0:01
coverage on what's happening today, plus
0:03
the computer breach in Lever and the
0:05
lesson for the rest of us during what is
0:07
National Cyber Security Awareness Month
0:09
as it happens. Joining us now with more
0:11
on this is retired FBI cyber security
0:13
expert Scott Augenbomb who also authored
0:16
a book called The Secret to Cyber
0:18
Security. Scott, great to see you. It's
0:20
been a while. We don't know everything
0:22
about Leverne yet, but you can't help
0:23
but wonder if that attack on a city
0:25
government is another one of these
0:27
ransomware attacks. Well, all of these
0:30
attacks that are happening on state and
0:33
local governments all are financially
0:35
motivated. It's either a database, a
0:38
data breach to steal sensitive
0:40
information for financial gain or the
0:42
cyber criminals are holding the
0:44
information hostage unless a ransom is
0:47
I've heard you say before rule of thumb
0:49
is you don't pay the hackers. Is that
0:51
still where you come down on this? I
0:54
always say we got to think prevention
0:57
because even if you do pay the hackers,
0:59
sometimes you won't get your information
1:02
back. Could be penalties. What if the
1:04
bad guys are overseas in a foreign
1:07
country? And the other thing that's
1:10
really really important is if we keep
1:12
paying these bad guys, they're going to
1:14
continue. So prevention, prevention,
1:17
Well, you mentioned, you know,
1:18
prevention. What are the the things that
1:21
companies and individuals ought to do in
1:23
an effort to stop them before they get
1:27
Well, it's important that we realize
1:29
that a majority of cyber attacks are
1:32
nothing more than social engineering.
1:34
Tricking us into doing something we
1:36
normally wouldn't do. clicking on a link
1:38
in an email downloads malicious code
1:41
into an organization and that could be a
1:43
ransomware or a data breach or even a
1:46
text message that looks like it's coming
1:49
from someone saying you owe tolls or the
1:53
IRS or back taxes or rooc calls and
1:56
through the use of artificial
1:58
intelligence these emails, text messages
2:01
and telephone calls look amazingly
2:04
legitimate. So, we need to be aware of
2:06
that. Use two factor authentication and
2:09
don't use the same password for multiple
2:12
Great advice here. I think we could talk
2:14
for another half hour. We're gonna have
2:16
to end it here. Scott Ogenbomb, retired
2:18
FBI agent and cyber security expert.
2:21
Thank you very much for your time. Thank