Intentional deception made for personal gain or to damage another individual
My friend and fellow student of money codenamed "Lester" joins me for a multi-episode conversation exploring the excellent book "The Twilight of Gold" by Melchior Palyi. // GUEST // Twitter: https://twitter.com/ProgrammableTx Book: https://www.amazon.com/dp/B0006C31O4// SPONSORS // In Wolf's Clothing: https://wolfnyc.com/NetSuite: https://netsuite.com/whatismoneyiCoin Hardware Wallet (use discount code BITCOIN23): https://www.icointechnology.com/Mind Lab Pro: https://mindlabpro.com/breedloveCrowdHealth: https://www.joincrowdhealth.com/breedloveBitcoin Apparel (use discount code BREEDLOVE): https://thebitcoinclothingcompany.com/Feel Free Tonics (use discount code BREEDLOVE): https://botanictonics.comCarnivore Bar (use discount code BREEDLOVE): https://carnivorebar.com/// OUTLINE // 00:00:00 - Coming up 00:00:58 - Intro 00:02:31 - Helping Lightning Startups with In Wolf's Clothing 00:03:17 - Current Situation of the Bitcoin Market Price 00:07:30 - Decay of the System: Vietnam War and FTX Scandal 00:36:42 - Self-Preservation and Self-Deception 00:38:30 - The Oracle for Truth 00:43:54 - The Predictability of Assets 00:45:51 - Run Your Business from Anywhere with NetSuite 00:46:56 - Secure Your Bitcoin Stash with the iCoin Hardware Wallet 00:47:52 - Myth Two: Capitalism & the Great Depression 00:53:26 - Price Camouflage in 20th Century 01:00:15 - Inflation Harvests Additional Productivity 01:04:46 - Economic Theory and Observational Data 01:07:15 - Why Fractional Reserve Banking is Insolvent and Fraudulent 01:19:32 - Enhance Your Brain Power with Mind Lab Pro 01:20:39 - Take Control of Your Healthcare with CrowdHealth 01:21:41 - Increase in Total Outstanding Reserve 01:23:46 - 10 Ways to Control Total Bank Reserve 01:28:41 - Main Inflationary Factor 01:33:33 - Britain's Switch Back to Gold Standard 01:38:29 - Uncontrolled Factors and Increase in Controlled Reserves 01:42:29 - The Deflationary Period 01:44:41 - The Great Depression: Why and How 01:46:35 - Bad Outcomes of Central Planning 01:50:45 - Missing the Perspective of Consequences// PODCAST // Podcast Website: https://whatismoneypodcast.com/Apple Podcast: https://podcasts.apple.com/us/podcast/the-what-is-money-show/id1541404400Spotify: https://open.spotify.com/show/25LPvm8EewBGyfQQ1abIsE?RSS Feed: https://feeds.simplecast.com/MLdpYXYI// SUPPORT THIS CHANNEL // Bitcoin: 3D1gfxKZKMtfWaD1bkwiR6JsDzu6e9bZQ7 Sats via Strike: https://strike.me/breedlove22Sats via Tippin.me: https://tippin.me/@Breedlove22Dollars via Paypal: https://www.paypal.com/paypalme/RBreedlove// WRITTEN WORK // Medium: https://breedlove22.medium.com/Substack: https://breedlove22.substack.com/// SOCIAL // Breedlove Twitter: https://twitter.com/Breedlove22WiM? Twitter: https://twitter.com/WhatisMoneyShowLinkedIn: https://www.linkedin.com/in/breedlove22Instagram: https://www.instagram.com/breedlove_22TikTok: https://www.tiktok.com/@breedlove22All My Current Work: https://vida.page/breedlove22
24 November 2023 12PM ET - Joe Oltmann Live with Ivan Raiklin - Capitol Police, J6 Footage - Enough with the Ops, Work the Problem - Ireland On Fire: Follow us on Social Media: https://libertylinks.io/ConservativeDaily https://libertylinks.io/JoeOltmann https://libertylinks.io/Apollo Message to Congress - Trump 2024! Election Integrity MATTERS - Ban The Machines, They are Fraudulent! - https://conservative-daily.com/election/trump-2024-election-integrity-matters-ban-the-machines-they-are-fraudulent
On Monday evening, Ken Paxton, the Attorney General, declared an investigation into potential fraudulent activities within Media Matters. This follows a recent controversy sparked by an exposé from the media monitoring group. This led to an exodus of advertisor partnerships from X, a prominent social media platform previously known as Twitter. Prior to this announcement, Elon Musk, X's Chief Executive Officer had filed a lawsuit against Media Matters, bearing the banner of the Northern District Court of Texas. The lawsuit asserted Media Matters' deliberate distortion of information with the intent of tarnishing the social media giant's standing. Paxton disclosed that his office would probe the accusations made against Media Matters in order to ascertain if the group had contravened Texas consumer protection laws guarding against fraudulent conduct. The lawsuit was initiated by two of Paxton's former associates, namely Judd Stone, the ex-Solicitor General, and Christopher Hilton, once serving as Assistant Attorney General. The pair parted ways with the Texas Attorney General's Office in the wake of successfully advocating for their previous superior in the midst of Paxton's impeachment trial.See omnystudio.com/listener for privacy information.
In this episode I'm sharing the story of a pair of print on demand sellers that decided to file over 117,000+ fake DMCA complaints to get their competition removed from Google search results (It also sounds like they were selling infringing designs) This story is CRAZY!
1 Wine is a mocker and beer is a brawler. Whoever is led astray by them is not wise. 2 The terror of a king is like the roaring of a lion. He who provokes him to anger forfeits his own life. 3 It is an honor for a man to keep aloof from strife, but every fool will be quarreling. 4 The sluggard will not plow by reason of the winter; therefore he shall beg in harvest, and have nothing. 5 Counsel in the heart of man is like deep water, but a man of understanding will draw it out. 6 Many men claim to be men of unfailing love, but who can find a faithful man? 7 A righteous man walks in integrity. Blessed are his children after him. 8 A king who sits on the throne of judgment scatters away all evil with his eyes. 9 Who can say, "I have made my heart pure. I am clean and without sin?" 10 Differing weights and differing measures, both of them alike are an abomination to Yahweh. 11 Even a child makes himself known by his doings, whether his work is pure, and whether it is right. 12 The hearing ear, and the seeing eye, Yahweh has made even both of them. 13 Don't love sleep, lest you come to poverty. Open your eyes, and you shall be satisfied with bread. 14 "It's no good, it's no good," says the buyer; but when he is gone his way, then he boasts. 15 There is gold and abundance of rubies, but the lips of knowledge are a rare jewel. 16 Take the garment of one who puts up collateral for a stranger; and hold him in pledge for a wayward woman. 17 Fraudulent food is sweet to a man, but afterwards his mouth is filled with gravel. 18 Plans are established by advice; by wise guidance you wage war! 19 He who goes about as a tale-bearer reveals secrets; therefore don't keep company with him who opens wide his lips. 20 Whoever curses his father or his mother, his lamp shall be put out in blackness of darkness. 21 An inheritance quickly gained at the beginning won't be blessed in the end. 22 Don't say, "I will pay back evil." Wait for Yahweh, and he will save you. 23 Yahweh detests differing weights, and dishonest scales are not pleasing. 24 A man's steps are from Yahweh; how then can man understand his way? 25 It is a snare to a man to make a rash dedication, then later to consider his vows. 26 A wise king winnows out the wicked, and drives the threshing wheel over them. 27 The spirit of man is Yahweh's lamp, searching all his innermost parts. 28 Love and faithfulness keep the king safe. His throne is sustained by love. 29 The glory of young men is their strength. The splendor of old men is their gray hair. 30 Wounding blows cleanse away evil, and beatings purge the innermost parts. Listen Donate Subscribe: Proverbs Daily Podcast Psalms Daily Podcast
957 the Game NFL insider and NFL Network analyst, Brian Baldinger joins the program to discuss the 49ers' addition of Chase Young, the team's matchup in Jacksonville, and Brock Purdy's mistakes.
The guys break down the week 10 CFB slate. Oklahoma, USC, Notre Dame, Air Force, LSU, and UCLA all lost this week. We break down every game and what it means for each team going forward. Thank you for the support and remember to check out Chad's Pizza!
There are no new heresies - just wrong teaching recycled in repackaged ways for new audiences. In this sermon, Pastor Jesse unpacks Col. 2-18-19, teaching us about several aspects of the Colossian heresy and the danger the heresy presented to the Colossian believers through its promotion of false humility, false worship, visions, arrogance, and lack of focus on Christ. Discover ways in which these false teachings are still around today, just in different forms, and why you need to be on guard against them in your own life.
Listen to The IIA's new Fraud Podcast brought to you by All Things Internal Audit. The Fraud Podcast provides fictionalized accounts of real-world frauds featured in Internal Auditor magazine's Fraud department. When her commission structure is changed, an advertising sales manager finds a way to make up for the lost income. Listen to “Sailing the Tradewinds to Fraud.” IIA members can access bonus content in the form of lessons learned by reading the full Fraud article in the October 2021 digital edition of Internal Auditor magazine.
The boys are back to talk about Brents trip to the west coast, week 7 of the NFL season, this weeks picks for the biggest frauds in football, over paying and over rating quarterbacks, our additions to the infamous list, the problems with the Edmonton Oilers, Leon Draisitl's post game interview Saturday, Connor Mcdavid's recent injury, a round of over, under or properly rated and a whole lot more. Sit back, grab a few beers and let's get into ‘er Learn more about your ad choices. Visit megaphone.fm/adchoices
Commercial aviation is considered one of the safest means of transportation because of its strict regulatory bodies and practices. But what happens when one of the most crucial elements of airplane safety, the parts, is self-regulated? This week, Matt and Carolanne discuss how an entrepreneur named Zamora was able to sell fraudulent airplane parts to major US carriers for five years before being caught. Our LinkTree: linktr.ee/boozedandconfused This week's booze of choice: Some white wine, who knows Sources https://www.bloomberg.com/news/features/2023-10-11/fake-parts-found-on-boeing-airbus-jets-plague-airlines
On this episode of Talking Buffalo, Patrick Moran is joined by Tone Pucks for his weekly visit to discuss the Buffalo Bills utterly inexcusable loss to the previously lifeless New England Patriots that has everyone rightfully questioning if the Bills are becoming frauds. The guys talk about the offense essentially sleepwalking through an entire first half for a third straight week, a defense that folded like a tent at the end of the game, sloppy tackling and injuries that are feeling like they're too much to overcome. They also talk about the Sabres winning two of their last three over the past week and generally thoughts on the team as things stand. Follow Tone Pucks on Twitter @TonePucksRedux ♦♦♦♦♦ Follow Patrick Moran/Talking Buffalo Podcast Substack: Patrick Moran's Substack Twitter: @PatMoranTweets. Facebook: Talking Buffalo Podcast YouTube: Talking Buffalo Podcast YouTube Channel Learn more about your ad choices. Visit podcastchoices.com/adchoices
Support Fighting for the Faith Join Our Crew: http://www.piratechristian.com/join-o... Patreon: https://www.patreon.com/PirateChristian Merchandise: https://www.moteefe.com/store/pirate-... Fighting for the Faith Radio Program: http://fightingforthefaith.com Social Media Facebook: https://www.facebook.com/piratechristian Twitter: https://twitter.com/piratechristian Instagram: https://www.instagram.com/piratechris... Video Sermons / @kongsvingerlutheran670 Sermons http://www.kongsvingerchurch.org/sermons Sunday Schools http://www.kongsvingerchurch.org/bibl... Bible Software Used in this Video: https://www.accordancebible.com Video Editing Software: https://adobe.ly/2W9lyNa Video Recording Software: https://www.ecamm.com
Hello, I'm Mark Bassingthwaighte, the risk manager here at ALPS, and welcome to another episode of ALPS In Brief, the podcast that comes to you from the historic Florence building in beautiful downtown Missoula, Montana. Okay, today it's just me, and we're going to talk about managing cyber crime risks and really looking at the whys behind what it does in terms of obtaining cyber liability insurance. And I really want to dig into this a little deeper. I still get a lot of questions about insurance, what it does, what it doesn't do, and is it necessary, and the list goes on and on and on. So let's hit that topic. Before we jump into some of the specifics of using insurance to manage your risk, I want to set the stage again, I always start my cyber programs with some information. Let's look at headlines from 2022. In 2022, 255 million phishing attacks occurred in just six months. Now this is a report done by SlashNext, and they analyzed billions of link based URLs, attachments, natural language messages in email, mobile, and browser channels over six months and that's what they found. And that's a 61% increase in phishing attacks compared to 2021. That's pretty significant. They also recorded a 50% increase in attacks on mobile devices. And I really ask that you pay attention and try to appreciate the significance of that. Cyber criminals really are moving their attacks to mobile and personal communication channels to reach employees. The big attacks right now are scams and credential theft. They're the top of the list or the desired outcome with these mobile attacks. And a lot of this will be a phishing and smishing, using SMS text messaging as the attack avenue for a phishing attack, if you will. Smishing is combining SMS and the word phishing, so that's how you get to that. The FBI has reported that cyber criminals are tampering with QR codes in an attempt to steal victim funds. A lot of people will say, "Well, I'm not going to be that exposed to this stuff, and how frequently is this all this going on?" I got to tell you, it's getting a little crazy out there. Remember QR codes, for instance during the pandemic, particularly as things started to open back up and you go out to restaurants. And instead of handing you a menu, they'd have that little QR code, that little box that has all the dots and dashes and little squares and things in it. And you would scan that and it would take you to the menu or a webpage. Well, a lot of these can be faked. People will just create a QR code sticker and put it over. Think at a parking lot and you go to scan something to pay your bill, your parking fee, and if you're misdirected to a site that looks like the site that you would expect to pay your parking bill for the evening, but it's not, you've just turned over your account information to somebody that doesn't have your best interest in mind. We've seen it in parking tickets, creating fake parking tickets. And again, it'll have the local parking authority logo and the little yellow envelope and they stick it on your windshield. And again, ah, good lord, I got a parking ticket. They make it very convenient to scan the code. It's not real. So we got to be careful. We're even seeing QR codes being sent via email pretending to be a multifactor authentication process. And the emails may even mimic corporate logos, law firm logos, it could be anything. And people are falling prey to this. So it's just another crazy unusual attack vector that a lot of folks out there really aren't aware of. There's also a report that 79 million malicious domains were flagged in the first half of 2022. Please understand what that means. 79 million fake websites. Banks, could be anything, anything at all. And again, they're going to look very, very similar to the real thing. That's 79 million opportunities for anyone at your firm, you or any other employee or attorney practicing at your firm. It's just an opportunity for them to do something innocently, naively, but it's just getting scammed, getting taken advantage of. The final thing I'll throw at you here in 2022, the A Legal Technology Survey results reported that 27% of participating law firms reported experiencing a data breach of some kind. So I try to share all this to get your attention, because we need to always remember that IT support isn't the last line of defense. You and whoever else has access to your office network is the last line of defense. And this has consequences, and it really does. The consequences, you really need to care because as a lawyer, you are a valuable target, particularly those of you who practice in the solo and small firm space. I know a lot of lawyers don't believe that. They just think we're not going to be on anybody's radar. It's a rural practice, as an example. Well, come on, there is no such thing as rural on the internet. And you're considered in the so small firm space sort of the low hanging fruit because the cyber criminals know that you don't have typically the financial wherewithal and oftentimes the deep understanding of everything that could be done. I think the financial wherewithal piece is probably the bigger piece because you just can't throw the same kind of money that a company like Microsoft does around their cloud, protecting your data there as an example. So you're sort of viewed as the low hanging fruit. And you really need to care because I got to tell you, it's only a matter of time. Robert Mueller, if you remember, the former director of the FBI, famously said, "There are only two types of companies, those that have been hacked and those that will be hacked." But almost actually at the time he said that, that kind of statement was out of date. It really should be something more like there are only two types of companies, those that have been hacked and those that don't know they've been hacked. I mean, I'm not trying to be melodramatic about it, I'm just sharing. It's not if, it really is when. Now this presentation really isn't about all the things that you can do to prevent becoming a victim. I have lots of other materials, podcasts, CLEs, webinar, all sorts of stuff that can go there. I will share that there is a checklist, a cybersecurity checklist available, if you have any interest, on our website. Just go to the homepage and under resources, scroll down a little bit, you'll see sample forms of checklist. Check there and you'll go in and there'll be another link to checklist and the cybersecurity checklist is there, and that might be useful to you. But I do want to discuss the risk associated with not being proactive with your cybersecurity efforts. And just as an aside, this really in terms of cybersecurity, proactive efforts, that really does need to include social engineering awareness training, even if you're just a true solo and it's you. You need to stay abreast of what's happening. So I'll just throw that out there. Okay. Some of the risks your firm faces by someone, anyone at your firm, not doing their part. This really is an all hands on deck kind of situation. Well, let me just read some of the things that can go wrong in terms of the types of risk. I mean, we're sort of talking about the legal and financial risks, but there's legal liability to others, employees, clients, third parties, for loss, theft, or unauthorized disclosure of personally identifiable information. And there may be legal liability for the theft of client funds. Think wire fraud or business email compromise, being tricked and scammed into sending typically larger sums of money to the wrong bank and just a cyber criminal. Legal liability for the theft or loss of third party corporate information. Being subject to regulatory action for the failure to comply with state breach notification laws. Having to cover the costs of responding to and recovering from a breach. Damage to your reputation. Loss of revenue due to a breach. These are things to take pretty seriously. I mean, this can get crazy fairly quickly. I would encourage you to pay attention to this. The typical costs of a network breach for small businesses is currently around 200,000. And I will share the device theft, think of smartphone, jump drives, laptops, et cetera. So device theft of these mobile types of things. Wire fraud and ransomware are really common problems we see for law firms in terms of the lawyers and the firms that we insure. So as an aside, and just again keep your attention in play here, there could be a coverage problem. Think about, a lot of lawyers have fallen prey to various types of financial fraud. But let's just talk about this in the context of wire fraud, being tricked into sending money to the wrong bank because a routing number has been changed and you weren't aware that that change occurred and didn't do anything to try to catch it. And the lawyers will immediately call in and say, "This is malpractice. I got to file a claim." Well, I'm not so sure that that's the case. Theft of funds is a property loss, and malpractice actually doesn't cover property losses. So wire fraud, theft of funds, can be in many instances an uncovered loss if the only way you're trying to ensure for that is through a malpractice policy. Read your policy. This is not unique to ALPS. These policies weren't intended or designed to cover cyber crime. Now, we'll explore that a little bit more here in a bit, but generally, I mean, that's not the purpose behind it. It's really to cover you for professional negligence in the practice of law. Okay. Now, let's talk about the fallout. So let's assume, I'm not going to look at this never happens, but we'll see, that there is some type of breach. And I'm not talking about wire fraud here, I'm talking about a data breach so that someone really is in the system. What does that mean? How does this play? Well, you need to understand, we're going to start, if you will, with the response and system recovery. So someone needs to come in, typically a forensic team, IT forensic team, that typically is not your IT support. These folks typically know a great deal about how to protect you, but often don't have the skillset to do the forensic piece once there is a breach. That's a different group. So they're going to come in and they need to understand the breach, try to figure out what happened and terminate it if it's still going on. There may be programs that have encrypted your system and as you try to clean that up may still be there and that can encrypt again. So they have to terminate, try to clean up. This team is going to try to figure out the who, the what, the when, the where, the how. Really understand. Well, while all this is going on, you don't have access to your network. They need to image typically the entire network. And that's something that doesn't happen... The preserving the evidence of the crime, and it helps them evaluate and understand, and that doesn't happen in half an hour. So you're not going to have access to your systems and your data while this is going on. Now, how long can that take? It depends on the type of breach and what's going on. If it's just a lost laptop that has some passwords on it, they could probably do a remote kill and try to evaluate was that laptop and any passwords used to access the network? So that may be relatively brief. But if there is a major ransomware attack, as an example, and everything's encrypted, it could be days to even several weeks. It just depends.But we need to think through that, and how would that impact your practice? Some it may not be too bad, others, it could really be a pretty devastating event. So once all that's done, you understand, okay, man, they're starting to build the system back. Phew, we're going to get through this. It's still not over. Every jurisdiction in the United States has their own unique breach notification law and you need to comply with these. And you need to understand too what states are in play. It's not about, well, I practice here in Florida and that's it. If in your database there's information from clients and third parties, and just the list goes on and on, of people in multiple surrounding states, you may have to comply with those state breach notification laws as well. Typically, there's some cost of notifying all the people that have been impacted by this. The cost of compliance. Do you want to pay for credit monitoring? The list just goes on and on. Reputation management, et cetera. This can get expensive. So that can be managed obviously, but I want you to hear and understand, a breach can be significant. It's not just the loss of money, whether that's a ransomware payment or wire fraud, there's lots of other things that can go on. And you need to think about, there's all kinds of information in your files. There's just gobs of information out there. So again, don't minimize the consequences of a data breach. Now the good news of course, and where I said I'd go with this was, that you can manage this risk with the purchase of a cyber liability insurance policy. And of course, I would always couple that with following through on cybersecurity best practices. You don't get a reference to a lot of things in that checklist. There are other proactive things you can do, making sure that there's robust security software running on all the mobile devices at work or anything that used for work. So work from home folks, if they're using personal devices, we need to protect these things. But let's focused on this insurance piece. At the outset, I do want to share that the purchase of cyber insurance, depending on how much coverage you'd like, the type of coverage you're looking for, how big your firm is, this discussion, sort of tangential discussion on security best practices, getting back to that checklist, is important because an insurer may make it a requirement that you do certain things. You may have to have multifactor authentication in play. They're just going to be looking and asking questions about, what is your security posture? What steps have you taken? What processes are in play? Do you use out-of-band communications as an example to verify the accuracy of all wiring instructions prior to wiring funds? So there are a variety of things that can be important here. So the accuracy of the information you provide in terms of the application going through the process is going to be very, very important. You don't mislead. Don't lie. Say, "Well, I know this is what they want to hear, this is what they want us to do, and we try, but this is our intent." If post breach an insurer learns that you in fact weren't doing all that you said you were doing on the prevention front, you may have a serious, serious coverage problem. So I do want to focus here just a side moment on these security best practices. That can be very, very significant. But what basically does cyber liability insurance provide? What do you get for your premium dollar? It's really looking at providing coverage for the type of losses I had talked about a bit. Commonly, you're going to see these policies cover business interruption, as an example. So that would be covering the loss of income and forensic expenses sustained during the period of restoration after the breach. Now, that coverage may be contingent upon a short waiting period. Media liability. So that's things like copyright or trademark infringement, malicious defacement of a website, and liable. Data recovery. So we're talking about the reasonable and necessary costs incurred in order to regain access to, replace, or restore data, or the reasonable and necessary costs incurred in order to determine that the data cannot be accessed, replaced, or restored. So I think ransomware as an example. And then sometimes you might even pay for a decryption key that don't do much, or you might've been impacted with wiperware and your data's just been erased and destroyed. So there's some costs in terms of trying to figure out, what can we get back and is it doable? Privacy breach response. So that's the expenses associated with complying with relevant breach notification laws. We had talked about that. Look for a policy that includes coverage for the cost of privacy counsel, forensic investigators, and notification and credit monitoring services. It will also provide typically, again, data and network liability. Now, these are the damages and expenses related to claims resulting from a breach of data in your control or a third party, and damages and expenses resulting from a security breach. Examples of a security breach would include unauthorized access or use of network resources, a denial-of-service attack, an insertion of malicious code, if somebody downloads something and it's maybe a key log or just tracking what's going on your network, and the transmission of malicious code from your network, so someone's using your network to harm somebody else. Crisis management. This is the expense associated with bringing in outside experts to investigate the incident and fix the problem. And with some policies can include the cost of a public relations consultant. Cyber extortion. This is the expense associated with investigations and paying for the return of or gaining back access to data. Now, one thing to be aware with cyber extortion, it is pretty common in the cyber insurance space that you need permission in advance from the insurer to make that ransom payment. It has to do with regulations that monies can't be paid to nation states. You don't want to pay the Iraqis, as an example, their military. And they're very involved in ransomware. So there's some issues there. But I'm just making you aware of that little side note, but typically money is available in terms of reimbursement. Fraudulent instruction. This is a loss resulting from the transfer of funds after relying in good faith on an instruction that was a misrepresentation of a material fact. Now again, coverage may be contingent upon an out-of-band communication taking place. Again, if you're not familiar, an out-of-band communication is, let's say that the wire fraud instructions come via fax. So that's the inbound communication channel. An out-of-band communication channel means we changed the communication channel for an outbound communication in an attempt to verify the accuracy of the information that was received in the inbound communication. So incoming fax, wire instructions. I pick up the phone with a previously verified number from whoever sent the fax, and I will read the information, Hey, Sue. I just want to verify, thanks for sending over the fax, got everything. Is this information correct?" Because these things can and have been and will continue to be intercepted and changed. So if a call comes in, it could be a deepfake audio. And I'm telling you folks, this has happened. You're not talking to who you think you're talking to so you have the information. So use a different communication channel to reach back out and confirm. That's an out-of-band communication. That's what we mean by that. Some other benefits from cyber liability insurance. It can cover regulatory defense and penalties. These are the expenses and penalties that an insurer is obligated to pay as a result of a regulatory proceeding that arose due to a data or security... My tongue is getting twisted today. A security breach. And finally, payment card liabilities. So it might be PCI fines, the payment card industry PCI fines, costs, expenses. An insurer is legally obligated to pay as a result of a data or security breach. So these are some of the common coverages you will typically find in a cyber liability policy. And again, that's some pretty thorough stuff and can really help you manage the risks and get through this, in again, the event that there is a significant data breach of some type. Now, a few things to keep in mind and just be aware of. There are going to be exclusions for war and state sponsored attacks. I would think that wouldn't be much of a surprise. But the current Russia-Ukraine war is one obvious example as to why. NotPetya, which was... It looked like ransomware. Russia released it into the wild prior to the onset of the war, but leading up to it, in an attempt to really do some serious damage in Ukraine. But it just spread and went global. And that NotPetya was what we call wiperware. It looks like ransomware, acts like ransomware, but the intent is not to hold your data ransom for some payment, the intent is to wipe your data, just get rid of everything. That's not good. And it is nasty, nasty stuff. Also be aware that these policies cover data. They don't cover hardware. If you have a lightning strike and your server's just toast, a cyber liability policy isn't going to respond. That would be something you'd cover under your general insurance, your business owner's policy or your commercial package, whatever that might be. Some common exclusions just to be aware of, breaches that occurred prior to the effective date of the policy. Now there's a growing move in this space to kind of be a little more liberal with that in terms of this insurance space because it just just very difficult to try to figure out when these things occurred. But if you are breached and you know it, and you come and buy a cyber liability policy, the house is already on fire, that's not going to work. You would have to have absolutely no idea that a breach occurred. Because sometimes these people can be in your system for months and sometimes even a year or more. That's just the way it is. Insider attacks. If somebody in your employer, another attorney in the firm, just makes bad decisions for whatever reason and does a lot of damage, again, insider attack, that's not going to be covered. And some policies, think about what I'm about to share here, phishing scams are often not covered or maybe subject to a sublimit. And really what that's talking about and getting to is yet again, wire fraud business email compromise. It's the loss of funds. Other examples might be someone who stripped it and buying a bunch of gift cards to pay something. Turning over credit card information. You might ask if there's a social engineering endorsement available that might pull some of this back in. And again, if there is coverage under the policy, typically it's a sublimit and it's not going to be as high as the general limits of the overall cyber liability coverage that you might purchase. So for example, let's say you buy $250,000 in coverage, the sublimit on these kinds of theft of funds might be just 10% of that, so 25 grand. You could also look at getting some coverage under a crime policy, and that's probably the most effective way to try to get this covered. But every carrier is going to be different. I'll come back to that here in a moment. Also, an attack resulting from a failure to correct a known vulnerability. So if you are continuing to use outdated systems because hey, Windows 8 still works wonderfully, even though you know that it's no longer supported and there's no security patches and up where, as a result of that, you're not keeping systems current and patched and there's a breach. If you're using unpatched systems, outdated systems, that may void coverage for anything. So you need to just be aware. There are different types, different ways I guess to say, to get into this. A lot of malpractice carriers have what I would say an add-on. It's sort of in part.... Maybe the best way to say is it's some type of cyber endorsement to a malpractice policy. And that's not bad, don't get me wrong. It's better than nothing. But understand these endorsements, these add-ons, often come with lower limits and less broad coverage. And part of the reason that that's the case is due to limited, and at times even no, underwriting being involved in that cyber insurance piece. You can opt in. Sometimes it just is automatically there depending on the carrier. So again, it's important to have some type of cyber coverage, but I need you to understand if you're not really reading these policies, these endorsements, and really understanding what they do and don't do, you might be running with some assumptions. I really prefer to see a freestanding cyber policy. And just as a aside real quick. I shared that this add-on and the automatic, if you will, endorsement is in some malpractice policies. You'll also see that at times in some business owner package policies as well. But again, the same issue is in play. It's not as austere. Just not as broad. Limits aren't going to be as high. So I would encourage you to look at standalone coverage. How much? Boy, that is a tough one. I would say in the solo and small firm space, I would want to at a minimum be looking at a quarter to half a million, and understanding that we're talking about the expenses and consequences of a data breach as opposed to theft of funds. I'm going to look at theft of funds perhaps at a higher amount separately, just depending on how much money you're moving through your accounts. And also, just as an aside, some of the cyber policies, even the standalone policies, will cover theft of your funds, but not theft of client funds. So if money is accidentally wired, firm money wired to a wrong vendor making a payment or some sort out of the operating account, okay, cyber will cover that. You wire 850,000 of client funds out, the cyber policy may not cover that at all. So you really need to ask and look into this. Because it's again another reason to look at a crime policy or a crime endorsement and see what you can do there. You may need to have several different policies in play even to get to this total that whatever you're looking at. If you can get to a million, even better. But again, I don't know enough about your individual practices and firms in terms of how valuable is the data. How much do we have here? That's something you're going to have to maybe talk with an underwriter or a marketing person with, business development person, with your insurer, to really gets a better ideas of what to do there. The final thing I want to throw at you is just know that these policies differ, at times substantially, between insurers. So it's worth at times shopping the market a little bit. Prices can be quite variable as well. A lot of the variability goes with just what coverage is being offered. If you have a policy that's going to cover your money and client money as an example, that's going to be more expensive than a policy that doesn't cover any loss of funds in terms of wire fraud and these phishing scams. So again, you have to make sure you're comparing apples to apples. But know that this is a very dynamic market relative to life insurance and lots of other... They've been around for decades and decades. This is new stuff. And the risks are changing almost daily. It's very difficult for an insurer to really understand what their exposure's going to look like two or three years down the road, based on what the risk analysis is today. Who knows? AI as an example. How is this going to change things? How significant will deepfakes become? They are already in play, so please... But I'm just trying to share, can you appreciate how challenging it is? An insurer has to set premium on an unknown risk. It's changing and evolving very quickly. So that's why you will experience and see great differences perhaps in coverage, differences in premium, et cetera. So it's really worth sitting down and talking with someone about how to move forward and what might be best for your situation. So that's really all I have on cyber liability. I hope you found something of value. And I like at times to go back and say, "What are the takeaways here?" And the biggest takeaway for me, if I'm sitting in your shoes, if you already have not done so, I strongly encourage you to consider adding cyber liability insurance to your insurance portfolio. In my mind, I just honestly have seen too much. And I truthfully can say I've been involved post breach with a number of firms in a number of different situations, and more than a few really never recovered. The financial hit was just too much, and that was that. So I want to make sure, my hope is that you hear, that there's some learning that we can obtain from the experiences of others. So I'll leave it at that. Again, I'm Mark Bassingthwaighte. If you ever have a need, desire, concern that you want to talk about, please don't hesitate to reach out. My email is firstname.lastname@example.org. You do not need to be an insured to visit with me. There's no cost. I'm hired to be a risk manager for the bar at large. I'm hired to be your risk manager. So if there's ever anything I can do on cybersecurity, explaining insurance, and a lot of lawyers have questions about legal malpractice insurance and other types of coverage, happy to talk. Ethics, malpractice avoidance, [inaudible 00:41:54], whatever, I'm here. That's it. Bye-bye all.
Chicago's Inspector General Deborah Witzburg joins Lisa Dent to discuss how her office is handling city employees that fraudulently obtained COVID-19 relief loans that were meant for struggling businesses during the pandemic. Follow The Lisa Dent Show on Twitter:Follow @LisaDentSpeaksFollow @SteveBertrand Follow @kpowell720 Follow @maryvandeveldeFollow @LaurenLapka
Slam the Gavel welcomes Irwin Savoye,III to the podcast. Irwin will be exposing the corruption where he is living in St. Tammany Parish, Louisiana. He wanted to come on to the podcast to educate all of us, especially the elderly regarding things they should be mindful of when it comes to their Title, Deed and Mortgage Documents. There is collusion going on in St. Tammany and much more. Irwin is concerned for his mother. It's alarming that you don't want your parents to have a lot of assets because they can be taken advantage of. How many people would take advantage of their parents and their assets?? Irwin stresses to everyone, "go down to your local tax assessors office, get a print out of what your current tax information says on there look and see what instrument numbers do they listed on there for you. Please contact me if you don't understand." What Irwin and his family have been through he would not wish on his worst enemy.To Reach Irwin Savoye, III: +1-985-640-7315, Facebook and email: email@example.comThis episode of Slam the Gavel is sponsored by CPSprotect Consulting Services. A Child Protective Services case is one of the most frightening experiences for any parent. Don't face it alone. Face it with confidence! With UrgentAssist by CPSprotect, you can have access to former CPS investigators to make sure you preserve your rights and protect your family. If you're facing CPS involvement and aren't sure where to turn, their child welfare consultants can help you. Visit Support the showSupportshow(https://www.buymeacoffee.com/maryannpetri)http://www.dismantlingfamilycourtcorruption.com/Support the showSupportshow(https://www.buymeacoffee.com/maryannpetri)http://www.dismantlingfamilycourtcorruption.com/
Slam the Gavel welcomes Irwin Savoye, III to the podcast. Irwin will be exposing the corruption where he is living in St. Tammany Parish, Louisiana. He wanted to come on to the podcast to educate all of us, especially the elderly regarding things they should be mindful of when it comes to their Title, Deed and Mortgage Documents. There is collusion going on in St. Tammany and much more. Irwin is concerned for his mother. It's alarming that you don't want your parents to have a lot of assets because they can be taken advantage of. How many people would take advantage of their parents and their assets?? Irwin stresses to everyone, "go down to your local tax assessors office, get a print out of what your current tax information says on there look and see what instrument numbers do they listed on there for you. Please contact me if you don't understand." What Irwin and his family have been through he would not wish on his worst enemy. To Reach Irwin Savoye, III: +1-985-640-7315, Facebook and email: firstname.lastname@example.org This episode of Slam the Gavel is sponsored by CPSprotect Consulting Services. A Child Protective Services case is one of the most frightening experiences for any parent. Don't face it alone. Face it with confidence! With UrgentAssist by CPSprotect, you can have access to former CPS investigators to make sure you preserve your rights and protect your family. If you're facing CPS involvement and aren't sure where to turn, their child welfare consultants can help you. Visit Support the show Supportshow(https://www.buymeacoffee.com/maryannpetri) --- Support this podcast: https://podcasters.spotify.com/pod/show/maryann-petri/support
On Security Now, Steve Gibson announced the release of his new freeware utility ValiDrive, which detects fake drive capacities by thoroughly testing a drive to reveal its true size. Check out ValiDrive here: https://www.grc.com/validrive.htm For more, check out Security Now: https://twit.tv/sn/943 Hosts: Steve Gibson and Leo Laporte You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/ Sponsor: GO.ACILEARNING.COM/TWIT
On Security Now, Steve Gibson announced the release of his new freeware utility ValiDrive, which detects fake drive capacities by thoroughly testing a drive to reveal its true size. Check out ValiDrive here: https://www.grc.com/validrive.htm For more, check out Security Now: https://twit.tv/sn/943 Hosts: Steve Gibson and Leo Laporte You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/ Sponsor: GO.ACILEARNING.COM/TWIT
On this episode of BREAKING TAKES, Sam and Zach discuss Donald Trump's fraudulent real estate empire finally tumbling down, Taylor Swift's latest flame, an influencer that live streamed her looting and later got arrested, and the British Airways pilot who was fired after a drinking and drug layover orgy. SUBSCRIBE TO BREAKING TAKES PREMIUM FOR BONUS EPISODES & EXCLUSIVE ACCESS: https://breakingtakes.supercast.com/ BREAKING TAKES LINKS: Instagram: https://www.instagram.com/breakingtakes/TikTok: https://www.tiktok.com/@breakingtakesApple: https://apple.co/3K4Yny2Spotify: https://spoti.fi/3pThWCtOvercast: https://bit.ly/43uz1AyPremium: https://breakingtakes.supercast.com/
Excited to divulge a complete smorgasbord of sports talk before yours truly takes a little layoff as the latest podcast is at your fingertips. On deck: (2:44) A little housekeeping to begin as yours truly is taking a little trip to celebrate a second wedding anniversary. Therefore, no podcasts are on tap for next week. I'll be back on October 16th to recap all that's transpired in sports. But have no fear, please go to my YouTube channel to subscribe and like (see link toward the bottom of the show notes) as I'll be sure to deliver whatever shakes down in the sports world over the next week and a half so you won't miss a beat. (5:07) It was a very disappointing Wild Card round in MLB as you witnessed four sweeps in the process. The most head shaking of them all is how the Rays meekly went out after a big regular season. Same for the Brewers who fell flat on their faces vs. Arizona. NEWS FLASH: Minnesota FINALLY got over the hump. Not only to win a playoff game, but a SERIES in beating the Blue Jays. And the lights were a little too bright for the Marlins as the Phillies took care of them at Citizens Bank Park. I'll preview the storylines and predict how the Division Series will unfold. Can the Astros repeat? Will the Braves avenge last October's loss to the Phillies? Does Arizona have any chance against the Dodgers? Are the Orioles ready to take that next step and beat the Rangers? I'll have all of that, as well as, Guardian manager Terry Francona steps down as manager. Is he going to go off into the sunset and retire? Although I touched on this Monday regarding Buck Showalter's fate as Mets manager, but I dig into this a little bit more as I read one story that translated a different narrative from the truth. (30:35) NFL Week 5 has a less than stellar schedule (although you do have Cowboys-Niners on Sunday night, which I'll discuss) Is the NFL spreading their schedule thin having to appease the networks and streaming services alike? Is Taylor Swift coming to a stadium near you? Well, The Shield (aka NFL) is here for it as ratings and interest has ratcheted up throughout the nation. Does the NFL need more fans? (37:54) Week 6 in college football is light. You do have the Red River Shootout between #12 Oklahoma vs. #3 Texas, with Alabama visiting Texas A&M. Washington St. vs. UCLA and Kentucky vs. Georgia are your key matchups to get you through a Saturday afternoon/evening. (39:51) It's just about time to drop the puck on another NHL season. The curtain will be raised on Tuesday. I'll get into some of the stories to pay attention to (i.e. A repeat in Vegas? Will the Leafs get to the Cup Final?) I'll take a different approach to previewing what to expect this year with surprise teams, disappointments and who'll be in the Stanley Cup Finals come next spring? I'll hold off on my over/under point totals as I thought to show a little integrity and not just wing it when selecting three overs & three unders. Peep my YouTube channel as I will thoroughly think these over and have them up before the puck drops early next week. (54:33) The Association is starting to percolate as we're less than three weeks to their season commencing. James Harden is back in the news as he reported to training camp for the Sixers. What's going to happen from here on out? Also, the Lakers and Nuggets have added some spice to their opening night contest as there's been some banter and shots fired between the two teams, dating back to the championship parade. Will this lead to fireworks come October 24th? Please subscribe, leave a rating and post a review on Apple Podcasts, Google Podcasts, Spotify, Audacy, Amazon Music and iHeartRadio or wherever you get your podcasts. For daily shorts, weekly vlogs and then some, please subscribe to my YouTube channel at: https://www.youtube.com/channel/UCMucZq-BQrUrpuQzQ-jYF7w If you'd like to contribute to the production of the podcast, please visit my Patreon page at: www.patreon.com/TheJAYREELZPodcast Many thanks for all of your love and support. Intro/outro music by Cyklonus. LINKS TO SUBSCRIBE, RATE & REVIEW: APPLE: https://podcasts.apple.com/us/podcast/the-jayreelz-podcast/id1354797894 SPOTIFY: https://open.spotify.com/show/7jtCQwuPOg334jmZ0xiA2D?si=22c9a582ef7a4566 AUDACY: https://www.audacy.com/podcast/the-jayreelz-podcast-d9f50 iHEARTRADIO: https://www.iheart.com/podcast/256-the-jayreelz-podcast-43104270/ AMAZON MUSIC: https://www.amazon.com/The-JAYREELZ-Podcast/dp/B08K58SW24/ref=sr_1_1?dchild=1&keywords=the+jayreelz+podcast&qid=1606319520&sr=8-1
Michelle is having a hard time supporting her father with his new love life! Should she let him give up everything for a woman he's never met? Learn more about your ad choices. Visit megaphone.fm/adchoices
What's up everyone, welcome back to another episode of the couch. In today's episode, Zwick, Buttsie, and Jordan begin by discussing the best team in the NFL after week 3, and Zwick gives out his updated power rankings. Then, Buttsie, Max, and Zwick react to the CFB Week 4 outcomes. Thank you all for listening and peace!Click here to check out our linktree! Here you can find the Verdict League, Twitter, Tik Tok, Instagram, and Podcast streaming options for spotify and non spotify users for every show on the Couch Podcast Network all in one place!!
Connect with Me: email@example.comThis episode is brought to you by the Vacation Rentals with John Newsletter my very own email newsletter every Friday that features 4 bullet points highlighting cool things I found this week in the short term rental world including apps, books, tech, new hacks, tricks, articles, and other weird but interesting short term rental stuff of value that I stumbled upon. It's free and will always be free. You can subscribe here.
0:00 DEFIANT Sen. Menendez 27:00 Russia 1:01:34 911 Phone Call From F-35 Pilot 1:07:20 Money For Ukraine 1:16:05 Electoral Fraud 1:21:07 Rite Aid Pharmacy 1:36:23 Interview with Dr. Astrid Stuckelberger - Sen. Menendez defiantly reveals his knowledge that the US government may CONFISCATE money from bank accounts of citizens - Should the banks accounts of Canadian parliament members who cheered actual Nazi as "war hero" be cut off and seized? - Russia's Lavrov condemns US as "empire of lies" - Duma lower house leader Volodin says #Ukraine must surrender to Russia or cease to exist as a nation - First Abrams tanks arrive in Ukraine, but US says they should NOT be used in the main battle - Abrams tanks weigh 70 - 80 TONS and will quickly SINK in Ukraine's muddy terrain - What you may not know about tracked vehicles vs. MUD - Lost F-35 story takes another weird turn as pilot who ejected calls 911 from a neighborhood home - The entire story is complete fiction - why did the pilot have no emergency radio? No transponder? - US spending billions in Ukraine to buy FERTILIZER for farmers and bail out small businesses (while America's economy is wrecked) - Why are there plenty of TANKS for Ukraine but no tanks for the US southern border? - Massive election fraud discovery in #Arizona - Ballot paper is FRAUDULENT (counterfeit) - DOJ won't deport MILLIONS of illegals, but wants to throw a German family out of the country for homeschooling - Rite-Aid in bankruptcy, to close 500 pharmacies across the country... Big Pharma retailers keep KILLING their repeat customers! - Full interview with Dr. Astrid Stuckelberger on the UN and WHO plan to roll out global medical dictatorship and enslave humanity For more updates, visit: http://www.brighteon.com/channel/hrreport NaturalNews videos would not be possible without you, as always we remain passionately dedicated to our mission of educating people all over the world on the subject of natural healing remedies and personal liberty (food freedom, medical freedom, the freedom of speech, etc.). Together, we're helping create a better world, with more honest food labeling, reduced chemical contamination, the avoidance of toxic heavy metals and vastly increased scientific transparency. ▶️ Every dollar you spend at the Health Ranger Store goes toward helping us achieve important science and content goals for humanity: https://www.healthrangerstore.com/ ▶️ Sign Up For Our Newsletter: https://www.naturalnews.com/Readerregistration.html ▶️ Brighteon: https://www.brighteon.com/channels/hrreport ▶️ Join Our Social Network: https://brighteon.social/@HealthRanger ▶️ Check In Stock Products at: https://PrepWithMike.com
I cover the UN's SDG & Agenda 2030 recent declarations and paperwork of their ramping-up of efforts to wipe us out; I cover how school districts and universities are manipulating their rankings and statistics to gain favor with the public that they have lied to; I provide jab updates and read from Live Not By Lies.
From 'Al & Jerry's Postgame Podcast' (subscribe here): Al's Fraudulent Five To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices
Carly Ryan thought she had met her dream boyfriend online. His name was Brandon Kane, a 18yr old musician from Melbourne. But her love's true identity was hiding behind a fake online profile. If you have any thoughts on this case or any other case, or just want to get in touch with Savannah about the show, email her at firstname.lastname@example.org. Watch the podcast on YouTube: https://bit.ly/KillerInstinctYT Don't forget to subscribe to the podcast for free wherever you're listening or by using this link: http://bit.ly/KillerInstinctPod If you like the show, telling a friend about it would be helpful! You can text, email, Tweet, or send this link to a friend: http://bit.ly/KillerInstinctPod Follow Savannah on IG: @savannahbrymer Follow Savannah on Twitter: @savannahbrymer Learn more about your ad choices. Visit podcastchoices.com/adchoices
0:00 Intro 0:18 FRAUDULENT SCAMS 33:50 New Crisis 35:30 Additional News 43:09 Joe Biden 55:28 Climate Change 58:23 The Best Video 1:07:19 Interview with John Bush - Beware of new SCAMS targeting us all - Many scammers are INFLUENCERS who sound believable - Some are positioned as "Christian" or "alternative" orientations - Watch out for #Maui fundraising scams, #gold scams, #crypto scams, supplement scams and more - Shocking (true) examples of scams we've uncovered in our 20 years of research and testing - The "whey protein" that turned out to be maltodextrin - The #detox supplement that turned out to be liquid aluminum - 3 Ukrainian pilots DIE in a training exercise - 79 arsonists arrested in Greece for seeing wildfires blamed on #climate change - Don't get suckered into a #civilwar trap - Joe Biden pushing new #vaccines for #plandemic 2.0 - Partial interview with John Bush from Live Free Academy For more updates, visit: http://www.brighteon.com/channel/hrreport NaturalNews videos would not be possible without you, as always we remain passionately dedicated to our mission of educating people all over the world on the subject of natural healing remedies and personal liberty (food freedom, medical freedom, the freedom of speech, etc.). Together, we're helping create a better world, with more honest food labeling, reduced chemical contamination, the avoidance of toxic heavy metals and vastly increased scientific transparency. ▶️ Every dollar you spend at the Health Ranger Store goes toward helping us achieve important science and content goals for humanity: https://www.healthrangerstore.com/ ▶️ Sign Up For Our Newsletter: https://www.naturalnews.com/Readerregistration.html ▶️ Brighteon: https://www.brighteon.com/channels/hrreport ▶️ Join Our Social Network: https://brighteon.social/@HealthRanger ▶️ Check In Stock Products at: https://PrepWithMike.com
Photo: 1914 Rio Grande. No known restrictions on publication. @Batchelorshow #Guatemala: The leading party likely fraudulent for Sunday's final vote for the presidency. Mary Anastasia O'Grady, WSJOpinion. https://www.wsj.com/articles/biden-does-putins-dirty-work-in-guatemala-russia-arrest-democracy-corrupt-populist-semilla-dda75c6b
The Hangover. There are 19 movie theaters in the country where you can properly watch Oppenheimer. Fraudulent birthday wishes. George and Tammy. Is Michael Shannon a great actor or just odd? Can Adnan get rid of Twitter? Chris' atrocious text etiquette. Adnan's least favorite type of music. Chris' limited fake Michael Shannon. Learn more about your ad choices. Visit megaphone.fm/adchoices