Expert Cybersecurity Secrets – Introduction Today on TTWCP Radio Show: [02-16-2019]
Craig goes through some of the free training he offered this week on setting up and securing Wi-Fi, Firewalls, and Back-ups. He has some video training on each of these on his website but they will be coming down soon. So, go check them out.
During the next four weeks, he will be offering a master class on DIY Security. If that is something that interests you — you might want to sign up.
- Robocalls And Phone Scams Are All The Rage In 2019
- Microsoft: Drag Internet Explorer To The Trash. No, Really
- Unopened Copy Of Super Mario Bros Video Game Sells For Record $100k
- Cut The Cable — Great Deal On Streaming “Stick”
- Dad Fell For A “Tech Support” Scam
- Two In Three Organizations Not Convinced They Can Avoid A Breach
- Ransomware Gang Infects Customers Of It Support Firms
- Amazon Filed A Patent Application For Tech That Could Link You To Your Identity And Job
Share This Episode
For Questions, Call or Text:
Below is a rush transcript of this segment, it might contain errors.
Airing date: 02/16/2019
Expert Cybersecurity Secrets – Introduction
Craig Peterson: 0:00
Hi everybody, Craig Peterson here. This is almost Week 1000. That’s that is a lot of weeks of radio shows. And today we are going to be talking about security and securing your business and your home computers. Now, this is a really important show today because it coincides with a week worth of training video, straight training, hours of training that I produced this week. We did a live session on Thursday as well with Q and A’s and I have it all up through tomorrow for you to watch. We’re covering some of the top toughest things that you need to do. Explain the technology. I started with Wi-Fi and what you should be doing. How to secure your networks to keep the bad guys out. How to secure yourself when you’re on the road.
I went on to firewalls, and when you should and should not use the built-in firewalls, on your computer systems. And then on Wednesday, I got into more detail. As we delved into really something I think a lot of people overlook, and that’s backups. Did you know, more than 70% of the time, businesses cannot restore their data from backup even when they have a backup because it fails? So on Wednesday, I went through the 3-2-1 strategy of backups. Grandpa, father, and son on top of the 3-2-1 and explained how to do it. And then on Thursday, I went into more depth and went through three more topics. This is a lot of training and it’s absolutely free. Now it is going away tomorrow. Okay.
And the reason I’m doing that is twofold. One, these topics change security is constantly changing, you know, from my weekly newsletters that security is a huge deal and constantly evolving. So part of what I talked about this week is how to automate it. How to make it so that everything is automatically updated, automatically upgraded because it, because of the changes, you’ve got to do that as well as how the most professional tools out there allow you to tie your computer network into the one that I use over a billion endpoints that are being constantly monitored and have humans behind it to find if there’s any problems. So that then allows you to be within one hour of the latest attacks, the latest vectors that are out there. All of that is changing constantly. So that’s the first reason I’m taking it down tomorrow.
And then the second reason is, if I don’t give you guys an incentive, I’ve learned this right? 1000 weeks of shows. We’re talking about decades, right? So I’ve learned that unless you set a deadline, things don’t happen. And that happens with me too, right? When Well, how do you get something done? You set a deadline, right? If it wasn’t for the last minute, nothing would get done. So, you need to go out there right now. That’s what this is about. That’s why I spend time every week on the radio explaining what’s happening, why it’s happening. And this week, I’ve got another one here. This is from the HIPAA journal. This is a ransomware attack on a podiatric office. Bobby, Bobby Yee and he has 24,000 patients. The protected health information is all locked up at the medical records encrypted.
They tried to do restores, and then you do pay the ransoms. That’s something else we cover and you know, I work with the FBI, infra guard. I do the webinars for the Infragard program. And I help the people that protect our nation’s infrastructure keep their data safe. So you’re getting a lot of experience behind this and it’s going to be absolutely huge for you.
So I’m going to pull a little piece out of one of this week’s programs and play it here for you. You can still get this today if you go to my website http://CraigPeterson.com. You’ll see it right there on the top of the homepage and you can watch these videos this training and you can watch the replays and you can get a lot of the benefit. Of course, you’re not comfortable asking questions live, but because you’re a radio show listener, you can ask me questions anytime. 855-385-5553
But this training will go down, okay. It is not going to be remaining up on my website. And there’s a lot of good reasons for that. I really need you guys to do this because that’s the only way that you’re going to be able to keep your businesses safe. So let’s get right into this. Here’s a little bit of the training from this week.
Hi, everybody. Before we go further here in the training, I want to tell you a little bit about my backstory. How did I get to the point I’m at today? Well, it’s not the 1990s anymore. The 1990s is when I got first hit with malware and almost lost my company. And the bottom line is you can’t be complacent anymore because you can’t stay in front of the hackers. You know, you might use some of the right tools today, but tomorrow you will not be using the right tools because the continually changing that’s part of what I didn’t realize because cybersecurity is one of the areas of business that you don’t want to attract attention to. And one of the areas of business that, frankly, you have to have automated, and they have to have in place that’s going to make sure that none of your data stolen, and I think you’re going to have to agree that keeping your business safe isn’t always as simple as people sometimes make it seem. And that’s where I was back in the 90s.
Keeping your business secure comes with real challenges. You’ve got to go on Google and YouTube research; what the hackers are doing, then you have to research on how to deal with it out of the millions of possibilities. You have to narrow it down to something manageable, affordable, something you can do yourself; then you have to lay it all out which machines need which software? Do you need to change out or upgrade your firewall, your routers, your switches or other computers? You’ve got to go and buy the right software. You’ve got to install it on all the machines. You’ve got to configure it correctly so that it’s going to work for you. Then once all of this is in place, and all of the research is done, you’re going to have to maintain it by doing updates and upgrades, sometimes daily.
Then there’s the fake updates, the ones that pop up and you can’t decide if it’s real or not. Right now, there’s a huge fake a scam out there that says, hey, you’ve got to upgrade your Flash player. I’m sure you’ve seen that. So once you’ve got everything up and running up to date, you’re going to have to monitor it. Are there logs you should be monitoring? What are these logs even mean? Is your computer slow because of a hack underway? Or is it just because of the latest version of the software that blew up on you? It all becomes so complex that you really can’t do it anymore. Well, you can’t figure it all out. You can’t design that you can’t lay it out. You can’t install it; you can’t monitor it. But there are some solutions. That’s why. In this video, I’m going to demystify the process of securing your computers and your Wi-Fi. It’s going to save you a lot of time, money and frustration. It’s also going to keep you safer.
So in this first video, I’m going to share a framework that I developed after years of trial and error. It’s called the expert cybersecurity framework. And it’s a framework that’s going to serve as a tremendous resource to you to eliminate the guesswork and frustration out of trying to secure your systems and provide you with expert advice if you run into problems. Listeners on my radio show know that I’ll answer questions almost any time and I do that daily.
Now maybe you’ve already been hacked. Or perhaps you’re hoping to understand better the basics of cyber security and what you need to do to help secure your business from the hackers, but maybe you need a little bit more help to make the right choices. Either way, you’re in the right place because, after this first video, you’ll be able to confidently secure your wireless data. Yeah, Wi-Fi can be secure. I developed the Cybersecurity Framework because I saw so many businesses who were struggling business people who were wearing 100 hats trying to get everything done and then lost everything because of a breach. Businesses who couldn’t afford high-end consultants to solve the problems that small and medium businesses face every day in cybersecurity. For example, I saw a distributor who was starting to make it big in the food and beverage distribution market. They had a couple of dozen computers, but they only had antivirus software and a firewall and router that was provided by their cable internet company. They struggled every time because they kept getting hit by the latest virus or malware. Then I also saw a $10 million a year manufacturer trying to up-level their cybersecurity. They were struggling because they didn’t have any professional cybersecurity resources that they could rely on. And cybersecurity software and hardware decisions were being made by somebody in purchasing. They didn’t have a solid roadmap to follow. And when they got hacked, they had to shut down all operations, manufacturing, sales, distribution, and support for weeks. It cost them millions.
Do either one of those stories sound familiar to you? You know, I could go on, but I knew that people needed clarity because in full transparency that was my story too before outlining the expert cybersecurity framework and the specifics for each step. You might be wondering how I got into all of this and figured it out. Let me tell you so you can understand a little bit more about where it’s all coming from.
Back in September 1991, it had finally become legal to do business on the internet. And so I did. I’d been helping develop the networking protocols for more than a decade. And I wanted to help get businesses online. So I did, we got busy building websites there. And 91 through 93, we were setting up email servers, we even built a lottery system with a daily million dollar drawing. Some of these companies are of course, or companies that you would recognize some of these websites are still alive today in their fifth, sixth, seventh, eighth generations. We didn’t have the time to worry about yet another security problem, so we stuck with the basics. After all, who would come after us we were just a small company building websites.
Then, along came Robert Tappan Morris. His father worked for the NSA, the National Security Agency, and he’d been writing code for the government to use to probe the internet. So Junior decided that he’d steal his father’s NSA code and use it himself. I got nailed, and there was no one there to help me. This was the early-mid 90s. I spent days trying to figure out what had happened. I had anti-virus software. My machines weren’t that far out of date; I’d applied patches from time to time. Does that sound like something that you’ve done? Right? It’s typical, right?
I just wasn’t technical when it came to malware back then. I decided that I had to invest in myself and my business. I had to learn about cybersecurity fast, and I had to clean up the mess that
Junior had left behind for me. I had to save my business. Once I got our cybersecurity under control, I started seeing massive growth in my business. With my attention now fully focused on growing my business building and maintaining the websites, I was able to quadruple my staff and income over the next few years. Finally, I could focus and get back to work. But it took getting cybersecurity under control before I could spend some serious time on my business once again.
So today I’m running cybersecurity webinars for the FBI Infragard program. I’m a keynote speaker. I do breakout sessions at conferences I’ve spoken for Ink Magazine more than once for their CEO symposiums I’ve helped more than 5000 businesses ranging from fortune 100 companies all the way on down to mom and pop operation.
Today I’m a sought after cybersecurity expert with more than 25 years of experience and almost daily media appearances. And I don’t stay up late at night any more worried about some hackers stealing my business and destroying what I worked a lifetime to build. But the story doesn’t stop with me. Everything I’m about to share with you is the exact plan I follow to secure my systems as well as that of my client. I’m going to reveal to you expert cybersecurity secret that I’ve never revealed before. And it’s the plan that led me to experience more than 20 years of hack-free, virus-free, ransomware-free business. More importantly, this means I’m free to work on my business without constantly looking over my shoulders or wondering what I’m going to have to remove next. And that’s what I want for you. You will be watching this video if you weren’t concerned about cybersecurity, that’s why I make things easy for you. So here we go.
So that’s a little bit of the training of my intro as to what I am doing, how I got to where I am at to today where obviously I’ve been studying and working on cybersecurity now for over 25 years. I guess that’s a long time and I you know, I, as I told you, this is all free training. There are hours of it. It’s not one of these hard-sell type things by any stretch because there’s no offer at all until the very, very end, so I think you will enjoy it. I’ve had tremendous feedback. I’m just shocked and amazed and grateful to everybody who reached out to tell me what they got out of it. How good it was and how much I appreciate it. So again, you’ll find it at http://CraigPeterson.com. It is up through tomorrow. So go there. Now there are hours of this stuff about how to secure your business, how to secure your home computers, how to be secure when you’re on the road, what do all of these terms mean? How do you use them? So whether you’re just a small business, kind of starting out trying to do more than just use that antivirus software thing came with your computer and hey, I get it right. Most people that’s all they use. And frankly, that’s all they know about. And these antivirus companies don’t care about you. They just want to sell yet another copy of the software and hope you never call them with any problems. So I’m trying to help you get beyond these problems, and they-they are very real, and you’re in this spot because they put you there.
So I get it. So if you’re just somebody new starting, you’re going to learn a lot. And if you’re somebody who has an IT guy or gal who is trying to take care of things, but man, are they underwater, they just don’t. There’s too much to do. They need a little help, maybe a little bit more training, they are going to find some real gems in this training. So sign them up for it, send them an email with the link say, hey, check this out. Follow up on this because we’re going through some of the best things I’ve ever put together, frankly, and these are my top tips, and I walk you right through it hand in hand, showing you exactly what to do. I’ve got screenshots and explanations of everything. It is phenomenal stuff. So that happened Monday, Tuesday, Wednesday, Thursday this week. And if you meant to sign up and follow along, it’s not too late today. It will be too late tomorrow, so make sure you check it out right here on http://CraigPeterson.com.
So let’s talk about a couple of breaches. I’ve been doing kind of breach podcast lately as well. And I mentioned at the beginning of the show today, this ransomware attack on a podiatric, I guess, podiatric offices I’ve heard it pronounced both ways. And they had 24,000 records with personal health information, protected health information. This is common if you’re a medical practice at all. Having 24,000 Records is nothing, and this is an attack that took place and their medical records were encrypted. Now under the HIPAA regulations you I, think it’s only two hours that you can your computers can be down because part of the reason for that is what if you’re patient ends up in the emergency room, needs extreme care and you can’t look up the records, right? It’s a very, very big deal. And the law says you have to have those records available. So getting them attacked and encrypted by ransomware means that first of all, you can’t access those records. So the patient is going to be upset. And frankly, patients have died because of this before.
So it’s a big deal for doctors to have people’s full names, addresses, contact, phone numbers, their sex or birth date, social security number, health insurance information to have that all stolen. It’s also a big deal to have all that data encrypted. Think about a regular business to have it all encrypted because now you’ve lost your sales records, you’ve lost your customer information, you’ve lost your orders, everything and as I mentioned earlier, nine, or excuse me, a little more than 70% of businesses cannot restore their backups. Because when they try, the restore fails. And I see that all the time. So that’s one of the things that I cover this week. How to do effective backups so that you can be sure that your backup itself isn’t encrypted, because I’ve seen that before as well. So that was what we covered on Tuesday.
Now we had hackers who also got into a wireless network and were able to monitor what was going on. And once they’re in the wireless network, they had access to the server because the server for the businesses on the same network as the wireless they hadn’t segmented their network and they hadn’t locked down there why fi and there are ways to do that as well. And we use in fact logins for Wi-Fi, that are restricted to specific machines. We use that in businesses that have financial information that might not want to have it out and what business doesn’t have that? So they got in, they can get at their bank record and were able to transfer the funds out of the bank. You know, it only takes 90 seconds once they have access to your bank account to get that money out of the country. And some of these hacker groups are so sophisticated. They’ve set up their banks in their home country. So 90 seconds later, the money is wired out of your bank to their bank, literally their bank in the foreign country. Do you think their banks are going to cooperate with trying to get that wired money back? Of course, they don’t. And how did they do that? Well, they did that via Wi-Fi, a Wi-Fi breach and that’s what we covered on Monday is how to prevent Wi-Fi breaches.
The other Wi-Fi problem that we repeatedly see nowadays is we see piggyback on Wi-Fi wi. So you are, for instance, at an airport and you’re using the VPN. And that VPN is connected to the office, and now they’re piggybacking on your VPN to get to the office. And now the malware that was on the laptop at your house that you took home is now effectively in the business network because of the VPN and then spread and spread ransomware throughout the business. That’s what we covered on Wednesday. What are the most effective ways to stop ransomware? And we explained firewalls and how they can stop the spreading. How Microsoft ships with firewalls, as does apple. But is it turned on? Is it configured right? Well, half the time, the answer’s no. The other half the time the answers kinda. Okay, so that’s what we covered on Wednesday, we went into a lot of details on that.
And then on Thursday, we went into the seven top things you can do to prevent ransomware and not have them hit you as well as data breaches. So it has been a very busy week, and the reason I’m talking about this so much as I really want you to secure your network can you don’t have to use me. You don’t have to hire my company. It really doesn’t matter because you can do this yourself. And that’s exactly what I’m doing in this training. I’m showing you step by step what to do. So you don’t have to go online. Get millions of Google results. Get hundreds of thousands of YouTube results is you’re searching to find out what’s the best anti virus? What’s the asked for ransomware or what’s the best for spyware? What’s the best for worms? What’s the best for on and on and on.
It’s all there. And I’m serious. This is I I’m sorry to beat a maybe a dead horse here. But there’s still a lot of people that haven’t taken advantage of this. And that might be you. So the way to do that goes right now to http://CraigPeterson.com. It’s right at the top of my homepage.
Now, if you’re a home user, I’ve had a lot of people ask questions. Is this right for me? And the answer is yes, it is because the same types of concepts that apply in a business most of those also apply to homes as well and home users. So you can check that out as well. As a home user, I don’t care. This isn’t to try and sell you, and you’re not going to all of a sudden get a page that requires you to pay money. This is free. Believe it. And I know one radio now there are so many sponsored radio shows. So, many radios show that are trying to just plain old sell you something. I’m trying to help. It’s real.
So check it out at http://CraigPeterson.com. I have helped over 5000 businesses. Now. It’s probably in the neighborhood of 5500. I think it with securing their networks, getting them on the internet, making sure they have the right kind of presence. And they’re all the way as you heard from the replay of one of these videos from this week. I’ve helped everybody from a small office, a home office all the way up through fortune 100 actually fortune 50 companies. So I know that this is going to be valuable because it’s what I use with them. It’s what I’ve used myself, and it’s multiple layers of security. That’s what you have to have. Just having an anti-virus package or having a via firewall isn’t going to do any good.
Just using the router and firewall that comes with your internet connection is nowhere near good enough right there. There’s a lot to know and a lot to understand. And if you have any questions, listen, people, I’m here for you. I am. And I have so many testimonials from people saying that it’s true. I you know, I should start recording some of them. But if you have any questions, there are two ways to reach me easily. And I’ll help you anytime, anyway I can. I’ll even do a little research for you online. If there’s something that’s specific to you. But you know what, 95% of the time it’s not just you. Everybody has similar problems, but you can reach me via text. This goes right to me and my team 855-385-5553. So get out of paper and pen or get out your phone and write this down.
Email, you can just email me@CraigPeterson.com. If you want to invite me to speak at one of your events. I can do that. I charge for keynotes obviously, but I am trying to help out when it comes to all of these local companies that might need a little bit of a little bit of encouragement. Various groups. I speak to all of the time. Spoken many times everything from Rotary Clubs through a high tech council. I’m glad to help you out and glad to speak.
Again, 855-385-5553 that goes to me and my team and you can send me any question you want. And I’m more than glad to help out I have been there I have suffered before, and I’m more than glad to help you out 855-385-5553 and me@CraigPeterson.com. Make sure you watch these videos are going down tomorrow. I don’t have them on YouTube. You’re not going to find them anywhere. 855-385-5553 and http://CraigPeterson.com. Hey, have a great week. Fingers crossed. You don’t get hacked this week, and I’ll be back next week as well. Take care. Bye-bye.