Podcasts about Shut

Share on
Share on Facebook
Share on Twitter
Share on Reddit
Share on LinkedIn
Copy link to clipboard
  • 4,520PODCASTS
  • 6,767EPISODES
  • 44mAVG DURATION
  • 2DAILY NEW EPISODES
  • May 19, 2022LATEST

POPULARITY

20122013201420152016201720182019202020212022


Best podcasts about Shut

Show all podcasts related to shut

Latest podcast episodes about Shut

Lehto's Law
Cops Shut Off Body Cams When Arresting Fellow LEO

Lehto's Law

Play Episode Listen Later May 19, 2022 12:26


And it sounds like the footage we missed would have been interesting. www.patreon.com/stevelehto

First Things First
Should Mavs fans be worried after the Warriors shut Luka down in Game 1? + More likely to have a big Game 2: Tatum or Butler?

First Things First

Play Episode Listen Later May 19, 2022 50:05


Listen to Skip Bayless' interview with his wife Ernestine on the Skip Bayless Show: https://listen.foxaud.io/SkipBaylessShow 00:00 Should Mavs fans be worried after the Warriors shut Luka down in Game 1? 12:43 More likely to have a big Game 2: Tatum or Butler? 21:11 Under Duress 35:05 Stories to Start Your Morning Learn more about your ad choices. Visit megaphone.fm/adchoices

Joni and Friends Radio
Your Prayer Closet

Joni and Friends Radio

Play Episode Listen Later May 19, 2022 4:00


Do you find yourself thinking that God exists for your beck and call? Think again – let your afflictions lead you into your prayer closet. Only then can your emptiness meet God's fullness.

Marta On The Move Podcast- Hosted by Marta Napoleone Mazzoni
#159 #159 Working with Feelings of Self Doubt and Inadequacy? Ditch Comparing Yourself to Others.

Marta On The Move Podcast- Hosted by Marta Napoleone Mazzoni

Play Episode Listen Later May 18, 2022 27:43


This is a subject I have avoided writing or speaking about. I think this avoidance was unconscious, but I am now highly aware of it. I am aware of it because at many a time in my life I have suffered from self doubt, imposter syndrome (I didn't even know that existed until two years ago), and confidence issues. This month is particularly bad for me. I could not understand why I would awaken to dread and sadness. I felt on many days no motivation at all. I know I am still healing from grief, but it was more than that. Something was nagging at me, and I realized it was my own self doubt. I have my sailing retreats coming up, and I am excited for them, but there is still availability for my June one. The fact that I have spots available make me feel bad about myself. "You are a failure."Another hit was a I post I put out called How To Build Your Own Toolbox, and it didn't gain much traction. "People don't care, maybe you should give up the podcast." I asked a question on Facebook and received lack luster responses. "Maybe people are annoyed with me?" As these feelings of self doubt were bubbling within me, I saw a post from a girl who had 30,000 likes about candles of all things. I heard about a friend that is having much success hosting her own retreat. I was seeing so much happiness online, so much success of others, that it had me questioning my own. Now, let me pause here and say that maybe deep down I know I am enough, I KNOW I am making progress in my life. I know I am in such a better place than a year ago or even a day ago. I know I have so much love, success, and joy surrounding me. Even then, folks... I was/am comparing myself to others, and it got the better of me. People believe what they see. We don't know about the struggles human's face. We don't know how much it took them to announce something on the internet, or how they feel when they are offline. We don't know their loneliness or feelings of doubt. We just see the facade. We now live in a high success/high reward culture. It is not our fault for having these feelings of inadequacy. I swear the internet is made to make you feel inadequate, so don't feel bad. The real question is? How do we stop feeling this way? What steps can we take to feel confident, radiant, more creative, and the freakin unicorn that we are?! "Don't compare your life to others. There is no comparison between the Sun and the Moon. They shine when it's their time." The moment we start comparing our lives to others, we begin to feel doubt, and uncertainty, that can lead to depression, sadness, and lack of confidence. This is the reason I wanted to be a little vulnerable here on my show with this episode. I am not immune! I get mopey and down. I feel like I am not doing enough. I haven't succeeded enough. I haven't helped people enough. I feel this so often. The struggle is real, and I know there are many others that feel the same as I do. So what do we do when these feeling arise? Here are some suggestions when you feel down and find yourself in the comparison game. Shut down your internet. Take a break from doom scrolling by placing some restrictions on the amount of time you are online. Or tell the online world you are taking a week off. Being off the sauce will help you get a clear headed mind and show you the only person you are in comparison with... is yourself. More on that later. Take a long walk in nature- I am an avid believer of walking to shake off the blues, and a little fresh air will have you thinking more clearly. Look up and see the sky and know you are enough. Listen to some self growth podcasts or motivational speeches- Anything you can do to pull yourself out of doubt and into confidence is a win, and there are so many resources out there to use the internet for good. Take a shower and dress up- Really, Marta? Yes! This simple trick will have you feeling better in no time. Dressing up doesn't have to mean putting on your nicest suit or ball gown. These days I have fallen into the trap of yoga pants and sports bra. (I mean I am a teacher) but it is nice to put on some clothing that makes you feel better. Dust off that jacket or dress and give yourself a compliment! Repeat positive affirmations- I truly believe that this helps. I mean think of all the negative self talk that swims around in our brains. Where does it lead us? To being low, feeling bad, and right back into that comparison game again. Positive affirmations can help adjust the way that you think to help you feel better in no time. We will touch on more in a minute. Create a list of Daily Wins- I heard this recently on a podcast and LOVED it. I started making it a habit, because more often than not we forget the things we accomplish in the day. We focus on the negative rather than the positive, and too often we get side tracked by outside stimulation that we don't remember our wins. YOU HAVE MANY WINS! I mean, you got out of the bed, right? WIN! Write that down. It can be small or big. They all matter. Try writing your wins before you go to bed at night. Don't compare each day to the other. Each one will be different but equally important in your growth. Also, I wanted to touch on not just comparing yourself to others, but the fact that we have a tendency for self comparison. You are not beholden to things you have done in the past. I have done some incredible things in my 40 years, and sometimes instead of being proud of them, I find myself comparing the present self to what I have done! Isn't that nuts?! I know it is nuts, and still... it happens. The mind is tricky. All the successes I have had, at one point or another I have thought to myself... "Ok, yeah you hosted that game show, You gonna do another? Make it bigger?' "You did that treasure dive... You dove the Atocha for treasure...What comes next, Marta? How are you gonna top that?" I know I am not the only one here. Humans are funny, aren't they? You have to laugh sometimes. I personally have to steady myself often. How do I do this? Let's go back to positive affirmations. Which ones should you use? I will go over five of some of my favorites, but feel free to find inspiration for yours anywhere. Write them down frequently. YOU ARE ENOUGH. Rinse and repeat over, and over, and over again. I use this affirmation in my yoga teaching constantly because it is a phrase that is so important. It is one we have a hard time believing. You are enough, you don't need to be more. YOU ARE EXACTLY WHERE YOU NEED TO BE TO GET WHERE YOU ARE GOING. Not the past, not the future. Now. All you have is now and you are doing it. You are where you need to be. "YOU ARE VERY POWERFUL PROVIDED YOU KNOW HOW POWERFUL YOU ARE" - Yogi Bhajan. One of my favorite quotes to remind you that you have all the power over your life. Even the smallest of changes make a huge impact. See that glass of water? Drink it. Feel better. :) I AM WORTHY OF GOOD THINGS HAPPENING TO ME. Sometimes we stand in our own way, and beat ourselves up. This happens very often, and is a whole other podcast on it's own. Just know that you ARE worthy. No matter your past, regrets you have, or the things you have done. Everyone is capable and deserving of good things. I AM NOT ALONE- This is a big one. Too often we can feel alienated from others. We feel people don't understand what we are going through. That they seem happy, and have no clue of the dread or grief that is inside us. Please know that everyone has felt this way at some point in their life, and with the state of the world currently, they have probably felt it more often than not. Repeating this phrase, at least to me makes me feel a whole lot better. Remember to be gentle with yourself, and know also that this wave will pass. If you enjoyed this, check out one of my past episodes talking about building yourself a toolbox when you feel low. It really helps me, and hope it helps you too! I would love to know about what you would like to hear about next! Shoot me an email and say hello :) Thank you for sharing this space with me and tuning in. Feel free to review on iTunes or wherever you listen to your podcasts. Yoga Sailing Retreat Greece- June 18th- 25th. My Sicily trips are sold out, but Greece is still open and I would love to explore with you. Come sail the seas with me. It is going to be incredible and space is limited. For more information or to book your spot head to Med Sailing Holidays I invite you to come join my Sunday evening Stress Relief classes. I started them for myself, and then turned them into a pay what you can class. I would love for you to join me each Sunday at 8pm EST :) ALSO if you can't roll with me overseas this year, stay local! My friend Elizabeth Craig and I are hosting a women onlyTransformation Retreat near Pittsburgh. Sept 8-11th. Registration is now open!               As always I am not a doctor or Guru. By listening to this podcast or reading this blog, you agree not to use this podcast or blog as medical advice to treat any medical condition in either yourself or others, including but not limited to patients that you are treating.  Consult your own physician for any medical issues that you may be having.  This entire disclaimer also applies to any guests or contributors to the podcast or blog.  

The Film Bros Podcast
Punch-Drunk Love

The Film Bros Podcast

Play Episode Listen Later May 18, 2022 108:27


The bros discover tha.. SHUT UP! SHUT THE F*** UP! Shut up; will you SHUTUP SHUTUP! SHUT SHUT SHUT SHUT SHUTUP... SHUTUP!  This weeks episode is on the 2002 film, Punch-Drunk Love. Written & Directed by Paul Thomas Anderson. Instagram: https://www.instagram.com/thefilmbrospodcast Youtube: https://www.youtube.com/channel/UC4g9YbMBwRIKzDTV4uXt5Eg The bros Letterboxd's: @_isaiahlucas @lilabey @NickGowinPlaces

The Todd Herman Show
I'm Sorry For Promoting Conspiracy Theories Episode 121 - Hour 2 Im Sorry

The Todd Herman Show

Play Episode Listen Later May 17, 2022 60:40


THE THESIS: To not see what's coming and be in the “news” business is to be cowardly, lazy or spiritually blinded. Look back at the past ten years and tell me I'm wrong . . .   THE SCRIPTURE & SCRIPTURAL RESOURCES:  2 Corinthians 4:4-5 4 The god of this age has blinded the minds of unbelievers, so that they cannot see the light of the gospel that displays the glory of Christ, who is the image of God. 5 For what we preach is not ourselves, but Jesus Christ as Lord, and ourselves as your servants for Jesus' sake. THE NEWS & COMMENT: A guest of Bobby Kennedy now sees what we have been warning about for a decade [AUDIO] -  The Shift Towards Brazen Totalitarianism: "Shut Up and Get in Line!"  --- "I feel like the overarching message of the last two years has been coming from power has been 'Shut up and get in line because we're the ones running things, and we can do this to you any time we want!' " I am sorry for spreading the conspiracy theory that the so called “transgender” “bathroom diktats” were part of a far bigger conspiracy to break down the family and create leftist victims of The Party and lifelong pharma addicts. Flashback Friday on May 13, 2016 the Obama admin directed every public school to provide bathrooms for transgenders or lose federal funding.  "It's just a bathroom..." [AUDIO] - FOX Audio [AUDIO] - Brian Morgenstein - GOP “strategist” response A conversation with HydroFlask. I am so sorry for warning for nearly a decade that forcing people to speak words--like pretending men are women; pretending they are racist for simply being white--would lead to the government seizing control of language.  [AUDIO] -  Biden's "Ministry of Truth" director says she wants "verified people" like her to be able to edit people's tweets so they can "add context to certain tweets"  -- Scott Adams agrees:  I am sorry for telling people the Seattle drug laws were part of an international effort to get people addicted to drugs, to tear down the family, to tear down America [AUDIO] -  Jen Psaki says that it is a "conspiracy theory" that HHS "safe smoking kits" contain crack pipes. -- "It's not accurate." Yes, Safe Smoking Kits Include Free Crack Pipes. We Know Because We Got Them. Free Beacon Investigates: Five cities, five free crack pipes [AUDIO] -  Free Beacon reporter @PatrickHauf  tells Tucker about his work for the crack pipe story: "Boston was the worst. I go there and there's at least a dozen drug addicts walking around ... they put me in a system for free. Walk in, walk out, get the crack pipe." I cannot apologize enough for telling you the mRNA injections would kill so many people Ethical Skeptic shows the 9-sigma event in cancer deaths since the injection were forced on people … 99.99999% certain to match the data. He says this is a pull-forward effect beginning in mid-November, 2021 … meaning, in my mind, the injections.  Nonprofit Watchdog Uncovers $350 Million in Secret Payments to Fauci, Collins, Others at NIH I deeply apologize for saying the culture of death would go far beyond terminally ill people Canadian Govt. to Pay for Euthanizing Those ‘Too Poor to Live With Dignity' [AUDIO] -  Author Charles Camosy criticizes Canada's euthanasia laws which allow for euthanizing people if they are "too poor to continue living with dignity": "Canada's policies are seen for what they are." I am sorry for stating recently that there must be far more behind Ukraine than what the government is telling us [AUDIO] - Pentagon spokesman Kirby openly admitted that the West has been preparing and supplying the Ukrainian army for combat operations for eight years. I want to ask your pardon for telling your D.C. is a filthy swamp of corruption [AUDIO] - Psaki: “People always ask me … about whether Washington is rotten, whether everybody is corrupt here … and I having done this job believe the absolute opposite is true.” House of Representatives to give staff free Peloton memberships, costing taxpayers; The benefit is being offered to Capitol Police officers and House staff “A source familiar with the matter told FOX Business that the contract cost is a $10,000 upfront payment to Peloton, plus an extra $10 per month charge for each staffer or officer that utilizes the benefit. If 12,000 staffers took advantage of the benefit, it would cost taxpayers $120,000 a month” THE LISTENERS: Dan Todd, thank you for what you are doing. For bringing God to the center. I started listening to you on the radio shortly before you left the airwaves. I could feel that there was so much more you wanted to say. And now you are. I lost my job because I wouldn't get the shot. I lost the big salary and all the stock and I was afraid of what was next. I've been laid off before and didn't know that I would find work anytime soon. Inpite of my fear I was blessed to be given a job immediately after my job was terminated. I lost a third of my income but by the grace of God, through things that I cannot legally talk about, I was able to retain my home and take care of my family. And I carry on. I work in the biotech industry and have for most of my career. Over twenty years now. It feels like I'm in the belly of the beast. I have been censored on social media by multiple employers because of my truth speaking about the Rona. I have let them win on that so that I may retain an income. I'm not sure how I feel about that. This is much more than I intended to say. Mostly I am writing to say that I was doing my reading tonight which was psalm 59 and I thought that this would be a great prayer for all of us that see God's truth in this unsettling time that He has put us in. Specifically verses 3,4 For look, they lie in wait for my life; The mighty gather against me, not for my transgression nor for my sin, O Lord. They run and prepare themselves through no fault of mine This was written by David when Saul was seeking to kill him. We are in a time where whether literally or figuratively the enemy is trying to kill us. As you know, our almighty God prevails, but not without our suffering. So then, what do we do with that. 1 Peter 4:19 So then, those who suffer according to God's will should commit themselves to their faithful creator and continue to do good. Thank you for your faithfulness to our faithful creator. May God continue to bless your good work, and continue to work on your heart that you may bear the fruit that He desires from you. And I pray the same for myself. Amen Dan ---   ---   ---   Hello Todd just wanted to finally write you a quick note. I just received my shipment of Bone Frog coffee and love it. Also just to let you know that I found you through the Rush Limbaugh show as so many others have. Thank you for doing what you do God bless you and your family. Sean from Daytona Beach   See omnystudio.com/listener for privacy information.

Tapes from the Darkside: a true crime podcast
S5, ANTHOLOGY: A Psychopath

Tapes from the Darkside: a true crime podcast

Play Episode Listen Later May 17, 2022 34:03


Call transcript:>Police Department.>A man is trying to break in my door. I don't know who he is. He said, ‘let me in.'>He's doing what?>He's trying to break in my door!>What's your address?>[redacted]>What's your name, ma'm?>Karen [redacted].>Karen, I want you to stay on the telephone, okay?>Okay.>Where are you now?>I locked the front door and I'm upstairs in the bedroom.>Is there anyone with you?>No, just my baby.>Karen, are you still there?>He's in the house! He broke through the door!>He broke in—Karen, are you still there?>Uh-huh.>Shut the bedroom door. Lock it if you can and come right back to the phone.>He's at the door!>What?>He's at the door! He's here! He's here!>Are you still with me?>Uh-huh.>Tell him you've got the police on the phone.>I've got the police on the phone. Who are you? Why are you here?>He's in the bedroom with her.>I've got the police on the phone! I've got the police on the phone! Why are you here? Why are you here? Why!? Why!?>Karen? … Karen?-This is Tapes from the Darkside: Anthology.Bringing you a new case each episode.Show Notes: tapesfromthedarkside.com/s5e1 Support the show and get exclusive rewards:https://www.patreon.com/tapesfromthedarksideIf you missed our featured episode last week, please go check it out:https://www.tapesfromthedarkside.com/whatwasthatlike-grizzly/

The Overlook Hour Podcast
#339 - The Innocents, On the Count of Three, The Sadness

The Overlook Hour Podcast

Play Episode Listen Later May 17, 2022 114:01


Randy is found guilty of reviewing “The Innocents”. Clark reviews “On the Count of Three” without spoiling it. Shut up. And Russ talks “The Sadness” and the madness of Doctor Strange. Films: A Town Full of Ghosts (2022), Memoria (2021), The Innocents (2021), On the Count of Three (2021), The Carpenter (1988), The Crow: Wicked Prayer (2005), The Sadness (2021), Doctor Strange in the Multiverse of Madness (2022) Hey, we're on YouTube!  Listening on an iPhone? Don't forget to rate us on iTunes!   Fill our fe-mailbag by emailing us at OverlookHour@gmail.com  Reach us on Instagram (@theoverlooktheatre) Facebook (@theoverlookhour) Twitter (@OverlookHour)

Yes! Maybe? No.
The Vinyl Word! with Alex Benson

Yes! Maybe? No.

Play Episode Listen Later May 17, 2022 62:06


While Andrew Streeter took this episode off, Yeti enjoyed talking all about vinyl records with new friend of the show, Alex Benson! Alex is an all out vinyl junkie and is the host of the music heavy podcast "Shut the Funk Up" so this topic plays very well with our guest. Alex and Yeti talk about why they love records, how they got in to vinyl, and their various philosophies for collecting. Also: Deez nuts jokes and vandalism. Is vinyl the best? Yes! Maybe? No. Listen to Shut the Funk Up! Follow Alex on IG: @thewellfedboy Follow Shut the Funk Up on IG: @shutthefunkuppodcast

First Presbyterian Church
An Open and Shut Case

First Presbyterian Church

Play Episode Listen Later May 17, 2022 33:00


Mi365's podcast
How to Resolve Conflict and Create a Fantastic Future with Paul Nadeau

Mi365's podcast

Play Episode Listen Later May 17, 2022 57:35


“The quality of our lives depends not on whether we have conflicts, but on how we respond to them” - Thomas Crum Today I will be speaking to a man whose compelling life story has left me speechless. He has been through life-threatening circumstances but still managed to become the amazing positive person he is today.  My guest Paul Nadeau is a Canadian former hostage negotiator, peacekeeper, author, screenwriter, motivational, and keynote speaker. He grew up in a violent home. Teachers and students looked down upon him but he was able to turn things around and was even able to publish a bestseller entitled Hostage to Myself.  Take a moment and let Paul's thoughts and ideals inspire you. You too, can be a hero. Highlights: ✅ We are more similar than we are different.  ✅ It is important to put yourself in someone else's shoes.  ✅ Reacting is different from responding. Reacting leads to conflict, depression, and anxiety. ✅ A winner's mindset: Responds instead of reacting and chooses to make positive responses. Believes in oneself and moves forward with confidence despite the difficulties. Practices the golden rule. Start each day with gratitude.   Important stories: ✍

Shut the Should Up with Candace Payne + Jenny Randle
S4E07 I Should Talk about Spiritual Abuse with Special Guest Lisa Whittle

Shut the Should Up with Candace Payne + Jenny Randle

Play Episode Listen Later May 16, 2022 58:54


In this episode of Shut the Should Up with Candace Panye and Jenny Randle, we're talking to Bible teacher and best-selling author Lisa Whittle. She wrote in her most recent book The Hard Good, “We can acknowledge that a leader is flawed and also acknowledge that God has used them - and be grateful opening your heart again when it's been hurt for that. One does not nullify the other. Being wise in holding this tension can be difficult, but pretending one or the other isn't true is devastating.” So today, we're holding that tension together and having a hard conversation about spiritual abuse. You're invited to join the conversation. Don't forget to subscribe so you don't miss an episode of Shut the Should Up. Leave a review on your favorite podcast platform. Join us to watch the podcast video recording Monday nights at 7 PM PST/ 10 PM EST at our Facebook account here: https://www.facebook.com/ShutTheShouldUp Check out Lisa on the web at https://lisawhittle.com/ Until next time we love you lots and shut the should up.

Philadelphia Baptist Church
The Lord Shut Him In

Philadelphia Baptist Church

Play Episode Listen Later May 16, 2022 41:00


Cyber Security Inside
96. The Cybersecurity of IoT: Protecting Our Systems

Cyber Security Inside

Play Episode Listen Later May 16, 2022 27:53


In this episode of Cyber Security Inside, Camille and Tom get to chat with Malcolm Harkins, Chief Security & Trust Officer at Epiphany Systems, and Rob Bathurst, Co-Founder & Chief Technology Officer at Epiphany Systems about the Internet of Things and thinking like attackers to protect systems. The conversation covers: -  How the systems in a building physically can be a vulnerability in an organization's systems. -  How thinking like an adversary and what their goals might be is the key to protecting your systems the best you can. -  How complex Internet of Things systems are, and ideas on how to protect them. -  The difference between vulnerability and exploitability, and how to look at both. ...and more. Don't miss it!   The views and opinions expressed are those of the guests and author and do not necessarily reflect the official policy or position of Intel Corporation. Here are some key takeaways: -  The Internet of Things, or IoT, enables a lot of capabilities, but also creates a lot of security issues. To adjust for this, we have to change the way industry views security. -  Everything is connected to technology and networks now, from air conditioning regulation to elevators, it is all connected and inside of a network. Securing that system is incredibly important, because it is now about peoples' safety inside the building. -  It might be easier for an attacker to go after these systems than the computers and servers inside the buildings. For example, at a large sporting event, if you own the stadium, you own the event. -  To learn how to protect a building or an organization, you have to work backwards by thinking about how somebody might disrupt that building. You can then work on protecting it with that information. This is tricky when you have many different parties in a space with different goals and access levels. -  At a stadium, for example, you have food vendors, the entertainment, and more. They all need access to process credit cards, access for fans to tweet, etc. So do you put them on your internal network or on an outside network? Assessing the threat is an important part of this decision. -  This is similar to threat modeling, but with an extra complexity with the IoT systems and the interacting networks. If one vulnerability in one area could take down an entire operation, it is a big deal that requires a lot of consideration. Even removing one system, like the elevator system, can create panic and shut down an entire operation. -  To really start to secure these systems, you need to think like the people trying to take them down. Take a good look at your organization, your business, and ask yourself: if I were an adversary, where would I go for maximum disruption? -  There are differences between enterprise and IoT, including IoT having less visibility and more complexity because it is nested. The connectivity of everything is deep, and protecting a perimeter isn't as realistic in IoT as it is in enterprise. -  Coming together as a team to talk about security and what could potentially happen is one of the best ways to create a defensive understanding. We can't stay in our small silos with this connectivity - we have to talk to each other and expand the reach of each of our scopes. -  It is impossible to prevent every attack. That's why it is important to identify the goal of the attacker and evaluate your system based on that information. It is more about managing the cumulative impact and reducing it. -  When looking at something like Log4j, you need to look at where the maximum impact to your business is and address the vulnerability there. Otherwise, you might cripple the enterprise because of the effort and time put into testing, checking, and remediating areas that aren't as critical. -  Exploits apply to more than just vulnerabilities, and vulnerabilities are not just flaws in software or hardware. It is all about the adversary's ability to take advantage of either. And they don't just apply to single technical conditions, but the relationship between them. -  A way to think about this is to relate it to fire prevention. You can't prevent every fire ever from occurring in your building. But you can have smoke detectors, sprinklers, fire doors, and ways to call the fire department. And the more protections you have in place, the faster you can isolate the problem and resume operations, rather than the whole building going down. Proactivity is important!   Some interesting quotes from today's episode: “If you look at a building, most people just think of it as a shell with glass and doors and floors. And when you really look at it, it really is a connection of different systems. In most modern buildings because of energy regulation and things they get for LEED certification (basically how efficient their building is) they put in automated control systems for their furnaces, their boilers, their air conditioning units, elevators, power systems, access control.” - Rob Bathurst   “Think of the recent ransomware trend where organizations have been impacted and they've been held hostage. In some cases, it might be easier for an attacker to, in essence, attack and exploit the building and create that ransomware event rather than just all the PCs and servers.” - Malcolm Harkins   “You have to understand the way an adversary or somebody might disrupt that building, that organization, the people within it. And based on those objectives, based on those goals, you can kind of work backwards and say, how do I protect those systems?” - Rob Bathurst   “What might seem like an obscure vulnerability that could be exploited in one area could actually take down the entirety of an operation. Shut down the elevator system, turn off the fire life safety system, shut down the heating and air conditioning… Think of the chaos that would create.” - Malcolm Harkins   “People naturally want to think good thoughts. They want to be positive. They want to do the best for the places they work. And that sometimes keeps them from thinking: oh, if X, Y, Z went down, the whole place would fall apart. Because that's the place they work. But what we try and tell people is that's the mentality you need to be able to start to understand how to more properly architect and defend yourself.” - Rob Bathurst   “That's how the bad folks go from an initial foothold, that toehold, by popping one thing. And then all of a sudden navigating their way through the daisy chain of connections, to the moment of material impact.” - Malcolm Harkins   “When you look at things at a: what are we trying to do? We're not trying to stop all things all the time forever, because it's just an impossible task. The environment is too dynamic, everything else is going on. What we're trying to do is we're trying to limit the attacker's opportunity at the moments of greatest weakness.” - Rob Bathurst   “You can build a strategy, as Malcolm pointed out, to reduce the exploitable paths. And for the ones you can't reduce, create resilience, create friction as we typically call it, so that you are aware the adversary is trying something or that you're able to block it.” - Rob Bathurst   “You can be vulnerable, but not be exploitable. You could have an exploit happen again at a laptop or a pinpoint device, but that doesn't mean your organization is exploitable to a material event.” - Malcolm Harkins   “When you build the building, you have a building inspector, you have a fire marshal, you have people come around and check it and evaluate it, and make sure it's up to code. And we don't have that kind of same rigidity in the security space.” - Rob Bathurst

Reel Rotten
Episode #133 - Encino Man

Reel Rotten

Play Episode Listen Later May 15, 2022


Hey bud-dyy, If you're edged 'cause I'm weazin all your grindage, just chill. You know what that means? Neither do we. This week, Reel Rotten dissects the Pauly-rific cult classic, Encino Man (1992).In the episode, Nick, Stephen and Kyle discuss the strange ascent of Pauly Shore, “Pauly speak, ” and how to properly pronounce Brendan Fraser's name. Later, they reveal their T-T-Top 5 caveman movies and pitch an Encino Man Sequel. Shut up and listen up!Shut up and listen up! Subscribe & Follow us! Spotify: https://open.spotify.com/show/2oZ5Nv6ljpg7etvS94V2RJ?si=EiPN8rUdQz2a-TnvlHiz4Q Apple Podcasts: https://podcasts.apple.com/us/podcast/reel-rotten/id1238419564 Instagram: @reelrotten Email: reelrotten@gmail.com

Bridgeway Community Church
The Shut Door - Dr. David Anderson

Bridgeway Community Church

Play Episode Listen Later May 15, 2022 44:10


Sermon Series: Threshold Revelation 3:7 teaches that God can open doors that no man can shut and shut doors that no man can open. Every open door is not a good door to walk though! It takes discernment and prayer to know what doors to walk through and what doors to shut. Come hear from Dr. David Anderson on how God shuts some doors to protect us in the third message of the "Threshold" sermon series. Download Sermon Notes

The Heidelcast
Heidelminicast: Heidelberg Catechism 85—How Is The Kingdom Of Heaven Open And Shut By Church Discipline?

The Heidelcast

Play Episode Listen Later May 14, 2022


The Heidelberg Catechism is one of the most beloved and well used catechisms to emerge from the sixteenth and seventeenth century Reformation. Published in its final form in 1563, the catechism has been used by millions of Christians to teach the faith . . . Continue reading →

Craig Peterson's Tech Talk
Facebook Has No Idea Where Your Data Is and What They Do With It?!

Craig Peterson's Tech Talk

Play Episode Listen Later May 13, 2022 82:20


Facebook Has No Idea Where Your Data Is and What They Do With It?! Facebook's about 18 years old coming on 20 Facebook has a lot of data. How much stuff have you given Facebook? Did you fall victim for that? Hey, upload your contacts. We'll find your friends. They don't know where your data is. [Following is an automated transcript] [00:00:15] This whole thing with Facebook has exploded here lately. [00:00:20] There is an article that had appeared on a line from our friends over at, I think it was, yeah. Let me see here. Yeah. Yeah. Motherboard. I was right. And motherboards reporting that Facebook doesn't know what it does with your data or. It goes, no, there's always a lot of rumors about different companies and particularly when they're big company and the news headlines are grabbing your attention and certainly Facebook can be one of those companies. [00:00:57] So where did motherboard get this opinion about Facebook? Just being completely clueless about your personal. It tamed from a leaked document. Yeah, exactly. So we find out a lot of stuff like that. I used to follow a website about companies that were going to go under and they posted internal memos. [00:01:23] It basically got sued out of existence, but there's no way that Facebook is going to be able to Sue this one out of existence because they are describing this as. Internally as a tsunami of privacy regulations all over the world. So Gores, if you're older, we used to call those tidal waves, but think of what the implication there is of a tsunami coming in and just overwhelming everything. [00:01:53] So Facebook, internally, their engineers are trying to figure out, okay. So how do we deal with. People's personal data. It's not categorized in ways that regulators want to control it. Now there's a huge problem right there. You've got third party data. You've got first party data. You've got sensitive categories, data. [00:02:16] They might know what religion you are, what your persuasions are in various different ways. There's a lot of things they might know about you. How were they all cat categorize now we've got the European union. With their general data protection regulation. The GDPR we talked about when it came into effect back in 2018, and I've helped a few companies to comply with that. [00:02:41] That's not my specialty. My specialty is the cybersecurity. But in article five this year, peon law mandates that personal data must be collected for specified explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes. So what that means is that every piece of data, like where you are using Facebook or your religious orientation, Can only be collected in use for a specific purpose and not reused for another purpose. [00:03:19] As an example here, that vice has given in past Facebook, took the phone number that users provided to protect their accounts with two factor authentication and fed it to its people, feature as well as. Advertisers. Yeah. Interesting. Hey, so Gizmodo with the help of academic researchers caught Facebook doing this, and eventually the company had to stop the practice because, and this goes back to the earlier days where Facebook would say, Hey, find out if your friends are on Facebook, upload your contacts right now. [00:03:54] And most people. What did you know back then about trying to keep your data private, to try and stop the proliferation of information about you online then nothing. I think I probably even uploaded it back then thinking it'd be nice to see if I got friends here. We can start chatting, et cetera. [00:04:12] According to legal experts that were interviewed by motherboard who wrote this article and has a copy of the internal memo this year, PN regulation specifically prohibits that kind of repurposing of your phone number of trying to put together the social graph and the leaked document shows that Facebook may not even have the ability to live. [00:04:37] How it handles user's data. Now I was on a number of radio stations this week, talking about this. And the example I gave is just look at an average business from the time it start, Facebook started how right? Wildly scraping pictures of young women off of Harvard university. Main catalog, contact page, and then asking people what do you think of this? This person, that person. And off they go, trying to rate them. Yeah. Yeah. All that matters to a woman, at least to Courtney, to mark Zuckerberg girl, all the matters about a woman is how she looks. Do I think she's pretty or not? [00:05:15] It's ridiculous. What he was doing. It just, oh, that's zackerburg who he is not a great guy anyways. So you go from stealing pictures of young ladies asking people to rate them, putting together some class information and stuff there at Harvard, and then moving on to other universities and then open it up even wider and wider. [00:05:42] And of course, that also created demand because you can't get on. If you're not at one of the universities that we have set it up for. And then you continue to grow. You're adding these universities, certainly starting to collect data and you are making more money than God. So what do you do? You don't have to worry about any efficiencies. [00:06:02] I'll tell you that. Right? One thing you don't have to do is worry about gee. We've got a lot of redundant work going on here. We've got a lot of teams working on basically the same thing. No, you've got more money than you can possibly shake a stick at. So now you go ahead and send that money to this group or that group. [00:06:24] And they put together all of the basic information, that they want. Pulling it out of this database and that database in there doing some correlation, writing some really cool CQL queries with mem credible joins and everything else. And now that becomes part of the main code for Facebook. [00:06:45] And then Facebook goes on to the next little project and they do the same thing. Then the next project, then the next project. And then someone comes along and says, Hey, we. This feature, that feature for advertisers and then in that goes, and then along comes candidate Obama. And they, one of the groups inside Facebook says, yeah here we go. [00:07:09] Here's all of the information we have about everybody and it's free. Don't worry about it. And then when Trump actually bought it and hired a company to try and process some of that information he got in trouble. No but the. The whole campaign could get access to anything they wanted to, again, because the data wasn't controlled, they had no idea who was doing what with the data. [00:07:34] And according to this internal memo, they still don't know. They don't even know if they can possibly comply with these regulations, not just in Europe, but we have regulations in pretty much all of the 50 states in the U S Canada of course, has their own Australia and New Zealand think about all the places. [00:07:57] Facebook makes a lot of. So here's a quote from that we build systems with open borders. The result of these open systems and open culture is well-described with an analogy. Imagine you hold a bottle of ink in your hand, the bottle of ink is a mixture of all kinds of user data. You pour that ink into a lake of water and K and it flows every year. [00:08:22] The document read. So how do you put that ink back in the bottle? I, in the right bottle, how do you organize it again? So that it only flows to the allowed places in the lake? They're totally right about that. Where did they collect it from? Apparently they don't even know where they got some of this information. [00:08:43] This data from reminds me of the no fly list. You don't know you're on it and you can't get yourself off of it. It's crazy. So this document that we're talking about, it was written last year by. Privacy engineers on the ad and business product team, whose mission is to make meaningful connections between people and businesses and which quote sits at the center of our monetization strategy. [00:09:06] And is the engine that powers Facebook's growth. Interesting. Interesting problems. And I see this being a problem well into the future for more and more of these companies, look at Twitter as an example that we've all heard about a lot lately. And then I've talked about as well along comes Elon Musk and he says wait a minute. [00:09:29] I can make Twitter way more profitable. We're going to get rid of however many people over a thousand, and then we are going to hire more people. We're going to start charging. We're going to be more efficient. You can bet all of these redundancies that are in Facebook are also there. And Twitter also has to comply with all of these regulations that Facebook is freaking out about it for a really a very good reason. [00:10:00] So this document is available to anybody who wants to look at it. I'm looking at it right now, talking about regulatory landscape and the fundamental problems Facebook's data lake. And this is a problem that most companies have not. As bad as Facebook does the button. Most companies you write, you grow. I have yet to walk into a business that needs help with cybersecurity and find everything in place as it should be because it grew organically. [00:10:32] Do you started out with a little consumer firewall router, wifi, and then you added to it and you put a switch here and you added another switch behind that and move things around. This is normal. This is not total incompetence on the part of the management, but my gosh, I don't know. Maybe they need an Elon Musk. [00:10:52] Just straighten them out as well. Hey, stick around. I'll be right back and sign up online@craigpeterson.com. [00:11:02] Apparently looting is one of the benefits of being a Russian soldier. And according to the reports coming out of Ukraine, they've been doing it a lot, but there's a tech angle on here that is really turning the tables on these Russian Looters. [00:11:19] We know in wars, there are people that loot and typically the various militaries try and make sure, at least recently that looting is kept to an absolute minimum. [00:11:32] Certainly the Americans, the British, even the Nazis during world war II the the socialists they're in. Germany they tried to stop some of the looting that was going on. I think that's probably a very good thing, because what you end up with is just all of these locals that are just totally upset with you. [00:11:57] I found a great article on the guardian and there's a village. I hadn't been occupied for about a month by Russian troops and the people came back. They are just shocked to see what happened in there. Giving a few examples of different towns. They found that the alcohol was stolen and they left empty bottles behind food wrappers, cigarette butts, thrown all over the place in apartments in the home. [00:12:26] Piles of feces blocking the toilets, family photographs torn, thrown around the house. They took away all of the closes as a code from one of the people, literally everything, male and female coats, boots, shirts, jackets, even my dresses and laundry. This is really something. The Sylvia's didn't do this, but now Russia. [00:12:49] The military apparently does. So over the past couple of weeks, there have been reporting from numerous places where Russian troops had occupied Ukrainian territory and the guardian, which is this UK newspaper collected evidence to suggest looting by Russian forces was not merely a case of a few way, word soldiers, but a systematic part of Russian military behavior across multiple towns. [00:13:17] And villages. That's absolutely amazing. Another quote here, people saw the Russian soldiers loading everything onto your old trucks. Everything they could get their hands on a dozen houses on the villages. Main street had been looted as well as the shops. Other villagers reported losing washing machines, food laptops, even as sofa, air conditioner. [00:13:41] Being shipped back, just you might use ups here or they have their equivalent over there. A lady here who was the head teacher in the school, she came back in, of course, found her home looted and in the head teacher's office. She found an open pair of scissors that had been jammed into a plasma screen that was left behind because if they can't steal it, they're going to destroy it. [00:14:07] They don't wanna leave anything behind. They found the Russian to take in most of the computers, the projectors and other electronic equipment. It's incredible. So let's talk about the turnaround here. You might've heard stories about some of these bad guys that have smashed and grabbed their way into apple stores. [00:14:27] So they get into the apple store. They grab laptops on iPads, no longer iPods, because they don't make those anymore. And I phone. And they take them and they run with them. Nowadays there's not a whole lot of use for those. Now what they have been doing, some of these bad guys is they'd take some parts and use them in stolen equipment. [00:14:52] They sell them on the used market, et cetera. But when you're talking about something specific, like an iPhone that needs specific activation. Completely different problem arises for these guys because that iPhone needs to have a SIM card in order to get onto the cell network. And it also has built in serial numbers. [00:15:15] So what happens in those cases while apple goes ahead and disables them. So as soon as they connect to the internet, they didn't say they put them on wifi. They don't get a SIM card. They don't. Service from T-Mobile or Verizon or whoever it might be. So now they just connect to the wifi and it calls home. [00:15:33] Cause it's going to get updates and download stuff from the app store and they find that it's been bricked. Now you can do that with a lot of mobile device managers that are available for. All kinds of equipment nowadays, but certainly apple equipment where if a phone is lost or stolen or a laptop or other pieces of equipment, you can get on the MDM and disable it, have it remotely erase, et cetera. [00:16:00] Now, please have had some interesting problems with that. Because a bad guy might go ahead and erase a smartphone. That's in the evidence locker at the police station. So they're doing things like putting them into Faraday cages or static bags or other things to try and stop that. So I think we've established here that the higher tech equipment is pretty well protected. [00:16:25] You steal it. It's not going to do you much. Good. So one of the things the Russian stole when they were in a it's called a, I think you pronounced. Melad Mellott DePaul which is again, a Ukrainian city is they stole all of the equipment from a farm equipment dealership and shipped it to check. Now that's according to a source in a businessman in the area that CNN is reporting on. [00:16:56] So they shipped this equipment. We're talking about combine harvesters were 300 grand a piece. They shipped it 700 miles. And the thieves were ultimately unable to use the equipment because it had been locked remotely. So think about agriculture equipment that John Deere, in this case, these pieces of equipment, they, they drive themselves. [00:17:23] It's atonomous it goes up and down the field. Goes to any pattern that you want to it'll bring itself within a foot or an inch of your boundaries, of your property being very efficient the whole time, whether it's planting or harvesting, et cetera. And that's just a phenomenal thing because it saves so much time for the farmer makes it easier to do the companies like John Deere. [00:17:49] Want to sell as many pieces of this equipment as they possibly can. And farming is known to be a what not terribly profitable business. And certainly isn't like Facebook. So how can they get this expensive equipment into the hands of a lot of farmers? What they do is they use. So you can lease the equipment through leasing company or maybe directly from the manufacturer and now you're off and running. [00:18:16] But what happens if the lease isn't paid now? It's one thing. If you don't pay your lease on a $2,000 laptop, right? They're probably not going to come hunting for you, but when you're talking about a $300,000 harvester, they're more interested. So the leasing company. Has titled to the equipment and the leasing company can shut it off remotely. [00:18:41] You see where I'm going with this so that they can get their equipment in the hands of more farmers because the farmers can lease it. It costs them less. They don't have to have a big cash payment. You see how this all works. So when the Russian forces stole this equipment, that's valued, total value here is about $5 million. [00:19:02] They were able to shut it all off. And th the, obviously if you can't start the engine, because it's all shut off and it's all run by computers nowadays, and there's pros and cons to that. I think there's a lot of cons, but what are you going to do? How's that going to work for? Isn't going to work for you. [00:19:22] And they were able to track it and had GPS trackers find out exactly where it was. That's how they know it was Tara taken to Chechnya and could be controlled remotely. And in this case, how did they control it? They completely. Shut it off, even if they sell the harvesters for spare parts to learn some money, but they sure aren't gonna be able to sell them for the 300 grand that they were actually worth. [00:19:48] Hey, stick around. We'll be right back and visit me online@craigpeterson.com. If you sign up there, you'll be able to get my insider show notes. And every week I have a quick. Training right there. New emails, Craig Peterson.com. [00:20:05] If you've been worried about ransomware, you are right to worry. It's up. It's costly. And we're going to talk about that right now. What are the stats? What can you do? What happens if you do get hacked? Interesting world! [00:20:20] Ransomware has been a very long running problem. I remember a client of ours, a car dealership who we had gone in. [00:20:31] We had improved all of their systems and their security, and one of them. People who was actually a senior manager, ended up downloading a piece of ransomware, one of these encrypted ones and opened it up and his machine all of a sudden, guess what it had ransomware on it. One of those big. Green's that say, pay up and send us this much Bitcoin, and here's our address. [00:21:00] All of that sort of stuff. And he called us up and said, what's going on here? What happened? First of all, don't bring your own machine into the office. Secondly, don't open up as particularly encrypted files using a password that they gave. And thirdly, we stopped it automatically. It did not spread. [00:21:20] We were able to completely restore his computer. Now let's consider here the consequences of what happened. So he obviously was scared. And within a matter of a couple of hours, we actually had him back to where he was and it didn't spread. So the consequences there, they weren't that bad. But how about if it had gotten worse? [00:21:47] How about if the ransomware. Also before it started holding his computer ransom, went out and found all of the data about their customers. What do you think an auto dealership would love to hear that all of their customer data was stolen and released all of the personal data of all of their customers? [00:22:08] Obviously not. So there's a potential cost there. And then how long do you think it would take a normal company? That thinks they have backups to get back online. All I can tell you it'll take quite a while because the biggest problem is most backups don't work. We have yet to go into a business that was actually doing backups that would work to help restore them. [00:22:35] And if you're interested, I can send you, I've got something I wrote up. Be glad to email it back to you. Obviously as usual, no charge. And you'll be able to go into that and figure out what you should do. Cause I, I break it down into the different types of backups and why you might want to use them or why you might not want to use them, but ransomware. [00:22:58] Is a kind of a pernicious nasty little thing, particularly nowadays, because it's to two factor, first is they've encrypted your data. You can't get to it. And then the second side of that is okay I can't get to my data and now they're threatening to hold my data ransom or they'll release. So they'll put it out there. [00:23:22] And of course, if you're in a regulated industry, which actually car dealers are because they deal with financial transactions, leases, loans, that sort of thing you can lose your license for your business. You can, you lose your ability to go ahead and frankly make loans and work with financial companies and financial instruments. [00:23:45] It could be a very big. So there are a lot of potential things that can happen all the way from losing your reputation as a business or an individual losing all of the money in your operating account. And again, we've got a client that we picked up afterwards. That yes, indeed. That lost all of the money in their operating account. [00:24:09] And then how do you make payroll? How do you do things? There's a new study that came out from checkpoint. Checkpoint is one of the original firewall companies and they had a look at ransomware. What are the costs of ransomware? Now bottom line, I'm looking at some stats here on a couple of different sites. [00:24:29] One is by the way, Conti, which is a big ransomware gang that also got hacked after they said we are going to attack anyone. That doesn't defend Plaid's invasion of Ukraine, and then they got hacked and their information was released, but here's ransomware statistics. This is from cloud words. First of all, the largest ransom demand is $50 million. [00:24:55] And that was in 2021 to Acer big computer company. 37% of businesses were hit by ransomware. In 2021. This is amazing. They're expecting by 2031. So in about a decade, ransomware is going to be costing about $265 billion a year. Now on average. Ransomware costs businesses. 1.8, $5 million to recover from an attack. [00:25:25] Now that's obviously not a one or two person place, but think of the car dealer again, how much money are they going to make over the year or over the life of the business? If you're a car dealer, you have a license to print money, right? You're selling car model or cars from manufacturers. And now you have the right to do that and they can remove that. [00:25:48] How many tens, hundreds of millions of dollars might that end up costing you? Yeah. Big deal. Total cost of ransomware last year, $20 billion. Now these are the interesting statistics here right now. So pay closer attention to this 32% of ransomware victims paid a ransom. So about a third Peter ransom demand. [00:26:12] Lastly. It's actually down because my recollection is it used to be about 50% would pay a ransom. Now on average that one third of victims that paid a ransom only recovered 65% of their data. Now that differs from a number I've been using from the FBI. That's a little bit older that was saying it ends it a little better than 50%, but 65% of pain victims recovered their. [00:26:41] Now isn't that absolutely amazing. Now 57% of companies were able to recover their data, using a cloud backup. Now think about the different types of backup cloud backup is something that can work pretty well if you're a home user, but how long did it take for your system to get back? Probably took weeks, right? [00:27:05] For a regular computer over a regular internet line. Now restoring from backups is going to be faster because your downlink is usually faster than your uplink. That's not true for businesses that have real internet service like ours. It's the same bandwidth up as it is down. But it can take again, days or weeks to try and recover your machine. [00:27:28] So it's very expensive. And I wish I had more time to go into this, but looking at the costs here and the fact that insurance companies are no longer paying out for a lot of these ransomware attacks, it could be credibly expensive for you incredibly. The number one business types by industry for ransomware attacks, retail. [00:27:59] That makes sense. Doesn't it. Real estate. Electrical contractors, law firms and wholesale building materials. Isn't that interesting? And that's probably because none of these people are really aware or conscious of doing what a, of keeping their data secure of having a good it team, a good it department. [00:28:24] So there's your bottom line. Those are the guys that are getting hit. The most, the numbers are increasing dramatically and your costs are not just in the money. You might pay as a ransom. And as it turns out in pretty much every case prevention. Is less expensive and much better than the cure of trying to pay ransom or trying to restore from backups. [00:28:52] Hey, you're listening to Craig Peterson. You can get my weekly show notes by just going to craig peterson.com. [00:29:00] You and I have talked about passwords before the way to generate them and how important they are. We'll go over that again a little bit in just a second, but there's a new standard out there that will eliminate the need for passwords. [00:29:16] Passwords are a necessary evil, at least they have been forever. I remember, I think the only system I've ever really used that did not require passwords was the IBM 360. [00:29:31] Yeah, 360, you punch up the cards, all of the JCL you feed the card deck in and off it goes. And does this little thing that was a different day, a different era. When I started in college in university, we. We had a remote systems, timeshare systems that we could log into. And there weren't much in the line of password requirements. [00:29:58] And, but you had a username, you had a simple password. And I remember one of our instructors, his name was Robert, Andrew Lang, and his password was always some sort of a combination of RA Lang. So it was always easy to guess what his password was. Today. It has gotten a lot worse today. We have devices with us all the time. [00:30:22] You might be wearing a smart watch. That requires a password. You course probably have a smartphone that also maybe requiring a password. Certainly after it boots nowadays they use fingerprints or facial recognition, which is handy, but it has its own drawbacks. But how about the websites? You're going to the systems you're using in you're at work and logging in. [00:30:49] They all require password. And usernames of some sort or another well, apple, Google, and Microsoft have all committed to expanding their support for a standard. That's actually been out there for a few years. It's called the Fido standard. And the idea behind this is that you don't have to have a password in order to. [00:31:15] Now that's really an interesting thing, right? Just looking at it because we're so used to have in this password only authenticate. And of course the thing to do there is to make sure you have for your password, multiple words in the password, it should really be a pass phrase. And between the words put in special characters or numbers, maybe. [00:31:41] Upper lower case a little bit. In those words, those are the best passwords, 20 characters, 30 characters long. And then if you have to have a pin, I typically use a 12 digit pin. And how do I remember all of these? Cause I use a completely different password for every website and right now, Let me pull it up. [00:32:03] I'm using one password dot coms, password manager. And my main password for that is about 25 characters long. And I have thirty one hundred and thirty five. And trees here in my password manager, 3,100, that is a whole lot of passwords, right? As well as software licenses and a few other things in there. [00:32:30] That's how we remember them is using a password manager. One password.com is my favorite. Now, obviously I don't make any money by referring you there. I really do like that. Some others that I've liked in the past include last pass, but they really meant. With some of their cybersecurity last year and I lost my faith in it. [00:32:51] So now what they're trying to do is make these websites that we go to as well as some apps to have a consistent, secure, and passwordless. And they're going to make it available to consumers across all kinds of devices and platforms. That's why you've got apple, Google, and Microsoft all committing to it. [00:33:15] And you can bet everybody else is going to follow along because there's hundreds of other companies that have decided they're going to work with the Fido Alliance and they're going to create this passwordless future. Which I like this idea. So how does this work? Basically you need to have a smartphone. [00:33:33] This is, I'm just going to go with the most standard way that this is going to work here in the future, and you can then have. Passkey, this is like a multi-factor authentication or two factor authentication. So for instance, right now, when I sign into a website online, I'm giving a username, given a password, and then it comes up and it asks me for a code. [00:33:57] So I enter in a six digit code and that code changes every 30 seconds. And again, I use my password manager from one password. In order to generate that code. So that's how I log into Microsoft site and Google sites and all kinds of sites out there. So it's a similar thing here now for the sites for my company, because we do cyber security for businesses, including regulated businesses. [00:34:24] We have biometrics tied in as. So to log into our systems, I have to have a username. I have to have a password. I then am sent to a single sign-on page where I have to have a message sent to my smart device. That then has a special app that uses biometrics either a face ID or a fingerprint to verify who I am. [00:34:49] Yeah, there's a lot there, but I have to protect my customers. Something that very few it's crazy. Actual managed security services providers do, but it's important, right? By the way, if you want my password. Special report, just go to Craig peterson.com. Sign up for my email list. I'll send that to you. [00:35:13] That's what we're sending out right now for anyone who signs up new@craigpeterson.com. And if you'd like a copy of it in you're already on the list, just go ahead and email me. At Craig peterson.com and ask for the password special report where I go through a lot of this sort of thing. So what will happen with this is you go to a website and I might come up with a QR code. [00:35:37] So you then scan that QR code with your phone and verify it, authorize it on your phone. You might again to have it set up so that your phone requires a facial recognition or perhaps it'll require a fingerprint. And now you are. Which is very cool. They fix some security problems in Fido over the last few years, which is great over the coming year. [00:36:02] You're going to see this available on apple devices, Google Microsoft platforms, and it really is simple, stronger authentication. That's sort of Fido calls it. But it is going to make your life a lot easy, easier. It is a standard and the passwordless future makes a whole lot of sense for all of us. Now, I want to talk about another thing here that just bothered me for a long time. [00:36:30] I have a sister. Who is in the medical field and gives prescriptions, doctor thing. And I think she's not quite a doctor. I can't remember what she has. She's an LPN or something. And anyhow, so she. We'll get on a zoom call with someone and they'll go through medical history and what's happening right now and she'll make prescriptions. [00:36:57] And so I warned her about that saying, it is very bad to be using zoom because zoom is not secure. Never has been, probably never will be right. If you want secure. To go and pay for it from one of these providers like WebEx, that's what we use. We have a version of WebEx that is set up to be secure. [00:37:20] So I talked to her about that and said, Hey, listen, you can't do this. You've really got to go another way here. And so she started using one of these mental or. Medical health apps. What I want to talk about right now specifically are some checks that were just performed some audits on mental health apps. [00:37:45] That's why I messed up a second ago, but what they looked at is that things are a serious problem there. And then fact, the threat post, just calling it a. Frankly, just plain old creepy. So they've got some good intentions. They want to help with mental health. You've probably seen these or at least heard them advertise. [00:38:06] So you can get on the horn with a mental health professional, a doctor or otherwise in order to help you here with your psychological or spiritual wellness. And people are sharing their personal and sensitive data with third parties and have 32 mental health and prayer mobile apps that were investigated by the open source organization. [00:38:32] 28, 28 of the 32 were found to be inherently insecure and were given a privacy not included label, including others here. So this is a report. That was released here by the open source organization, tied into Mozilla. Those are the Firefox people. They have what they call their minimum security standards. [00:38:56] So things like requiring strong passwords, managing security, updates, and vulnerabilities, et cetera. 25 of the 32 failed to meet. Even those minimum security standards. So these apps are dealing with some of the most sensitive mental health and wellness issues people can possibly have, right? Depression, anxieties, suicidal fonts, domestic violence, eating disorders. [00:39:23] And they are being just terrible with your security Mozilla researchers spent 255 hours or about eight hours per product pairing under the hood of the security, watching the data that was going back and forth, right between all of these mental health and prayer apps. It was just crazy. So for example, eight of the apps reviewed, allowed weak passwords, that range. [00:39:52] One digit one as the password to 1, 1, 1, 1, while a mental health app called a mood fit only required one letter or digit as a password. Now that is very concerning for an app that collects mood and symptom data. So be very careful. Two of the apps better help a popular app that connects users with therapists and better stop suicide, which is a course of suicide prevention app have vague and messy, according to Mozilla privacy policies that have little or no effect on actual. [00:40:30] User data protection. So be very careful. And if you're a mental health, professional or medical professional, don't just go and use these open video calls, et cetera, et cetera, find something good. And there are some standards out there. Again. Visit me online, get my insider show notes every week. Get my little mini trends. [00:40:56] And they come up most weeks. Just go to Craig peterson.com. And I'll send you my special report on passwords and more. [00:41:06] We know the Russians have been attacking us. I've talked a lot about it on the radio station, all kinds of stations. In fact, here over the last couple of weeks, and I am doing something special, we are going through the things you can do to keep safe. [00:41:23] Last week we started doing something I promise we would continue. [00:41:27] And that is how can you protect yourself when it comes to the Russians, right? When it comes to the bad guys, because the Russians are definitely the bad guys. There's a few things you can do. And there's a few things, frankly, you shouldn't be doing. And that's exactly what we're going to talk about right now. [00:41:45] So last week he went over some steps, some things that you can look at that you should look at that are going to help protect you. And we are going to go into this a whole lot more today. And so I want you to stick around and if you miss anything, you can go online. You can go to Craig peterson.com, make sure you sign up there for my email. [00:42:08] And what I'm going to do for you is. Send you a few different documents now where we can chat back and forth about it, but I can send you this. Now I'm recording this on video as well as on audio. So you can follow along if you're watching either on YouTube or. Over on rumble and you can find it also on my website. [00:42:32] I've been trying to post it up there too, but right now let's talk about what we call passive backend protections. So you've got the front end and the front end of course, is. Stuff coming at you, maybe to the firewall I've mentioned last week about customers of mine. I was just looking at a few customers this week, just so I could have an idea of their firewalls. [00:42:59] And they were getting about 10 attacks per minute. Yeah. And these were customers who have requirements from the department of defense because they are defense sub subcontractors. So again, Potential bad guys. So I looked up their IP addresses and where the attacks were coming from. Now, remember that doesn't mean where they originated because the bad guys can hop through multiple machines and then get onto your machine. [00:43:28] What it means is that all, ultimately they ended up. Coming from one machine, right? So there's an IP address of that machine. That's attacking my clients or are attacking my machines. That just happens all the time. A lot of scans, but some definite attacks where they're trying to log in using SSH. [00:43:48] And what I found is these were coming from Slovakia, Russia, and Iran. Kind of what you were expecting, right? The Iranians, they just haven't given up yet. They keep trying to attack, particularly our military in our industry. One of the things we found out this week from, again, this was an FBI notice is that the Russians have been going after our industrial base. [00:44:15] And that includes, in fact, it's more specifically our automobile manufacturers we've already got problems, right? Try buying a new car, try buying parts. I was with my friend, just this. I helped them because he had his car right. Need to get picked up. So I took him over to pick up his car and we chatted a little bit with this small independent automotive repair shop. [00:44:40] And they were telling us that they're getting sometimes six, eight week delays on getting parts and some parts. They just can't. So they're going to everything from junkyards on out, and the worst parts are the parts, the official parts from the car manufacturers. So what's been happening is Russia apparently has been hacking into these various automobile manufacturers and automobile parts manufacturers. [00:45:10] And once they're inside, they've been putting in. A remote control button net. And those botnets now have the ability to wake up when they want them to wake up. And then once they've woken up, what do they do? Who knows? They've been busy erasing machines causing nothing, but having they've been doing all kinds of stuff in the past today, they're sitting there. [00:45:31] Which makes you think they're waiting, it's accumulate as much as you possibly can. And then once you've got it all accumulated go ahead and attack. So they could control thousands of machines, but they're not just in the U S it's automobile manufacturers in Japan. That we found out about. [00:45:50] So that's what they're doing right now. So you've got the kind of that front end and back end protections. So we're going to talk a little bit about the back end. What does that mean? When a cybersecurity guy talks about the backend and the protections. I got it up on my green right now, but here's the things you can do. [00:46:10] Okay. Remember, small businesses are just getting nailed from these guys, because again, they're fairly easy targets. One change your passwords, right? How many times do we have to say that? And yet about 70% of businesses out there are not using a good password methodology. If you want more information on passwords, two factor authentication, you name it. [00:46:37] Just email me M e@craigpeterson.com. I want to get the information out now. You got to make sure that all of the passwords on your systems are encrypted are stored in some sort of a good password vault as you really should be looking at 256 bit encryption or better. I have a vendor of. That I use. So if you get my emails every week, when them, there's the little training. [00:47:06] And so I'll give you a five minute training. It's written usually it's in bullet point for, I'm just trying to help you understand things. That provider of mine has a big database and there's another provider that I use that is for. So the training guys use the database of my provider. [00:47:27] In using that database, they're storing the passwords and the training providers putting passwords in the clinics. Into the database, which is absolutely crazy. So again, if you're a business, if you're storing any sort of personal information, particularly passwords, make sure that you're using good encryption and your S what's called salting the hash, which means. [00:47:53] You're not really storing the password, just joining assaulted hash. I can send you more on this. If you are a business and you're developing software that's, this is long tail stuff here. Configure all of the security password settings so that if someone's trying to log in and is failing that, and you block it, many of us that let's say you're a small business. [00:48:15] I see this all of the time. Okay. You're not to blame. You, but you have a firewall that came from the cable company. Maybe you bought it at a big box retailer. Maybe you bought it online over at Amazon, as hurricane really great for you. Has it got settings on there that lets you say. There's 20 attempts to log in. [00:48:38] Maybe we should stop them. Now, what we do personally for our customers is typically we'll block them at somewhere around three or four failed attempts and then their passwords block. Now you can configure that sort of thing. If you're using. Email. And that's an important thing to do. Let me tell you, because we've had some huge breaches due to email, like Microsoft email and passwords and people logging in and stealing stuff. [00:49:06] It was just a total nightmare for the entire industry last year, but limit the number of login retries as well as you're in there. These excessive login attempts or whatever you want to define it as needs to lock the account. And what that means is even if they have the right password, they can't get in and you have to use an administrative password in order to get in. [00:49:31] You also want to, what's called throttle, the rate of repeated logins. Now you might've gotten caught on this, right? You went to your bank, you went to E-bay, you went to any of these places and all of a sudden. And denied you write it blocked you. That can happen when your account is on these hackers lists. [00:49:51] You remember last week we talked about password spraying while that's a very big deal and hackers are doing the sprain trick all of the time, and that is causing you to get locked out of your own account. So if you do get locked out, remember it might be because someone's trying to break. Obviously you have to enforce the policies. [00:50:16] The capture is a very good thing. Again, this is more for software developer. We always recommend that you use multifactor or two factor authentication. Okay. Do not use your SMS, your text messages for that, where they'll send you a text message to verify who you are. If you can avoid that, you're much better off. [00:50:36] Cause there's some easy ways to get around that for hackers that are determined. Okay. A multi-factor again, installed an intrusion. system. We put right at the network edge and between workstations and servers, even inside the network, we put detection systems that look for intrusion attempts and block intrusion attempts. [00:51:02] A very important use denied lists to block known attackers. We build them automatically. We use some of the higher end Cisco gates. Cisco is a big network provider. They have some of the best hardware and software out there, and you have to subscribe to a lot of people complain. I ain't going to just go buy a firewall for 200 bucks on Amazon. [00:51:24] Why would I pay that much a month just to to have a Cisco firewall? And it's like praying pain for the brand. I've got by logo chert on here. Oh, I wouldn't pay for that. No, it's because they are automatically providing block lists that are updated by the minute sometimes. And then make sure you've got an incident response plan in place. [00:51:50] What are you going to do when they come for you? What are you going to do?  [00:51:55] Now we're going to talk about prevention. What can you do an order to stop some of these attacks that are coming from Russia and from other countries, it is huge. People. Believe me, this is a very big problem. And I'm here to help. [00:52:12] We've reviewed a number of things that are important when it comes to your cyber security and your protection. [00:52:20] We talked about the front end. We talked about the backend. Now we're going to talk about pure prevention and if you're watching. Online. You'll be able to see my slides as they come up, as we talk about some of this stuff and you'll find me on YouTube and you'll also find me on rumble, a fairly new platform out there platform that doesn't censor you for the things you say. [00:52:44] Okay. So here we go. First of all, enabling your active directory password protection is going to. Four's password protection all the way through your business. Now I've had some discussions with people over the months, over the years about this whole thing and what should be done, what can be done, what cannot be done. [00:53:09] Hey, it's a very big deal when it comes to password protection and actor directory, believe it or not, even though it's a Microsoft product is pretty darn good at a few things. One of them is. Controlling all the machines and the devices. One of the things we do is we use an MDM or what used to be a mobile device manager called mass 360. [00:53:34] It's available from IBM. We have a special version of that allows us as a managed security services provider to be able to control everything on people's machines. Active directory is something you should seriously consider. If you are a Mac based shop. Like I am. In fact, I'm sitting right now in front of two max that I'm using right now, you'll find that active directory is a little bit iffy. [00:54:04] Sometimes for max, there are some work around and it's gotten better mastery. 60 is absolutely the way to go, but make sure you've got really good. Passwords and the types of passwords that are most prone to sprain the attacks are the ones you should be banning specifically. Remember the website? Have I been poned? [00:54:28] Yeah. It's something that you should go to pretty frequently. And again, if you miss anything today, just email me M e@craigpeterson.com. Believe me, I am not going to harass you at all. Okay. Now, the next thing that you should be doing is what's called red team blue team. Now the red team is a group of people, usually outside of your organization. [00:54:54] If you're a big company they're probably inside, but the red team is the team that attacks you. They're white hat hackers, who are attacking you, looking for vulnerabilities, looking for things that you should or shouldn't be doing. And then the blue team is the side that's trying to defend. So think of, like war games. [00:55:12] Remember that movie with Matthew Broderick all of those decades ago and how the, he was trying to defend that computer was trying to defend that it moved into an attack mode, right? Red team's attack, blue team is defend. So you want. To conduct simulated attacks. Now w conducting these attacks include saying, oh my let's now put in place and execute our plan here for what are we going to do once we have a. [00:55:44] And you darn well better have a breach plan in place. So that's one of the things that we help as a fractional chief information security officer for companies, right? You've got to get that in place and you have to conduct these simulated attacks and you have to do penetration testing, including password spraying attacks. [00:56:04] There's so many things you can do. The one of the things that we like to do and that you might want to do, whether you're a home user, retiree or a business is go and look online, you can just use Google. I use far more advanced tools, but you can use Google and look for your email address right there. [00:56:23] Look for the names of people inside your organization. And then say wait a minute, does that data actually need to be there? Or am I really exposing the company exposing people's information that shouldn't be out there because you remember the hackers. One of the things they do is they fish you fish as in pH. [00:56:47] So they'll send you an email that looks like. Hey let me see. I know that Mary is the CFO, and I know that Joe's going to be out of town for two weeks in The Bahamas, not a touch. So while he's got. I'm going to send an email to Mary, to get her to do something, to transfer the company's funds to me. [00:57:06] Okay. So that's what that's all about. You've got to make sure, where is our information? And if you go to my company's page, mainstream.net, you'll see on there that I don't list any of the officers or any of the people that are in the company, because that again is a security problem. [00:57:24] We're letting them know. I go to some of these sites, like professional sites lawyers, doctors, countenance, and I find right there all, are there people right there top people or sometimes all of them. And then we'll say, yeah, I went to McGill university, went to Harvard, whatever my B. It's all there. So now they've got great information to fish you, to fish that company, because all they have to do is send an email to say, Hey, you remember me? [00:57:56] We're in Harvard when this class together. And did you have as a professor to see how that works? Okay. You also want to make. That you implement, what's called a passwordless user agent, and this is just so solely effective. If they cannot get into your count, what's going to, what could possibly go wrong, but one of the ways to not allow them into the count is to use. [00:58:24] Biometrics. We use something called duo and we have that tied into the single sign-on and the duo single sign-on works great because what it does now is I put in, I go to a site, I put it into my username and. Pulls up a special splash page that is running on one of our servers. That again asks me for my duo username. [00:58:48] So I've got my username for the site then to my dual username and my duo password single sign on. And then it sends me. To an app on my smart device, a request saying, Hey, are you trying to log into Microsoft? And w whatever it might be at Microsoft, and you can say yes or no, and it uses biometric. [00:59:11] So those biometrics now are great because it says, oh, okay, I need a face ID or I need a thumb print, whatever it might be that allows a generalized, a password, less access. Okay. Password less. Meaning no pass. So those are some of the top things you can do when it comes to prevention. And if you use those, they're never going to be able to get at your data because it's something you have along with something, it works great. [00:59:45] And we like to do this. Some customers. I don't like to go through those hoops of the single sign-on and using duo and making that all work right where we're fine with it. We've got to keep ourselves, at least as secure as the DOD regulations require unlike almost anybody else in industry, I'm not going to brag about it. [01:00:09] But some of our clients don't like to meet the tightest of controls. And so sometimes they don't. I hate to say that, but they just don't and it's a fine line between. Getting your work done and being secure, but I think there's some compromises it can be readily made. We're going to talk next about saving your data from ransomware and the newest ransomware. [01:00:36] We're going to talk about the third generation. That's out there right now. Ransomware, it's getting crazy. Let me tell ya and what it's doing to us and what you can do. What is a good backup that has changed over the last 12 months? It's changed a lot. I used to preach 3, 2, 1. There's a new sheriff in town. [01:00:58] Stick around Craig peterson.com. [01:01:02] 3, 2, 1 that used to be the standard, the gold standard for backing up. It is no longer the case with now the third generation of ransomware. You should be doing something even better. And we'll talk about it now. [01:01:19] We're doing this as a simulcast here. It's on YouTube. It is also on rumble. [01:01:27] It's on my website@craigpeterson.com because we're going through the things that you can do, particularly if you're a business. To stop the Russian invasion because as we've been warned again and again, the Russians are after us and our data. So if you missed part of what we're talking about today, or. [01:01:50] Last week show, make sure you send me an email. me@craigpeterson.com. This is the information you need. If you are responsible in any way for computers, that means in your home, right? Certainly in businesses, because what I'm trying to do is help and save those small businesses that just can't afford to have full-time. [01:02:15] True cyber security personnel on site. So that's what the whole fractional chief information security officer thing is about. Because you just, you can't possibly afford it. And believe me, that guy that comes in to fix your computers is no cyber security expert. These people that are attacking our full time cybersecurity experts in the coming from every country in the world, including the coming from the us. [01:02:44] We just had more arrests last week. So let's talk about ransomware correctly. Ransomware, very big problem. Been around a long time. The first version of ransomware was software got onto your computer through some mechanism, and then you had that red screen. We've all seen that red screen and it says, Hey, pay up buddy. [01:03:07] It says here you need to send so many Bitcoin or a fraction of a Bitcoin or so many dollars worth of Bitcoin. To this Bitcoin wallet. And if you need any help, you can send email here or do a live chat. They're very sophisticated. We should talk about it some more. At some point that was one generation. [01:03:29] One generation two was not everybody was paying the ransoms. So what did they do at that point? They said let me see if they, we can ransom the data by encrypting it and having them pay us to get it back. 50% of the time issue got all your data back. Okay. Not very often. Not often enough that's for sure. [01:03:49] Or what we could do is let's steal some of their intellectual property. Let's steal some of their data, their social security number, their bank, account numbers, et cetera. They're in a, in an Excel spreadsheet on their company. And then we'll, if they don't pay that first ransom, we'll tell them if they don't pay up, we'll release their information. [01:04:10] Sometimes you'll pay that first ransom and then they will hold you ransom a second time, pretending to be a different group of cyber terrorists. Okay. Number three, round three is what we're seeing right now. And this is what's coming from Russia, nears, everything we can tell. And that is. They are erasing our machines. [01:04:31] Totally erasing them are pretty sophisticated ways of erasing it as well, so that it sinks in really, it's impossible to recover. It's sophisticated in that it, it doesn't delete some key registry entries until right at the very end and then reboots and computer. And of course, there's. Computer left to reboot, right? [01:04:55] It's lost everything off of that hard drive or SSD, whatever your boot devices. So let's talk about the best ways here to do some of this backup and saving your data from ransomware. Now you need to use offsite disconnected. Backups, no question about it. So let's talk about what's been happening. [01:05:17] Hospitals, businesses, police departments, schools, they've all been hit, right? And these ransomware attacks are usually started by a person. I'll link in an email. Now this is a poison link. Most of the time, it used to be a little bit more where it was a word document, an Excel document that had something nasty inside Microsoft, as I've said, many times has truly pulled up their socks. [01:05:45] Okay. So it doesn't happen as much as it used to. Plus with malware defender turned on in your windows operating system. You're going to be a little bit safer next step. A program tries to run. Okay. And it effectively denies access to all of that data. Because it's encrypted it. And then usually what it does so that your computer still works. [01:06:09] Is it encrypts all of you, like your word docs, your Excel docs, your databases, right? Oh, the stuff that matters. And once they've got all of that encrypted, you can't really access it. Yeah. The files there, but it looks like trash now. There's new disturbing trends. It has really developed over the last few months. [01:06:31] So in addition to encrypting your PC, it can now encrypt an entire network and all mounted drives, even drives that are marrying cloud services. Remember this, everybody, this is really a big deal because what will happen here is if you have let's say you've got an old driver G drive or some drive mounted off of your network. [01:06:57] You have access to it from your computer, right? Yeah. You click on that drive. And now you're in there and in the windows side Unix and max are a little different, but the same general idea you have access to you have right. Access to it. So what they'll do is any mounted drive, like those network drives is going to get encrypted, but the same thing is true. [01:07:20] If you are attaching a U S B drive to your company, So that USB drive, now that has your backup on it gets encrypted. So if your network is being used to back up, and if you have a thumb drive a USB drive, it's not really a thumb drive, right? There's external drive, but countered by USP hooked up. [01:07:45] And that's where your backup lives. Your. Because you have lost it. And there have been some pieces of software that have done that for awhile. Yeah. When they can encrypt your network drive, it is really going after all whole bunch of people, because everyone that's using that network drive is now effective, and it is absolutely. [01:08:10] Devastating. So the best way to do this is you. Obviously you do a bit of a local backup. We will usually put a server at the client's site that is used as a backup destiny. Okay. So that servers, the destination, all of the stuff gets backed up there. It's encrypted. It's not on the network per se. It's using a special encrypted protocol between each machine and the backup server. And then that backup servers data gets pushed off site. Some of our clients, we even go so far as to push it. To a tape drive, which is really important too, because now you have something physical that is by the way, encrypted that cannot be accessed by the attacker. [01:09:03] It's offsite. So we have our own data center. The, we run the, we manage the no one else has access to it is ours. And we push all of those backups offsite to our data center, which gives us another advantage. If a machine crashes badly, right? The hard disk fails heaven forbid they get ransomware. We've never had that happen to one of our clients. [01:09:29] Just we've had it happen prior to them becoming clients, is that we can now restore. That machine either virtually in the cloud, or we can restore it right onto a piece of hardware and have them up and running in four hours. It can really be that fast, but it's obviously more expensive than in some. [01:09:51] Are looking to pay. All right, stick around. We've got more to talk about when we come back and what are the Russians doing? How can you protect your small business? If you're a one, man, one woman operation, believe it. You've got to do this as well. Or you could lose everything. In fact, I think our small guys have even more to lose Craig peterson.com. [01:10:16] Backups are important. And we're going to talk about the different types of backups right now, what you should be doing, whether you're a one person, little business, or you are a, multi-national obviously a scale matters. [01:10:32] Protecting your data is one of the most important things you can possibly do. [01:10:36] I have clients who had their entire operating account emptied out, completely emptied. It's just amazing. I've had people pay. A lot of money to hackers to try and get data back. And I go back to this one lady over in Eastern Europe who built a company out of $45 million. By herself. And of course you probably heard about the shark tank people, right? [01:11:07] Barbara Cochran, how she almost lost $400,000 to a hacker. In fact, the money was on its way when she noticed what was going on and was able to stop it. So thank goodness she was able to stop it. But she was aware of these problems was looking for the potential and was able to catch it. How many of us are paying that much attention? [01:11:34] And now one of the things you can do that will usually kind of protect you from some of the worst outcomes. And when it comes to ransomware is to backup. And I know everybody says, yeah, I'm backing up. It's really rare. When we go in and we find a company has been backing up properly, it even happens to us sometimes. [01:11:59] We put them back up regimen in place and things seem to be going well, but then when you need the backup, oh my gosh, we just had this happen a couple of weeks ago. Actually this last week, this is what happened. We have. Something called an FMC, which is a controller from Cisco that actually controls firewalls in our customer's locations. [01:12:26] This is a big machine. It monitors stuff. It's tied into this ice server, which is. Looking for nastiness and we're bad guys trying to break in, right? It's intrusion detection and prevention and tying it into this massive network of a billion data points a day that Cisco manages. Okay. It's absolutely huge. [01:12:48] And we're running it in a virtual machine network. So we. Two big blade. Chassies full of blades and blades are each blade is a computer. So it has multiple CPU's and has a whole bunch of memory. It also has in there storage and we're using something that VMware calls visa. So it's a little virtual storage area network. [01:13:15] That's located inside this chassis and there are multiple copies of everything. So if a storage unit fails, you're still, okay. Everything stays up, it keeps running. And we have it set up so that there's redundancy on pond redundancy. One of the redundancies was to back it up to a file server that we have that's running ZFS, which is phenomenal. [01:13:40] Let me tell you, it is the best file system out there I've never ever had a problem with it. It's just crazy. I can send you more information. If you ever interested, just email me@craigpeterson.com. Anytime. Be glad to send you the open source information, whatever you need. But what had happened is. [01:13:57] Somehow the boot disk of that FMC, that, that firewall controller had been corrupted. So we thought, oh, okay, no problem. Let's look at our backups. Yeah, hadn't backed up since October, 2019. Yeah, and we didn't know it had been silently failing. Obviously we're putting stuff in place to stop that from ever happening again. [01:14:27] So we are monitoring the backups, the, that network. Of desks that was making up that storage area network that had the redundancy failed because the machine itself, somehow corrupted its file system, ext four file system right then are supposed to be corruptible, but the journal was messed up and it was man, what a headache. [01:14:51] And so they thought, okay, you're going to have to re-install. And we were sitting there saying, oh, you're kidding me. Reinstalling this FMC controller means we've got to configure our clients, firewalls that are being controlled from this FMC, all of their networks, all of their devices. We had to put it out. [01:15:07] This is going to take a couple of weeks. So because I've been doing this for so long. I was able to boot up an optics desk and Mount the file system and go in manually underneath the whole FMC, this whole firewall controller and make repairs to it. Got it repaired, and then got it back online. So thank goodness for that. [01:15:33] It happens to the best of us, but I have to say I have never had a new client where they had good backups. Ever. Okay. That, and now that should tell you something. So if you are a business, a small business, whatever it might be, check your backups, double check them. Now, when we're running backups, we do a couple of things. [01:15:57] We go ahead and make sure the backup is good. So remember I mentioned that we h

The Heidelcast
Heidelminicast: Heidelberg Catechism 84—How Is The Kingdom Of Heaven Opened And Shut By Church Discipline?

The Heidelcast

Play Episode Listen Later May 13, 2022


The Heidelberg Catechism is one of the most beloved and well used catechisms to emerge from the sixteenth and seventeenth century Reformation. Published in its final form in 1563, the catechism has been used by millions of Christians to teach the faith . . . Continue reading →

Covenant Church Douglas
Shut Your Door | Table Talk

Covenant Church Douglas

Play Episode Listen Later May 13, 2022 8:57


Check out another devotional with Pastors Gregory and Jackie Pope. This week, Pastors discuss on shutting the door to distractions in life.

Am I the Jerk?
Entitled Mother SMOKES in my CAR... so I had to SHUT HER DOWN

Am I the Jerk?

Play Episode Listen Later May 12, 2022 20:33


Full Videos - youtube.com/amithejerk?sub_confirmation=1

Live Laugh Beef
"white culture" test & elon musk 2024

Live Laugh Beef

Play Episode Listen Later May 12, 2022 58:24


9? Shut the f*ck up I'm 11 (11th episode that is.) Howdy girlies, welcome back to another episode of Live Laugh Beef with Ally Sloan & Joshua Ticsay. Today's episode starts on a more serious note, discussing the current political climate with Elon Musk's Twitter acquisition & the Supreme Court decision to *possibly* overturn Roe vs. Wade. But don't fret, we've also got some fun in store (listen, this is our most chaotic episode yet). From, rapping Motorsport by Migos to responding to our hate comments, we could not breathe for a second. Lastly, we cover pop culture with Met Gala looks, Megan Fox & MGK's blood rituals, and even discussing the demise of the Ellen Degeneres show. So sit tight, grab a drink & live, laugh, beef with us. --- Send in a voice message: https://anchor.fm/livelaughbeef/message

Motivation Daily by Motiversity
I DARE YOU TO DISAPPEAR FOR 6 MONTHS

Motivation Daily by Motiversity

Play Episode Listen Later May 11, 2022 7:54


I Dare You To Disappear and Work on Yourself For 6 Months. Shut yourself off from the outer judgment and the negative news, and focus on yourself. Your future self will thank you.Speakers:Marcus Taylor: http://bit.ly/38FUFoSMusic:Epidemic Sound See acast.com/privacy for privacy and opt-out information.

Upland Nation
Stealth for bird hunters: 15 tips to put more birds in your bag

Upland Nation

Play Episode Listen Later May 11, 2022 48:23


Want to put more birds in your vest this season? Shut the heck up. Stealth isn't just for big game and turkey hunters - so here are 15 tips that will get you closer to birds and better shots. From handling your dog quietly to managing all the stuff on your vest, I've put together all the great advice I've picked up over the years working with pro guides, elk hunters and others who, like me, learned their lessons the hard way. The Upland Nation Glossary stops at the letter "M," we visit some of your special places shared in photos and videos and I'll hit one one of my favorite public-access regions.   Please visit our sponsors: Sage & Braker Mercantile, Dr. Tim's performance dog food, Pointer shotguns, RuffLand performance Kennels, the Ringneck Nation of Huron, SD, Mid Valley Clays and Shooting School, your online shotgun shopping resource; AudioCardio.com, the Ringneck Nation of Huron, SD, and FindBirdHuntingSpots.com.

Linha Avançada
Shut Your Fucking Mouth

Linha Avançada

Play Episode Listen Later May 10, 2022 8:32


A luta pela descida na liga portuguesa, os 2 cm de Darwin e um tenista em confronto com o público.

Locked On Panthers - Daily Podcast On The Carolina Panthers
The Door Isn't 100% Shut on the Carolina Panthers and Trade Talks Regarding Baker Mayfield

Locked On Panthers - Daily Podcast On The Carolina Panthers

Play Episode Listen Later May 10, 2022 34:27


Josina Anderson reported on Monday afternoon that the door "isn't 100% shut the Panthers and talks regarding (Cleveland Browns quarterback) Baker Mayfield." Should the Panthers continue pursuit of Mayfield after trade talks fell apart during Day 2 of the NFL Draft? What would trading for Mayfield do to rookie Matt Corral's development? The Athletic's Mike Sando spoke to several NFL executives following the NFL Draft where the execs provided their anonymous opinion on how each of the 32 NFL franchises did in the draft. In regards to Carolina, one exec believes that the Panthers overpaid for Corral and the decision to trade into the 3rd round was driven by Panthers owner David Tepper. Did the Panthers give up too much for Corral? What role if any did David Tepper play in the Panthers bringing Corral to Carolina? Former Panthers cornerback James Bradberry was released by the New York Giants on Monday. Should the team look to bring back the Pro Bowl corner? Support Us By Supporting Our Sponsors! Built Bar Built Bar is a protein bar that tastes like a candy bar. Go to builtbar.com and use promo code “LOCKED15,” and you'll get 15% off your next order. BetOnline BetOnline.net has you covered this season with more props, odds and lines than ever before. BetOnline – Where The Game Starts! Rock Auto Amazing selection. Reliably low prices. All the parts your car will ever need. Visit RockAuto.com and tell them Locked On sent you. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Mi365's podcast
4 Ways to Conquer Procrastination

Mi365's podcast

Play Episode Listen Later May 10, 2022 30:09


“Procrastination is the thief of time.” - Charles Dickens Today's topic is one that we are all guilty of doing at one point in time in our lives. It is one habit that has prevented us from reaching our fullest potential. We are all aware of what procrastination is. We know it negatively affects us, but why do we do it? Why do we always put off doing what we must do? More importantly, how can we stop procrastinating? Tune in and find out the answers. Help me, help you reinvent yourself and become the best version of you because a great life does not happen by chance but by design. Highlights: ✅ We procrastinate to avoid pain or stress and because we lack direction. ✅ Overpower the urge to procrastinate: Be aware of what you are doing to yourself. Understand and believe how great you can be. Choose and decide who you want to become. Stop stalling about specific tasks and start acting, get in the game, as Mel Robbins mentioned in her 5 Second Rule book.  Celebrate every time you stop and start until you can form better habits.  Important stories: ✍

The Dr Boyce Breakdown
Dr Dre lost $200M in Apple deal because Tyrese could not keep his mouth shut

The Dr Boyce Breakdown

Play Episode Listen Later May 9, 2022 24:37


Today, I did an analysis of an interesting Black Enterprise article regarding how Dr Dre lost $200 million in his deal with Apple. The loss occurred because he was under specific instructions not to mention the deal publicly, which was violated on a drunken night with singer Tyrese. Why bring this up? Because when we teach about protecting your wealth in The Black Business School, it also means protecting your assets against bad choices. You can watch the video here. Feel free to leave your comments.

In the Market with Janet Parshall

Your Mind Is the Devil's Playground. Here's the truth: The devil can't beat you on even ground. So, he creeps his way into your mind, weaving words and situations into lies you take as truth: I'm a failure. Something's wrong with me. God's mad at me. Nobody cares about me. These devil-crafted lies create the emotional, psychological, and spiritual conflicts that rob you of your God-given purpose. Yet you can win these battles. Join us to discover the biblical tools you need to recognize the sour, subtle voice of the Accuser. Once you do, you will see his toxic thought patterns and destructive lies for the slander they are. And you will say with unshakable confidence and courage: "Shut up, devil!"

Shut the Should Up with Candace Payne + Jenny Randle
S4E06 I Should Feel All the Things

Shut the Should Up with Candace Payne + Jenny Randle

Play Episode Listen Later May 9, 2022 56:09


In this episode of Shut the Should Up with Candace Panye and Jenny Randle, we are taking a deep dive into all the feels. Are feelings either good or bad or just amoral? Do some feelings deserve to be quarantined or dismissed? What are feelings and how do we navigate them? This is an episode that you're going to want to share and revisit. Don't forget to subscribe so you don't miss an episode of Shut the Should Up. Leave a review on your favorite podcast platform. Join us to watch the podcast video recording Monday nights at 7 PM PST/ 10 PM EST at our Facebook account here: https://www.facebook.com/ShutTheShouldUp Hey, check out our season 4 exclusive merch! https://shut-the-should-up-merch-2.creator-spring.com/ Interested in learning more about Candace Payne, her books and curriculum or have her SPEAK for your church or event? Visit https://candacepayne.me/ Interested in learning more about Jenny Randle, her books, coaching program, or have her SPEAK for your church or event? Visit https://jennyrandle.com Until next time we love you lots and shut the should up.

WTFamicom: A Gaming Podcast
Episode #40 - WiiNNERS DON'T USE DRUGS

WTFamicom: A Gaming Podcast

Play Episode Listen Later May 9, 2022 55:39


BUSTED! Shut your mouth, spread your legs and hand over any illegal drugs you have! And if this is anything like a videogame you probably used those drugs to slow time or assist you during the filming of the Street Fighter movie. Since the 80's, the FBI has monitored drug use in gaming so we're renting out a van that says FLOWERS on the outside and finally monitoring them back! On today's episode we talk about drug levels, infiltrate gaming addiction and more. So grab your plain clothes, and let's go find some people to narc on.

Life Change Church - Coos Bay
20220508 Sunday -Decide-(Open or Shut)

Life Change Church - Coos Bay

Play Episode Listen Later May 8, 2022 38:49


In The Past: Garage Rock Podcast
Mama, Keep Your Big Mouth Shut

In The Past: Garage Rock Podcast

Play Episode Listen Later May 7, 2022 105:20


Our Mother's Day special episode features 4 versions of a song only a mother could hate - Bo Diddley's 1964 putdown, "Mama, Keep Your Big Mouth Shut." The original has a great riff, a funky strut, vibrato on the vocals (Bo is a way underrated singer), and overall,  the tremendous tremulous sound you know from Bo (1:33). The next year, The Pretty Things make the song less funky but still smelly, with some frantic rhythm strum, some strident singing, and a rave-up section in the middle (50:14).  From Sweden the same year, The Gonks add even snottier vocals and keep the song in the garage with the now-usual truncated lyrics and rave-up part (1:12:15).  The final word comes from Canada's Ugly Ducklings who made plans for this tune in 66: they add fuzz and make the tempo faster than the speed of snot! (1:25:46)  Don't let the door hit you where the dog bit you!!

Mi365's podcast
Please Help Hannah

Mi365's podcast

Play Episode Listen Later May 6, 2022 24:44


This is podcast dedicated to my wife Hannah Cohen regarding a very special appeal to raise money for life-saving treatment for Hannah who has a brain tumour.  Please donate https://gofund.me/15bc011e However, things took a turn for the worse in November 2021 when Hannah had another major seizure and since then her condition has gradually declined with more seizures and the right side of her body not functioning properly. Results of a recent MRI show that there is a reoccurrence of the tumour. It is inoperable and repeating the previous treatment is not an option for us now.   

Dave Hill's Podcasting Incident
Episode 256: Author Mark Rozzo #MaxFunDrive Edition

Dave Hill's Podcasting Incident

Play Episode Listen Later May 6, 2022 61:40


Shut the blinds and get ready for another action-packed #MaxFunDrive edition episode of The Dave Hill Goodtime Hour as Dave, Dez, and Chris encourage/beg you to become MaxFun members lest you face an increasingly enraged Dave, before welcoming Vanity Fair editor and author of the new book Everybody Thought We Were Crazy: Dennis Hopper, Brooke Hayward, and 1960s Los Angeles, Mark Rozzo. Recorded live May 2, 2022.You can help support The Dave Hill Goodtime Hour during #MaxFunDrive by becoming a Maximum Fun member or upgrading your current membership! If you upgrade to $10/month you get a slick new "Is This The Show?" patch!Buy Mark's new book Everybody Thought We Were Crazy: Dennis Hopper, Brooke Hayward, and 1960s Los Angeles or Dave will stab you.Brand-new "Is this the show?" t-shirt designs, inspired by numerous guests, viewers, listeners & law enforcement, are now available! Watch Dave's latest stand up special The Pride of Cleveland on 800 Pound Gorilla Records' YouTube Page or his feelings will be hurt.Watch The Dave Hill Goodtime Hour  every Monday at 8pm ET, now exclusively on Twitch!WE HAVE T-SHIRTS NOW! Support Dave, Dez and Chris by purchasing one today!Support this show by becoming a Maximum Fun member!Join the Dumb Industries newsletter to stay on top of all things Dumb, including The Dave Hill Goodtime Hour!Follow Dave on Instagram (@mrdavehill), Dez on Twitter (@shouthouseradio) and Chris on Twitter (@csgersbeck). Dave is banned from Twitter :(Chat with listeners at Dave Hill's Facebooking Incident. Everyone is making out there and stuff. It rules.The Dave Hill Goodtime Hour is a production of Dumb Industries.

Shut The Puck Up
Shut the Puck Up Episode 18

Shut The Puck Up

Play Episode Listen Later May 5, 2022 65:25


Austin, Brady and Tyler break down every mach up for the 2022 Stanley Cup playoffs and give predictions. 

Best Frenemies
Episode 67: Episode #67: An Offer You Can’t Refuse

Best Frenemies

Play Episode Listen Later May 5, 2022 69:30


Johnny and Christopher are dropping this episode to shut up their “fans” who take pleasure in harassing them to put out more episodes. Shut up already! Johnny and Christopher have lives. They do stuff. You'll get the damn episode when you get the damn episode. They give their Top 5 bald people (Christopher thinks it is funny that he doesn't make Johnny's list). They discuss the Paramount+ series The Offer. And they recommend some stuff. 

Mike Salk
Hour 1-Mariners shut out in Houston, Seahawks to play in Germany this November

Mike Salk

Play Episode Listen Later May 4, 2022 42:10


Another night of no run support behind Chris Flexen's strong start for the Mariners and fall to the Astros 4-0. Salk's level of uneasiness is rising but not quite concerned yet with the offensive struggles. How much patience should M's fans have with the young players? Seahawks announced to face the Buccaneers in Munich on November 13 and Salk tells us a story about his only trip to Germany. Salk is surprised to like the mental health comments made by Titans QB Ryan Tannehill. See omnystudio.com/listener for privacy information.

Mi365's podcast
5 Biggest Threats To Building Your Fantastic Future

Mi365's podcast

Play Episode Listen Later May 3, 2022 36:00


“The future belongs to those who believe in the beauty of their dreams.” - Eleanor Roosevelt Does it seem like you are stuck in a loop? Have you ever asked yourself why you seem to be going nowhere? Why are others able to have a better future? Can you have a much better life than what you presently have? Believe me, I have as well asked those questions before and searched for answers. I am now living a more fulfilling life and will continue to have an awesome future despite life's challenges.  Lend me your ears for a little while as I divulge my epiphanies. We can all have a remarkable future.  Highlights: ✅ Resisting temptation is a constant battle between the present and the future self. ✅ We are driven by the imagination of our future.  ✅ We decide who we want to become. Biggest threats: Having no connection with future self  Lacking empathy and discipline Losing hope and failing to prospect Selling yourself short  Failing to commit to creating a greater and more inspiring legacy Important stories: ✍

Shut the Should Up with Candace Payne + Jenny Randle
S4E05 I Should Really Lighten Up with Jaron Myers

Shut the Should Up with Candace Payne + Jenny Randle

Play Episode Listen Later May 2, 2022 57:59


In this episode of Shut the Should Up with Candace Panye and Jenny Randle, we brought in comedian Jaron Myers to help us all lighten up. Don't forget to subscribe so you don't miss an episode of Shut the Should Up. Leave a review on your favorite podcast platform. Join us to watch the podcast video recording Monday nights at 7 PM PST/ 10 PM EST at our Facebook account here: https://www.facebook.com/ShutTheShouldUp Check out Jaron on the web at https://www.jaronmyers.com/ Until next time we love you lots and shut the should up.

Locked On Boston College - Daily Podcast On Boston College Eagles Football & Basketball
BC Football Shut Out Of NFL Draft After Round One, But Players Find New Homes

Locked On Boston College - Daily Podcast On Boston College Eagles Football & Basketball

Play Episode Listen Later May 2, 2022 33:59


After guard Zion Johnson was drafted in the first round, Boston College saw no players called in the NFL Draft. The biggest surprise was center Alec Lindstrom, who was projected anywhere from the 3rd to 7th round, and still wasn't drafted. Why did that happen? We are joined by BC Bulletin staff writer Mitch Wolfe to talk about the aftermath of the NFL Draft. In the final segment we look at Jordan Addison's potential NIL deal with the USC Trojans, and what this whole thing means to college football . Support Us By Supporting Our Sponsors! Built Bar Built Bar is a protein bar that tastes like a candy bar. Go to builtbar.com and use promo code “LOCKED15,” and you'll get 15% off your next order. BetOnline BetOnline.net has you covered this season with more props, odds and lines than ever before. BetOnline – Where The Game Starts! Rock Auto Amazing selection. Reliably low prices. All the parts your car will ever need. Visit RockAuto.com and tell them Locked On sent you. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Reel Rotten
Episode #132 - Morbius

Reel Rotten

Play Episode Listen Later May 1, 2022


M-m-morbiussss! This week, Reel Rotten bites in to the abomination 3 years in the making that is Morbius (2022).Nick, Stephen and self-proclaimed Marvel completionist, Zack, suckle into what might be the worst comic book movie of all time. In this episode, the boys discuss the enigma that is Jared Leto and if the #sinistersix will ever happen on the big screen. Later, they draft their top vampires in tv & film. Shut up and listen up! Subscribe & Follow us! Spotify: https://open.spotify.com/show/2oZ5Nv6ljpg7etvS94V2RJ?si=EiPN8rUdQz2a-TnvlHiz4Q Apple Podcasts: https://podcasts.apple.com/us/podcast/reel-rotten/id1238419564 Instagram: @reelrotten Email: reelrotten@gmail.com

Celebration Church
Shut Hell Up

Celebration Church

Play Episode Listen Later May 1, 2022 45:32


Welcome to Celebration Church! We exist to know God and make Him known. Thank you for joining us at Celebration Online to worship together and hear an inspiring message!

Chat, Grapple and Cheap Pops Podcast
Full Shoot Interview with Author and Former WWE Editor Brian R Solomon

Chat, Grapple and Cheap Pops Podcast

Play Episode Listen Later May 1, 2022 149:07


Welcome to another very special Shoot interview from Chris and JB at Chat Grapple and Cheap Pops!! This time around we have a superb interview with an extremely knowledgeable guest, Brian R Solomon. He is an Author of such books as WWE Legends, Pro Wrestling FAQ, Godzilla FAQ, and his latest book Blood and Fire The Unbelievable real life story of wrestling's Original Sheik. As well as being an accomplished writer, he also was the editor for the WWE Magazine in the early 2000s, and now he also hosts his own podcast called Shut up and Wrestle. We had a lengthy chat with Brian about his new book, his old books, his work on the WWE magazine, his thoughts on wrestling journalism today and a heck of a lot of other interesting stuff in between! This man loves wrestling as much as we do, and he's been around the inner workings of the business for decades. This is a must watch for any dedicated wrestling fan. Remember to hit those Like & Subscribe buttons!!!! Join Chris & JB to continue the discussion here https://twitter.com/ChatGrapplePops​ Use the link below & the promo code ‘GRAPPLE' for $5 off your next purchase at ZenPop.jp for all your Japanese subscription box needs https://bit.ly/chatgrapple Pick up some of our awesome merchandise here - https://www.redbubble.com/people/ChatGrapplePops/shop?asc=u

Remnant Call
The Devil's Lullaby with Jamie Walden

Remnant Call

Play Episode Listen Later Apr 30, 2022 54:00


The Devil is singing a song right now and its Shut your mouth and go to sleep. It is getting real folks we got to be awake. Join us as Brother Jamie shares some insights into whats going on right now!

CATS Roundtable
Mario Economou - The Russians have shut off Poland's gas. Using evacuees as pawns.

CATS Roundtable

Play Episode Listen Later Apr 30, 2022 8:09


Mario Economou - The Russians have shut off Poland's gas. Using evacuees as pawns. by John Catsimatidis

Getting Magnetic with Sandy & Wade
Shut Up and Show Me

Getting Magnetic with Sandy & Wade

Play Episode Listen Later Apr 29, 2022 13:32


Timestamps: [0:15] Shut up and show me. [2:02] If someone was watching you, would they be able to see you walk the walk? [5:42] It's easy to talk, but few walk - cut the excuses. [7:54] Staying connected to your "why" will make walking the walk easier. --Let's Connect!To get more info and updates on the podcast@gettingmagneticFollow our personal Instagram accounts@sandyclaus7@wellnesswithwadeCheck out our website for all things Getting Magnetichttps://www.sandyandwade.com/

The Health Ranger Report
Situation Update, April 28, 2022 - Supply chain SHUTDOWNS are "CLOT SHOTS" against the global economy

The Health Ranger Report

Play Episode Listen Later Apr 28, 2022 82:09


0:00 Intro 2:35 Donation Announcement 8:50 Economy News 22:25 Other Stories 28:00 German Tanks 38:10 Climate Lockdown 55:30 Other News 59:20 Supply Chain SHUTDOWNS For more updates, visit: http://www.brighteon.com/channel/hrreport NaturalNews videos would not be possible without you, as always we remain passionately dedicated to our mission of educating people all over the world on the subject of natural healing remedies and personal liberty (food freedom, medical freedom, the freedom of speech, etc.). Together, we're helping create a better world, with more honest food labeling, reduced chemical contamination, the avoidance of toxic heavy metals and vastly increased scientific transparency. ▶️ Every dollar you spend at the Health Ranger Store goes toward helping us achieve important science and content goals for humanity: https://www.healthrangerstore.com/ ▶️ Sign Up For Our Newsletter: https://www.naturalnews.com/Readerregistration.html ▶️ Brighteon: https://www.brighteon.com/channels/hrreport ▶️ Join Our Social Network: https://brighteon.social/@HealthRanger ▶️ Check In Stock Products at: https://PrepWithMike.com

The David Alliance
The simplest hardest thing to do to change your life

The David Alliance

Play Episode Listen Later Apr 28, 2022 7:29


Wake the Faith up Slayer… This is Garth Heckman with the David Alliance and you can reach me at TDAgiantslayer@gmail.com    Brought to you by wellbuiltbody.com Gym Apparel for men and women that rocks and shocks and ain't for everybody - but just might be for you. wellbuiltbody.com   July 9th - Saturday - A Father Daughter/Son conference called PROTECTOR! Speakers on how to protect your son and daughter Emotionally, physically, sexually, socially and spiritually. Ages 10 and up if you feel your student is mature enough. Price $100 per family. At HillSpring Church New prague south of the Twin Cities Just landed a speaker who will challenge you how to keep your kids safe from human trafficking… you say well my kid will never fall into that… oh not so fast. You obviously don't know what you are talking about… so get ready to sign up!   I dare you to change your life… I dare you to do something hard… I dare you to be and fulfill the complete potential in you… So we immediately stop and think, well I could, I should, I know it would take a lot of work, and some risks and some trial and error - but Honestly after 57 years on this earth I have realized that is not what is truly keeping your from your potential… Have you ever heard this quote? Watch your thoughts, they become words. Watch your words, they become actions. Watch your actions, they become habits. Watch your habits, they become character. Watch your character, it becomes your destiny (Or your potential).   This is true, but this is lacking in one major overwhelmingly obvious condition or step… If you really want to change - and I mean change anything - for Good, true 100% change you have to do the almost impossible for most people. If you truly want to change your life - in any area, you have to be willing to change friends. Changing friends will change you. But warning, most friends don't want you to change, or to change friends… why? Because it makes them feel aware of how little they are willing to put into changing their own lives - in changing themselves.  Look if you are a gym rat, how many times have you had people around you give you excuses as to why they are out of shape… or even how they intend to get back in shape.  They feel guilty around you- thus they start the nervous talk, the excuse talk, the backtrack talking. I have found a way to help them realize the dilemma - I look at them and tell them to change friends or they will never change their life and health. And they kind of nervous laugh… and then still list of some rationale… “uh, well I don't need to change friends, I just need to get motivated, I just need to get a plan, I just need to focus, I just need to make time, I just need to eat better… I just I just I just I just… Shut the front door and get rid of the excuses and get new friends. You want to be a boxer, you better start hanging out with boxers. You want to be a successful entrepreneur you better start hanging out with successful entrepreneurs, you want to be a better parent you better start hanging out with better parents… you better change your “friendscape” and not just your landscape.  So if I think back to this past month I have had to say no to acquaintances who want to go hunting, fishing, go out to coffee and just talk, go to a movie etc… these are all fine and things I would like to do… but if I am seeking change than I need to spend time with the people I want to be like. i.e. change The disciples were 11 men who wanted to be like Jesus… and Jesus wanted them to be his disciples… however as much as Jesus taught them, it was more about them being with him - lets be honest, most of the time the disciples didn't even understand what Jesus was saying - but they are in his presence.  You might miss the fact that in order for the disciples to change, they had to be with Jesus - meaning they had to leave family and friends. Luke 14:25 Many people were traveling with Jesus. He said to them, 26 “If you come to me but will not leave your family, you cannot be my follower. You must love me more than your father, mother, wife, children, brothers, and sisters—even more than your own life! 27 Whoever will not carry the cross that is given to them when they follow me cannot be my follower. This no doubt has a deep pointed spiritual application to us as Christ followers - but it also screams the practical application of change by association in our own normal lives. I don't cut out all my friends, nor do I unfriend them - but the amount of time and influence I give them is now handed off to others who I want to be like.  Who you are is who you are with. Quick thought - maybe you are not with anyone, you are a loner a shy person etc… the same still applies to you.   The greatest missing ingredient in changing your life comes down to changing your friends.

Shut the Should Up with Candace Payne + Jenny Randle

In this episode of Shut the Should Up with Candace Panye and Jenny Randle, we're discussing the pain of isolation and the gift of community. Join us and share this episode with your people! Article and stats mentioned from here: https://mcc.gse.harvard.edu/reports/loneliness-in-america (Feb 2021) Don't forget to subscribe so you don't miss an episode of Shut the Should Up. Leave a review on your favorite podcast platform. Join us to watch the podcast video recording Monday nights at 7 PM PST/ 10 PM EST at our Facebook account here: https://www.facebook.com/ShutTheShouldUp Interested in learning more about Candace Payne, her books and curriculum or have her SPEAK for your church or event? Visit https://candacepayne.me/ Interested in learning more about Jenny Randle, her books, coaching program, or have her SPEAK for your church or event? Visit https://jennyrandle.com Until next time we love you lots and shut the should up.