Podcasts about Facial

Share on
Share on Facebook
Share on Twitter
Share on Reddit
Copy link to clipboard
  • 1,568PODCASTS
  • 2,408EPISODES
  • 38mAVG DURATION
  • 1DAILY NEW EPISODE
  • Nov 23, 2021LATEST
Facial

POPULARITY

20112012201320142015201620172018201920202021


Best podcasts about Facial

Show all podcasts related to facial

Latest podcast episodes about Facial

Crime Stories with Nancy Grace
Suspect With Distinctive Facial Scarring Wanted in Tacoma Tot Teekah Lewis Disappearance

Crime Stories with Nancy Grace

Play Episode Listen Later Nov 23, 2021 35:50


Two-year-old Teekah Lewis disappeared from a local bowling alley in Tacoma, Washington. She was there with her family: her mom, aunts, uncles, friends were all there bowling in lanes 7 and 8. It was league night at Frontier Lanes bowling alley, so there were tons of people there. But amidst all her family, Teekah seemingly vanished into thin air while just 10 feet away from her mother, Theresa Lewis. While family and friends bowled, the little girl played at the wheel of a video arcade game. Theresa Lewis says she looked away from her baby girl for less than a minute, and when she looked back, she was gone. A witness comes forward describing a man with facial scarring as a potential suspect.Joining Nancy Grace today:Theresa Lewis - Victim's MotherDale Carson - Criminal Defense Attorney (Jacksonville), Former FBI Agent, Former Police Officer, Author: "Arrest-Proof Yourself"Dr. Bethany Marshall - Psychoanalyst, www.drbethanymarshall.com, New Netflix show: 'Bling Empire' Dan Scott - Former Los Angeles County Sheriff's Sergeant, 26 years with Special Victims Bureau Specializing in Child Abuse Olivia LaVoice - Crime reporter for Q13FOX (Seattle)TIPLINE: Tacoma Police Crime Tips Crime Tips (253) 591-5959 or Crime Stoppers 1-800-222-TIPS (8477)See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

The Treatment Room
55. Walking You Through a Facial, Burnout + Self Care is Our Responsibility As Providers.

The Treatment Room

Play Episode Listen Later Nov 23, 2021 58:52


Hi Treatment Roomies :) In this episode I'm answering your listener questions and talking about: - treating darker Fitz - walking you through a facial - defining a treatment - preventing burnout CLASSES MENTIONED Douglas Preston's Courses + Extractor Code Tess10 for a discount Concepts Institute Ingredients Course Joelle Lee Courses Follow me on social media to submit a question for a future episode! MY SOCIAL MEDIA: Tess' Instagram @myestytessa Tess' YouTube: Tess Zolly Tess' TikTok: @myestytessa Sweet by LiQWYD | https://www.instagram.com/liqwyd Music promoted by https://www.free-stock-music.com Creative Commons Attribution 3.0 Unported License https://creativecommons.org/licenses/by/3.0/deed.en_US --- Support this podcast: https://anchor.fm/the-treatment-room/support

Clean Beauty School
33: Facial lymph care, massage techniques & topicals | holistic esthetician Britta Plug

Clean Beauty School

Play Episode Listen Later Nov 22, 2021 54:10


“[When you do facial and neck lymph massage work] that's where you can access the vagus nerve, which brings our body into parasympathetic states. So when we do this, we're talking about beauty, sculpting, clearing, brightening, and having that glow—but we're also affecting our entire body,” says holistic esthetician and mbg collective member Britta Plug. “It makes sense why these beauty rituals feel so good!” In this episode of Clean Beauty School, host and mbg beauty director Alexandra Engler chats with Plug about all things lymphatic drainage—from massage tips and movements to topicals.  Shown notes: -Follow Britta Plug -Listen to our dedicated guasha episode.  -Studies connecting breathwork and skin quality: How breathwork helps you enter a parasympathetic state, how it helps you deal with negative emotions, and how the Wim Hof method reduces inflammation.  -The Bean Protocol by Unique Hammond -Read more about topics discussed in this episode: lymphatic drainage massage, facial lymphatic work, breathwork, facial cupping, facial guasha, puffy eyes, facial oils for each skin type, the gut-skin connection, hormonal acne, oil cleansing.  -Plug's product recommendations: Wildling's Lumin Collection.  Comments: podcast@mindbodygreen.com Sponsorship inquiries: sales@mindbodygreen.com 

Skin and the City
The Facial Massage Rundown, an Esty Support Group + a Solo Esty Q&A

Skin and the City

Play Episode Listen Later Nov 22, 2021 38:23


Overview: We are building on self-care specifically for Esty's with an overlooked treatment that is easy to add to your morning routine. We share about a safe space we know of where you can engage and network and we deep dive self-massage: The emotional and physical benefits, where to start, how to improve and what products to use. Today We Talk About: Lumi Lip + our favorite sunscreen: Zinc It Over (Use code GLOW10 for 10% off HERE) Our best advice for going solo Example of a sample schedule and how to work your boundaries into it Come to our next Sip and Shop to network and shop on December 16th! Address HERE Join us in the Esty Support Group HERE Play with your face! Facial Massage Routine is LIVE HERE Skin Oils Kasey Loves: HERE and HERE Glow Tip of the Week: Add Lumi Lip (or any lip treatment) to your morning skincare routine and your lips will love you for it! Links Mentioned: Brow shaping and lamination master class + wholesale products are 10% off with Code SATC10 HERE (Valid through Dec '21) Exclusive discounts for Cyber Monday are only available in our newsletter! Sign up HERE ⭐️ Where is my steamer from? What's my favorite esty chair? Shop them and use code Kasey for 5% off your order HERE Be sure to follow along in your print or digital version of Skin and the City magazine As a Skin and the City listener, enjoy 5% off the whole website HERE For additional discounts, exclusive offers and so much more, sign up for the Skin and the City membership HERE To support this podcast, you can go HERE If you have 2 seconds to write us a review HERE, screenshot it and email it to us at magazine@glowskincarela.com and our Kim-Tern will be shipping you some goodies like the Manolo Blahnik - Awaken Mask pins! They're super adorable! You're gonna love them! Be sure to follow and tag us on IG! @skin.andthe.city and @glowskincarela Thanks for listening! --- Support this podcast: https://anchor.fm/skinandthecity/support

The Divorce Survival Guide Podcast
How to Cultivate Healthy Relationships with Dr. Akua Boateng

The Divorce Survival Guide Podcast

Play Episode Listen Later Nov 18, 2021 55:00


This week I am talking all about healthy relationships with Dr. Akua K. Boateng. Dr. Akua answers the question, “What the hell does a healthy relationship look like?” We explore the mechanics of developing a healthy relationship with Self and also learn the steps to reconnecting with your intuitive guidance.    Dr. Akua K. Boateng is a sought after mental health and relationship expert. With over 14 years experience in clinical practice and education, she specializes in an integrative approach to treating anxiety, trauma, relationship issues and other emotional concerns.  She is the founder & CEO of Boateng Psychotherapy & Consultation, where she counsels individuals and couples as well as partners with organizations in the integration of emotionally aware practices and initiatives. In the media, Dr. Akua has contributed to media outlets such as CNN, The Washington Post, Huff Post, Black Enterprise, Refinery29, Philadelphia Inquirer,  Slate Magazine, Harper's Bazaar, and others. Her genuine, empathic voice adds to the growing culture of mental health awareness. Show Highlights Reconnecting with your intuition and sense of self; also why you may have lost it in the first place. (8:15) You need time, safety, and a safe place to begin to lean towards repair and integration. (16:47) Why you can't heal within an abusive relationship. (17:53) What does a healthy relationship even look like? Interdependence. Consistency. It does not look like pain and harm. (22:56) The shift in cultural dialogue about mental health within the last five to ten years. (33:35) Is the trope, “you can't love another until you truly love yourself,” true? (36:21) Everyone has a blind spot. A healthy partner helps you see your blind spot and approach it with the utmost kindness and compassion. (38:26) A therapist's job during couples therapy. (42:15) Sometimes the healthiest place you can be is not together. (45:21) Couples should not pursue therapy when active abuse is occurring. (48:17) Top conflicts that Dr. Akua sees in her couples work. (48:35) Learn More About Dr. Boateng: Dr. Akua K. Boateng, a native of California, is a licensed psychotherapist with an emphasis in individual and couples therapy. With over 13 years of experience in clinical practice and education, she specializes in an integrative approach to treating anxiety, depression, relationship issues, intergenerational trauma and several other emotional concerns.  In 2015, after sharpening her expert approaches for clients with other facilities, Dr. Boateng opened a Philadelphia-based private practice and consultation firm, Boateng Psychotherapy & Consultation. She now works with clients to take ownership of their emotional health, become aware of unhealthy patterns and work toward a more authentic existence. Dr. Boateng is a sought after mental health expert and consultant, partnering with organizations to support the integration of emotionally aware practices and initiatives into their operations. Resources & Links: Should I Stay or Should I Go - Money Survey by Kate Anthony and Amanda Steinberg Www.Akuakboateng.comDr. Akua on Instagram Dr. Akua on Twitter Dr. Akua on Facebook TODAY'S EPISODE IS SPONSORED BY: SOBERLINK Proof. Protection. Peace of Mind. The Soberlink remote alcohol monitoring system consists of a portable breathalyzer with wireless technology for real-time results. With proven use as the leading choice in child custody cases since 2011, we are the only system that combines: Court-admissibility in all 50 states Facial recognition Tamper detection Easy-to-read Advanced Reporting™ Trust the Experts in Remote Alcohol Monitoring Technology™ to support the best interests of the child in your Family Law cases. JOIN THE SHOULD I STAY OR SHOULD I GO FACEBOOK GROUP

THE RICH CELENZA SHOW
#863 - Where To Find Cheap Massages and Facials! (RICH CELENZA Podcast)

THE RICH CELENZA SHOW

Play Episode Listen Later Nov 18, 2021 7:11


RICH CELENZA talks about how he used to go to massage and beauty schools to get cheap massages and facials. A lot of people don't even know that this exists. A lot of people may not also realize that by getting a massage or facial how good it's going to feel. It is also very good for their health and wellness. Rich also talks about if people are looking to save money when getting their hair done they can also find schools that do that cheap as well.

Motoring Podcast - News Show
Facial Gymnastics - 16 November 2021

Motoring Podcast - News Show

Play Episode Listen Later Nov 17, 2021 53:27


FOLLOW UP: VW LOSES APPEAL IN SUPREME COURTVolkswagen has lost their appeal, in the US Supreme Court, to have claims for damages brought by individual states thrown out. VW felt that the rules only allowed the federal government to make claims for damages under the Clean Air Act. This means the potential for further financial penalties is very real, with Ohio along with counties in Florida and Utah prosecuting Volkswagen and Bosch. To read more, click the Reuters article here. FOLLOW UP: TOWING RULES CHANGE POSTPONED The change in rules, to allow more people to tow larger trailers, has been quietly postponed, with no date yet given as when they will come into force. To see more, click the tweet from @thelorryist who shared the screenshot of the official site amendment, by clicking the link here. FOLLOW UP: “WINNER” OF UK EV CHARGER COMPETITION SHOWNThe Government has revealed the “iconic” charger, for the UK, following work from Royal School of Art and PA Consulting. The design is meant to put ‘ease of use and accessibility' at the heart of the final product. To read more, about this underwhelming concept, click here for the Autocar article. STRIKE ACTION NOT VOTED THROUGH AT DVLAStrike action will not be taking place at DVLA's headquarters, in Swansea, as there wasn't enough votes registered. There has been a long running dispute over the safety of staff, from Covid issues, which prompted this latest move by the unions. To read more, click here for the YesAuto article. COP 26 SOME OEMS SIGN SOME DO NOTAt the recent COP 26 global gathering, to discuss and plan our way out of the climate crisis we have, some manufacturers pledged to aim for deadlines well in the future to stop selling internal combustion engined vehicles, in some markets. On the surface it looks like hitting the targets already stated by many Governments. Not every company agreed to this but as Alan argues, does it matter if a piece of paper is signed if they are actually doing it? To find out more, click the Autocar article here. UK BATTERY INDUSTRY LOSES CHEMICAL FIRMS INVOLVEMENTJohnson Matthey, who were partners for a number of battery production firms, in the UK, has announced they are pulling out of the market and will now focus on decarbonising chemicals in the supply chain and hydrogen technologies. This is a blow to the UK industry. For more information, click here to read the Autocar article. TVR IN JOINT VENTURE WITH MINING COMPANYTVR has announced a joint venture with Ensorcia Metals, a lithium mining company, who will bring cash to help develop the V8 Griffiths and EV technology for future models. To read more and make up your own mind on whether we will actually see any Griffiths on the road, click the Auotcar article here. BRITISH BUILT EV BUSES IN TRIAL Electric double deckers buses, with a range in the region of 300 miles, will begin trials next year. Norfolk based Equipmake, Spanish coachbuilder Beulas and London's largest bus operator are partnering up to investigate the viability of such vehicles. To find out more, click here for the Autocar article. ——————————————————————————-If you like what we do, on this show, and think it is worth a £1.00, please consider supporting us via Patreon. Here is the link to that CLICK HERE TO SUPPORT THE PODCAST——————————————————————————-NEW NEW CAR NEWSVolkswagen TiagoThe VW Tiago, is known as the Nivus in South America, has been tweaked and brought to Europe next year. Starting at £21,960 and based on the same platform as the Polo and T-Cross, it is a B segment coupe SUV. For more information, click here for the Autocar article. Subaru SolterraSubaru will be revealing their new EV SUV, the Solterra, at the LA Motor Show. You will be unsurprised to hear that due to co-developing this with Toyota (who call their version the bZ4X, if you remember) that it looks almost identical to Toyota's version. More details are due when they pull the covers off at LA. To find out more now though, click the Autocar article here. LUNCHTIME WATCH: NEC CLASSIC CAR SHOW 2021 Alan went to an event last weekend, the NEC Classic Car Show. He met lots of lovely people, some of whom he even remembers their name (as well as actually meeting them!). You can hear him tell Andrew what a fab time he had and also, watch Ian Seabrook's two ace videos from the show here. For Video 1, click this link. After that has whetted your appetite, click here for Video 2. LIST OF THE WEEK: GOOD, BAD OR UGLY? THE BIGGEST AUTOMOTIVE FADSYou can run through the Autocar sideshow of some of the more memorable fads to have struck the motoring world. Once you've been through, don't forget to tell the chaps which is your favourite one and why. To have a look, click this link here. AND FINALLY: UK P1800 GASSER WINS HOT WHEELS LEGEND STATUSThe UK based Volvo P1800 gasser that was the UK's entry into the global finals for the next Hot Wheels Legend car has been picked as the overall winner! The car screams Hot Wheels and we are delighted for Lee Johnstone. To find out more, click the Elan PR post here.

Golden Hour Drip with Logan Lee Miller
Navigating Food & Family this Thanksgiving | facial drama, self care, + lotssa tips

Golden Hour Drip with Logan Lee Miller

Play Episode Listen Later Nov 17, 2021 41:25


Episode 135: Holiday food and family gatherings can be tough for everybody. Listen for some applicable tips for a smooth holiday season this year!SECRET FACEBOOK GROUPJOIN OUR MAILING LISTTIKTOK

Then God Moved
Finding Godly Confidence Despite Facial Paralysis, Bullying + Abuse | Ep. 21

Then God Moved

Play Episode Listen Later Nov 16, 2021 47:31


As a baby, Davina Stallworth suffered a stroke that partially paralyzed her face. What followed that stroke were years upon years of self-hate, bullying, and abuse. Davina's life lacked direction and purpose...then, God moved. After listening to this episode, please take a minute to leave a rating and a review! And as always, feel free to share any questions or comments via Instagram, Facebook, and via email @ ThenGodMoved@gmail.com. You can also learn more this week's guest here.

Ben Davis & Kelly K Show
11/15/2021 the One With The Condiment Facial, Volunteer Date Update And Tickle Science

Ben Davis & Kelly K Show

Play Episode Listen Later Nov 15, 2021 52:56


Kelly had to spin the dreaded Wheel of Dares after Ohio State beat Purdue over the weekend....it didn't work out well for her. We got an update in Group Therapy from Tara who followed up after her first date wasn't what she expected, and she was afraid she had blown it with a great guy! We learn some tickle science and highlight one of the best Amazon product reviews ever!

Ben Davis & Kelly K Show
Wheel of Dares - Condiment Facial

Ben Davis & Kelly K Show

Play Episode Listen Later Nov 15, 2021 8:01


Ben & Kelly bet on the outcome of the Ohio State vs. Purdue football game. Since Ohio State won, Kelly had to spin the Wheel of Dares!

Skin and the City
Elevating Your Services and Self-Care: Electric Facial Beds, Steamers and Esthetician Smoothies

Skin and the City

Play Episode Listen Later Nov 15, 2021 32:34


Overview: Do you ever make a purchase and then kick yourself because you didn't do it sooner? Learn from Kasey how she has easily elevated her services for herself and her clients plus get deets on where we will be dropping exclusive resources and promo codes soon! Today We Talk About: Resources and codes you can get when you sign up for our newsletter HERE Ways we have elevated our services since COVID Milo Electric Massage and Facial Bed + use code Kasey for 5% off Setting the tone in the morning with an anti-inflammatory smoothie HERE The Glow Herbal Steam subscription launches today! Check it out HERE Glow Tip of the Week: Stop telling yourself that you can't have _______. Instead, add great things to your diet or life. Remember to take care of yourself and savor the things you enjoy. Links Mentioned: SkinTe+ Oh My Goodies + Sakara “Gskincare20” for 20% off ⭐️ Where is my steamer from? What's my favorite esty chair? Shop them and use code Kasey for 5% off your order HERE Be sure to follow along in your print or digital version of Skin and the City magazine As a Skin and the City listener, enjoy 5% off the whole website HERE For additional discounts, exclusive offers and so much more, sign up for the Skin and the City membership HERE To support this podcast, you can go HERE If you have 2 seconds to write us a review HERE, screenshot it and email it to us at magazine@glowskincarela.com and our Kim-Tern will be shipping you some goodies like the Manolo Blahnik - Awaken Mask pins! They're super adorable! You're gonna love them! Be sure to follow and tag us on IG! @skin.andthe.city and @glowskincarela Thanks for listening! --- Support this podcast: https://anchor.fm/skinandthecity/support

Calvary Hanford Audio Podcast
Prophecy Update #680 – Somebody's Watchin' You

Calvary Hanford Audio Podcast

Play Episode Listen Later Nov 14, 2021 5:27


The future is an intrusive surveillance state. Facial recognition, retinal scans, palm scans, and implanted chips are the tip of the technology iceberg that exist and are currently in use. Any of them could be used by government to restrict buying and selling, restrict travel, or pretty much anything else. (Pastor Gene Pensiero)

Calvary Hanford Video Podcast
Prophecy Update #680 – Somebody's Watchin' You

Calvary Hanford Video Podcast

Play Episode Listen Later Nov 14, 2021 5:38


The future is an intrusive surveillance state. Facial recognition, retinal scans, palm scans, and implanted chips are the tip of the technology iceberg that exist and are currently in use. Any of them could be used by government to restrict buying and selling, restrict travel, or pretty much anything else. (Pastor Gene Pensiero)

The Face Yoga Expert Podcast
107. How To Do Facial Cupping At Home To Lift The Face

The Face Yoga Expert Podcast

Play Episode Listen Later Nov 14, 2021 29:22


Have you heard of facial cupping? Sakina Di Pace AKA The Facial Cupping Expert is an Acupuncturist who has used facial cupping on her clients for many years and now teaches others how to do it safely and effectively at home. In this episode we chat about:  What facial cupping is  Benefits of facial cupping  What areas of the face it works on  Tips for at-home use  Silicone vs glass cups  Contraindications   Using facial cups if you have had botox/fillers  Sakina's wellness routine  Sakina's top tip for inner peace  You can connect with Sakina on https://thefacialcuppingexpert.com/ (https://thefacialcuppingexpert.com) and @thefacialcuppingexpert on Instagram  Useful links: https://faceyogaexpert.com/teacher-training (Face Yoga and Gua Sha Teacher Training Courses) https://smarturl.it/faceyogajournal (My New Book, The Face Yoga Journal) https://faceyogaexpert.com/ (My Website) https://faceyogaexpert.com/fye-blog (My Blog) https://faceyogaexpert.com/apps#apps (My Apps) https://bit.ly/2IjdPY0 (My Book Danielle Collins Face Yoga) https://www.amazon.co.uk/Danielle-Collins-Face-Yoga/dp/B089GDGDS4/ref=tmm_aud_swatch_0?_encoding=UTF8&qid=&sr= (My Audio Book) https://faceyogaexpert.com/sessions (Face Yoga Sessions)   https://faceyogaexpert.com/shop (My Shop) Follow me on social:  https://www.instagram.com/faceyogaexpert/ (Instagram: @faceyogaexpert)  https://www.facebook.com/The.Face.Yoga.Expert/ (Facebook: The Face Yoga Expert)  https://twitter.com/faceyogaexpert (Twitter: @faceyogaexpert)  https://www.youtube.com/channel/UC4xcFhl2nMbseJO9nEl_kog (YouTube: The Face Yoga Expert ) https://www.linkedin.com/in/danielle-collins-77744437/?originalSubdomain=uk (Linkedin: Danielle Collins)  https://www.pinterest.co.uk/faceyogaexpert/ (Pinterest: faceyogaexpert) https://www.tiktok.com/@faceyogaexpert?lang=en (TikTok: faceyogaexpert)

Craig Peterson's Tech Talk
Is Your Firewall Actually Protecting You? What Should You Be Doing?

Craig Peterson's Tech Talk

Play Episode Listen Later Nov 12, 2021 84:27


Is Your Firewall Actually Protecting You? What Should You Be Doing? New stats are out this week. So what's the number one vector of attack against us? Our Firewalls. And they're failing. So, what's going on. And what can you do about it? [Automated transcript follows] [00:00:16] And of course, I'm always talking about cyber security, because if you ask me that is one of the biggest problems we have in business. [00:00:27] Today. Well, yeah, you got to find employees. In fact, uh, it's almost impossible to find them in the cyber security space as well. And it's been hard for years. So I try to keep you up-to-date here. We've got boot camps that are coming up and you are really going to like them. We've been working on some supplemental materials for it. [00:00:47] And of course these boot camps are always free, so you can join it. You can have your friends come and learn the. Basics. It's not one of these high sell things. Right. I, I got a little letter in the mail this week saying, Hey, you can come and get a free steak dinner. And of course it's kind of like a timeshare, right? [00:01:09] Jay, you have to listen to the pitch. Yes. Stay over. On us. And you are going to be sitting there for four hours listening to this crazy pitch that's going on. That's not what my bootcamps are. Anybody that's been to. One of them will tell you we work on it. I explain it. You know what you have to do, how you have to do it, the wise, the winds, the wherefores. [00:01:35] So if you would like to learn more for yourself, Make sure you sign up Craig peterson.com sign up for my newsletter. And when a bootcamp is coming up, I will be sure to tell you about it in the newsletter so that you can attend. And it's important to, to understand that this is yeah. Aimed at business, the, these boot camps, but almost everything businesses have to do or shouldn't be doing the same thing applies to you in your. [00:02:08] So, if you are a small business person, if you're someone who has some it experience, and you've been assigned to worry about cyber security, this is for you. If you are a very small business and you're kind of the Jack of all trades, and you've got to worry about cybersecurity, this is for you. And I just got. [00:02:31] This week from someone on my email list who is retired and she was talking about her husband and her, they don't have any kids, no errors. They're trying to protect their financial investments. And of course I responded saying, Hey, I'm not a financial investment advisor, but I can certainly give you some cyber security input, which I did. [00:02:53] And you can ask your questions as well. I'm more than glad to hear them. And you probably, if you've sent them in, you know, I always answer them now. My big man, a few days might take me a week, but I will get around to it. And I try and respond to the emails. Sometimes I answered here on the radio show or on my podcast, but usually it's via email me. [00:03:17] At Craig peterson.com. And of course, that's also on my website, Craig peterson.com. And that's also my name Craig Peters on.com. So let's get into the firewall thing. When you have a network, you are connecting that network to your computers, maybe. To your security cameras, to your printers that you have, maybe there's a lock system. [00:03:44] Maybe there's more, all of this stuff is interconnected and it's all rather well and good. You can have a whole lot of fun with it, but it is not as particularly good if you can't get out to the internet. So what do we do? We hook our network, whether it's home or if it's business to the internet. Now, you know, all of this stuff so far, right? [00:04:06] You're following me. The internet is actually inter connected networks. In case you didn't know, there are now millions of networks that are connected on the internet. There are core networks out there. We were my company like number 10,000. I think it was, uh, a S an R a S number autonomous system. So we were fairly early on. [00:04:32] And of course, as you know, I've been on the internet in various forums since the early 1980s and helping to develop the protocols, but it is important to remember it is an interconnected network of networks. You might ask why? Well, the bottom line is you aren't connecting your network with other networks that have malicious software on them. [00:04:58] Maybe they're just poorly configured. Maybe they're causing a denial of service attack effectively because there's so badly configured. But whatever the case may be, you are still exposed. If you look at the traffic that's coming to your router. So your router is sitting at the edge of your network connected to your internet service provider. [00:05:19] So it might be Comcast or Verizon or a whole slew of others. But your network is connected via a router. Then the router knows how do I get my data from the input to the output or from the output to the input, if you will upstream and downstream data, that's what the router is for. And if you look at the data on your router and most of us can't, but if you were able to, what you will see is hundreds of thousands of internet packets coming to, and from your. [00:05:55] Router your endpoint every day. Usually these are bad guys doing what are called scans. They do port scans. They're primarily looking for services. So what do you, do you have a firewall now in many cases, you'll get a device from your Janette service provider that has a router built in and has a firewall built in, and it has wifi. [00:06:19] All of this stuff, all built in together makes life all nice and warm and fuzzy and Catalina, doesn't it. But in reality, it's not necessarily a good thing to have it all in one, because you're definitely not going to get the best of breed and router or firewall or wifi, but that's a different story. What is that firewall for that router? [00:06:41] Of course, it's getting all this internet traffic and anything that's on the internet that is. I'm trying to get to you is going to go through the. And anything that you are trying to send up to the internet, like for instance, to try and get a web page or something is also going to go up through that router. [00:07:02] So how do you protect yourself time? Was that there wasn't really much of a way to protect yourself. And frankly, there weren't a lot of reasons. To try and protect yourself. And the internet was just this wonderful open thing, lots of fun and played around a lot. Back in the early nineties, it was, it was just a joy in the late eighties to, to be connected up to the internet and then bad guys started doing bad things. [00:07:30] We took the concept of what you have in an automobile and applied it to the. If you're driving your car, your in the passenger compartment and that passenger compartment is hopefully warm in the winter and cool in the summertime. And you are protected from that big mean nasty engine that's in front of you, or if you're driving an electric car from those mean nasty batteries that are probably below you in that car and what's between you and the. [00:08:04] Of course a firewall. And the idea is to keep the nastiness of that engine, all of the heat, the oil, the grime, the wind, everything else is associated with that engine. Keep that away from you so that you can now drive that car just comfortably in that controlled climate of the passenger compartment, that concept was then applied to the inter. [00:08:30] And in fact, I designed and implemented one of the first firewalls ever made way back when and the firewall in the internet Partland is very similar to the car in the car. You have some protrusions through that fire. Don't you, you you've got a steering wheel. How does that get up to the front of the car? [00:08:53] Well, it goes through the firewall and around that steering wheel, of course there's some EBDM, some rubber type stuff that helps stop anything from coming through right next to that steering column. Same, thing's true with the brake pedal and the gas pedal. At least it used to be. Nowadays, it's so much of this as drive by wire, that the only thing going through the firewall is a wire and there's no mechanical linkage. [00:09:24] Unlike my car, which is a 1980 Mercedes-Benz diesel. Where yes, indeed. Direct linkages to everything. So the firewall in the cars protecting you from the nastiness in the engine compartment and the firewall, when it comes to your internet is doing something very similar. Think about your house for a minute, you have a house with doors and windows. [00:09:53] I would hope. And a chimney and maybe a couple of other protrusions that are going outside of the house. Well, you have some similar problems and when it comes to the internet and when it comes to the firewall, With your house, sir. Sure. You could post a guard out front, a whole series of them. You've got a dozen guards out front and they are all guarding that front door. [00:10:19] But if no, one's watching the back door, if no one's paying attention to the windows, there's still ways for the bad guys to get in. And that's what we're going to talk about. How does the internet firewall tie into this analogy of cars and the analogy of your home? Because it's a very important point when you get right down to it. [00:10:44] We need to understand this because the number one tactic reported this week by MITRE and Cisco is exploitation of public facing application. So I'm going to explain what that is. What's your firewall can do for you and what you should do for your firewall. A stick around. We've got a lot more coming up. [00:11:09] I want to invite you to go. Of course, right now, online to Craig peterson.com. Once you're there, just sign up for mind's newsletter. Simple Craig peterson.com. [00:11:25] This week, we found out what the top five tactics are that are most frequently being used by bad guys to attack us. This is done by MITRE and Cisco systems. Number one, public facing applications. What does that mean? [00:11:42] We've been talking about this report, but really what we've been delving into is how data flows on your network, whether it's a home network or maybe it's a business network, how does this whole mess work? [00:11:58] And when miters talks about the biggest problem here, 91% of the time being what's called an exploit of a public facing application, what does that mean? We went through the basics of a firewall and a router. So all of the data coming from the internet, coming into the router, then handed to the firewall. [00:12:24] Any data going out, goes into the firewall. And then the. So that's the pretty simplistic version. And of course the firewall on your network does a similar thing to the firewall in your car. It stops the bad stuff, at least it's supposed to, but your home and your car both have different ways of getting. [00:12:48] Past the firewall in the house. It's your doors and your windows in the car. Of course, it's where the steering column goes through where the brake pedal and the gas pedal go through the clutch, all of that stuff that perch, um, permeates, it goes through. That firewall. And of course, you've probably, if you're been around for awhile, you've had leaks coming through your firewall and, uh, you know, how poorest they can be sometimes. [00:13:18] Well, we have the same type of thing on our internet firewalls. Every home has doors and what we call the doors in on the internet is similar to what they call them. On the, in the Navy, on the water, the reports. So think about a porthole in a boat, or think about a, a door, a port, which is the French word for door. [00:13:45] What happens on the internet? For instance, if you're trying to connect to Craig peterson.com, you are going to connect to a specific port on my server. So the address typically, uh, is going to be resolved by DNS. And then once it gets to the server, you can connect to port 4 43. You might try and connect to port 80, but I'll do a redirect, but that's neither here nor there. [00:14:12] So you're going to connect to that port four 40. So my firewall has to say, Hey, if somebody is coming in and wants to get to port 4 43, which is called a well-known port, that's the port that all web server. Listen on. So if someone's trying to get to my port, my web server on port 4 43, let them in. But if someone's trying to get to another port, don't let them in. [00:14:48] Now there's multiple ways to respond or not respond. I can talk about that right now. That'd be for deep dive workshop, but the idea is. Each application that you are connecting to, or that your providing has. Part of the problem that we've been seen. And this is a very big problem is that people are not changing the administrative passwords on their machines. [00:15:20] So administrative passwords mean things like admin for the username and admin for the password on your firewall. So. Your firewall, if you have what's called when admin enabled, what that means is someone on the wide area network. In other words, The internet, someone on the internet or on the, when can connect to your firewall and control it. [00:15:51] This is, as you can imagine, a very big thing, and it is something that we cover in one of our workshops, explained it all and all of the details and what to do, but most businesses and most people have not properly configured their firewalls. When we're talking about number one, problem, 91% of the time being an exploit against public facing applications. [00:16:18] What that means is they could very well just be trying to connect to the administrative interface on your firewall. Unfortunately, they will often offer. Change the software on your firewall. So they won't just reconfigure. They'll just change it entirely. And they'll do all kinds of evil things. Again, we're not going to get into all of that and what to look for and what can happen. [00:16:44] But number one thing everybody's got to do, and I saw some stats this week as well, that made me want to bring the. Most people and most businesses about two thirds have not changed the default passwords on the hardware that they have. Now it can understand sometimes the kids confusing. No question about. [00:17:07] But if you don't change the password on something that's public facing, in other words, something that can be reached from the internet or again, the wide area network. I know there's a lot of terms for this, but something that someone else can get at from outside your network. And it's the default password like admin admin, you could be in a whole lot of. [00:17:35] So check that right now, please double check that triple check that because even if you have a router from a big internet service provider, again, like the Comcast Verizon's, et cetera of the world, they will almost always have it set up. So you can change that administrative password and Jewish. Now I, again, for clients, I have some different advice than I have for, for just regular users, but make sure you change that. [00:18:09] And here's the second part of the problem. What happens if you have a business and let's say you're not hosting your own website, like I've been doing for a couple of decades and how three 30 years, I guess now. Um, and so you've got your website hosted at some. Web height site, hosting place, you know, Gator or one eye and one eye and one or GoDaddy or whatever. [00:18:35] Okay. So, okay. That's fine. So let's not inside our network. Uh, w we don't worry about the security because that's the vendor's problem. Now we're talking about, okay, what happens. My users who need to work from home. This gets to be a very big problem for so many people, because work from home is important. [00:19:00] So what are you going to do? Well, basically in most cases, unfortunately, businesses are just exposing an application to the internet. So they might, they might. Terribly configured networks, where there is a direct connection that goes right to the files. So you connect to a port on their firewall and it immediately redirects it internally. [00:19:30] Remaps it to the file server. And some people are really, really clever. Alright. Or so they think, because what they'll do is they'll say, okay, well, you know, that, that normal port number. Okay. So I'm going to move. Port number. So you're going to connect to port 17, 17 on my firewall, and it's going to connect you to the file share on my file server so that people from home can just connect to port 17, 17, and ta-da, there are all the files and yeah, we're, we're using passwords, so it'll be okay. [00:20:06] It'll be fine. Um, but, uh, guess what it isn't for a few. Different reasons are we're going to be talking about those here in just a minute. Yeah, I want to encourage you right now. Take a minute. Go online. Craig peterson.com. You'll find lots of information there. I've got 3,500 articles, all searchable, Craig peterson.com. [00:20:32] But more importantly, make sure you sign up for my newsletter. Craig peterson.com/subscribe. So that you can keep up to date on everything that is important in all of our lives. [00:20:51] We're talking about firewalls at home at the office, what it means to have public facing services, really applications, people working from home. How can you make it easy for them and hard for the bad guy? [00:21:15] Many businesses had to quickly change the way their computers were set up because of course the lockdown and people working from home. [00:21:26] And, um, unfortunately. Many mistakes were made. And some of this, in fact, I'm going to talk a lot of this problem up to these managed services providers break, fix shops. My, my fellow information technology contractors, if you will, because they didn't know any. Most of these people have been computer people, their whole lives, right. [00:21:55] They played with PCs when they were young and they might've taken a course or two and wow. MCSC certified. Believe me, this is not something that a straight up MCSC or. And frankly, most of the it certifications can really understand or really handle the cybersecurity can be done, but there's so many things they overlook just like what I was just talking about, exposing a file server directly to the internet. [00:22:29] I mentioned, okay. While they thought it was going to be safe because there's a username and password, but there's a couple of huge problems here. Problem. Number one. When you're exposing a service to the internet, like for instance, the files server, you are exposing software that may have exploitable, but. [00:22:54] And again, going back to those stats from earlier this week, more than half of all of the systems that are out there are not patched to date. It's so bad that president Biden just ordered the federal government agencies to apply patches some as old as three years. So what happens now? Well, the bad guy scan, and guess what they found. [00:23:23] Port that you thought was just so clever because it wasn't the standard port number for that service. Maybe it's SMB or CIFS or something else. And, uh, they found it because they scan, they look, they see what the response is that tells them what type of a server sitting there. And then they try, well, let me see. [00:23:45] There's the zero day exploits, but why bother with those? Let's just start with the good old standard ones. And unfortunately, because so many machines are not patched up at all, let alone properly patched up. You, they end up getting into the machine. It's really that simple, just because it's not patched up. [00:24:08] How does that sound? Huh? Yeah, it's just plain, not patched up. It's not available for anyone to be able to use anybody to be able to access. Right. It there it's not restricted. So the passwords don't matter if you haven't patched your systems. And then the second problem is that. Are brute force attacks against so many servers out there. [00:24:36] And most of the time, what we're talking about is Microsoft, but, you know, there's the share of bugs kind of goes around, but Microsoft and really, they get nailed a lot more than most beet, mainly because they're probably the number one out there that's in use today, not in the server community, certainly, but certainly also in the. [00:24:59] It's been, you know, small businesses, that's all they know. So they just run a Microsoft server and more and more, you kind of have to run it because I, I get it. You know, there's so many apps that depend on the various functions that are provided by the active directory server at Microsoft and stuff. So we, we do that for our customers as well. [00:25:19] So are you starting to see why the brute force against a server will often get them in and the smarter guys figure out what the business is? And then they go to the dark web and they look up those business emails. Addresses that they have that have been stolen along with the passwords that were used. [00:25:43] That's why we keep saying, use a different password on every site because that stolen password now. Is going to be tried against your service, your, your file server. That might be there. You might be trying to have a VPN service that the people are VPN in from home. You might have remote desktop, which has been. [00:26:08] Abject failure when it comes to cybersecurity, it's just been absolutely terrible. So you might have any of those types of things. And if they've got your email address and they've got the passwords you've used on other sites, which they've stolen and they try them, are they going to work? Odds are yes, because most people, I got another set of stats this week. [00:26:36] Most people use the same password for every site out there or every type of site. So they might get a second, most common is they use one password for all of their social media sites. They use another one for all of their banking sites. So we cover this in some depth in our bootcamp so that you understand how to do the whole password thing. [00:27:03] And what I recommend is a piece of software called one password. I don't recommend that you just use one password for everything. I was misunderstood by someone the other day. You mean just w w I use one password for everything. Yeah, you do. And then I talked to them a little bit more because I thought that was an odd question. [00:27:24] And it turned out, he was thinking, you just have the one password, like, like, you know, P at sign SSW, zero RD. Right? You use that everywhere. No, there's a piece of software go to one password.com. That's what I recommend as a password manager. And I show you how to use that and how to use it effectively in my bootcamp. [00:27:48] Absolutely free. Just like the radio is free. I'm trying to get the information out to as many people as possible, but you gotta be on my list. Craig peterson.com. Make sure you go there. So I've explained the basics here of what happens. We have a door open or windows, open ports on our servers, on our firewalls at home. [00:28:15] And at work. So the thing to do, particularly if you're a business, but even if your home user is check that firewall configuration. And let me tell you something that probably won't come as a surprise. Most of these internet server. The providers are in the business to make as much money as possible. And cybersecurity is very much secondary. [00:28:40] They know they talk about it and they talk about software defined networks and things that sound really cool. But in reality, what they give you is. Configured very well and is going to expose you. So make sure you go in, they will set it up. For instance, if they're providing you with television services, they'll set it up so that they can just bypass your firewall and get into the cable box that they installed in your house. [00:29:09] Yeah. Obviously that's not something they should be doing because now they are opening you up to attack. What happens when there's a cybersecurity problem with the cable box? We've seen this problem too, with television vendors where they poke a hole out through your firewall so that they can then gather statistics and do firmer updates and everything else. [00:29:34] It's insane. It really is. These vendors are not thinking about you. They're not thinking about the consequences. It is a very, very sad situation, but now you know what to do and how to do it. Okay. I explained today, firewalls. I explained router. I explained ports, which should be open, which should not be open. [00:29:58] And the reasons why I even mentioned passwords, I get into that in a lot of detail in my bootcamp, Craig peterson.com to get on that waiting list. Craig peterson.com, just subscribe and you'll be kept up to date. [00:30:14] There has been a whole lot of discussion lately about Metta. You might've heard. In fact, you probably did that. Facebook changed its name to Metta and they're aiming for something called the metaverse. So what is it exactly and what's it going to do for or to you? [00:30:32] The metaverse oh my gosh. I had a great discussion this week about the metaverse this came out in, um, and originally anyways, in this novel called the what was it now? [00:30:47] A snow crash. That's what it was 1992, Neil. Stevenson or Steffenson. I'm not sure how he pronounces it, but in this book, which was a cyberpunk model and I've, I've always thought cyber punk was cool. Uh, is the metal versus an imaginary place that's made available to the public over the world wide fiber optics network. [00:31:13] And it's projected onto virtual reality goggles sound familiar yet. And in the. You can build a buildings park signs as well as things that do not exist. In reality, such as vast hovering overhead light show, special neighborhoods were three where the rules of three-dimensional spacetime are ignored and free combat zones where people can go hunt and kill each other. [00:31:42] Great article about this in ARS Technica this week. And, uh, that was a little quote from the book and from the article. Phenomenal idea. Well, if you have read or seen the movie ready player one, and I have seen the movie, but a friend of mine this week said the book is so much better. So I'm going to have to read that book, ready player one. [00:32:06] But in it, you have these people living in. Dystopian future where everything is badly worn down, the mega cities, people building on top of each other and they get their entertainment and relaxation and even make money in. Prison time by being inside this virtual world, they can go anywhere, do anything and play games, or just have fun. [00:32:39] One of the vendors that we work with at my company mainstream has this kind of a virtual reality thing for. I kind of a summit, so people can go and watch this presentation and I think it's stupid, but they, you walk in. And it's, uh, this is just on a screen. They're not using like those Oculus 3d graph glasses, but you walk into an auditorium. [00:33:13] So you've got to make your little avatar walked on. Dun dun, dun dun, dun, dun, dun, dun, dun, and then go to an empty seat. And then you have to make your avatar sit down. Right? I, I have never played a game like this. I never played second life. Never any of that sort of thing. It was kind of crazy to me. And then I was doing a presentation, so I had to go Dundon then, then, then the, up onto the rostrum there and stand behind the podium and, and then put my slides up on this virtual screen. [00:33:49] It was ridiculous. I have a full television production studio here in my, in my lab. Right. And that's, this is where I do the radio show. This is where I do my television appearances. This is where I do pretty much everything. Right. And so what I can do is I can split screen with my face, with the desktop. [00:34:12] You can see my desktop, I can draw on it, circle things, highlight things or whatever I want to do. Right. But no, no, no, no. I was in their virtual reality. And so all I could do is. I have the slides come up. In fact, I had prepared beforehand, pre-taped it? A, the whole presentation, but I couldn't play that video. [00:34:37] No, no, no. I had to show a slide deck, you know, death by PowerPoint. I'm sure you've been there before. It's very, very frustrating in case you can tell for me, well, we've seen this type of thing. I mentioned some of the things like that. I'm in second life. I'm sure you've heard of that before. Sims is another one you've probably heard of before. [00:35:01] These types of semi metaverses have been around a very long time. And, and in fact, all the way on back to the nineties is Habbo hotel. G I don't know if you ever heard of that thing, but it was non-line gaming and social space. I helped to develop one for a client of mine back in the early nineties. [00:35:23] Didn't really go very far. I think it was ahead of its time. It's it's interesting right now, enter. Mark Zuckerberg. Do you remember a few years ago, mark Zuckerberg had a presentation. He was going to make this huge announcement, right? They bought Oculus. What was it? It was like crazy amount of money. And then he came in the back of the hall. [00:35:50] And nobody noticed he walked all the way up to the front and nobody even saw him because they were all wearing these 3d glasses. And of course, today they are huge. They are awkward and they don't look that great, the pictures inside, but the idea is you can move your head around and the figures move as your head moves, almost like you're in the real world. [00:36:13] And that's kind of cool and people thought it was kind of cool and they didn't see Zuckerberg because they all had these things on. And the inside was playing a little presentation about what Facebook was going to do with Oculus. Well, they just killed off the Oculus name anyways here a couple of weeks ago, over at Facebook about the same time that got rid of the Facebook name and went to meta. [00:36:39] The Facebook product is so-called Facebook and it appears what they are going to be doing is taking the concept of a metaverse much, much further than anyone has ever taken it before. They're planning on there's speculation here. Okay. So, you know, don't obviously I don't get invested. I don't give investment advice, investment advice. [00:37:10] Um, but I do talk about technology and, uh, I've been usually five to 10 years. I had so take that as well. They as the grain of salt, but I think what they're planning on doing is Facebook wants to become the foundation for Mehta versus think about things like world of Warcraft, where you've got the. Gain that people are playing. [00:37:39] And it's a virtual reality, basically, right? It might be two D, but some of it's moving into the three-dimensional world. Other games like Minecraft and roadblocks, they have some pretty simple building blocks that people can use network effects and play your creativity to make your little world and the ability. [00:38:04] To exchange and or sell your virtual property. That's where I think Mr. Zuckerberg is getting really interested now because if they can build the platform that everybody else the wants to have a virtual world builds their virtual world on top of. Man, do they have a moneymaker? Now? People like me, we're going to look at this and just poo poo it. [00:38:35] I I'm sure I'm absolutely sure, because it will be another 20 years before you really think it's. You know, some of these scifi shows have talked about it. You know, you can feel someone touching you, et cetera, et cetera. Yeah. That's going to be very crude for a very long time. And now CGI is pretty good. [00:38:57] Yeah. You watch the movies. CGI is great, but that takes weeks worth of rendering time on huge farms, clusters of servers. So it's going to take quite a while. Looking at the normal advancement of technology before this really becomes real. Now there have also been us court cases over who owns what in bad happened with Eve online. [00:39:28] Second life where disagreements over player ownership of the virtual land created by the publisher, which was Linden labs. When. And I've also mentioned in the past how our friends over at the IRS have tried to tax some of the land that you own inside these virtual worlds. So ownership, do you really own it? [00:39:55] Does it really exist? What would non fungible tokens maybe it does. And these non fungible tokens are. Basically just a check, some verification, I'm really oversimplifying of some sort of a digital something rather lately. And initially it was mostly pictures. And so you had a picture of something and you owned that and you could prove it because of the blockchain behind it. [00:40:27] But I think this is where he's really interested because if he can build the base platform. Let the developers come up with the rules of what's it called it a game and come up with what the properties look like and how people can trade them and sell them and what kind of upgrades they can get. Right. [00:40:48] So let's nothing Zuckerberg has to worry about. Uh, Metta or Zuckerberg then worries about, okay. So how do we collect money for these? How do we check with the transactions? Uh, somebody wants to buy those sort of Damocles. How does that transaction work and how do we Facebook Metta? How do we get a slice of the act? [00:41:16] You got to believe that that's where things are going. And if they have the ability to make this base platform and be able to take characters from one part of a developer to another part of the developer, you could have worlds where Gandalf might be fighting bugs bunny. Right? Interesting. Interesting and Warner brothers, all these movie companies would probably be coming out with complete virtual reality. [00:41:49] So when you're watching James Bond, you're not just watching James Bond, you can look around, you can see what's happening. People sneaking up behind. And ultimately you could be James Bond, but that's decades away. I think a good 20 years. All right, everybody. Thanks for sticking around here. Make sure you go online. [00:42:11] Craig peterson.com/subscribe. Get my weekly newsletter. Find out about these free boot camps and other things that I have. So we can keep you up to date and keep you safe. [00:42:25] We already talked about Metta and their name, change the metaverse, but there's something else. Facebook did this last week that surprised a lot of users, something they started in 2010, but has been controversial ever since. [00:42:41] We had a pretty big announcement, frankly, this last week from our friends over at Facebook, not the one where they change their name and the. [00:42:51] Basically trying to create a metaverse platform. That's going to be the one platform that rules the world. Although those are my words by the way. But Facebook has announced plans now to shut down a decade old. Facial recognition system this month. We'll see what they do with this. If they follow through entirely, but they're planning on deleting over 1 billion faces that they have already gone through and analyzed. [00:43:26] You might remember. In 2010, Facebook had a brand new feature. It started announcing, Hey, did you know that so-and-so just posted your picture? Is this you? Is this your friend, is this sewn? So do you remember all of those questions? If you're a Facebook user back in the day? Well, they were automatically identifying people who appeared in digital photos and suggested that users or users tagged them with a click we're going to get to and admitted here. [00:43:57] Uh, and of course that then linked the Facebook account for. The picture that you tagged to the images and let that person know. And of course Facebook's ultimate goal is to get you to stay on long, as long online, as long as possible. Because if you're online, you are going to be looking at ads that are aimed primarily at. [00:44:18] Well, facial recognition has been a problem. We've seen it a worldwide. I just read through a restatement from the electronic frontier foundation, talking about facial recognition and the problems with it, how some people have been arrested based on facial recognition and held for over a day. We'll have cases where the police use to kind of a crummy photograph of them from a surveillance video sometimes also from a police car, in some areas, the police cars are continually taking video and uploading it to the internet, looking for things like license plates, to see if a car. [00:45:00] Parking ticket that hasn't been paid or it hasn't paid us registration all the way through looking at faces, who is this person? And some in law enforcement have kind of thought it would be great to have kind of like Robocop. You remember Robocop, not the ed 2 0 9. There was also in that movie. That's also very scary, but when they look at someone who's on a street at autonomous. [00:45:24] Pops up in their glasses, who it is, any criminal record, if there any sort of a threat to et cetera. And I can understand that from the policemen standpoint. And I interviewed out at the consumer electronic show, a manufacturer of. That technology, it was kind of big and bulky at the time. This was probably about six or eight years ago, but nowadays you're talking about something that's kind of Google glass size, although that's kind of gone by the wayside too. [00:45:54] There are others that are out there that you. Facial recognition. Technology has really advanced in its ability to identify people, but you still get false positives and false negatives. And that's where part of the problem becomes from they have been taking and they been private companies primarily, but also some government agencies they've been taking pictures from. [00:46:21] They can find them. We've talked about Clearview AI before this is a company that literally stole pitchers, that it could get off the internet. They scan through Facebook, Instagram, everywhere. They could find faces and they tied it all back in. They did facial recognition. On all of those photos that they had taken and then sold the data to law enforcement agencies. [00:46:49] There's an app you can get from Clearview AI. That runs on your smartphone and you can take a picture of someone in the street, clear view. AI will run that face through their database and we'll tell you who it is, what their, what their background is, where their LinkedIn page is their Facebook page, wherever it found them online. [00:47:13] Basically what they've been doing. Now Clearview had a problem here this last couple of weeks because the Australian government ordered them to delete all facial recognition, data belonging, to anyone that lives. In Australia. Now that's going to be a bit of a problem for clear view, because it's hard to identify exactly where people live just based on a photograph. [00:47:40] And the United Kingdom is also considering doing this exact same thing. Now, clear views have been sued. They violated the terms of service from Facebook and some of these other sites that I mentioned, but they did it anyway. And clear view was. To destroy all the facial images and facial templates they had retrieved about any Australian. [00:48:08] I think that's probably a pretty good idea. I don't like the idea of this data being out there. Well, if your password is stolen and we're going to be talking about that in our bootcamp, coming up here in a couple of weeks about how to determine if your username or your password is stolen. But, uh, and of course, if you want to get that. [00:48:29] Bootcamp and go to that. There's no charge for it, but you have to know about it. And the only way is to sign up. You have to make sure you're on my email list@craigpeterson.com. But what happens when your email address is stolen or your password, or both are stolen from a web. Oh, typically they end up on the dark web. [00:48:50] They sell personal identification for very little money. In some cases it's only a few dollars per thousand people's identities. It is absolutely crazy. So the bad guys are looking for that information, but you can change your password. You can change your email address, but if your facial information is stolen, Can't change your face. [00:49:18] If your eye print is stolen, you can't change your eye. I have a friend who's pretty excited because he got to go right through the security at the airport ever so quickly. Cause all they had to do was scan his eyeball. Well, that data is valuable data because it cannot be changed. And it can, in some cases be replicated. [00:49:41] In fact, the department of Homeland security and the transportation safety administration had the database of face print stolen from them in 2019. To about 200,000 people's identities were stolen, the face sprints. It's just absolutely crazy. And this was some, a vendor of us customs and border protection. [00:50:05] And it, it, you can't write down to it. I read the detailed report on it just now. And the report that came out of the federal government said, well, it went to a contractor who. Took the data, all of the face prints off site over to their own site. And it wasn't encrypted when they took it over there. But it does mention that it was taken from an un-encrypted system at customs and border protection. [00:50:34] So wait a minute. Now you're blaming the contractor that you hired because it wasn't encrypted and yet you didn't encrypt it yourself either. I, you know, I guess that kind of goes around, but they want to. They want your biometric information just as much as they want anything else. Think about your phones. [00:50:53] Nowadays, apple has done a very good job with the biometrics and the fingerprints and making sure that that information is only ever stored on the phone. It never goes to apple, never leaves the phone it's in what apple calls, the secure long term. And if you mess with it at all, it destroys itself, which is part of the problem with replacing a cracked screen yourself on an iPhone, because you're going to disturb that secure enclave and the phone will no longer work. [00:51:24] That is not true when it comes to many other devices, including most of your Android phones that are out there. It is. So if the bad guys have. Your face print, they, and they can create 3d models that can and do in fact, go ahead and fool it into letting you in that that's information they want. So why are we allowing these companies to like clear view AI? [00:51:52] And others to buy our driver's license photos to the federal government, to also by the way, by our driver's license photos, by them from other sites and also our passport information. It's getting kind of scary, especially when you look into. China has a social credit system. And the Biden administration has made rumblings about the same here in the U S but in China, what they're doing is they have cameras all over the place and your faces. [00:52:27] And they can identify you. So if you jaywalk, they take so many points off of your social credit. If you don't do something that they want you to do or be somewhere, they want you to be, you lose credits again, and you can gain them as well by doing various things that the government wants you to do. And. [00:52:49] And ultimately, if you don't have enough social credit, you can't even get on a train to get to work. But the real bad part are the users. This is a minority in China and China's authorities are using. Us facial recognition, technology and artificial intelligence technology. Hey, thanks Google for moving your artificial intelligence lab to China in order to control and track the users. [00:53:19] Absolutely amazing in the United States law enforcement is using this type of software to aid policing, and we've already seen problems of overreach and mistaken IRS. So Facebook to you're leading a billion of these frameworks. If you will, of people's faces biometrics. Good for them. Hopefully this will continue a tread elsewhere. [00:53:46] Well, we've talked a little bit today about firewalls, what they do, how your network is set up. If you miss that, make sure you catch up online. My podcast@craigpeterson.com, but there's a whole new term out there that is changing security. [00:54:03] It's difficult to set up a secure network. [00:54:07] Let's just say mostly secure because if there's a power plug going into it, there's probably a security issue, but it's difficult to do that. And historically, what we've done is we've segmented the networks. So we have various devices that. Maybe be a little more harmful and on one network, other devices at a different level of security and many businesses that we've worked with, we have five different networks each with its own level of secure. [00:54:38] And in order to get from one part of the network, for instance, let's say you're an accounting and you want to get to the accounting file server. We make sure your machine is allowed access at the network level. And then obviously on top of that, you've got usernames and passwords. Maybe you've got multifactor authentication or something else. [00:54:59] I'll make sense, doesn't it? Well, the new move today is to kind of move away from that somewhat. And instead of having a machine or a network have firewall rules to get to a different network or different machine within an organization. There's something called zero trust. So again, think of it. You've, you've got a network that just has salespeople on it. [00:55:25] You have another network that might have just your accounting people. Another network has your administrative people and other network has your software developers, et cetera. So all of these networks are separate from each other and they're all firewalled from each other. So that only for instance, at county people can get to the accounting server. [00:55:44] Okay, et cetera. Right? The sales guys can enter the sales data and the programmers can get at their programs. And maybe the servers that are running their virtual machines are doing testing on what was zero trust. It is substantially different. What they're doing with zero trust is assuming that you always have to be authentic. [00:56:11] So instead of traditional security, where, where you're coming from helps to determine your level of access, you are assuming that basically no units of trust. So I don't care where you're coming from. If you are on a machine in the accounting department, We want to verify a lot of other information before we grant you access. [00:56:38] So that information probably does include what network you're on. Probably does include the machine you're on, but it's going to all. You as a user. So you're going to have a username. You're going to have an ID. You're going to have a multi-factor authentication. And then we're going to know specifically what your job is and what you need to have specific access. [00:57:04] Because this follows the overall principle of least privilege to get your job done. Now you might've thought in the past that, oh my gosh, these firewalls, they're just so annoying. It's just so difficult to be able to do anything right. Well, zero trust is really going to get your attention. If that's what you've been saying. [00:57:23] But here's an example of the traditional security approach. If you're in the office, you get access to the full network. Cause that's pretty common, right? That's not what we've been doing, but that's pretty common where we have been kind of working in the middle between zero trust and this traditional you're in the office. [00:57:41] So you can potentially get it. Everything that's on the off. And if you're at home while all you have to do is access a specific portal, or as I've explained before, well, you are just connecting to an IP address in a hidden port, which won't remain hidden for. So maybe in a traditional security approach, the bouncer checks your ID. [00:58:08] You can go anywhere inside this club and it's multi floor, right. But in a zero trust approach, getting into the club, having that bouncer look at your ID is only the first check, the bartender or the waiter. They also have to check your ID before you could be served. No matter where you are in the club and that's kind of how they do it right now, though, they'll make a mark on your hand or they'll stamp it. [00:58:35] And now they know, okay, this person cannot get a drink for instance. So think of it that way, where every resource that's available inside the business independently checks whether or not you should have access to. This is the next level of security. It's something that most businesses are starting to move towards. [00:58:57] I'm talking about the bigger guys, the guys that have had to deal with cybersecurity for awhile, not just the people who have a small business, most small businesses have that flat network that. Again about right. The traditional security approach of all you're in the office. So yeah, you can get at anything. [00:59:15] It doesn't matter. And then you, you have the sales guys walking out with your client list and who knows what else is going on? Think of Ferris, Bueller, where he was updating his grades and miss days at high school, from his home computer. And you've got an idea of why you might want to secure. You are network internally because of, again, those internal threats. [00:59:40] So keep an eye out for it. If you're looking to replace your network, obviously this is something that we've had a lot of experience with. Cisco is probably the best one out there for this, but there are a few other vendors that are pretty good. If you want to drop me an email, I'll put together a list of some of the top tier zero. [01:00:02] Providers so that you can look at those. I don't have one right now, but I'd be glad to just email me M e@craigpeterson.com. We can point you in the right direction, but if you have an it person or department, or whether you outsource it to an MSP, a managed services provider, make sure you have the discussion with them about zero. [01:00:28] Now, when I'm looking at security, I'm concerned about a bunch of things. So let me tell you something that Karen and I have been working on the last, oh man, few weeks. I mentioned the boot camp earlier in the show today. And one of the things that we're going to do for those people that attend the bootcamp is I think incredible. [01:00:49] This has taken Karen so much time to dig up. Once she's done is she's worked with me to figure out what are the things that you need to keep tabs on. Now, again, this is aimed primarily at businesses, but let me tell you, this is going to be great for home users as well. And we've put together this list of what you should be doing. [01:01:15] About cybersecurity every week. And in fact, a couple of things that are daily, but every week, every month, every quarter, every six months and every year, it's a full checklist. So you can take this and sit down with it and, you know, okay. So I have to do these things this week and this isn't. Response to anything in particular, it does meet most requirements, but frankly, it's something that every business should be doing when it comes to the cybersecurity. [01:01:53] It includes things like passwords. Are they being done? Right? Did you do some training with your employees on fishing or a few other topics all the way on down to make sure you got some canned air and blew out the fan? In your workstations, you'd be amazed at how dirty they get. And he is the enemy of computers that makes them just fail much, much faster than, than 82, same thing with server. [01:02:22] So it is everything. It is a lot of pages and it is just check she'd made it nice and big. Right. So even I can read it. But it's little check marks that you can mark on doing while you're going through it. So we're doing some more work on that. She's got the first couple of iterations done. We're going to do a couple more, make sure it is completely what you would need in order to help keep your cyber security in. [01:02:50] But the only way you're going to get it is if you are in the BR the bootcamp absolutely free. So it was this list, or of course you won't find out unless you are on my email list. Craig Peterson.com/subscribe. [01:03:06] One of the questions I get asked pretty frequently has to do with artificial intelligence and robots. Where are we going? What are we going to see first? What is the technology that's first going to get into our businesses and our homes. [01:03:22] Artificial intelligence is something that isn't even very well-defined there's machine learning and there's artificial intelligence. [01:03:33] Some people put machine learning as a subset of artificial intelligence. Other people kind of mess around with it and do it the other way. I tend to think that artificial intelligence is kind of the top of the heap, if you will. And that machine learning is a little bit further down because machines can be programmed to learn. [01:03:54] For instance, look at your robot, your eye robot cleans the floor, cleans the carpet. It moves around. It has sensors and it learned, Hey, I have to turn here. Now. I robot is actually pretty much randomly drew. But there are some other little vacuum robots that, that do learn the makeup of your house. The reason for the randomization is while chairs move people, move things, move. [01:04:22] So trying to count on the house, being exactly the same every time isn't isn't exactly right. Uh, by the way, a lot of those little vacuums that are running around are also sending data about your house, up to the manufacturer in the. So they often will know how big the house is. They know where it's located because you're using the app for their robot. [01:04:47] And that, of course it has access to GPS, et cetera, et cetera. Right. But where are we going? Obviously, the little by robot, the little vacuum does not need much intelligence to do what it's doing, but one of the pursuits that we've had for. Really since the late nineties for 20, 25 years are what are called follower robots. [01:05:13] And that's when I think we're going to start seeing much more frequently, it's going to be kind of the first, um, I called it machine learning. They call it artificial intelligence who you really could argue either one of them, but there's a little device called a Piaggio fast forward. And it is really kind of cool. [01:05:34] Think of it almost like R2D2 or BB eight from star wars following you around. It's frankly, a little hard to do. And I want to point out right now, a robot that came out, I think it was last year from Amazon is called the Astro robot. And you might remember Astro from the Jetsons and. This little robot was available in limited quantities. [01:06:01] I'm looking at a picture of it right now. It, frankly, Astro is quite cute. It's got two front wheels, one little toggle wheel in the back. It's got cameras. It has a display that kind of makes it look like kids are face, has got two eyeballs on them. And the main idea behind this robot is that it will. [01:06:23] Provide some protection for your home. So it has a telescoping camera and sensor that goes up out of its head up fairly high, probably about three or four feet up looking at this picture. And it walks around your one rolls around your home, scanning for things that are out of the normal listening for things like windows breaking there, there's all kinds of security. [01:06:50] That's rolled into some of these. But it is a robot and it is kind of cool, but it's not great. It's not absolutely fantastic. Amazon's dubbing the technology it's using for Astro intelligent motion. So it's using location and mapping data to make sure that Astro. Gets around without crashing into things. [01:07:18] Unlike that little vacuum cleaner that you have, because if someone loves something on the floor that wasn't there before, they don't want to run over it, they don't want to cause harm. They don't want to run into your cats and dogs. And oh my maybe lions and bears too. But, uh, they're also using this computer vision technology called visual ID and that is used. [01:07:41] With facial recognition, drum roll, please, to recognize specific members of the family. So it's kind of like the dog right in the house. It's sitting there barking until it recognizes who you are, but Astro, in this case, Recognizes you and then provide you with messages and reminders can even bring you the remote or something else and you just drop it in the bin and off it goes. [01:08:08] But what I am looking at now with this Piaggio fast forward, you might want to look it up online, cause it's really. Cool is it does the following, like we've talked about here following you around and doing things, but it is really designed to change how people and goods are moving around. So there's a couple of cool technologies along this line as well. [01:08:35] That it's not, aren't just these little small things. You might've seen. Robots delivery robots. The Domino's for instance, has been working on there's another real cool one out there called a bird. And this is an autonomous driving power. Basically. It's a kind of a four wheel ATV and it's designed to move between the rows of fruit orchards in California or other places. [01:09:01] So what you do to train this borough robot is you press a follow button on it. You start walking around the field or wherever you want it to go. It's using, uh, some basic technology to follow you, cameras and computer vision, and it's recording it with GPS and it memorizes the route at that point. Now it can ferry all of your goods. [01:09:29] Around that path and communicate the path by the way to other burrow robots. So if you're out doing harvesting or whether it's apples out in the east coast, or maybe as I said out in California, you've got it. Helping you with some of the fruit orchards. It's amazing. So this is going to be something that is going to save a lot of time and money, these things, by the way, way up to 500 pounds and it can carry as much as a half a ton. [01:09:58] You might've seen some of the devices also from a company down in Boston, and I have thought that they were kind of creepy when, when you look at it, but the company's called Boston dynamics and. They were just bought, I think it was Hondai the bought them trying to remember. And, uh, anyway, These are kind of, they have robots that kind of look like a dog and they have other robots that kind of look like a human and they can do a lot of different chores. [01:10:33] The military has used them as have others to haul stuff. This one, this is like the little dog, it has four legs. So unlike a lot of these other robots that are on wheels, this thing can go over very, very. Terrain it can self write, et cetera. And they're also using them for things like loading trucks and moving things around, um, kind of think of Ripley again, another science fiction tie, uh, where she's loading the cargo in the bay of that spaceship. [01:11:05] And she is inside a machine. That's actually doing all of that heavy lifting now. Today, the technology, we have a can do all of that for us. So it is cool. Uh, I get kind of concerned when I see some of these things. Military robots are my favorite, especially when we're talking about artificial intelligence, but expect the first thing for these to be doing is to be almost like a companion, helping us carry things around, go fetch things for us and in the business space. [01:11:40] Go ahead and load up those trucks and haul that heavy stuff. So people aren't hurting their backs. Pretty darn cool. Hey, I want to remind you if you would like to get some of the free training or you want some help with something the best place to start is Craig peterson.com. And if you want professional help, well, not the shrink type, but with cyber security. [01:12:06] email me M E at Craig peterson.com. [01:12:10] Just in time for the holidays, we have another scam out there and this one is really rather clever and is fooling a lot of people and is costing them, frankly, a whole lot of money. [01:12:26] This is a very big cyber problem because it has been very effective. And although there have been efforts in place to try and stop it, they've still been able to kind of get ahead of it. There's a great article on vice that's in this week's newsletter. In my show notes up on the website and it is talking about a call that came in to one of the writers, Lorenzo, B cherry, um, probably completely messy and that name up, but the call came in from. [01:13:03] Supposedly right. Paid pals, uh, fraud prevention system. Someone apparently had tried to use his PayPal account to spend $58 and 82 cents. According to the automated voice on the line, PayPal needed to verify my identity to block the transfer. And here's a quote from the call, uh, in order to secure your account, please enter the code we have sent to your mobile device. [01:13:32] Now the voice said PayPal, sometimes texts, users, a code in order to protect their account. You know, I've said many times don't use SMS, right? Text messages for multi-factor authentication. There are much better ways to do it. Uh, after entering a string of six digits, the voice said, thank you. Your account has been secured and this request has been blocked. [01:13:57] Quote, again, don't worry. If any payment has been charged your account, we will refund it within 24 to 48 hours. Your reference ID is 1 5 4 9 9 2 6. You may now hang up, but this call was actually. Hacker they're using a type of bot is what they're called. These are these automated robotic response systems that just dramatically streamlined the process for the hackers to gain access into your account. [01:14:31] Particularly when you have multi-factor authentication codes where you're using. An SMS messages, but it also works for other types of one-time passwords. For instance, I suggest to everybody and we use these with our clients that they should use something called one password.com. That's really you'll find them online. [01:14:54] And one password.com allows you to use and create one time password, same thing with Google authenticator, same thing with Microsoft authenticator, they all have one-time password. So if a bad guy has found your email address and has found your password online in one of these hacks, how can they possibly get into your PayPal account or Amazon or Coinbase or apple pay or. [01:15:26] Because you've got a one time password set up or SMS, right? Multifactor authentication of some sort. Well they're full and people and absolute victims. Here's what's happening. Th this bot by the way, is great for bad guys that don't have social engineering skills, social engineering skills, or when someone calls up and says, hi, I'm from it. [01:15:51] And there's a problem. And we're going to be doing an upgrade on your Microsoft word account this weekend because of a bug or a security vulnerability. So what, what I need from you is I need to know what username you're normally using so that I can upgrade the right. So we don't, it doesn't cost us a whole bunch by upgrading accounts that aren't being used. [01:16:15] So once the account name that you use on the computer and what's the password, so we can get in and test it afterwards, that's a social engineering type attack. That's where someone calls on the phone, those tend to be pretty effective. But how about if you don't speak English very well? At all frankly, or if you're not good at tricking people by talking to them, well, this one is really great. [01:16:44] Cause these bots only cost a few hundred bucks and anybody can get started using these bots to get around multi-factor authentication. See, here's how it works. In order to break into someone's account, they need your username, email address and password. Right? Well, I already said. Much many of those have been stolen. [01:17:07] And in our boot camp coming up in a few weeks, we're going to go through how you can find out if your username has been stolen and has been posted on the dark web and same thing for your password. Right? So that's going to be part of the. Coming up that I'll announce in the newsletter. Once we finished getting everything already for you guys, they also go ahead and buy what are called bank logs, which are login details from spammers who have already tricked you into giving away some of this information. [01:17:41] But what if you have multi-factor authentication enabled something I'm always talking about, always telling you to do. Well, these bots work with platforms like Twilio, for instance, uh, and they are using other things as well, like slack, et cetera. And all the bad guy has to do with that point is going. [01:18:07] And, uh, say, they're trying to break into your account right now. So they're going to, let's get really, really specific TD bank. That's where my daughter works. So let's say you have a TD bank account. And the hacker has a good idea that you have a TD bank account knows it because they entered in your username and password and TD bank was letting them in. [01:18:32] But TD bank sent you a text message with that six character code, right? It's usually digits. It's usually a number. So what happens then? So the bad guys says, okay, so it's asking me for this six digit SMS

Appearance Matters: The Podcast!

This month, Bruna and Jade discuss the topic of facial palsy. The episode features several guests - Charles Nduka (founder of the charity Facial Palsy UK (FPUK) and plastic and reconstructive surgeon), Karen Johnson (deputy CEO of FP UK), Elizabeth Robinson (patient advocate from Australia), Matthew Hotton (Clinical Psychologist), Claire Hamlet (Health Psychologist), and Kathleen Bogart (Associate Professor at Oregon State University) – all coming together to provide important insights into this topic. We hope you'll enjoy listening to this episode! To find out more about the Centre for Appearance Research, follow us on: • Twitter: twitter.com/CAR_UWE • Instagram: www.instagram.com/car_uwe/ • Facebook: www.facebook.com/AppearanceResearch To find out more about the work of FPUK, visit: https://www.facialpalsy.org.uk/ To read the guidelines developed for mental health professionals about how to work alongside physical health practitioners to assess and meet the psychological needs of people with facial palsy, visit: https://www.facialpalsy.org.uk/support/treatments-therapies/recommendations-for-supporting-the-psychological-well-being-of-children-and-adults-with-facial-palsy/ For more on Kathleen Bogart, visit: • Kathleen's Disability and Social Interaction Lab website: https://liberalarts.oregonstate.edu/sps/dsil • Kathleen's Psychology Today blog, Disability is Diversity, where she posts about facial difference and disability issues for general audiences: https://www.psychologytoday.com/us/blog/disability-is-diversity • The Moebius Syndrome Foundation: https://moebiussyndrome.org/ For more on Elizabeth Robinson, visit: • Elizabeth's Bell's Palsy and Facial Paralysis Facebook support group: https://www.facebook.com/groups/1897077217284762/ • Instagram: @facial_paralysis_aus Please share, subscribe, rate and review. It really does mean a lot :) Thank you! B & J x Music by Sian Evans & John Landau (toplinefilm.com) Cover photo provided by Kathleen Bogart Episode developed & produced by Bruna Costa

The Funk'tional Nutrition Podcast
180: Beauty Industry Brainwashing and Holistic Skin Care with Lee Zavorskas

The Funk'tional Nutrition Podcast

Play Episode Listen Later Nov 9, 2021 68:03


Today Erin sits down with her own esthetician and friend, Lee Zavorskas. With a lot of overlap and instant clicks on similar outlooks, this episode is full of energy and passion when it comes to the beauty industry and skin care. Tune in as Lee and Erin discuss how skin is often an inside job with a gut/skin connection (for example, start by paying attention to your diet!) but sometimes you need to approach the skin outside-in. Listen to Lee take the mic and jump right into what is broken in the beauty industry, what to avoid when it comes to skin care, how important it is to embrace aging - and natural and safe ways to give you and your skin the love and care they deserve. Rollinsford, New Hampshire-based Holistic Skin & Tonics focuses on whole skin health and the direct connection between nutrition and our skin. Combining specialized massage techniques and plant based skincare, wellness is not just one treatment; it’s a lifestyle and commitment that Owner and Licensed Esthetician, Lee Zavorskas, is devoted to instill in each client. As a Certified Nutritional Aesthetics Practitioner, who is also certified in Gua Sha, Face Cupping, and Facial Reflexology, Lee’s priority is to teach clients how to properly care for their skin—not just from the outside, but from the inside as well. In this episode: -Introduction to Lee and an overview of this episode [2:28] -Lee’s Rage with the beauty industry [6:44] -The acid mantle, how to keep it safe, & the dangers of over-exfoliation [9:46] -Deprogramming the “Beauty Industry Brainwashing” [15:26] -The three-way between your face, gut, and brain [18:08] -Rosacea, the many causes/triggers and an outside-in approach [20:22] -Why your friend’s skin solution might not be yours, internal factors that may be affecting your skin, & the holistic approach [23:40] -The normalization & long term risks of the Botox industry [30:15] -Facial massage, the lymph system, and lymphatic drainage [42:32] -The difference between Gua Sha & lymphatic drainage [48:57] -Resources, causes and natural techniques to help scarring, hyper-pigmentation, dull skin, puffiness and wrinkles [52:59] FOR OUR FULL LIST OF LINKS + RESOURCES, HEAD TO: https://www.erinholthealth.com/funktional-nutrition-podcast/2021/11/7/beauty-industry-brainwashing-and-holistic-skin-care-with-lee-zavorskas

Skin and the City
Intake Forms, Cancellation Policies & Resources Galore

Skin and the City

Play Episode Listen Later Nov 8, 2021 31:43


Overview: We love that you guys are telling us exactly what you want so this week we are bringing you MORE resources for success in the industry. More downloads, more educational videos, more ways to shop and even a little motivational pep-talk to get you through the end of this busy season. Today We Talk About: Download the Digital Intake Form HERE Do you want a custom intake form? Email Hailey HERE Examples of our cancellation policies and how they have evolved over time Cosmedix Awaken Facial Protocol Video and certificate HERE & check out the blog HERE Coming soon – Facial massage video! When you sign up HERE you will get discounts galore! Come see us at our Sip and Shop on November 10th 10AM-5PM - address HERE Glow Tip of the Week: Don't give up just because it's nearing the end of the year. Put one foot in front of the other every single day – You will be amazed at where you will be when 2022 hits! Links Mentioned: ⭐️ Where is my steamer from? What's my favorite esty chair? Shop them and use code Kasey for 5% off your order HERE + Sign up for the PRO Membership at Spa & Equipment Be sure to follow along in your print or digital version of Skin and the City magazine As a Skin and the City listener, enjoy 5% off the whole website HERE For additional discounts, exclusive offers and so much more, sign up for the Skin and the City membership HERE To support this podcast, you can go HERE If you have 2 seconds to write us a review HERE, screenshot it and email it to us at magazine@glowskincarela.com and our Kim-Tern will be shipping you some goodies like the Manolo Blahnik - Awaken Mask pins! They're super adorable! You're gonna love them! Be sure to follow and tag us on IG! @skin.andthe.city and @glowskincarela Thanks for listening! --- Support this podcast: https://anchor.fm/skinandthecity/support

Tech News Weekly (Video HI)
TNW 208: Squid Game Crypto Scam - DMCA and the blind, Amazon's Matter support, Facebook and Meta facial scanning

Tech News Weekly (Video HI)

Play Episode Listen Later Nov 4, 2021 62:56


DMCA and the blind, Amazon's Matter support, Facebook and Meta facial scanning Damon Beres talks about his WIRED piece that details the challenges the DMCA poses to blind readers who want to read ebooks. Ry Crist from CNET walks through Amazon's newly announced support for the Matter and Thread IoT protocols in their devices. Jason details the short history of a Squid Game inspired cryptocurrency scam and how easy it was to net $3.3 million. Mikah covers Facebook's announcement that it would be getting rid of its facial recognition system while Meta has no plans to back down. Hosts: Jason Howell and Mikah Sargent Guests: Damon Beres and Ry Crist Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: CrowdStrike.com/twit Command Line Heroes - TNW udacity.com/TWiT code TWIT75

Tech News Weekly (Video LO)
TNW 208: Squid Game Crypto Scam - DMCA and the blind, Amazon's Matter support, Facebook and Meta facial scanning

Tech News Weekly (Video LO)

Play Episode Listen Later Nov 4, 2021 62:56


DMCA and the blind, Amazon's Matter support, Facebook and Meta facial scanning Damon Beres talks about his WIRED piece that details the challenges the DMCA poses to blind readers who want to read ebooks. Ry Crist from CNET walks through Amazon's newly announced support for the Matter and Thread IoT protocols in their devices. Jason details the short history of a Squid Game inspired cryptocurrency scam and how easy it was to net $3.3 million. Mikah covers Facebook's announcement that it would be getting rid of its facial recognition system while Meta has no plans to back down. Hosts: Jason Howell and Mikah Sargent Guests: Damon Beres and Ry Crist Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: CrowdStrike.com/twit Command Line Heroes - TNW udacity.com/TWiT code TWIT75

Tech News Weekly (Video HD)
TNW 208: Squid Game Crypto Scam - DMCA and the blind, Amazon's Matter support, Facebook and Meta facial scanning

Tech News Weekly (Video HD)

Play Episode Listen Later Nov 4, 2021 62:56


DMCA and the blind, Amazon's Matter support, Facebook and Meta facial scanning Damon Beres talks about his WIRED piece that details the challenges the DMCA poses to blind readers who want to read ebooks. Ry Crist from CNET walks through Amazon's newly announced support for the Matter and Thread IoT protocols in their devices. Jason details the short history of a Squid Game inspired cryptocurrency scam and how easy it was to net $3.3 million. Mikah covers Facebook's announcement that it would be getting rid of its facial recognition system while Meta has no plans to back down. Hosts: Jason Howell and Mikah Sargent Guests: Damon Beres and Ry Crist Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: CrowdStrike.com/twit Command Line Heroes - TNW udacity.com/TWiT code TWIT75

Tech News Weekly (MP3)
TNW 208: Squid Game Crypto Scam - DMCA and the blind, Amazon's Matter support, Facebook and Meta facial scanning

Tech News Weekly (MP3)

Play Episode Listen Later Nov 4, 2021 62:38


DMCA and the blind, Amazon's Matter support, Facebook and Meta facial scanning Damon Beres talks about his WIRED piece that details the challenges the DMCA poses to blind readers who want to read ebooks. Ry Crist from CNET walks through Amazon's newly announced support for the Matter and Thread IoT protocols in their devices. Jason details the short history of a Squid Game inspired cryptocurrency scam and how easy it was to net $3.3 million. Mikah covers Facebook's announcement that it would be getting rid of its facial recognition system while Meta has no plans to back down. Hosts: Jason Howell and Mikah Sargent Guests: Damon Beres and Ry Crist Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: CrowdStrike.com/twit Command Line Heroes - TNW udacity.com/TWiT code TWIT75

El Mananero
541 Facebook eliminara reconocimiento facial

El Mananero

Play Episode Listen Later Nov 4, 2021 14:58


The Healthy Skin Show
219: Dupixent Red Face + Neck Rash Associated With Fungal Overgrowth

The Healthy Skin Show

Play Episode Listen Later Nov 4, 2021 10:12


Did you know that about 10% of people using Dupixent develop awful face and neck dermatitis? This issue (more officially called Dupilumab Facial Redness (DFR)) wasn't flagged during the randomized FDA trials, but has some dermatologists concerned because DFR can be incredibly severe, just as it was for one of my clients. Since Dupixent is a biologic drug used by some with Eczema and Topical Steroid Withdrawal to ease symptoms, this new problem isn't ideal. Rather than just assume that the person has a sensitivity to Dupixent, new research is showing that this may be a different problem — Malasezzia hypersensitivity. If you recall, Malasezzia is a fungal organism that normally lives in your skin's microbiome. It really shouldn't be causing an issue like this, but something about the way that Dupixent interacts with your immune system along with a compromised skin barrier could play a role. Here are the current papers discussing this topic so you have something to bring to your prescribing dermatologist so you can get the help you need if you are experiencing this! In this episode: Facial + neck redness that occurs in about 10% of Dupixent users What current research on what may be driving this weird “side effect” Treatment options listed in currently published articles The blood test marker that could be helpful in getting a clear diagnosis What to do if YOU have face + neck redness from Dupixent Quotes: Approximately 10% of Dupixent users develop red, inflamed, dry, scaly and itchy face + neck rashes requiring antifungal medication treatment. Dupixent Facial Redness was never described or mentioned in the Dupixent clinical trials for the FDA (which is surprising considering that it impacts approximately 10% of patients).

TendenciasTech
No mas reconocimiento facial de Facebook y Google Noticias en España

TendenciasTech

Play Episode Listen Later Nov 3, 2021 11:49


Es una realidad, No más reconocimiento facial de Facebook y Google Noticias en España.Meta está cerrando el sistema de reconocimiento facial de Facebook. Facebook cambió recientemente su nombre a Meta y ahora Meta ha anunciado que están cerrando el sistema de reconocimiento facial en Facebook.Google Noticias se relanzará en España tras eliminarse los pagos obligatorios a los periódicos. España ha modificado su ley de derechos de autor de acuerdo con la legislación de la UE► ¡No olvides de suscribirte!https://youtube.com/berlingonzalez► Contacto (English - Español)tendenciastech@outlook.com► PodcastApple Podcast: http://apple.co/2CtwnidSpotify: https://spoti.fi/2lJKPzyAmazon Music: https://amzn.to/3dHBosPGoogle Podcast: https://bit.ly/3eqNnKzCastBox: https://bit.ly/33jyB4e► Redes SocialesFB: https://www.facebook.com/BerlinGonzalezsTT: https://www.tiktok.com/@berlingonzalezsTW: https://twitter.com/berlingonzalezsIN: https://www.instagram.com/tendenciastech► Donacioneshttps://www.paypal.me/tendenciastechhttps://www.patreon.com/tendenciastech#BerlinGonzalez #Facebook #GoogleSupport this show http://supporter.acast.com/tendenciastech. See acast.com/privacy for privacy and opt-out information.

Espresso con Victor
Meta se quiere separar lo máximo posible de Facebook y borrará el reconocimiento facial de 1.000 millones de personas

Espresso con Victor

Play Episode Listen Later Nov 3, 2021 12:32


Parece que Meta sigue desmarcándose de Facebook. El último movimiento con este objetivo la eliminación de datos con las caras de mil millones de personas. También hablaremos de la última herramienta de Microsoft con el teletrabajo en mente. Y del lanzamiento global de Netflix Games, un hecho que seguramente acabe siendo histórico. Por último, el anuncio de unos NFT que nunca hubieramos imaginado. --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app

NTD Business
Facebook Reducing Facial Rec Features; Turner: Climate Conference Ignores Trade-Offs | NTD Business

NTD Business

Play Episode Listen Later Nov 3, 2021 25:18


NTD Business News- 11/2/2021 1. Cop26: Biden Announces Steps To Curb Methane 2. Turner: Climate Conference Ignores Trade-Offs 3. World Leaders Push For Forestation: Cop26 4. Amazon Drivers Getting Missing Tips Back 5. 69% Of Remote Workers Have Multiple Jobs: Rpt

NTD Business
Facebook Reducing Facial Rec Features; Turner: Climate Conference Ignores Trade-Offs | NTD Business

NTD Business

Play Episode Listen Later Nov 2, 2021 25:18


NTD Business News- 11/2/20211. Cop26: Biden Announces Steps To Curb Methane2. Turner: Climate Conference Ignores Trade-Offs3. World Leaders Push For Forestation: Cop264. Amazon Drivers Getting Missing Tips Back5. 69% Of Remote Workers Have Multiple Jobs: Rpt

You Beauty
The Best Facial Oil For Each Skin Type

You Beauty

Play Episode Listen Later Nov 1, 2021 21:26


Facial oils have taken our skincare routines by storm in the last few years. At first, there were only one or two kinds on the market but now there are tonnes, that not only promise nourishment but also cosmeceutical benefits. So which one is right for your skin type? CREDITS Host: Sharon 'Shazzy' Hunt Guest: Terri Vinson Producer: Gia Moylan GET IN TOUCH: Got a beauty question you want answered?  Email us at youbeauty@mamamia.com.au or call the podphone on 02 8999 9386.  Join our You Beauty Facebook Group here. Want this and other podcasts delivered straight to your inbox? Subscribe to our podcast newsletter. You Beauty is a podcast by Mamamia. Listen to more Mamamia podcasts here. Mamamia acknowledges the Traditional Owners of the Land we have recorded this podcast on, the Gadigal people of the Eora Nation. We pay our respects to their Elders past and present and extend that respect to all Aboriginal and Torres Strait Islander cultures. See omnystudio.com/listener for privacy information.

Radio Health Journal
The Dangers of Facial Recognition

Radio Health Journal

Play Episode Listen Later Oct 31, 2021 18:58


Facial recognition technology is everywhere, from your smartphone to the grocery store to city streets. But do we really want to be constantly tracked? Law enforcement finds it immensely helpful, but many experts say it's a massive invasion of privacy that needs limitation. Experts discuss.

You Beauty
This Exfoliant Is A Facial In A Bottle

You Beauty

Play Episode Listen Later Oct 28, 2021 14:34


Over the last few months many of us have had to scramble to find at home treatments that'll give us that 'just been to the salon' glow. And even now, with all the states out of lockdown it can be hard to actually get an appointment! But with one of the products Leigh's recommending today we won't need a beautician appointment cause we'll have a facial in a bottle. The list of products mentioned in this episode is below: SPENDYS Kelly: SkinCeuticals Silymarin CF Leigh: Bioderma Sensibio Defensive Rich Cream SAVEYS Leigh: Essano Scalp Refresh Balancing Shampoo Kelly:NO7 HydraLuminous Water Surge Gel Oil Free SHOP MY STASH Leigh: Biologique Recherche Lotion P50  Kelly: Ciaté London Christine Quinn Colour Flip Lip Cream CREDITS Host: Kelly McCarren & Leigh Campbell Producer: Gia Moylan GET IN TOUCH: Got a beauty question you want answered?  Email us at youbeauty@mamamia.com.au or call the podphone on 02 8999 9386.  Join our You Beauty Facebook Group here. Want this and other podcasts delivered straight to your inbox? Subscribe to our podcast newsletter. You Beauty is a podcast by Mamamia. Listen to more Mamamia podcasts here. Mamamia acknowledges the Traditional Owners of the Land we have recorded this podcast on, the Gadigal people of the Eora Nation. We pay our respects to their Elders past and present and extend that respect to all Aboriginal and Torres Strait Islander cultures. See omnystudio.com/listener for privacy information.

Functional Basics - Die Basis für deine Gesundheit, mehr Lebensqualität & Performance im Leben.
#270 Wie du dein Gesicht fit & frisch hältst - Gesichtsyoga, Gua Sha & Facial Cupping mit Christina Schmid & Carsten Wölffling

Functional Basics - Die Basis für deine Gesundheit, mehr Lebensqualität & Performance im Leben.

Play Episode Listen Later Oct 28, 2021 52:35


Falten, hängende Wangen, Tränensäcke - etwas, was uns im späteren Alter einmal ereilen könnte. Nutzt du noch deine Mimik? Trainierst du deine Gesichtsmuskeln? Über dieses Thema spreche ich mit dem Coach & Psycho-Kinesiologin, Autorin der Bücher "Chi statt Botox" & "Du bist am schönsten, wenn du du bist" Christina Schmid Was erfährst du? Welche Falten sind besonders störend? Warum bekommen wir Gesichtsfalten? Was ist Gua-Sha & Face Cupping? Was ist Gesichtsyoga? Wie lange dauert eine Gesichtsyoga-Session? Was machen Verspannungen im Kiefer mit deinem gesamten Körper? Wie kannst du Krähenfüße wegtrainieren? Was gilt es zu beachten bei Kosmetik? Wie ist Christina ihre Meinung zu Botox? Wann macht es Sinn, etwas für sein Gesicht zu tun? Schlaffe Tränensäcke - was tun? Schatten unter den Augen - wie gehst du diese an? Mehr von Christina: Instagram: https://www.instagram.com/chi.statt.botox/ Homepage & Blog: https://chi-statt-botox.com/ YouTube: https://www.youtube.com/c/ChristinaSchmid Bücher (Amazon*): Christinas Bücher (*Bitte unterstütze lokale Buchhändler, statt Amazon!) MEHR FÜR DICH #GesundheitIstFürAlleDa (Direkt anklicken) • Kostenfreier Klarheits-Call - Du hast ein Thema, kommst aktuell nicht weiter? Genau dafür biete ich den kostenfreien Klarheits-Call an, in dem wir uns Dein Thema unverbindlich genau anschauen. Dabei erhältst Du bereits essenzielle Impulse & Möglichkeiten, wie Du Deine Herausforderung lösen, Deine Ziele erreichen & mehr Lebensfülle kreieren kannst. HIER DIREKT KOSTENFREI VEREINBAREN! • Kostenfreie Checklisten, interaktive E-Books & Onlinekurse #GesundheitIstFürAlleDa GESTALTE DEN PODCAST MIT (Direkt anklicken) • Stelle meinen Interviewgästen deine Fragen in meiner Instagram-Story • Übersicht aller Folgen nach Themen sortiert findest du auf dem Instagramkanal functional.basics.podcast BEWERTE & TEILE DEN PODCAST - #GesundheitIstFürAlleDa • Bei ITunes bewerten

Church of Lazlo Podcasts
Wednesday 10.27.2021 - The Church Of Lazlo Podcast

Church of Lazlo Podcasts

Play Episode Listen Later Oct 27, 2021 94:07


Half of us are here! Jeriney is coming in late which means Slimfast is producing the show and he can't get Julia's mic to work. Slimfast is bragging to everyone about his booster shot. *We got Julia! Let's talk about how 22% Americans will believe in anything. Ghosts, werewolves, zombies, aliens. *What's the most annoying thing about being a guy? Listening to other guys complain about not getting enough validation. *Doomscrolling! Facial recognition to board a plane, Keanu Reeves continues to be cool, a guy ate most his meals at Six Flags, testicle baths consume the rest of the conversation. *A high school is under investigation after some students gave teachers lap dancers and dressed up like hooters girls. *A man shoots his son because he wouldn't stop playing the guitar and we have the 911 call. *Lazlo+Slimfast+CollegeCheerLeaders=LazloFury *What pre-pandemic things do you not want back? *Phrases that only a** holes say. *Have a great day/night! Follow us on instagram and twitter @churchoflazlo and support the show at http://www.lazlo.church​ -Everybody Wang Chung!!!   See omnystudio.com/listener for privacy information.

Unashamed with Phil Robertson
Ep 370 | Missy & Jase Experience Greek Socialism, Facial Profiling & Courageous Underground Churches

Unashamed with Phil Robertson

Play Episode Listen Later Oct 27, 2021 55:45


Jase and Missy are back from their adventures in Greece, and they're appalled by the way socialism has ravaged the country. Jase gets facially profiled AGAIN at the airport. A yellowjacket creeps into Phil's beard, and chaos ensues. Jase delivers a message that gets transmitted to underground churches, and he finds inspiration in the people who risk their lives to share Jesus. Missy tells the story of a family who found God after an amazing journey to escape persecution in Afghanistan. And Jase describes one of the most phenomenal meals he's ever had. Learn more about your ad choices. Visit megaphone.fm/adchoices

Es la Mañana de Federico
Mundo Natural: Serum facial Posidonia

Es la Mañana de Federico

Play Episode Listen Later Oct 27, 2021 2:11


Federico comenta con Beatriz de la Torre las ventajas de este producto de Mundo Natural.

Fintech Insider Podcast by 11:FS
574. News: Primer attracts big-name investors for a global payments roadmap

Fintech Insider Podcast by 11:FS

Play Episode Listen Later Oct 25, 2021 55:49


Our expert hosts, David M. Brear and Lindsey Kistler, are joined by some great guests to talk about the most notable fintech, financial services and banking news from the past week. This week's guests include: Richard Jones, Director and Chief Product Officer, GoHenry Gabriel Le Roux, Co-Founder, Primer With sound clips from: Simon Taylor, Co-Founder and Chief Product Officer, 11:FS Brian McKenney, Chief Innovation Officer, HSBC We cover the following stories from the fintech and financial services space: Primer raises $50M at a $425M valuation - 6:02 Klarna to offer pay now option ahead of FCA review - 17:55 GoHenry Launches New In-App Gamified Education for Financial Literacy - 25:02 Tala raises $145 million to expand globally and into crypto - 34:10 11:FS Foundry announces partnership with Google Cloud (Clip from Simon Taylor, Co-Founder and Chief Product Officer, 11:FS) - 42:02 Challenger bank N26 raises $900 million at $9 billion valuation - 44:10 HSBC to launch Banking as a Service (Clip from Brian McKenney, Chief Innovation Officer, HSBC) - 45:50 Facial recognition cameras installed in UK school canteens - 49:15 This episode is sponsored by Temenos. Temenos is the world leader in banking software, serving over 3,000 financial institutions. SCALE 2021 is Temenos' dedicated, virtual developer event, including: insights from industry leaders on current technology trends and how they impact banking; customer presentations; product demonstrations and road-map sessions and opportunities to speak with Temenos experts. Whether you're a developer, consultant or business user, discover the latest technology opportunities and how this can help you deliver bigger, better, faster. Register to attend here. (https://tem.mn/3jYLZlm) This episode is sponsored by LetsDeel. There's a better way to hire internationally, and it starts with Deel. Everything from contract creation, record keeping, payments, and full-time employment is all in one place for teams all over the world. Companies anywhere can hire compliantly everywhere thanks to Deel. It's payroll and compliance built for today's worldwide workforce. To learn more, visit letsdeel/11fs (https://www.letsdeel.com/11fs), and redeem an exclusive offer of 3 months free when you hire a contractor and 20% for your first year when you hire an employee. This episode is sponsored by Blueshift Customers expect more from their digital experience and their personal finance is no exception. Blueshift empowers fintech and financial institutions to create secure customer profiles and intentional, relevant experiences for customers. Whether in app, on site, in branch, or anywhere else, Blueshift's SmartHub CDP helps brands like Lending Tree and ClearScore turn data into personalized experiences that increase retention, satisfaction, and revenue. Learn more about the Blueshift at blueshift.com/11fs. Fintech Insider by 11:FS is a podcast dedicated to all things fintech, banking, technology and financial services. Hosted by a rotation of 11:FS experts including David Brear, Simon Taylor and Jason Bates who are joined by a range of brilliant guests, we cover the latest global news, bring you interviews from industry experts or take a deep dive into subject matters such as APIs, AI or digital banking. If you enjoyed this episode, don't forget to subscribe and please leave a review Follow us on Twitter: www.twitter.com/fintechinsiders where you can ask the hosts questions, alternatively email podcasts@11fs.com! Special Guests: Gabriel le Roux and Richard Jones.

You Beauty
How Do I Know If I'm Getting A Good Facial?

You Beauty

Play Episode Listen Later Oct 24, 2021 9:39


Beautician appointments are a bit of a luxury and considering the price tag of certain treatments we want to be making sure we're getting our money's worth. But how do you know if you're getting a good facial? And how do you know if you're seeing a good beautician? CREDITS Host: Kelly McCarren & Leigh Campbell Producer: Gia Moylan GET IN TOUCH: Got a beauty question you want answered?  Email us at youbeauty@mamamia.com.au or call the podphone on 02 8999 9386.  Join our You Beauty Facebook Group here. Want this and other podcasts delivered straight to your inbox? Subscribe to our podcast newsletter. You Beauty is a podcast by Mamamia. Listen to more Mamamia podcasts here. Mamamia acknowledges the Traditional Owners of the Land we have recorded this podcast on, the Gadigal people of the Eora Nation. We pay our respects to their Elders past and present and extend that respect to all Aboriginal and Torres Strait Islander cultures. See omnystudio.com/listener for privacy information.

This Machine Kills
Patreon Preview – 111. State-as-a-Platform

This Machine Kills

Play Episode Listen Later Oct 24, 2021 6:44


It's a good old TMK where we get mad talking about two stories. First, the increasingly influential “state-as-a-platform” model of governance that France is leaning super hard into, which goes beyond neoliberalism by taking seriously the premise: “What if instead of a government, we had AWS.” Second, schools in the UK are rolling-out facial recognition in secondary school cafeterias. Teaching kids that access to anything in life, even just lunch, must be mediated by intrusive systems of surveillance and control – oh, I mean, speed and convenience. Some stuff we reference: ••• France finds growth prescription with health app Doctolib https://www.ft.com/content/ca41f61e-2513-41d2-9adf-d94b5af302a1 ••• Facial recognition cameras arrive in UK school canteens https://www.ft.com/content/af08fe55-39f3-4894-9b2f-4115732395b9 ••• Marc Benioff: We Need a New Capitalism https://www.nytimes.com/2019/10/14/opinion/benioff-salesforce-capitalism.html Subscribe to hear more analysis and commentary in our premium episodes every week! patreon.com/thismachinekills Grab your TMK gear: bonfire.com/store/this-machine-kills-podcast/ Hosted by Jathan Sadowski (twitter.com/jathansadowski) and Edward Ongweso Jr. (twitter.com/bigblackjacobin). Production / Music by Jereme Brown (twitter.com/braunestahl)

Really Riley
Episode 269 : Riley's Fav 5 Facial Tools

Really Riley

Play Episode Listen Later Oct 22, 2021 8:57


Trying to keep that skin right and tight!

Ready to Lead
When and How to Have “Awkward” Conversations with Your Team with Richard Lindner and Jeff Mask

Ready to Lead

Play Episode Listen Later Oct 20, 2021 43:08


As leaders, alignment, clarity, and trust among your team are great, but sometimes the bridge to get there is the dreaded awkward conversation.   Every leader can relate to the sense of dread that comes with knowing you need to have a difficult conversation you've been avoiding. How do we lead into this? How do we request an awkward conversation and then how do we handle it? In today's episode, co-hosts Richard Lindner and Jeff Mask share some practical advice for dealing with awkward conversations and then hopefully eliminating the need for them.   Turn Awkward Conversations Into Fierce Conversations   Jeff says the most important thing you can do is practice a conversation before you have it—especially that opening sentence. The first five seconds are always the most difficult—it's awkward, then onward. He starts conversations with “I want to talk with you about…” not “I need to talk to you about…” Replace need and to with want and with. Then fill in the space after about with a clear statement of the issue.   Rehearse that first sentence more than anything. Memorize the facial expression, tone, and pacing so you set the stage for a productive, constructive conversation.   Jeff highly recommends Susan Scott's book, Fierce Conversations, where she gives six steps to an opening statement, then #7 is an invitation for them to respond.   Name the issue Give a specific example Describe your emotion Clarify what's at stake Own your part Indicate your wish to solve the problem Invite them to respond   Here's an example. 1. Name the issue (how you respond to certain members of the team). 2. Give a specific example (when Stacy talks, you talk over her and don't let her finish). 3. Describe your emotion (it's frustrating but I don't want to embarrass you). 4. Clarify what's at stake (but I'm afraid if we don't talk about it, we won't gel as a team) 5. Own your part (I should have addressed this earlier) and 6. Indicate your wish to solve the problem (I really want to work this out.) 7. Invite them to respond.   Some Practical Advice for Before and During the Conversation   You want to start from a good place, which means getting the raw emotion out of the way and getting to logic. Share your thoughts and feelings with someone else. Write it all out in an email you'll never send. Create a plan to move forward. Establish your desired outcome.    When we get to that step 7 and ask for their feedback, how do we invite honest feedback and not a defensive reply? Facial expressions and body language while listening are so important. Make them feel safe. Resist the temptation to build a stronger case. Don't get defensive. Listen. The goal is to help them feel understood—seen, heard, and valued. Don't be on your phone. Don't check something. Don't lose eye contact. Not intense staring, but don't lose focus or get distracted. Listen with your ears, eyes, and heart.   What if you mess up that feedback invitation at any point? Own it immediately. Think of a brick wall between the two of you. What you're doing is removing brick after brick so you can see each other clearly. Immediately own up to something you did that wasn't helpful, and ask them to continue. Don't apologize forever.   Check your motives when you're asking them questions. Are you truly curious and want to understand their perspective? Or do you have a judgment-type energy?    What Is Your Body Language Actually Saying?   Richard shares a personal example of something he was doing that was sending the opposite message of the one he intended. When he's processing, thinking, he folds his arms across his chest. It's his default move. He does it without even thinking.   One day his business partner confronted him about it. He had shared an idea with Richard, and Richard agreed with him verbally, but his body language (crossed arms) was saying something different. Richard was pondering, considering, but his partner received it as him being defensive, closed off.   Richard has had to consciously try new ways of holding his arms/hands while processing—putting them behind his body, sitting on them, anything but crossing them over his chest. He's had to become self-aware.   “What helps me with modeling and accountability,” he says, “is not hiding something I'm struggling with. Sometimes acknowledging the problem helps solve it. He went from unconsciously incompetent to consciously competent. He's aware of the habit now, but it's going to take him a while to fix it.   He took an additional accountability step and shared his struggle with his team. His assumption before was that people knew he was pondering their smart idea and considering it with his arms crossed. Now he knows that it makes people feel uneasy, bad, hurt. He and his partner came up with a funny word for him to call Richard out, and he asked the rest of the team to help him break the habit too. Now, everyone had context, and other times he had done it made sense to them. He broke the habit super quickly after that.    Richard suggests being curious in finding out something YOU do that follows that pattern. You don't realize you're doing it, and it may have a negative connotation attached to it. Just the act of doing that will give you the ability to talk to an employee about this same kind of thing.   Final Pieces of Advice   One question people ask Jeff is: “How do I make sure I know the best time to have the conversation?” You know it's too soon if your emotions are raw. You know you waited too long when you're wondering if it's still a big deal. Err on the side of sooner than later. When you don't address it, you tolerate the bad behavior. That speaks loud and messes up your culture.   If you felt those butterflies in your stomach as you listened, you probably need to have an awkward conversation. Do it. Have it. Don't let another day or week go by without having that conversation.   And then: “What do I do after I have the conversation?” The simple answer: follow up and reinforce with care.   Richard and Jeff want to hear from YOU. What other questions do you have about awkward conversations and how to handle them? What have you done that worked well? What can they do to help you lead from a powerful place? Email them here with your thoughts/questions: feedback@readytolead.com  RESOURCES: Fierce Conversations (book by Susan Scott) OTHER SHOWS YOU MIGHT ENJOY: Business Lunch with Roland Frasier and Ryan Deiss Perpetual Traffic with Ralph Burns and Kasim Aslam DigitalMarketer Podcast

For Your Best Self
Lips 101

For Your Best Self

Play Episode Listen Later Oct 19, 2021 47:56


Dr. Gasgarth gives her take on why lip enhancement is so popular and then describes 1.) lip plumpers (4 min 17 sec): using topical treatment to enhance the lips;  2.) a lip flip (7 min): using neurotoxins to subtly enhance the vertical height of lips, soften surrounding “smoker's lines”, and changing a gummy smile;  3.) lip filler (12 min): an extensive discussion about using hyaluronic acid filler to enhance the shape and volume of your lips, including why you want an experienced injector, and pre and post-injection instructions;  4.) silicone injections and silicone implants (36 min 15 sec); and finally  5.) surgical lip lift for patients with filler fatigue (40 min and 8 sec)As always, be friend and share this podcast with a someone who needs to hear this.

Unreached of the Day
Pray for the Hazara in United Arab Emirates

Unreached of the Day

Play Episode Listen Later Oct 18, 2021 1:01


  People Group Details:  Sign up to receive podcast  https://joshuaproject.net/people_groups/12076 Listen to "A Third of Us" podcast with Greg Kelley, produced by the Alliance for the Unreached: https://alliancefortheunreached.org/podcast/ Watch "Stories of Courageous Christians" w/ Mark Kordic https://storiesofcourageouschristians.com/stories-of-courageous-christians  

Craig Peterson's Tech Talk
How Many Times Per Week Are You Being Cyber Attacked? From Where? How? Why?

Craig Peterson's Tech Talk

Play Episode Listen Later Oct 15, 2021 84:46


How Many Times Per Week Are You Being Cyber Attacked? From Where? How? Why? We've got a new study out showing that North American organizations, businesses, and others, are being hit with an average of 497 cyber attacks per week, right here in the good old USA. [Following is an automated transcript] This is a study by checkpoint software technologies. Checkpoint, I used, oh my gosh. It would have been back in the nineties back then. They were one of the very first genuine firewall companies. And it was a system that I was putting in place for my friends over at troopers. I think it was New England telephone. It might've been Verizon by then. I can't even remember, man. [00:00:41] It's been a little while, but it was, a system we were using in front of this massive system that I designed, I made the largest internet property in the world. At that time called big yellow. It morphed into super pages. It might be familiar with. But it was me and my team that did everything. We built the data center out. [00:01:05] We wrote all of the software. Of course they provided all of the yellow pages type listing so we can put it all in. And we brought it up online and we were concerned. Well, first of all, You know, I've been doing cyber security now for over 30 years. And at this point in time, they wanted something a little more than my home grown firewall. [00:01:29] Cause I had designed and written one in order to protect this huge asset that was bringing in tens of millions of dollars a year to the phone company. So they said, Hey, listen, let's go ahead and we'll use checkpoint and get things going. We did, it was on a little, I remember it was a sun workstation. If you remember those back in the. [00:01:52] And it worked pretty well. I learned how to use it and played with it. And that was my first foray into kind of what the rest of the world had started doing, this checkpoint software, but they've continued on, they make some great firewalls and other intrusions type stuff, detection and blocking, you know, already that I am a big fan, at least on the bigger end. [00:02:17] You know, today in this day and age, I would absolutely use. The Cisco stuff and the higher end Cisco stuff that all ties together. It doesn't just have the fire power firewall, but it has everything in behind, because in this day and age, you've got to look at everything that's happening, even if you're a home user. [00:02:37] And this number really gets everybody concerned. Home users and business users is. Businesses are definitely under bigger attacks than home users are. And particularly when we're talking about businesses, particularly the bigger businesses, the ones that have a huge budget that are going to be able to go out and pay up, you know, a million, $10 million ransom. [00:03:05] Those are the ones that they're after and this analysis. Point software who does see some of those attacks coming in, showed some very disturbing changes. First of all, huge increases in the number of cyber attacks and the number of successful ransoms that have been going on. And we're going to talk a little bit later, too, about where some of those attacks are coming from, and the reason behind those attack. [00:03:36] According to them right now, the average number of weekly attacks on organizations globally. So far, this year is 40% higher than the average before March, 2020. And of course that's when the first lockdowns went into effect and people started working from home in the U S the. Increase in the number of attacks on an organizations is even higher at 53%. [00:04:07] Now you might ask yourself why, why would the U S be attacked more? I know you guys are the best and brightest, and I bet it, I don't even need to say this because you can figure this out yourself, but the us is where the money is. And so that's why they're doing it. And we had president Biden come out and say, Hey, don't attack the. [00:04:27] well, some of those sectors are under khaki for more after he said that then before, right. It's like giving a list to a bad guy. Yeah. I'm going to be gone for a month in June and yeah, there won't be anybody there. And the here's the code to my alarm. Right. You're you're just inviting disaster checkpoints. [00:04:49] Also showing that there were more. Average weekly attacks in September 21. That's this September than any time since January, 2020. In fact, they're saying 870 attacks per organization globally per week. The checkpoint counted in September was double the average in March, 2020. It's kind of funny, right? [00:05:14] It's kind of like a before COVID after COVID or before the Wu Han virus and after the Wu Han virus, however, we might want to know. So there are a lot of attacks going on. Volume is pretty high in a lot of different countries. You've heard me say before some of my clients I've seen attack multiple times a second, so let's take a second and define the attack because being scanned. [00:05:40] I kind of an attack, the looking to see, oh, where is there a device? Oh, okay. Here's a device. So there might be a home router. It might be your firewall or your router at the business. And then what it'll do is, okay, I've got an address now I know is responding, which by the way is a reason. The, we always configure these devices to not respond to these types of things. [00:06:04] And then what they'll do is they will try and identify it. So they'll try and go into the control page, which is why you should never have when. Configuration enabled on any of your routers or firewalls, because they're going to come in and identify you just on that because all of a sudden them brag about what version of the software you're running. [00:06:26] And then if it's responding to that, they will try and use a password. That is known to be the default for that device. So in a lot of these devices, the username is admin and the password is admin. So they try it and now off they go, they're running. Some of these guys will even go the next step and we'll replace the software. [00:06:52] In your router or firewall, they will replace it so that it now directs you through them, everything you are doing through them. So they can start to gather information. And that's why you want to make sure that the SSL slash TLS. That encryption is in place on the website. You're going to, so if you go to Craig peterson.com right now, my website, I'm going to go there myself. [00:07:22] So if you go to Craig peterson.com, you're going to notice that first of all, it's going to redirect you to my secure site and it doesn't really matter. You won't see it. Okay. But you are there because if he. Typically at the left side of that URL bar where it says, Craig peterson.com. You'll see, there's a little lock. [00:07:44] So if you click that lock, it says connection is secure. Now there's a lot more we could go into here. But the main idea is even if your data is being routed through China or. Both of which have happened before many tens of thousands, hundreds of thousands of time times. I'm not even sure of the number now. [00:08:06] It's huge. Even if your data is being routed through them, the odds are, they're not going to see anything. That you are doing on the Craig Peterson site. Now, of course you go into my site, you're going to be reading up on some of the cybersecurity stuff you can do. Right. The outages what's happened in the news. [00:08:27] You can do all of that sort of thing on my side, kind of, who cares, right? Um, but really what you care about is the bank, but it's the same thing with the bank. And I knew mine was going to be up there. And when everybody just check it out anyway, so. So the bad guys, then do this scan. They find a web page log in. [00:08:47] They try the default log in. If it works, the Le the least they will do is change. What are called your DNS settings. That's bad because changing your DNS settings now opens you up to another type of attack, which is they can go ahead. And when your browser says, I want to go to bank of america.com. It is in fact, going to go out to the internet, say is bank of America, the bad guys. [00:09:18] Did, and they will give you their bank of America site that looks like bank of America feels like bank of America. And all they're doing is waiting for you to type into your bank of America, username and password, and then they might redirect you to the. But at that point, they've got you. So there are some solutions to that one as well, and Firefox has some good solutions. [00:09:44] There are others out there and you had to have those that are in the works, but this is just an incredible number. So here's what I'm doing, right. I have been working for weeks on trying to figure out how can I help the most people. And obviously I needed to keep the lights on, right? I've got to pay for my food and gas and stuff, but what I'm planning on doing and what we've sketched out. [00:10:10] In fact, just this week, we got kind of our final sketch out of it is we're going to go ahead and have a success path for cyber security. All of the basic steps on that success path will be. Okay. So it will be training that is absolutely 100% free. And I'll do a deeper dive into some of these things that I'm doing that I'm doing right now here on the radio, because you can't see my desktop. [00:10:40] It's hard to do a deep dive and it's open to anybody, right? If you're a home user or if you're a business user, all of the stuff on that free. Is going to help you out dramatically. And then after that, then there'll be some paid stuff like a membership site. And then obviously done for you. If the cybersecurity stuff is just stuff that you don't want to deal with, you don't have the time to deal with. [00:11:05] You don't want to learn, because believe me, this is something that's taken me decades to learn and it's changing almost every day. So I understand if you don't want to learn it to. That is the other option. I'll give you, which is done for you, which we've been doing now for over 20, 30 years. Stick around. [00:11:25] We'll [00:11:25] So which sectors are economy are being hacked? I mentioned that in the last segment, but yeah, there are some problems and the sectors that president Biden lined out laid out are, are the ones that are under, even more attack after his message. [00:11:42] 497 cyber attacks per week. On average here in the US, that is a lot of attacks. And we started explaining what that meant so that we talked about the scan attacks that are automated and some person may get involved at some point, but the automated attacks can be pretty darn automated. Many of them are just trying to figure out who you are. [00:12:09] So, if it shows up, when they do that little scan that you're using a router that was provided by your ISP, that's a big hint that you are just a small guy of some sort, although I'm shocked at how many bigger businesses that should have their own router, a good router, right. A good Cisco router and a really good next generation firewall. [00:12:34] I'm shocked at how many don't have those things in place, but when they do this, That's the first cut. So if you're a little guy, they'll probably just try and reflash your router. In other words, reprogram it and change it so that they can start monitoring what you're doing and maybe grab some information from. [00:12:56] Pretty simple. If you are someone that looks like you're more of a target, so they connect to your router and let's say, it's a great one. Let's say it's a Cisco router firewall or Palo Alto, or one of those other big companies out there that have some really good products. Uh, at that point, they're going to look at it and say, oh, well, okay. [00:13:18] So this might be a good organization, but when they get. To it again, if when access has turned on wide area, access has turned down, that router is likely to say, this is the property of, uh, Covina hospital or whatever it might be, you know? And any access is disallowed authorized access only. Well, now they know. [00:13:42] Who it is. And it's easy enough just to do a reverse lookup on that address. Give me an address anywhere on the internet. And I can tell you pretty much where it is, whose it is and what it's being used for. So if that's what they do say they have these automated systems looking for this stuff it's found. [00:14:02] So now they'll try a few things. One of the first things they try nowadays is what's called an RDP attack. This is a remote attack. Are you using RDP to connect to your business? Right? A lot of people are, especially after the lockdown, this Microsoft. Desktop protocol has some serious bugs that have been known for years. [00:14:25] Surprisingly to me, some 60% of businesses have not applied those patches that have been available for going on two years. So what then button bad guys will do next. They say, oh, is there a remote desktop access? Cause there probably is most smaller businesses particularly use that the big businesses have a little bit more expensive, not really much more expensive, but much better stuff. [00:14:51] You know, like the Cisco AnyConnect or there's a few other good products out there. So they're going to say, oh, well, okay. Let's try and hack in again. Automate. It's automated. No one has to do anything. So it says, okay, let's see if they patch, let's try and break in a ha I can get in and I can get into this particular machine. [00:15:14] Now there's another way that they can get into their moat desktop. And this apparently has been used for some of the bigger hacks you've heard about recently. So the other way they get in is through credential stuff. What that is is Hey, uh, there are right now some 10 billion records out on the dark web of people's names, email addresses, passwords, and other information. [00:15:43] So, what they'll do is they'll say, oh, well this is Covina hospital and it looks it up backwards and it says, okay, so that's Covina hospital.org. I have no idea if there even is a Gavino hospital, by the way, and will come back and say, okay, great. So now let's look at our database of hacked accounts. Oh, okay. [00:16:04] I see this Covina hospital.org email address with a password. So at that point they just try and stuff. Can we get in using that username and password that we stole off of another website. So you see why it's so important to be using something like one password, a password generator, different passwords on every site, different usernames on every site, et cetera, et cetera. [00:16:29] Right. It gets pretty important per te darn quickly. So now that they're in, they're going to start going sideways and we call that east west in the biz. And so they're on a machine. They will see what they can find on that machine. This is where usually a person gets some. And it depends in historically it's been about six days on average that they spend looking around inside your network. [00:17:00] So they look around and they find, oh yeah, great. Here we go. Yep. Uh, we found this, we found that. Oh, and there's these file server mounts. Yeah. These SMB shares the, you know, the Y drive the G drive, whatever you might call it. So they start gaining through those and then they start looking for our other machines on the network that are compromised. [00:17:23] It gets to be really bad, very, very fast. And then they'll often leave behind some form of ransomware and also extortion, where that extort you additionally, for the threat of releasing your data. So there, there are many other ways they're not going to get into them all today, but that's what we're talking about. [00:17:43] Mirman, we're talking about the 500 cyber attacks per week against the average. North American company. So we have seen some industry sectors that are more heavily targeted than others. Education and research saw an 60% increase in attacks. So their education and I've tried to help out some of the schools, but because of the way the budgets work and the lowest bidder and everything else, they, they end up with equipment. [00:18:17] That's just totally misconfigured. It's just shocking to me. Right. They buy them from one of these big box online places. Yeah. I need a, a Cisco 10, 10. And I need some help in configuring it and all, yeah, no problems or we'll help you. And then they sell it to the school, the school installs it, and it is so misconfigured. [00:18:38] It provides zero protection, uh, almost zero, right. It provides almost no protection at all. And doesn't even use the advanced features that they paid for. Right. That's why, again, don't buy from these big box. Guys just don't do it. You need more value than they can possibly provide you with. So schools, 1500 attacks per week research companies, again, 1500 attacks per week, government and military. [00:19:10] Entities about 1100 weekly attacks. Okay. That's the next, most highest attacked. Okay. Uh, health care organizations, 752 attacks per week on average. Or in this case, it's a 55% increase from last year. So it isn't just checkpoints data that I've been quoting here. That, that gives us that picture. There are a lot of others out there IBM's has Verizon's has all of these main guys, and of course in the end, They've got these huge ransoms to deal with. [00:19:50] Hey, in New Hampshire, one of the small towns just got nailed. They had millions of dollars stolen, and that was just through an email trick that they played in. K again. I T people, um, I I've been thinking about maybe I should put together some sort of coaching for them and coaching for the cybersecurity people, even because there's so much more that you need to know, then you might know, anyways, if you're interested in any of this. [00:20:22] Visit me online. Craig peterson.com/subscribe. You will get my weekly newsletter, all of my show notes, and you'll find out about these various trainings and I keep holding. In fact, there's one in most of the newsletters. Craig peterson.com. Craig Peterson, S O n.com. Stick around. [00:20:43] We've been talking about the types of attacks that are coming against us. Most organizations here in north America are seeing 500 cyber attacks a week, some as many as 1500. Now, where are they coming from? [00:21:00] Whether they're scanning attacks, whether they're going deeper into our networks and into our systems who are the bad guys and what are they doing? Microsoft also has a report that they've been generating, looking at what they consider to be the source of the attacks. Now we know a lot of the reasons I'm going to talk about that too, but the source is an interesting way to look at. [00:21:29] Because the source can also help you understand the reason for the attacks. So according to dark reading, this is kind of an insider, a website you're welcome to go to, but it gets pretty darn deep sometimes, but they are showing this stats from Microsoft, which you can find online that in the last year rush. [00:21:53] Has been the source of 58% of the cyber cat tax. Isn't that amazing now it's not just the cyber attacks. I, I need to clarify this. It's the nation state cyber tech. So what's a nature's nation state cyber attack versus I don't know, a regular cyber attack. Well, the bottom line is a nation state cyber attack is an attack that's occurring and is actually coordinated and run by and on behalf of a nation state. [00:22:31] Uh, So Russia at 58% of all nation state attacks is followed by North Korea, 23% Iran, 11% China, 8%. Now you probably would have thought that China would be. Right up there on that list, but Russia has 50% more of the nation state cyber attacks coming from them than from China. And then after China is south Vietnam, Viet, or I should say South Korea, Vietnam, and Turkey, and they all have less than 1%. [00:23:14] Now, this is this new pool of data that Microsoft has been analyzing. And it's part of this year's Microsoft digital defense report, and they're highlighting the trends in the nation state threat cyber activity hybrid workforce security. Disinformation and your internet of things, operational technology and supply chain security. [00:23:35] In other words, the whole gambit before, before all of this, now the data is also showing that the Russian nation state attacks are increasingly effective, calming from about a 21% successful compromise rate last year to 32%. So basically 50% better this year at effectiveness there, Russians are also targeting more government agencies for intelligence gathering. [00:24:10] So that jumped from 3% of their victims last year to 53%. This. And the Russian nation state actors are primarily targeting guests who us, right? The United States, Ukraine and the United Kingdom. Now this is all according to the Microsoft data. So why has Russia been attacking us? Why is China been attacking us and why the change this. [00:24:38] Well, Russia has been attacking us primarily to rent some us it's a cash cow for them just like oil and gas. They are making crazy money. Now that president Biden has made us dependent on foreign oil supplies. It's just insanity and even dependent on. Gas coming from other places. Well guess where the number one source of gases now for Europe and oil it's Russia. [00:25:08] So we are no longer going to be selling to Europe. Russia is so they're going to be making a lot of money off of. But before then they were actually counted on ransomware to help fund the Russian federal government, as well as of course, these Russian oligarchs, these people who are incredibly rich that have a substantial influence on the government. [00:25:33] Don't if you're wondering who they might be, just think of people like, oh, I don't know. Bill gates and, uh, w who are on the, some of the other big guys, you know, Tim cook, uh, Amazon's Jeff bayzos Elon Musk, right? Those are by my definition and looking it up in the dictionary, they are all a. They get exemptions to laws. [00:25:58] They get laws passed that, protect them. In fact, most of regulations actually protect these big companies and hurt small companies. So I would call them oligarchs and that's the same sort of thing in Russia in Russia. Okay. They probably have a little bit more underhanded stuff than these guys here do, but that's what Russia has been. [00:26:21] China has been continually going after our national secrets, national defense, the largest database of DNA of Americans DNA, of course, is that unique key. If you will building block for all of us, that's what DNA is. And the largest database of all of that uniquely identifying information is in. China stole from the office of personnel management records of a federal employees, their secret clearance, all of their background check information who was spoken with, what did they have to say? [00:27:03] And on and on. So China has been interested in infiltrating our businesses that provide things to the military and the military themselves and the federal state, and even the local governments that's who they've been targeting. And that's why there's 8% number might seem small. Although, as I just mentioned this year, Russia moved, moved dramatically. [00:27:30] They used to be about 3% of their attacks or against the government agencies. And now it's 53%. So Russia. And China are going after our national secrets and they can use them in a cold war, which as I've said, I think the first shots of the third world war have been fired. And frankly, they're all cyber, it's all online and Russia. [00:27:57] Isn't the only nation state actor who's changing its approaches here as espionage is the most common goal amongst all nation state groups as of this year. Tivity of hackers reveals different motivations in Iran, which quadrupled its targeting of Israel. Surprise, surprise. Over the last year. And Iran has been launching destructive attacks, things that will destroy power, power plants, et cetera, and North Korea, which is targeting cryptocurrency companies for profit. [00:28:29] So they're stealing these various crypto coins again, funding their government. So it's, it's a problem. Absolute problem. Government sectors are some of the most targeted 48%. These NGOs non-government organizations that act kind of a quasi government functions and think tanks are 31%. Uh, and Microsoft, by the way, has been alerting customers of nation, state attack, attack attempts. [00:29:01] Guess how many this year that they had to warn about 20,500 times in the past three years. So that's a lot and Microsoft is not a company that's been out there at the front lines. It never has been it's in behind. So to have them come out and say, this is. And okay, by the way, your stolen username and password run for a buck per thousand, and it's only gonna take you hundreds of hours to get it all cleared up. [00:29:32] Isn't that nice spear fishing for a hire can cost a hundred to a thousand dollars per successful account takeover and denial of service attacks are cheap from protected sites, roughly $300. Per month. And if you want to be ransomware king, it's only going to cost you 66 bucks upfront 30% of the profit. [00:29:54] Okay. Craziness. Hey, visit me online. Sign up Craig, peter.com/subscribe. [00:30:03] I had an interesting mastermind meeting this week. There's six of us. We're all business owners and it opened my eyes pretty dramatically because one of the members got hacked, but that's not what I really want to emphasize. [00:30:20] This whole cybersecurity thing gets pretty complicated, pretty quickly. And a friend of mine who is in one of my mastermind groups had a real problem. And the here's here's what went on. We'll call him Walt for back of a letter, lack of a better name since that is his name. [00:30:40] And he doesn't mind me sharing this with you. Walt has a very small business that he and his wife run, and they have a couple of contractors that help out with some things, but his business is very reliant on advertising and primarily what he does is Facebook advertising. Now I've been talking for two years, I think in this mastermind group about cyber security and the fact that everyone needs good cyber security. [00:31:13] And he always just kind of pole hum to, uh, wow. You know, and it's just too complicated for me. I got to thinking for a, you know, a bit, really a few weeks, what does he mean to complicated? Cause there's some basic things you can do. So this week on Tuesday, I was on our mastermind groups meeting and I explained, okay, so here's what happened to Walt. [00:31:42] He had $40,000 stolen, which by the way, it's a lot of money for a teeny tiny husband wife company. And. Uh, well, here's what we did. He, we helped them. We got the FBI involved and, you know, with our direct ties, cause we work with them on certain types of cases and he got back every dime, which is just totally unheard of. [00:32:06] But um, without going into all of the details there, I spent a problem. 1520 minutes with the whole group and the mastermind explaining the basics of cyber security. And that really kind of woke me up, frankly, because of their responses. Now these are all small business owners and so they're making pretty decent money. [00:32:31] In fact, every one of them and they all have some contractors and some employees all except for Walt and his wife, they had just have contractors and. I had two completely different responses from two members of this group that no. Let me tell you this was really eye opening for me. And this is why you might've heard me in the first segment talking about this, but this is why I have really changed my view of this stuff, this cybersecurity stuff, because I explained. [00:33:08] If you're using things like Norton antivirus or McAfee, antivirus, or really any of them, even the built-in Microsoft defender this year, those standard antivirus system. I have only been able to catch about 30% of the malware out there, 30%, you know, that's like having a house and you've got a security guard posted out front. [00:33:39] He's armed, he's ready to fight. And yet all of your windows are open and all of your doors are unlocked. And all someone has to do is crawl in the side window because that guy that's posted up front, he's not going to be able to stop. So 30% effectiveness. And of course, Walt had all of the basic stuff. [00:33:59] He thought he was good enough. It's not worth spending time or money doing any of this. And of course it turned out to be well worth the time and money if he had done it. But he has a friend who has contacts and, and made things happen for him. So I guess he's kind of, kind of lucky in that regard, but I explained that and I said, do you know the, the way you. [00:34:21] To go. If you're a small business, it's about $997 a month for a small business, with a handful of employees to get the type of security you really need. There's going to catch. 90 something 98%. Maybe if, if things go well of the stuff going on, in other words, you don't just have an armed guard at the front door. [00:34:46] You've got all the windows closed and blocked and the doors closed and locked as well. So yeah, somebody can still get in, but they got to really want to get in and risk getting caught. So that's kind of the analogy that I used now. One of the members of my. Of my mastermind thought, well, okay. Cause you're just being Frank with me. [00:35:09] Right? We're all friends. She said, well, initially I thought, oh Craig, I'm going to have to have you help out with stuff here. Cause my, you know, I'm concerned about my security. I make some good money. Uh, she's the one that has employee. She has a million dollar plus a year business and she wants to keep it safe. [00:35:26] But then she. Uh, you know, but, but you know, you were talking about all of this Norton and stuff and that it doesn't work. So I, I just, I don't have any hope. And that's when the another member jumped in and this other member said, well, Uh, oh, that's not what I got at all. I got the, the normal off the shelf stuff that you buy that you're going to get from Amazon, or you're going to get from PC connection or wherever that stuff is not going to work, but there is stuff that does, but it's only professional stuff. [00:36:02] You can only get it from professionals that are trained in certified. Which is the right message. Right. That was the message I was trying to relay. Yeah. Don't try and do it yourself because you can't even get the right tools that you need. That is frankly a problem. So that really got me to think. In, in a very big way, because here are two people that have heard me talk about cybersecurity and their eyes probably glazed over, but now their eyes, I know at least one of these ladies definitely glazed over. [00:36:36] So I've come to the realization that sometimes I. A little too deep into things. And although I can explain it quite well to many people, sometimes people glaze over and I get emails from you guys saying kind of the same thing. I really appreciate it. I don't understand a lot of what you're saying, Craig, but thanks for being there. [00:36:59] Listen to you every week here on the radio. Uh, then that's good. That's reassuring, but now I've come to realize a few things. One is. The I've got to be a lot clearer in my messaging, because even when talking to my friends, it is a little bit overwhelming for them sometimes. Right. And then the next thing is everybody needs help because you're being lied to. [00:37:29] Right. How are people getting ransomware? If the stuff that they're buying work. Maybe it's just me, but I think there's a disconnect there. So a lot of you guys have gone out and you've hired people and I want to spend just a few minutes right now, going through some red flags that you need to be looking out for in vendor security assessment. [00:37:56] Now I'm putting one together. As well, right yet another one. Uh, and what I'm trying to do is help you out, right? This is not as sales tool. It is trying to help you figure out where you're at. I'm putting together a webinar that I'm going to be holding these what I'm calling bootcamps, where I go through and show you exactly how to do the basic steps that you need to do in order to be safe on. [00:38:25] Okay. If an online, all that means is your, is plugged in, right. Okay. It doesn't mean you're going out and doing a lot of stuff out there on the internet just means it's connected. So those are going to be coming out. I will send an email out as soon as all of that. Stuff's ready. Cause. Absolutely free. And these assessments, I have the basic one that you can do yourself. [00:38:47] It's a self-assessment. And then I have the more advanced ones that I do that are five grand. Okay. So you've got to be a decent sized business for this to make sense where we look for all of the security problem. On all of your computers and your networks, and then give you a list of things you need to do and how to do them. [00:39:10] Okay. So it's well worth it for them, but if you're a very small company and you're trying to do some of this yourself, I want to help you. So that's what these boot camps are going to be all over. And also what the scorecard is going to be all about. So that's coming up, but here are some good red flags and an assessment. [00:39:30] I found this again on dark reading. This is kind of an insider website for those of us in the cybersecurity business, but, um, How can you verify the information that vendors are giving you about their own cybersecurity posture? We've heard in the news and I've talked about them all year, this year, and for years past. [00:39:56] That are we're vendors can be our worst nightmare because some of these hacks come in through our vendors. So you've got yourself, a cybersecurity company. How do you know if they are really telling you the truth? And man, is that hard for you to know? Right. You're going to ask him questions and the salesmen are going to say, oh yeah, yeah, yeah. [00:40:21] That's why we don't have salesmen. Right. We have engineers. You talk to me, you might talk to my son or my daughter, people who have been doing this with me, who I have trained and helped out. So this guy who wrote the article and there's this on attributed, I don't see an attribution on here on this page. [00:40:41] I definitely want to give him, probably I heard is John Babinec wrote this thing and he is a principle threat hunters. What he calls himself over at net and rich. So he says, here's what you got to do. And if you're trying to be cost-effective, he puts it in. What I call an ed month clause. And one of these days I'll tell you that story, but he calls it a validity check question so that an honest vendor would tell you, no, they don't do X and give you a good reason why they don't like it's not cost effective. [00:41:17] It's outside of a reasonable risk model. Does that make sense to you? So when you're trying to evaluate a vendor, who's going to be doing your cyber security put in one of these validity checks put in one of these questions. It doesn't really matter to you, but it's something that would be very hard for one of these cybersecurity companies to do. [00:41:42] And maybe it doesn't fit the risk model that you have. I think it's just absolutely brilliant. Probably one of the better ways when you're trying to evaluate an MSSP as cybersecurity managed or otherwise provider stick in something like that. So you have a red flag that just stands out for you. All right. [00:42:04] Make sure you are registered online. Craig Peter sohn.com/subscribe. So you can find out about all of these trainings coming up. [00:42:17] If you've never heard of the Carrington event, I really hope, frankly, I really, really do hope we never have to live through one of these. Again, there is a warning out there right now about an internet apocalypse that could happen because of the Sun. [00:42:34] Solar storms are something that happens really kind of all of the time. The sun goes through solar cycles. About every seven years, there are longer cycles as well. You might know. I have an advanced class amateur radio license I've had for a long time, and we rely a lot when we're dealing with short wave on the solar cycle. [00:42:59] You see what happens is that the sun charges, the atmosphere. You see that if you've ever seen the Northern light, that is. Part of the Sunzi missions, hitting our magnetic field and kind of getting sucked into the core of the earth, if you will, as they get caught in that field. And the more charged the atmosphere is, the more bounce you get. [00:43:24] That's what we call it bounce. And the reason us hams have all these different frequencies to use is because of the battle. We can go different frequencies with different distances, I should say, using different frequencies. So think about it right now. You've got the earth and I want to talk from Boston to Chicago. [00:43:47] For instance, I know about how many miles it is, and I have to figure out in the ionosphere up in the higher levels of the atmosphere, what frequency. To use in order to go up into the atmosphere, bounce back, and then hit Chicago. That's the idea. It's not quite as simple or as complex in some ways, as it sounds, a lot of people just try different frequencies and a lot of hams just sit there, waiting for anybody anywhere to talk to, particularly if they are. [00:44:20] It's really quite fun. Now what we're worried about, isn't so much just the regular solar activity. We get worried when the sun spots increase. Now, the solar cycle is what has primary image. On the temperature on earth. So no matter what, you might've heard that isn't your gas, guzzling car or a diesel truck that causes the Earth's temperature to change. [00:44:49] Remember the only constant when it comes to the Earth's temperature has been changed over the millions of years. We had periods where the earth was much warmer than it is now had more common that carbon dioxide in the atmosphere than it does now had less. In fact, right now we are at one of the lowest levels of carbon dioxide in the atmosphere in earth, long, long. [00:45:15] So the sun, if you might remember, comes up in the morning, warms things up, right? And then it cools down. When the sun disappears at nighttime, it has a huge impact. It's almost exclusively the impact for our temperatures. If there's other things too, for instance, eruption can spew all to hold a lot of carbon dioxide. [00:45:40] In fact, just one, just Mount St. Helens wanted erupted, put more carbon dioxide into the atmosphere than man has throughout our entire existence. Just to give you an idea, right? So these alarms that are out there, uh, you know, come on, people. Really, and now we're seeing that in, uh, this last year we had a 30% increase in the ice cap up in the, in, up in the north, up in Northern Canada, around the polls. [00:46:12] Uh, we also had some of these glaciers growing. It was so funny. I saw an article this year, or excuse me, this week that was showing a sign that was at one of our national parks. And it said this glacier will have disappeared by 2020. Of course it hasn't disappeared. In fact, it has grown now and it's past 2020. [00:46:34] Anyhow, the sun has a huge impact on us in so many ways. And one of the ways is. Well, something called a coronal mass ejection. This is seriously charged particles. That tend to be very, very directional. So when, when it happens, when there's one of these CMS coronal, mass ejections, it's not just sending it out all the way around the sun everywhere. [00:47:02] It's really rather concentrated in one. One particular spot. Now we just missed one not too long ago. And let me see if I can find it here. Just mast, a cm E near miss. Here we go. There a solar super storm in July, 2012, and it was a very, very close shave that we had most newspapers didn't mention it, but this could have been. [00:47:33] AB absolutely incredible. We'd be picking up the pieces for the next 50 years. Yeah. Five, zero years from this one particular storm. And what happens is these, these solar flares, if you will, are very, very extreme, they CME. You're talking about x-rays extreme UV, ultraviolet radiation, reaching the earth at the speed of light ionizes, the upper layers of atmosphere. [00:48:02] When that happens, by the way, it hurts our communications, but it can also have these massive effects where it burns out saddle. And then causes radio blackouts, GPS, navigation problems. Think about what happened up in Quebec. So let me just look at this call back, uh, hit with an E and yeah, here we go. And March 13th, 1989. [00:48:33] Here we go. Here's another one. Now I remembered. And this is where Quill back got nailed. I'm looking at a picture here, which is, uh, looking at the United States and Canada from the sky and where the light is. And you can see Quebec is just completely black, but they have this massive electrical blackout and it's becomes. [00:48:57] Of this solar storm. Now they, these storms that I said are quite directional, depending on where it hits and when it hits things can get very, very bad. This particular storm back in 1989 was so strong. We got to see their Rora Borealis, the Northern lights as far south, as Florida and cue. Isn't that something, when we go back further in time to this Carrington event that I mentioned, you could see the Northern lights at the equals. [00:49:35] Absolutely amazing. Now the problem with all of this is we've never really had an internet up online. Like we have today when we had one of the storms hit. And guess what we're about to go into right now, we're going into an area or a time where the sun's going to be more active, certainly on this, this 11 year cycle and possibly another bigger cycle too, that we don't really know much about. [00:50:07] But when this hit us back in the 1850s, what we saw was a, uh, a. Telegraph system that was brought to its knees. Our telegraphs were burned out. Some of the Telegraph buildings were lit. They caught on fire because of the charges coming in, people who were working the telegraphs, who are near them at the time, got electric shocks or worse than that. [00:50:34] Okay. 1859 massive Carrington event compass needles were swinging wildly. The Aurora Borealis was visible in Columbia. It's just amazing. So that was a severe storm. A moderate severity storm was the one that hit in Quebec here, knocked out Quebec, uh, electric. Nine hour blackout on Northeast Canada. What we think would happen if we had another Carrington event, something that happened to 150 years ago is that we would lose power on a massive scale. [00:51:13] So that's one thing that would happen. And these massive transformers that would likely get burned out are only made in China and they're made on demand. Nobody has an inventory. So it would be at least six months before most of the country would get power back. Can you believe that that would be just terrible and we would also lose internet connectivity. [00:51:39] In fact, the thinking that we could lose internet connectivity with something much less than a severe storm, maybe if the Quebec power grid solar, a massive objection here. Maybe if that had happened, when. The internet was up. They might have burned out internet in the area and maybe further. So what we're worried about is if it hits us, we're going to lose power. [00:52:07] We're going to lose transformers on the transmission lines and other places we're going to lose satellites and that's going to affect our GPS communication. We're going to lose radio communication, and even the undersea cables, even though they're now no longer. Regular copper cables. It's now being carried of course, by light in pieces of glass. [00:52:32] The, those cables need to have repeaters about every 15 miles or so under underwater. So the power is provided by. Copper cables or maybe some other sort of power. So these undersea cables, they're only grounded at extensive intervals, like hundreds or thousands of kilometers apart. So there's going to be a lot of vulnerable components. [00:52:59] This is all a major problem. We don't know when the next massive. Solar storm is going to happen. These coronal mass ejections. We do know they do happen from time to time. And we do know it's the luck of the draw and we are starting to enter another solar cycle. So be prepared, everything. Of course, you're listening to Craig Peterson, cybersecurity strategist. [00:53:28] If you'd like to find out more and what you can do, just visit Craig peterson.com and subscribe to my weekly show notes. [00:53:39] Google's got a new admission and Forbes magazine has an article by Zach Dorfman about it. And he's saying you should delete Google Chrome now after Google's newest tracking admission. So here we go. [00:53:55] Google's web browser. Right? It's been the thing for people to use Google Chrome for many years, it's been the fastest. Yeah, not always people kind of leapfrog it every once in a while, but it has become quite a standard. Initially Microsoft is trying to be the standard with their terrible browser and yeah, I to Exploder, which was really, really bad and they have finally completely and totally shot it in the head. [00:54:29] Good move there on their part. In fact, they even got rid of their own browser, Microsoft edge. They shot that one in. They had to, I know I can hear you right now saying, oh, Craig, I don't know. I just use edge browser earlier today. Yeah. But guess what? It isn't edge browser. It's actually Google Chrome. The Microsoft has rebranded. [00:54:52] You see the guts to Google Chrome are available as what's called an open source project. It's called chromium. And that allows you to take it and then build whatever you want on top of. No, that's really great. And by the way, Apple's web kit, Kat is another thing that many people build browsers on top of and is part of many of these browsers we're talking about right now, the biggest problem with the Google Chrome. [00:55:22] Is they released it so they could track you, how does Google make its money? Well, it makes us money through selling advertising primarily. And how does it sell advertising if it doesn't know much or anything about you? So they came out with the Google Chrome browser is kind of a standard browser, which is a great. [00:55:43] Because Microsoft, of course, is very well known for not bothering to follow standards and say what they have is the actual standard and ignoring everybody else. Yeah. Yeah. I'm picking on Microsoft. They definitely deserve it. Well, there is what is being called here in Forbes magazine, a shocking new tracking admission from. [00:56:05] One that has not yet made headlines. And there are about what 2.6 billion users of Google's Chrome worldwide. And this is probably going to surprise you and it's frankly, Pretty nasty and it's, I think a genuine reason to stop using it. Now, as you probably know, I have stopped using Chrome almost entirely. [00:56:31] I use it when I have to train people on Chrome. I use it when I'm testing software. There's a number of times I use it, but I don't use. The reality is the Chrome is an absolute terror. When it comes to privacy and security, it has fallen way behind its rivals in doing that. If you have an iPhone or an iPad or a Mac, and you're using safari, apple has gone a long ways to help secure your. [00:57:09] Well, that's not true with Chrome. In fact, it's not protecting you from tracking and Dave up data harvesting. And what Google has done is they've said, okay, well, we're going to get these nasty third party cookies out of the whole equation. We're not going to do that anymore. And what they were planning on doing is instead of knowing everything specifically. [00:57:34] You they'd be able to put you in a bucket. So they'd say, okay, well you are a 40 year old female and you are like driving fast cars and you have some kids with a grandkid on the way, and you like dogs, not cats, right? So that's a bucket of people that may be a few hundred or maybe up to a thousand. As opposed to right now where they can tell everything about you. [00:58:04] And so they were selling that as a real advantage because they're not tracking you individually anymore. No, we're putting you in a bucket. Well, it's the same thing. Right. And in fact, it's easier for Google to put you in a bucket then to track everything about you and try and make assumptions. And it's easier for people who are trying to buy ads to place in front of you. [00:58:28] It's easier for them to not have to kind of reverse engineer all of the data the Google has gathered in instead of. To send this ad to people that are in this bucket and then that bucket. Okay. It makes sense to you, but I, as it turns out here, Google has even postponed of that. All right. They really have, they're the Google's kind of hiding. [00:58:54] It's really what's going on out there. Uh, they are trying to figure out what they should do, why they should do it, how they should do it, but it's, it's going to be a problem. This is a bad habit. The Google has to break and just like any, anybody that's been addicted to something it's going to take a long time. [00:59:16] They're going to go through some serious jitters. So Firefox is one of the alternatives and to Google Chrome. And it's actually a very good one. It is a browser that I use. I don't agree with some of the stuff that Mozilla and Firefox does, but again, right. Nobody agrees on everything. Here's a quote from them. [00:59:38] Ubiquitous surveillance harms individually. And society Chrome is the only major browser that does not offer meaningful protection against cross cross site tracking and Chrome will continue to leave users unprotected. And then it goes on here because. Uh, Google response to that. And they admit that this massive web tracking out of hand and it's resulted in, this is a quote from Google and erosion of trust, where 72% of people feel that almost all of what they do online is being. [01:00:19] By advertisers, technology firms or others, 81% say the potential risks from data collection outweigh the benefit by the way, the people are wrong. 72% that feel almost all of what they do on online is being tracked. No, no. The answer is 100% of what you do is probably being tracked in some way online. [01:00:41] Even these VPN servers and systems that say that they don't do log. Do track you take a look at proton mail just last week. Proton mail it's in Switzerland. Their servers are in Switzerland. A whole claim to fame is, Hey, it's all encrypted. We keep it safe. We don't do logging. We don't do tracking, uh, guess what they handed over the IP addresses of some of the users to a foreign government. [01:01:10] So how can you do that? If you're not logging, if you're not tracking. Yeah, right. They are. And the same thing is true for every paid VPN service I can think of. Right. So how can Google openly admit that their tracking is in place tracking everything they can, and also admit that it's undermining our privacy and. [01:01:38] Their flagship browser is totally into it. Right? Well, it's really, it's gotta be the money. And Google does not have a plan B this anonymized tracking thing that they've been talking about, you know, the buckets that I mentioned, isn't realistic, frankly. Uh, Google's privacy sandbox is supposed to Fitbit fix it. [01:02:00] I should say. The, the whole idea and the way it's being implemented and the way they've talked about it, the advertisers on happy. So Google's not happy. The users are unhappy. So there you go. That's the bottom line here from the Forbes article by Zach Dorfman, delete Google Chrome. And I said that for a long time, I do use some others. [01:02:27] I do use Firefox and I use. Which is a fast web browser, that some pretty good shape. Hey, if you sign up for my show's weekly newsletter, not only will you get all of my weekly tips that I send to the radio hosts, but you will get some of my special reports that go into detail on things like which browser you shouldn't be using. [01:02:52] Sign up right now. Craig peterson.com. [01:02:57] Many businesses have gone to the cloud, but the cloud is just another word for someone else's computer. And many of the benefits of the cloud just haven't materialized. A lot of businesses have pulled back and are building data centers again. [01:03:14] The reason I mentioned this thing about Microsoft again, and the cloud is Microsoft has a cloud offering. [01:03:23] It's called Microsoft Azure. Many people, many businesses use it. We have used it with some of our clients in the past. Now we have some special software that sits in front of it that helps to secure. And we do the same thing for Amazon web services. I think it's important to do that. And we also use IBM's cloud services, but Microsoft is been pitching for a long time. [01:03:51] Come use our cloud services and we're expecting here probably within the next month, a big announcement from Microsoft. They're planning on making it so that you can have your desktop reside in Microsoft's cloud, in the Azure cloud. And they're selling really the feature of it doesn't matter where you are. [01:04:17] You have your desktop and it doesn't matter what kind of computer you're on. As long as you can connect to your desktop, using some just reasonable software, you will be able to be just like you're in front of a computer. So if you have a Chromebook or a Mac, Or a windows or tablet, whatever, and you're at the grocery store or the coffee shop or the office, you'll be able to get it, everything, all of your programs, all your files. [01:04:47] And we, Microsoft will keep the operating system up to date for you automatically a lot of great selling points. And we're actually looking into that. Not too heavily yet. We'll give them a year before we really delve into it at all. Cause it takes them a while to get things right. And Microsoft has always been one that adds all kinds of features, but most of the time, most of them don't work and we can, we can document that pretty easily, even in things like Microsoft. [01:05:18] Well, the verge is now reporting that Microsoft has warned users of its as your cloud computing service, that their data has been exposed online for the last two years. Yeah, let me repeat that in case you missed it, you, uh, yeah. I'm I'm I might've misspoken. Right. Uh, let me see, what does it say? It says, um, users of Azure cloud competing service. [01:05:48] So that's their cloud. Microsoft's big cloud. Okay. Um, their data has been. Exposed online. Okay. So that means that people could get the data, maybe manipulate the data that sort of exposed means for the last two years. Are you kidding me? Microsoft is again, the verge. Microsoft recently revealed that an error in its Azure cosmos database product left more than 3,300 as your customers data. [01:06:24] Completely exposed. Okay guys. So this, this, this is not a big thing, right? It can't possibly be big thing because you know who uses Azure, right. Nobody uses a zer and nobody uses hosted databases. Come on, give me a break. Let me see, what else does this have to say? Oh, okay. It says that the vulnerability was reported, reportedly introduced into Microsoft systems in 2019, when the company added a data visualization feature called Jupiter notebook to cosmos DB. [01:06:59] Okay. Well, I'm actually familiar with that one and let's see what small companies let's see here. Um, some Azure cosmos DB clients include Coca Cola. Liberty mutual insurance, Exxon mobile Walgreens. Hmm. Let me see. Could any of these people like maybe, maybe Liberty mutual insurance and Walgreens, maybe they'd have information about us, right. [01:07:26] About our health and social security numbers and account numbers and credit cards. Names addresses. Right, right. That's again, why I got so upset when these places absolutely insist on taking my social security number, right? It, it, first of all, when it was put in place, the federal government guaranteed, it would never be used for anything other than social security. [01:07:53] And the law even said it could not be used for anything other than social security. And then the government started expanding it. Right. And the IRS started using it. To track all of our income and you know, that's one thing right there, the government computers, they gotta be secure. Right. All of these breaches we hear about that. [01:08:12] Can't be true. Uh, so how about when the insurance company wants your personal information? Like your social security number? What business is it of? There's really no. Why do they have to have my social security number? It's a social security number. It's not some number that's tattooed on my forehead. [01:08:36] That's being used to track me. Is it this isn't a socialist country like China is, or the Soviet union was right. It's not socially. So why are they tracking us like that? Walgreens? Why do they need some of that information? Why does the doctor that you go to that made the prescription for Walgreens? Why do they need that information? [01:09:00] And I've been all over this because they don't. Really need it. They want, it makes their life easier, but they don't really need it. However, it exposes us. Now, if you missed the email, I sent out a week ago, two weeks ago now, I guess. You missed something big because I, in my weekly newsletter went through and described exactly what you could do in order to keep your information private. [01:09:35] So in those cases where websites asking for information that they don't really need, right? You don't want to lie, but if they don't really need your real name, why you're giving them your real name? Why do you use a single email address? Why don't you have multiple addresses? Does that start make sense to you guys? [01:09:54] And now we find out that Microsoft Azure, their cloud services, where they're selling cloud services, including a database that can be used online, a big database, uh, 3,300 customers looks like some of them are actually kind of big. I don't know. ExxonMobil pretty big. Yeah. I think so. Walgreens, you think that that might be yeah, yeah, yeah, yeah. [01:10:22] Y. Why are we trusting these companies? You know it, if you have a lot of data, a lot of customers, you are going to be a major target of nation states to hack you and bat just general hackers, bad guys. But you're also, if, if you've got all this information, you've also got to have a much higher level of security than somebody that doesn't have all of that information. [01:10:52] Does that make sense too? Did I say that right? You don't need the information and, and I've got to warn anybody that's in a business, whether you're a business owner or you're an employee, do not keep more data than you need the new absolutely need to run your company. And that includes data about your customers. [01:11:16] And maybe, maybe it's even more specifically data about your customer. Because what can happen is that data can be stolen and we just found. That? Yes, indeed. It could have been, it was exposed Microsoft the same. We don't know how much it was stolen. If anything was stolen. Um, yeah, Walgreens. Hey, I wonder if anyone's going to try and get some pain pills illegally through, uh, this database hack or a vulnerability anyways. [01:11:47] All right, everyone. Stick around. We'll be back. Of course, you listening to Craig Peterson. I am a cybersecurity strategist for business, and I'm here to help you as well. You can ask any question any time, uh, consumers are the people I help the most, you know, I wish I got a dime for every time I answered a question. [01:12:09] Just email me@craigpeterson.com me@craigpeterson.com and stick around. [01:12:18] Whether or not, you agree with the lockdown orders that were put in place over this COVID pandemic that we had. Uh, there are some other parts of the world that are doing a lot more. [01:12:34] Australia has, I don't know. I think that they went over the deep end. The much, the same thing is true right next door to them. [01:12:45] And I am looking at a report of what they are doing with this new app. Uh, you might be aware that both apple and Google came out with an application programming interface. That could be used for contract tack tracking, contact tracking. There you go. Uh, it wasn't terribly successful. Some states put some things in place. [01:13:13] Of course you get countries like China. I love the idea because heaven forbid you get people getting together to talk about a Tannen square remembrance. Now you want to know who all of those people were, who were in close proximity, right? So, you know, good for China a while, as it turns out, Australia is putting something in place they have yet another COVID lockdown. [01:13:39] They have COVID quarantine orders. Now I think if you are sick, you should stay on. I've always felt that I, you know, I had 50 employees at one point and I would say, Hey, if you're sick, just stay home. Never required a doctor's note or any of that other silliness, come on. People. If someone's sick, they're sick and let them stay home. [01:14:04] You don't want to get everybody else in the office, sick and spread things around. Right. Doesn't that just kind of make sense. Well, they now in Australia, don't trust people to stay home, to get moving. Remember China, they were, they were taking welders and we're going into apartments in anybody that tested positive. [01:14:22] They were welding them into their apartment for minimum of two weeks. And so hopefully they had food in there and they had a way to get fresh water. Australia is not going quite that far, but some of the states down under. Using facial recognition and geolocation in order to enforce quarantine orders and Canada. [01:14:47] One of the things they've been doing for very long time is if you come into the country from out of the country, even if you're a Canadian citizen, you have to quarantine and they'll send people by your house or you have to pay to stay for 10 days in a quarantine hope. So you're paying the course now inflated prices for the hotel, because they're a special quarantine hotel. [01:15:14] You have to pay inflated prices to have food delivered outside your door. And that you're stuck there for the 10 days, or if you're at home though, they, you know, you're stuck there and they'll send people by to check up on you. They'll make phone calls to check up on you and. They have pretty hefty find. [01:15:36] Well, what Australia has decided to do is in Australia is Charlene's even going from one state to another state are required to prove that they're obeying a 14 day quarantine. And what they have to do is have this little app on their phone and they, the app will ping them saying, prove it. And then they have to take a photo of themselves with geo location tag on it and send it up via the app to prove their location. [01:16:15] And they have to do all of that within 15 minutes of getting the notification. Now the premier of the state of south Australia, Steven Marshall said we don't tell them how often or when on a random basis, they have to reply within 15 minutes. And if you don't then a police, officer's going to show up at the address you're supposed to be at to conduct an in-person check. [01:16:43] Very very intrusive. Okay. Here's another one. This is a, an unnamed government spokesperson who was apparently speaking with Fox news quote. The home quarantine app is for a selected cohort of returning self Australians who have applied to be part of a trial. If successful, it will help safely ease the burden of travel restrictions associated with the pandemic. [01:17:10] So there you go. People nothing to worry about. It's just a trial. Uh, it will go away. Uh, just like, uh, for instance, income tax, as soon as rule, number one is over, it will be removed and it will never be more than 3% and it will only apply to the top 1% of wage-earners. So there you go. Right. And we all know that world war one isn't over yet. [01:17:34] Right. So that's why they still have it in somehow. Yeah, some of the middle class pays the most income tax. I don't know. Interesting. Interesting. So there you go. Little news from down under, we'll see if that ends up happening up here. News from China, China has, uh, China and Russia have some interesting things going on. [01:17:55] First of all, Russia is no longer saw. Country, they kind of are. They kind of aren't, they are a lot freer in many ways than we are here in the United States. Of course, China, very heavily socialist. In fact, they're so socialists, they are communist and China. And Russia both want their kids to have a very good education in science, engineering, and mathematics. [01:18:23] Not so much on history, not so much on, on politics. Right. But definitely heavy on the, on the sciences, which I can see that makes all the sense. I think everybody should be pretty heavily on the science. Well, according to the wall street journal this week, gamers under the age of 18 will not be allowed to play online games between 8:00 PM and 9:00 PM on Friday, Saturdays and Sundays. [01:1

Think Neuro
Think Neuro Mini: What is Synkinesis with Dr. Amit Kochhar

Think Neuro

Play Episode Listen Later Oct 13, 2021 1:51


Facial paralysis is devastating to one's identity. Patients with facial paralysis experience physical, social, and emotional changes. Facial synkinesis refers to abnormal regrowth of facial nerve fibers, which may result in involuntary (unwanted) contraction of certain muscles during other intended facial movements. At PNI, our specialists treat all types of facial paralysis and related conditions. For more information please visit our website: https://www.pacificneuroscienceinstitute.org/

1A
What Villains With Facial Differences Mean For People With Facial Differences

1A

Play Episode Listen Later Oct 12, 2021 32:36


In the newest James Bond movie, "No Time to Die", the main villain in the film, Safin, has scars covering his face. This has been the case for many past Bond villains. But the trope isn't just limited to the Bond films. In Disney's "Black Widow," the main villain is revealed to have facial scarring covering her face. The same is true of the villain in "Wonder Woman," and even "The Lion King".People with facial differences are speaking up about the harmful impact of being vilified on screen.Changing Faces is an organization in the U.K. pushing the film industry to change the way it represents facial differences on-screen through the campaign "I Am Not Your Villain."Why does the trope persist? And what does it mean for people with facial differences?Want to support 1A? Give to your local public radio station and subscribe to this podcast. Have questions? Find us on Twitter @1A.

Receta Del Exito
570: “Cómo la Comunicación Facial puede decir Todo lo que Llevas por Dentro” con Renata Roa

Receta Del Exito

Play Episode Listen Later Oct 11, 2021 28:43


Renata Roa es una emprendedora apasionada por indagar y compartir todas las cosas que le funcionan. Tiene una habilidad de conectar conceptos aislados y transformarlos en algo sumamente sencillo. El emprender la llevó a entender que el rechazo no tiene que ver con la persona que seas, sino con el producto que creas, por eso las cosas no se deben tomar tan personal. Como tip de éxito nos menciona que debemos aprender a conocernos, para sentirnos orgullosos de habitar esta piel. Suscribete y Visitanos en: www.RecetaDelExito.com Apple Podcast (iTunes): https://apple.co/2Igcnoh Listo para Crear tu Podcast? www.CursoDePodcastGratis.com Twitter Handle: @alexdalirizo Facebook Page: https://www.facebook.com/recetadelexito/ RDExito: http://recetadelexito.com Instagram: https://www.instagram.com/alexdalirizo/ Stitcher: https://www.stitcher.com/s?fid=508313&refid=stpr Spotify: https://spoti.fi/3cmJqVs

Optimal Relationships Daily
1114: Facial Dingleberries: A Lesson in Receiving by Kat Medina on How To Connect with Others while Traveling

Optimal Relationships Daily

Play Episode Listen Later Oct 11, 2021 10:44


Kat Medina shares a lesson in receiving. Episode 1114: Facial Dingleberries: A Lesson in Receiving by Kat Medina on How To Connect with Others while Traveling As a child, Kat Medina wanted to be MacGyver when she grew up. Now, as the founder and Creative Director of a Silicon Valley startup, she's become a well-traveled bookworm who finds creative solutions to entrepreneurial challenges with the resourcefulness of a figurative shoelace, paperclip, and bubblegum. Her forthcoming book, The Joys of Jet Lag, explores the most valuable lessons she's learned during the process and shares the keys to creating a life of adventure through an openhearted approach to living. These insights, when embodied and applied, have the potential to transform the ordinary to the extraordinary and craft unbridled joy and fulfillment, no matter where you are. The original post is located here: https://www.katmedina.com/article?id=myanmarmeal Visit Me Online at OLDPodcast.com  Interested in advertising on the show? Visit https://www.advertisecast.com/OptimalRelationshipsDailyMarriageParenting Learn more about your ad choices. Visit megaphone.fm/adchoices

Es la Mañana de Federico
Belleza: Remodelación del óvalo facial

Es la Mañana de Federico

Play Episode Listen Later Oct 7, 2021 25:58


Federico y Teresa de la Cierva hablan con el presidente de la Asociación Española de Cirugía Estética y Plástica, Francisco Gómez Bravo.

El podcast de Cristina Mitre
Rejuvenecimiento de la mirada, con el Dr. Castellar y la Dra. Hernández. Episodio 171

El podcast de Cristina Mitre

Play Episode Listen Later Sep 29, 2021 50:35


Esta semana hablamos del rejuvenecimiento de la mirada y de toda la zona que rodea a los ojos, dentro de la serie especial sobre medicina estética en colaboración con Teoxane. Para ello he contado con el Dr. Johny Javier Castellar, especialista en blefaroplastias y Medicina Estética Facial, y la Dra. Candy Hernández, especialista en Medicina Estética. Ambos nos van a explicar por qué la zona de los ojos protagoniza tantas consultas de medicina estética y qué tratamientos son los más demandados por los pacientes.Descubriremos qué problemas de la zona de los ojos se resuelven con medicina estética y cuándo necesitaríamos ver a un cirujano. Por supuesto, los doctores nos explican cómo se realiza cada tratamiento, cuándo se ven los efectos, cuánto tiempo duran, contraindicaciones o posibles efectos adeversos. Un repaso completo a los ojos y todos los tratamientos que tenemos a nuestro alcance.Recuerda que las notas de este episodio están, como siempre, en el post que acompaña a este audio y que puedes encontrar en mi blog www.thebeautymail.es

Instagram @thebeautymail
Twitter @cristinamitre
YouTube https://www.youtube.com/c/CristinaMitre
Facebook Cristina Mitre Aranda