Check out our companion blog!
Sept. 2, 2024

Fostering a Culture of Cybersecurity with Training

In this important episode of The Backup Wrap-Up, we delve into the world of cybersecurity training. We explore why effective training is crucial in today's digital landscape and how to implement a comprehensive program that goes beyond just ticking boxes. From creating robust cybersecurity policies to conducting engaging, frequent training sessions, we cover it all.

Learn why rewarding vigilance is more effective than punishing mistakes, and how to foster a security-aware culture in your organization. We discuss the importance of relevant, interactive training methods, including simulated phishing tests, and how to train users to spot suspicious activity beyond just phishing attempts. Whether you're an IT professional or a business owner, this episode provides valuable insights to enhance your cybersecurity training efforts and strengthen your organization's digital defenses.

Transcript

Speaker:

Welcome to the show.

 

 


Speaker:

Before I continue, if I could ask you to click the follow or subscribe

 

 


Speaker:

button, that would be great.

 

 


Speaker:

So you'll always get this content.

 

 


Speaker:

Hi, I'm w Curtis Preston, AKA, Mr.

 

 


Speaker:

Backup, and with me, I have my new office chair, comfortability consultant

 

 


Speaker:

Prasanna Malaiyandi, how's it going?

 

 


Speaker:

Persona.

 

 


Speaker:

I am a little worried.

 

 


Speaker:

I'm doing well,

 

 


Speaker:

have, you know, you know what's happening.

 

 


Speaker:

Well, first off, we have to say this is a, this is a monumental

 

 


Speaker:

moment for in, in multiple,

 

 


Speaker:

yeah.

 

 


Speaker:

Multiple ways.

 

 


Speaker:

Yeah.

 

 


Speaker:

right?

 

 


Speaker:

So I am sitting here in my new home office, not quite a

 

 


Speaker:

hundred percent put together.

 

 


Speaker:

I have my shelf behind me.

 

 


Speaker:

Not quite.

 

 


Speaker:

It's not if you look closely, if, if you have a high def.

 

 


Speaker:

There's no screw in that little screw hole.

 

 


Speaker:

So if I, if I get a, um, if I get a little earthquake, that thing's coming right over

 

 


Speaker:

and, uh, there's no artwork behind me.

 

 


Speaker:

But, um, uh,

 

 


Speaker:

so I'm not quite

 

 


Speaker:

It's a work in progress.

 

 


Speaker:

work in progress, but more importantly, to the moment I'm sitting in my new.

 

 


Speaker:

Steelcase chair provided by Crandall office furniture and

 

 


Speaker:

no, they're not a sponsor.

 

 


Speaker:

Sounds like they're a sponsor.

 

 


Speaker:

Uh, so I have to say, and I, and, and, and it's a very nice chair.

 

 


Speaker:

I'm not sure I like it.

 

 


Speaker:

The

 

 


Speaker:

I haven't told you this.

 

 


Speaker:

I hope it's okay that I, I, I've been, um, I, I think, I think I made the mistake.

 

 


Speaker:

I, I, I never thought that like I could buy a, a chair as expensive,

 

 


Speaker:

that ex as expensive as this, and then not like how it feels on my body.

 

 


Speaker:

Um,

 

 


Speaker:

Chairs are very subjective.

 

 


Speaker:

yeah, I'm thinking about, uh, do you know what Turfing is?

 

 


Speaker:

Mm.

 

 


Speaker:

Turfing is where you go to a store so that you can try this

 

 


Speaker:

stuff and then you buy it online.

 

 


Speaker:

So I'm thinking of turfing.

 

 


Speaker:

Um, I need to go, I, I've already looked up where there's a showroom where I can

 

 


Speaker:

go actually feel the, the office chairs.

 

 


Speaker:

Also, I, again, if I'm spending this kind of money for a chair, maybe I

 

 


Speaker:

should have done a little research.

 

 


Speaker:

I just pick like top of the line.

 

 


Speaker:

Everybody's like, oh yeah, get this.

 

 


Speaker:

One of the, you know, uh, but there's definitely some things

 

 


Speaker:

about it that I don't like.

 

 


Speaker:

Uh, and I'm not sure if it's just a matter of getting used to it,

 

 


Speaker:

uh, or.

 

 


Speaker:

Uh, well, or that, that's what I'm saying.

 

 


Speaker:

Um, I, I, I think I've been, I, I, I definitely understand

 

 


Speaker:

what the adjustments are, right?

 

 


Speaker:

I watched videos on the, on what the different adjustments are.

 

 


Speaker:

Uh, it just seems more like really wanting to push me up here rather

 

 


Speaker:

than a little bit farther back.

 

 


Speaker:

Um, that

 

 


Speaker:

I think there's an adjustment for that.

 

 


Speaker:

there, there

 

 


Speaker:

May I,

 

 


Speaker:

may, I may.

 

 


Speaker:

I recommend before, so I think you should still go turfing, but highly

 

 


Speaker:

recommend giving Crandall a call

 

 


Speaker:

Oh,

 

 


Speaker:

I'm going to, I'm going

 

 


Speaker:

their customer,

 

 


Speaker:

service is amazing.

 

 


Speaker:

okay.

 

 


Speaker:

And just

 

 


Speaker:

gonna call 'em and go.

 

 


Speaker:

I don't know if I like this, by the way.

 

 


Speaker:

They do have a return.

 

 


Speaker:

They do

 

 


Speaker:

have a return policy.

 

 


Speaker:

make sure you don't throw out your box.

 

 


Speaker:

yeah, I don't think I have yet.

 

 


Speaker:

You don't think?

 

 


Speaker:

I don't think.

 

 


Speaker:

I don't think it, uh, you may recall.

 

 


Speaker:

It's been a rough couple of days in the Preston household.

 

 


Speaker:

Yes.

 

 


Speaker:

And oh, I thought you were also gonna mention we got a chance to hang out in

 

 


Speaker:

oh, what, wow.

 

 


Speaker:

How can I,

 

 


Speaker:

how can I bury the lead the first time in what?

 

 


Speaker:

It's been a long time,

 

 


Speaker:

right?

 

 


Speaker:

since we've seen each other

 

 


Speaker:

Yeah.

 

 


Speaker:

Yeah.

 

 


Speaker:

Well, but,

 

 


Speaker:

Maybe a bit less.

 

 


Speaker:

This is the

 

 


Speaker:

first time that either of us have ever been to the other person's house,

 

 


Speaker:

Yes.

 

 


Speaker:

right?

 

 


Speaker:

And seeing each other for more than like a meal.

 

 


Speaker:

right.

 

 


Speaker:

And uh, the first time our wives have met,

 

 


Speaker:

Yep.

 

 


Speaker:

our wives can now swap stories.

 

 


Speaker:

Luckily they did not swap cell phone numbers, I don't think 'cause that could.

 

 


Speaker:

That could be, that could be problematic.

 

 


Speaker:

uh,

 

 


Speaker:

no, it was, it was very cool to have you down here and to host you and

 

 


Speaker:

drive you around and show you all

 

 


Speaker:

the cool, well, not many of the cool San Diego things.

 

 


Speaker:

What, what do you, what do you think was the highlight?

 

 


Speaker:

The,

 

 


Speaker:

the brisket.

 

 


Speaker:

you know, I, I just had a piece of that brisket just like, uh,

 

 


Speaker:

just a few minutes ago.

 

 


Speaker:

The brisket was amazing.

 

 


Speaker:

I also did like Balboa Park and the organ concert.

 

 


Speaker:

That was pretty awesome.

 

 


Speaker:

yeah.

 

 


Speaker:

Very unique situation, right?

 

 


Speaker:

The world's largest outdoor instrument,

 

 


Speaker:

period.

 

 


Speaker:

I thought it was just the world's largest outdoor pipe organ, but it they, they call

 

 


Speaker:

it the world's largest outdoor instrument.

 

 


Speaker:

I.

 

 


Speaker:

So I was talking to a colleague, uh, earlier this morning telling her

 

 


Speaker:

about my trip, and uh, she was saying that she thinks that the largest

 

 


Speaker:

indoor organ is in Philadelphia

 

 


Speaker:

Hmm.

 

 


Speaker:

at a Macy's.

 

 


Speaker:

Oh, really?

 

 


Speaker:

Yeah.

 

 


Speaker:

That's interesting.

 

 


Speaker:

That's interesting.

 

 


Speaker:

I think, can we agree that, uh, the bel, that the Oregon Pavilion of Balboa

 

 


Speaker:

Park has got to be better than that?

 

 


Speaker:

Macy's, I.

 

 


Speaker:

Oh, definitely.

 

 


Speaker:

Yeah.

 

 


Speaker:

Especially on that sunny day.

 

 


Speaker:

It was, it was actually a little too sunny.

 

 


Speaker:

I had to get a, I had to rent one of those umbrellas

 

 


Speaker:

and you moved over into the shade.

 

 


Speaker:

It was a

 

 


Speaker:

little

 

 


Speaker:

toasty.

 

 


Speaker:

Yeah.

 

 


Speaker:

But it was a great concert.

 

 


Speaker:

An hour, if you're ever in San Diego at Balboa Park every Sunday at

 

 


Speaker:

2:00 PM it's a free organ concert.

 

 


Speaker:

Yeah.

 

 


Speaker:

And uh, the highlight of that concert for me was the.

 

 


Speaker:

Um, the player, what would you call 'em?

 

 


Speaker:

The mu what would you call 'em?

 

 


Speaker:

The organ players.

 

 


Speaker:

The organ players rendition of Bohemian Rhapsody

 

 


Speaker:

on, on a, on,

 

 


Speaker:

an organ.

 

 


Speaker:

It's pretty amazing.

 

 


Speaker:

I mean, it's amazing that they're playing both in, you know, music

 

 


Speaker:

that was made in the 16 hundreds and music that's made in the, in the

 

 


Speaker:

19 hundreds on the same, uh, instrument.

 

 


Speaker:

And it was just, just absolutely amazing.

 

 


Speaker:

Um, so on to, to just go way down from that.

 

 


Speaker:

We need to talk about, um, security awareness training.

 

 


Speaker:

Now we mean cybersecurity awareness, right?

 

 


Speaker:

Not just, uh, but it's interesting, the, there is more, there is more to

 

 


Speaker:

cybersecurity than the cyber part.

 

 


Speaker:

There's also the physical aspect, right?

 

 


Speaker:

Um, and so I wanted to just talk about that.

 

 


Speaker:

We talk about that quite a bit and I know that we, I'm, I'm pretty sure we

 

 


Speaker:

touched on it in the last episode, that.

 

 


Speaker:

You know, it, it is part of, we, we, we, we've, we've covered on, in

 

 


Speaker:

this, in this series on protecting your environment from ransomware.

 

 


Speaker:

We talked about, uh, in the last few episodes, some of the things

 

 


Speaker:

that you can do or some of the things I think that you should do.

 

 


Speaker:

To basically wipe out about 90, 95% of the ransomware.

 

 


Speaker:

Right.

 

 


Speaker:

We, we talked about those things, those things that you should do.

 

 


Speaker:

We've moved on from the things that you kind of like have to do.

 

 


Speaker:

I mean, if you don't, if you don't have a patch management system, if you don't

 

 


Speaker:

have password management, if you don't, uh, you know, and if you don't Yeah.

 

 


Speaker:

If you don't have MFA, don't even talk to me.

 

 


Speaker:

If you don't have MFA and you get attacked.

 

 


Speaker:

It's just, it's like you're killing me.

 

 


Speaker:

Right?

 

 


Speaker:

Um, but we, we've moved on into things that you, you should do.

 

 


Speaker:

Right.

 

 


Speaker:

Um, and I do think that training of the, you know, the users in your environment,

 

 


Speaker:

not just the users, the admins as well, because we could be just as dumb as the,

 

 


Speaker:

the average, you know,

 

 


Speaker:

but, but let's be honest that probably 90% of cyber incidences

 

 


Speaker:

are probably from users.

 

 


Speaker:

Yes.

 

 


Speaker:

And as I often say, it is a weird thing that there's only

 

 


Speaker:

two industries in the world that refer to their customers as users,

 

 


Speaker:

Oh, Curtis,

 

 


Speaker:

us and the drug dealers.

 

 


Speaker:

But anyway, um, a agreed right.

 

 


Speaker:

But having said that though, when the admins mess up.

 

 


Speaker:

it's a much bigger problem.

 

 


Speaker:

I, I I draw you to, wasn't it, was it, was it Okta?

 

 


Speaker:

Which one?

 

 


Speaker:

Which one was the event where It was a backup script that, where they had the,

 

 


Speaker:

the passwords hard coded in there and then the, the person was able to get in.

 

 


Speaker:

They got

 

 


Speaker:

That was, no, that was one pass, right?

 

 


Speaker:

Or last

 

 


Speaker:

was that was that last pass.

 

 


Speaker:

Mm-Hmm.

 

 


Speaker:

With the bolts?

 

 


Speaker:

Yeah.

 

 


Speaker:

right.

 

 


Speaker:

Oh, right.

 

 


Speaker:

It was the vault.

 

 


Speaker:

Yeah.

 

 


Speaker:

So, so what I was gonna say was it may be less often that an admin messes up,

 

 


Speaker:

but when an admin messes up, they really

 

 


Speaker:

mess up

 

 


Speaker:

especially with the exec.

 

 


Speaker:

Yeah.

 

 


Speaker:

Their privileges and.

 

 


Speaker:

Yeah.

 

 


Speaker:

Yeah, exactly.

 

 


Speaker:

Um, so any, any further overview thoughts before we sort of head down the, you know.

 

 


Speaker:

Uh, I think before we head down, I know most users hate.

 

 


Speaker:

Security awareness training, they probably are like, oh, why are we doing this?

 

 


Speaker:

And I can't blame them because for the most part, everything

 

 


Speaker:

is sort of very abstract, right?

 

 


Speaker:

It's like, oh, read.

 

 


Speaker:

It's almost like reading like contracts, right?

 

 


Speaker:

It's like, oh, read this, and it doesn't really seem applicable.

 

 


Speaker:

I would say the one thing is you need to keep the business safe

 

 


Speaker:

and the company safe, so everyone should be going through training.

 

 


Speaker:

Right.

 

 


Speaker:

And then the other thing is I think we'll talk about it as well.

 

 


Speaker:

There are more modern training techniques that can be used that doesn't

 

 


Speaker:

have to make it so boring for users.

 

 


Speaker:

Yeah, I, I'd say minimize the, minimize the boringness.

 

 


Speaker:

I don't know if that's a word.

 

 


Speaker:

Right.

 

 


Speaker:

Um, minimize the time, the level of effort needed for, you know, somebody to

 

 


Speaker:

go through their cybersecurity training.

 

 


Speaker:

Um, and, and, and we, I know we've talked about this before.

 

 


Speaker:

I'm a strong proponent of minimizing any or, or removing any, um,

 

 


Speaker:

penalties for, um, res, accidentally responding to a fake phishing attack.

 

 


Speaker:

Right?

 

 


Speaker:

or or a real phishing

 

 


Speaker:

attack, right?

 

 


Speaker:

So, yeah, so just, you know, fake or real phishing attack.

 

 


Speaker:

And, and why, why do I say that?

 

 


Speaker:

Besides, besides just morale?

 

 


Speaker:

Why, why do

 

 


Speaker:

I say that?

 

 


Speaker:

Because you want your users to step forward and say, Hey, I think I might

 

 


Speaker:

have done something I shouldn't have.

 

 


Speaker:

So then it can actually start figuring it out quickly.

 

 


Speaker:

Okay, what is our response?

 

 


Speaker:

Was it an issue?

 

 


Speaker:

And start logging things down rather than waiting till everything blows up.

 

 


Speaker:

Yeah.

 

 


Speaker:

And if you have a sort of a, a culture of fear,

 

 


Speaker:

uh, that isn't gonna happen, right?

 

 


Speaker:

So, um, so I, I, I'd say, um.

 

 


Speaker:

You know, the, the first thing is, is, is that I think that

 

 


Speaker:

we need to start with a policy.

 

 


Speaker:

We, we talk a lot in other, in other parts of the world, is that we have

 

 


Speaker:

to start with a policy that a lot of you, you, you know, you can't, you

 

 


Speaker:

can't get in trouble for breaking rules if the rules don't exist.

 

 


Speaker:

Right?

 

 


Speaker:

And, um, and not everybody is going to agree on what a cybersecurity policy is.

 

 


Speaker:

Or what should be in a cybersecurity, cybersecurity, policy?

 

 


Speaker:

Um, so I would think things like, um, two basic password management ideas of like

 

 


Speaker:

strength of passwords and, and frequency of changes and things like that would

 

 


Speaker:

be in a, in a, a cybersecurity policy.

 

 


Speaker:

I would think those would be sort of foremost.

 

 


Speaker:

What else do you think would be in there?

 

 


Speaker:

I think things around sort of use of devices or other things like that.

 

 


Speaker:

Potentially even, can I use external devices with my laptop?

 

 


Speaker:

Right.

 

 


Speaker:

Uh, other things include VPNs, right?

 

 


Speaker:

Secure communications.

 

 


Speaker:

Right, right.

 

 


Speaker:

Yeah.

 

 


Speaker:

You must use, when doing these things, you must be on the VPN, um, when

 

 


Speaker:

doing these things or when you know.

 

 


Speaker:

Um, perhaps you're a company, and again, this is a whole other

 

 


Speaker:

discussion point, but there is this concept of mobile device management,

 

 


Speaker:

right?

 

 


Speaker:

So it's very common these days for everybody to have a smartphone and then

 

 


Speaker:

your company wants to allow you to use your smartphone on the company network,

 

 


Speaker:

but they decide to do so via an MDM solution so that they can basically.

 

 


Speaker:

Create a VM within your phone that, that,

 

 


Speaker:

um, they can firewall off all the Yeah.

 

 


Speaker:

Sandbox.

 

 


Speaker:

Yeah.

 

 


Speaker:

That's a good, that's a better, they can create a sandbox within your

 

 


Speaker:

phone so that, um, number one, the corporate data doesn't get spread

 

 


Speaker:

out to the other parts of your phone.

 

 


Speaker:

And number two.

 

 


Speaker:

If and when you part ways, boom and uh, that, that stuff goes away, right?

 

 


Speaker:

So again, you, that starts with a policy of like, if you're using corporate, you

 

 


Speaker:

know, resources, you need to, you know, use our MDM solution, whatever it is.

 

 


Speaker:

If that's your policy, uh, can you think of anything else that you would

 

 


Speaker:

wanna put in a policy like that?

 

 


Speaker:

I got a good one.

 

 


Speaker:

Do what?

 

 


Speaker:

You have to go to training,

 

 


Speaker:

Oh yeah.

 

 


Speaker:

And it has to be within a certain amount of time.

 

 


Speaker:

Otherwise you lose access to resources.

 

 


Speaker:

Yeah.

 

 


Speaker:

Whatever you decided.

 

 


Speaker:

I, I would, I would suggest smaller increments of training or smaller,

 

 


Speaker:

smaller amounts of training over shorter, uh, periods of time.

 

 


Speaker:

Right.

 

 


Speaker:

Five, five minutes.

 

 


Speaker:

Five minutes a week, uh, 15 minutes a month, something like that.

 

 


Speaker:

Whatever it is, it's something, something that's, I, I think that, I think that the

 

 


Speaker:

frequency of cyber awareness training is possibly more important than the intensity

 

 


Speaker:

and the value.

 

 


Speaker:

Just continually reminding your, your users that, um, you know.

 

 


Speaker:

That there are bad people out there that are trying to steal everything we

 

 


Speaker:

have in in our company as we know it.

 

 


Speaker:

Yeah.

 

 


Speaker:

And also making it relevant to the current times.

 

 


Speaker:

For example, maybe with everyone working remote, it doesn't make sense

 

 


Speaker:

to talk about physical security.

 

 


Speaker:

Right?

 

 


Speaker:

Right.

 

 


Speaker:

And so talking about things like, Hey, maybe we should be

 

 


Speaker:

talking more and focusing more on phishing because everyone's

 

 


Speaker:

remote, or other aspects like that.

 

 


Speaker:

Right.

 

 


Speaker:

What, what sort of goes into the next, uh, thing was that, that if you're,

 

 


Speaker:

you're going to be doing cyber awareness training, or I'm sorry, if you're

 

 


Speaker:

going to be doing security awareness training, you, you wanna make sure

 

 


Speaker:

that it relates to the people that are, you know, that work for you.

 

 


Speaker:

And if, like you said, if it's a, if it's a hundred percent remote workforce, you

 

 


Speaker:

don't necessarily wanna focus so much on, well, so let me, let me argue with you.

 

 


Speaker:

You wanna focus on one element to physical security.

 

 


Speaker:

What would that be?

 

 


Speaker:

I.

 

 


Speaker:

Uh, watching people looking over your shoulder at your laptop screen.

 

 


Speaker:

Uh, no, you're a remote.

 

 


Speaker:

You're a remote.

 

 


Speaker:

Well, okay.

 

 


Speaker:

Yeah.

 

 


Speaker:

I guess if you're a Starbucks.

 

 


Speaker:

If you're at a

 

 


Speaker:

Starbucks, yes.

 

 


Speaker:

Physical security of your

 

 


Speaker:

physical?

 

 


Speaker:

Yeah.

 

 


Speaker:

Physical security of your devices.

 

 


Speaker:

Right?

 

 


Speaker:

Uh, a surprising number.

 

 


Speaker:

I saw a statistic.

 

 


Speaker:

Just a little while ago as I was researching for this episode,

 

 


Speaker:

a surprising, a significantly high percentage of, of, um, uh,

 

 


Speaker:

breaches are due to stolen devices.

 

 


Speaker:

Um,

 

 


Speaker:

I remember a prior employer, I'm not gonna say which one.

 

 


Speaker:

Um, they had their payroll stuff on a laptop in an employee's

 

 


Speaker:

car, and they lost the laptop.

 

 


Speaker:

Yeah, that was not good.

 

 


Speaker:

Oopsies.

 

 


Speaker:

Yeah.

 

 


Speaker:

And so, yeah, so by the way, back to the policy, right?

 

 


Speaker:

Um, policy, if you're going to use your device on our network, your

 

 


Speaker:

device needs to have a password.

 

 


Speaker:

You need device D step, you know, we suggest, we

 

 


Speaker:

strongly suggest the following security, uh, protocols on your Yeah, yeah, yeah.

 

 


Speaker:

A full device, full disc encryption on a laptop is a very good idea.

 

 


Speaker:

Exactly.

 

 


Speaker:

Um, I was thinking more like a, like a smart device, right?

 

 


Speaker:

Because it,

 

 


Speaker:

it's very easy to configure your, to configure your smartphone

 

 


Speaker:

in a very insecure way.

 

 


Speaker:

And if that smartphone, especially if you're not forcing an MDM solution.

 

 


Speaker:

Right.

 

 


Speaker:

Like, like my, you know, right now if, if I, once I'm in my phone, there's

 

 


Speaker:

very little security inside, right?

 

 


Speaker:

Outlook's there.

 

 


Speaker:

I'm writing Outlook, right?

 

 


Speaker:

I click on Outlook and next thing I know I'm in OneDrive.

 

 


Speaker:

Right?

 

 


Speaker:

Um, so I, you know, I need to have strong security on the front end.

 

 


Speaker:

Um,

 

 


Speaker:

And most companies, right?

 

 


Speaker:

They'll say, Hey, if you want to use Outlook or whatever else, it requires

 

 


Speaker:

a six digit pass device passcode, or something else like that to protect the.

 

 


Speaker:

Right.

 

 


Speaker:

Right.

 

 


Speaker:

Um, so we talked about, um, we talked about doing regulars,

 

 


Speaker:

uh, security awareness training.

 

 


Speaker:

Um, how do, what kinds of things would you train the customers on?

 

 


Speaker:

Users.

 

 


Speaker:

Uh, so I would, so what sort of thing?

 

 


Speaker:

So I think the top thing to train them on is fishing.

 

 


Speaker:

I was gonna say that's the top six things to train them on.

 

 


Speaker:

It's troop.

 

 


Speaker:

Yeah.

 

 


Speaker:

like the, it's like the three rules of real estate, right?

 

 


Speaker:

Uh,

 

 


Speaker:

location, location, location.

 

 


Speaker:

Yeah, exactly Right.

 

 


Speaker:

It's phishing, you know, phishing and password security.

 

 


Speaker:

Right?

 

 


Speaker:

Because, because I, I don't know if it's like 50 50.

 

 


Speaker:

But I, I actually think that stolen credentials is the most common.

 

 


Speaker:

Right.

 

 


Speaker:

Um, and then so, so

 

 


Speaker:

But,

 

 


Speaker:

phishing

 

 


Speaker:

Yeah, go ahead.

 

 


Speaker:

but I think stolen credentials,

 

 


Speaker:

you

 

 


Speaker:

usually from the end user.

 

 


Speaker:

well, it's

 

 


Speaker:

I didn't mean

 

 


Speaker:

to

 

 


Speaker:

finish your sentence.

 

 


Speaker:

no, no.

 

 


Speaker:

It's, it's probably not from the end user, but it's also that with password

 

 


Speaker:

policies requiring, sort of changing it periodically, having in place

 

 


Speaker:

certain criteria, I think it's helps.

 

 


Speaker:

I.

 

 


Speaker:

Reduce the risk of like credential stuffing for corporate end users.

 

 


Speaker:

I do agree for like admins and system level, like uh, root accounts and things

 

 


Speaker:

like that, you do need that ability.

 

 


Speaker:

I was thinking more phishing because it's harder to protect

 

 


Speaker:

against phishing, I would say, than the password management aspects.

 

 


Speaker:

Agreed.

 

 


Speaker:

Right.

 

 


Speaker:

Um, phishing is, you know, especially when we, when we look at

 

 


Speaker:

things like spear phishing, right.

 

 


Speaker:

Um, the, the thing about phishing, I think the, this is, this is what

 

 


Speaker:

I was referring to when I was saying that I think the frequency of the

 

 


Speaker:

training is even more important than the quality of the training.

 

 


Speaker:

Is that you, you just want to continually always in your head, every time you

 

 


Speaker:

look at, before you click on anything,

 

 


Speaker:

before you click on anything, right?

 

 


Speaker:

It doesn't matter who it's from even,

 

 


Speaker:

right?

 

 


Speaker:

Um, before you click on anything, you hover over that thing and then you see.

 

 


Speaker:

Now, as soon as I say that, by the way, there are attacks that, that, that

 

 


Speaker:

can actually do things When you hover.

 

 


Speaker:

Um, without even clicking on it, but, um, we gotta, we

 

 


Speaker:

gotta stop what we can stop,

 

 


Speaker:

Yeah, or asking yourself, is this something I expected?

 

 


Speaker:

right?

 

 


Speaker:

Is this something I expected?

 

 


Speaker:

Uh, does this URL match?

 

 


Speaker:

Is,

 

 


Speaker:

does it, is it got that sense of urgency?

 

 


Speaker:

That's the big one, right?

 

 


Speaker:

Is

 

 


Speaker:

it, is it got this sense of urgency?

 

 


Speaker:

Am I being, am I being asked to do something out of the norm?

 

 


Speaker:

I think that's a really big one.

 

 


Speaker:

Am I being asked to do something out of the norm?

 

 


Speaker:

And, and a great example of that, I, I don't remember which

 

 


Speaker:

of our previous experts came on.

 

 


Speaker:

Uh, and by the way, if you haven't listened a few, uh, at this

 

 


Speaker:

point, it's like four or five

 

 


Speaker:

episodes ago, uh, either the, the red team or the blue team, uh, folks, um,

 

 


Speaker:

that there, there was a story of the boss.

 

 


Speaker:

That sent, or the, the employee that got an email from allegedly,

 

 


Speaker:

uh, from the boss asking him to do a, a big transfer.

 

 


Speaker:

And, and it wasn't the boss.

 

 


Speaker:

Right.

 

 


Speaker:

And, um, the, and they didn't, they, they followed up.

 

 


Speaker:

They, they, they, they, they made sure that it was the, that it was the boss.

 

 


Speaker:

But they used the same channel

 

 


Speaker:

to reply.

 

 


Speaker:

Right.

 

 


Speaker:

They used email.

 

 


Speaker:

Uh, is this really you?

 

 


Speaker:

Yes.

 

 


Speaker:

It's really me.

 

 


Speaker:

Instead of like

 

 


Speaker:

going through some other channel.

 

 


Speaker:

Right.

 

 


Speaker:

yeah, and I know we're talking about phishing, but what's even scarier are some

 

 


Speaker:

of the deep fakes that are being used.

 

 


Speaker:

I don't know if you heard about someone who had created a video

 

 


Speaker:

conferencing meeting and pretended to be the CFO and asked for the funds

 

 


Speaker:

to be wired, and the person wired it and it was millions of dollars.

 

 


Speaker:

I think it was like $22 million or something.

 

 


Speaker:

Yeah, I do remember that one.

 

 


Speaker:

Yeah.

 

 


Speaker:

That's only gonna get more common.

 

 


Speaker:

Yeah,

 

 


Speaker:

so, and again, you establish policy, right?

 

 


Speaker:

We

 

 


Speaker:

don't do wire transfers except under these circumstances.

 

 


Speaker:

Um, and, um, you know,

 

 


Speaker:

Or verify through a alternate channel.

 

 


Speaker:

yeah.

 

 


Speaker:

Yeah.

 

 


Speaker:

Um, like, it's like, I would think that it would be perfectly reasonable

 

 


Speaker:

to establish a rule that says we never do wire transfers except.

 

 


Speaker:

Under these circumstances, right?

 

 


Speaker:

It's gonna be a, like, if we're not, if we're remote, it's more challenging.

 

 


Speaker:

The,

 

 


Speaker:

the more remote you are, the more hackable you are, but, but it would,

 

 


Speaker:

in many cases it would be very possible for, to say, we will never do a wire

 

 


Speaker:

transfer without a face-to-face meeting a

 

 


Speaker:

new wire transfer.

 

 


Speaker:

Right.

 

 


Speaker:

Um, and yeah, and, and, and you can establish things like a, a keyword, right?

 

 


Speaker:

Um, that that is basically a, you know, it's a, it's a,

 

 


Speaker:

it's a, it's a shared secret.

 

 


Speaker:

It's, it's, it's better.

 

 


Speaker:

It's, it falls into the better than nothing category.

 

 


Speaker:

Right.

 

 


Speaker:

Um, but that's something that we're gonna have to do in this world of

 

 


Speaker:

deep fakes where you, where you live, in a world where you can

 

 


Speaker:

definitely get a phone call at this

 

 


Speaker:

point, you can definitely get, I mean, you and me, our voices are out there.

 

 


Speaker:

There's plenty enough, uh, software that would, that would mimic our voices.

 

 


Speaker:

Um, and so there's that going on, right?

 

 


Speaker:

So you just, I think this is why we're, what we're talking about is

 

 


Speaker:

security awareness, making people aware that these things exist, making

 

 


Speaker:

people understand that just because you got a phone call from somebody

 

 


Speaker:

that sounds like your boss, doesn't mean that your boss is calling you.

 

 


Speaker:

It could very well be somebody sitting there typing at a keyboard

 

 


Speaker:

with

 

 


Speaker:

And generating the voice.

 

 


Speaker:

I.

 

 


Speaker:

Based on what?

 

 


Speaker:

Yeah, I, I,

 

 


Speaker:

It's like all the TV shows used to be right.

 

 


Speaker:

it's like all the TV shows.

 

 


Speaker:

Yeah.

 

 


Speaker:

It's freaky, freaky geeky stuff.

 

 


Speaker:

Um, yeah, I think phishing, uh, yeah, Phish, like I said, phishing,

 

 


Speaker:

phishing, phishing, phishing.

 

 


Speaker:

Um, and, um, because that is going to be the number one way that I think a

 

 


Speaker:

typical attacker is going to get in.

 

 


Speaker:

And then you, you doubly train that with, for anyone with a, um, you

 

 


Speaker:

know, an elevated account, right.

 

 


Speaker:

I would also say another common thing, and I think that this

 

 


Speaker:

happened with OBSA while ago.

 

 


Speaker:

Right where someone hijacked Google search results.

 

 


Speaker:

So if you search for OBS, which is one of the recording software, it

 

 


Speaker:

would actually give you a bad link, which would then download malware.

 

 


Speaker:

So make sure you train your users on how to use search results as well.

 

 


Speaker:

Don't always expect phishing to be via email, right?

 

 


Speaker:

Also, make sure that you are being responsible with results that come from

 

 


Speaker:

the web or any other untrusted source.

 

 


Speaker:

Right, exactly.

 

 


Speaker:

Um, so let's talk about some of the resources of, um, that we can use there.

 

 


Speaker:

There are a lot of resources online.

 

 


Speaker:

Uh, I mean, if you just type free security awareness training,

 

 


Speaker:

you will get a plethora.

 

 


Speaker:

I.

 

 


Speaker:

Of, you know, things are stuff from the FTC, uh, you know, there's

 

 


Speaker:

a center for internet security.

 

 


Speaker:

The, uh, nist,

 

 


Speaker:

uh, has a, has a list of a bunch of either free or on, uh, low cost training.

 

 


Speaker:

Um, you know, there's a bunch of things out there.

 

 


Speaker:

And then of course there's companies, uh, like the ones

 

 


Speaker:

that we talked about earlier.

 

 


Speaker:

You want to cover those?

 

 


Speaker:

Yeah, so there's companies that.

 

 


Speaker:

Do not only training, so videos and interactive things, but

 

 


Speaker:

also test you along the way.

 

 


Speaker:

So they generate fake phishing emails, testing your knowledge, and are like, Hey,

 

 


Speaker:

can you identify a phishing attack or not?

 

 


Speaker:

Because they'd rather have you fail that and do additional training

 

 


Speaker:

rather than having you actually click a real phishing email.

 

 


Speaker:

So there are companies like know before there's also Hawks Hunt, right?

 

 


Speaker:

So there are a bunch of these that are are out there, which are used for both

 

 


Speaker:

the training as well as the ongoing real world scenario stuff as well.

 

 


Speaker:

Yeah.

 

 


Speaker:

And, and, and I like that.

 

 


Speaker:

I like the idea of, of ongoing, uh, training and ongoing testing.

 

 


Speaker:

And again, I'm gonna reiterate this, it's ongoing testing without penalty,

 

 


Speaker:

right?

 

 


Speaker:

You re you do the opposite.

 

 


Speaker:

It's, it's

 

 


Speaker:

There's no scarlet letter on you.

 

 


Speaker:

There's no scar.

 

 


Speaker:

That's a big C for click.

 

 


Speaker:

I clicked, I clicked on the thing I was supposed to click on.

 

 


Speaker:

Um, you, you reward the people who report that.

 

 


Speaker:

That's how you can really do it, right.

 

 


Speaker:

Honestly, a monetary award.

 

 


Speaker:

Maybe if it's not a monetary, maybe it's a best fisher finder.

 

 


Speaker:

Of the month, you know that the PPFM phishing finder of the month, right?

 

 


Speaker:

Recognize people who consistently recognize phishing attacks and then report

 

 


Speaker:

them to the appropriate authorities.

 

 


Speaker:

Right.

 

 


Speaker:

Don't do the opposite.

 

 


Speaker:

I, I'm thinking all the way back to, um, there was this, my first.

 

 


Speaker:

The company, I can bag on 'em.

 

 


Speaker:

'cause they, they, they don't exist anymore as a company.

 

 


Speaker:

This was MBNA.

 

 


Speaker:

A few of you listening, listening I know actually know me from my MBNA

 

 


Speaker:

days, which was, you know, entire

 

 


Speaker:

Long time ago.

 

 


Speaker:

Yeah.

 

 


Speaker:

long time ago.

 

 


Speaker:

And we, um, I was in the IT department and when you're in the

 

 


Speaker:

IT department, you were actually, uh, the only way they could pay you.

 

 


Speaker:

Good enough as they made you an officer at the bank and when they made you an

 

 


Speaker:

officer at the bank, you were subject to this monthly thing that we had to do,

 

 


Speaker:

which was, um, you had to do, um, you had to sit on the phones for customer

 

 


Speaker:

support for four hours a month and answer.

 

 


Speaker:

We were credit card company answer tech support calls from

 

 


Speaker:

regular Joe with a credit card.

 

 


Speaker:

They're standard at Street Corner.

 

 


Speaker:

Can't figure out how to make a, make a credit card purchase.

 

 


Speaker:

Right.

 

 


Speaker:

And it was, that was an amazing, like an amazing decision.

 

 


Speaker:

Um, there, there were a couple things they did that were, were really good

 

 


Speaker:

and take from this what you want.

 

 


Speaker:

And then I'll tell, I'll tell you the part that was really bad.

 

 


Speaker:

One is, it was an amazing way to connect all management.

 

 


Speaker:

All upper level employees with the customer.

 

 


Speaker:

Their phrase was, think of yourself as a customer.

 

 


Speaker:

Um, and, um, the, so, so that was great.

 

 


Speaker:

This other thing that they did was they evaluated every department.

 

 


Speaker:

They, they created standards for every department, and they were

 

 


Speaker:

metrics that you, that, that were followed and calculated and.

 

 


Speaker:

They then put a batch of money into, uh, they put, they put money

 

 


Speaker:

into a fund that got paid out as a bonus at the end of every

 

 


Speaker:

quarter.

 

 


Speaker:

And the amount of money that got put in for your department, it was a, it was a

 

 


Speaker:

bonus for everybody, but every department contributed to the, to the budget based on

 

 


Speaker:

how well they met their metric of the month.

 

 


Speaker:

Hmm.

 

 


Speaker:

for example, I was it, ours was uptime, right?

 

 


Speaker:

And so as long as we were a hundred percent uptime, everything's fine.

 

 


Speaker:

But if we had downtime and then we were like, you know, 97% for

 

 


Speaker:

the month, everybody hates us.

 

 


Speaker:

Because, because, you

 

 


Speaker:

know, they're losing money.

 

 


Speaker:

Yeah, yeah.

 

 


Speaker:

Uh, so that I thought was actually a, you know, it was a little bit of, a

 

 


Speaker:

lot of carrot, a little bit of stick.

 

 


Speaker:

But here's the thing that they did that was absolutely horrible.

 

 


Speaker:

If you, um, if you got behind on your, um, your, it was called a tax duty.

 

 


Speaker:

I don't telephone access, customer support, TACS tax.

 

 


Speaker:

If you got behind on your tax duty, you went on a spreadsheet, you, you, an email

 

 


Speaker:

would come out if you were a habitual.

 

 


Speaker:

Uh, and I'm likening this to the cybersecurity training

 

 


Speaker:

if you were a habitual,

 

 


Speaker:

um.

 

 


Speaker:

Delinquent.

 

 


Speaker:

Delinquent.

 

 


Speaker:

Exactly.

 

 


Speaker:

There was this fishbowl that everybody walked down.

 

 


Speaker:

There's a hall and and long glass thing, and that's where

 

 


Speaker:

the, the the, you know, the

 

 


Speaker:

customer support people sat, they would, those who were habitual tax delinquents

 

 


Speaker:

were made, uh, dun caps, right?

 

 


Speaker:

Big tall

 

 


Speaker:

Oh no.

 

 


Speaker:

They were, they were.

 

 


Speaker:

And it put tax Ds on the, on the, on the DS cap.

 

 


Speaker:

And then you had to sit there and make up your time.

 

 


Speaker:

By the way, it was like taxes, you know, TA death and taxes was

 

 


Speaker:

like that.

 

 


Speaker:

You never got behind.

 

 


Speaker:

If you got behind.

 

 


Speaker:

You pretty much worked for the customer support department until you were.

 

 


Speaker:

You know, caught

 

 


Speaker:

up.

 

 


Speaker:

It was much more, much more stick than carrot.

 

 


Speaker:

That's not what we want here, right?

 

 


Speaker:

We don't want to be hanging out.

 

 


Speaker:

We don't want to be the list of the top four bad clickers of the week.

 

 


Speaker:

We don't want that.

 

 


Speaker:

We don't want people getting yelled at by their bosses because they clicked.

 

 


Speaker:

Now obviously if you're, you are a continual bad clicker,

 

 


Speaker:

you just can't seem to get it.

 

 


Speaker:

Yeah, perhaps you need some additional training and if

 

 


Speaker:

then you, you know, that person needs to just honestly be let go.

 

 


Speaker:

Right.

 

 


Speaker:

But, but the average everyday person that occasionally clicks on a bad link,

 

 


Speaker:

um, it does not need to be reprimanded.

 

 


Speaker:

Right.

 

 


Speaker:

Um, they need to be rewarded when they don't.

 

 


Speaker:

Uh, and when they, when they, when they correctly identify

 

 


Speaker:

something as phishing, I.

 

 


Speaker:

And I feel really strongly about that because, because, because of what you

 

 


Speaker:

said earlier, what you want is you want that person to, um, when they screw up

 

 


Speaker:

for real, you want them to immediately contact, I think I just clicked on a bad

 

 


Speaker:

link.

 

 


Speaker:

And to have you and to, and to have them hope.

 

 


Speaker:

It was,

 

 


Speaker:

it was a fake bad link.

 

 


Speaker:

You're right, you're right.

 

 


Speaker:

It's a fake bad link.

 

 


Speaker:

You're okay.

 

 


Speaker:

Or if it's not a fake bad link, then let, let the cyber, let the cyber team

 

 


Speaker:

go to work on and look at whatever it is.

 

 


Speaker:

You just, you know, basically firewall off your, uh, you know, thing.

 

 


Speaker:

And I, I just, I got up on a soapbox there for a few minutes.

 

 


Speaker:

I

 

 


Speaker:

No, that's okay.

 

 


Speaker:

I know you feel strongly about this subject and I.

 

 


Speaker:

I think it's harder to get the average user to understand security, and so

 

 


Speaker:

if you keep beating them with the stick, they're not gonna be willing to

 

 


Speaker:

step up when things go wrong, right?

 

 


Speaker:

That's the wrong approach,

 

 


Speaker:

Agreed.

 

 


Speaker:

Agreed.

 

 


Speaker:

Yeah.

 

 


Speaker:

Um, go ahead.

 

 


Speaker:

One thing I did wanna talk about is, uh, I know we talked about policies earlier

 

 


Speaker:

for security, but I think another thing is making sure your policies, that

 

 


Speaker:

you're actually following the policies.

 

 


Speaker:

All.

 

 


Speaker:

Uh, sometimes you do have those policies like, hey, make sure you are rotating

 

 


Speaker:

passwords or other things, but don't exclude people from those because those

 

 


Speaker:

policies are created for a reason.

 

 


Speaker:

Uh, the reason I bring this up is, I don't know if you heard about this recent, uh,

 

 


Speaker:

healthcare hack that happened about, uh, in April, but there was a healthcare chain

 

 


Speaker:

in Pennsylvania that lost the records of something like a million patients.

 

 


Speaker:

And it turns out what ended up happening was an employee for their IT provider

 

 


Speaker:

who they had outsourced to a Microsoft subsidiary, had fired an employee

 

 


Speaker:

and had not removed their access,

 

 


Speaker:

and so the employee then broke into this healthcare provider and stole

 

 


Speaker:

the records of a million patients.

 

 


Speaker:

Because they did not follow their

 

 


Speaker:

maybe we should add that to the list of like three things.

 

 


Speaker:

A, a departing employee,

 

 


Speaker:

Yeah.

 

 


Speaker:

uh, policy.

 

 


Speaker:

Yeah.

 

 


Speaker:

Yeah.

 

 


Speaker:

that is important, right?

 

 


Speaker:

And so you have to follow your

 

 


Speaker:

Yeah.

 

 


Speaker:

You know, it's funny, one of my favorite stories, and I know you,

 

 


Speaker:

you, I know you've heard me tell

 

 


Speaker:

because you've referenced it, was the bank that I worked for realizing that it

 

 


Speaker:

didn't have a departing employee policy.

 

 


Speaker:

Well, it's, it's departing employee policy was delete you outta the password file.

 

 


Speaker:

That that was, that was easy, right?

 

 


Speaker:

What it didn't have was it didn't have a policy of getting rid of that user's data.

 

 


Speaker:

Right.

 

 


Speaker:

And it was the, it was that step that caused all the, the thing which,

 

 


Speaker:

and for those that haven't heard it, a, a good friend of mine was hired

 

 


Speaker:

as a consultant and she was, she was, she was told go through the,

 

 


Speaker:

um, it was like home one Curtis.

 

 


Speaker:

Right.

 

 


Speaker:

And then look in the password file.

 

 


Speaker:

Is there a username?

 

 


Speaker:

You know, I'm at home one Curtis.

 

 


Speaker:

Is there a password named Curtis?

 

 


Speaker:

Great.

 

 


Speaker:

Go on to the next

 

 


Speaker:

directory.

 

 


Speaker:

But the problem was she didn't notice before she turned on her script

 

 


Speaker:

that it was home one slash a slash Aaron home one slash b slash Billy.

 

 


Speaker:

And so she went, she just followed her way down and she go home one slash a.

 

 


Speaker:

Is there a username?

 

 


Speaker:

A no.

 

 


Speaker:

Okay.

 

 


Speaker:

Delete the

 

 


Speaker:

directory A.

 

 


Speaker:

yeah.

 

 


Speaker:

Which deleted all

 

 


Speaker:

a policy.

 

 


Speaker:

Have, automate the policy as much as you can, test that

 

 


Speaker:

automation to make sure that it

 

 


Speaker:

doesn't doesn't go kill people.

 

 


Speaker:

Um,

 

 


Speaker:

then have auditing.

 

 


Speaker:

And then have auditing.

 

 


Speaker:

Exactly.

 

 


Speaker:

Um, and I'm gonna say finally is, is, is, you know, we, you know, we talked about

 

 


Speaker:

how to, how to spot phishing, but just in general, if you can have your users.

 

 


Speaker:

Just be aware of what suspicious activity might be.

 

 


Speaker:

Not just phishing, but things like new apps popping up that

 

 


Speaker:

you've never seen before, right?

 

 


Speaker:

New popups popping up.

 

 


Speaker:

Your machine makes weird noises or sounds or behaves differently.

 

 


Speaker:

When you shut it

 

 


Speaker:

Camera turns off, auto turns on randomly, or the

 

 


Speaker:

turns on automatically, right?

 

 


Speaker:

Absolutely terrifying for many people, right?

 

 


Speaker:

Um, and, uh, yeah.

 

 


Speaker:

Or did you lose control?

 

 


Speaker:

Of the mouse or the keyboard, or did, did you?

 

 


Speaker:

You know, I think I saw my mouse moving around without

 

 


Speaker:

it's possessed.

 

 


Speaker:

It's possessed.

 

 


Speaker:

I came into work and my screensaver was off.

 

 


Speaker:

It, you know, it's early morning in my house.

 

 


Speaker:

My laptop was, you know, uh, supposedly asleep for the night and I came

 

 


Speaker:

and my, my screensaver was not off, trained them to look for weird things.

 

 


Speaker:

I think, I think, uh, you know, you've met my wife now.

 

 


Speaker:

I think I've met, I think I've successfully trained her to

 

 


Speaker:

spot things like that because

 

 


Speaker:

she will definitely call me up.

 

 


Speaker:

Right.

 

 


Speaker:

And go, I, this, this thing is doing this thing thing.

 

 


Speaker:

Is this okay?

 

 


Speaker:

And I'm like, yeah, it's okay.

 

 


Speaker:

Uh, today, uh, it's funny today she just sent me a text just a couple hours ago

 

 


Speaker:

and she said, Hey, I got a text and it said, Hey, um, you know, da da da da.

 

 


Speaker:

So it was one of the sell your home things,

 

 


Speaker:

right?

 

 


Speaker:

And said, at what price?

 

 


Speaker:

Uh.

 

 


Speaker:

Would you be comfortable selling your home?

 

 


Speaker:

And and she said, so what should we say?

 

 


Speaker:

10 million?

 

 


Speaker:

I'm like, yeah, 10 million, 10 million's.

 

 


Speaker:

Good.

 

 


Speaker:

If somebody wants to pay 10 million for the house, uh, that'll be enough for me.

 

 


Speaker:

Yeah.

 

 


Speaker:

Yeah.

 

 


Speaker:

But more than anything, like you said, it's just getting them

 

 


Speaker:

used to seeing what's different.

 

 


Speaker:

And it's okay.

 

 


Speaker:

Like I do the same thing with my dad.

 

 


Speaker:

He'll be like, Hey, is this email legit?

 

 


Speaker:

And I'm like, no, it's spam.

 

 


Speaker:

But I'm okay with the fact that he's asking, is this okay or not, rather than

 

 


Speaker:

just trying to figure it out on his own.

 

 


Speaker:

Yeah, exactly.

 

 


Speaker:

And the ones that I think get untrained users are the

 

 


Speaker:

ones that sound really scary.

 

 


Speaker:

Right.

 

 


Speaker:

The ones where it's like, you know, we're about to shut off your water.

 

 


Speaker:

We're, you know, we're gonna, we're gonna,

 

 


Speaker:

You have a warrant out for your arrest?

 

 


Speaker:

Yeah.

 

 


Speaker:

You have a warrant out for your arrest.

 

 


Speaker:

Exactly.

 

 


Speaker:

All that scary stuff, they fall for that stuff.

 

 


Speaker:

And it's like, that's not how the IRS works, man.

 

 


Speaker:

Um, if the IRS wants you, like that, the IRS has shown up at your door, that's all

 

 


Speaker:

I'm saying.

 

 


Speaker:

The IRS knows where you're at.

 

 


Speaker:

Yeah.

 

 


Speaker:

Uh, if there's one, if there's one group of, there's one group of people

 

 


Speaker:

that I got to be a little too familiar with, it was the IRS, the IRS.

 

 


Speaker:

Trust me, the IRS knows exactly where you are.

 

 


Speaker:

Doesn't need to send you an email.

 

 


Speaker:

Uh, any final thoughts on security awareness training?

 

 


Speaker:

No, I think, like you said, have a policy.

 

 


Speaker:

Do training for users, including ongoing training, and don't penalize users either

 

 


Speaker:

for doing the wrong thing or if it's a real or a fake, uh, phishing attack.

 

 


Speaker:

Yeah,

 

 


Speaker:

and just one other final thought on that, by the way, also.

 

 


Speaker:

Don't have them be one of these really cruel ones that you hear about.

 

 


Speaker:

We had, we had one, the, the one where the guy's wife got a thing

 

 


Speaker:

that said, um, it was the, it was like on Valentine's Day and

 

 


Speaker:

everybody got a thing that said that there were flowers downstairs for them.

 

 


Speaker:

Um, and she immediately, no.

 

 


Speaker:

It was, they said it was, um, edible, an edible

 

 


Speaker:

arrangement and that they just needed to click here to, to verify there, whatever.

 

 


Speaker:

And, and he's like, my wife knew there was no way I'm spending a

 

 


Speaker:

hundred dollars on, on a little thing.

 

 


Speaker:

He is like, there were two reasons why she knew it was, was, uh, phishing, right?

 

 


Speaker:

Uh, and one of them was that, but don't do that.

 

 


Speaker:

Don't be that company

 

 


Speaker:

that you know,

 

 


Speaker:

that I remember what he.

 

 


Speaker:

I remember what he said was, uh, for, for just a moment, everybody in that

 

 


Speaker:

company thought that someone loved him.

 

 


Speaker:

Don't be that person.

 

 


Speaker:

Oh yeah.

 

 


Speaker:

Don't be cruel.

 

 


Speaker:

too don't be cruel to a heart.

 

 


Speaker:

That's true.

 

 


Speaker:

Okay.

 

 


Speaker:

That's Elvis Presley.

 

 


Speaker:

Really nothing.

 

 


Speaker:

got nothing, nothing.

 

 


Speaker:

be cruel to a heart.

 

 


Speaker:

That's true.

 

 


Speaker:

It's your employee that loves you very much.

 

 


Speaker:

Well, maybe a little bit don't be mean to him.

 

 


Speaker:

That's all I'm saying.

 

 


Speaker:

Well thanks for having chat about security awareness training my friend.

 

 


Speaker:

No, this was fun and I do miss a brisket.

 

 


Speaker:

Uh, there's, there's still some in the fridge.

 

 


Speaker:

Can you sort of send it this way virtually?

 

 


Speaker:

I'll, I'll, I'll fax you a picture.

 

 


Speaker:

All right.

 

 


Speaker:

Uh, thanks for, uh, listening again, folks, and again, please, please click,

 

 


Speaker:

uh, follow or subscribe so that you will have us with you at all times.

 

 


Speaker:

That is a wrap.