WEBVTT

00:00:00.000 --> 00:00:01.879
Hey everybody, welcome back to another episode

00:00:01.879 --> 00:00:03.740
of Vision Pros Live. I'm your host and coach,

00:00:03.940 --> 00:00:09.039
Fletcher Ellingson. And today on the show, this

00:00:09.039 --> 00:00:13.500
is not a regular guest. I've listened to his

00:00:13.500 --> 00:00:19.179
show, and I would say this. He doesn't know I'm

00:00:19.179 --> 00:00:21.739
going to say this, by the way. But if there was

00:00:21.739 --> 00:00:27.620
an award that I could give out for Outstanding

00:00:27.620 --> 00:00:33.070
Podcast, Noel. I would give it to you. Why? Yeah,

00:00:33.170 --> 00:00:35.469
I'm not joking. I've only listened to one of

00:00:35.469 --> 00:00:42.350
your episodes. But I so appreciated this almost

00:00:42.350 --> 00:00:46.189
theatrical show that you've got set up between

00:00:46.189 --> 00:00:51.750
yourself and Moven. And you've got to listen

00:00:51.750 --> 00:00:55.710
to a show to find out who Moven is. But first

00:00:55.710 --> 00:00:58.399
of all, welcome to the show. No problem. Thanks

00:00:58.399 --> 00:01:02.159
for being on it. Happy to be here. And I want

00:01:02.159 --> 00:01:05.200
to continue my thought here, but explain who

00:01:05.200 --> 00:01:09.260
Moven is in your show, please. Moven is my co

00:01:09.260 --> 00:01:15.319
-host. Moven is not necessarily what she appears

00:01:15.319 --> 00:01:20.939
to be. It's not her real name because of the

00:01:20.939 --> 00:01:25.760
world she comes from. That will be revealed later.

00:01:26.329 --> 00:01:31.170
We have a six -month plan here. All right. But

00:01:31.170 --> 00:01:40.069
Mobin is a former government employee in the

00:01:40.069 --> 00:01:45.390
UK. And I've been doing what I do for 40 -odd

00:01:45.390 --> 00:01:50.409
years. She's been, she's what, 15, 20 years younger

00:01:50.409 --> 00:01:56.659
than me. And she came from academia. to government,

00:01:56.799 --> 00:02:05.560
to the private sector. And she is funny, scary

00:02:05.560 --> 00:02:08.259
at times. I do, depending on which episode you

00:02:08.259 --> 00:02:10.319
heard, I do occasionally refer to her as my spooky

00:02:10.319 --> 00:02:14.639
friend, if that's not giving too much away. And

00:02:14.639 --> 00:02:20.180
we do our sessions, our records, we do two or

00:02:20.180 --> 00:02:23.719
three episodes at a time, and we do have a plan.

00:02:24.699 --> 00:02:28.780
But every so often, I will throw a curveball

00:02:28.780 --> 00:02:30.240
at her and not tell her what we're talking about

00:02:30.240 --> 00:02:34.139
in the next episode. Normally, it's a third one

00:02:34.139 --> 00:02:37.099
we've recorded, and we're just about to go into

00:02:37.099 --> 00:02:40.439
post, and I'll just drop a bombshell on her.

00:02:40.479 --> 00:02:42.199
She's expected to be talking about something,

00:02:42.280 --> 00:02:47.439
and we talk about... I sort of put her in a corner

00:02:47.439 --> 00:02:50.819
and... Change it up on her. Change it up on her.

00:02:51.340 --> 00:02:53.659
She's threatening to do it to me as well, but

00:02:53.659 --> 00:02:57.300
I have control. It is cybersecurity guy, not

00:02:57.300 --> 00:03:02.639
guys. I keep reminding her. And I'll jump in

00:03:02.639 --> 00:03:06.360
here because for you all listening, I haven't

00:03:06.360 --> 00:03:10.599
even properly introduced Noel, but Noel Bradford

00:03:10.599 --> 00:03:18.719
is the small business cybersecurity guy. Yep.

00:03:18.719 --> 00:03:23.270
And he is... As I listened to him and I was reading

00:03:23.270 --> 00:03:26.009
through his website, first of all, look, he's

00:03:26.009 --> 00:03:27.789
not in this for the money. He's not in this for

00:03:27.789 --> 00:03:33.069
sponsors. He is literally a wealth of genius

00:03:33.069 --> 00:03:38.330
knowledge about cybersecurity. And, again, I've

00:03:38.330 --> 00:03:41.469
only listened to one episode, and I've got all

00:03:41.469 --> 00:03:46.830
these notes that I took from it because you busted

00:03:46.830 --> 00:03:52.659
so many myths for me. You exposed the weakness

00:03:52.659 --> 00:03:57.780
in my thinking about cybersecurity. And I can't

00:03:57.780 --> 00:04:02.360
recommend this podcast highly enough. So Noel

00:04:02.360 --> 00:04:07.900
is in cybersecurity. And he reminded me of like

00:04:07.900 --> 00:04:12.979
Rami Malek in Mr. Robot, where there's just a

00:04:12.979 --> 00:04:18.600
guy who is just kind of incredibly smart. in

00:04:18.600 --> 00:04:21.600
understanding the cyber world, anticipating,

00:04:21.740 --> 00:04:28.959
and being able to advise, plan, and adapt. So

00:04:28.959 --> 00:04:33.819
I can't wait to get into this. But before we

00:04:33.819 --> 00:04:37.459
do, we always start off the show with a win.

00:04:38.480 --> 00:04:40.279
Because there's a lot of suffering and uncertainty

00:04:40.279 --> 00:04:45.160
in the world. And on all joking aside, I always

00:04:45.160 --> 00:04:48.019
like to remind people that, hey, what you focus

00:04:48.019 --> 00:04:51.319
on, you feel. And we're about to talk about something

00:04:51.319 --> 00:04:55.300
that can be potentially alarming, concerning

00:04:55.300 --> 00:04:59.139
at the very least. So we want to remind people

00:04:59.139 --> 00:05:01.480
like, yeah, there is still good in the world

00:05:01.480 --> 00:05:03.160
too. So what's something that's going well for

00:05:03.160 --> 00:05:07.180
you, Noel? Well, if we look at the last couple

00:05:07.180 --> 00:05:12.519
of weeks, a win for me professionally is when

00:05:12.519 --> 00:05:16.110
I don't when i struggle to find something to

00:05:16.110 --> 00:05:20.750
do the next podcast on um hasn't happened yet

00:05:20.750 --> 00:05:24.509
um but every so often we have a we have a list

00:05:24.509 --> 00:05:28.129
as i say we have a plan um and every so often

00:05:28.129 --> 00:05:30.490
we end up scratching stuff out because it's no

00:05:30.490 --> 00:05:34.949
longer applicable or it gets replaced by something

00:05:34.949 --> 00:05:40.399
more important um so A win there is that the

00:05:40.399 --> 00:05:45.300
world is a slightly better place from a cybersecurity

00:05:45.300 --> 00:05:51.540
perspective. There are less companies being breached,

00:05:51.639 --> 00:06:00.990
especially in my particular niche. So that's

00:06:00.990 --> 00:06:03.550
a win there. Personally, it's getting through

00:06:03.550 --> 00:06:05.389
the week without killing any of my customers

00:06:05.389 --> 00:06:11.050
or my management. I have a day job. This isn't

00:06:11.050 --> 00:06:17.009
my day job. This is a weekend, evening, anytime

00:06:17.009 --> 00:06:21.269
I can fit in kind of thing. It's nearly 10 .30

00:06:21.269 --> 00:06:30.259
in the evening here. I'm that cantankerous, veteran,

00:06:30.439 --> 00:06:36.319
grumpy IT guy in my day job. I look after 300

00:06:36.319 --> 00:06:40.779
companies' IT, and we go from everything from,

00:06:40.839 --> 00:06:45.199
oh, I've got my password, to, oh, we've just

00:06:45.199 --> 00:06:49.459
had a call from GCHQ, we've been hacked. Yeah.

00:06:49.579 --> 00:06:56.680
And anywhere in between. Yes. And so... A good

00:06:56.680 --> 00:07:00.079
week is where I actually finish Friday and can

00:07:00.079 --> 00:07:02.240
put my feet up and concentrate on what I really

00:07:02.240 --> 00:07:05.920
want to be doing, which is the education piece.

00:07:06.519 --> 00:07:10.519
And this weekend was a good weekend. Last week

00:07:10.519 --> 00:07:15.420
was a good week. And today's been for a Monday.

00:07:15.639 --> 00:07:18.500
Not too bad. All right. We'll take it. All right.

00:07:18.579 --> 00:07:25.019
We'll take that. So Noel specializes in his.

00:07:25.449 --> 00:07:29.430
and educating small businesses about cyber security

00:07:29.430 --> 00:07:33.290
and i'm going to just rattle off a few things

00:07:33.290 --> 00:07:36.829
that uh that stuck out for me okay because i

00:07:36.829 --> 00:07:42.449
you exposed my my ignorance in the because what

00:07:42.449 --> 00:07:46.189
i thought was that i'm too small to be noticed

00:07:46.189 --> 00:07:50.290
okay if i had a hundred bucks for every time

00:07:50.290 --> 00:07:54.829
that was yes so what what you said was is that

00:07:55.740 --> 00:07:59.579
Actually, small businesses are the low -hanging

00:07:59.579 --> 00:08:03.879
fruit. They are the extremely low -hanging fruit

00:08:03.879 --> 00:08:08.319
because they have looked to an enterprise company

00:08:08.319 --> 00:08:11.480
because that enterprise company has enterprise

00:08:11.480 --> 00:08:14.160
marketing, a budget for enterprise marketing,

00:08:14.259 --> 00:08:16.959
but not necessarily enterprise cybersecurity.

00:08:18.439 --> 00:08:22.360
And so that was for sure my thinking, like, oh,

00:08:22.360 --> 00:08:24.589
yeah, I'll just hire these people. They've got

00:08:24.589 --> 00:08:27.589
a huge budget for advertising, it would seem.

00:08:27.689 --> 00:08:30.490
I'm assuming that it's the same for cybersecurity.

00:08:30.790 --> 00:08:32.830
And what you're saying is, no, not necessarily

00:08:32.830 --> 00:08:37.690
so. But then you went on to say that it's not

00:08:37.690 --> 00:08:42.210
that I'm even the target. What you and Marvin

00:08:42.210 --> 00:08:45.649
said is that they come in my door because I'm

00:08:45.649 --> 00:08:48.110
the low -hanging fruit, and then they make these

00:08:48.110 --> 00:08:53.230
lateral moves. And that's what they're really

00:08:53.230 --> 00:08:55.789
looking for. And you talk, I think you all refer

00:08:55.789 --> 00:08:59.509
to it as island hopping or something. But yeah,

00:08:59.629 --> 00:09:02.649
so tell me a little bit about this incorrect

00:09:02.649 --> 00:09:06.629
thinking that if you're too small to be a target.

00:09:10.230 --> 00:09:12.850
There's no such thing as somebody not being a

00:09:12.850 --> 00:09:16.450
target because there are no targets unless you

00:09:16.450 --> 00:09:22.350
are big corporate. What happens is you will appear

00:09:22.350 --> 00:09:26.250
somewhere on a data bridge, your email, for instance,

00:09:26.529 --> 00:09:30.649
and the data brokers have got you and they've

00:09:30.649 --> 00:09:32.950
sold it to some guys who've sold it to some guys

00:09:32.950 --> 00:09:36.269
who've then leaked it to the bad guys. You will

00:09:36.269 --> 00:09:38.970
then go in a phishing scam. You'll get hit by

00:09:38.970 --> 00:09:41.070
phishing email after phishing email and they're

00:09:41.070 --> 00:09:45.690
getting so good these days. It's not like the...

00:09:46.279 --> 00:09:49.360
dodgy Nigerian prince or anything like that anymore.

00:09:49.480 --> 00:09:55.620
These things are plausible. And all it takes

00:09:55.620 --> 00:09:59.879
is one person within an organization to click

00:09:59.879 --> 00:10:05.220
the wrong link and the guys are in. However,

00:10:05.539 --> 00:10:09.840
that being said, they can be in your systems

00:10:09.840 --> 00:10:12.639
now and you wouldn't know it. Yeah, you said

00:10:12.639 --> 00:10:15.850
on the show, you said they... Before you know

00:10:15.850 --> 00:10:18.429
it, they may have been in your system for weeks.

00:10:19.429 --> 00:10:25.990
Months. Months. The average dwell time in the

00:10:25.990 --> 00:10:30.730
U .S., i .e. the time between the breach. Where

00:10:30.730 --> 00:10:33.870
was I? We were talking about, yeah, they've been

00:10:33.870 --> 00:10:36.970
in your system for months. Dwell time, yeah.

00:10:37.250 --> 00:10:39.909
So they've probably been in your system by the

00:10:39.909 --> 00:10:42.070
time they're detected. There's a thing known

00:10:42.070 --> 00:10:45.279
in the industry as dwell time. Dwell time is

00:10:45.279 --> 00:10:47.659
the time between the initial incursion and them

00:10:47.659 --> 00:10:51.120
being discovered. It's got better over the years.

00:10:51.220 --> 00:10:57.580
It's now measured in months. This is in large,

00:10:57.700 --> 00:11:00.120
large, large corporates. But large corporates,

00:11:00.120 --> 00:11:03.960
large enterprise have people whose job it is

00:11:03.960 --> 00:11:09.100
to notice. SMB, small, medium business, doesn't.

00:11:09.179 --> 00:11:12.080
Most small, medium businesses don't have an IT

00:11:12.080 --> 00:11:17.960
team. They have people like me. And as such,

00:11:18.120 --> 00:11:22.879
the enterprise level tooling, the enterprise

00:11:22.879 --> 00:11:25.980
level IT budgets that you were mentioning earlier,

00:11:26.200 --> 00:11:31.879
just don't exist. And the concept that you are

00:11:31.879 --> 00:11:34.700
too small is not so much that you are targeted

00:11:34.700 --> 00:11:36.820
because you are small, because they're not targeting

00:11:36.820 --> 00:11:39.860
anybody, they're targeting everybody. So this

00:11:39.860 --> 00:11:44.120
email goes out, it's random. Someone, somewhere,

00:11:44.279 --> 00:11:46.539
law of averages. You know that, I know that,

00:11:46.620 --> 00:11:49.820
we all know that. It's marketing. It's law of

00:11:49.820 --> 00:11:51.639
averages. Somebody, somewhere will be interested

00:11:51.639 --> 00:11:56.139
and click the link. We've done tests for customers.

00:11:56.340 --> 00:12:00.360
I do it on a regular basis. The best one is 50

00:12:00.360 --> 00:12:03.379
% off Airbnb. Click here for your free voucher

00:12:03.379 --> 00:12:08.940
code. Concert tickets or theatre tickets or,

00:12:08.940 --> 00:12:13.210
you know, whatever. It's playing to the psychological

00:12:13.210 --> 00:12:19.710
level. And as such, what happens is they're in

00:12:19.710 --> 00:12:21.950
your system. They'll have a look around. They'll

00:12:21.950 --> 00:12:25.669
go, okay, who's his customers? Who's Fletcher's

00:12:25.669 --> 00:12:32.009
customers? And they'll have a look around, work

00:12:32.009 --> 00:12:34.570
out who might be interesting, and then start

00:12:34.570 --> 00:12:36.610
targeting them. But they won't be targeting them

00:12:36.610 --> 00:12:38.409
on a purely random thing. They'll be targeting

00:12:38.409 --> 00:12:45.409
them as you. Okay. Okay, so that opens a door.

00:12:45.970 --> 00:12:48.889
Now, a lot of small companies are all interconnected

00:12:48.889 --> 00:12:51.110
electronically these days. They have systems

00:12:51.110 --> 00:12:53.529
that talk to each other. Those are back doors,

00:12:53.649 --> 00:12:58.090
potentially. And it just spirals from there.

00:12:58.389 --> 00:13:02.389
It spirals from there. And eventually, you know,

00:13:02.429 --> 00:13:06.370
the Kevin Bacon game, get to Kevin Bacon in seven

00:13:06.370 --> 00:13:10.879
people. You know, you might not have a... customer

00:13:10.879 --> 00:13:19.320
that's got VIP level customers, but they might.

00:13:19.480 --> 00:13:22.519
One of your customers might, or one of your customers'

00:13:22.679 --> 00:13:27.120
customers, and they just walk up the chain. Each

00:13:27.120 --> 00:13:31.620
time getting more and more plausibility. Or they'll,

00:13:31.740 --> 00:13:35.159
if you're a marketing company, say, they'll say,

00:13:35.259 --> 00:13:38.419
oh, so -and -so, who they know is the marketing

00:13:38.419 --> 00:13:42.600
company's um customer recommended that we talk

00:13:42.600 --> 00:13:45.620
to you and they so they've just hopped a whole

00:13:45.620 --> 00:13:50.139
island they've got bona fides they go in the

00:13:50.139 --> 00:13:51.899
front door they'll have a conversation emails

00:13:51.899 --> 00:13:53.799
will get exchanged documents will get you know

00:13:53.799 --> 00:13:57.039
have a look at this pdf or have a look at this

00:13:57.039 --> 00:13:59.860
document and then it just moves on and on up

00:13:59.860 --> 00:14:03.120
and up and up and up and eventually you are hitting

00:14:03.120 --> 00:14:07.620
government you are hitting large wow Wow. We're

00:14:07.620 --> 00:14:12.179
hitting CEOs, CFOs, CIOs, you know, et cetera,

00:14:12.259 --> 00:14:15.679
et cetera. And at that point is where the value

00:14:15.679 --> 00:14:20.000
all the time that's being put in pays off. The

00:14:20.000 --> 00:14:22.899
biggest worry now is they can do all of this

00:14:22.899 --> 00:14:26.620
automatically with AI. AI doesn't fall asleep.

00:14:26.799 --> 00:14:29.419
AI learns from its mistakes and will keep pushing

00:14:29.419 --> 00:14:33.419
and pushing and pushing. Wow. It was very prevalent

00:14:33.419 --> 00:14:38.299
at DEF CON in Vegas last week. I didn't go, Movin

00:14:38.299 --> 00:14:45.879
did. And we put an episode out today about the

00:14:45.879 --> 00:14:53.240
whole thing. And it's very interesting that the

00:14:53.240 --> 00:15:02.120
attack speed is just vanishing. It's commoditized.

00:15:02.120 --> 00:15:04.639
Some of these bad guys are running cyber attack

00:15:04.639 --> 00:15:09.830
as a business. wow services payment plans ransomware

00:15:09.830 --> 00:15:13.590
negotiators you know the whole lot you pack they

00:15:13.590 --> 00:15:18.350
take a cut you get you you infect a bank a hospital

00:15:18.350 --> 00:15:22.009
a government department or whatever whatever

00:15:22.009 --> 00:15:26.669
that you they pay up the ransomware guys just

00:15:26.669 --> 00:15:30.990
take a cut it happened over here recently um

00:15:32.079 --> 00:15:34.700
There's been stuff with, you heard of Workday,

00:15:34.840 --> 00:15:38.960
the big HR platform? I have not, no. Big HR platform

00:15:38.960 --> 00:15:41.700
that's just announced a couple of days ago that

00:15:41.700 --> 00:15:45.940
they've been breached. And we're talking one

00:15:45.940 --> 00:15:51.139
of the alleged ransoms was for bitcoins, which

00:15:51.139 --> 00:15:53.820
is about half a million dollars. Yeah, it's a

00:15:53.820 --> 00:15:57.440
half a million dollars about, yeah. Yeah. So,

00:15:57.580 --> 00:15:59.299
you know, when you look at it like that, it's

00:15:59.299 --> 00:16:03.980
actually quite scary. Yeah, that is wild. So

00:16:03.980 --> 00:16:06.879
as people are listening to this and small business

00:16:06.879 --> 00:16:09.039
owners, because we have a lot of small to medium

00:16:09.039 --> 00:16:13.720
-sized business owners listening, they may, again,

00:16:13.919 --> 00:16:16.039
thought they're too small, they're not on the

00:16:16.039 --> 00:16:18.620
radar. What we want them to know is, no, no,

00:16:18.639 --> 00:16:21.399
no, completely on the radar because everybody's

00:16:21.399 --> 00:16:25.559
on the radar. And you're just one door through

00:16:25.559 --> 00:16:28.740
which they can enter. And you have, I think you

00:16:28.740 --> 00:16:33.259
said... lots of small businesses, they have an

00:16:33.259 --> 00:16:37.820
average of 50 third -party vendors that they're

00:16:37.820 --> 00:16:41.419
dealing business with. There are doors all over

00:16:41.419 --> 00:16:46.980
the place that expose your vulnerabilities. In

00:16:46.980 --> 00:16:51.679
light of all of this, where does a small business

00:16:51.679 --> 00:16:55.639
start? How do I tighten up my security here?

00:16:58.759 --> 00:17:01.399
First acknowledge, take your head out of the

00:17:01.399 --> 00:17:07.339
sand and ask yourself, what is my risk appetite?

00:17:08.059 --> 00:17:12.359
What am I willing to risk? Am I willing to risk

00:17:12.359 --> 00:17:15.980
it all? How long can I be without my systems?

00:17:18.920 --> 00:17:22.319
If I took all your computers away from you, Fletcher,

00:17:22.380 --> 00:17:26.920
how long would you be in business for? That's

00:17:26.920 --> 00:17:28.980
the question to ask yourself. Yeah, I mean, I

00:17:28.980 --> 00:17:30.859
could get back up because of the nature of my

00:17:30.859 --> 00:17:35.700
business in a couple of days, but I'm just a

00:17:35.700 --> 00:17:41.599
very, very small business. But this is the point.

00:17:41.859 --> 00:17:44.539
You know, if you're, say, a, I don't know, a

00:17:44.539 --> 00:17:49.380
car accident repair service company, you know,

00:17:49.400 --> 00:17:51.839
when you bend your car, you take it in, everything's

00:17:51.839 --> 00:17:57.269
digital. Well, at least it is here. from their

00:17:57.269 --> 00:18:00.410
supply chain to their work coming through from

00:18:00.410 --> 00:18:03.509
the insurance companies, not just walk -ins,

00:18:03.529 --> 00:18:09.190
their payments, credit card taking, all of that

00:18:09.190 --> 00:18:12.890
kind of thing, all the POS stuff. You're looking

00:18:12.890 --> 00:18:17.849
at how many days can you be out of business?

00:18:18.069 --> 00:18:21.869
How many days can you lose your systems? If you

00:18:21.869 --> 00:18:24.029
lost everything and had no backups and there

00:18:24.029 --> 00:18:28.349
was no easy way to get them back, you would call

00:18:28.349 --> 00:18:31.630
someone like me in my day job. I would bring

00:18:31.630 --> 00:18:34.630
my team in and go, okay, before I walk in the

00:18:34.630 --> 00:18:37.049
door, I want 20 ,000 pounds, please. And I want

00:18:37.049 --> 00:18:39.210
it in cash or I want it in the bank before I

00:18:39.210 --> 00:18:41.490
step across the threshold, even before I leave

00:18:41.490 --> 00:18:49.369
the office. Because unless you have got insurance,

00:18:50.220 --> 00:18:52.299
and if you haven't done everything we'll cover

00:18:52.299 --> 00:18:54.500
in a minute, you might be paying for it, but

00:18:54.500 --> 00:18:59.200
you haven't got insurance, then you are in a

00:18:59.200 --> 00:19:04.039
situation where I've got to take a risk. I've

00:19:04.039 --> 00:19:07.200
got to say, I've got to commit some very expensive

00:19:07.200 --> 00:19:16.859
resource to me to containing... fixing, et cetera.

00:19:17.319 --> 00:19:19.539
Typically what happens is we rip everything out

00:19:19.539 --> 00:19:23.059
and just put new stuff in. Wow. That's expensive.

00:19:23.839 --> 00:19:27.019
That's expensive. And you're stuck with supply

00:19:27.019 --> 00:19:30.160
chain lines. You know, I could, if I had to put

00:19:30.160 --> 00:19:32.359
a new server in for somebody, I need six weeks.

00:19:33.259 --> 00:19:35.259
Realistically, either I've got to keep one on

00:19:35.259 --> 00:19:37.380
the shelf that will fit all my customers, which

00:19:37.380 --> 00:19:40.720
is going to be a hundred thousand dollars. Well,

00:19:40.819 --> 00:19:45.910
or I've got to order one in specially. and all

00:19:45.910 --> 00:19:51.069
it takes is a ship jackknifed in the Suez Canal.

00:19:51.430 --> 00:19:54.690
Yeah, exactly, right. Or storms going around

00:19:54.690 --> 00:19:57.529
the Cape of Good Hope. Yeah. Or something going

00:19:57.529 --> 00:20:02.950
on in the Panama Canal, and you're stuffed. You

00:20:02.950 --> 00:20:05.670
just can't get the kit. So let me ask you a question.

00:20:07.009 --> 00:20:12.470
Again, totally ignorant in this area. cyber security

00:20:12.470 --> 00:20:16.650
insurance becoming a thing now cyber security

00:20:16.650 --> 00:20:20.589
insurance is like any other risk it is a business

00:20:20.589 --> 00:20:23.750
case it's not a technical thing so if you would

00:20:23.750 --> 00:20:26.650
insure against public liability if you would

00:20:26.650 --> 00:20:32.009
insure against theft um anything like that cyber

00:20:32.009 --> 00:20:35.230
cyber insurance especially this side of the atlantic

00:20:35.230 --> 00:20:40.730
is quite a big thing the payout percentages are

00:20:42.059 --> 00:20:49.740
Claim to payout is about 40%. So not high. Not

00:20:49.740 --> 00:20:54.539
high. You make one mistake, or you can't prove

00:20:54.539 --> 00:20:58.480
something, then the insurance companies, let's

00:20:58.480 --> 00:21:00.539
face it, insurance companies never like paying

00:21:00.539 --> 00:21:04.500
out. So the insurance companies will say, no,

00:21:04.599 --> 00:21:11.259
we're not paying your couple hundred. thousand

00:21:11.259 --> 00:21:17.339
pound dollar claim. There are things you can

00:21:17.339 --> 00:21:20.940
do to mitigate it. And I had to double check

00:21:20.940 --> 00:21:25.039
this before we said we were speaking today. Let

00:21:25.039 --> 00:21:29.039
me explain how we do it here and how that translates

00:21:29.039 --> 00:21:33.519
to a US market. All right. The UK government

00:21:33.519 --> 00:21:36.640
created a thing called cyber essentials. It's

00:21:36.640 --> 00:21:43.630
a pillar of five. It's a framework, security

00:21:43.630 --> 00:21:47.609
framework, which has five pillars. One, firewalls.

00:21:48.309 --> 00:21:53.789
Two, secure configuration. So that means, you

00:21:53.789 --> 00:21:58.109
know, access control, not logging into your own

00:21:58.109 --> 00:22:02.509
machine with an administrative password. So if

00:22:02.509 --> 00:22:04.109
you use Windows, you try and install something,

00:22:04.230 --> 00:22:06.190
it won't let you do it without putting in a physically

00:22:06.190 --> 00:22:10.019
separate password. and things like multi -factor

00:22:10.019 --> 00:22:15.819
authentication, so the code to your mobile. You've

00:22:15.819 --> 00:22:18.680
got malware protection, so that's your antivirus

00:22:18.680 --> 00:22:21.599
that we used to call antiviruses, endpoint protection

00:22:21.599 --> 00:22:27.680
malware, and then patch management. Are you a

00:22:27.680 --> 00:22:32.059
Windows guy or a Mac guy? Windows. Windows. So

00:22:32.059 --> 00:22:36.599
on Tuesday last week, about this time, It should

00:22:36.599 --> 00:22:41.420
ask you to do an update. Have you done it? Gosh,

00:22:41.420 --> 00:22:44.839
I don't even remember seeing it. Every second

00:22:44.839 --> 00:22:48.440
Tuesday of every month is Patch Tuesday. Microsoft

00:22:48.440 --> 00:22:52.460
releases its updates, some of which are security

00:22:52.460 --> 00:22:57.440
-based, some of which are quality -of -life -based,

00:22:57.559 --> 00:23:03.339
bug fixes, all that kind of thing. So last Tuesday,

00:23:03.539 --> 00:23:07.529
yeah, Tuesday last week, um was the yeah it was

00:23:07.529 --> 00:23:13.569
last tuesday um was patch tuesday okay i'm going

00:23:13.569 --> 00:23:18.450
to look into it but 50 of those listening to

00:23:18.450 --> 00:23:23.369
this haven't done it i i know i haven't i unless

00:23:23.369 --> 00:23:25.990
unless it unless it did it automatically it can

00:23:25.990 --> 00:23:29.509
do it automatically that is valid but if you

00:23:29.509 --> 00:23:32.009
ever see a little sort of like a recycling symbol

00:23:32.009 --> 00:23:34.150
with a little orange dot in the bottom by your

00:23:34.150 --> 00:23:39.559
clock That's asking for an update. I see it right

00:23:39.559 --> 00:23:44.339
now. Your device needs to restart to install

00:23:44.339 --> 00:23:51.960
updates. Yep. Thank you. Okay. The way I deal

00:23:51.960 --> 00:23:53.700
with it with my customers, bear in mind we've

00:23:53.700 --> 00:23:58.299
got hundreds, is we manage it for them. Got it.

00:23:58.650 --> 00:24:02.950
So my team will take those updates because Microsoft

00:24:02.950 --> 00:24:05.349
have form of setting out stuff that will brick

00:24:05.349 --> 00:24:09.849
their kit. I'll brick your PC or cause it to

00:24:09.849 --> 00:24:12.009
crash. The famous blue screen of death is now

00:24:12.009 --> 00:24:13.750
a black screen. That was an update a couple of

00:24:13.750 --> 00:24:20.410
months ago. Then we check it. We have a few Bastion

00:24:20.410 --> 00:24:22.250
machines that we just have sitting around that

00:24:22.250 --> 00:24:25.730
literally just constantly getting updated. And

00:24:25.730 --> 00:24:29.430
we make sure that they will work. Got it, and

00:24:29.430 --> 00:24:32.950
then we release it to our customers now going

00:24:32.950 --> 00:24:35.829
back to that framework. We call it cyber essentials

00:24:35.829 --> 00:24:41.630
Mm -hmm is the CIS CIS a have something similar

00:24:41.630 --> 00:24:46.890
based on our program or the UK program and With

00:24:46.890 --> 00:24:49.230
cyber essentials the way it works in over here

00:24:49.230 --> 00:24:56.079
is you self -certify so you have a Whole bunch

00:24:56.079 --> 00:24:58.099
of questions that get updated every couple of

00:24:58.099 --> 00:25:03.940
years and you have to Basically has to be signed

00:25:03.940 --> 00:25:09.220
by a director So I do it for my customers. I

00:25:09.220 --> 00:25:15.339
do it for us my day job and it's basically have

00:25:15.339 --> 00:25:20.099
you seen each of these five pillars taken care

00:25:20.099 --> 00:25:22.720
of them Here's detail. Tell us what version of

00:25:22.720 --> 00:25:24.980
the browsers you're using. Got it. What version

00:25:24.980 --> 00:25:26.720
of Windows you're using. What's your antivirus

00:25:26.720 --> 00:25:30.160
called? So if nothing else, you are doing an

00:25:30.160 --> 00:25:35.660
annual check. Got it. Okay. They then take that

00:25:35.660 --> 00:25:37.880
to another level. As I say, it's self -certified.

00:25:37.880 --> 00:25:39.599
You sign it off. You submit it. They'll come

00:25:39.599 --> 00:25:43.099
back and ask questions. I have never, ever submitted

00:25:43.099 --> 00:25:45.039
one and not had questions back, and I've done

00:25:45.039 --> 00:25:51.359
hundreds. It comes back. The auditor will ask

00:25:51.359 --> 00:25:53.200
you some stupid question because you haven't

00:25:53.200 --> 00:25:55.960
put a dot in the right place or, you know, stood

00:25:55.960 --> 00:25:57.759
on your head, stood on one leg, bounced up and

00:25:57.759 --> 00:26:01.099
down while you signed it or something. And then

00:26:01.099 --> 00:26:02.519
after it's gone back and forth a couple of times,

00:26:02.559 --> 00:26:06.140
they send you a certificate. Depending on who

00:26:06.140 --> 00:26:09.279
and where you get it, that can come with up to

00:26:09.279 --> 00:26:12.519
a quarter of a million pounds of insurance off

00:26:12.519 --> 00:26:20.799
that, $350 ,000 of cyber insurance. Cyber insurance

00:26:20.799 --> 00:26:23.880
that is covered by the things within Cyber Essentials,

00:26:23.880 --> 00:26:26.480
not everything else that goes around it. Got

00:26:26.480 --> 00:26:34.140
it. The US version is called, funny enough, CISA,

00:26:34.140 --> 00:26:39.819
Cyber Essentials. And they've expanded it in

00:26:39.819 --> 00:26:42.880
some places. They've watered it down in others.

00:26:43.000 --> 00:26:47.500
It's just, you know, margins. They have six tenants,

00:26:47.759 --> 00:26:51.759
the leadership. so the management of your business

00:26:51.759 --> 00:26:56.460
and the technology etc um your staff so training

00:26:56.460 --> 00:27:00.299
your staff um the workplace you know do you have

00:27:00.299 --> 00:27:03.720
locks on the doors it's it's that you know it's

00:27:03.720 --> 00:27:07.339
that yeah yeah yeah um and then how you protect

00:27:07.339 --> 00:27:11.299
your data how you protect your tech and how you

00:27:11.299 --> 00:27:18.140
would respond Now, Cyber Essentials, the UK version,

00:27:18.180 --> 00:27:22.819
has a second tier, which is audited by a real

00:27:22.819 --> 00:27:28.079
auditor. You submit your audit, your self -certified,

00:27:28.160 --> 00:27:31.079
and they basically say, okay, now prove it. Got

00:27:31.079 --> 00:27:34.259
it. I want to see X number of computers. I want

00:27:34.259 --> 00:27:37.500
to be able to run this audit on them. Are they

00:27:37.500 --> 00:27:40.299
up to date? Have they got antivirus? Nobody's

00:27:40.299 --> 00:27:42.819
logging in as an administrator, that kind of

00:27:42.819 --> 00:27:46.309
thing. They'll do a pen test, so they're checking

00:27:46.309 --> 00:27:49.750
the ingress into the business. So they are checking

00:27:49.750 --> 00:27:53.970
the external firewalls, and they're making sure

00:27:53.970 --> 00:27:55.890
you're running the latest windows, et cetera,

00:27:55.950 --> 00:28:02.369
et cetera, et cetera. So that in itself is one

00:28:02.369 --> 00:28:09.509
of those scenarios where if you were to come

00:28:09.509 --> 00:28:12.890
through us to arrange it, through the day job,

00:28:13.529 --> 00:28:15.930
um we'd say okay right you do this we stick a

00:28:15.930 --> 00:28:18.869
little agent on every pc we are continuously

00:28:18.869 --> 00:28:21.410
monitoring if something changes we know within

00:28:21.410 --> 00:28:24.970
15 minutes got it and we'll give you a quarter

00:28:24.970 --> 00:28:27.390
of a million pounds worth of cyber insurance

00:28:27.390 --> 00:28:32.950
interesting and it's not expensive for a typical

00:28:32.950 --> 00:28:37.210
smb say 20 15 to 20 people you're looking at

00:28:37.210 --> 00:28:42.930
probably about 4 000 pounds a year so 5 000 Your

00:28:42.930 --> 00:28:47.789
insurance premiums that. Right, right. And that's

00:28:47.789 --> 00:28:53.490
obviously well worth it. Gosh. All right. So

00:28:53.490 --> 00:28:57.309
unfortunately, we have to wrap up. We're definitely

00:28:57.309 --> 00:28:59.309
going to have you back because I have got so

00:28:59.309 --> 00:29:05.349
many questions. This is fascinating to me. And

00:29:05.349 --> 00:29:10.039
to you listening out there, I really hope you

00:29:10.039 --> 00:29:14.359
get something out of this. And ask yourself the

00:29:14.359 --> 00:29:17.279
question that Noel said, that he asked me, like,

00:29:17.380 --> 00:29:23.700
if you were hacked and everything was shut down,

00:29:23.960 --> 00:29:29.000
how long can your business sustain that? You

00:29:29.000 --> 00:29:30.619
know, is it one day? Is it two days? I mean,

00:29:30.619 --> 00:29:31.720
obviously it's not going to be one or two days.

00:29:31.720 --> 00:29:34.619
It's going to be much longer. But how long? realistically

00:29:34.619 --> 00:29:38.079
can you sustain your business that that kind

00:29:38.079 --> 00:29:42.440
of loss and if i mean pay attention to your answer

00:29:42.440 --> 00:29:47.000
and if and if it begins to cause concern or frighten

00:29:47.000 --> 00:29:50.109
you like begin taking action there thank you

00:29:50.109 --> 00:29:52.009
for being here today i'm really happy that you

00:29:52.009 --> 00:29:54.269
tuned in to vision pros live i'm looking forward

00:29:54.269 --> 00:29:57.769
to seeing your reactions as these episodes continue

00:29:57.769 --> 00:29:59.609
to move forward this is going to get more and

00:29:59.609 --> 00:30:01.630
more fun we'll have more and more engagement

00:30:01.630 --> 00:30:03.710
as well we'll invite people to participate in

00:30:03.710 --> 00:30:05.869
the show and thank you for giving us your time

00:30:05.869 --> 00:30:08.170
and attention have an excellent time building

00:30:08.170 --> 00:30:10.490
out your vision and becoming a vision pro yourself
