firm, as the practice manager who is responsible for the clinic. <strong>When somebody gets hit, that falls on YOU. </strong><p><strong> </strong></p><p><em>"The problem here like I said in the beginning, I don’t know how to vet an IT company, and I sure as hell don’t know how to vet a cyber security firm." [13:07]</em></p><p><em> </em></p><p>[13:25] – Let’s say, we <strong>hired this firm to come and protect our company. </strong>If we were going to make sure they were doing their job properly,<strong> what should we be looking for? </strong></p><ul><li><strong>How do you vet an IT company if you don’t know anything about IT?</strong> </li></ul><p>[14:00] - So let’s give them a formula<strong>:</strong></p><ul><li>NOTE:<strong> If you try to implement this yourself, that is flat stupid. Because you can’t. It is like me trying to do heart surgery myself. Please for the love of god don’t do that. </strong></li></ul><p>The reason that we are going to lay this out is so you the listener can understand or hold your guy accountable because we don’t know how to pick them. We don’t know how to vet them, and we sure as hell don’t know how to hold them accountable. What do we really know about holding these guys accountable? [14:25]</p><p> </p><p>[14:57] – Let’s go through a basic checklist of <strong>what should be happening behind the scenes to protect a company:</strong></p><p> </p><p>Starting at the top:</p><ul><li>We want to make sure they have strict <strong>policy</strong> on of use of company devices.</li><li><strong>Procedures</strong> – have a document in place </li><li>Have some sort of regular <strong>training</strong> or education for employees for safest and best practices.</li><li><strong>Ongoing</strong> <strong>education</strong></li><li><strong>Letting the client know</strong> if information has been compromised <strong>immediately.</strong></li><li>You SHOULD <strong>have an incident response plan</strong> for if and WHEN you get hit. What are the proper procedures? </li><li>Constantly <strong>updating security</strong> and <strong>hiring digital security firm</strong> if needed. </li><li>Like we mentioned earlier, if you have an IT guy that’s great, but you <strong>NEED</strong> <strong>a</strong> <strong>s</strong><strong><em>ecurity</em></strong><strong> guy. </strong></li></ul><p>You have got to have somebody or some entity that is looking out for security, that stays in on this, that is just living and breathing network security all the time. Like us!</p><ul><li>If you were to be <strong>compromised</strong>: 1. There should be a <strong><em>policy</em></strong> and 2. It should be <strong><em>enforced</em></strong><em>. [18:05]</em></li></ul><p> </p><p>We’ve got policies, procedures, ongoing training, what are some other things that might be maybe <strong>more on the technical side? </strong>[20:00] </p><p> </p><p><strong>Quick point about Two Factor Authentication:</strong></p><ul><li>If your IT guy if your security guy isn’t talking to you and beating you up over Two Factor Authentication (2FA) then you probably better find a new one!</li></ul><p> </p><p>[20:40] <strong>– Here is a great litmus test</strong>: If you aren’t annoyed as hell at your IT company for all the security stuff and hoops you are jumping through…you better find a different one!</p><p> </p><p>[21:45] – Justin’s sign off:</p><ul><li>The stupid answer here is to not be prepared. To not be paying attention to this. To thinking that you are invulnerable. </li><li><strong>To think that this isn’t going to happen ...</strong></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Subscribe to Stupid or Irresponsible Podcast<br></strong><a href="https://open.spotify.com/episode/2GCCilwHJqKr1dtR579JGx">Spotify  </a>| <a href="https://podcasts.apple.com/us/podcast/stupid-or-just-irresponsible/id1519838743">Apple Podcasts</a> | <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy50cmFuc2lzdG9yLmZtL3N0dXBpZC1vci1qdXN0LWlycmVzcG9uc2libGU?ved=2ahUKEwiJ5t-swc3qAhUUOc0KHQ8fCNEQ4aUDegQIARAC&amp;hl=en">Google Podcasts </a></p><p><strong>Resources</strong>: <br>Go to <a href="http://www.master-computing.com/discovery">www.master-computing.com/discovery</a> and book a 10 minute call, and we will talk about this, we will create an action plan for you. </p><p><a href="https://event.webinarjam.com/register/1/oy11ksw">Join our FREE Security Webinar Here<br></a><br></p><p><strong>Show Notes</strong></p><p> </p><ul><li>Today’s episode we talk about this article by an info security magazine study.  In this study they show that 100% of law firms have been attacked or targeted between January - March of 2020. [2:30]</li></ul><p>You are probably thinking "100%? That is B.S." right? Listen now...</p><ul><li>In this study they are talking, specifically, about the Legal Industry is under attack. They make it sound like more so than anybody else. [3:40]</li><li><strong>We could do our own study and show that EVERYBODY is under attack 100% of the time </strong></li></ul><p><em>It is a matter of time before they get in,</em> that’s the bigger point here.</p><p> </p><p><strong>Interesting statistics from this study: </strong>[4:07]</p><ul><li><strong>15%</strong> of law firms were likely <strong>compromised</strong> (that’s a lot)</li><li>Nearly <strong>HALF</strong> <strong>of law firms</strong> had some other form of <strong>suspicious activity on their network.</strong></li></ul><p> <strong>Problem #1: </strong>The <strong>problem we face in security</strong> is that <strong>it is just</strong> <strong>rampant</strong>, the <strong>attacks</strong> <strong>are</strong> <strong>everywhere</strong>. They are <strong>automated</strong>. They are relatively <strong>easy to pull off</strong>. [5:58] </p><ul><li>“If I’m an amateur hacker and I want to break into your network what do I have to do? How hard is it? What is the learning curve on this?”[6:25]  </li></ul><p><br></p><p>[7:30] – <strong>Problem #2:</strong></p><p>“<strong>As a business owner</strong> (<em>theoretically say I do not own an IT company or have any experience in IT)</em>. Maybe I own a law firm and I am the managing partner of the Law firm. Maybe I’m the primary doctor or physician at a local clinic. Maybe I own an accounting firm. I am the guy, I started it, I filed all the paperwork and my specialty is in my craft…<strong> How do I prevent a cyber-attack, Joe? “<br></strong><br><strong>What to look for in IT support:</strong></p><ul><li> Businesses operate on some pretty slim margins. So, when I’m out <strong>looking for tech support</strong> and 3 people show up at my door saying hey, we can all do the same thing, <strong>how do I choose? </strong>[8:20]<strong> </strong></li></ul><p><strong>Point #1:</strong> I as a business owner of any industry outside the IT world, I DON'T KNOW HOW to pick a good IT company. </p><p><strong>Point #2: </strong>Just because I found a good IT company doesn’t necessarily mean I found somebody that knows anything about security. </p><p><br></p><strong>Cyber Security</strong> is more of a <strong>specialty</strong>. Whereas IT consultants are kind of generalist – think of your family physician.<p> </p><ul><li>“Like Joe said in the beginning, statistics could be made up, could be manipulated, BUT Every time I look at the statistics it’s about 20% of businesses get hacked.”</li><li>I’ve seen it a bunch of different ways, but...The reality is, <strong>if you play the odds long enough</strong>, the <strong>real likelihood of some sort of a breach </strong>is probably <strong>approaching that dreaded 100%</strong>.</li></ul><p><br></p>As a business owner, as a managing partner at a law firm, as the practice manager who is responsible for the clinic. <strong>When somebody gets hit, that falls on YOU. </strong><p><strong> </strong></p><p><em>"The problem here like I said in the beginning, I don’t know how to vet an IT company, and I sure as hell don’t know how to vet a cyber security firm." [13:07]</em></p><p><em> </em></p><p>[13:25] – Let’s say, we <strong>hired this firm to come and protect our company. </strong>If we were going to make sure they were doing their job properly,<strong> what should we be looking for? </strong></p><ul><li><strong>How do you vet an IT company if you don’t know anything about IT?</strong> </li></ul><p>[14:00] - So let’s give them a formula<strong>:</strong></p><ul><li>NOTE:<strong> If you try to implement this yourself, that is flat stupid. Because you can’t. It is like me trying to do heart surgery myself. Please for the love of god don’t do that. </strong></li></ul><p>The reason that we are going to lay this out is so you the listener can understand or hold your guy accountable because we don’t know how to pick them. We don’t know how to vet them, and we sure as hell don’t know how to hold them accountable. What do we really know about holding these guys accountable? [14:25]</p><p> </p><p>[14:57] – Let’s go through a basic checklist of <strong>what should be happening behind the scenes to protect a company:</strong></p><p> </p><p>Starting at the top:</p><ul><li>We want to make sure they have strict <strong>policy</strong> on of use of company devices.</li><li><strong>Procedures</strong> – have a document in place </li><li>Have some sort of regular <strong>training</strong> or education for employees for safest and best practices.</li><li><strong>Ongoing</strong> <strong>education</strong></li><li><strong>Letting the client know</strong> if information has been compromised <strong>immediately.</strong></li><li>You SHOULD <strong>have an incident response plan</strong> for if and WHEN you get hit. What are the proper procedures? </li><li>Constantly <strong>updating security</strong> and <strong>hiring digital security firm</strong> if needed. </li><li>Like we mentioned earlier, if you have an IT guy that’s great, but you <strong>NEED</strong> <strong>a</strong> <strong>s</strong><strong><em>ecurity</em></strong><strong> guy. </strong></li></ul><p>You have got to have somebody or some entity that is looking out for security, that stays in on this, that is just living and breathing network security all the time. Like us!</p><ul><li>If you were to be <strong>compromised</strong>: 1. There should be a <strong><em>policy</em></strong> and 2. It should be <strong><em>enforced</em></strong><em>. [18:05]</em></li></ul><p> </p><p>We’ve got policies, procedures, ongoing training, what are some other things that might be maybe <strong>more on the technical side? </strong>[20:00] </p><p> </p><p><strong>Quick point about Two Factor Authentication:</strong></p><ul><li>If your IT guy if your security guy isn’t talking to you and beating you up over Two Factor Authentication (2FA) then you probably better find a new one!</li></ul><p> </p><p>[20:40] <strong>– Here is a great litmus test</strong>: If you aren’t annoyed as hell at your IT company for all the security stuff and hoops you are jumping through…you better find a different one!</p><p> </p><p>[21:45] – Justin’s sign off:</p><ul><li>The stupid answer here is to not be prepared. To not be paying attention to this. To thinking that you are invulnerable. </li><li><strong>To think that this isn’t going to happen ...</strong></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 22 Jul 2020 14:18:09 -0500</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/b1273cc0/b1665a3f.mp3" length="35300928" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>1468</itunes:duration>
      <itunes:summary>100% of law firms were targeted by cyber-criminals in the first quarter of 2020. We never speak in absolutes. But this is an absolute. </itunes:summary>
      <itunes:subtitle>100% of law firms were targeted by cyber-criminals in the first quarter of 2020. We never speak in absolutes. But this is an absolute. </itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>5. Blindsided by the COVID</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>5. Blindsided by the COVID</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2ab53e7a-3f7d-4e01-b65e-07501c872a9f</guid>
      <link>https://share.transistor.fm/s/a4f86c34</link>
      <description>
        <![CDATA[<p>Episode 5 of Stupid or Irresponsible with Justin Shelley, CEO of Master Computing and Joe, CTO here at Master Computing. </p><p><strong>Subscribe to Stupid or Irresponsible Podcast<br></strong><a href="https://open.spotify.com/episode/0KtN5eMBpVx1JHyUwpQPzB?si=4aQX3ggdS0CPMZijXtuHhw">Spotify  </a>| <a href="https://podcasts.apple.com/us/podcast/5-blindsided-by-the-covid/id1519838743?i=1000480858891">Apple Podcasts</a> | <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy50cmFuc2lzdG9yLmZtL3N0dXBpZC1vci1qdXN0LWlycmVzcG9uc2libGU/episode/MmFiNTNlN2EtM2Y3ZC00ZTAxLWI2NWUtMDc1MDFjODcyYTlm?sa=X&amp;ved=2ahUKEwjY3aDUp9XrAhWOE80KHdc9AuQQkfYCegQIARAF&amp;hl=en">Google Podcasts<br></a><br></p><p><strong>Resources:<br>Please to take a second and go to: </strong><a href="http://www.master-computing.com/discovery"><strong>www.master-computing.com/discovery</strong></a><strong> and book a 10-Minute Call with me, Justin Shelley, and we will make sure that you guys are properly protected. We’ll make sure you have a plan in place. And that you will be able to sleep at night knowing that your company is safe, your data is safe, and your people are safe. </strong></p><p><strong>Show Notes:<br></strong><br></p><p>In previous episodes, we’ve broken down some dumb things we see people do. We’ve talked about dumb things we’ve done ourselves, we’re not immune to that. But this episode is a little different.  Today we are going to talk about working from home environments. (1:30) We’re going to break down the ramifications of this massive migration to a work from home environment</p><p>Here we are. Today as we record this it is June 30th, 2020 and it has been a hell of a year, am I wrong?</p><ul><li>"Initially when the COVID lock down hit everybody just did this mad dash to work from home… Our clients all wanted to work from home immediately, and many of them are still doing it." (1:40) </li><li>"Nobody saw this coming – so it’s not that we couldn’t have done a better job at pushing people into the home, working environment. It’s that there wasn’t <strong>TIME</strong>. And a lot of time there wasn’t <strong>resources</strong> – cameras for example you still can’t buy a webcam – not a good one." (2:33) </li><li>" We’re going to break down the ramifications of this massive migration to a work from home environment" (3:10)</li></ul><p>[3:20] - Talking about how they were attacked this morning</p><p><br></p><ul><li>We are a security company! It’s we eat, breath, and sleep this stuff. We’re always talking about it. We record podcasts on it, and listen… When we do this, we’re taking our own notes, improving our own security every day. At least every week we’re meeting about it, talking about it.</li></ul><p><strong>BUT we’re still potential victims to it… Even Master Computing, Managed Service Provider for many Medical Facilities. <br></strong><br></p><p><br></p><p><br>[6:35] - <strong>Step 1:</strong> What are the events that led up to this thing, what happened when it did Blue Screen, and is that something that we need to patch fix, repair?</p><ul><li><strong>Port Scanning</strong> – looking for holes and exploit vulnerabilities.</li><li><strong>Geo-blocking: </strong>We generally Geo-block meaning we can block separate countries with our firewall, we have an enterprise grade firewall that can block stuff from Russia, block stuff from the known perpetrators. [9:02]</li></ul><p><br></p><ul><li>So, I just wanted to point that out. And I wanted to publicly thank you, for <strong>taking this seriously </strong>and digging in and <strong>protecting</strong>, not only our network and our business but the <strong>work you do behind the scenes for our clients</strong>. So that, people can rest at night knowing that this has been taken care of" (11:00) </li></ul><p><br></p><p><br>[12:04] - <strong>DDoS: Stands for Distributed Denial-of-Services<br></strong><br></p><ul><li><strong>DDoS:</strong> When you have a large collection of computers (very large – that’s what makes it a DDoS vs just a DoS) a large number of computers that just try to ask your server or network questions – they just ask billion and billions of questions until your computer can not handle any more. There are vulnerabilities when something is at MAX capacities. </li><li><strong>Botnet Attack</strong>: a large collection of computers that are trying to just, you know, bug us. And trying to slam our systems. </li></ul><p><br>[14:30] – <strong>Vulnerabilities in your networks: </strong></p><ul><li>Turns out there WAS a vulnerability – call a <em>“zero-day patch”</em> – meaning it’s exploitable today, it’s known, and it’s out in the wild in production. This very well could be going on with Office 365. Any of your normal day-to-day applications. </li><li>"Any of your normal day-to-day applications. They could just throw a new update out on the web, expecting you to look at it. But, if you don’t and have no idea about it then you now become the most vulnerable target in the world just because of that. " (16:30)</li><li>You can definitely imagine that a freeware version – maybe Google Chrome, Firefox, any of those kinds of things. Keep your eyes open! </li></ul><p>[17:00] – <strong>The point is:</strong> We are an IT / Security Company. This is what we do night and day.  And STILL here we are, victims of at least an ATTEMPTED attack.  Did they get through, steal any information, did they breach our network? NO… WHY? Because Joe is a badass.  </p><p><br></p><p><br></p><p>[17:27] – <strong>Why you should invest in IT services: <br></strong><br>Justin: I’m just going to make this point really quick. I know technology to some extent, I own the company, I started off as a technician, I’ve got the background. I still don’t do my own IT work because I don’t have time. </p><ul><li>I cannot put the time, energy and focus into doing what you do Joe, because of all the distractions I have.</li><li>When I’m out talking to <strong>business owners who tell me they do their own IT</strong>… Guys THAT is <strong>stupid</strong>. </li><li>(17:50) - "You do not have the <strong>time</strong>, the <strong>ability</strong>, the <strong>experience</strong>, the day-to-day, in the trenches, <strong>knowledge</strong>. To be able to do this on your own. You just don’t!</li></ul><p><br>[18:05] – Example of an Attorney and why you CAN'T mess around when it comes to Security. The guy is $400/hr is his billing rate and he does his own IT work. That’s stupid. I’m sorry, that’s just flat stupid. </p><ul><li>(18:05) "What’s smart: hire us, hire somebody (like Joe!) who is always in the trenches, sleeves rolled up, preventing this kind of attack. </li><li>This could’ve been bad had it gotten through. It could’ve been life ending for the business if it weren't for Joe.</li></ul>When you’re invested in good IT security, you shouldn’t even know it’s there. It runs in the background like a quiet but powerful electric motor. It’s there when you need it, and it’s there when you’re not even thinking about it. <p> </p><p>[18:55] - We wanted to talk about this mad rush to work from home and the additional <strong>security challenges</strong> that were introduced to it. </p><p><br>[19:30] –Today  we’re leaning on an article that we read that supports this theory that is was not really the best move to push everybody to the work from home environment so quickly even though there wasn’t much of an option. But there was a company that did this and they were hit.. Financial management company </p><p><br></p><p><em>COVID hits, like everybody, there’s this massive rush to tell everybody to take your work home with you. </em></p><p><br>(21:05) – What happened to this comp...</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Episode 5 of Stupid or Irresponsible with Justin Shelley, CEO of Master Computing and Joe, CTO here at Master Computing. </p><p><strong>Subscribe to Stupid or Irresponsible Podcast<br></strong><a href="https://open.spotify.com/episode/0KtN5eMBpVx1JHyUwpQPzB?si=4aQX3ggdS0CPMZijXtuHhw">Spotify  </a>| <a href="https://podcasts.apple.com/us/podcast/5-blindsided-by-the-covid/id1519838743?i=1000480858891">Apple Podcasts</a> | <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy50cmFuc2lzdG9yLmZtL3N0dXBpZC1vci1qdXN0LWlycmVzcG9uc2libGU/episode/MmFiNTNlN2EtM2Y3ZC00ZTAxLWI2NWUtMDc1MDFjODcyYTlm?sa=X&amp;ved=2ahUKEwjY3aDUp9XrAhWOE80KHdc9AuQQkfYCegQIARAF&amp;hl=en">Google Podcasts<br></a><br></p><p><strong>Resources:<br>Please to take a second and go to: </strong><a href="http://www.master-computing.com/discovery"><strong>www.master-computing.com/discovery</strong></a><strong> and book a 10-Minute Call with me, Justin Shelley, and we will make sure that you guys are properly protected. We’ll make sure you have a plan in place. And that you will be able to sleep at night knowing that your company is safe, your data is safe, and your people are safe. </strong></p><p><strong>Show Notes:<br></strong><br></p><p>In previous episodes, we’ve broken down some dumb things we see people do. We’ve talked about dumb things we’ve done ourselves, we’re not immune to that. But this episode is a little different.  Today we are going to talk about working from home environments. (1:30) We’re going to break down the ramifications of this massive migration to a work from home environment</p><p>Here we are. Today as we record this it is June 30th, 2020 and it has been a hell of a year, am I wrong?</p><ul><li>"Initially when the COVID lock down hit everybody just did this mad dash to work from home… Our clients all wanted to work from home immediately, and many of them are still doing it." (1:40) </li><li>"Nobody saw this coming – so it’s not that we couldn’t have done a better job at pushing people into the home, working environment. It’s that there wasn’t <strong>TIME</strong>. And a lot of time there wasn’t <strong>resources</strong> – cameras for example you still can’t buy a webcam – not a good one." (2:33) </li><li>" We’re going to break down the ramifications of this massive migration to a work from home environment" (3:10)</li></ul><p>[3:20] - Talking about how they were attacked this morning</p><p><br></p><ul><li>We are a security company! It’s we eat, breath, and sleep this stuff. We’re always talking about it. We record podcasts on it, and listen… When we do this, we’re taking our own notes, improving our own security every day. At least every week we’re meeting about it, talking about it.</li></ul><p><strong>BUT we’re still potential victims to it… Even Master Computing, Managed Service Provider for many Medical Facilities. <br></strong><br></p><p><br></p><p><br>[6:35] - <strong>Step 1:</strong> What are the events that led up to this thing, what happened when it did Blue Screen, and is that something that we need to patch fix, repair?</p><ul><li><strong>Port Scanning</strong> – looking for holes and exploit vulnerabilities.</li><li><strong>Geo-blocking: </strong>We generally Geo-block meaning we can block separate countries with our firewall, we have an enterprise grade firewall that can block stuff from Russia, block stuff from the known perpetrators. [9:02]</li></ul><p><br></p><ul><li>So, I just wanted to point that out. And I wanted to publicly thank you, for <strong>taking this seriously </strong>and digging in and <strong>protecting</strong>, not only our network and our business but the <strong>work you do behind the scenes for our clients</strong>. So that, people can rest at night knowing that this has been taken care of" (11:00) </li></ul><p><br></p><p><br>[12:04] - <strong>DDoS: Stands for Distributed Denial-of-Services<br></strong><br></p><ul><li><strong>DDoS:</strong> When you have a large collection of computers (very large – that’s what makes it a DDoS vs just a DoS) a large number of computers that just try to ask your server or network questions – they just ask billion and billions of questions until your computer can not handle any more. There are vulnerabilities when something is at MAX capacities. </li><li><strong>Botnet Attack</strong>: a large collection of computers that are trying to just, you know, bug us. And trying to slam our systems. </li></ul><p><br>[14:30] – <strong>Vulnerabilities in your networks: </strong></p><ul><li>Turns out there WAS a vulnerability – call a <em>“zero-day patch”</em> – meaning it’s exploitable today, it’s known, and it’s out in the wild in production. This very well could be going on with Office 365. Any of your normal day-to-day applications. </li><li>"Any of your normal day-to-day applications. They could just throw a new update out on the web, expecting you to look at it. But, if you don’t and have no idea about it then you now become the most vulnerable target in the world just because of that. " (16:30)</li><li>You can definitely imagine that a freeware version – maybe Google Chrome, Firefox, any of those kinds of things. Keep your eyes open! </li></ul><p>[17:00] – <strong>The point is:</strong> We are an IT / Security Company. This is what we do night and day.  And STILL here we are, victims of at least an ATTEMPTED attack.  Did they get through, steal any information, did they breach our network? NO… WHY? Because Joe is a badass.  </p><p><br></p><p><br></p><p>[17:27] – <strong>Why you should invest in IT services: <br></strong><br>Justin: I’m just going to make this point really quick. I know technology to some extent, I own the company, I started off as a technician, I’ve got the background. I still don’t do my own IT work because I don’t have time. </p><ul><li>I cannot put the time, energy and focus into doing what you do Joe, because of all the distractions I have.</li><li>When I’m out talking to <strong>business owners who tell me they do their own IT</strong>… Guys THAT is <strong>stupid</strong>. </li><li>(17:50) - "You do not have the <strong>time</strong>, the <strong>ability</strong>, the <strong>experience</strong>, the day-to-day, in the trenches, <strong>knowledge</strong>. To be able to do this on your own. You just don’t!</li></ul><p><br>[18:05] – Example of an Attorney and why you CAN'T mess around when it comes to Security. The guy is $400/hr is his billing rate and he does his own IT work. That’s stupid. I’m sorry, that’s just flat stupid. </p><ul><li>(18:05) "What’s smart: hire us, hire somebody (like Joe!) who is always in the trenches, sleeves rolled up, preventing this kind of attack. </li><li>This could’ve been bad had it gotten through. It could’ve been life ending for the business if it weren't for Joe.</li></ul>When you’re invested in good IT security, you shouldn’t even know it’s there. It runs in the background like a quiet but powerful electric motor. It’s there when you need it, and it’s there when you’re not even thinking about it. <p> </p><p>[18:55] - We wanted to talk about this mad rush to work from home and the additional <strong>security challenges</strong> that were introduced to it. </p><p><br>[19:30] –Today  we’re leaning on an article that we read that supports this theory that is was not really the best move to push everybody to the work from home environment so quickly even though there wasn’t much of an option. But there was a company that did this and they were hit.. Financial management company </p><p><br></p><p><em>COVID hits, like everybody, there’s this massive rush to tell everybody to take your work home with you. </em></p><p><br>(21:05) – What happened to this comp...</p>]]>
      </content:encoded>
      <pubDate>Tue, 30 Jun 2020 17:30:00 -0500</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/a4f86c34/0b01f306.mp3" length="45626638" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>1899</itunes:duration>
      <itunes:summary>In a mad dash to work from home, security was largely overlooked. It's understandable when the world is falling apart, but it's time to step back and take a closer look at how you have exposed your organization to data breaches, hacking, and ransomware. Some have already learned the hard way. Don't let it happen to you!</itunes:summary>
      <itunes:subtitle>In a mad dash to work from home, security was largely overlooked. It's understandable when the world is falling apart, but it's time to step back and take a closer look at how you have exposed your organization to data breaches, hacking, and ransomware. S</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>Yes</itunes:explicit>
    </item>
    <item>
      <title>4. Your Bank is NOT Your Friend</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>4. Your Bank is NOT Your Friend</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3e5ec15a-7c1d-4216-9183-b5d8b97fb8c9</guid>
      <link>https://share.transistor.fm/s/f635f629</link>
      <description>
        <![CDATA[<p><strong>Stupid...or Just Irresponsible? | Episode 4: The Bank is NOT Your Friend</strong></p><p><br></p><p><br><strong>Subscribe to Stupid or Irresponsible Podcast<br></strong><a href="https://open.spotify.com/episode/2K25vSEeEESmpIgWDWaTHM?si=dexxhoVZRHepqzZJlqLECQ">Spotify  </a>| <a href="https://podcasts.apple.com/us/podcast/stupid-or-just-irresponsible/id1519838743">Apple Podcasts</a> | <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy50cmFuc2lzdG9yLmZtL3N0dXBpZC1vci1qdXN0LWlycmVzcG9uc2libGU?ved=2ahUKEwiJ5t-swc3qAhUUOc0KHQ8fCNEQ4aUDegQIARAC&amp;hl=en">Google Podcasts<br></a></p><p><strong>Resources</strong><br><a href="https://www.master-computing.com/live-webinars/">Security Webinar</a> -  Stay ahead of the game! Sign up for our Security Webinar today. We give you FREE tools, FREE training, and we WILL hold your hand throughout the process. BUT when you don’t take our help or our advice that is stupid.</p><p><a href="https://www.master-computing.com/discovery/">Schedule Your Discovery Call </a>- If you know you've got a problem take us up on this offer! Book a 10 minute call with myself (Justin Shelley) and we’ll go over what we can do to help, get you started on a path to have a solid plan in place, constantly reviewing that plan, and just making sure you are doing the right things to minimize ALL the risk we possibly can.<br> </p><p><strong>Show Notes</strong></p><p> </p><p>[1:50] – Justin shares what started his love affair with technology and how he is shocked to be spending most his time fighting crime...</p><ul><li>Justin’s love affair with Technology began at the rightful age of 12 with the Apple 2E </li></ul><p><br></p><p>[2:26] - “I got into computers at the rightful age of 12 but did not see myself fighting crime…”</p><p>[2:36] - But here we are… Master Computing is an IT company we really pride ourselves of fast response, on processes, on client education, but man we spend most our time fighting crime! Who knew!?</p><p>[2:59] The title of this podcast Stupid or irresponsible </p><ul><li>Title Background -  We send out the this letter called the “Stupid or Irresponsible” letter and people got offended or squeamish about calling someone Stupid.. So, they would play it down to sound less harsh. But the fact is, not taking basic security measures and educating yourselves, employees, then you are stupid. </li></ul><p><br></p><p>[3:50] - Justin came to this conclusion when making this title - If you don’t care enough about your business to care about your business to protect it from cyber crime, I can’t care about your business more than you do. SO, take the advice, take the tools we’re giving YOU, or don’t but if you don’t and you get hit... sorry YOU’RE STUPID. </p><p><br></p><p>[4:08] – Today we are going to talk about a <strong>BEC Attack</strong> that cost a very intelligent very established businessman $400,000 that he DID NOT RECOVER.</p><p>[4:20] – What's a BEC Attack?</p><ul><li>BEC Attack – Business email compromise attack:<ul><li>It’s when someone has access to or is faking that they have access to your email account.</li></ul></li></ul><p>What does it mean? What can it do? </p><p><em>You are going to want to Keep listening!</em></p><ul><li>A BEC attack begins with cyber criminals hacking and spoofing to gain access to your email. </li><li>If they have access to your email or at least the end user they’re talking to (which could be your bank or any financial institution you name it) … If they think they’re talking to you and your email account, the hacker, now they’ve got your world. </li></ul><p><br></p><p>“So, if you want my bank account and you aren’t me but happen to have my email then you pretty much have it all.” </p><p>[5:47] - So that’s what a BEC, a scam is – it’s when somebody (aka a hacker) gets access to your email by impersonating you or someone in your business.</p><p><br>What is “Spoofing”?         </p><p>[5:57] - If somebody can PRETEND to have your email address, we call that “spoofing”</p><p>[6:09] – Unless you have security set up it’ll look exactly like it’s coming from you </p><p>[6:17] – We’re talking about scary stuff “we can’t really get through life believing every little bad thing is going to happen to us.” </p><p>[6:30] – one of the human defense mechanisms is to believe that bad things cannot happen to us… Today, in this podcast, we are here talking about things that HAVE happened. </p><p>Listen as we shine light on the importance of this growing threat.</p><p>[8:00] - Above was talking about Spoofing </p><ul><li>A “spoofed email” would set off alerts, but if you logged into my email account it’s NOT triggering those alerts – THIS is what we really must be careful of. </li><li>We have all kinds of protections we can put against spoofing but sounds like we’ve got to work on our email... </li></ul><p><br></p><p>[8:16] What Joe recommends to anyone, especially people who have any kind of personal Yahoo or Gmail account: Setting up one or both of these two things:</p><ol><li>MFA </li><li>2FA</li></ol><p>The most basic of those would be Multi Factor Authentication (MFA). You might also see 2FA out there. Recommendations from Joe: </p><ul><li> I would highly recommend anybody, if you have any kind of Yahoo, Gmail, personal account, you name it!</li><li>I would 100% set up MFA – It will save you so much time, headache and effort. <p></p></li></ul><p>[8:35] – So let’s get into the nuts and bolts of this one - we are going to talk about a guy named Verne Harnish</p><p><em>STORY</em></p><p>[9:04] – Verne Harnish got hit. But he is not stupid, he had protections in place.</p><p>He was in a foreign country, doing a big presentation to 3,000+ CEO's, executives, entrepreneurs. In this article Verne says he used a “public network” and in that process somebody was able to sniff out his emails and now is when the attack begins. </p><p>1st – they hack his email, then they start impersonating him </p><p>Note: They are not spoofing him. They are actually INSIDE his email account. They are him. </p><p>Inside his email account watching messages being sent between Verne and his admin (communicating about wiring money...)</p><p>They sit and learn this stuff until they are able to very accurately impersonate him THEN they make the attack. Wiring money to 3-4 different places. By the time Verne (or anyone) figures it out, it’s game over… the money is GONE.</p><p>[12:15] – Joe, let’s talk about what Verne did RIGHT what he did WRONG</p><ul><li>Rule #1: Just don’t get on public WiFi. <ul><li>We highly suggest that if you do get on public WiFi you’ve got a proxy VPN, or a VPN set up. </li><li>Why? If you don’t have that, any hacker is reading words verbatim off your computer. </li></ul></li></ul><p><br></p><p>So Joe, "DO or DO NOT use Starbucks WiFi? </p><ul><li>NO do not… </li><li>Safe alternative like the VPN set up is to 100% use your mobile hotspot if you need WiFi.  </li></ul><p>So what could Verne have done as extra security to possibly prevent this?<br> </p><p>[15:00] – What could they have done to possibly prevent this? <br>The BEST thing they could have done: </p><ul><li>In this case one KEY component that was missing is – <ul><li>Don’t ever allow money to be authorized over email. </li><li>Or at least not over the initial form of communication. </li></ul></li><li>Example:<ul><li>If email is where it initiated, get another form of communication in there (like a direc...</li></ul></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Stupid...or Just Irresponsible? | Episode 4: The Bank is NOT Your Friend</strong></p><p><br></p><p><br><strong>Subscribe to Stupid or Irresponsible Podcast<br></strong><a href="https://open.spotify.com/episode/2K25vSEeEESmpIgWDWaTHM?si=dexxhoVZRHepqzZJlqLECQ">Spotify  </a>| <a href="https://podcasts.apple.com/us/podcast/stupid-or-just-irresponsible/id1519838743">Apple Podcasts</a> | <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy50cmFuc2lzdG9yLmZtL3N0dXBpZC1vci1qdXN0LWlycmVzcG9uc2libGU?ved=2ahUKEwiJ5t-swc3qAhUUOc0KHQ8fCNEQ4aUDegQIARAC&amp;hl=en">Google Podcasts<br></a></p><p><strong>Resources</strong><br><a href="https://www.master-computing.com/live-webinars/">Security Webinar</a> -  Stay ahead of the game! Sign up for our Security Webinar today. We give you FREE tools, FREE training, and we WILL hold your hand throughout the process. BUT when you don’t take our help or our advice that is stupid.</p><p><a href="https://www.master-computing.com/discovery/">Schedule Your Discovery Call </a>- If you know you've got a problem take us up on this offer! Book a 10 minute call with myself (Justin Shelley) and we’ll go over what we can do to help, get you started on a path to have a solid plan in place, constantly reviewing that plan, and just making sure you are doing the right things to minimize ALL the risk we possibly can.<br> </p><p><strong>Show Notes</strong></p><p> </p><p>[1:50] – Justin shares what started his love affair with technology and how he is shocked to be spending most his time fighting crime...</p><ul><li>Justin’s love affair with Technology began at the rightful age of 12 with the Apple 2E </li></ul><p><br></p><p>[2:26] - “I got into computers at the rightful age of 12 but did not see myself fighting crime…”</p><p>[2:36] - But here we are… Master Computing is an IT company we really pride ourselves of fast response, on processes, on client education, but man we spend most our time fighting crime! Who knew!?</p><p>[2:59] The title of this podcast Stupid or irresponsible </p><ul><li>Title Background -  We send out the this letter called the “Stupid or Irresponsible” letter and people got offended or squeamish about calling someone Stupid.. So, they would play it down to sound less harsh. But the fact is, not taking basic security measures and educating yourselves, employees, then you are stupid. </li></ul><p><br></p><p>[3:50] - Justin came to this conclusion when making this title - If you don’t care enough about your business to care about your business to protect it from cyber crime, I can’t care about your business more than you do. SO, take the advice, take the tools we’re giving YOU, or don’t but if you don’t and you get hit... sorry YOU’RE STUPID. </p><p><br></p><p>[4:08] – Today we are going to talk about a <strong>BEC Attack</strong> that cost a very intelligent very established businessman $400,000 that he DID NOT RECOVER.</p><p>[4:20] – What's a BEC Attack?</p><ul><li>BEC Attack – Business email compromise attack:<ul><li>It’s when someone has access to or is faking that they have access to your email account.</li></ul></li></ul><p>What does it mean? What can it do? </p><p><em>You are going to want to Keep listening!</em></p><ul><li>A BEC attack begins with cyber criminals hacking and spoofing to gain access to your email. </li><li>If they have access to your email or at least the end user they’re talking to (which could be your bank or any financial institution you name it) … If they think they’re talking to you and your email account, the hacker, now they’ve got your world. </li></ul><p><br></p><p>“So, if you want my bank account and you aren’t me but happen to have my email then you pretty much have it all.” </p><p>[5:47] - So that’s what a BEC, a scam is – it’s when somebody (aka a hacker) gets access to your email by impersonating you or someone in your business.</p><p><br>What is “Spoofing”?         </p><p>[5:57] - If somebody can PRETEND to have your email address, we call that “spoofing”</p><p>[6:09] – Unless you have security set up it’ll look exactly like it’s coming from you </p><p>[6:17] – We’re talking about scary stuff “we can’t really get through life believing every little bad thing is going to happen to us.” </p><p>[6:30] – one of the human defense mechanisms is to believe that bad things cannot happen to us… Today, in this podcast, we are here talking about things that HAVE happened. </p><p>Listen as we shine light on the importance of this growing threat.</p><p>[8:00] - Above was talking about Spoofing </p><ul><li>A “spoofed email” would set off alerts, but if you logged into my email account it’s NOT triggering those alerts – THIS is what we really must be careful of. </li><li>We have all kinds of protections we can put against spoofing but sounds like we’ve got to work on our email... </li></ul><p><br></p><p>[8:16] What Joe recommends to anyone, especially people who have any kind of personal Yahoo or Gmail account: Setting up one or both of these two things:</p><ol><li>MFA </li><li>2FA</li></ol><p>The most basic of those would be Multi Factor Authentication (MFA). You might also see 2FA out there. Recommendations from Joe: </p><ul><li> I would highly recommend anybody, if you have any kind of Yahoo, Gmail, personal account, you name it!</li><li>I would 100% set up MFA – It will save you so much time, headache and effort. <p></p></li></ul><p>[8:35] – So let’s get into the nuts and bolts of this one - we are going to talk about a guy named Verne Harnish</p><p><em>STORY</em></p><p>[9:04] – Verne Harnish got hit. But he is not stupid, he had protections in place.</p><p>He was in a foreign country, doing a big presentation to 3,000+ CEO's, executives, entrepreneurs. In this article Verne says he used a “public network” and in that process somebody was able to sniff out his emails and now is when the attack begins. </p><p>1st – they hack his email, then they start impersonating him </p><p>Note: They are not spoofing him. They are actually INSIDE his email account. They are him. </p><p>Inside his email account watching messages being sent between Verne and his admin (communicating about wiring money...)</p><p>They sit and learn this stuff until they are able to very accurately impersonate him THEN they make the attack. Wiring money to 3-4 different places. By the time Verne (or anyone) figures it out, it’s game over… the money is GONE.</p><p>[12:15] – Joe, let’s talk about what Verne did RIGHT what he did WRONG</p><ul><li>Rule #1: Just don’t get on public WiFi. <ul><li>We highly suggest that if you do get on public WiFi you’ve got a proxy VPN, or a VPN set up. </li><li>Why? If you don’t have that, any hacker is reading words verbatim off your computer. </li></ul></li></ul><p><br></p><p>So Joe, "DO or DO NOT use Starbucks WiFi? </p><ul><li>NO do not… </li><li>Safe alternative like the VPN set up is to 100% use your mobile hotspot if you need WiFi.  </li></ul><p>So what could Verne have done as extra security to possibly prevent this?<br> </p><p>[15:00] – What could they have done to possibly prevent this? <br>The BEST thing they could have done: </p><ul><li>In this case one KEY component that was missing is – <ul><li>Don’t ever allow money to be authorized over email. </li><li>Or at least not over the initial form of communication. </li></ul></li><li>Example:<ul><li>If email is where it initiated, get another form of communication in there (like a direc...</li></ul></li></ul>]]>
      </content:encoded>
      <pubDate>Tue, 23 Jun 2020 17:30:00 -0500</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/f635f629/a8510d38.mp3" length="46676906" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>1942</itunes:duration>
      <itunes:summary>Is bank fraud on your radar? It should be. We break down a $400,000 heist that could happen to any of us. It's not about the dollar amount, but how it happened. It can happen to any of us. And most likely will. Here's how to prevent it!</itunes:summary>
      <itunes:subtitle>Is bank fraud on your radar? It should be. We break down a $400,000 heist that could happen to any of us. It's not about the dollar amount, but how it happened. It can happen to any of us. And most likely will. Here's how to prevent it!</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>Yes</itunes:explicit>
    </item>
    <item>
      <title>3. Painted Into a Corner</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>3. Painted Into a Corner</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2215cbd1-9b42-410c-9b3c-00561e0a3e5c</guid>
      <link>https://share.transistor.fm/s/6c038341</link>
      <description>
        <![CDATA[<p><strong>Show Notes:</strong></p><p><br></p><p>In Episode 3 of Stupid or just Irresponsible Justin Shelley, CEO of Master Computing, and Joe Melot, CTO of Master Computing discuss the stupid things we see out in the wild. Last week we talked about slow computers. Today we play and expand on that and talk about outdated software. When is software out of date? In this episode we put a timeline on software. </p><p><strong>Subscribe to Stupid or Irresponsible Podcast<br></strong><a href="https://open.spotify.com/episode/2K25vSEeEESmpIgWDWaTHM?si=dexxhoVZRHepqzZJlqLECQ">Spotify  </a>| <a href="https://podcasts.apple.com/us/podcast/stupid-or-just-irresponsible/id1519838743">Apple Podcasts</a> | <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy50cmFuc2lzdG9yLmZtL3N0dXBpZC1vci1qdXN0LWlycmVzcG9uc2libGU?ved=2ahUKEwiJ5t-swc3qAhUUOc0KHQ8fCNEQ4aUDegQIARAC&amp;hl=en">Google Podcasts<br></a><br></p><p> </p><p><strong>[4:35]</strong> – Using out of date software </p><ul><li>Additional problems introduced when you use old software</li><li>As far as hacking is concerned, software is the Name of The Game!</li><li>Hardware, hard to break into without having to deal with the software behind it</li><li>Software side has to be CONTINUALLY updated because with every update to this thing and that thing can cause security vulnerabilities to any given software at any given time </li><li>The name of the game for hackers is to figure a way to get into software, to get into computer to steal your stuff</li></ul><p><strong>[5:35]</strong> - Look at Microsoft office (this is what we are going to dig into today) – when do you have to replace it? The end of life?</p><p> </p><p><strong>[5:50] </strong>- Oldest version of supported Microsoft office today:</p><ul><li>End of life Office 2010 is October this year (2020) </li><li>So “technically” it is still ok today…</li><li>But if you are running windows 7 you are so much more likely to get hit with a virus than windows 10</li></ul><p> </p><p><strong>[6:45]</strong> - When should people update their software?</p><ul><li>Joe always advises to upgrade “on your own terms”, last thing anyone wants is to be smashed into a corner</li><li>Doesn’t make sense financially, everything is always going to break, so many roadblocks</li><li>Financially, it costs SO much more to wait until last minute</li><li>Don’t wait until you’re painted into a corner… </li><li>Want it to be on your terms, so you can prepare, and when those roadblocks come up you have wiggle room, and probably end up saving you some money. </li><li>Have a plan, get some solid advice!</li></ul><p> </p><p><strong>[9:00]</strong> - QBR – (Quarterly Business Reviews)</p><ul><li>Once a quarter we go and talk to the person who makes business decisions</li><li>Discuss future of your company looking like</li><li>Do we Expect any grand expansions?</li><li>I noticed your phone system is going out of date, maybe last year I would’ve come to you saying we need to upgrade office 10 </li></ul><p> </p><p><strong>[10:04]</strong> - Budgeting is #1 want to be able to spread that money out, it always costs less, it definitely costs less to do it right once, then do it wrong 2 or 3 times… </p><p> </p><p><strong>[11:43]</strong> – Email migrations: Story from a fellow IT guy</p><ul><li>This company has been neglected for 10 years</li><li>Still running exchange 2010 and Office 2010…</li><li>Exchange is the actual office mail server itself (done back in January, no longer supported by Microsoft)</li><li>Stupid – using exchange 2010</li><li>Irresponsible – using office 2010 </li></ul><p> </p><p><strong>[13:15]</strong> – Still Using Exchange 2010 </p><ul><li>Can we migrate exchange server from 2010 to the current version exchange server directly? The answer is NO.</li><li>Have to have a 3rd party</li><li>Download all emails to hard drive</li><li>Convert to other form</li><li>Upload those into the cloud</li><li>There is not a direct migration path from 2010 to a newer server </li></ul><p>This is perfect example of this costs way more ignore versus just to do it up front and do it right. </p><p> <br>“Server 2003 still existed in this company… Windows 95...” That is just stupid. </p><p> </p><p><strong>[17:00] </strong>- Ransomware, bank fraud, now they have your exchange system, they are faking your emails to any and all of your contacts..</p><p> </p><p><strong>[17:30]</strong> - Paying an IT guy and he is promising the world, but how do you know he is giving sound advice, as far as strategy is concerned? </p><p><strong>[18:15]</strong> - Schedule your online meeting today! <br>Go to <a href="https://www.master-computing.com/discovery">www.master-computing.com/discovery</a> to book your 10-minute discovery call. We'll ask some key questions, you can ask questions, and if we're a match made in heaven we'll build you a custom technology roadmap. Don't wait until you're painted into a corner, take charge of all things technical within your organization.</p><p> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Show Notes:</strong></p><p><br></p><p>In Episode 3 of Stupid or just Irresponsible Justin Shelley, CEO of Master Computing, and Joe Melot, CTO of Master Computing discuss the stupid things we see out in the wild. Last week we talked about slow computers. Today we play and expand on that and talk about outdated software. When is software out of date? In this episode we put a timeline on software. </p><p><strong>Subscribe to Stupid or Irresponsible Podcast<br></strong><a href="https://open.spotify.com/episode/2K25vSEeEESmpIgWDWaTHM?si=dexxhoVZRHepqzZJlqLECQ">Spotify  </a>| <a href="https://podcasts.apple.com/us/podcast/stupid-or-just-irresponsible/id1519838743">Apple Podcasts</a> | <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy50cmFuc2lzdG9yLmZtL3N0dXBpZC1vci1qdXN0LWlycmVzcG9uc2libGU?ved=2ahUKEwiJ5t-swc3qAhUUOc0KHQ8fCNEQ4aUDegQIARAC&amp;hl=en">Google Podcasts<br></a><br></p><p> </p><p><strong>[4:35]</strong> – Using out of date software </p><ul><li>Additional problems introduced when you use old software</li><li>As far as hacking is concerned, software is the Name of The Game!</li><li>Hardware, hard to break into without having to deal with the software behind it</li><li>Software side has to be CONTINUALLY updated because with every update to this thing and that thing can cause security vulnerabilities to any given software at any given time </li><li>The name of the game for hackers is to figure a way to get into software, to get into computer to steal your stuff</li></ul><p><strong>[5:35]</strong> - Look at Microsoft office (this is what we are going to dig into today) – when do you have to replace it? The end of life?</p><p> </p><p><strong>[5:50] </strong>- Oldest version of supported Microsoft office today:</p><ul><li>End of life Office 2010 is October this year (2020) </li><li>So “technically” it is still ok today…</li><li>But if you are running windows 7 you are so much more likely to get hit with a virus than windows 10</li></ul><p> </p><p><strong>[6:45]</strong> - When should people update their software?</p><ul><li>Joe always advises to upgrade “on your own terms”, last thing anyone wants is to be smashed into a corner</li><li>Doesn’t make sense financially, everything is always going to break, so many roadblocks</li><li>Financially, it costs SO much more to wait until last minute</li><li>Don’t wait until you’re painted into a corner… </li><li>Want it to be on your terms, so you can prepare, and when those roadblocks come up you have wiggle room, and probably end up saving you some money. </li><li>Have a plan, get some solid advice!</li></ul><p> </p><p><strong>[9:00]</strong> - QBR – (Quarterly Business Reviews)</p><ul><li>Once a quarter we go and talk to the person who makes business decisions</li><li>Discuss future of your company looking like</li><li>Do we Expect any grand expansions?</li><li>I noticed your phone system is going out of date, maybe last year I would’ve come to you saying we need to upgrade office 10 </li></ul><p> </p><p><strong>[10:04]</strong> - Budgeting is #1 want to be able to spread that money out, it always costs less, it definitely costs less to do it right once, then do it wrong 2 or 3 times… </p><p> </p><p><strong>[11:43]</strong> – Email migrations: Story from a fellow IT guy</p><ul><li>This company has been neglected for 10 years</li><li>Still running exchange 2010 and Office 2010…</li><li>Exchange is the actual office mail server itself (done back in January, no longer supported by Microsoft)</li><li>Stupid – using exchange 2010</li><li>Irresponsible – using office 2010 </li></ul><p> </p><p><strong>[13:15]</strong> – Still Using Exchange 2010 </p><ul><li>Can we migrate exchange server from 2010 to the current version exchange server directly? The answer is NO.</li><li>Have to have a 3rd party</li><li>Download all emails to hard drive</li><li>Convert to other form</li><li>Upload those into the cloud</li><li>There is not a direct migration path from 2010 to a newer server </li></ul><p>This is perfect example of this costs way more ignore versus just to do it up front and do it right. </p><p> <br>“Server 2003 still existed in this company… Windows 95...” That is just stupid. </p><p> </p><p><strong>[17:00] </strong>- Ransomware, bank fraud, now they have your exchange system, they are faking your emails to any and all of your contacts..</p><p> </p><p><strong>[17:30]</strong> - Paying an IT guy and he is promising the world, but how do you know he is giving sound advice, as far as strategy is concerned? </p><p><strong>[18:15]</strong> - Schedule your online meeting today! <br>Go to <a href="https://www.master-computing.com/discovery">www.master-computing.com/discovery</a> to book your 10-minute discovery call. We'll ask some key questions, you can ask questions, and if we're a match made in heaven we'll build you a custom technology roadmap. Don't wait until you're painted into a corner, take charge of all things technical within your organization.</p><p> </p>]]>
      </content:encoded>
      <pubDate>Tue, 02 Jun 2020 17:00:00 -0500</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/6c038341/ad75e564.mp3" length="28171398" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>1171</itunes:duration>
      <itunes:summary>Using out of date software is irresponsible. But Windows 95?!? Come on, people! That's just stupid!</itunes:summary>
      <itunes:subtitle>Using out of date software is irresponsible. But Windows 95?!? Come on, people! That's just stupid!</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>Yes</itunes:explicit>
    </item>
    <item>
      <title>2. Stupid People Use Slow Computers</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>2. Stupid People Use Slow Computers</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c4bf396b-2688-49d4-97ac-bddffa90a191</guid>
      <link>https://share.transistor.fm/s/e016f84d</link>
      <description>
        <![CDATA[<p><strong>Subscribe to Stupid or Irresponsible Podcast<br></strong><a href="https://open.spotify.com/episode/2K25vSEeEESmpIgWDWaTHM?si=dexxhoVZRHepqzZJlqLECQ">Spotify  </a>| <a href="https://podcasts.apple.com/us/podcast/stupid-or-just-irresponsible/id1519838743">Apple Podcasts</a> | <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy50cmFuc2lzdG9yLmZtL3N0dXBpZC1vci1qdXN0LWlycmVzcG9uc2libGU?ved=2ahUKEwiJ5t-swc3qAhUUOc0KHQ8fCNEQ4aUDegQIARAC&amp;hl=en">Google Podcasts<br></a></p><p><strong>SHOW NOTES:</strong></p><p> </p><p>Today we are going to talk about slow computers, get a little more into the productivity side of things!</p><p> </p><p>[1:25] - People pay a SIGNIFICANT amount of money, then, when we give them advice (sound advice btw!) they’ll think “oh you are just trying to sell me something…” Guys, we’re here to take care of your network, to help your business grow, to help you be more productive, and make more money yourself! We’re NOT trying to rob you when giving you advice I promise you that…</p><p> </p><p>[1:54] - Today we are going to talk about <strong>what’s SMART when it comes to technology, and finances in general</strong>. What’s smart is to not spend money just to have a cool gadget! I don’t ever recommend that to any of my clients or even do that to myself.</p><p> </p><p>[3:00] - Another thing we do not advise people to do in the course of doing IT consulting… You probably don’t need to stay on the cutting edge of everything of everything. </p><p> </p><p>[3:17] - The smart approach here is to develop a solid strategy for your business and spend exactly the amount of money required to execute on that strategy. Buying right. </p><p> </p><p>[3:45] - Stupid is saving money at all costs… What I mean by that is I’ve watched people spend a small fortune just to save a few pennies… </p><p> </p><p><em>How do we tie that back to slow computers?? (Keep listening)</em></p><p> </p><p>[4:03] - It is not a smart decision to operate on ancient equipment. Period. </p><p> </p><p>[4:14] - There are at least a handful of Windows 7 machines still out there in the wild… </p><p> </p><p>[4:26] - Fact: stores stopped selling those (Windows 7 machines) back in 2013. Over 7 years ago, and we personally still find them EVERYWHERE if not in the whole operation.  </p><p> </p><p>[4:50] - Another fact: Microsoft is no longer supporting it, so unless you’re paying Microsoft a <em>premium</em> right now to have them come and specifically look at your machines, then you’re NOT getting any of those security patches and hackers are just <strong>living</strong> and <strong>thriving</strong> in those Windows 7 machines! </p><p> </p><p>[5:25] - What you DON’T SEE – what’s not working anymore – is the security features. App developers aren’t making any apps for Windows 7, your printer won’t work next week, etc…</p><p> </p><p>[7:20] - What is the age we recommend for a productive workstation, in a business, trying to make money, keep clients and customers happy? </p><p> </p><p>We <strong>recommend</strong> <strong>3 – 5 years</strong> in a professional, business environment. </p><p> </p><p>[8:20] - We extended it “to 5 years” because people will give push back when trying to tell them what they really should have. </p><p> </p><p>But the reality is, beyond 3 years you will start dealing with frustration from your end users. </p><p> </p><p>[8:45] –  <strong>3 to 5 years</strong> is <strong>irresponsible</strong> but after that, a computer that is <strong>5+ years old, that’s STUPID</strong>. </p><p> </p><p>[9:37] - The largest expense in most organizations is YOU the employees, is the largest expense I have to deal with month-in month-out </p><p> </p><p>[10:10] - DOING MATH: <br>For a Minimum wage employee in the state of Texas asks for 2.4% raise is that worth somebody’s happiness? (The answer is YES) </p><p> </p><p>[11:50] - The lesson to point out here is that <strong>it’s a matter of perspective</strong>. We understand that we have to watch every dollar we spend, but man, only 2.4% to make a difference in somebody’s life and the emotional distress they’re going through. </p><p> </p><p>[13:40] – MORE MATH: <br>For someone who earns $50,000 a year as a percent of their payroll, a DECENT computer for them is 0.9% of their payroll.</p><p><br></p><p>[14:27] – Now, if we’re talking about these guys that are pulling in 6 figures $100,000/year doing it as a % of their payroll, now we are at 0.3%. ONLY 0.3% of their payroll. <strong>This is a rounding error to give people good technology… </strong></p><p> </p><p>[15:17] - The guy whose time is worth the most is stepping over dollars to pick up pennies…</p><p> </p><p>[15:26] - We talked about the <strong>emotional impact</strong>, <strong>productivity impact</strong>, and <strong>technical challenges introduced</strong> to not have adequate equipment, treating our employees the way they should be treated is such a SMALL percent of the investment that we make in these people</p><p> </p><p>[16:02] - The SMART thing to do<strong> we highly recommend getting a professional evaluation of where you are at, what you’re trying to accomplish with your business, then the formula with the right tool set to accomplish that! </strong></p><p> </p><p>Master Computing will do that for you in a 10-minute phone call. No charge, no strings attached!! We will simply tell you where you’re, what you need to do with that, and the right tool set personalized for you to accomplish it!</p><p> </p><p><strong>Book your 10 minute Discovery Call today!  Go to</strong>: <a href="http://www.master-computing.com/discovery">www.master-computing.com/discovery</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Subscribe to Stupid or Irresponsible Podcast<br></strong><a href="https://open.spotify.com/episode/2K25vSEeEESmpIgWDWaTHM?si=dexxhoVZRHepqzZJlqLECQ">Spotify  </a>| <a href="https://podcasts.apple.com/us/podcast/stupid-or-just-irresponsible/id1519838743">Apple Podcasts</a> | <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy50cmFuc2lzdG9yLmZtL3N0dXBpZC1vci1qdXN0LWlycmVzcG9uc2libGU?ved=2ahUKEwiJ5t-swc3qAhUUOc0KHQ8fCNEQ4aUDegQIARAC&amp;hl=en">Google Podcasts<br></a></p><p><strong>SHOW NOTES:</strong></p><p> </p><p>Today we are going to talk about slow computers, get a little more into the productivity side of things!</p><p> </p><p>[1:25] - People pay a SIGNIFICANT amount of money, then, when we give them advice (sound advice btw!) they’ll think “oh you are just trying to sell me something…” Guys, we’re here to take care of your network, to help your business grow, to help you be more productive, and make more money yourself! We’re NOT trying to rob you when giving you advice I promise you that…</p><p> </p><p>[1:54] - Today we are going to talk about <strong>what’s SMART when it comes to technology, and finances in general</strong>. What’s smart is to not spend money just to have a cool gadget! I don’t ever recommend that to any of my clients or even do that to myself.</p><p> </p><p>[3:00] - Another thing we do not advise people to do in the course of doing IT consulting… You probably don’t need to stay on the cutting edge of everything of everything. </p><p> </p><p>[3:17] - The smart approach here is to develop a solid strategy for your business and spend exactly the amount of money required to execute on that strategy. Buying right. </p><p> </p><p>[3:45] - Stupid is saving money at all costs… What I mean by that is I’ve watched people spend a small fortune just to save a few pennies… </p><p> </p><p><em>How do we tie that back to slow computers?? (Keep listening)</em></p><p> </p><p>[4:03] - It is not a smart decision to operate on ancient equipment. Period. </p><p> </p><p>[4:14] - There are at least a handful of Windows 7 machines still out there in the wild… </p><p> </p><p>[4:26] - Fact: stores stopped selling those (Windows 7 machines) back in 2013. Over 7 years ago, and we personally still find them EVERYWHERE if not in the whole operation.  </p><p> </p><p>[4:50] - Another fact: Microsoft is no longer supporting it, so unless you’re paying Microsoft a <em>premium</em> right now to have them come and specifically look at your machines, then you’re NOT getting any of those security patches and hackers are just <strong>living</strong> and <strong>thriving</strong> in those Windows 7 machines! </p><p> </p><p>[5:25] - What you DON’T SEE – what’s not working anymore – is the security features. App developers aren’t making any apps for Windows 7, your printer won’t work next week, etc…</p><p> </p><p>[7:20] - What is the age we recommend for a productive workstation, in a business, trying to make money, keep clients and customers happy? </p><p> </p><p>We <strong>recommend</strong> <strong>3 – 5 years</strong> in a professional, business environment. </p><p> </p><p>[8:20] - We extended it “to 5 years” because people will give push back when trying to tell them what they really should have. </p><p> </p><p>But the reality is, beyond 3 years you will start dealing with frustration from your end users. </p><p> </p><p>[8:45] –  <strong>3 to 5 years</strong> is <strong>irresponsible</strong> but after that, a computer that is <strong>5+ years old, that’s STUPID</strong>. </p><p> </p><p>[9:37] - The largest expense in most organizations is YOU the employees, is the largest expense I have to deal with month-in month-out </p><p> </p><p>[10:10] - DOING MATH: <br>For a Minimum wage employee in the state of Texas asks for 2.4% raise is that worth somebody’s happiness? (The answer is YES) </p><p> </p><p>[11:50] - The lesson to point out here is that <strong>it’s a matter of perspective</strong>. We understand that we have to watch every dollar we spend, but man, only 2.4% to make a difference in somebody’s life and the emotional distress they’re going through. </p><p> </p><p>[13:40] – MORE MATH: <br>For someone who earns $50,000 a year as a percent of their payroll, a DECENT computer for them is 0.9% of their payroll.</p><p><br></p><p>[14:27] – Now, if we’re talking about these guys that are pulling in 6 figures $100,000/year doing it as a % of their payroll, now we are at 0.3%. ONLY 0.3% of their payroll. <strong>This is a rounding error to give people good technology… </strong></p><p> </p><p>[15:17] - The guy whose time is worth the most is stepping over dollars to pick up pennies…</p><p> </p><p>[15:26] - We talked about the <strong>emotional impact</strong>, <strong>productivity impact</strong>, and <strong>technical challenges introduced</strong> to not have adequate equipment, treating our employees the way they should be treated is such a SMALL percent of the investment that we make in these people</p><p> </p><p>[16:02] - The SMART thing to do<strong> we highly recommend getting a professional evaluation of where you are at, what you’re trying to accomplish with your business, then the formula with the right tool set to accomplish that! </strong></p><p> </p><p>Master Computing will do that for you in a 10-minute phone call. No charge, no strings attached!! We will simply tell you where you’re, what you need to do with that, and the right tool set personalized for you to accomplish it!</p><p> </p><p><strong>Book your 10 minute Discovery Call today!  Go to</strong>: <a href="http://www.master-computing.com/discovery">www.master-computing.com/discovery</a> </p>]]>
      </content:encoded>
      <pubDate>Wed, 27 May 2020 17:00:00 -0500</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/e016f84d/99b9b0e6.mp3" length="24702868" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>1027</itunes:duration>
      <itunes:summary>Stepping over dollars to pick up pennies is stupid. Here's just one example.</itunes:summary>
      <itunes:subtitle>Stepping over dollars to pick up pennies is stupid. Here's just one example.</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>1. The Stupid Things People Do With Passwords</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>1. The Stupid Things People Do With Passwords</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8e9d1fe4-3655-485f-b640-b6d05800ddaa</guid>
      <link>https://share.transistor.fm/s/f7dfaace</link>
      <description>
        <![CDATA[<p><strong>Subscribe<br></strong><a href="https://open.spotify.com/episode/2K25vSEeEESmpIgWDWaTHM?si=dexxhoVZRHepqzZJlqLECQ">Spotify  </a>| <a href="https://podcasts.apple.com/us/podcast/stupid-or-just-irresponsible/id1519838743">Apple Podcasts</a> | <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy50cmFuc2lzdG9yLmZtL3N0dXBpZC1vci1qdXN0LWlycmVzcG9uc2libGU?ved=2ahUKEwiJ5t-swc3qAhUUOc0KHQ8fCNEQ4aUDegQIARAC&amp;hl=en">Google Podcasts<br></a><br><strong>Resources<br></strong><a href="https://www.master-computing.com/discovery/">Book A 10-Minute Discovery Call <br></a><br><strong>Show Notes:</strong></p><ul><li>At [5:30] we talk about the #1 thing people do we wish no one did when it comes to passwords...Is this you?</li><li>At [5:50] we talk about a CEO that we saved $20,000 that could have very easily gone the other way. a mistake and we share a story where a CEO used the same password and if it weren't for us he would </li><li>At 7:00 we talk about your credentials becoming available FOR SALE on the DARK WEB and the reason Justin changed his password he had created 15 years ago after finding out his were for sale on the dark web and how his credentials were for sale </li><li>At [10:05] we talk about some simple things you can remember when creating a password that can help protect your information. </li><li>At [15:25] we talk about the #1 best way to stay secure and why this prevents any kind of hacker to fake being you and stealing your identity </li></ul><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Subscribe<br></strong><a href="https://open.spotify.com/episode/2K25vSEeEESmpIgWDWaTHM?si=dexxhoVZRHepqzZJlqLECQ">Spotify  </a>| <a href="https://podcasts.apple.com/us/podcast/stupid-or-just-irresponsible/id1519838743">Apple Podcasts</a> | <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy50cmFuc2lzdG9yLmZtL3N0dXBpZC1vci1qdXN0LWlycmVzcG9uc2libGU?ved=2ahUKEwiJ5t-swc3qAhUUOc0KHQ8fCNEQ4aUDegQIARAC&amp;hl=en">Google Podcasts<br></a><br><strong>Resources<br></strong><a href="https://www.master-computing.com/discovery/">Book A 10-Minute Discovery Call <br></a><br><strong>Show Notes:</strong></p><ul><li>At [5:30] we talk about the #1 thing people do we wish no one did when it comes to passwords...Is this you?</li><li>At [5:50] we talk about a CEO that we saved $20,000 that could have very easily gone the other way. a mistake and we share a story where a CEO used the same password and if it weren't for us he would </li><li>At 7:00 we talk about your credentials becoming available FOR SALE on the DARK WEB and the reason Justin changed his password he had created 15 years ago after finding out his were for sale on the dark web and how his credentials were for sale </li><li>At [10:05] we talk about some simple things you can remember when creating a password that can help protect your information. </li><li>At [15:25] we talk about the #1 best way to stay secure and why this prevents any kind of hacker to fake being you and stealing your identity </li></ul><p><br></p>]]>
      </content:encoded>
      <pubDate>Wed, 27 May 2020 08:00:00 -0500</pubDate>
      <author>Master Computing</author>
      <enclosure url="https://media.transistor.fm/f7dfaace/954a525e.mp3" length="26140284" type="audio/mpeg"/>
      <itunes:author>Master Computing</itunes:author>
      <itunes:duration>1087</itunes:duration>
      <itunes:summary>I used the same password for 15 years! Pretty stupid...</itunes:summary>
      <itunes:subtitle>I used the same password for 15 years! Pretty stupid...</itunes:subtitle>
      <itunes:keywords>Technology, cybersecurity, security, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
  </channel>
</rss>
