Podchaser Logo
Home
Week in Review: New York Times theft, Club Penguin hack, NHS wants blood

Week in Review: New York Times theft, Club Penguin hack, NHS wants blood

Released Friday, 14th June 2024
Good episode? Give it some love!
Week in Review: New York Times theft, Club Penguin hack, NHS wants blood

Week in Review: New York Times theft, Club Penguin hack, NHS wants blood

Week in Review: New York Times theft, Club Penguin hack, NHS wants blood

Week in Review: New York Times theft, Club Penguin hack, NHS wants blood

Friday, 14th June 2024
Good episode? Give it some love!
Rate Episode

Episode Transcript

Transcripts are displayed as originally observed. Some content, including advertisements may have changed.

Use Ctrl + F to search

0:00

From the CISO series, it's

0:02

cybersecurity headlines. New

0:08

York Times source code stolen using

0:10

exposed GitHub token, angry

0:12

club penguin hackers allegedly steal Disney

0:15

data, and NHS out for

0:17

blood after a cyber attack. These

0:19

are some of the stories that my colleagues and

0:21

I have selected from this past week's cybersecurity headlines,

0:24

much like a skilled arborist. We're

0:26

pruning, we're supporting, we're encouraging, we're roping

0:28

things off, we've made it all nice

0:30

and tidy. Now for some insight, opinion,

0:32

and expertise from our returning guest, Janet

0:34

Hines, the CISO over at ChenMed. Janet,

0:36

thank you so much for being here.

0:38

It was a thrill to have you

0:41

on last time. So happy to have

0:43

you back for this week's news. Thanks

0:45

for inviting me. I'm very happy to be here. Can't

0:48

wait to dive in. But yet

0:50

we must wait because we have to thank

0:52

our sponsor for today, Vanta, compliance

0:54

that doesn't suck too much. Now before we

0:57

jump into the news, remember, we are on

0:59

YouTube live. It is a video platform. I

1:01

guess if you're not familiar with the site,

1:03

youtube.com, be sure to check it out. You

1:05

can also check out CISO series.com, hit the

1:08

events drop down and look for the cybersecurity

1:10

headlines week in review image. Click on that.

1:12

You'll also be able to watch us there.

1:14

And if you're there, you can contribute comments

1:16

in our chat. We love to

1:18

get your questions. We love to get

1:20

your opinions on stuff, even challenging what

1:22

we're saying as long as it's constructive and

1:25

in a good spirit. We love to

1:27

have it. So thanks to everyone that shows

1:29

up each and every week. I already

1:31

see CCL making everybody feel welcome. Always good

1:33

to have folks there. So without further

1:35

ado, let's get into the news. First up

1:38

here, the New York Times source code

1:40

stolen using exposed GitHub token. The

1:42

announcement reads basically all source code belonging to the

1:44

New York Times company, 270 gigabytes. That

1:47

was the headline to an ad placed on

1:49

a 4chan forum post, referring to data stolen

1:51

from the New York Times GitHub repositories in

1:54

January 2024. Stolen

1:56

data included IT documentation, infrastructure tools

1:58

and source code. allegedly

2:01

including the always popular

2:03

wordle. Later this week, we

2:05

also found out it contains the PII for

2:07

an unnamed number of video freelancers who had

2:09

worked for the news outlet. The

2:12

Times described the incident as when

2:14

a credential to a cloud-based third-party

2:16

code platform was inadvertently made public,

2:18

which also sounds like a horrible

2:20

setup for a rom-com. So Janet,

2:22

it seems that a great deal

2:24

of data is being inadvertently made

2:26

available through GitHub repositories. That's the

2:28

point of a repository to make

2:30

data available and readily accessible. I'm

2:32

curious from your perspective, why does

2:34

this continue to happen, especially from

2:37

presumably someone we would think is

2:42

a large company, The York Times is a big giant company,

2:44

and should companies and organizations tighten up

2:47

their procedures around GitHub? So

2:51

first of all, I think that my, maybe

2:53

now that I found out that wordle was part

2:55

of that, I hope my first word guess isn't

2:57

exposed to everybody. I

2:59

play wordle every day. But

3:01

seriously, having your code

3:04

base exposed or stolen is very

3:06

significant to any company. And

3:08

I think the word inadvertently is sort

3:10

of a common theme, right? Nobody's

3:12

really, well, not nobody, but most

3:14

people aren't looking to just say, here, here's

3:17

access to everything. So

3:19

certainly secure software

3:21

development lifecycle, securing

3:24

the keys and the ability to

3:28

get into these repositories is really important. I

3:30

think some of this inadvertently

3:32

comes from convenience

3:35

and kind of that we've always done it this way and

3:38

not really not understanding the true

3:40

impact of some of these kind of

3:43

conveniences that have been used in the

3:45

past and probably should be stopped. We've

3:48

certainly seen GitHub and kind of Microsoft

3:50

in general Trying

3:53

to at least perception wise to double down

3:55

on security, the other whole, secure by Design

3:57

initiative GitHub. Part of Microsoft, certainly part of

3:59

that. I am true. So

4:01

it seems like we've moved beyond

4:04

a little bit. V. Very

4:06

calm and eight of us bucket left exposed

4:08

unencrypted. You know, sitting up in it at

4:10

this still sorry so crop up fights. It

4:12

seems like we're having a similar kind of

4:14

moment now with get up of that that

4:16

kind of becoming the next version of that

4:18

Is this? just? ah you know we have.

4:21

We have procedures waiting to catch up to

4:23

use cases. In this case. I

4:26

think so. An alpha thing said that it's

4:28

the same. Stuff

4:30

different. Platform frame israeli the out

4:33

of the exposure of somewhere whether it

4:35

out s three buckets wary of probably

4:37

and asleep pretty easy because once ever

4:39

discovered that people didn't really. Say

4:41

understand how to configure them Riots in

4:43

are more by right I mean it's

4:45

Care. Manner A was gone after and

4:47

now they're finding these other places that

4:50

have similar vulnerabilities that the well that

4:52

and you know it's. A someone a

4:54

plan for some sporting out of his

4:56

make. April's. Someone.

4:58

Else pointed out wrong name's yeah would get

5:00

lab same thing. It's not like my point

5:02

is not just a particular thing being targeted,

5:05

it's it's hey where. Can we go to

5:07

get that information and and maybe the securities

5:09

acetate. And. Of. The

5:11

Zebra that Cecilia appreciate that just such

5:14

as to get up issues or does

5:16

that mean of the biggest fisher in

5:18

the pond right now Or next up

5:20

here Angry Club Penguin Hackers allegedly steel

5:22

Disney data Fortune not be only side

5:25

of the New York Times data breach

5:27

it was or it also hosted a

5:29

link to internal Club Penguin Pdf A

5:31

breach by all that not only contained

5:34

old information about Club Penguin be popular

5:36

multiplayer online game that said Shuttered and

5:38

Twenty Seventeen or irreparably also contained information

5:40

as recently. As this month,

5:42

about Disney Plus corporate strategies,

5:44

advertising plans, links to disease

5:47

internal web sites as term

5:49

developer tools Helios and Come

5:51

unicorn on allegedly stored on

5:53

Disney's Confluence server. So. ironic

5:55

regina club penguin would make a

5:57

great name for cybercrime just throwing

6:00

this out there. We have Bolt Typhoon, I

6:02

guess, Club Penguin, maybe out there as well.

6:04

But in this case, it seems to be

6:06

a breach that went horribly wrong for Disney

6:09

when the attackers inadvertently stumbled upon all this

6:11

other much more serious

6:13

and relevant data, right? 2017 data, I'm sure

6:15

there's horrible things you can use it for.

6:17

But last month's Disney Plus data, a little

6:20

more valuable. I'm curious, what lessons can Disney

6:22

and other organizations take from this? Well,

6:25

certainly, I'm sure Disney's going

6:27

through a lot of like, you know, what went wrong,

6:29

as we, you know, people do when

6:31

there's any kind of an incident. And we

6:34

can get in the word inadvertently is in there. I also did

6:36

agree I did when I first read the story, not being a

6:38

gamer thought that was the name of a gang,

6:40

if you will call it that fiber crime gang. Yeah,

6:43

I was like, I hadn't heard this one yet. Then

6:45

I was like, read it twice to get get the

6:47

gist. But yeah, I mean, it's

6:49

this one was more really, I think not knowing

6:51

the details, not certainly not having talked to anybody

6:53

about it seems like it has to do with

6:57

not having things like that. And so who knows, maybe this

6:59

club penguin game was kind of a, you know, an M&A

7:01

they did, or, you know, and they just brought them into

7:03

the fold without doing proper security assessments

7:05

in advance, giving, you

7:08

know, having a flat network. These are all

7:10

just my, you know, things that people in

7:12

my line of work would think of when

7:14

you read these stories, right? Nothing's confirmed or

7:16

validated. But yeah, it's

7:18

again, it's like not thinking through what,

7:22

you know, I always say we

7:24

build systems to run, we don't build them fail. So what

7:26

are the failure points? Right? How do you figure out what

7:28

your failure points are? And, and

7:31

CCL again, hire the bad guys, right? They'll they'll,

7:33

they'll show you they'll show you all your failure

7:35

points for sure. Yeah, it's like only you could

7:37

trust them. Yeah,

7:40

have a have. It would

7:42

be great IT infrastructure admins, right? Yeah,

7:45

like, yeah, the, the, this

7:48

is one of those stories where yeah,

7:50

the postmortem feels like it's way more

7:52

interesting than the actual attack in terms

7:54

of like how, how those two get

7:56

conflated over time. And yeah,

7:59

the idea of of not

8:01

only knowing what data you have, that's a

8:03

very popular conversation we're having now and when

8:05

we're living in an age of data minimization

8:08

regulation, but also just like who

8:10

else has keys to

8:13

things that are out there, right? That you don't even realize

8:15

and trying to get a handle on that. Certainly

8:18

not an enviable position for sure. So

8:21

if we get more updates on that, any more details

8:23

on that, be sure to keep tuned to cybersecurity headlines.

8:25

We will carry an update to that as relevant. Next

8:28

up here is something we're definitely keeping tabs on

8:30

NHS out for blood after a cyber attack. The

8:33

UK's National Health Service, that NHS is

8:35

still suffering the fallout from a cyber

8:38

attack on the pathology service provider, Synovus.

8:41

The NHS launched a call for type

8:43

O blood donors as these universal donors

8:45

make it faster to match for blood

8:47

transfusions. Impacted hospitals have also requested medical

8:50

student volunteers to mitigate the biggest impacts

8:52

to patient care. The independent

8:54

sources say two of the UK's largest

8:56

hospitals canceled over 200 emergency and lifesaving

8:58

operations as a result of this disruption.

9:00

That was earlier this week, so I'm

9:02

sure the blast rate is for this

9:04

as expanded even further.

9:07

But, Janet, hardly a week goes by without

9:09

another story about either hospitals or healthcare

9:11

facilities being targeted and attacked in

9:14

some way, disrupting some form of

9:16

operations. But here we see tangible

9:18

results in the form of blood

9:20

shortages and staffing issues to cover

9:22

patient overload. This ongoing story

9:24

does not seem to be getting much traction, I

9:26

guess, when we're, obviously in

9:29

the UK, much bigger story, but this

9:31

is a major hospital, like impacting a

9:33

large developed nation. Do you

9:36

think political powers that be should

9:38

be making more of an issue of

9:40

this on the level of critical infrastructure?

9:42

Yeah, that's exactly where I was going,

9:44

right? The healthcare is obviously a critical

9:46

part of the critical infrastructure and

9:49

the very human part of it as well. So

9:52

learning from this that patients

9:54

are affected, emergency and

9:56

life-saving surgeries were canceled or had

9:58

to be deferred. elsewhere and then

10:00

I think I read something about folks

10:03

who were recently diagnosed with cancer can't

10:05

really start their care related

10:07

to that so it's really really significant and

10:10

you know we read about health care

10:12

attacks on health

10:14

care in the US as well and

10:17

I think to

10:19

answer your question I think it should be more of

10:21

an issue because it is critical infrastructure and

10:24

you know the government is doing

10:27

some things but I do think that it

10:29

would be if it was given

10:32

if the light was signed on a little bit brighter there'd

10:35

be more done right there's a more hope well

10:38

and I hope but you know the

10:40

thing we learn from these attacks is

10:42

just how wide again kind of the

10:44

the software supply chain conversation right post

10:46

solar winds completely changed the idea of

10:48

there is such a supply

10:50

chain for health care when we're talking about like processing

10:52

insurance claims in the US when it comes to

10:54

if you had told me a hack on a

10:57

lab pathology provider would have had this kind of

10:59

impact I like I like as just as a

11:01

everyday person I would have no idea that the

11:04

kind of disruption that this could cause I'm so

11:06

just kind of getting a broad public awareness to

11:08

say like no no this is a enormously complex

11:11

chain to give you the thing at the hospital or

11:13

at the health care clinic and we need to be

11:15

like holistic like looking at that as a as

11:17

a as a imperative

11:19

when it comes to security because

11:21

these organizations are vulnerable to

11:24

to having an outsized impact perhaps when there

11:26

is any kind of disruption yes

11:29

definitely thinking that you know these

11:32

kind of news stories really

11:34

provide us the the you know incentive

11:37

if you will to look at what

11:39

who do we rely on and for what right

11:42

and then see where that where that impacts us

11:44

downstream I mean that's just any company in any

11:47

industry should be doing that but the critical infrastructure you know

11:50

much more of a focus and

11:53

Christian Emory in our chat says definitely a

11:55

challenging story from a cyber perspective but impressed

11:58

to you know kind of call on people

12:00

to, hey, get blood donors out there for the

12:02

universal donor stuff. And yeah, kudos

12:05

to people stepping up to try and help everybody

12:07

out and the volunteers too. I mean, those are,

12:09

you know, medical students famously not exactly have a

12:11

lot of spare time. So to be asked to

12:13

volunteer on top of that, you

12:15

know, kudos for doing that. Yeah,

12:18

and one of the other comments also, I

12:20

think from Christian was about non-tech workarounds, but

12:22

you know, there's also the thought of having

12:24

an optional tech, right? That plan

12:26

B could be technical as well, right? And so, you

12:29

know, why are we relying on one supplier for something

12:31

when we maybe should have two? Yeah,

12:34

for sure. And a lot of that goes

12:36

to the, I'm sure the uniqueness

12:38

of the UK's health service

12:40

as, you know, and this

12:43

is the other problem is that no healthcare system is

12:45

a monolith even in the US, the UK. That's

12:48

the other issue too, is best practice in the

12:50

UK might not apply to our much more privatized

12:54

healthcare sector here in the US as well.

12:56

So healthcare famously

12:58

extraordinarily difficult. So,

13:02

but yes, definitely something that we will

13:04

be keeping an eye on, whether it's legislation in

13:06

the UK, EU, elsewhere in the

13:08

world, and certainly in the US, we will be keeping tabs

13:10

on that from a cyber perspective as

13:12

well. Before we move on to our next

13:14

story though, we have to spend a few moments with our

13:16

sponsor for today, Vanta. Whether

13:19

you're starting or scaling your security program,

13:21

Vanta helps you automate compliance across frameworks

13:23

like SOC 2, ISO 27001, and more.

13:28

With Vanta, you can streamline security

13:30

reviews by automating questionnaires and demonstrating

13:33

your security posture with a customer

13:35

facing trust center. Over

13:37

7,000 global companies like Atlassian, Flow

13:40

Health, and Quora use Vanta to

13:42

manage risk and prove security. Our

13:45

listeners get $1,000

13:47

off at

13:50

vanta.com/headlines. That's

13:52

vanta.com/headlines. All

13:57

right? our next story here, Pure Storage Hacked

13:59

via Snowflake. Space on Wednesdays. Every

14:01

security for me Indian warned that threat

14:03

actor named U C. Fifty Five Thirty

14:05

seven. Less. Catchy name.

14:07

Their guys is systematically compromising victim

14:09

organization data through snowflake and attempting

14:12

to extort them. Snowflake.

14:14

As a multi cloud our data warehousing

14:16

platform. A date, one hundred sixty five

14:18

organizations who use it have been potentially

14:20

exposed. Minion. Said the three

14:22

primary factors cause a compromises or lack

14:24

of multifactor authentication very to rotate credentials

14:27

and a lack of network allow list

14:29

to limit incoming snowflake traffic to trusted

14:31

sources distorts provider pure storage reported Tuesday

14:33

it's to become a victim of these

14:36

breaches the company said of the and

14:38

are the company said analytics data was

14:40

impacted would strong emphasize that know customer

14:42

data was compromised although given with on

14:45

in these are high and storage arrays

14:47

that could be subversive beta surgeon at

14:49

all three of these compromise factors lack

14:51

of multifactor failure to rotate credentials are

14:54

you know the the black of allow

14:56

lists ah appear to be like a

14:58

process. Human origins are problems here and

15:00

in a basically just things coming from

15:03

inside the house. I'm curious as a

15:05

C so what are your thoughts about

15:07

the use A Internal issues I guess

15:09

for lack of better term stupid snowflake

15:12

have done more to to you know

15:14

but I guess. Police. At

15:16

least in terms of the Emma Fe or as it's is

15:18

it unfair that to really put the burden on them. You

15:22

know, I'm a little on the fence on the

15:24

fun part of me as you know these these

15:26

larger companies and there's many of them out there

15:29

that don't require am I saying this? Where

15:31

we are today. As I

15:33

don't know if enough because. The. Customer acquisition or

15:35

oregon our lack of interest and for some

15:38

trying to keep their used frictionless. Access Again

15:40

yeah making it can mean yes it's a

15:42

sudden seem like as an excuse for it anymore.

15:44

It's not the and all right Mf A is

15:46

not the and all there's other ways. ah.

15:49

Enough. Or courses other his back

15:51

as get in spite of certainly enough

15:53

quiet sit down a bit. Ah, and

15:55

the other two are you know, rotating

15:58

credentials and I'm you know. Limiting

16:00

who going on, Here the ip

16:02

addresses that everything of allah texas to come from and don't

16:04

want anything else and those are just. You know, their

16:06

table stakes at this point? To Re: I

16:08

mean, I think that's what we can more

16:11

easily do. And as companies and you

16:13

know this on kind of a if you haven't

16:15

heard the about this one too much as kind

16:17

of an interesting one because. The.

16:19

Companies that are in Ball or The Hundred Sixty

16:22

Five Companies mandy and identifies as. A

16:24

Their credentials. Were

16:26

found in other ways and some of them I think

16:28

they said their electoral as told us twenty twenty so

16:30

there's no rotation their it affects proper credentials. And Twenty

16:32

twenty And it works today. Now. That's

16:35

the same on them. so it's a Cisco.

16:37

I think it's the other shared responsibility at

16:39

in Oh and this one, but it's also

16:41

a I Do kind of stand on the

16:44

side of. We should just require multifactor.

16:46

At this point there should be any option.

16:48

You know the big the email systems. In

16:50

a sentence email compromises that happen. same thing

16:52

like it's it's a be required as soon

16:54

as an Msc into their banks. Now I

16:56

am he added to be alive. Would go was

16:58

just away Allies it's like were to see. felt like

17:01

wouldn't. Wear seatbelts long ago, you know, and

17:03

we'll bounce. Around and car and that we learned

17:05

that was bad. so. If you know they require

17:07

people are. Yeah, let's do

17:09

it. At least Snowflake has learned

17:11

be twenty three meal us and of

17:13

don't blame your customers are like explicitly

17:15

they're making made you do it which

17:17

is nice butcher at least not for

17:19

like openly for people under the bus

17:21

or so can replace a good done

17:23

good marks your marketing team or to

17:25

com steam learned well of us. Are

17:29

next A pure White House report highlights

17:31

increase in federal sex. New. white

17:33

house report reveals that eleven us federal

17:35

agencies reported a nine point nine percent

17:37

increase in cyber security incidents and twenty

17:40

twenty three totaling over thirty two thousand

17:42

ceases those com an incident was improper

17:44

use we are usage while fishing a

17:46

malicious emails so be largest year on

17:49

year increase significant bridges included raise more

17:51

attacks on affirmative health and human services

17:53

repeated data exposures at the treasury it's

17:56

an successful fishing of an employee at

17:58

the office of inspector general According

18:00

to the official White House release, the report

18:02

is being used as an

18:04

outline for the administration's cyber investment

18:07

priorities. Improper

18:09

usage here means the system was used in

18:11

a way that violated the agency's acceptable use

18:13

policies. I'm shocked that that number isn't

18:15

in the six digits or something like that, but that's

18:19

just the ones they caught, I guess. The

18:21

report stated that agencies have the capability to

18:23

detect when security policies are being violated, but

18:25

not the ability to prevent it from actually

18:27

happening. I

18:30

got a couple of questions on this. Speaking

18:32

as someone who immediately gets hit with a

18:34

$45 fee, the instant a bank account goes

18:37

into overdraft, like everybody does, I know the

18:39

technology for taking instant action exists,

18:41

like there is a cause and effect thing

18:43

there, at least for my

18:45

financial institution. Is it acceptable for more

18:47

than 32,000 cybersecurity incidents to

18:50

happen, especially given the number

18:52

of agencies the government employs for cybersecurity?

18:55

I was actually shocked to see that in the report, too. I thought

18:58

that was interesting. It's

19:00

almost like we can't do anything about it. We'll throw our hands

19:02

up. We can't do anything about it. You

19:04

can. You really can. Have you

19:06

tried? Yeah. Can we help you

19:08

see how to do it? The

19:14

report's being used to outline their

19:16

future investments. I

19:19

read that, too. I read their

19:21

investment priorities. It's

19:23

hard to see the exact alignment. I

19:27

think that they

19:29

got some explaining to do a little bit there. They

19:33

have a lot of employees.

19:38

Their numbers are bigger. When you look

19:40

at numbers, it'd be interesting to see maybe percentages, because

19:42

that may put it in perspective for companies

19:44

that are smaller, because it does sound like an

19:46

awful lot. The

19:50

problem with automation is it scares

19:52

people. If

19:54

you turn on automation to shut off

19:56

or reset a password or take

19:59

down a server or whatever automation you want to put in

20:01

place, it'll stop something from happening. And

20:04

like normal business, right? And so that's scary to

20:06

people and that, you know, trying to weigh the

20:08

pros and cons of, you know,

20:10

is the automation correct? Yeah.

20:12

Well, and also the reality that like inevitably

20:14

any automation requires scaling up before you like

20:16

gain any of that. Like, you know, like

20:19

I know that that is not a trivial

20:21

effort to make, right? To say, Oh, just

20:23

throw some automation at us. You

20:25

know, that is oblivious

20:28

CEO 101, I guess. But

20:30

the idea of, you

20:34

know, when it comes to acceptable use policy

20:36

violations, I mean, like that sounds not great,

20:38

but it might be connecting a device over

20:40

Wi-Fi that's not supposed to be there or

20:42

something like that. Like that's the kind of

20:44

thing we're increasingly seeing in our in cybersecurity

20:46

of being like, OK, this is this is

20:48

where we need that just in time awareness,

20:50

right? As opposed to the annual, you know,

20:52

quarterly stuff like that. And and

20:54

to me, that would be like, OK, if we can

20:57

just like scale that down at all by like letting

20:59

people know as soon as they break that policy, it's

21:01

like, oh, you reuse that password again or just anything

21:03

like that instead of having

21:05

it be, you know, oh, here's

21:07

our name and shameless in the quarterly

21:10

drudgery, you know, drudgery of security

21:12

awareness training, you know, would

21:14

be a lot better space. Again, I

21:17

know there are a lot of reasons why it is

21:19

hard to move quickly with the government. Same thing with

21:21

health care. But, yeah, that

21:24

it seems like try something might be a good

21:26

idea. Yeah, I agree. Do

21:28

something. Please,

21:31

please. You

21:33

know, here's some tax dollars. Do something.

21:35

Next up here in our last story

21:37

for today, email scam caused Massachusetts town

21:39

four hundred forty five thousand dollars. The

21:41

town of Arlington, Massachusetts is admitting

21:44

to being the victim of a social engineering attack.

21:46

According to a statement from the town

21:48

manager, Jim Feeney, town employees started receiving

21:50

legitimate emails from a vendor involved in

21:52

a project focused on rebuilding a local

21:54

high school. However, Cyber criminals

21:57

had compromised some town employee user

21:59

accounts or monitor ring email correspondence.

22:01

Criminals. Then sent messages from an

22:03

email that appear genuine requesting a change

22:06

in their payment method. from check to

22:08

electronic funds transfer to Janet We chose

22:10

the story not single out or linked

22:13

in Massachusetts but to shows just how

22:15

easy it is for social engineering specialists

22:17

move laterally with and and organizations. We've

22:20

seen a lot of municipalities be getting

22:22

hit with a variety of cyber are

22:24

I live just outside of Cleveland able

22:26

to set a cyberattacks? What are your

22:29

thoughts about this incident. I'm

22:31

this is unfortunately having all of our

22:33

fry the small towns are getting hurt.

22:36

Small medium sized sounds are getting hit

22:38

em and that's proving. honestly. Ah,

22:40

more file scissors, cyber attack or as I

22:43

it I'm. This is looks like to be looked

22:45

to be a or says he looks to be

22:47

a stay doesn't seem a compromise. The guy the

22:49

bag I sat there and. Much

22:51

as what happens, you know, Probably.

22:54

Thousands of are hundreds of thousands of companies

22:56

at this point. Where are they just sit

22:58

there and lots and something really interesting comes

23:00

up like a bank account or authentic. Have

23:03

a financial transaction or contract negotiation

23:05

or whatever. And then they say

23:07

jump in and take over to the

23:09

point of you know, blocking the real

23:12

Ama emails from coming in a differing

23:14

the email mail forwarding. Price of all

23:16

sorts of things are happening. This blurb: Didn't seem

23:18

compromises and and efsa I mean I'm

23:20

gonna go back to am I pay

23:22

rates. Lot of a

23:25

smaller. Minutes. Follow these

23:27

companies system. Bother. Them

23:29

of I pray that are innocent. Required famous

23:31

Some some require a Satanic. In fact,

23:33

That same like basic hygiene. And.

23:37

And then of other isn't process bar

23:39

that reading. talk about as you know

23:41

who. Cool. First that famous like what's

23:43

what's April process to it requires the

23:45

two signatures, two sets of eyes. You

23:47

know there's all sorts of ways this

23:49

can be as educating accounting departments, the

23:51

or accounts payable departments anybody else to

23:53

do with. You. know pan out money says

23:55

keeping them educated on it and and sharing

23:57

these stories so that they see our really

24:00

happening. It's not like something my security person is just

24:02

paranoid about and, you know, bothering me

24:04

about. So yeah, real real stories help. Yeah,

24:07

as David Peach says in our comments, you know,

24:09

classic BEC and points kind of to your point

24:11

about hygiene, you know, more awareness is part of

24:13

the answer. And I'm glad you said part, David,

24:16

because yeah, that is, you know, we there

24:18

are there are wide, this is not something where there's

24:20

a silver bullet to, to kind of fix

24:23

any of this. But honestly, in the in

24:25

the milieu of municipal cyber attacks that we've

24:27

seen just even over the last couple of

24:29

months here, I mean, just

24:32

financial loss is almost the best case scenario at

24:34

this point, as opposed to like city services getting

24:36

shut down, you know, not being able to pay

24:38

utility bills, and they'll worry about things getting shut

24:41

off and stuff like that. Like, this is horrible.

24:43

And that that is a I'm sure that is

24:45

a lot of money to do that

24:47

organization, especially when you think you're, you're doing, you know,

24:49

your civic duty, hey, you're helping out of high school.

24:53

And to lose that money, you know,

24:55

devastating, I'm sure. But yeah,

24:57

it's in

24:59

this day and age, unfortunately, like, I

25:02

don't want to say best case. But I guess it could have

25:04

been a lot worse if they have all your email, right? Yeah,

25:07

I mean, I had a town like that recover from a half

25:09

million dollar loss to go to the tax to go to the

25:11

taxpayers. Yeah. Yeah, that's a big

25:13

shame of it. Yeah. Yeah. It's not just

25:15

the town itself. It's the people all

25:17

the people. All

25:19

right. Well, thank you to everybody that's

25:22

been communicating in our chat having some

25:24

really great points. Like I said, David,

25:26

Peach, CCL, Christian, Emery all getting involved

25:28

in here. And, and

25:31

again, that just makes it way more fun. So

25:33

if you have been on the fence about joining

25:35

us for a week in review show, we're here

25:37

every Friday at 330pm Eastern. Join us on YouTube,

25:39

subscribe to the CSO series YouTube channel, and

25:41

have some fun with us. Before we get out

25:43

of here, Janet, was there any story there was a thumbs up

25:46

or an eye roller for you something you reacted strongly to in

25:48

the lineup this week? I

25:50

think that the one that kind of because it hits

25:53

a wide group of people is the whole

25:55

snowflake. It's not

25:57

really a snowflake, but snowflake account zero. It's

26:00

just like adjacent. Yeah, yeah, that's a

26:02

good way to put it and problem primarily

26:04

I think because You

26:07

know or tech people might people let you

26:09

snowflake or tech people and shame on us

26:11

for you know Not

26:13

doing not doing the basics The

26:17

people that were probably building someone else about

26:19

doing the basics got caught doing

26:21

the exact same thing probably at that point

26:23

probably Yeah, well, thank you

26:25

so much Janet Heinz the see so

26:27

over at Chen Med really Phenomenal

26:30

I really enjoyed our conversation today

26:33

Where can people find you online if they

26:35

want to see more mature you're doing and

26:37

writing? So I'm of course on LinkedIn

26:39

as is the rest of the planet and

26:41

I also I also have a website to Janet

26:43

Heinz calm Which you know, I've got some

26:45

more information about me and what I you

26:48

know my activities So feel free to go

26:50

there as well Janet Heinz calm very

26:52

very cool We have the link to both of those in

26:55

our show notes. Thanks also

26:57

to our sponsor Vanta compliance That doesn't

27:00

sock too much visit them at Van

27:03

ta comm slash headlines. Thanks again to

27:05

all of our audience again We can't

27:07

get everything up on screen, but we

27:09

really do appreciate everybody that's participating Like

27:11

I said, just makes it more fun

27:13

Remember to come back next Friday for

27:16

another great interactive day of information starting

27:18

with Super Saver Friday Where our topic

27:20

will be this is kind of on

27:22

everybody's lips hacking generative AI Anxiety

27:24

an hour of critical thinking about how to

27:27

create constructive outlets around this technology That's at

27:29

1 p.m. Eastern 10 a.m. Pacific. That's followed

27:31

by another weekend review show like I said

27:34

330 Eastern on Friday And

27:38

if that's not enough for you and I'm

27:40

not saying it should be you can get

27:42

your daily news fix through cybersecurity headlines Every

27:44

single day gives about six minutes. We'll get

27:46

you all caught up until the next time

27:48

we meet. I'm rich. Dravolino Reminding you to

27:50

have a super sparkly day Cyber

27:55

security headlines are available every weekday head

27:57

to see so serious calm stories

28:00

behind the headlines.

Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Episode Tags

Do you host or manage this podcast?
Claim and edit this page to your liking.
,

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features