measures taken to guard against damage
YouTube link: https://youtu.be/E5MuTHUbMUs Professor of Religion Diana Pasulka discusses Jung, Heidegger, and the recent UFO hearings Sponsors -Brilliant: https://brilliant.org/TOE for 20% off Patreon: https://patreon.com/curtjaimungal Discord Invite: https://discord.com/invite/kBcnfNVwqs iTunes: https://podcasts.apple.com/ca/podcast/better-left-unsaid-with-curt-jaimungal/id1521758802 Subreddit r/TheoriesOfEverything: https://reddit.com/r/theoriesofeverything Merch: https://tinyurl.com/TOEmerch LINKS MENTIONED: -American Cosmic (Diana's book): https://amzn.to/3MsaOmI -American Cosmic (Diana's book): https://amzn.to/3FWYCaW -Fatima Trilogy (a book Diana references): https://amzn.to/3wDGoao -Dark Night of the Soul podcast (with Chloe Valdary interviewing Curt): https://www.youtube.com/watch?v=wtfJ20TNpNU -Karl Friston podcast (most important TOE podcast): https://youtu.be/SWtFU1Lit3M -Thomas Campbell on TOE: https://youtu.be/kko-hVA-8IU is part 1 and part 2 is also on the channel. -Tupacabra Twitter: https://twitter.com/TUPACABRA2 TIMESTAMPS: 00:00:00 Introduction 00:03:24 Diana's journey from "atheist" ⇒ "agnostic" (with respect to the phenomenon) 00:07:17 Nuns who saw orbs, every night, then prayed... 00:11:45 What are "beliefs"? 00:12:27 Atheists who believe in God 00:19:50 Spiritual vs Religious (and the Secularization thesis) 00:22:58 UFOs (or the belief in) are like a religion 00:29:37 Psychedelics and religion 00:37:01 Getting flack because of covering the phenomenon 00:39:42 To the skeptics: it's rational to believe in UFOs 00:47:38 Atheism is NOT like a religion, though it can be dogmatic 00:49:18 It's false to say "religions tell you what to think" 00:55:03 The case for dogma 01:01:06 Heidegger on technology not being just another tool 01:06:04 Heidegger and Jacques Vallée 01:10:03 Why do those who study the phenomenon tend to be Catholic? 01:13:49 How the Vatican views UFOs 01:15:12 Are religious stories interpreting UFOs, or are we interpreting UFOs materialistically? 01:20:05 Near Death Experiences, UFOs, and Dean Radin 01:22:35 How the CIA / DOD / etc. work (the nefarious strategies) 01:26:57 What Diana uncovered, that she shouldn't have 01:29:45 Roswell and the Promethean myth 01:31:10 The dangers (and reality) of CE5 01:33:48 Bob Lazar is considered credible by many, behind the scenes 01:36:02 Protecting yourself against disinformation 01:38:08 Academic Openness vs. Governmental Closedness 01:42:39 SpaceX, and writing in Latin for "them" 01:48:18 The president is a "short timer" (this is why he / she isn't told the truth) 01:49:02 Who is Tyler? Why is he significant? 01:50:48 Does the gov't believe they understand what's behind UFOs? 01:52:01 We're dealing with MULTIPLE phenomenon, not just one 01:52:51 Biblically accurate angels 01:55:26 Physical evidence pertaining to purgatory 01:57:36 What's the point in collocating UFOs with religion? 02:02:10 Who is the modern Heidegger? 02:05:21 Jung and UFOs 02:08:00 Plato's Cave and the view that certain people have shackled us 02:12:54 Sangha as The Answer to deception 02:18:46 Rediscovering meaning, Heidegger, Weinstein, and the TOE project 02:22:09 Experiential vs Analytical approach to understanding God 02:24:52 Lovecraft, and the perils of an "open mind" 02:27:14 Epistermic Shock vs Ontological Shock 02:38:10 The importance of Sangha 02:41:21 [Juliano Vargas] Reconciling religion with ET (and does ET believe in a Supreme Creator?) 02:42:15 [Numb Her Two] How has Diana's faith been affected? 02:44:27 Why does the Hitchhiker effect occur? 02:45:32 Angels... Demons... What is the THIRD (religiously interpreted) option? 02:46:45 Rosicrucianism and Gnosticism 02:50:52 Kurzweil's Singularity / Omega Point / UAPs 02:55:14 Jung and the UFO archetype (continued) 02:56:10 UFO hearings (May 2022) 03:00:23 [Tupacabra] Catholic Church, Remote Viewing, Thomas Campbell, and Jacques Vallée 03:05:54 Podcasts being sanctioned behind the scenes for disclosure #DisTOEsure Learn more about your ad choices. Visit megaphone.fm/adchoices
Does France's new female Prime Minister mark a victory for feminism? Marseille's creeks (Calanques), faced with degradation, limit visitors. The battle in 1643 that shifted influence in Europe from Spain to France. Elisabeth Borne, the second female prime minister in France's modern history, bears the official title of "premiere ministre" the feminisation of “premier ministre”. President Emmanuel Macron was under pressure to appoint a woman, and someone with a more left-leaning profile than her predecessor, Jean Castex – a nod to the leftists and Greens who voted for him to block far-right Marine Le Pen. There's plenty of debate over Borne's left-wing credentials and whether she will usher in a more women-led government. Political journalist, Lea Chamboncel (@ChamboncelLea), host of the POPOL podcast and author of a book on women in politics, talks about why Borne's gender is, sadly, still news, and her own mission to get more women's voices heard in French politics. (Listen @0') Every year, tens of thousands of people flock to the picturesque inlets – known as Calanques – along the Mediterranean coast, eroding the cliffs and damaging vegetation. In a first for France – and Europe – the national park managing the Calanques is limiting access to those closest to Marseille, introducing a permit during the summer months. Isabelle Martinetti visits the area to see how it will impact locals and tourists alike. (Listen @20'05'') The French army snatched victory from its Spanish rival on 19 May 1643 in the Battle of Rocroi. Gary Girod (@girod_gary) of the French History Podcast explains the importance of the battle that marked the beginning of the end of Spanish dominance on the warfield, and the rise of France in Europe under the reign of Louis XIV. (Listen @12'53'') This episode was mixed by Cecile Pompeani. Spotlight on France is a podcast from Radio France International. Find us on rfienglish.com, iTunes (link here), Spotify (link here), Google podcasts (link here), or your favourite podcast app (pod.link/1573769878).
Diane Tomb is the CEO of the American Land Title Association (ALTA), a national trade association consisting of title insurance agents, abstracters, and underwriters representing every county in America. An expert in the real property transaction industry, Diane describes the logistics of obtaining and protecting the title to your home. She reveals that every state has a set of unique documents detailing what it means to get a title, and that there is still dated legislation from decades past where discrimination was legal. Tune in to find out how ALTA is taking strides to ensure that home ownership is accessible to all.
Millions of Americans file tax returns each year that include personal and financial information like their incomes, addresses, mortgage information. Among these filings are those for celebrities and politicians, as well as others whose financial…
Jason Hartman invites attorney Galen Hair to the Creating Wealth Show today to discuss how to make sure you are getting the most out of your insurance claim. How do you know if you should even hire an attorney to assist with your claim? A study from the Insurance Research Council revealed that on average, people who hire attorneys are likely to see a settlement three and a half times higher than people who don't hire attorneys. What are some of the things your homeowner's insurance policy might cover that you don't even know about and would never think to make a claim for? What should owner occupant homeowners and rental property investors know? What other additional coverage should you consider adding on to your policy that is not included, but would be available for a small fee? About Galen M. Hair Galen M. Hair, an aggressive and relentless litigator, is licensed in multiple states and boasts clients from around the world. With large wins both at home and across the country and an impressive record of favorable results, Mr. Hair gained a reputation for getting the job done both inside and outside the court room early on in his career. He focuses not only on the litigation in front of the client, but the long term personal and business effects that his clients' issues will cause. Viability is key and no small victory is worth it if the client is put in a more detrimental position. With both large firm and boutique firm experience, he combines a large firm comprehensive approach to a small firm low-cost model to achieve impressive results with minimal financial expense. His clients are family to him and it shows. Key Takeaways: 0:50 Welcome Galen M. Hair, property casualty attorney 1:38 Hurricane Katrina laid the foundation for Galen's professional development 2:14 What is an insurance bad faith case? 3:27 Industry participants estimate that over 95% of claims are either underpaid or delayed 4:15 Galen's focus is property insurance 5:58 Insurance Research Council study on attorney effectiveness 7:24 Typical fee schedule 8:51 Many claims are weather related 9:44 Sample case study for a recent residential claim 11:31 What is a public adjuster? 13:47 Who actually reviews the insurance policy? 15:04 A public adjuster in their truest form should be bringing the claim to resolution that is favorable for you 15:57 How do you find a public adjuster? 16:48 Which states tend to have more favorable outcomes for the insured? 17:54 What are the smallest and largest claims you handle? 20:07 What if a claim seems too small to hire an attorney? 23:37 Protecting yourself during a claim and things to consider about insurance fraud 26:27 Insurance fraud can have terrible ramifications on society 27:20 What are some things that people might not know are in their homeowners insurance policies? 28:24 Additional living expense coverage can keep your family and rental properties safe 30:50 The loss of rental income and multifamily policies 32:24 What is a non admitted carrier? 33:41 Penalties and punitive damages 35:00 Statute of limitations 37:22 Find resources and learn more at InsuranceClaimHQ.com Follow Jason on TWITTER, INSTAGRAM & LINKEDIN https://twitter.com/JasonHartmanROI https://www.instagram.com/jasonhartman1/ https://www.linkedin.com/in/jasonhartmaninvestor/ Learn More: https://www.jasonhartman.com/ Get wholesale real estate deals for investment or build a great business – Free course: JasonHartman.com/Deals Free White Paper on The Hartman Comparison Index™: https://www.hartmanindex.com/white-paper Free Report on Pandemic Investing: https://www.PandemicInvesting.com Jason's TV Clips: https://vimeo.com/549444172 Free Class: CYA Protect Your Assets, Save Taxes & Estate Planning: http://JasonHartman.com/Protect Special Offer from Ron LeGrand: https://JasonHartman.com/Ron What do Jason's clients say? http://JasonHartmanTestimonials.com Contact our Investment Counselors at: www.JasonHartman.com Watch, subscribe and comment on Jason's videos on his official YouTube channel: YouTube.com/c/JasonHartmanRealEstate/videos Guided Visualization for Investors: JasonHartman.com/visualization Jason's videos in his other sites: JasonHartman.com/Rumble JasonHartman.com/Bitchute JasonHartman.com/Odysee Jason Hartman Extra: https://www.youtube.com/channel/UC0qQ… Real Estate News and Technology: https://www.youtube.com/channel/UCPSy…
Why this may be the hardest age and how we are trying to protect the confidence our kids have left!!! For this bonus episode we are having a relatable and honest conversation in partnership with Dove. Download the Dove Self-Esteem Project's Confidence Kit at http://dove.com/detoxify.Want our podcasts sent straight to your phone? Text us the word "Podcast" to +1 (917) 540-8715 and we'll text you the new episodes when they're released!Tune in for new #MOMTRUTHS episodes every Tuesday, Thursday and Friday!Follow @momtruthspodcast on Instagram: https://instagram.com/catandnatunfilteredHave you tried our new Twin Truths Wine yet? It comes in either a White or a Rosé! Head to www.twintruthswine.com to try yours today!Our new book "Mom Secrets" is now available! Head to www.catandnat.ca/book to grab your autographed copy! Come see us LIVE on tour!! To see a full list of cities and dates, go to https://catandnattour.com.Become a member of The Common Parent for the parenting resources and support you need for just $5.99/month or $59.99/year: https://thecommonparent.comFollow The Common Parent over on Instagram: https://instagram.com/thecommonparentMake sure you subscribe to our YouTube channel for our new cooking show and our #momtruth videos: https://bitly.com/catnatyoutubeCheck out our Amazon Lives here: https://bitly.com/catnatamazonliveOrder TAYLIVI here: https://taylivi.comGet personalized videos from us on Cameo: https://cameo.com/catandnatCome hang with us over on https://instagram.com/catandnat all day long.And follow us on https://tiktok.com/@catandnatofficial! See acast.com/privacy for privacy and opt-out information.
Foster youth or children who have been in the foster care system make up over 80% of children being sexually exploited. What can you do to prevent this from happening to your child? We talk with Audrey Morrissey, Co-Executive Director of My Life My Choice, a survivor-led nonprofit fighting sexual exploitation of youth.In this episode, we cover:What are some of the different forms that sexual exploitation can take?What is included in sexual trafficking?Internet exploitation.How does grooming take place.Are foster children disproportionately represented in the sexually exploited population?Are children who have experienced trauma over represented?Seeking love and connection.Sexual exploit of boys?What can parents do to protect their children from sexual exploitation?What resources are available to parents and young people?This podcast is produced by www.CreatingaFamily.org. We are a national non-profit with the mission to strengthen and inspire adoptive, foster & kinship parents and the professionals who support them. Creating a Family brings you the following trauma-informed, expert-based content:Weekly podcastsWeekly articles/blog postsResource pages on all aspects of family buildingPlease leave us a rating or review RateThisPodcast.com/creatingafamilySupport the show
Welcome to Episode 329 of The Outdoor Biz Podcast with Aaron Kindle, Director of Sporting Advocacy with the National Wildlife Federation. Aaron is a lifelong Westerner, originally from Wyoming, who possesses a deep appreciation for the West, its people, and its wild country. Facebook Twitter Instagram The Outdoor Biz Podcast Love the show? Subscribe, rate, review, and share! https://ricksaez.com/listen/
Protecting valuable equipment from earthquake damageRolling base-isolation system keeps objects safe within data centers, hospitals, and museums.Scott Harvey, earthquake engineer from the University of Oklahoma, is developing a base-isolation system for protecting critical equipment and objects inside buildings: things such as data center computers, power systems, medical equipment -- even artworks. Harvey uses the multidirectional shake table at NHERI Lehigh experimental facility to test his base-isolator designs.#baseisolation #earthquakeengineering #rollingisolation #NHERILehigh #shaketable #NSFfunded Learn more:Harvey Research Group at the University of Oklahomahttps://sites.google.com/view/HarveyResearchGroup/Details on Harvey's base isolation tests at NHERI Lehighhttps://lehigh.designsafe-ci.org/projects/quantifying-seismic-resilience-multi-functional-floor-isolation/NHERI Lehigh experimental facilityhttps://lehigh.designsafe-ci.org/facility/overview/
On this episode I have LA based trekker, outdoor adventurer, environmental activist, native plant enthusiast, Author of “Day Hiking Los Angeles” and “Discovering Griffith Park”, and founder of Modern Hiker, Casey Schreiner, join me on the show. We chat about how the view of the San Gabriel mountains sparked his outdoor journey, the concept of place attachment in relation to landscapes, the origin story and evolution of Modern Hiker throughout the years, advocating for more LA park lands, his top SoCal hikes, hot weather and summer hiking tips, Sandstone Peak and the Mishe Mokwa Trail, becoming a native plant enthusiast, his perspective on the hiking explosion in LA, favorite Los Angeles history gems, creating access for all in the outdoors, protecting Griffith park from the Gondola project, and the one outdoor experience he would relive all over again. Since 2006, Casey and the Modern Hiker site have been quite the impactful and influential resources that we are blessed to have here in the LA hiking + outdoor community. It was a major honor to have him on the show as his trail guides were the foundation to my hiking journey. Follow Modern Hiker on https://www.instagram.com/modernhiker/ Visit Modern Hiker blog on https://modernhiker.com/ Purchase Discovering Griffith Park (signed copy) on http://discoveringgriffithpark.com/ Purchase Day Hiking in Los Angeles (signed copy) on http://dayhikinglosangeles.com/ Download Modern Hiker app on https://modernhiker.com/download-the-modern-hiker-app/ Support Just Trek on Patreon https://www.patreon.com/justtrek Shop Just Trek merch on https://www.justtrek.net/shop View photos from the discussed hikes on https://www.justtrek.net/explore Listen to more podcast episodes on https://www.justtrek.net Want to send me a message? Email me at firstname.lastname@example.org or DM on Instagram @just.trek Like the show? Leave a 5 star rating and review follow us on Apple Podcasts, Spotify, Google Podcasts or wherever you listen to your podcasts. --- Send in a voice message: https://anchor.fm/justtrek/message
Sabriya Dobbins, award-winning Founder of Project Passport and Life Discovery Expert, graduated from North Carolina State University with dual bachelor's degrees in Animal Science and Social Work. She is currently a Master's in Clinical Mental Health Counseling Candidate and certified Master Life Coach. She runs Project Passport, which is a proactive wellness service company designed with the goal of providing preventative mental wellness tools and solutions to companies, organizations, and individual women. After experiencing severe anxiety and panic attacks, she realized there needed to be a sacred space to help people with the “little things” before they become big things that result in breakdowns. Sabriya is the author of the wellness blog Living Life Full Force and her self-published mental health and faith in business book, Purpose Doesn't Care What's in Your Bank Account. Tune in today to hear us chat mental health awareness, self-care routines, our purpose, retreats, pivoting business models through the pandemic, and what Sabriya is up to next. Did you love this episode? Let us know by leaving a review on Apple Podcasts. Think a friend may enjoy this content? Please share the show with them. We would truly appreciate it. MENTIONED IN THE SHOW On Demand Summer Coaching Experience: https://kellyanngorman.com/on-demand-summer-coaching-experience/ Business, LinkedIn, and Podcast Consulting: https://kellyanngorman.com/work-with-me/ Brand Deals: https://kellyanngorman.com/shop/ Your Podcast Production: https://kellyanngorman.com/your-podcast-production/ CONNECT WITH KELLY WEBSITE: kellyanngorman.com LINKEDIN NEWSLETTER: https://www.linkedin.com/newsletters/6866512629620453376/ WEEKLY NEWSLETTER: https://kellyanngorman.com/business-mindset-organizational-tools/ LINKEDIN: https://www.linkedin.com/today/author/kellyanngorman/ MEDIUM: https://kellyanngorman.medium.com/ INSTAGRAM: @kellyanngormanofficial YOUTUBE: https://www.youtube.com/kellyanngorman TIKTOK: https://www.tiktok.com/@kellyanngormanofficial? https://www.tiktok.com/@everythingismessy SUPPORT THE SHOW DONATION: https://www.paypal.com/paypalme/kagenterprises CONNECT WITH SABRIYA WEBSITE: https://www.sabriyadobbins.com/ COMPANY WEBSITE: https://project-passport.com/ LINKEDIN: https://www.linkedin.com/in/sabriya-dobbins/ FACEBOOK/INSTAGRAM: @projectpassportllc
Essay 21 of 90: The 1579 Netherlands Constitution and the Founders' Vision for Careful Balance of Federal Powers While Protecting the States by Guest Essayist Andrew Langer. Click here to explore our 2022 90 Day Study: American Exceptionalism Revealed: The Historic Rise and Fall of Worldwide Regimes and How United States Founding Wisdom Prevails. America's Founders understood the failings of totalitarian regimes, and thus attempted an experiment in liberty they hoped future Americans would find invaluable and maintain. Constituting America's 2022 90-Day Study looks at the rise and fall of worldwide regimes throughout history, juxtaposed to founding principles of the United States Constitution and federalists' and anti-federalists' views of their day regarding what history taught them about human nature and what is required to preserve our freedom!
You can find everything you need at https://www.holysmokesmovement.com/ Watch the entire episode at patreon.com/tfcatl. Listen on your favorite podcast platform. The Faith Community is a disruptive ministry built upon five keys: Greatest Commandment Theology, Anti-Racism, Women's Equity, LGBTQ+ Affirmation, and Bible Criticism. We are for the unchurched, the over-churched, and the under-churched; the weary and the wounded; the seeking and the cynical. For more inspiring content like this, check out our other platforms: Facebook: https://www.facebook.com/TFCATL Store: https://www.spreadshirt.com/user/faithcommunityatl Instagram: @tfcatl, @holysmokesmovement Patreon: https://www.patreon.com/Tfcatl Website: https://www.thefaithcommunity.org
Don Cherry's Grapevine Podcast Podcast Sponsor www.spreads.ca Promocode: Grapes Hockey Icon Don Cherry talks hockey and more! HeyAllo: Heyallo.com/en/profiles/don-cherry Coach's Closet: https://coopink.ca/collections/coachs-closet Don Cherry's Pet Rescue Foundation : https://www.doncherryspetrescue.org Twitter: https://twitter.com/CoachsCornerDC Facebook: https://www.facebook.com/Doncherrysgrapevine Podcast available on: Spotify - https://open.spotify.com/show/4Mx00CeV9rJRN0C5jfNZ7n?si=_g0b-M0CSROag0qPL8fKSQ Apple Podcast - https://podcasts.apple.com/ca/podcast/the-don-cherrys-grapevine-podcast/id1488361243 Podbean - https://doncherrysgrapevine.podbean.com
In Protecting Our Own, we delve into one of the most famous (or infamous, depending on how you view it) passages in all of Scripture - Ephesians 5:22 - 33. Paul's directive to Christian wives to submit to their husbands, and to Christian husbands to love their wives as Christ loves the church. It's both famous and sadly, infamous, because of the misunderstanding surrounding it. For some, it's a mandatory reading at their wedding, for others, it's a “you better not dare read it or quote it to me” passage. And there are a lot of articles, blogs, opinions, and commentary on this Eph. 5 passage. And it can get really confusing reading them all. So we are going to try and sort it out by showing why some have an issue with it, the wrong ways it's been interpreted, and then looking at it correctly in context – within the context of the original audience, within the context of the whole chapter and the whole letter to the Ephesians, and within the context of other Scripture. And we will pull in some commentary from some very credible and sound Biblical theologians. There is so much to delve into in these verses, we need two episodes to do it! In this first part, we will look at the imperative for Christian wives to submit to their husbands. Join us!
In this episode of Cyber Security Inside, Camille and Tom get to chat with Malcolm Harkins, Chief Security & Trust Officer at Epiphany Systems, and Rob Bathurst, Co-Founder & Chief Technology Officer at Epiphany Systems about the Internet of Things and thinking like attackers to protect systems. The conversation covers: - How the systems in a building physically can be a vulnerability in an organization's systems. - How thinking like an adversary and what their goals might be is the key to protecting your systems the best you can. - How complex Internet of Things systems are, and ideas on how to protect them. - The difference between vulnerability and exploitability, and how to look at both. ...and more. Don't miss it! The views and opinions expressed are those of the guests and author and do not necessarily reflect the official policy or position of Intel Corporation. Here are some key takeaways: - The Internet of Things, or IoT, enables a lot of capabilities, but also creates a lot of security issues. To adjust for this, we have to change the way industry views security. - Everything is connected to technology and networks now, from air conditioning regulation to elevators, it is all connected and inside of a network. Securing that system is incredibly important, because it is now about peoples' safety inside the building. - It might be easier for an attacker to go after these systems than the computers and servers inside the buildings. For example, at a large sporting event, if you own the stadium, you own the event. - To learn how to protect a building or an organization, you have to work backwards by thinking about how somebody might disrupt that building. You can then work on protecting it with that information. This is tricky when you have many different parties in a space with different goals and access levels. - At a stadium, for example, you have food vendors, the entertainment, and more. They all need access to process credit cards, access for fans to tweet, etc. So do you put them on your internal network or on an outside network? Assessing the threat is an important part of this decision. - This is similar to threat modeling, but with an extra complexity with the IoT systems and the interacting networks. If one vulnerability in one area could take down an entire operation, it is a big deal that requires a lot of consideration. Even removing one system, like the elevator system, can create panic and shut down an entire operation. - To really start to secure these systems, you need to think like the people trying to take them down. Take a good look at your organization, your business, and ask yourself: if I were an adversary, where would I go for maximum disruption? - There are differences between enterprise and IoT, including IoT having less visibility and more complexity because it is nested. The connectivity of everything is deep, and protecting a perimeter isn't as realistic in IoT as it is in enterprise. - Coming together as a team to talk about security and what could potentially happen is one of the best ways to create a defensive understanding. We can't stay in our small silos with this connectivity - we have to talk to each other and expand the reach of each of our scopes. - It is impossible to prevent every attack. That's why it is important to identify the goal of the attacker and evaluate your system based on that information. It is more about managing the cumulative impact and reducing it. - When looking at something like Log4j, you need to look at where the maximum impact to your business is and address the vulnerability there. Otherwise, you might cripple the enterprise because of the effort and time put into testing, checking, and remediating areas that aren't as critical. - Exploits apply to more than just vulnerabilities, and vulnerabilities are not just flaws in software or hardware. It is all about the adversary's ability to take advantage of either. And they don't just apply to single technical conditions, but the relationship between them. - A way to think about this is to relate it to fire prevention. You can't prevent every fire ever from occurring in your building. But you can have smoke detectors, sprinklers, fire doors, and ways to call the fire department. And the more protections you have in place, the faster you can isolate the problem and resume operations, rather than the whole building going down. Proactivity is important! Some interesting quotes from today's episode: “If you look at a building, most people just think of it as a shell with glass and doors and floors. And when you really look at it, it really is a connection of different systems. In most modern buildings because of energy regulation and things they get for LEED certification (basically how efficient their building is) they put in automated control systems for their furnaces, their boilers, their air conditioning units, elevators, power systems, access control.” - Rob Bathurst “Think of the recent ransomware trend where organizations have been impacted and they've been held hostage. In some cases, it might be easier for an attacker to, in essence, attack and exploit the building and create that ransomware event rather than just all the PCs and servers.” - Malcolm Harkins “You have to understand the way an adversary or somebody might disrupt that building, that organization, the people within it. And based on those objectives, based on those goals, you can kind of work backwards and say, how do I protect those systems?” - Rob Bathurst “What might seem like an obscure vulnerability that could be exploited in one area could actually take down the entirety of an operation. Shut down the elevator system, turn off the fire life safety system, shut down the heating and air conditioning… Think of the chaos that would create.” - Malcolm Harkins “People naturally want to think good thoughts. They want to be positive. They want to do the best for the places they work. And that sometimes keeps them from thinking: oh, if X, Y, Z went down, the whole place would fall apart. Because that's the place they work. But what we try and tell people is that's the mentality you need to be able to start to understand how to more properly architect and defend yourself.” - Rob Bathurst “That's how the bad folks go from an initial foothold, that toehold, by popping one thing. And then all of a sudden navigating their way through the daisy chain of connections, to the moment of material impact.” - Malcolm Harkins “When you look at things at a: what are we trying to do? We're not trying to stop all things all the time forever, because it's just an impossible task. The environment is too dynamic, everything else is going on. What we're trying to do is we're trying to limit the attacker's opportunity at the moments of greatest weakness.” - Rob Bathurst “You can build a strategy, as Malcolm pointed out, to reduce the exploitable paths. And for the ones you can't reduce, create resilience, create friction as we typically call it, so that you are aware the adversary is trying something or that you're able to block it.” - Rob Bathurst “You can be vulnerable, but not be exploitable. You could have an exploit happen again at a laptop or a pinpoint device, but that doesn't mean your organization is exploitable to a material event.” - Malcolm Harkins “When you build the building, you have a building inspector, you have a fire marshal, you have people come around and check it and evaluate it, and make sure it's up to code. And we don't have that kind of same rigidity in the security space.” - Rob Bathurst
An inspiring discussion with marine conservation photographer and co-founder of SeaLegacy, Shawn Heinrichs. Shawn shares all about his passion for photographing the beauty and vulnerability of ocean animals, some seriously incredible marine life encounters, and his thoughts on the importance of PADI and SeaLegacy's partnership to accelerate ocean protection. To learn more about Shawn and his work, you can follow him on social media @shawnheinrichs, and visit sealegacy.org. Plus, make sure to sign the petition urging world leaders to protect 30% of the ocean by 2030: only.one/ocean30. PADI - Seek Adventure. Save the Ocean.
Facebook Has No Idea Where Your Data Is and What They Do With It?! Facebook's about 18 years old coming on 20 Facebook has a lot of data. How much stuff have you given Facebook? Did you fall victim for that? Hey, upload your contacts. We'll find your friends. They don't know where your data is. [Following is an automated transcript] [00:00:15] This whole thing with Facebook has exploded here lately. [00:00:20] There is an article that had appeared on a line from our friends over at, I think it was, yeah. Let me see here. Yeah. Yeah. Motherboard. I was right. And motherboards reporting that Facebook doesn't know what it does with your data or. It goes, no, there's always a lot of rumors about different companies and particularly when they're big company and the news headlines are grabbing your attention and certainly Facebook can be one of those companies. [00:00:57] So where did motherboard get this opinion about Facebook? Just being completely clueless about your personal. It tamed from a leaked document. Yeah, exactly. So we find out a lot of stuff like that. I used to follow a website about companies that were going to go under and they posted internal memos. [00:01:23] It basically got sued out of existence, but there's no way that Facebook is going to be able to Sue this one out of existence because they are describing this as. Internally as a tsunami of privacy regulations all over the world. So Gores, if you're older, we used to call those tidal waves, but think of what the implication there is of a tsunami coming in and just overwhelming everything. [00:01:53] So Facebook, internally, their engineers are trying to figure out, okay. So how do we deal with. People's personal data. It's not categorized in ways that regulators want to control it. Now there's a huge problem right there. You've got third party data. You've got first party data. You've got sensitive categories, data. [00:02:16] They might know what religion you are, what your persuasions are in various different ways. There's a lot of things they might know about you. How were they all cat categorize now we've got the European union. With their general data protection regulation. The GDPR we talked about when it came into effect back in 2018, and I've helped a few companies to comply with that. [00:02:41] That's not my specialty. My specialty is the cybersecurity. But in article five this year, peon law mandates that personal data must be collected for specified explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes. So what that means is that every piece of data, like where you are using Facebook or your religious orientation, Can only be collected in use for a specific purpose and not reused for another purpose. [00:03:19] As an example here, that vice has given in past Facebook, took the phone number that users provided to protect their accounts with two factor authentication and fed it to its people, feature as well as. Advertisers. Yeah. Interesting. Hey, so Gizmodo with the help of academic researchers caught Facebook doing this, and eventually the company had to stop the practice because, and this goes back to the earlier days where Facebook would say, Hey, find out if your friends are on Facebook, upload your contacts right now. [00:03:54] And most people. What did you know back then about trying to keep your data private, to try and stop the proliferation of information about you online then nothing. I think I probably even uploaded it back then thinking it'd be nice to see if I got friends here. We can start chatting, et cetera. [00:04:12] According to legal experts that were interviewed by motherboard who wrote this article and has a copy of the internal memo this year, PN regulation specifically prohibits that kind of repurposing of your phone number of trying to put together the social graph and the leaked document shows that Facebook may not even have the ability to live. [00:04:37] How it handles user's data. Now I was on a number of radio stations this week, talking about this. And the example I gave is just look at an average business from the time it start, Facebook started how right? Wildly scraping pictures of young women off of Harvard university. Main catalog, contact page, and then asking people what do you think of this? This person, that person. And off they go, trying to rate them. Yeah. Yeah. All that matters to a woman, at least to Courtney, to mark Zuckerberg girl, all the matters about a woman is how she looks. Do I think she's pretty or not? [00:05:15] It's ridiculous. What he was doing. It just, oh, that's zackerburg who he is not a great guy anyways. So you go from stealing pictures of young ladies asking people to rate them, putting together some class information and stuff there at Harvard, and then moving on to other universities and then open it up even wider and wider. [00:05:42] And of course, that also created demand because you can't get on. If you're not at one of the universities that we have set it up for. And then you continue to grow. You're adding these universities, certainly starting to collect data and you are making more money than God. So what do you do? You don't have to worry about any efficiencies. [00:06:02] I'll tell you that. Right? One thing you don't have to do is worry about gee. We've got a lot of redundant work going on here. We've got a lot of teams working on basically the same thing. No, you've got more money than you can possibly shake a stick at. So now you go ahead and send that money to this group or that group. [00:06:24] And they put together all of the basic information, that they want. Pulling it out of this database and that database in there doing some correlation, writing some really cool CQL queries with mem credible joins and everything else. And now that becomes part of the main code for Facebook. [00:06:45] And then Facebook goes on to the next little project and they do the same thing. Then the next project, then the next project. And then someone comes along and says, Hey, we. This feature, that feature for advertisers and then in that goes, and then along comes candidate Obama. And they, one of the groups inside Facebook says, yeah here we go. [00:07:09] Here's all of the information we have about everybody and it's free. Don't worry about it. And then when Trump actually bought it and hired a company to try and process some of that information he got in trouble. No but the. The whole campaign could get access to anything they wanted to, again, because the data wasn't controlled, they had no idea who was doing what with the data. [00:07:34] And according to this internal memo, they still don't know. They don't even know if they can possibly comply with these regulations, not just in Europe, but we have regulations in pretty much all of the 50 states in the U S Canada of course, has their own Australia and New Zealand think about all the places. [00:07:57] Facebook makes a lot of. So here's a quote from that we build systems with open borders. The result of these open systems and open culture is well-described with an analogy. Imagine you hold a bottle of ink in your hand, the bottle of ink is a mixture of all kinds of user data. You pour that ink into a lake of water and K and it flows every year. [00:08:22] The document read. So how do you put that ink back in the bottle? I, in the right bottle, how do you organize it again? So that it only flows to the allowed places in the lake? They're totally right about that. Where did they collect it from? Apparently they don't even know where they got some of this information. [00:08:43] This data from reminds me of the no fly list. You don't know you're on it and you can't get yourself off of it. It's crazy. So this document that we're talking about, it was written last year by. Privacy engineers on the ad and business product team, whose mission is to make meaningful connections between people and businesses and which quote sits at the center of our monetization strategy. [00:09:06] And is the engine that powers Facebook's growth. Interesting. Interesting problems. And I see this being a problem well into the future for more and more of these companies, look at Twitter as an example that we've all heard about a lot lately. And then I've talked about as well along comes Elon Musk and he says wait a minute. [00:09:29] I can make Twitter way more profitable. We're going to get rid of however many people over a thousand, and then we are going to hire more people. We're going to start charging. We're going to be more efficient. You can bet all of these redundancies that are in Facebook are also there. And Twitter also has to comply with all of these regulations that Facebook is freaking out about it for a really a very good reason. [00:10:00] So this document is available to anybody who wants to look at it. I'm looking at it right now, talking about regulatory landscape and the fundamental problems Facebook's data lake. And this is a problem that most companies have not. As bad as Facebook does the button. Most companies you write, you grow. I have yet to walk into a business that needs help with cybersecurity and find everything in place as it should be because it grew organically. [00:10:32] Do you started out with a little consumer firewall router, wifi, and then you added to it and you put a switch here and you added another switch behind that and move things around. This is normal. This is not total incompetence on the part of the management, but my gosh, I don't know. Maybe they need an Elon Musk. [00:10:52] Just straighten them out as well. Hey, stick around. I'll be right back and sign up email@example.com. [00:11:02] Apparently looting is one of the benefits of being a Russian soldier. And according to the reports coming out of Ukraine, they've been doing it a lot, but there's a tech angle on here that is really turning the tables on these Russian Looters. [00:11:19] We know in wars, there are people that loot and typically the various militaries try and make sure, at least recently that looting is kept to an absolute minimum. [00:11:32] Certainly the Americans, the British, even the Nazis during world war II the the socialists they're in. Germany they tried to stop some of the looting that was going on. I think that's probably a very good thing, because what you end up with is just all of these locals that are just totally upset with you. [00:11:57] I found a great article on the guardian and there's a village. I hadn't been occupied for about a month by Russian troops and the people came back. They are just shocked to see what happened in there. Giving a few examples of different towns. They found that the alcohol was stolen and they left empty bottles behind food wrappers, cigarette butts, thrown all over the place in apartments in the home. [00:12:26] Piles of feces blocking the toilets, family photographs torn, thrown around the house. They took away all of the closes as a code from one of the people, literally everything, male and female coats, boots, shirts, jackets, even my dresses and laundry. This is really something. The Sylvia's didn't do this, but now Russia. [00:12:49] The military apparently does. So over the past couple of weeks, there have been reporting from numerous places where Russian troops had occupied Ukrainian territory and the guardian, which is this UK newspaper collected evidence to suggest looting by Russian forces was not merely a case of a few way, word soldiers, but a systematic part of Russian military behavior across multiple towns. [00:13:17] And villages. That's absolutely amazing. Another quote here, people saw the Russian soldiers loading everything onto your old trucks. Everything they could get their hands on a dozen houses on the villages. Main street had been looted as well as the shops. Other villagers reported losing washing machines, food laptops, even as sofa, air conditioner. [00:13:41] Being shipped back, just you might use ups here or they have their equivalent over there. A lady here who was the head teacher in the school, she came back in, of course, found her home looted and in the head teacher's office. She found an open pair of scissors that had been jammed into a plasma screen that was left behind because if they can't steal it, they're going to destroy it. [00:14:07] They don't wanna leave anything behind. They found the Russian to take in most of the computers, the projectors and other electronic equipment. It's incredible. So let's talk about the turnaround here. You might've heard stories about some of these bad guys that have smashed and grabbed their way into apple stores. [00:14:27] So they get into the apple store. They grab laptops on iPads, no longer iPods, because they don't make those anymore. And I phone. And they take them and they run with them. Nowadays there's not a whole lot of use for those. Now what they have been doing, some of these bad guys is they'd take some parts and use them in stolen equipment. [00:14:52] They sell them on the used market, et cetera. But when you're talking about something specific, like an iPhone that needs specific activation. Completely different problem arises for these guys because that iPhone needs to have a SIM card in order to get onto the cell network. And it also has built in serial numbers. [00:15:15] So what happens in those cases while apple goes ahead and disables them. So as soon as they connect to the internet, they didn't say they put them on wifi. They don't get a SIM card. They don't. Service from T-Mobile or Verizon or whoever it might be. So now they just connect to the wifi and it calls home. [00:15:33] Cause it's going to get updates and download stuff from the app store and they find that it's been bricked. Now you can do that with a lot of mobile device managers that are available for. All kinds of equipment nowadays, but certainly apple equipment where if a phone is lost or stolen or a laptop or other pieces of equipment, you can get on the MDM and disable it, have it remotely erase, et cetera. [00:16:00] Now, please have had some interesting problems with that. Because a bad guy might go ahead and erase a smartphone. That's in the evidence locker at the police station. So they're doing things like putting them into Faraday cages or static bags or other things to try and stop that. So I think we've established here that the higher tech equipment is pretty well protected. [00:16:25] You steal it. It's not going to do you much. Good. So one of the things the Russian stole when they were in a it's called a, I think you pronounced. Melad Mellott DePaul which is again, a Ukrainian city is they stole all of the equipment from a farm equipment dealership and shipped it to check. Now that's according to a source in a businessman in the area that CNN is reporting on. [00:16:56] So they shipped this equipment. We're talking about combine harvesters were 300 grand a piece. They shipped it 700 miles. And the thieves were ultimately unable to use the equipment because it had been locked remotely. So think about agriculture equipment that John Deere, in this case, these pieces of equipment, they, they drive themselves. [00:17:23] It's atonomous it goes up and down the field. Goes to any pattern that you want to it'll bring itself within a foot or an inch of your boundaries, of your property being very efficient the whole time, whether it's planting or harvesting, et cetera. And that's just a phenomenal thing because it saves so much time for the farmer makes it easier to do the companies like John Deere. [00:17:49] Want to sell as many pieces of this equipment as they possibly can. And farming is known to be a what not terribly profitable business. And certainly isn't like Facebook. So how can they get this expensive equipment into the hands of a lot of farmers? What they do is they use. So you can lease the equipment through leasing company or maybe directly from the manufacturer and now you're off and running. [00:18:16] But what happens if the lease isn't paid now? It's one thing. If you don't pay your lease on a $2,000 laptop, right? They're probably not going to come hunting for you, but when you're talking about a $300,000 harvester, they're more interested. So the leasing company. Has titled to the equipment and the leasing company can shut it off remotely. [00:18:41] You see where I'm going with this so that they can get their equipment in the hands of more farmers because the farmers can lease it. It costs them less. They don't have to have a big cash payment. You see how this all works. So when the Russian forces stole this equipment, that's valued, total value here is about $5 million. [00:19:02] They were able to shut it all off. And th the, obviously if you can't start the engine, because it's all shut off and it's all run by computers nowadays, and there's pros and cons to that. I think there's a lot of cons, but what are you going to do? How's that going to work for? Isn't going to work for you. [00:19:22] And they were able to track it and had GPS trackers find out exactly where it was. That's how they know it was Tara taken to Chechnya and could be controlled remotely. And in this case, how did they control it? They completely. Shut it off, even if they sell the harvesters for spare parts to learn some money, but they sure aren't gonna be able to sell them for the 300 grand that they were actually worth. [00:19:48] Hey, stick around. We'll be right back and visit me firstname.lastname@example.org. If you sign up there, you'll be able to get my insider show notes. And every week I have a quick. Training right there. New emails, Craig Peterson.com. [00:20:05] If you've been worried about ransomware, you are right to worry. It's up. It's costly. And we're going to talk about that right now. What are the stats? What can you do? What happens if you do get hacked? Interesting world! [00:20:20] Ransomware has been a very long running problem. I remember a client of ours, a car dealership who we had gone in. [00:20:31] We had improved all of their systems and their security, and one of them. People who was actually a senior manager, ended up downloading a piece of ransomware, one of these encrypted ones and opened it up and his machine all of a sudden, guess what it had ransomware on it. One of those big. Green's that say, pay up and send us this much Bitcoin, and here's our address. [00:21:00] All of that sort of stuff. And he called us up and said, what's going on here? What happened? First of all, don't bring your own machine into the office. Secondly, don't open up as particularly encrypted files using a password that they gave. And thirdly, we stopped it automatically. It did not spread. [00:21:20] We were able to completely restore his computer. Now let's consider here the consequences of what happened. So he obviously was scared. And within a matter of a couple of hours, we actually had him back to where he was and it didn't spread. So the consequences there, they weren't that bad. But how about if it had gotten worse? [00:21:47] How about if the ransomware. Also before it started holding his computer ransom, went out and found all of the data about their customers. What do you think an auto dealership would love to hear that all of their customer data was stolen and released all of the personal data of all of their customers? [00:22:08] Obviously not. So there's a potential cost there. And then how long do you think it would take a normal company? That thinks they have backups to get back online. All I can tell you it'll take quite a while because the biggest problem is most backups don't work. We have yet to go into a business that was actually doing backups that would work to help restore them. [00:22:35] And if you're interested, I can send you, I've got something I wrote up. Be glad to email it back to you. Obviously as usual, no charge. And you'll be able to go into that and figure out what you should do. Cause I, I break it down into the different types of backups and why you might want to use them or why you might not want to use them, but ransomware. [00:22:58] Is a kind of a pernicious nasty little thing, particularly nowadays, because it's to two factor, first is they've encrypted your data. You can't get to it. And then the second side of that is okay I can't get to my data and now they're threatening to hold my data ransom or they'll release. So they'll put it out there. [00:23:22] And of course, if you're in a regulated industry, which actually car dealers are because they deal with financial transactions, leases, loans, that sort of thing you can lose your license for your business. You can, you lose your ability to go ahead and frankly make loans and work with financial companies and financial instruments. [00:23:45] It could be a very big. So there are a lot of potential things that can happen all the way from losing your reputation as a business or an individual losing all of the money in your operating account. And again, we've got a client that we picked up afterwards. That yes, indeed. That lost all of the money in their operating account. [00:24:09] And then how do you make payroll? How do you do things? There's a new study that came out from checkpoint. Checkpoint is one of the original firewall companies and they had a look at ransomware. What are the costs of ransomware? Now bottom line, I'm looking at some stats here on a couple of different sites. [00:24:29] One is by the way, Conti, which is a big ransomware gang that also got hacked after they said we are going to attack anyone. That doesn't defend Plaid's invasion of Ukraine, and then they got hacked and their information was released, but here's ransomware statistics. This is from cloud words. First of all, the largest ransom demand is $50 million. [00:24:55] And that was in 2021 to Acer big computer company. 37% of businesses were hit by ransomware. In 2021. This is amazing. They're expecting by 2031. So in about a decade, ransomware is going to be costing about $265 billion a year. Now on average. Ransomware costs businesses. 1.8, $5 million to recover from an attack. [00:25:25] Now that's obviously not a one or two person place, but think of the car dealer again, how much money are they going to make over the year or over the life of the business? If you're a car dealer, you have a license to print money, right? You're selling car model or cars from manufacturers. And now you have the right to do that and they can remove that. [00:25:48] How many tens, hundreds of millions of dollars might that end up costing you? Yeah. Big deal. Total cost of ransomware last year, $20 billion. Now these are the interesting statistics here right now. So pay closer attention to this 32% of ransomware victims paid a ransom. So about a third Peter ransom demand. [00:26:12] Lastly. It's actually down because my recollection is it used to be about 50% would pay a ransom. Now on average that one third of victims that paid a ransom only recovered 65% of their data. Now that differs from a number I've been using from the FBI. That's a little bit older that was saying it ends it a little better than 50%, but 65% of pain victims recovered their. [00:26:41] Now isn't that absolutely amazing. Now 57% of companies were able to recover their data, using a cloud backup. Now think about the different types of backup cloud backup is something that can work pretty well if you're a home user, but how long did it take for your system to get back? Probably took weeks, right? [00:27:05] For a regular computer over a regular internet line. Now restoring from backups is going to be faster because your downlink is usually faster than your uplink. That's not true for businesses that have real internet service like ours. It's the same bandwidth up as it is down. But it can take again, days or weeks to try and recover your machine. [00:27:28] So it's very expensive. And I wish I had more time to go into this, but looking at the costs here and the fact that insurance companies are no longer paying out for a lot of these ransomware attacks, it could be credibly expensive for you incredibly. The number one business types by industry for ransomware attacks, retail. [00:27:59] That makes sense. Doesn't it. Real estate. Electrical contractors, law firms and wholesale building materials. Isn't that interesting? And that's probably because none of these people are really aware or conscious of doing what a, of keeping their data secure of having a good it team, a good it department. [00:28:24] So there's your bottom line. Those are the guys that are getting hit. The most, the numbers are increasing dramatically and your costs are not just in the money. You might pay as a ransom. And as it turns out in pretty much every case prevention. Is less expensive and much better than the cure of trying to pay ransom or trying to restore from backups. [00:28:52] Hey, you're listening to Craig Peterson. You can get my weekly show notes by just going to craig peterson.com. [00:29:00] You and I have talked about passwords before the way to generate them and how important they are. We'll go over that again a little bit in just a second, but there's a new standard out there that will eliminate the need for passwords. [00:29:16] Passwords are a necessary evil, at least they have been forever. I remember, I think the only system I've ever really used that did not require passwords was the IBM 360. [00:29:31] Yeah, 360, you punch up the cards, all of the JCL you feed the card deck in and off it goes. And does this little thing that was a different day, a different era. When I started in college in university, we. We had a remote systems, timeshare systems that we could log into. And there weren't much in the line of password requirements. [00:29:58] And, but you had a username, you had a simple password. And I remember one of our instructors, his name was Robert, Andrew Lang, and his password was always some sort of a combination of RA Lang. So it was always easy to guess what his password was. Today. It has gotten a lot worse today. We have devices with us all the time. [00:30:22] You might be wearing a smart watch. That requires a password. You course probably have a smartphone that also maybe requiring a password. Certainly after it boots nowadays they use fingerprints or facial recognition, which is handy, but it has its own drawbacks. But how about the websites? You're going to the systems you're using in you're at work and logging in. [00:30:49] They all require password. And usernames of some sort or another well, apple, Google, and Microsoft have all committed to expanding their support for a standard. That's actually been out there for a few years. It's called the Fido standard. And the idea behind this is that you don't have to have a password in order to. [00:31:15] Now that's really an interesting thing, right? Just looking at it because we're so used to have in this password only authenticate. And of course the thing to do there is to make sure you have for your password, multiple words in the password, it should really be a pass phrase. And between the words put in special characters or numbers, maybe. [00:31:41] Upper lower case a little bit. In those words, those are the best passwords, 20 characters, 30 characters long. And then if you have to have a pin, I typically use a 12 digit pin. And how do I remember all of these? Cause I use a completely different password for every website and right now, Let me pull it up. [00:32:03] I'm using one password dot coms, password manager. And my main password for that is about 25 characters long. And I have thirty one hundred and thirty five. And trees here in my password manager, 3,100, that is a whole lot of passwords, right? As well as software licenses and a few other things in there. [00:32:30] That's how we remember them is using a password manager. One password.com is my favorite. Now, obviously I don't make any money by referring you there. I really do like that. Some others that I've liked in the past include last pass, but they really meant. With some of their cybersecurity last year and I lost my faith in it. [00:32:51] So now what they're trying to do is make these websites that we go to as well as some apps to have a consistent, secure, and passwordless. And they're going to make it available to consumers across all kinds of devices and platforms. That's why you've got apple, Google, and Microsoft all committing to it. [00:33:15] And you can bet everybody else is going to follow along because there's hundreds of other companies that have decided they're going to work with the Fido Alliance and they're going to create this passwordless future. Which I like this idea. So how does this work? Basically you need to have a smartphone. [00:33:33] This is, I'm just going to go with the most standard way that this is going to work here in the future, and you can then have. Passkey, this is like a multi-factor authentication or two factor authentication. So for instance, right now, when I sign into a website online, I'm giving a username, given a password, and then it comes up and it asks me for a code. [00:33:57] So I enter in a six digit code and that code changes every 30 seconds. And again, I use my password manager from one password. In order to generate that code. So that's how I log into Microsoft site and Google sites and all kinds of sites out there. So it's a similar thing here now for the sites for my company, because we do cyber security for businesses, including regulated businesses. [00:34:24] We have biometrics tied in as. So to log into our systems, I have to have a username. I have to have a password. I then am sent to a single sign-on page where I have to have a message sent to my smart device. That then has a special app that uses biometrics either a face ID or a fingerprint to verify who I am. [00:34:49] Yeah, there's a lot there, but I have to protect my customers. Something that very few it's crazy. Actual managed security services providers do, but it's important, right? By the way, if you want my password. Special report, just go to Craig peterson.com. Sign up for my email list. I'll send that to you. [00:35:13] That's what we're sending out right now for anyone who signs up email@example.com. And if you'd like a copy of it in you're already on the list, just go ahead and email me. At Craig peterson.com and ask for the password special report where I go through a lot of this sort of thing. So what will happen with this is you go to a website and I might come up with a QR code. [00:35:37] So you then scan that QR code with your phone and verify it, authorize it on your phone. You might again to have it set up so that your phone requires a facial recognition or perhaps it'll require a fingerprint. And now you are. Which is very cool. They fix some security problems in Fido over the last few years, which is great over the coming year. [00:36:02] You're going to see this available on apple devices, Google Microsoft platforms, and it really is simple, stronger authentication. That's sort of Fido calls it. But it is going to make your life a lot easy, easier. It is a standard and the passwordless future makes a whole lot of sense for all of us. Now, I want to talk about another thing here that just bothered me for a long time. [00:36:30] I have a sister. Who is in the medical field and gives prescriptions, doctor thing. And I think she's not quite a doctor. I can't remember what she has. She's an LPN or something. And anyhow, so she. We'll get on a zoom call with someone and they'll go through medical history and what's happening right now and she'll make prescriptions. [00:36:57] And so I warned her about that saying, it is very bad to be using zoom because zoom is not secure. Never has been, probably never will be right. If you want secure. To go and pay for it from one of these providers like WebEx, that's what we use. We have a version of WebEx that is set up to be secure. [00:37:20] So I talked to her about that and said, Hey, listen, you can't do this. You've really got to go another way here. And so she started using one of these mental or. Medical health apps. What I want to talk about right now specifically are some checks that were just performed some audits on mental health apps. [00:37:45] That's why I messed up a second ago, but what they looked at is that things are a serious problem there. And then fact, the threat post, just calling it a. Frankly, just plain old creepy. So they've got some good intentions. They want to help with mental health. You've probably seen these or at least heard them advertise. [00:38:06] So you can get on the horn with a mental health professional, a doctor or otherwise in order to help you here with your psychological or spiritual wellness. And people are sharing their personal and sensitive data with third parties and have 32 mental health and prayer mobile apps that were investigated by the open source organization. [00:38:32] 28, 28 of the 32 were found to be inherently insecure and were given a privacy not included label, including others here. So this is a report. That was released here by the open source organization, tied into Mozilla. Those are the Firefox people. They have what they call their minimum security standards. [00:38:56] So things like requiring strong passwords, managing security, updates, and vulnerabilities, et cetera. 25 of the 32 failed to meet. Even those minimum security standards. So these apps are dealing with some of the most sensitive mental health and wellness issues people can possibly have, right? Depression, anxieties, suicidal fonts, domestic violence, eating disorders. [00:39:23] And they are being just terrible with your security Mozilla researchers spent 255 hours or about eight hours per product pairing under the hood of the security, watching the data that was going back and forth, right between all of these mental health and prayer apps. It was just crazy. So for example, eight of the apps reviewed, allowed weak passwords, that range. [00:39:52] One digit one as the password to 1, 1, 1, 1, while a mental health app called a mood fit only required one letter or digit as a password. Now that is very concerning for an app that collects mood and symptom data. So be very careful. Two of the apps better help a popular app that connects users with therapists and better stop suicide, which is a course of suicide prevention app have vague and messy, according to Mozilla privacy policies that have little or no effect on actual. [00:40:30] User data protection. So be very careful. And if you're a mental health, professional or medical professional, don't just go and use these open video calls, et cetera, et cetera, find something good. And there are some standards out there. Again. Visit me online, get my insider show notes every week. Get my little mini trends. [00:40:56] And they come up most weeks. Just go to Craig peterson.com. And I'll send you my special report on passwords and more. [00:41:06] We know the Russians have been attacking us. I've talked a lot about it on the radio station, all kinds of stations. In fact, here over the last couple of weeks, and I am doing something special, we are going through the things you can do to keep safe. [00:41:23] Last week we started doing something I promise we would continue. [00:41:27] And that is how can you protect yourself when it comes to the Russians, right? When it comes to the bad guys, because the Russians are definitely the bad guys. There's a few things you can do. And there's a few things, frankly, you shouldn't be doing. And that's exactly what we're going to talk about right now. [00:41:45] So last week he went over some steps, some things that you can look at that you should look at that are going to help protect you. And we are going to go into this a whole lot more today. And so I want you to stick around and if you miss anything, you can go online. You can go to Craig peterson.com, make sure you sign up there for my email. [00:42:08] And what I'm going to do for you is. Send you a few different documents now where we can chat back and forth about it, but I can send you this. Now I'm recording this on video as well as on audio. So you can follow along if you're watching either on YouTube or. Over on rumble and you can find it also on my website. [00:42:32] I've been trying to post it up there too, but right now let's talk about what we call passive backend protections. So you've got the front end and the front end of course, is. Stuff coming at you, maybe to the firewall I've mentioned last week about customers of mine. I was just looking at a few customers this week, just so I could have an idea of their firewalls. [00:42:59] And they were getting about 10 attacks per minute. Yeah. And these were customers who have requirements from the department of defense because they are defense sub subcontractors. So again, Potential bad guys. So I looked up their IP addresses and where the attacks were coming from. Now, remember that doesn't mean where they originated because the bad guys can hop through multiple machines and then get onto your machine. [00:43:28] What it means is that all, ultimately they ended up. Coming from one machine, right? So there's an IP address of that machine. That's attacking my clients or are attacking my machines. That just happens all the time. A lot of scans, but some definite attacks where they're trying to log in using SSH. [00:43:48] And what I found is these were coming from Slovakia, Russia, and Iran. Kind of what you were expecting, right? The Iranians, they just haven't given up yet. They keep trying to attack, particularly our military in our industry. One of the things we found out this week from, again, this was an FBI notice is that the Russians have been going after our industrial base. [00:44:15] And that includes, in fact, it's more specifically our automobile manufacturers we've already got problems, right? Try buying a new car, try buying parts. I was with my friend, just this. I helped them because he had his car right. Need to get picked up. So I took him over to pick up his car and we chatted a little bit with this small independent automotive repair shop. [00:44:40] And they were telling us that they're getting sometimes six, eight week delays on getting parts and some parts. They just can't. So they're going to everything from junkyards on out, and the worst parts are the parts, the official parts from the car manufacturers. So what's been happening is Russia apparently has been hacking into these various automobile manufacturers and automobile parts manufacturers. [00:45:10] And once they're inside, they've been putting in. A remote control button net. And those botnets now have the ability to wake up when they want them to wake up. And then once they've woken up, what do they do? Who knows? They've been busy erasing machines causing nothing, but having they've been doing all kinds of stuff in the past today, they're sitting there. [00:45:31] Which makes you think they're waiting, it's accumulate as much as you possibly can. And then once you've got it all accumulated go ahead and attack. So they could control thousands of machines, but they're not just in the U S it's automobile manufacturers in Japan. That we found out about. [00:45:50] So that's what they're doing right now. So you've got the kind of that front end and back end protections. So we're going to talk a little bit about the back end. What does that mean? When a cybersecurity guy talks about the backend and the protections. I got it up on my green right now, but here's the things you can do. [00:46:10] Okay. Remember, small businesses are just getting nailed from these guys, because again, they're fairly easy targets. One change your passwords, right? How many times do we have to say that? And yet about 70% of businesses out there are not using a good password methodology. If you want more information on passwords, two factor authentication, you name it. [00:46:37] Just email me M firstname.lastname@example.org. I want to get the information out now. You got to make sure that all of the passwords on your systems are encrypted are stored in some sort of a good password vault as you really should be looking at 256 bit encryption or better. I have a vendor of. That I use. So if you get my emails every week, when them, there's the little training. [00:47:06] And so I'll give you a five minute training. It's written usually it's in bullet point for, I'm just trying to help you understand things. That provider of mine has a big database and there's another provider that I use that is for. So the training guys use the database of my provider. [00:47:27] In using that database, they're storing the passwords and the training providers putting passwords in the clinics. Into the database, which is absolutely crazy. So again, if you're a business, if you're storing any sort of personal information, particularly passwords, make sure that you're using good encryption and your S what's called salting the hash, which means. [00:47:53] You're not really storing the password, just joining assaulted hash. I can send you more on this. If you are a business and you're developing software that's, this is long tail stuff here. Configure all of the security password settings so that if someone's trying to log in and is failing that, and you block it, many of us that let's say you're a small business. [00:48:15] I see this all of the time. Okay. You're not to blame. You, but you have a firewall that came from the cable company. Maybe you bought it at a big box retailer. Maybe you bought it online over at Amazon, as hurricane really great for you. Has it got settings on there that lets you say. There's 20 attempts to log in. [00:48:38] Maybe we should stop them. Now, what we do personally for our customers is typically we'll block them at somewhere around three or four failed attempts and then their passwords block. Now you can configure that sort of thing. If you're using. Email. And that's an important thing to do. Let me tell you, because we've had some huge breaches due to email, like Microsoft email and passwords and people logging in and stealing stuff. [00:49:06] It was just a total nightmare for the entire industry last year, but limit the number of login retries as well as you're in there. These excessive login attempts or whatever you want to define it as needs to lock the account. And what that means is even if they have the right password, they can't get in and you have to use an administrative password in order to get in. [00:49:31] You also want to, what's called throttle, the rate of repeated logins. Now you might've gotten caught on this, right? You went to your bank, you went to E-bay, you went to any of these places and all of a sudden. And denied you write it blocked you. That can happen when your account is on these hackers lists. [00:49:51] You remember last week we talked about password spraying while that's a very big deal and hackers are doing the sprain trick all of the time, and that is causing you to get locked out of your own account. So if you do get locked out, remember it might be because someone's trying to break. Obviously you have to enforce the policies. [00:50:16] The capture is a very good thing. Again, this is more for software developer. We always recommend that you use multifactor or two factor authentication. Okay. Do not use your SMS, your text messages for that, where they'll send you a text message to verify who you are. If you can avoid that, you're much better off. [00:50:36] Cause there's some easy ways to get around that for hackers that are determined. Okay. A multi-factor again, installed an intrusion. system. We put right at the network edge and between workstations and servers, even inside the network, we put detection systems that look for intrusion attempts and block intrusion attempts. [00:51:02] A very important use denied lists to block known attackers. We build them automatically. We use some of the higher end Cisco gates. Cisco is a big network provider. They have some of the best hardware and software out there, and you have to subscribe to a lot of people complain. I ain't going to just go buy a firewall for 200 bucks on Amazon. [00:51:24] Why would I pay that much a month just to to have a Cisco firewall? And it's like praying pain for the brand. I've got by logo chert on here. Oh, I wouldn't pay for that. No, it's because they are automatically providing block lists that are updated by the minute sometimes. And then make sure you've got an incident response plan in place. [00:51:50] What are you going to do when they come for you? What are you going to do? [00:51:55] Now we're going to talk about prevention. What can you do an order to stop some of these attacks that are coming from Russia and from other countries, it is huge. People. Believe me, this is a very big problem. And I'm here to help. [00:52:12] We've reviewed a number of things that are important when it comes to your cyber security and your protection. [00:52:20] We talked about the front end. We talked about the backend. Now we're going to talk about pure prevention and if you're watching. Online. You'll be able to see my slides as they come up, as we talk about some of this stuff and you'll find me on YouTube and you'll also find me on rumble, a fairly new platform out there platform that doesn't censor you for the things you say. [00:52:44] Okay. So here we go. First of all, enabling your active directory password protection is going to. Four's password protection all the way through your business. Now I've had some discussions with people over the months, over the years about this whole thing and what should be done, what can be done, what cannot be done. [00:53:09] Hey, it's a very big deal when it comes to password protection and actor directory, believe it or not, even though it's a Microsoft product is pretty darn good at a few things. One of them is. Controlling all the machines and the devices. One of the things we do is we use an MDM or what used to be a mobile device manager called mass 360. [00:53:34] It's available from IBM. We have a special version of that allows us as a managed security services provider to be able to control everything on people's machines. Active directory is something you should seriously consider. If you are a Mac based shop. Like I am. In fact, I'm sitting right now in front of two max that I'm using right now, you'll find that active directory is a little bit iffy. [00:54:04] Sometimes for max, there are some work around and it's gotten better mastery. 60 is absolutely the way to go, but make sure you've got really good. Passwords and the types of passwords that are most prone to sprain the attacks are the ones you should be banning specifically. Remember the website? Have I been poned? [00:54:28] Yeah. It's something that you should go to pretty frequently. And again, if you miss anything today, just email me M email@example.com. Believe me, I am not going to harass you at all. Okay. Now, the next thing that you should be doing is what's called red team blue team. Now the red team is a group of people, usually outside of your organization. [00:54:54] If you're a big company they're probably inside, but the red team is the team that attacks you. They're white hat hackers, who are attacking you, looking for vulnerabilities, looking for things that you should or shouldn't be doing. And then the blue team is the side that's trying to defend. So think of, like war games. [00:55:12] Remember that movie with Matthew Broderick all of those decades ago and how the, he was trying to defend that computer was trying to defend that it moved into an attack mode, right? Red team's attack, blue team is defend. So you want. To conduct simulated attacks. Now w conducting these attacks include saying, oh my let's now put in place and execute our plan here for what are we going to do once we have a. [00:55:44] And you darn well better have a breach plan in place. So that's one of the things that we help as a fractional chief information security officer for companies, right? You've got to get that in place and you have to conduct these simulated attacks and you have to do penetration testing, including password spraying attacks. [00:56:04] There's so many things you can do. The one of the things that we like to do and that you might want to do, whether you're a home user, retiree or a business is go and look online, you can just use Google. I use far more advanced tools, but you can use Google and look for your email address right there. [00:56:23] Look for the names of people inside your organization. And then say wait a minute, does that data actually need to be there? Or am I really exposing the company exposing people's information that shouldn't be out there because you remember the hackers. One of the things they do is they fish you fish as in pH. [00:56:47] So they'll send you an email that looks like. Hey let me see. I know that Mary is the CFO, and I know that Joe's going to be out of town for two weeks in The Bahamas, not a touch. So while he's got. I'm going to send an email to Mary, to get her to do something, to transfer the company's funds to me. [00:57:06] Okay. So that's what that's all about. You've got to make sure, where is our information? And if you go to my company's page, mainstream.net, you'll see on there that I don't list any of the officers or any of the people that are in the company, because that again is a security problem. [00:57:24] We're letting them know. I go to some of these sites, like professional sites lawyers, doctors, countenance, and I find right there all, are there people right there top people or sometimes all of them. And then we'll say, yeah, I went to McGill university, went to Harvard, whatever my B. It's all there. So now they've got great information to fish you, to fish that company, because all they have to do is send an email to say, Hey, you remember me? [00:57:56] We're in Harvard when this class together. And did you have as a professor to see how that works? Okay. You also want to make. That you implement, what's called a passwordless user agent, and this is just so solely effective. If they cannot get into your count, what's going to, what could possibly go wrong, but one of the ways to not allow them into the count is to use. [00:58:24] Biometrics. We use something called duo and we have that tied into the single sign-on and the duo single sign-on works great because what it does now is I put in, I go to a site, I put it into my username and. Pulls up a special splash page that is running on one of our servers. That again asks me for my duo username. [00:58:48] So I've got my username for the site then to my dual username and my duo password single sign on. And then it sends me. To an app on my smart device, a request saying, Hey, are you trying to log into Microsoft? And w whatever it might be at Microsoft, and you can say yes or no, and it uses biometric. [00:59:11] So those biometrics now are great because it says, oh, okay, I need a face ID or I need a thumb print, whatever it might be that allows a generalized, a password, less access. Okay. Password less. Meaning no pass. So those are some of the top things you can do when it comes to prevention. And if you use those, they're never going to be able to get at your data because it's something you have along with something, it works great. [00:59:45] And we like to do this. Some customers. I don't like to go through those hoops of the single sign-on and using duo and making that all work right where we're fine with it. We've got to keep ourselves, at least as secure as the DOD regulations require unlike almost anybody else in industry, I'm not going to brag about it. [01:00:09] But some of our clients don't like to meet the tightest of controls. And so sometimes they don't. I hate to say that, but they just don't and it's a fine line between. Getting your work done and being secure, but I think there's some compromises it can be readily made. We're going to talk next about saving your data from ransomware and the newest ransomware. [01:00:36] We're going to talk about the third generation. That's out there right now. Ransomware, it's getting crazy. Let me tell ya and what it's doing to us and what you can do. What is a good backup that has changed over the last 12 months? It's changed a lot. I used to preach 3, 2, 1. There's a new sheriff in town. [01:00:58] Stick around Craig peterson.com. [01:01:02] 3, 2, 1 that used to be the standard, the gold standard for backing up. It is no longer the case with now the third generation of ransomware. You should be doing something even better. And we'll talk about it now. [01:01:19] We're doing this as a simulcast here. It's on YouTube. It is also on rumble. [01:01:27] It's on my firstname.lastname@example.org because we're going through the things that you can do, particularly if you're a business. To stop the Russian invasion because as we've been warned again and again, the Russians are after us and our data. So if you missed part of what we're talking about today, or. [01:01:50] Last week show, make sure you send me an email. email@example.com. This is the information you need. If you are responsible in any way for computers, that means in your home, right? Certainly in businesses, because what I'm trying to do is help and save those small businesses that just can't afford to have full-time. [01:02:15] True cyber security personnel on site. So that's what the whole fractional chief information security officer thing is about. Because you just, you can't possibly afford it. And believe me, that guy that comes in to fix your computers is no cyber security expert. These people that are attacking our full time cybersecurity experts in the coming from every country in the world, including the coming from the us. [01:02:44] We just had more arrests last week. So let's talk about ransomware correctly. Ransomware, very big problem. Been around a long time. The first version of ransomware was software got onto your computer through some mechanism, and then you had that red screen. We've all seen that red screen and it says, Hey, pay up buddy. [01:03:07] It says here you need to send so many Bitcoin or a fraction of a Bitcoin or so many dollars worth of Bitcoin. To this Bitcoin wallet. And if you need any help, you can send email here or do a live chat. They're very sophisticated. We should talk about it some more. At some point that was one generation. [01:03:29] One generation two was not everybody was paying the ransoms. So what did they do at that point? They said let me see if they, we can ransom the data by encrypting it and having them pay us to get it back. 50% of the time issue got all your data back. Okay. Not very often. Not often enough that's for sure. [01:03:49] Or what we could do is let's steal some of their intellectual property. Let's steal some of their data, their social security number, their bank, account numbers, et cetera. They're in a, in an Excel spreadsheet on their company. And then we'll, if they don't pay that first ransom, we'll tell them if they don't pay up, we'll release their information. [01:04:10] Sometimes you'll pay that first ransom and then they will hold you ransom a second time, pretending to be a different group of cyber terrorists. Okay. Number three, round three is what we're seeing right now. And this is what's coming from Russia, nears, everything we can tell. And that is. They are erasing our machines. [01:04:31] Totally erasing them are pretty sophisticated ways of erasing it as well, so that it sinks in really, it's impossible to recover. It's sophisticated in that it, it doesn't delete some key registry entries until right at the very end and then reboots and computer. And of course, there's. Computer left to reboot, right? [01:04:55] It's lost everything off of that hard drive or SSD, whatever your boot devices. So let's talk about the best ways here to do some of this backup and saving your data from ransomware. Now you need to use offsite disconnected. Backups, no question about it. So let's talk about what's been happening. [01:05:17] Hospitals, businesses, police departments, schools, they've all been hit, right? And these ransomware attacks are usually started by a person. I'll link in an email. Now this is a poison link. Most of the time, it used to be a little bit more where it was a word document, an Excel document that had something nasty inside Microsoft, as I've said, many times has truly pulled up their socks. [01:05:45] Okay. So it doesn't happen as much as it used to. Plus with malware defender turned on in your windows operating system. You're going to be a little bit safer next step. A program tries to run. Okay. And it effectively denies access to all of that data. Because it's encrypted it. And then usually what it does so that your computer still works. [01:06:09] Is it encrypts all of you, like your word docs, your Excel docs, your databases, right? Oh, the stuff that matters. And once they've got all of that encrypted, you can't really access it. Yeah. The files there, but it looks like trash now. There's new disturbing trends. It has really developed over the last few months. [01:06:31] So in addition to encrypting your PC, it can now encrypt an entire network and all mounted drives, even drives that are marrying cloud services. Remember this, everybody, this is really a big deal because what will happen here is if you have let's say you've got an old driver G drive or some drive mounted off of your network. [01:06:57] You have access to it from your computer, right? Yeah. You click on that drive. And now you're in there and in the windows side Unix and max are a little different, but the same general idea you have access to you have right. Access to it. So what they'll do is any mounted drive, like those network drives is going to get encrypted, but the same thing is true. [01:07:20] If you are attaching a U S B drive to your company, So that USB drive, now that has your backup on it gets encrypted. So if your network is being used to back up, and if you have a thumb drive a USB drive, it's not really a thumb drive, right? There's external drive, but countered by USP hooked up. [01:07:45] And that's where your backup lives. Your. Because you have lost it. And there have been some pieces of software that have done that for awhile. Yeah. When they can encrypt your network drive, it is really going after all whole bunch of people, because everyone that's using that network drive is now effective, and it is absolutely. [01:08:10] Devastating. So the best way to do this is you. Obviously you do a bit of a local backup. We will usually put a server at the client's site that is used as a backup destiny. Okay. So that servers, the destination, all of the stuff gets backed up there. It's encrypted. It's not on the network per se. It's using a special encrypted protocol between each machine and the backup server. And then that backup servers data gets pushed off site. Some of our clients, we even go so far as to push it. To a tape drive, which is really important too, because now you have something physical that is by the way, encrypted that cannot be accessed by the attacker. [01:09:03] It's offsite. So we have our own data center. The, we run the, we manage the no one else has access to it is ours. And we push all of those backups offsite to our data center, which gives us another advantage. If a machine crashes badly, right? The hard disk fails heaven forbid they get ransomware. We've never had that happen to one of our clients. [01:09:29] Just we've had it happen prior to them becoming clients, is that we can now restore. That machine either virtually in the cloud, or we can restore it right onto a piece of hardware and have them up and running in four hours. It can really be that fast, but it's obviously more expensive than in some. [01:09:51] Are looking to pay. All right, stick around. We've got more to talk about when we come back and what are the Russians doing? How can you protect your small business? If you're a one, man, one woman operation, believe it. You've got to do this as well. Or you could lose everything. In fact, I think our small guys have even more to lose Craig peterson.com. [01:10:16] Backups are important. And we're going to talk about the different types of backups right now, what you should be doing, whether you're a one person, little business, or you are a, multi-national obviously a scale matters. [01:10:32] Protecting your data is one of the most important things you can possibly do. [01:10:36] I have clients who had their entire operating account emptied out, completely emptied. It's just amazing. I've had people pay. A lot of money to hackers to try and get data back. And I go back to this one lady over in Eastern Europe who built a company out of $45 million. By herself. And of course you probably heard about the shark tank people, right? [01:11:07] Barbara Cochran, how she almost lost $400,000 to a hacker. In fact, the money was on its way when she noticed what was going on and was able to stop it. So thank goodness she was able to stop it. But she was aware of these problems was looking for the potential and was able to catch it. How many of us are paying that much attention? [01:11:34] And now one of the things you can do that will usually kind of protect you from some of the worst outcomes. And when it comes to ransomware is to backup. And I know everybody says, yeah, I'm backing up. It's really rare. When we go in and we find a company has been backing up properly, it even happens to us sometimes. [01:11:59] We put them back up regimen in place and things seem to be going well, but then when you need the backup, oh my gosh, we just had this happen a couple of weeks ago. Actually this last week, this is what happened. We have. Something called an FMC, which is a controller from Cisco that actually controls firewalls in our customer's locations. [01:12:26] This is a big machine. It monitors stuff. It's tied into this ice server, which is. Looking for nastiness and we're bad guys trying to break in, right? It's intrusion detection and prevention and tying it into this massive network of a billion data points a day that Cisco manages. Okay. It's absolutely huge. [01:12:48] And we're running it in a virtual machine network. So we. Two big blade. Chassies full of blades and blades are each blade is a computer. So it has multiple CPU's and has a whole bunch of memory. It also has in there storage and we're using something that VMware calls visa. So it's a little virtual storage area network. [01:13:15] That's located inside this chassis and there are multiple copies of everything. So if a storage unit fails, you're still, okay. Everything stays up, it keeps running. And we have it set up so that there's redundancy on pond redundancy. One of the redundancies was to back it up to a file server that we have that's running ZFS, which is phenomenal. [01:13:40] Let me tell you, it is the best file system out there I've never ever had a problem with it. It's just crazy. I can send you more information. If you ever interested, just email firstname.lastname@example.org. Anytime. Be glad to send you the open source information, whatever you need. But what had happened is. [01:13:57] Somehow the boot disk of that FMC, that, that firewall controller had been corrupted. So we thought, oh, okay, no problem. Let's look at our backups. Yeah, hadn't backed up since October, 2019. Yeah, and we didn't know it had been silently failing. Obviously we're putting stuff in place to stop that from ever happening again. [01:14:27] So we are monitoring the backups, the, that network. Of desks that was making up that storage area network that had the redundancy failed because the machine itself, somehow corrupted its file system, ext four file system right then are supposed to be corruptible, but the journal was messed up and it was man, what a headache. [01:14:51] And so they thought, okay, you're going to have to re-install. And we were sitting there saying, oh, you're kidding me. Reinstalling this FMC controller means we've got to configure our clients, firewalls that are being controlled from this FMC, all of their networks, all of their devices. We had to put it out. [01:15:07] This is going to take a couple of weeks. So because I've been doing this for so long. I was able to boot up an optics desk and Mount the file system and go in manually underneath the whole FMC, this whole firewall controller and make repairs to it. Got it repaired, and then got it back online. So thank goodness for that. [01:15:33] It happens to the best of us, but I have to say I have never had a new client where they had good backups. Ever. Okay. That, and now that should tell you something. So if you are a business, a small business, whatever it might be, check your backups, double check them. Now, when we're running backups, we do a couple of things. [01:15:57] We go ahead and make sure the backup is good. So remember I mentioned that we h
In this segment sponsored by Intel, we will explore all things Intel vPro® platform. Learn how Intel vPro® platform can help you keep your computers up-to-date, prevent attacks, provide reports on the status of the firmware in use, and implement advanced hardware security! This segment is sponsored by Intel. Visit https://securityweekly.com/intel to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw273
The Royals Director of Groundskeeping for almost three decades is headed to the Missouri Sports Hall of Fame, a fitting tribute to dedication and hard work in a story he tells in absorbing and enjoyable fashion.
Scaling UP! Nation, you know I love answering your questions, and today's listener is a new water treater who submitted a few, but the main theme is “How do you diagnose when something is wrong?” What tests should you run? What if there is a leak? What if your customer is planning to install a piece of new equipment? What should you be checking the equipment for? What should you be asking your customer about when you see them? Well, Scaling UP Nation, those are just some of the questions I answer in this episode. So grab your pen and paper because this episode is packed with helpful information and you'll want to take notes. Bottom line: I am going to share my 4 Steps to diagnose if something is wrong. Your roadside friend, as you travel from client to client. -Trace Timestamps: Celebrating the Scaling UP! H2O podcast's milestones [01:15] Thinking On Water With James [04:50] Events in Industrial Water Treatment [06:00] Pinks And Blues Questions from the Nation: How to diagnose when something is wrong? [09:20] Step 1: Catch up with the customer [10:15] Step 2: Find out as much information as you can from the equipment [12:30] Step 3: Troubleshooting [20:04] Step 4: Open your Test Kit and run the appropriate tests [29:05] Better information allows us to make better decisions [37:04] Thinking On Water With James: In this week's episode, we're thinking about nitrite corrosion inhibition. How does nitrite inhibit corrosion? Does oxygen have a role? What if nitrite is underfed? What could happen and why? What if nitrite is overfed. What could happen and why? How might microbiological activity impact nitrite levels and corrosion? Protecting a water system against corrosion is more than just running pinks and blues. It's about understanding the chemistry behind the scenes and what factors may positively and negatively impact it. Take this week to think about nitrite and how it inhibits corrosion. Quotes: “Help your customers make better decisions by giving them more information.” - Trace Blackmore “In our day-to-day life in the water treatment industry, it is very easy to skip step 1 (speaking with the customer) and finding out things that are going to make things faster in the long run.” - Trace Blackmore “Put your test kit down and have a conversation with your equipment before you start running tests.” - Trace Blackmore “We want our customers to know that we are not just looking at the things that we are directly responsible for, we're actually the mouthpiece, we are the faithful translator of that equipment to people..” - Trace Blackmore “Soot is more insultative than scale, so let your customer know.” - Trace Blackmore “There are water treaters that go straight for their tests, and they blindly start testing. You should have an idea of every value that you are going to get as a result of something you test before you test it.” - Trace Blackmore “Make sure all your meters are clean and calibrated.” - Trace Blackmore “There are so many things that we do as industrial water treaters that are so far above and beyond just running pinks and blues.” - Trace Blackmore “If the results are exactly what we think they are, then we have guaranteed that we know what's going on with the system.” - Trace Blackmore “We have some incredible products out there that make our life easier, but I don't think they should be replacing the things that we need to know about the systems themselves.” - Trace Blackmore “You need to test for all the actives that are in your product. If you don't know your product well enough to know all the actives, then ask people you work with to show you the technical data sheet.” - Trace Blackmore “If you do not know or have an idea of what the result of the test is then you have not yet run, you probably don't need to run it.” - Trace Blackmore Connect with Scaling UP H2O: Email: email@example.com (podcast producer) Submit a show idea: Submit a Show Idea Trace Blackmore on LinkedIn: in/traceblackmore/ Scaling UP! H2O on Facebook: @H2OScalingUP Scaling UP! H2O on YouTube: ScalingUpH2o.com/YouTube Links Mentioned: Submit a Show Idea 236 The One Where We Talk About Waters Treaters Changing The World - the Global 6K for Water The Rising Tide Mastermind Events: Water Quality Association's Aquatech Trade Show in China – June 8 to 10, 2022 The Groundwater Association's Fate of PFAS: From Groundwater to Tap Water – June 21 to 22, 2022, in Westerville, Ohio Join Team Scaling UP! Nation on World Vision's Global 6K for Water on May 21, 2022, or make a donation HERE
Freight brokers still have to pay carriers promptly even if their customers are behind on payments, or even worse, if they go out of business. We talked with Matt Perkins, a brokerage owner, about ways that you can protect your brokerage from bad debt situations. Ukrainian Guardian Angel Fund: https://gofund.me/62c7fc3e • Freight Broker Basics Course: https://bit.ly/freight-360-university • Group Coaching: https://bit.ly/3EMXepI • Sponsors/Affiliates: https://bit.ly/3mT2KAP • Freight 360 Website: https://www.freight360.net/
A proposed land use plan for the Moosehead Lake region has been released that balances economic development with conservation. Forests & Wildlife Director Melanie Sturm discusses what the proposal means for the future of the Moosehead Lake area and how NRCM is working to protect the unique character of this special region. Advocacy Director Pete Didisheim also gives his closing thoughts on the 130th legislative session and what's next for NRCM's advocacy priorities.
The cybersecurity authorities of the UK, Australia, Canada, New Zealand, and the US have observed a recent increase in malicious cyber activity against managed service providers (MSPs). Allied cybersecurity authorities expect state-sponsored cyber actors to increase their targeting of MSPs in an attempt to exploit provider-customer trust relationships. This advisory includes security guidance tailored for both MSPs and their customers. AA22-131A Alert, Technical Details, and Mitigations Technical Approaches to Uncovering and Remediating Malicious Activity Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses APTs Targeting IT Service Provider Customers ACSC's Managed Service Providers: How to manage risk to customer networks Global Targeting of Enterprise Managed Service Providers Cyber Security Considerations for Consumers of Managed Services How to Manage Your Security When Engaging a Managed Service Provider Kaseya Ransomware Attack: Guidance for Affected MSPs and their Customers Baseline Cyber Security Controls for Small and Medium Organizations Actions to take when the cyber threat is heightened Top 10 IT Security Action Items to Protect Internet Connected Networks and Information CCCS's Alert: Malicious Cyber Activity Targeting Managed Service Providers CISA Cybersecurity Alert: APT Activity Exploiting MSPs (2018) CISA Cyber Essentials and CISA Cyber Resource Hub Improving Cybersecurity of Managed Service Providers Shields Up Technical Guidance All organizations should report incidents and anomalous activity to CISA's 24/7 Operations Center at firstname.lastname@example.org or (888) 282-0870 and to the FBI via your local FBI field office or the FBI's 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Episode 228: Creating, Building, and Protecting Wealth with guest Rich LeBrun Building wealth is not about how much money you make but about how much money you keep. In our youth we tend to have a more carefree approach, not thinking as much about creating wealth. It is far more fun to live in the moment; we can worry about saving later. But one day it all hits you and you must quickly change course. You must decide not only how to create wealth but also how to protect it. In this episode, successful franchise owner, author, and speaker, Rich Lebrun, joins us to share how you can begin to build wealth now and if it's possible to do it later in life. Rich specializes in the franchise industry by showing people how to rigorously evaluate a business to purchase and how to build wealth for their families. With over 30 years of serving as a senior executive working with small to medium size companies helping them with strategic planning, executive coaching, and leadership training, he is passionate about teaching others how to reach their life's goals and objectives for building wealth and a better quality of life. Tune in as Rich shares his story of transition after losing his job, becoming a franchise owner, and how he has been able to create his legacy and secure his future. You'll find out what you can do to get started today and when it's too late to start building wealth for yourself. Connect with Rich: https://rlebrun.com Connect with Carolyn: https://carolyn360.com
On this bonus episode, we got to chat with Chris McKenna who is the founder of Protect Young Eyes, which is dedicated to creating safer spaces for children online. We enjoyed getting to know Chris and hearing his heart to equip families in this area. We will get really practical in this episode, including tips on having these conversations with your kids and principles to help protect your kids from exposure to pornography. We hope that you will be encouraged and challenged to think deeply about how to engage with your children on the important topic. Come join us in this conversation as we chat with Chris McKenna about pornography and how to prepare and protect our children. 3:34 - About Protect Young Eyes 6:58 - When should parents talk to their children about pornography 9:32 - Practical tips for parents 14:10 - What is digital trust? 19:22 - Everyday life examples of digital trust 22:17 - How to normalize conversations around pornography Sign up for the brand new Daily Grace Podcast Newsletter and receive the free resource "Scripture for Every Season.” Resources mentioned in this episode: The Gryphon router Protect Young Eyes The Protect App Scripture mentioned in this episode: Philippians 4:8 Psalm 119:37 Connect with us: Subscribe to Daily Grace: on iOS, go to our Apple podcast page and click subscribe. On Android, click this podcast RSS feed link and choose your podcast app. If needed, you can copy this link directly into your favorite podcast app (like Stitcher or Overcast). Or follow us on Spotify! We would love it if you took a few minutes to leave us an Apple podcast review to help spread the word about Daily Grace! We want to invite more women into our conversations! Download The Daily Grace app: for iOS, click here to download. On Android, click here to download. Visit The Daily Grace Co. for beautiful products for the whole family that will equip you on your journey to knowing and loving God more. Subscribe to The Daily Grace Newsletter and receive free Bible study resources in your inbox. Like The Daily Grace Co. on Facebook. Follow @dailygracepodcast on Instagram for exclusive podcast content and @thedailygraceco for all things The Daily Grace Co. Engage with our Facebook community, “The Daily Grace Co. Community”. Read The Daily Grace blog for encouragement throughout the week that is steeped in biblical truths. * Affiliate links used are used where appropriate. Thank you for supporting the products that support the production of this podcast! * The opinions of guests on the Daily Grace podcast do not represent the opinions of The Daily Grace Co., and we do not necessarily endorse the resources that they recommend or mention on the show. We believe it is valuable to hear from a variety of guests, even if we do not agree in all areas. As always, the statements made by hosts and guests on the show should be tested against God's Word, the only authority on truth.
To learn more, please go to https://themelkshow.com/gold/ Mel welcomes back our friend and precious expert Andrew Sorchini as the global war on humanity continues to heat up. There are many ways to protect your sovereignty from those that are actively seeking to take it away. Prepare and take action to protect your financial freedom and consider solutions away from the institutional financial technocracy at https://themelkshow.com/gold/ We encourage you to explore investing in precious metals by contacting Andrew Sorchini and his precious metals team at https://themelkshow.com/gold/ Andrew and his team are committed to bringing The Mel K Show subscribers the highest quality service and support. To learn more, please go to MelKGold.com and we'll be in touch: Thank you all for your support and we hope that this content and service helps you find some piece of mind in these unprecedented times. Love & Light Mel & Rob God Wins!
We reflect on the current state of reproductive justice, how we can do more to change narratives around reproductive care, and we also explore how to break generational cycles that can be harmful while still celebrating generational resilience. We checkin with Amanda Matos, Senior Director of Constituency Campaigns with Planned Parenthood. Join the May 14 rally:https://www.plannedparenthoodaction.org/rightfully-ours/bans-off-our-bodies Our guests on this panel podcast are: Betsy Aimee Cardenas Betsy Aimee Cardenas is a purpose-driven, entrepreneur, producer, writer and creative marketing expert. Before launching her digital agency Born in June Creative, Cardenas spent almost a decade working as an advocate for women and girls, with a specific emphasis on achieving gender equality through education and empowerment and combating gender discrimination. Cynthia Guitierrez (she/ella) Cynthia Gutierrez is an award winning first-generation Nicaraguan Salvadoran reproductive justice organizer, doula, cultural strategist and public speaker.She is currently the program manager for the University of California San Francisco Hub of Positive Reproductive and Sexual Health (HIVE) and Team Lily programs. She is on the Board of Directors for ACCESS Reproductive Justice and the California Coalition for Reproductive Freedom. Register for our Book Club chat with Author Erika Sanchez, July 21 at 12pm PT Save 10% on your order of books from Latina-owned Xolo Books with the code TAMARINDO at checkout: xolobooks.com Tamarindo podcast is the Latinx show where hosts discuss politics, pop culture, and how to balance it all con calma, hosted by Brenda Gonzalez and Ana Sheila Victorino. Join us as we delve into discussions on race, gender, representation, and life! Brenda and Ana Sheila are executive producers of Tamarindo podcast with production support by Mitzi Hernández and Augusto Martinez, of Sonoro Media. Jeff Ricards produced our theme song. If you want to support our work, please rate and review our show here. You can get in touch with us at www.tamarindopodcast.com Contribute to the show: https://www.paypal.com/paypalme/tamarindopodcast1 Follow AnaSheila on instagram @la_anasheila and twitter @Shelli1228 Follow Brenda on twitter at @BrendaRicards
Mark 1:41-45 & 2:1-12 Today, we hear a paralyzed man get lowered from the roof in hopes to get in front of Jesus and be healed. I wonder if the paralyzed man was disappointed when the 1st thing Jesus says to him is "Young man, your sins are forgiven.” What? They had gone through all this trouble to have him walk again…what was this about sins? As we continue the story, Jesus shows us that the biggest issue is our sin but the good news is that He can forgive them. We are reminded of the love He has for us as evidenced by the sacrifice He made to forgive us. Today's episode is sponsored by Fabric. Protecting your family by creating a will or signing up for term life insurance has never been easier. Check it out-- meetfabric.com/kbs To connect with me, simply go to https://www.kbspodcast.com For those who are interested, episode #6 of The Chosen is free to watch on Peacock and is the video version of this scripture. It is PG so use your discretion.
I'm working on some of the biggest legacy-building projects of my life right now, and I'm finally at this sweet spot in creating abundance that matters, but also having the time and energy to make choices that align with my goals and values. I've been in situations where I didn't have the money to make the choices I wanted to make, and I've also been at the other end of the spectrum where I had the money, but didn't have the time to enjoy the fruits of my labor. I'm now in this middle ground, and I want to share my four tips for how to make that happen. Let this be a reminder that, yes, abundance matters, but what's equally as important are the micro choices and paths that we take to get there. IN THIS EPISODE, WE TALK ABOUT: How to build wealth and keep your choice at the same time Focusing your strategy around your priorities Learning how to share the challenge and lean on your network Defining and upholding your boundaries Celebrating the results of your hard work RESOURCES Text DAILY to 310-421-0416 to get daily Money Mantras or Business Perspective messages to boost your day. CONNECT WITH CHRIS Follow Me: @chriswharder Visit My Website: https://chrisharder.me
What impacts your energy positively and negatively? When we understand this, we can then begin to set boundaries in order to protect our energy and transform our life. In this episode, the Fab 5 is talking about the importance of protecting yourself energetically. Some examples of NOT protecting ourselves energetically include: giving too much energy to one person, enabling someone else's negative energy to come and go into your life, and countless others. Protecting our energy doesn't just mean setting boundaries with individual relationships, it also means recognizing the impact that the current global energy has on us. Throughout this conversation, the Fab 5 shares their tips, tricks, and tools for protecting your energy. They talk about the importance of intention within energy, what the Law of Correspondence is, different tools that they personally use for energy work, how to not let other people's energy impact your own, and so much more. Tune in to hear the Fab 5 talk about how we can all protect our energy so we show up feeling our best each and every day! In This Episode You Will Learn:The importance of intention within energy (5:57)About the Law of Correspondence (9:55)How global energy impacts our individual energy (19:52)To understand how you want to feel within your relationships (23:21)Let's Connect!About UsJoin the Facebook GroupInstagram See acast.com/privacy for privacy and opt-out information.
Identity Fraud is a something that can happen to anyone at any time. Protecting your personal finances are very important, especially when you're away from home, on vacation, or while traveling. In this episode, Skip shares his personal experience with Identity Theft, and explains what you can do to better protect yourself, and your money.
Justin Seibert is the President of Direct Online Marketing, a top 200 Premier Google Partner who have clients around the world.. Justin and his team have been helping clients with their SEO marketing for well over a decade. In this episode we're exploring… an under discussed part of SEO – using SEO to manage your online reputation and maximise your marketing impact. Yes we're talking about taking control of the search results page. Both removing any negative things from your brand search page, AND how to take over the page completely! Get all the links and resources we mention at https://keepoptimising.com/?utm_source=captivate&utm_medium=episodenotes (KeepOptimising.com) Episode sponsored by https://www.klaviyo.com/?utm_source=podcast&utm_medium=referral&utm_campaign=masterplan (Klaviyo) This podcast uses the following third-party services for analysis: Chartable - https://chartable.com/privacy
Are you looking to ignite the dulled flame of your sexual essence? Are you feeling depleted and lacking lustre for the day, let alone for having a robust lib*do? Perhaps you're looking to support your sexual vigour so you can continue to thrive, love life, and enjoy sex well into your later years. We're all sexual beings, and having the energy, spirit, and capacity to express ourselves in such a way is the spark that keeps us inspired and in love with life. Earlier this year, Mason did a live webinar on the topic of Lib*do and how Daoist tonic herbalism serves as a beautiful gateway into the cultivation of lifelong practices that will continue to expand sexual capacity, sexual vigour, and keep our essence burning strong well into our 60's, 70's and 80's. The webinar was so well received; that we've decided to make it an episode on the podcast. This episode is a holistic, integrated guide to establishing your intention and awareness of where you want your sexual vigour and capacity to be in 10, 20, and 30 years. Mason explains the relationship between Jing (Yin and Yang Jing), foundational energy, the kidneys, and how they are all inextricably woven into our potential for sexual desire and vigour. He also lays down an integrated guide to the Daoist tonic herbs, discussing how specific blends work within the organs to cultivate sexual essence, lasting potential and can work as a support system right through to our elderly years. Ultimately this is a holistic discussion around how we can use the teachings of Daoism to embody the most sexually robust, unique, love-filled expressions of ourselves! There is also a compact resource guide below with links to everything mentioned (and more) in the webinar, be sure to check it out. "So put into place something to ensure you are taking your herbs regularly. Put your boundaries in place to ensure that you have enough time to cultivate your essence and have enough time to really go into that loving place where you know you have the space to take all those experiences that your potential and your sexual essence and lib*do have given you. And you have enough time to sit with it within your heart and let it sink in and make, gain wisdom". - Mason Taylor Mason discusses: -Yang Jing herbs -The quality of lib*do. -Foundational energy. -Protecting our essence. -Spontaneous joy and sex. -The Daoist tonic herbs and lib*do -The cultivation of Jing, Qi and Shen. -Yin Jing- cultivating the waters of life. -Good sleep practices for sexual vigour. -How adaptogens help to restore lib*do. -Jing foundational essence and lib*do. Bonds, boundaries, spleen energy and protecting Jing. RESOURCE GUIDE: Products and Books: JING Blend Cordyceps Schisandra Ashwagandha Deer Antler Velvet JING, QI, SHEN (Three Treasures bundle) Eucommia bark (primary Yang Jing herb). Ron Teeguarden - The Ancient Wisdom Of Chinese Tonic Herbs (Book) Articles: Cordyceps Health Benefits- Article The 7 Sexy Benefits of Schisandra- Article The Three Treasures (Jing, Qi, Shen)- Article Jing: What is it, and how to cultivate it- Article Cultivating Passion and Desire Article by Molly Helfend. Discover Deer Antler Velvet Impressive Benefits- Article Relevant Podcasts: Authentic Sex with Juliet Allen (EP#31) Sexuality and Libido with Nick Perry (EP#45) Semen Retention with Taylor Johnson (EP#46) Nurturing Stability & Earth Energy with Tahnee & Mason Taylor Your Erotic Blueprint with Ian Ferguson from Jaiya Inc (EP#60) The Dao of Health, Sex & Longevity with Daniel Reid (EP#115) Love, Sex and Psychadelics with Dr. Molly Maloof (EP#137) Life-Changing Sex Makes Anything Possible with Kim Anami (EP#28) Check Out The Transcript Here: https://www.superfeast.com.au/blogs/articles/mason-taylor-ep-160
OUR HOSTS: Corinne Foxx -https://www.instagram.com/corinnefoxx/ ( @corinnefoxx) Natalie McMillan -https://www.instagram.com/nataliemcm/ ( @nataliemcm) and https://www.instagram.com/shopnataliemcmillan/?hl=en (@shopnataliemcmillan) What we're drinking:https://www.conncreek.com/cck/wine-shop/white-wine-collection/2019-sauvignon-blanc/5637212836.p ( )https://www.vivino.com/US/en/sokol-blosser-evolution-e-pinot-noir/w/4628582?year=2020 (Sokol Blosser Evolution Pinot Noir 2020) TOPIC: The thought of setting up wills, trust funds, and getting life insurance might seem like something that's reserved for retirement, but in reality, it's a smart thing to start thinking about in young adulthood. Today, we're talking all about legacy planning, the purpose of making an official will, and the biggest benefits to having a trust. We also get into what you should consider when buying life insurance and how having that policy in place can help your loved ones after your passing. In this episode, we discuss: The steps to creating a will Protecting your digital legacy The difference between wills and trusts How to set up a trust The main question to consider when deciding if you should get life insurance Why and when you should get life insurance END OF THE SHOW: Corinne and Natalie introduce Hottie of the Week: Will Ferrell WINE RATING: https://www.vivino.com/US/en/sokol-blosser-evolution-e-pinot-noir/w/4628582?year=2020 (Sokol Blosser Evolution Pinot Noir 2020) = 7.5 / Will WRAP UP: To wrap up the episode, we play Overrated/Underrated. Nat comes for a lot of people's favorite movie with her hot take一she thinks that The Notebook is overrated, and The Hot Chick is underrated. Corinne thinks that Sour Patch Kids are overrated, and Buncha Crunch don't get nearly enough credit when it comes to movie theater candy. We have a newsletter for our Am I community. You can sign up for the newsletter on our website: http://amidoingthisrightpod.com (amidoingthisrightpod.com) You can email us for episode ideas or Random Advice: email@example.com Follow us on Instagram: https://www.instagram.com/amidoingthisrightpod/ (@amidoingthisrightpod ) Don't forget to rate and review the podcast! It really helps us grow!
Men and women struggling with unwanted sexual behavior or sexual brokenness often work very hard to protect themselves. Protecting themselves from the pain in life and protecting themselves from the consequences of their behavior. This often takes the form of gaslighting, manipulating, and lying. On today's episode, we're joined by one of our clinicians, Eileen Fagan, to talk through why those struggling chose these behaviors, how spouses can identify them, and how couples can heal from their effects. RESOURCES Full Episode Video (YouTube) Genesis Process (Michael Dye's Recovery Resource) Center For Healthy Sex Betrayal & Beyond (Women's Betrayal Resource) Hope For Men (Men's Betrayal Resource) Seven Pillars Of Freedom (Men's Recovery Resource) Recovery Action Plan (For Struggling Spouse) Recovery Action Plan (For Betrayed Spouse) Pure Desire Counseling Disclosure Process Counseling Relapse Prevention Tool/Three Circles (Recovery Tool)
In today's episode, we welcome Mike Morawski back to the show to talk about how to protect your real estate investments by underwriting conservatively, why you shouldn't leave capital sitting on the sidelines and so much more! Michael “Mike” Morawski is a 30-plus-year real estate investment veteran. He has controlled over $285,000,000 in real estate transactions. An entrepreneur, author, real estate trainer, public speaker, and personal coach. With a strong personal resilience and a deep desire to help others live extraordinary lives. He has coached hundreds of real estate investors to fulfill their dreams. Today Michael's passion is giving his knowledge and wisdom away to others for their gain. Mike is the host of the Insider Secrets Podcast and the co-host of Multifamily Unplugged Vidcast. Michael has built My Core Intentions as a training and coaching platform for real estate investors and industry professionals. His Core principle is to teach his clients how to create “short term cash flow and long-term wealth.” This is delivered through live and virtual training events, and three levels of personal coaching. [00:01 - 05:48] From Having a Hundred Million Dollar Company to Losing Everything Mike shares how he got started in real estate, his early success, and losing everything in the 2008 housing crisis Listen to Mike's previous episode here: Mike's lessons in success – Have the right mindset to learn from failure Correlations between 2008's housing market and today's market [05:49 - 13:33] Strategies to Keep Your Assets Protected Protecting your real estate investments by underwriting conservatively Why it's better to underpromise and over-deliver Why a 20% annualized rent raise is unsustainable Sitting on capital on the sidelines doesn't work and here's why [13:34 - 17:24] Closing Segment Upcoming projects and opportunities that Mike is excited about Reach out to Mike! Need a great start in creating your pathway to success? Download Mike's FREE ebooks at https://mycoreintentions.com/free Final Words Tweetable Quotes “There are lessons to be learned in this success, the loss, and the redemption. Right. So listen, none of us should allow our future to be dictated by our past.” - Mike Morawski “I'm not a real advocate of sitting on capital on the sidelines. It doesn't work for you on the sidelines. I think that there are ways to deploy it, to make it work for you.” - Mike Morawski ----------------------------------------------------------------------------- Connect with Mike Morawski Website: https://mikemorawski.com IG: https://www.instagram.com/mike.morawski.54 Twitter: https://twitter.com/MikeMorawski Facebook: https://www.facebook.com/mike.morawski.54 Connect with me: I love helping others place money outside of traditional investments that both diversify a strategy and provide solid predictable returns. Facebook LinkedIn Like, subscribe, and leave us a review on Apple Podcasts, Spotify, Google Podcasts, or whatever platform you listen on. Thank you for tuning in! Email me → firstname.lastname@example.org Want to read the full show notes of the episode? Check it out below: [00:00:00] Mike Morawski: Well, if you're an investor and you're looking for an investment be in rent growth product. Because I conservatively underwrote this deal in Florida. And I said, okay, my one bedrooms, I'm going to be able to raise the rent 150 bucks a door. My two bedrooms, 250 bucks a door. That's pretty conservative. [00:00:18] Considering my property manager is just whipping units. Now at double. [00:00:23] Welcome to the How to Scale Commercial Real Estate Show. Whether you are an active or passive investor, we'll teach you how to scale your real estate investing business into something big. [00:00:35] Sam Wilson: Mike Moraski is an entrepreneur author, real estate trainer, a public speaker and personal coach with strong personal resilience and a deep desire to help others live extraordinary lives. Mike welcome to the show. [00:00:47] Mike Morawski: Hey Sam, thanks for having me back [00:00:49] Sam Wilson: Hey man, it's a pleasure. It's absolutely a pleasure. You came on this show. This was episode 197, which I can't believe it's been that long, but that was published June 14th, 2021. So by the time this airs, it'll probably be [00:01:03] Mike Morawski: almost a year. [00:01:05] This one going to be? [00:01:06] Sam Wilson: I have no idea. It'll be somewhere 520-550. We just put them all in the, I don't know, they go in the queue, man. I'm not the one that handles that on my team, but yeah, it'll be somewhere in that neighborhood, but it's awesome to catch back up. I ask every guest who comes in the show. [00:01:22] So just in case our listeners didn't get a chance to listen to that episode. First in 90 seconds or less, tell me where you started, where you are now and how [00:01:29] Mike Morawski: you got there. Absolutely. I started in real estate sales, selling hundreds of houses. I went into the apartment business, built a hundred million dollar company through a syndication and a property management company. [00:01:44] I lost everything as a result of the 2008 debacle wound up on a 10 year federal prison sentence, serving eight of those 10 years behind a wall. And today I'm home in the coaching and training business. Teaching people, how not to make those same mistakes, how to live a balanced quality lifestyle and increase their business profitability and bottom line. [00:02:07] Sam Wilson: And for those of you, again, if you haven't gone back or you haven't heard Mike story, it's a good one. So go back and listen to his story. I don't think he holds anything back, which we certainly appreciate. I know it's a humbling story for you to tell, but it's also a story of redemption and yeah, I think it's a great story. [00:02:24] So appreciate you always being so vulnerable and sharing that. So [00:02:26] Mike Morawski: what I want to say though about that, Sam is I do share that story openly and vulnerably. I believe that there's hope and inspiration in my journey. And I also believe that there's lessons to be learned in this success, the loss and the redemption. [00:02:41] Right. So listen, none of us should allow our future to be dictated by our past. Don't look in the rear view mirror, look out the windshield and [00:02:49] Sam Wilson: move forward. Yeah. And nobody can drive a car, looking out the rear view mirror. That's a bad way to get down the road. When you say lessons in success that you share with your coaching clients, what does that term even mean? [00:03:01] Mike Morawski: Lessons in success. You know, I think that there's success in the failure. Right? Cause it's not that I failed. It's not that I lost everything. I just learned a different way of not doing something. Right. If you take a look at Thomas Edison, when he created the light bulb, you know, the comment is, Hey, I just learned 10,001 ways that it wasn't going to work. [00:03:21] Right. So I kind of look at it the same way. I built a heck of a big business. I built it really fast over leveraged under capitalized and very unstable. And if you can, as an entrepreneur, get your arms around those three things and then pay attention to the details and listen to people around you. I think as an entrepreneur, you can knock it out [00:03:45] Sam Wilson: of the park for yourself. [00:03:46] What do you see if any correlation between 2008 and where we are now in the market? [00:03:55] Mike Morawski: You know, I see a lot of similarities. I see some edginess in the banking industry where they're starting to float some loan programs out there. You know, I had something come across my desk the other day that said, Hey, 85 to 90% LTV on your $5 million multifamily deal. [00:04:16] And I thought to myself, man, you guys should be put out of. I honestly thought that. That was the first thought that went through my mind. And because that was one of the things that got me in trouble, I had $60 million worth of real estate that I was over leveraged on. I don't think anybody should be buying a piece of real estate in today's environment unless they're 65 to 70% loan to value. [00:04:40] If you are chasing rents right now and raising rent rates at unprecedented underwrite. Stop it go back and take a look at, you know, be conservative. This market's going to change. There's going to be a shift. You know, I see a lot of people growing really fast, buying big assets for lots of money and buying multiple assets for lots of money. [00:05:04] One of the things that caught me was I grew too fast. This is a marathon. It's not a. And I think that if you're not looking at those things, you know, there's going to be a change in the housing market. We're going to see foreclosures appear. Like we haven't seen them in the last seven or eight years, but they're coming back. [00:05:24] I have some friends that are. In that space in the residential foreclosure space attorneys that deal with the banks. And there is a backlog right now. So when they open these flood gates, there's going to be some challenges. Will it affect the commercial real estate space? Like it did last. You know, Sam, I don't know, but last time I didn't think it was going to affect the commercial real estate space either. [00:05:48] Sam Wilson: Yeah, I'm with you. There's a lot of obviously uncertainty. A question I always like to ask guests on the show is what's something you're curious about and more often than not. And I probably don't ask it as much anymore because the answer is always like, I'm just curious and is, you know, what's going to happen with all of this. [00:06:04] I mean, we've printed just an unbelievable amount of money. So obviously asset prices are rising. Inflation is going nuts. I mean, where does this end? And you can listen to two schools of thought. There's one school of thought that says, Hey, we have a massive crash and we have massive deflation. And there's the other school of thought that says no, just to be runaway inflation. [00:06:20] Like neither one of them is good. Nobody's saying, oh, there's a bright rosy future ahead. So, you know, that's not the story I'm hearing from either camp, but I'm really curious for you. What are you guys doing? Cause you mentioned here, you know, growing really fast, was it maybe a mistake you guys had made you were over levered, the high LTVs bad loans, you know, loans that were written with terms that no one could comply with, unless everything just went along perfectly. [00:06:44] What are you guys doing right now to make sure that your protected [00:06:48] Mike Morawski: underwriting conservatively. Let me give you an example. We just bought a deal in Tampa, Florida, 40 units. We actually closed down it, you know, a couple of months ago. One of the things in our underwriting process was I did not want to come out with these extravagant numbers. [00:07:03] Like we were going to hit 20% on investor's IRR with a 12 or 15% cash on cash return. Right. I think those numbers are. The sponsors that are putting that stuff out today, need to pull back on the reins. I just did a passive webinar where we brought some investors in, you know, we had about 80 people online and I said, look, I said, one thing that I'm very conscious of today is how do we look at these numbers? [00:07:30] Spreads. I think as an investor, you should be looking at six to 8% cash on cash return. And you should be looking at a 13% higher if you're seeing stuff that's higher than that, I'd really be concerned because I think the market's going to change so much that it's going to cause instability. Sam, you said it hit the feds, just raised interest rates. [00:07:49] Again yesterday you got gas. That's at seven bucks a gallon on the west coast. It's at five bucks a gallon in the middle. You got bread and milk and eggs that are more money and you can't get lumber fast enough. Right? Where's the market going to go, but here's what I'll tell you. On the other side, how do you hedge against that? [00:08:06] Well, if you're an investor and you're looking for an investment, be in rent growth products. Because I conservatively underwrote this deal in Florida. And I said, okay, my one bedrooms, I'm going to be able to raise the rent 150 bucks a door. My two bedrooms, 250 bucks a door. That's pretty conservative considering my property manager. [00:08:26] Is just whipping units now at double there. So anybody who got involved in that deal is going to see a much better return on investment that changed the numbers to like a 20% higher or it's just silly money. [00:08:41] Sam Wilson: It's silly money. And I guess the idea is that you underwrite it. In the potential worst case scenario, I guess that's what I'm hearing. [00:08:51] Cause know, Hey, if you promise investors a 6% cash on cash and that's what you delivered. Okay. You know, no one can get upset, but if you promised them 15 and you gave him six, then everybody's upset. I mean, is that the idea behind that? Or is there. [00:09:05] Mike Morawski: Yeah. I'd like to under promise and over deliver for sure. [00:09:08] And does that mean that I'll get as many investors as fast as I possibly could if I was promising a 20% sure because people are still of the old school, but I have friends that have been in the business 25, 30 years. Doing the same thing and they've pulled back so far right now, you know, I got one buddy, they're raising capital and they're paying their investors of 5% preferred return. [00:09:34] And that's it. No equity in the deal. So as an investor, they're going out to the hedge funds. They're going out to the pension funds and they're bringing capital in and they're paying a 5%, no equity in the deal. And they're doing 50% debt, 50% equity. So when you do the math like that, you say, wow, we could probably deliver a better product, a better return. [00:09:56] And of course, those are, you know, A-class products, fresh bill cost a little bit more money, but you can buy this product. Now, when you have those types of terms in your equity investors, there's just safety in that. [00:10:09] Sam Wilson: There really is. That would be for a capital raiser. That would be amazing if I could find capital that just wanted a 5% preferred return, no equity. [00:10:18] That sounds like, you know, monster institutional money that is just desperately seeking yield more than our everyday investors, maybe that you and I [00:10:26] Mike Morawski: work with. Yeah, for sure. And then what you can do is you don't have to. Play around with your exit cap rate, right? I mean, you can say, okay, so if this deal trades out at six in seven years from now, I'm okay. [00:10:39] Right, right. Because if the market shifts enough because to try and keep cap rates compressed at two and 3% right now, You might find yourself in a tough spot, come five, six years from [00:10:49] Sam Wilson: now. Well, that's exactly right. I mean, there's the argument, the cap rates, regardless of where interest rates go, there's this argument that cap rates will still stay low. [00:10:58] Even if the cost of capital is greater than what you're going in. Cap rate is because they have the potential to value add they have the potential to raise rents. They can do all this stuff that will then inflate that cap rate, obviously to a number that makes sense upon stabilizing. If I even said that correctly, and if I didn't, you can get on here and send me a snide remarks on YouTube. [00:11:18] You know, even with that, there comes that other market dynamic that I think people are missing, which is can the people afford the higher rent. Can they afford the per square foot price in a building? That's more, I mean, at some point, if the economy takes a complete bath, people just, aren't going to have the liquidity to go out and just keep paying a 20% annualized ramp up. [00:11:40] Does that sound fair? [00:11:41] Mike Morawski: And that's what happened to the US. Last time jobs got lost businesses got closed. People moved home, people moved out, they doubled. My occupancy dropped. My NOI ran wild off the chains and I couldn't pay my bills. And we went back with some deals, mitigated with the banks, got lower interest rates, got principal knocked off, you know, and it still wasn't enough and couldn't do it on every deal. [00:12:06] But we tried on a few animals. Testing the water. It didn't even work. Then this goes back to, you know, if you've got a cap rate on a deal right now, that's a terminal cap and you've projecting, you're going to get out of this deal in six years at a three or a four. And that thing runs wild and you're at a six and five years from. [00:12:25] You're screwed. Right. You know, so except for the guys that stood by and said, Hey, you know, I'm going to buy some of this stuff when it goes crazy again. Right. [00:12:34] Sam Wilson: Right. Which is another option. It's tough. I'll tell you. It's really tough to sit with. I call it dry powder, have dry powder on the sidelines, especially when we're watching the value of that dry powder. [00:12:46] Just dissipated at incredible. Great, you know, year over year, what publishing 7% now, which I think is the fraudulent number. Anyway, it's probably north of 10 to 15. And if they're being really honest on an inflation rate, so that's tough to do, you know, to hold capital, you guys taking that approach on anything. [00:13:02] Mike Morawski: Yeah. You know, I'm not a real advocate on sitting [00:13:05] on capital on the sidelines. I think you should. It doesn't work for you on the sidelines. I think that there's ways to deploy it, to make it work for you. But, you know, I'm of the opinion that you have to, you know, keep your capital at work at a quarter of a percent or a half a percent even taking advantage of the overnight swap. [00:13:25] You can't make any money down. Yeah, [00:13:27] Sam Wilson: what have I heard? What did somebody tell me once it scared money? Don't make no money this right. I think that's what you're telling me here. Mike, tell me about something that you are currently excited about. We've talked kind of doom and gloom, worst case scenario. [00:13:42] What's something you go, man. I'm pumped about [00:13:43] Mike Morawski: this summer in the city, Sam. I live in Chicago, summers coming, nothing like a bike ride on the lakefront. Nice hot summer day in the sun, watching the boat. [00:13:55] Sam Wilson: That sounds great. Chicago is one of my favorite cities, especially there, along the lake shore. That's a pretty place to be. [00:14:00] Mike Morawski: She come out, hang out one weekend and we'll find some fun things to do [00:14:04] Sam Wilson: for sure. Absolutely. We can get into a lot of trouble there in Chicago. Tell me on a business front, what's something that you're looking forward to that you said, man, this is an initiative we're undertaking. Or this is maybe somewhere we see, you know, good opportunity. [00:14:18] Mike Morawski: Yeah. You know, I told you when we jumped on this morning that I'm getting my arms around this again, and you know, I'm raising capital to do deals and, you know, I had another investor make a commitment this morning and that excites me right now because I've been out of the game for a while. But now back in the game, Helping other people grow their multifamily business and then partnering with them as well. [00:14:42] It's just been a great venture for me to get back into. Like my one buddy says to me all the time he goes, man, I know you're going to knock it out of the park. And you know, that's not the objective or the goal, the objective. And the goal is really to help other people grow. And for them to knock it out of the park, Zig Ziglar always said that if you help enough other people get what they want, you'll ultimately get what you. [00:15:06] But for me, the exciting thing is to raise capital today. And you know, my goal this year is to raise a couple million dollars in capital and buy another 500 units for our group to push the envelope forward a little [00:15:17] Sam Wilson: bit this year. I love it. Mike, thank you for taking the time to come on today. I don't know if we got a chance last time to chat about your book. [00:15:25] I think that's behind you. Exit plan is your book. Isn't it. [00:15:28] Mike Morawski: I wrote exit plan because everybody, all the trainers and coaches, some great trainers and coaches in the marketplace that I've learned from, even everybody teaches you how to buy a deal, find a deal, get in a deal, operate it. Nobody teaches you how to get out. [00:15:43] Nobody teaches you where to maximize your. Your guests could go download a free copy of that book. They can go to my website at mycoreintentions.com/free and grab a copy of Exit Plan. There's a couple other things out there that they could explore Multifamily Fundamentals. And if you're a passive investor, 27 Must Ask Questions of a sponsor, jump in. [00:16:08] It's a great game. It's really growing and I don't see any reason to not stay really connected and involved over the next several years. [00:16:18] Sam Wilson: I love it. Mike, if our listeners want to get in touch with you or learn more about you, what is the best way to do that? [00:16:22] Mike Morawski: Track me down on social media. For sure. I hang out on LinkedIn, Instagram, any place you get your fix. [00:16:29] That's where I'm at. And always trying to throw some great content up there. Even somebody even said to me the other day, man, I can't believe you're even on ticket. But direct message me. I love to network, so message me there, or send me an email@example.com. [00:16:44] Sam Wilson: I love it. Yeah. You're absolutely active on LinkedIn, which is where I spend most of my time. [00:16:49] I'm always like, man, there's Mike again. He's always putting something out there so, well, I certainly appreciate it. Outro: Thank you again for your time, Sam, you have a great day. Thanks. Thanks for listening to the how to scale commercial real estate podcast. If you can do me a favor. And subscribe and leave us a review on apple podcast, Spotify, Google podcast, whatever platform it is you use to listen. [00:17:10] If you can do that for us, that would be a fantastic help to the show. It helps us both attract new listeners as well as rank higher on those directories. So appreciate you listening. Thanks so much and hope to catch you on the next episode.