Artwork for podcast Six Figure Business Mastery
Digital Intrusion: Unveiling the Realm of Hacking and Hijacking // Nathalie Berthe
Episode 96th November 2023 • Six Figure Business Mastery • Kirsten Graham & Jeanne Willson
00:00:00 00:15:32

Share Episode

Shownotes

In this riveting episode, Kirsten and Jeanne sit down with cybersecurity expert Natalie Berthe to unravel the complex world of online security. As a serial entrepreneur, advisor, and cybersecurity strategist, Natalie founded "Cybersecurity for Humans" to make online security more accessible to entrepreneurs. With the increasing prevalence of cyber threats, it's essential to understand the difference between being hacked and hijacked, and to take proactive steps to safeguard your online presence.

Main Talking Points:

1. Understanding Hacked vs. Hijacked: Natalie clarifies the difference between being hacked and hijacked, highlighting three stages: impersonation, hacking, and hijacking. Many people confuse these terms, but they represent distinct levels of intrusion into your digital life.

2. Impersonation and Cloning: Natalie discusses the first stage, impersonation, where cybercriminals steal your photos and personal information to create fake accounts. These fraudulent accounts can then reach out to your friends and connections, often going unnoticed.

3. Hacked Accounts: The hosts and Natalie explain how a hacked account is analogous to a burglar breaking into your house and stealing your belongings. Hackers can access sensitive information, which may lead to financial loss, unauthorized transactions, or even emotional manipulation.

4. Hijacked Accounts: The conversation delves into hijacking, likening it to someone moving into your house, changing the locks, and effectively taking over. Natalie emphasizes the significance of this distinction – hijackers gain full control, and the legitimate account owner is locked out.

5. Motives Behind Hacking: Natalie explains that scammers' endgame is almost always financial gain. They exploit your connections, manipulate your friends, and potentially con them into providing financial assistance or fall for other scams.

6. Protecting Yourself: Natalie offers practical strategies for staying safe online. She emphasizes the importance of using different email addresses for different accounts, as well as employing two-factor authentication for added security. She also highlights the vulnerability of using easily guessable information in your online presence, such as email addresses with birthdays.

7. Course for Comprehensive Protection: As a solution, Natalie introduces her course "Hacked and Hijacked," which equips individuals with the knowledge and tools to protect or recover their accounts from hackers. The course covers major social media platforms and email services, empowering entrepreneurs to safeguard their digital identities.

Conclusion:

Thank you for tuning in to this eye-opening episode of the Six Figure Business Mastery Podcast. With Natalie Berthe's insights, you now have a clearer picture of the risks and vulnerabilities in the online world, as well as actionable steps to enhance your cybersecurity.

As hackers continue to evolve, taking proactive measures is crucial to protect your personal and business-related information. For more resources and to connect with Natalie, be sure to visit Cybersecurity for Humans.

Helpful Links:

The Marketing VA Advantage 

Six Figure Business Coaching 

Mastering Online Marketing for Entrepreneurs

Double Your Income with a Marketing VA, even on a tight budget

#newepisodealert

Transcripts

Speaker:

So Jeanne, would you like to introduce our guest today?

Speaker:

I do.

Speaker:

I'm so excited.

Speaker:

We just touched on some things right before we got live.

Speaker:

We have Natalie Berthe with cybersecurity for humans.

Speaker:

It was really interesting 'cause we were talking about like general

Speaker:

cybersecurity and things that people think that they need.

Speaker:

Nathalie is going to enlighten us on what we actually need.

Speaker:

So I'm gonna tell you a little bit about her.

Speaker:

Her company, they take a people-centered approach to cybersecurity.

Speaker:

They teach people what they need to know to help mitigate the 95%

Speaker:

of cyber breaches that are caused by humans and their bad habits.

Speaker:

We do this in a way that's fun, interesting, accessible, so that regular

Speaker:

humans can understand and apply what they learn, which I can honestly tell you

Speaker:

is so valuable, and so needed because it's a big black hole for some people.

Speaker:

So welcome, Nathalie.

Speaker:

Lovely.

Speaker:

Thank you.

Speaker:

Yay.

Speaker:

So when people think of cybersecurity, they think it's

Speaker:

really complex and expensive.

Speaker:

And to be fair, right?

Speaker:

This is what the industry, like, everyone that's been worried about it

Speaker:

has always worried about the backend.

Speaker:

And so we're like, oh, we've got our McAfee, our Norton Utilities or

Speaker:

whatever running on our computers, and that's all we needed to do.

Speaker:

Past tense, right?

Speaker:

That's all we needed to do.

Speaker:

And so when we think of cyber, it's always separate from us, right?

Speaker:

We've got cyber warfare, we've got cyber this, we've got

Speaker:

cyber that and cyber breaches.

Speaker:

It's all talking about the backside technology side of it.

Speaker:

But the reality is that every study every year that I have looked at for the

Speaker:

last, I don't even know how many years that I've been studying and working in.

Speaker:

As mentioned that the number one problem, the number one

Speaker:

problem is the human element.

Speaker:

Human.

Speaker:

We call it the human factor, the human element, the human errors, right?

Speaker:

It is.

Speaker:

And by number one, that's where the 95% comes from.

Speaker:

It is literally the number one cause.

Speaker:

95% of all breaches can be literally traced back to something

Speaker:

that somebody did or did not do, they shouldn't or should have.

Speaker:

My password, should that be password?

Speaker:

1, 2, 3, 4.

Speaker:

Yeah, that's a big one.

Speaker:

That's a big one.

Speaker:

Like we laugh, right?

Speaker:

Yeah.

Speaker:

So tell us what is the secret to having a very solid password?

Speaker:

Well, the secret is actually is that you don't create them . You don't create them.

Speaker:

Every password needs to be unique and long, and conventional wisdom says at

Speaker:

least, I mean, some will say as few as 8 characters, but, or 12 characters, but

Speaker:

really it should be 16 or more characters.

Speaker:

The random combination of lower and uppercase letters,

Speaker:

numbers, and characters.

Speaker:

And honestly, one of the most frustrating thing is they're like, "use a character".

Speaker:

And you're using a character and they're like, "not that character".

Speaker:

So you use another character and they're like, "Nope, not that character either".

Speaker:

I was like, could you just tell me the characters I need to use?

Speaker:

Right.

Speaker:

Yeah.

Speaker:

And it's hard, right?

Speaker:

Because people wanna remember their passwords so that they

Speaker:

don't have to think about them.

Speaker:

But this is why I recommend that you use a password manager, which

Speaker:

literally manages all of your passwords.

Speaker:

I have, between my kids and me, I probably have, I don't know, 300 plus accounts,

Speaker:

like it's a gazillion accounts, so many, and I don't know any of those passwords

Speaker:

because we always use the password generator and then it gets stored in last

Speaker:

pass, and so I don't have to think about.

Speaker:

That's what we use too.

Speaker:

We recommend it to all of our clients and I probably, we should probably be

Speaker:

talking about not only is this really good for your business, but it saves you time

Speaker:

because you don't have to type anything.

Speaker:

It pops in.

Speaker:

So that's the trick is you don't create them at all and don't use

Speaker:

the browser password manager like Chrome and whatever that saves it.

Speaker:

I would do a third party 'cause that's really how you end up.

Speaker:

You do need several layers of separation just to make it a little

Speaker:

bit more complicated for the bad guys.

Speaker:

Because what I hear from hackers is that if you can stay, unless they really

Speaker:

wanna come after you for some reason, which that's a different issue, right?

Speaker:

That's personal, but I'll explain what the problem would be.

Speaker:

If, for example, you use Chrome, which most of us do, and you have a Gmail

Speaker:

account, which most of us do, and a lot of us keep our Gmail accounts open

Speaker:

because we're constantly going back to them throughout the day because

Speaker:

your Gmail isn't just your Gmail.

Speaker:

Your Gmail opens up everything with Google.

Speaker:

And so what ends up happening is if you start saving things, there's

Speaker:

a dual thing issue going on here.

Speaker:

If you start saving things into your browser, right?

Speaker:

Not only may you be, you might be saving them in the wrong account.

Speaker:

So now you've got separate accounts and I'm like, "oh God, which one did

Speaker:

I put in my password for something?"

Speaker:

But because you have your email open, essentially your browser is open.

Speaker:

And so that now, if somebody wants to, because some of the malware that's

Speaker:

coming down and the ransomware that's coming, well, it's mostly malware

Speaker:

that's coming down, is figuring out how to hide in the browser.

Speaker:

And so even though Google has an actual team that goes out and looks for a

Speaker:

vulnerabilities in different companies and different places, literally

Speaker:

that's what, that's all they do.

Speaker:

It's Google Zero, what they call.

Speaker:

Or something similar to that.

Speaker:

And you know, there's still problems.

Speaker:

So not that long ago, actually, maybe two months ago, they just announced

Speaker:

that North Korea had developed a malware that was targeted to people who studied

Speaker:

North Korea, nuclear disarmament, and anything that might be of interest.

Speaker:

And then they would send really official looking documents and

Speaker:

somebody would click it open and it would go and hide in the browser.

Speaker:

But the way that it was set up is that because it was coming from the

Speaker:

inside, scans would miss it because scans are looking for, scans are

Speaker:

looking out, they're not looking in, and so it hid in a special way.

Speaker:

And so people were having their emails hacked.

Speaker:

and if North Korea is figuring out how to do that, specifically targeting

Speaker:

people that they wanna do, who's to say that somebody else isn't

Speaker:

gonna figure out the same thing?

Speaker:

To just do it generally.

Speaker:

Right.

Speaker:

So we just need to be really careful what we put and where.

Speaker:

Does that make sense?

Speaker:

Yeah.

Speaker:

Am I making sense?

Speaker:

Absolutely.

Speaker:

Yeah.

Speaker:

What would you say would be the second thing that people need to do?

Speaker:

So safe passwords, use LastPass, multifactor authentic.

Speaker:

Oh, absolutely.

Speaker:

Now I'm a fan of LastPass.

Speaker:

We were all talking about LastPass ahead of time.

Speaker:

I found out I had a great conversation with somebody who

Speaker:

does the tech side of this stuff.

Speaker:

But the thing that we wanna do is as many accounts as we

Speaker:

can, do two factor multifactor authentication as we possibly can.

Speaker:

We don't wanna use the LastPass authenticator.

Speaker:

The reason is you don't want somebody to have every access to everything, right?

Speaker:

So this is where I was talking about multiple layers, right?

Speaker:

So you use LastPass and then you use multifactor authentication.

Speaker:

There's a whole bunch of apps that are free.

Speaker:

So instead of going to your sms, your text messages, it goes to this account.

Speaker:

And oftentimes what they do is they'll change the code

Speaker:

every 60 or 30 seconds, right?

Speaker:

So it's really hard to kind of get in there.

Speaker:

But MFA will take care of about 90% of the problems that if somebody is

Speaker:

trying to break into your account.

Speaker:

And then there's so many lots of little things that we can do.

Speaker:

You know, phishing is a really big thing.

Speaker:

Like be careful who your friend online and who you receive emails.

Speaker:

I always tell people, if you're a business person, you need at least 4 emails.

Speaker:

One for your personal stuff, one for your personal junk, and that would

Speaker:

be everything from paying bills and newsletters and all that other stuff.

Speaker:

Sometimes you split it up and then one for business and one for business junk, right?

Speaker:

So for some reason, and one of my accounts all of a sudden just started

Speaker:

getting a ton of like random kind of junk emails about EFPs and crypto and

Speaker:

stocks, and I would unsubscribe, like no one I hadn't subscribed or unsubscribe.

Speaker:

So today I just started blocking them.

Speaker:

Is that a good thing to do?

Speaker:

Yeah, you can.

Speaker:

The problem is that if you actually go through and see they're from, they're

Speaker:

from a whole bunch of different accounts.

Speaker:

So I would keep unsubscribing and blocking them, reporting them

Speaker:

to Gmail or whomever you've got.

Speaker:

Cause there's actually now a, a way that you can do that.

Speaker:

But if you block it, it'll automatically get reported.

Speaker:

And so they'll start filtering out on the other end.

Speaker:

The problem is those guys just keep, they make, you know, cause

Speaker:

it's all done by robots now, right?

Speaker:

Yeah.

Speaker:

So they're making up accounts as fast as you can block them.

Speaker:

But if you don't respond for a certain amount of time, eventually, they'll just

Speaker:

realize that you're not exciting for them.

Speaker:

But I have my junk email address.

Speaker:

The problem is that once it gets onto a breached account,

Speaker:

it's, it's a legitimate email.

Speaker:

And the best way to check on this, is people always get a real kick

Speaker:

out of this, is you go to a website called, "have i been pwned"?

Speaker:

It's H A V E P have I number?

Speaker:

The letter I pond is P W N E D.com and if you go into that and you put in your email

Speaker:

address, you'll see all of the breaches your email address has been involved in.

Speaker:

So what if your work email ends up getting in tons of breaches?

Speaker:

. That's a tough one.

Speaker:

That's one of the reasons that I recommend that people have

Speaker:

multiple work email addresses.

Speaker:

Even if you don't wanna pay the six or eight or whatever,

Speaker:

$10 a month for each one.

Speaker:

So depending on your options, you can just use a regular Gmail account,

Speaker:

you know, that would work as well.

Speaker:

And then you just have to be really patient and just clean it

Speaker:

and make sure, like at that point you unsubscribe with everything.

Speaker:

The other thing that people don't think about is that we should not

Speaker:

be using our primary email address for most of our social media.

Speaker:

It's easier to log in, but social media, um, there are, the problem with a lot of

Speaker:

social media is it's really easy to hack.

Speaker:

Well, Instagram, Facebook, and TikTok get a lot of accounts get hacked because they

Speaker:

have third party apps that are attached.

Speaker:

And what the third party apps do is like, hey, here's, and some of them are

Speaker:

just like fun games and stuff like that.

Speaker:

But some of them feel like they're supposed to be important and they're not.

Speaker:

And so like the real cleanup comes in, remove all those third party apps, right?

Speaker:

Change that email address to just a Gmail account because

Speaker:

you're not checking that account.

Speaker:

And then you can put in passive, and then you put it in LastPass, right?

Speaker:

That says, Hey, all my social media are on this account.

Speaker:

Right?

Speaker:

That's a secure notes for yourself to remember which one has what, and that's

Speaker:

how you end up starting to clean that out.

Speaker:

It's a process.

Speaker:

It's sort of like going through your junk room of 20 years of

Speaker:

stuff in the garage, right?

Speaker:

It's time to start cleaning this shit out.

Speaker:

Yeah.

Speaker:

How often do you recommend changing passwords from

Speaker:

your email and social media?

Speaker:

You don't need to.

Speaker:

It's a fallacy that you need to change them regularly.

Speaker:

LastPass recommends about once a year.

Speaker:

Okay, that seems fair, but I don't always change it once a year.

Speaker:

But there, there are a couple times you really, really wanna change it.

Speaker:

As soon as you find out that your email address has been involved in a breach

Speaker:

with that account, that account should get the password changed right away.

Speaker:

For example, They're two good examples.

Speaker:

Like DoorDash got hit this summer, Twitter, DoorDash, they were

Speaker:

all getting hit this summer.

Speaker:

And if even though they didn't get away with a whole lot of stuff, I would say

Speaker:

you changed the password just in case.

Speaker:

Right.

Speaker:

The guy who, or the person who broke into Uber, I don't know

Speaker:

if you heard about that breach.

Speaker:

The guy he breached.

Speaker:

He or she?

Speaker:

They?

Speaker:

I'll just use they.

Speaker:

used breach Uber and they literally managed to get into

Speaker:

the hard coded section of Uber.

Speaker:

They could have taken care, they could have taken over everything.

Speaker:

There hasn't been an announcement that they actually stole anything.

Speaker:

And considering that they broke in, figure out how to get through everything, and

Speaker:

then announced themselves on the employee slack channel that they had broken.

Speaker:

And what Uber did, is it because it was hard coded into their system, was

Speaker:

essentially when this person broke in, it was like they had the master key to every

Speaker:

door of every building that Uber had.

Speaker:

Wow.

Speaker:

It was major for that reason because there should have been several firewalls.

Speaker:

My favorite is this person, the hacker actually, also managed to take control

Speaker:

of hacker one, which is what people when, so what a lot of these large

Speaker:

companies will do is they'll pay money for what they call bounty money for when

Speaker:

somebody finds a breach or a problem.

Speaker:

And so it says, "Hey, we didn't know about this vulnerability.

Speaker:

We're gonna pay you for it."

Speaker:

And some of these pay thousands and thousands of dollars.

Speaker:

Right, because these are breaches that could potentially

Speaker:

cost the company millions.

Speaker:

Yeah.

Speaker:

He took that one over too like he literally had everything.

Speaker:

Wow.

Speaker:

Okay.

Speaker:

Wow.

Speaker:

So is there a, like a central place that lists all the breaches that happen?

Speaker:

Or right now the best thing to do, just check your email address?

Speaker:

Well, that actually, that website has a lot of stuff that's going on.

Speaker:

There are some websites that are listing them.

Speaker:

The problem is that there are so many, and some of them are just small.

Speaker:

Like if you've had somebody ransomware your computer, right?

Speaker:

And let's say that you've had a thousand clients over the last 10

Speaker:

years, that's technically a breach.

Speaker:

They've breached your system, right?

Speaker:

Depending on where your clients are, you are required by law to inform them

Speaker:

that your computer's been breached.

Speaker:

The truth of the matter is that most small businesses would never

Speaker:

do that because they know that their reputation is at stake.

Speaker:

Do I really wanna be doing business with somebody?

Speaker:

Do you wanna do business with me?

Speaker:

If I have to tell you that my accounts have been hacked, right?

Speaker:

Even if it's my, even if it's my bank accounts, right?

Speaker:

If you can't even manage to keep your bank accounts safe,

Speaker:

then what about the rest of it?

Speaker:

There's just a huge stigma on that.

Speaker:

55% of Americans said that they would not do business with a company

Speaker:

that has been breached, although I doubt that's actually true.

Speaker:

But it's what they say.

Speaker:

So are Macs or PCs different in the way that they, security wise.

Speaker:

So that's a really interesting question because everybody assumes

Speaker:

that being on a Mac is so much safer.

Speaker:

And when you're talking about viruses, it really was for a very long time

Speaker:

because viruses, they like to track in through whatever you're doing and start

Speaker:

hitting up the operating system and there were not as many Macs as there are PCs.

Speaker:

So everybody, just like the hackers, if you really wanna be, be a big

Speaker:

slash, you're gonna go for the biggest opportunity to make something a hot mess.

Speaker:

And then Linux is another one that's also had problems.

Speaker:

But the fact of the matter is that all, everything now has problems that maybe

Speaker:

still there's, it's outweighed towards pc.

Speaker:

The bigger issue today, like we still all have to worry about viruses.

Speaker:

But that's not the number one issue.

Speaker:

The number one issue is actually phishing.

Speaker:

And that doesn't matter whether you have a PC or an Apple

Speaker:

because you have invited them in.

Speaker:

Right.

Speaker:

How does that work?

Speaker:

What is phishing?

Speaker:

Phishing is when a somebody sends something.

Speaker:

I send you something, you didn't ask for it, and it's a fake link.

Speaker:

It's like you click open, either an attachment or there's a link

Speaker:

that sends you to a page that you think is legitimate but isn't.

Speaker:

So say for example, you have an account with Bank of America and Bank of America

Speaker:

says, "Hey, you've been breached.

Speaker:

You need to go and change your information.

Speaker:

Here's the link."

Speaker:

and you click on the link and you go to the page and the

Speaker:

page looks totally different.

Speaker:

I mean, so the exact same thing as you would go in.

Speaker:

So you go in and you start changing information.

Speaker:

What you didn't notice is that it says Bank on America, because you

Speaker:

quickly looked at that it looked, it looked almost exactly the same.

Speaker:

Right?

Speaker:

Yeah.

Speaker:

And so that's what the phishing does.

Speaker:

It starts collecting information or stealing things, and sometimes it

Speaker:

adds ransomware to your computer, which then freezes it all up.

Speaker:

It says, "Hey, you have to pay X amount of dollars in cryptocurrency

Speaker:

before you know we release it."

Speaker:

Although apparently the ransomware people out there.

Speaker:

they've gotten very polite and they're now giving people time to collect the

Speaker:

money because the ransoms are much, much bigger than they used to be.

Speaker:

Right?

Speaker:

Like we won't even tell anybody that we did this if you just give us the money.

Speaker:

The problem is that everybody is getting involved and this is what people don't

Speaker:

understand, but is everybody involved?

Speaker:

Governments organized crime, hugely involved.

Speaker:

It is way easier, way cheaper, and much more profitable to do

Speaker:

ransomware and cyber attacks than it is trying to get drugs over the over

Speaker:

country lines and sex trafficking.

Speaker:

Right?

Speaker:

That's still happening cuz there's a demand, but it's ways easier to hire a

Speaker:

bunch of out of unemployed hackers to just go start stealing money from people.

Speaker:

Why not?

Speaker:

Right?

Speaker:

Mm-hmm.

Speaker:

So, yeah, so everybody's involved in it and it's a really, really big thing.

Speaker:

It's like, don't even take it personally, they're just coming after me.

Speaker:

A person.

Speaker:

Yeah.

Speaker:

Right.

Speaker:

So I guess my next question was about credit cards.

Speaker:

Yes.

Speaker:

So whether it is, if you're a business owner and you're getting someone to

Speaker:

buy something and you're like, oh, well give me your credit card number,

Speaker:

you're gonna repeat that number.

Speaker:

And what happens is if you have Alexa or what app your phone's listening, or

Speaker:

even you, you give your, your credit card information to someone over the phone.

Speaker:

So what kind of security issues does that entail?

Speaker:

Well, you mentioned them all, like those are some of the big things.

Speaker:

And the theory is that, well, it's Alexa, that Alexa's not gonna be Alexa.

Speaker:

Alexa's listening to everything.

Speaker:

Right?

Speaker:

I am not a fan of the Alexa, Echo, kind of thing.

Speaker:

I can press the extra button on my computer if I really want.

Speaker:

On my phone, if I really wanna listen to music.

Speaker:

I think it's Stripe made the announcement that they are going to up

Speaker:

the charges for, they used to do this, but then they stopped for a while.

Speaker:

like all of them.

Speaker:

If I manually enter a credit card versus if you put in the credit card.

Speaker:

So for example, when I work with people, I don't take their credit cards and

Speaker:

everyone's like, and every coach is like, you should take the credit cards, make

Speaker:

sure that you're getting paid, right.

Speaker:

Oh, no, I will not do that.

Speaker:

I'm going to send them an invoice and I'm happy to stay on the, you know,

Speaker:

my invoice is ready to go while I'm on the phone with them and I will send it

Speaker:

to them and I will wait the extra five minutes for them to go, oh yeah, I got it.

Speaker:

Paying it right now.

Speaker:

Here it is.

Speaker:

Yes.

Speaker:

But I haven't had a problem with anybody doing that.

Speaker:

But then this way I never touched their credit card.

Speaker:

Exactly.

Speaker:

I don't see it.

Speaker:

Yeah.

Speaker:

A lot of companies will now offer one-time credit card numbers.

Speaker:

I know Amex does it.

Speaker:

I'm pretty sure City Bank does it.

Speaker:

Like everybody wants to be able to do that because if there is fraud,

Speaker:

they're the ones who were out and it is a multi-billion dollar problem.

Speaker:

We do the same thing.

Speaker:

We send an invoice and I know that everybody out here is like, while you've

Speaker:

got 'em on the phone and you solved their problem and they're excited,

Speaker:

take their credit card information.

Speaker:

Well, my background is mortgage, and I'm like, do you know

Speaker:

how much liability you have?

Speaker:

I mean, you know, if they, if they're hacked, they can blame it on you.

Speaker:

Well, I use my credit card since I gave it to you, and now then

Speaker:

I've got all these expenses.

Speaker:

Or again, you, all these devices in people's homes are listening.

Speaker:

And so I just feel like it's such a big risk.

Speaker:

So everything for us is either, through a PayPal invoice or a Stripe invoice,

Speaker:

because we don't even wanna be able to see their credit card information

Speaker:

in the back end of our software.

Speaker:

Sure.

Speaker:

We want that layer of protection for them and for us.

Speaker:

Right?

Speaker:

Absolutely.

Speaker:

Absolutely.

Speaker:

I completely agree with that.

Speaker:

It's a, it's an interesting problem, but it's a problem nonetheless.

Speaker:

Yeah.

Speaker:

Um, and we just have to like, if someone's just not gonna pay you,

Speaker:

they're just not gonna pay you.

Speaker:

You just not kind of need to suck it up.

Speaker:

But the fact of the matter is, most of us are not certified as PCI compliant, right?

Speaker:

So we should actually have no physical records of their credit card numbers.

Speaker:

Yeah, my, the whole Alexa thing and Echo breaks my heart 'cause I love the idea of

Speaker:

it and the technology behind it and just asking Alexa to play this or turn that

Speaker:

up or turn that down, it's terrifying.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

And I think about all the security systems that people are putting into their houses.

Speaker:

I don't think any of that would make me feel safer.

Speaker:

I think it would make me feel less.

Speaker:

Like the doorbell thing and all that's wireless.

Speaker:

You have issues with all of that?

Speaker:

Well, there's several problems with that.

Speaker:

Have you heard of the term IOT or Internet of Things?

Speaker:

Mm-hmm.

Speaker:

? I have not.

Speaker:

Okay.

Speaker:

So this is, this is one of the things I really like to do and why I like to

Speaker:

talk about cybersecurity is because IOT sounds really complicated.

Speaker:

Internet of things.

Speaker:

It was like I, you know, I thought it was a lot more complicated than it was.

Speaker:

It turns out it's simply everything that's connected to the internet,

Speaker:

that's not your computer.

Speaker:

Right?

Speaker:

So that could be your coffee maker that you press a button

Speaker:

that says, Hey, you're ready.

Speaker:

I'm ready.

Speaker:

I'm upstairs in my bedroom, start making my coffee.

Speaker:

So it's done by the time I come downstairs to your alarm system to Echo and

Speaker:

Alexa and all of those things, that's all called the Internet of things.

Speaker:

And what happens is that most people do not change the factory settings

Speaker:

for the internet of things, which is what makes them vulnerable.

Speaker:

And so they don't even change the factory settings on their routers.

Speaker:

They're like, well, my router says it's got this really

Speaker:

great complicated password.

Speaker:

Yeah.

Speaker:

But anybody who comes by can take a picture of that.

Speaker:

And now you've got someone who can use your router as they want to, or they'll

Speaker:

put in their thing, Hey, Smith home.

Speaker:

No, you don't Put Smith home on the, the name of the router.

Speaker:

One of the things we wanna do is that we have people coming to our home and they're

Speaker:

like, "Hey, can they use your wifi?"

Speaker:

Always set up a separate network.

Speaker:

If you've got kids, strongly recommend that you set up the separate network

Speaker:

and they use the guest one, especially if you're working from home.

Speaker:

So I heard the phishing things happens more on my cell phone

Speaker:

than it does in my email.

Speaker:

That's new.

Speaker:

That's actually called smishing.

Speaker:

There's whalephishing, smishing, and phishing, phishing is P H I S H I N G.

Speaker:

And so and so there's catfishing and phising.

Speaker:

And there's whalephishing and spearphishing.

Speaker:

Spearphishing is someone's going after someone, specifically whalephishing, is

Speaker:

trying to get somebody who's like really rich or super influential for some reason.

Speaker:

The Smishing is the newest, latest craze.

Speaker:

I get it all the time.

Speaker:

I get a ton from Amazon, but of course, if you look at it, it is not actually

Speaker:

from Amazon, and they call it Smishing because it comes through s m s.

Speaker:

Yes, that's new.

Speaker:

That's a new thing.

Speaker:

You know, making sure that you're getting rid of emails that you don't think are

Speaker:

secure, changing your email addresses using LastPass, these are all things

Speaker:

that, like you said, it's a process.

Speaker:

But if you start now, each time you implement something, you're

Speaker:

just making yourself safer and safer and safer from having issues.

Speaker:

And I think as a business owner, we have so much to worry about.

Speaker:

It's nice to know that you're doing all that you can do to keep everything else.

Speaker:

If you've got good security, that's actually a competitive advantage.

Speaker:

I was talking to a friend of mine who owns a large accounting firm here in DC.

Speaker:

And he was like, most of my peers don't do this, so is there an easy way I'm

Speaker:

hoping to go into Chrome and just go into passwords and just delete everything.

Speaker:

When you go into the little, you hit the three little dots on the side,

Speaker:

and then I think it's going on to.

Speaker:

Settings.

Speaker:

Yeah, you go to help.

Speaker:

And then if you go to privacy and security, and that's gonna be a list

Speaker:

to clear your browsing security.

Speaker:

And I think one of these has the website, the passwords in it, and then you can

Speaker:

see it and you can see the ones and make sure they have it in LastPass.

Speaker:

And then you can ask Google to stop asking and Chrome to stop asking you to save it.

Speaker:

You should do it on your phone too.

Speaker:

Excellent.

Speaker:

Great.

Speaker:

This has been amazing.

Speaker:

I am so excited that you are our guest here.

Speaker:

Thank you.

Speaker:

I'm hoping you'll come back and have this conversation with us again next

Speaker:

year, because I feel like Yeah, I do.

Speaker:

It's so important.

Speaker:

It's something that we constantly need to always be conscious of and

Speaker:

then always look to improve on.

Speaker:

Yeah, absolutely.

Speaker:

Absolutely it is.

Speaker:

It is only going to get worse.

Speaker:

Yeah.

Speaker:

And people just don't think it's that big of a deal.

Speaker:

But I actually was kind of joking, but it wasn't really like, how much money

Speaker:

have you lost because you're spending time having to fix it over because people

Speaker:

are not going to do business with you.

Speaker:

Maybe there's business that you can't do, so now you have to refund people.

Speaker:

You start adding all that stuff up and all of a sudden, even my business

Speaker:

that's not making a lot of money is worth a hell of a lot more to me

Speaker:

than what it is for other people.

Speaker:

Right.

Speaker:

And what's so tragic about all of this is that when my stuff, like it

Speaker:

takes hours and hours and hours of time for me to clean up a mess and

Speaker:

you know, somebody is picking it up for free or for pennies on the dollar,

Speaker:

on the black, on the black market.

Speaker:

Right.

Speaker:

You know, and you're sort of going on the on the dark web and

Speaker:

going, damn, like I'm only worth.

Speaker:

3 cents . It's so tragic.

Speaker:

So well, we so appreciate you sharing all these amazing tips and ideas and

Speaker:

smart ways to just stay safe online and.

Speaker:

Like she said, do it now because you're gonna be a lot safer, you

Speaker:

know, in the upcoming months and years when things change a little bit.

Speaker:

So special thanks to Natalie.

Follow

Links

Chapters

Video

More from YouTube