Podcasts about sprs

  • 28PODCASTS
  • 36EPISODES
  • 52mAVG DURATION
  • ?INFREQUENT EPISODES
  • May 2, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about sprs

Latest podcast episodes about sprs

Free Crush Live Poker Podcast
Free Crush Live Poker Podcast No. 172: Playing Post Flop with Low SPRs

Free Crush Live Poker Podcast

Play Episode Listen Later May 2, 2025 16:27


Bart discusses a recent session of $2/$5/$10 where he played multiple 4bet pots leading to very small SPRs post flop.

MAX ORDINATE • The Precision Rifle Podcast
Meet the Nicks: The Mouth and the Mustach Take the Mic

MAX ORDINATE • The Precision Rifle Podcast

Play Episode Listen Later Jan 3, 2025 80:56


Simply Oncology
Episode 9: In the Clinic - Demystifying the FRCR part 2 exam with the examiners!

Simply Oncology

Play Episode Listen Later Jul 12, 2024 27:34


Send us a Text Message.Calling all oncology SpRs and their trainers!!The FRCR part 2 exam is a rite of passage every clinical oncology trainee in the UK has to complete to become a consultant.We talk to Dr Paul Hatfield (lead examiner) and Dr Alison Stillie (senior examiner) and find out what they want to hear during the exam.We also hear about how to prepare and what to expect on the day.We find out how much work the examiners do to make the exam fair and balanced.If you are going to sit the FRCR part 2 exam at some stage or your are involved in teaching or supervising oncology SpRs the this episode is a must!!!We hope you enjoyJohn & MikePlease check out the info provided by the RCR in the link below.https://www.rcr.ac.uk/exams-training/rcr-exams/clinical-oncology-exams/frcr-part-2b-oncology-co2b/frcr-part-2b-oncology-co2b-advice-for-candidates/ 

Classes of Mail
M-39 117-121

Classes of Mail

Play Episode Listen Later Apr 4, 2024 44:47


Today we will read PROOF POSITIVE that we are allowed to case our SPRs! And a bunch of other stuff, too, about the case and about casing. Reading the M-39 has been incredibly eye-opening and empowering, and we're just getting started!

The Other Side Of The Firewall
Ask A CISSP | A CMMC 2.0 Clinic With Derron King Jr. Season 2 Episode 11

The Other Side Of The Firewall

Play Episode Listen Later Jan 25, 2024 48:51


On this week's episode of Ask A CISSP, we have a follow-up conversation with Derron King Jr.! We discuss CMMC 2.0 debut, requirements for small to mid-size Prime and Sub-prime contractors and pathways to becoming a Registered Practioner or Assessor. Please LISTEN

Cybersecurity and Compliance with Craig Petronella - CMMC, NIST, DFARS, HIPAA, GDPR, ISO27001
Navigating Cryptocurrency Security: Sim Swaps, Vendor Risks and Assertive Measures

Cybersecurity and Compliance with Craig Petronella - CMMC, NIST, DFARS, HIPAA, GDPR, ISO27001

Play Episode Listen Later Nov 28, 2023 39:24 Transcription Available


What if you could protect your cryptocurrency from hackers with just a few simple security measures? That's what we're diving into today in our exploration of the fascinating yet terrifying world of SIM Swaps and cryptocurrency security. We'll shed light on a real-life cautionary tale of a victim who lost his cryptocurrency to these cunning cyber con artists and the ingenious way they laundered the stolen funds. Discover why you should never use your phone numbers for authentication and what you can do to protect yourself. As we journey further, we'll unravel the complex web of crypto regulations and vendor risk management. With the SEC guidelines causing confusion, we'll debate the need for a more regulated crypto environment. Learn about the critical process of vendor vetting in industries dealing with confidential data. We'll also reveal the SPRS scoring system for assessing vendor security and why you must be assertive with vendors that don't prioritize security. Remember, when it comes to securing your crypto assets, the mantra should be "don't trust, verify." So, gear up for an enlightening episode that will help you navigate the murky waters of cryptocurrency security. Support the show - Call 877-468-2721 or visit https://petronellatech.comPlease visit YouTube and LinkedIn and be sure to like and subscribe!Support the showNO INVESTMENT ADVICE - The Content is for informational purposes only, you should not construe any such information or other material as legal, tax, investment, financial, or other advice. Nothing contained on our Site or podcast constitutes a solicitation, recommendation, endorsement, or offer by PTG.Support the ShowPlease visit https://compliancearmor.com and https://petronellatech.com for the latest in Cybersecurity and Training and be sure to like, subscribe and visit all of our properties at: YouTube PetronellaTech YouTube Craig Petronella Podcasts Compliance Armor Blockchain Security LinkedIn Call 877-468-2721 or visit https://petronellatech.com

The Other Side Of The Firewall
Ask A CISSP | Meet Derron King Jr. - Ask A CISSP Season 2 Episode 5

The Other Side Of The Firewall

Play Episode Listen Later Aug 3, 2023 51:14


On this week's episode of Ask A CISSP, we have an interview with Derron King Jr.! Please LISTEN

Compliance Unfiltered With Adam Goslin
Episode 76 - It's Here! CMMC SPRS Scoring is Live!!!

Compliance Unfiltered With Adam Goslin

Play Episode Listen Later May 9, 2023 23:14


On this episode of Compliance Unfiltered, Its time to chat about the CMMC SPRS Score! The CMMC-AB now recognizes the SPRS Score as the industry standard scoring metric. Adam's going to tell the listeners all about what the SPRS score is, and how the heck you interpret those negative numbers. Curious if your organization can just do the assessment yourselves? Wondering how SPRS Scoring fits in to the CMMC world in general? The CU guys have got you covered! Plus, Adam shares special news about SPRS Scoring and the TCT Portal! All on this week's Compliance Unfiltered! --- Send in a voice message: https://podcasters.spotify.com/pod/show/compliance-unfiltered/message

In Wheel Time - Cartalk Radio
Asphalt racing returns to Houston! John Alverson is here with details and it is the Infiniti QX80 in the showroom!

In Wheel Time - Cartalk Radio

Play Episode Listen Later Jan 12, 2023 31:09


Sure there is NASCAR on Sunday afternoons, but what if you want to get out and be at the race?  The best way to get up close with some oval racing is to go to your local track.  Support your local racer!The Houston area has several dirt tracks around the area, but there is only one asphalt oval track left.  Joining us in this segment is John Alverson with Southern Premier Racing Series which is launching it's 2023 season in March.In our feature segment, Michael Marrs has been checking out the 2023 Infiniti QX80 over in the New Car Showroom.---- ----- Want more In Wheel Time Car Talk any time? In Wheel Time Car Talk is now available on iHeart Radio! Just go to iheart.com/InWheelTimeCarTalk where ever you are.----- -----Be sure to subscribe on your favorite podcast provider for the next episode of In Wheel Time Car Talk and check out our live broadcast every Saturday, 8a-11aCT simulcasting on iHeart Radio, YouTube, Facebook, Twitter, Twitch and InWheelTime.com.In Wheel Time Car Talk can be heard on you mobile device from providers such as:Apple Podcasts, Pandora Podcast, Amazon Music Podcast, Spotify, Google Podcasts, Stitcher, iHeart Radio podcast, TuneIn + Alexa, Podcast Addict, Castro, Castbox and more on your mobile device.Follow InWheelTime.com for the latest updates!Twitter: https://twitter.com/InWheelTimeInstagram: https://www.instagram.com/inwheeltime/https://www.iheart.com/live/in-wheel-time-car-talk-9327/https://www.youtube.com/inwheeltimehttps://www.Facebook.com/InWheelTimeFor more information about In Wheel Time Car Talk, email us at info@inwheeltime.comTags: In Wheel Time, automotive car talk show, car talk, Live car talk show, In Wheel Time Car Talk

From A to Arbitration
Episode 69: Buster Douglas, the mirror and the note from the principal's office. Effectively grieving Management not allowing us to case SPRs and Management attempting to hold us to 5 minutes pm office time..

From A to Arbitration

Play Episode Listen Later Sep 19, 2022 80:13


The BSH Guidelines Official Podcast
BSH ASM: Guidelines Session: GPP Cytomegalovirus serological testing in potential allogeneic haematopoietic stem cell transplant recipients

The BSH Guidelines Official Podcast

Play Episode Listen Later Jun 30, 2022 16:52


British Society for Haematology Annual Scientific Meeting Guidelines Session 2022   Dr Suzy Morton on the Good Practice Paper Cytomegalovirus serological testing in potential allogeneic haematopoietic stem cell transplant recipients.   Dr Suzy Morton is a Consultant in clinical haematology and blood transfusion at the Queen Elizabeth Hospital, University Hospitals Birmingham and NHS Blood and Transplant. She is the transfusion representative on the West Midlands Haematology Specialty Training Committee and the educational lead for haematology SpRs at QEHB. Suzy is a transfusion representative on the BSH Education committee.

Argus Media
The Crude Report: 2022 more of the same, but different…

Argus Media

Play Episode Listen Later Jan 19, 2022 15:19


Many major trends affecting crude oil markets like energy transition, the balancing act between Opec+ and SPRs and Covid-19 continue, but all have evolved in its own way.  In this episode of The Crude Report, vice president Jeff Kralowetz highlights the big topics on everyone's mind, many of which will covered at next week's Argus Americas Crude Summit.  Sign up to the Argus crude oil newsletter

Full PreFrontal
Ep. 174: Dr. Julie Exline - Spiritual Struggle & Personal Growth

Full PreFrontal

Play Episode Listen Later Dec 29, 2021 58:31 Transcription Available


The human frontal-lobe evolution has made it possible to do the right thing, particularly when that right thing is really hard to do. While faith, religion, and spirituality give individuals the essential inner strength, attachment, and security, it is the mature frontal lobes that turn on moral reasoning - a bridge towards an ultimate sense of hope and meaning.On this episode, licensed clinical psychologist and Professor in the Department of Psychological Sciences at Case Western Reserve University, Julie Exline, Ph.D., shares her research on the interface of clinical, social, and personality psychology, and spirituality, religion, and existential concerns. Her work shows that suffering ignites personal growth and spiritual struggles end up elevating people's lives.About Dr. Julie ExlineJulie Exline, Ph.D., is a Professor in the Department of Psychological Sciences at Case Western Reserve University in Cleveland, Ohio.  Her research centers on the interface of clinical, social, and personality psychology, with a special focus on topics involving spirituality, religion, and existential concerns. She served as Principal Investigator on two projects funded by the John Templeton Foundation: one on religious/spiritual struggles and another on supernatural attributions. She is a licensed clinical psychologist in Ohio and has been certified as a spiritual director through the Ignatian Spirituality Institute at John Carroll University. She is a Past President of the Society for the Psychology of Religion and Spirituality (SPRS; American Psychological Association's Division 36) and was chosen to receive the Margaret Gorman Early Career Award, Virginia Sexton Mentoring Award, and William James Award from SPRS. With Dr. Kenneth Pargament, she co-authored the 2021 book Working with Spiritual Struggles in Psychotherapy: From Research to Practice. Her current research focuses on a wide array of themes around spiritual struggles and supernatural attributions, including gratitude and anger toward God, perceptions of after-death communication, beliefs about supernatural evil, and the many ways that people perceive “God's voice” in their lives.Website:https://psychsciences.case.edu/faculty/julie-exline/Book:Working with spiritual struggles in psychotherapy: From research to practiceAbout Host, Sucheta KamathSucheta Kamath, is an award-winning speech-language pathologist, a TEDx speaker, a celebrated community leader, and the founder and CEO of ExQ®. As an EdTech entrepreneur, Sucheta has designed ExQ's personalized digital learning curriculum/tool that empowers middle and high school students to develop self-awareness and strategic thinking skills through the mastery of Executive Function and social-emotional competence.Support the show (https://mailchi.mp/7c848462e96f/full-prefrontal-sign-up)

Energy Week
179 - Is OPEC a cartel? with Jeff Colgan

Energy Week

Play Episode Listen Later Nov 22, 2021 43:42


Oil prices are finally falling. Thank China and Joe Bidenhttps://www.cnn.com/2021/11/18/investing/premarket-stocks-trading/index.html- Is it really China and Biden? Or was it news of lockdowns in Europe?- Who knows more? the big banks or OPEC/IEA- Monthly OPEC meetings a plus?U.S. asks Japan, China, others to consider tapping oil reserveshttps://www.reuters.com/business/energy/exclusive-us-asks-big-countries-coordinate-releases-oil-reserves-sources-2021-11-17/- Will an SPR release have enough of an impact to help Biden's political ratings?‘Climate Funds': Who's Driving the Increased Demandhttps://www.wsj.com/articles/climate-funds-whos-driving-growing-demand-11637165424- who invests in these funds? Mostly women, millennials and high-net worth investors- are the funds actually helping the climate? the jury is still out.Dr. Jeff Colgan - New book, "Partial Hegemony: Oil Politics and International Order"- Is OPEC really a cartel? - is it a group of producers that can actually control market to a certain degree or enough to move prices?- Argues that OPEC is not actually a cartel - HQ in Vienna, meetings all the time but can't really change what its members do- Saudi Arabia has market power but it doesn't need OPEC to do that. - Are the members of OPEC actually greater than the sum of their parts?- OPEC isn't amplifying their power in any way.- How do we know this? OPEC members cheat on their quotas 96% of the time (since 1982)- Has this changed with addition of Russia and creation of OPEC+? But that's a producer to producer relationship. There are 3 really big producers in the world (Saudi Arabia, Russia and US). It matters when they fight, but that will happen without OPEC+ existing at all.- OPEC used to be a collective bargaining unit and acted as such through its founding until 1973.- OPEC's announcements and monthly meetings matter because they shape perceptions. But don't impact fundamentals over a period of 3-6 months. Media tends to overreact to OPEC.- OPEC is constantly being sued in Europe and US for being a cartel. Antitrust suites all the time. OPEC general council doesn't want OPEC to call itself a cartel to avoid legal repercussions. - Politicians in US also love to have OPEC to blame when prices go up and down as well.- Information sharing within OPEC is a very valuable part of what OPEC does, especially for poor countries that don't have the money to shell out for data. Though joining OPEC does cost several million dollars a year- Biden is trying to walk a difficult line with oil - green agenda vs. more oil from OPEC?- BIden memo to FTC is political theater as well.- Coordinated SPR release to change market fundamentals and/or perceptions but India and China aren't members of the IEA.- Original purpose of SPRs were for emergency situations, not just because gasoline is a little more expensive. Bad habit to use it this way. Most of the time these kinds of releases don't move prices much at all - other than after a natural disaster or state of emergency.- Find him on twitter @JeffDColganhttps://www.amazon.com/Partial-Hegemony-Politics-International-Order/dp/0197546382/

The BSH Guidelines Official Podcast
Good Practice Paper: Cytomegalovirus serological testing in potential allogeneic haematopoietic stem cell transplant recipients

The BSH Guidelines Official Podcast

Play Episode Listen Later Oct 7, 2021 13:42


Dr Suzy Morton presents a short podcast on the Good Practice Paper: Cytomegalovirus serological testing in potential allogeneic haematopoietic stem cell transplant recipients.  Dr Morton discusses the following: 1) The background and importance of cytomegalovirus serological testing 2) Explaining the recommendations 3) A short summary of the importance on key messages from this good practice paper   Dr Suzy Morton is a Consultant in clinical haematology and blood transfusion at the Queen Elizabeth Hospital, University Hospitals Birmingham and NHS Blood and Transplant. She is the transfusion representative on the West Midlands Haematology Specialty Training Committee and the educational lead for haematology SpRs at QEHB. Suzy is a transfusion representative on the BSH Education committee.

Craig Peterson's Tech Talk
Colonial Ransomware redefines our approach

Craig Peterson's Tech Talk

Play Episode Listen Later May 16, 2021 79:01


2021-05-15 Show 1113 - How the Colonial Pipeline changed Ransomware forever Craig Peterson: Hey, wherever you are, whatever you're doing right now. I know you're listening, and I appreciate you being with us. Of course, this is Craig Peterson. I've been in cybersecurity now for 30 years, and we're going to talk about what's really happening with this Colonial Pipeline ransom.  [00:00:16]This whole hack, if you will, of what's been happening with this Colonial Pipeline. Cyberattack is very upsetting to me. Let's just really briefly because I've talked about it before. Talk about what happened. What is ransomware? Ransomware is software that the bad guys get onto your computers. [00:00:40] Now it's changed over the years. When ransomware first started hitting, I think most people still have this in mind, and the software gets onto your computer. Usually, you click on something. You download a zip file, and you open it up. Maybe it's a Microsoft word document and embedded inside that document. [00:01:00] Is a piece of nastiness, and that nastiness is the ransomware. And what it'll do on your machine is it'll start looking for files that it can encrypt. And those files typically are things like your word documents, your Excel spreadsheets, all that sort of stuff. And. They would encrypt it and then pop up on your screen, a nice little red warning message that all your files have been encrypted. [00:01:31] And if you really want to get those files back, what you're going to have to do is go to this particular website, send some Bitcoin to this specific Bitcoin wallet. And then hopefully, you'll be okay. Now, back in the day, it was crossing your fingers cause you didn't know what was going to happen. [00:01:52] If I send the money while I get the decryption key, will the software work while I get all my files back. And frankly, the answer to most of those questions was no. In most cases, you would not get all your files back in this day and age. It's changed slightly, but we'll get into that and how it's changed and who has changed the ransomware. [00:02:16] Industry. I want to give you some tips on what to do and how to avoid ransomware in the first place. And there are some automated things you can do. You can do some things just as a human being that you should watch out for. And I want to also get into it, so what do you do after the fact? I got a call from a listener this week who had a real problem. [00:02:41] Actually, she sent an email to just me@craigpeterson.com, and I got her phone number called her back, and I had my lead tech and myself on the phone with her for probably about 15 minutes going through. Okay. So here's what you have to do to respond. So I think it's essential for everybody to understand this. [00:03:01] This Colonial Pipeline cyber attack was ransomware, but it wasn't like that original ransomware that I saw all those years ago where you're crossing your fingers, et cetera. It has advanced to the point where this company has now made this cyber attack business an actual commodity for lack of a better term. [00:03:25] Quite literally, it was called the DarkSide. They've been around for about a year. And apparently, the people that are involved with the DarkSide have been doing ransomware for much longer than that. But what they're doing now isn't just, Oh, take a gamble, and maybe you'll get your decryption key. [00:03:44] Maybe the decryption will work. Nowadays, they have turned it into a truly professional organization. There are tech support people that you can talk to. You can call, you can have an interactive chat with them. The ransomware is very careful to make sure that you can still use the online chat features in your windows machine or whatever they might need to communicate with you. [00:04:14] And the tech support people  [00:04:15] will  [00:04:15] Craig Peterson: say, Oh yeah, some, I'm sorry that happened to you. Let me help you fix it. What you have to do is go to this website and buy Bitcoin. First, you have to set up a wallet. All of this was just so complicated. People weren't able to figure it out. So they now, with their tech support, will help you. [00:04:34] Find a place to buy the Bitcoin help you set up a wallet, help you put your more money into that Bitcoin wallet after you bought some fractional, probably Bitcoin, because they're worth quite a bit right now. And then. They'll help you to send that money from your Bitcoin wallet to their Bitcoin wallet. [00:04:59] And then they'll help you run the software to decrypt your files. This is pretty complicated, and these guys, a DarkSide, understood that. And that's why they did all of this tech support type stuff, but they've taken it. I yet a step further, this gang-like DarkSide in there. They're not the only ones DarkSide. [00:05:23] They're just the guys that we think went ahead and hacked the colonial gas pipeline, but they've taken it to the step now where they are selling ransomware as a service. You can approach to them and pay them. And quite a while, you've been able to buy ransomware that you could use. You had to find the email addresses. [00:05:47] You had to send it out. You had to do this, but now for a down payment and a percentage of your take this gang will go ahead and do everything for you. Including sending it all out. They've really professionalized this whole Industry of crime, of ransomware crime, of course. And we've talked about this on the show before they also will go the next step and what the next step is in this day and age is. [00:06:19] When they get into your machine before they encrypt anything, they have a human being who looks at your machine. So the machine calls home. And I want to tell you how to stop them from calling home. Because that's going to stop most of the ransomware, but it calls home and says okay. I got somebody. [00:06:39] And so the bad guy now, because that connection's opened up to call home. Can now hop on to your computer, unbeknownst to you. It's not as though you're going to see the mouse moving or screens changing. It's all happening behind the scenes. And so they're on your computer. They look for files. They think might be of interest. [00:06:59] Those files get uploaded to them and they try and spread laterally. And a lateral spread means that they see, yeah, here's some machine that we have compromised. This looks interesting. What other computers on the network? Is there an active directory server, some sort of a file server network-attached, storage, other computers what's out there. [00:07:25] They will probe your network, which again, if you've got good network equipment, you're going to see that probe happening and you're gonna be able to stop it. But most people don't write. And including some of these big businesses that just aren't paying enough attention to how the bad guys operate. Now more than they knew. [00:07:45] The Colonial Pipeline huge multi-billion dollar company. Okay. You now know more than they do in what order we eight minutes into their show today. So they will look around the network, spread laterally, take control of other machines. And they try all of the known ways of getting in. And of course, if you haven't patched your machines and haven't kept them up to date lately, it seems like Microsoft is releasing patches a couple of times a week, just like the old days. [00:08:15]Microsoft fixed that problem. So you no longer had to patch once or twice a week? Yeah. How did they fix it? No, not by fixing their software. I know. No, I haven't forbid know what Microsoft fixer software. No, what they did is. They came up with this concept of patch Tuesday. So once a month, they'll just release all of the patches for all of the vulnerabilities that have been found that they know about and that they could patch readily. [00:08:44] Is that insanity or what? So on average, they were leaving. You exposed for one, let's see, half of a month would be about 15 days. So there you go. About 15 days you were completely exposed. It's this whole thing is insanity. I just, I don't know why people aren't paying attention to it. And I talked to small businesses, and basically, they have their fingers crossed, and they don't think it's going to damage the reputation, even if they do get hit. [00:09:14] But these guys are gathering all of this data from all of your machines inside your network, including your home network. Although they're not as interested in this. If it's just a little home network, other than if you are working from home. Okay. Are you silly enough to use a VPN? That's not configured right. [00:09:35] Or the wrong kind of VPN. Okay. Hey. Yeah. So what we'll do now is we will spread laterally. Over to the business computers and all of the other people working from home that are also VPN in, in, properly into the business network. So they can just spread like crazy. It's, it is absolutely amazing that we're not doing more. [00:09:58] I'm not calling for the feds to get involved with this cause they will almost certainly make everything worse. I'm just shaking my head here thinking about all of the potential problems they can't even get. This whole net neutrality thing straightened out, but DarkSide then has your files. And they do what I talked about a couple of weeks ago here in the show, they hold your files ransom by threatening to release them. [00:10:24] Look at what happened to Metro PD, the Metro police department in Washington, DC, just a couple of weeks ago. Yeah, they got into Metro PDs, computers, they spread laterally. Hey, look at what we found. They threatened to release these files. They had found of all of the confidential informants there, phone numbers, addresses names, cases that they're involved with, et cetera. [00:10:52] Yeah. Again, they're not taking it seriously. There's a lot we have to do. [00:10:58]There is a huge problem out there right now. And the problem has to do with these ransomware gangs. And there are quite a few of these gangs out there, frankly. And one of them called DarkSide has nailed the Colonial Pipeline. What happened is the ransomware got into their network. We don't know the details yet. [00:11:21] I've heard a lot of rumors. I'm not sure. And it started spreading inside the network. Again, you don't have a lot of details. I'm sure I'll find them out. And when I do, I will share them with you, but it spread. And the guys over at Colonial Pipeline said we better shut down the pipeline. Because we don't want the ransomware to cause serious problems thinking about what could happen with a pipeline, you could go overpressure, which could cause the pipeline to burst valves might not close that are supposed to be closed. [00:11:56] It's going to really affect the whole flow of everything in the pipeline. And remember too, you have one pipeline that carries multiple different fuels, so they stop it. From carrying gasoline, for instance, it switched to diesel, they switched to jet fuel. They switched to gasoline. They switched to home heating oil. [00:12:16] All of those are carried by Colonial Pipeline. I'm not sure if they're all in one pipeline, that's just send-up. Okay, we're sending gas now type thing. Or if there's actually multiple physical pipelines inside, I'm not really sure, but there is a lot that could go wrong. Either way, just based on the fact that they don't have the computers to control the vows, to control the flow, to monitor everything that needs to be monitored. [00:12:44] Monitored. So DarkSide is at the very least holding their computers hostage. We don't know at this point, if Colonial Pipeline is going to pay the ransom, we don't know if there's going to be a backend ransom. As I explained a little earlier, we're seeing now these. Bad guys. Not only saying pay us now in order to get your files back, but pay us now, or we're going to release all of your data. [00:13:16] I'm not sure Colonial Pipeline has that much data because they. Probably only have a very limited number of customers. So something might not happen there. The obvious data that they'd be concerned about is what I was contacted about just this week bank accounts, what happens if the bank accounts broken into stuff is stolen, what do you do? [00:13:40] And how do you deal with this? So these. Types of attacks are becoming much more frequent and it's very concerning to all of us. For a couple of years, I ran the FBI InfraGard webinar program and we talked a lot about. Protecting our critical infrastructure, but the critical infrastructure is more than just the electric grid or the fuel pipelines. [00:14:09] Frankly. It includes almost every business because if a business isn't critical, how could it possibly stay in business? Okay. You might argue how about the tourism industry? Is that critical? I don't know, ask the people that work in the tourism industry, if it's critical to their jobs or not. [00:14:29] We have to defend everything and ransomware attacks, according to commerce, secretary Gina Raimondo. Are what businesses have to worry about now. So it's a real problem, but they've got a Homeland security involved in investigating this. They've got, of course, the FBI involved investigating it, and they've brought in some third parties. [00:14:56] And w the one that looks to be the prime, I'm concerned about, cause this is not what they do, but they're saying it's an all hands on deck effort right now. She said we're working closely with the companies, state and local officials to make sure they get back up to normal operations as quickly as possible. [00:15:17] And there aren't disruptions in supply. We already know. There have been some disruptions. I think it was South Carolina declared a state of emergency this week. There's a more than 1800 fuel stations, gas stations that are out of fuel. Some of it is attributed to what we're now calling the toilet paper response where people are saying, Oh no, there's not gonna be any gas. [00:15:43] I better go buy gas now. And some people are bringing cans and cans to fill up as always filling up all of their vehicles. So it is a problem. Now, I'm going to talk a little bit more here about how ransomware gets in so that we can then give you some solutions. And if you have to drop out, I understand you can listen to this whole show as a podcast, just go to Craig peterson.com/podcast, and you can get all of the details there. [00:16:19] I even post. These automated transcripts, they're not like an absolute type of transcript, but it's pretty darn close. So again, Craig peterson.com/podcast, and you can listen there if you miss part of it today. Ransomware has to get onto your machine. Now there's a few ways it can get onto your machine. [00:16:42] There are a number of different types of attacks, but the biggest one that's typically used is called a Trojan attack. And a Trojan attack is kinda as the name implies. You think that it is something other than what it is, the Trojan horse. So the software that supposedly your friend sent you by email that you're downloading, it's not really good software. [00:17:08] It's really ransomware disguised as maybe a Microsoft word document macro. There's a lot of things that it could potentially be, but. That's one of the ways and the most common way gets in there are other ways as well. They can exploit vulnerabilities in software that you're running. So if you're not keeping your machines patched up to date, it could get in using either a zero day attack, which. [00:17:38] Yeah, there's nothing much you can do about those other than having a great firewall. So that's why I recommend having a real high end one, a good Cisco firewall. There are some other brands out there that are pretty darn good. And there's reasons that I like the Cisco over some of the other ones and it is what we sell, because I think it's the best out there. [00:18:00] But having a real high-end firewall can talk. Stop these zero day attacks. Zero day attack is where thethe bad guys are using a vulnerability in your computer. That is currently unpatchable. The vendor, Microsoft, whoever it might be, has not come up with a patch for yet. So the bad guys say Hey, day, let's just get into machines and then they can remote control your machines, install the malware, usually the ransomware nowadays and go off on their own. [00:18:34] That's the number one way they get in. Now, if you've been listening to this whole show so far today, that what has happened is once you have the ransomware that ransomware calls home, Now there's a number of different pieces or classifications of software that call home. One of them is ransomware. [00:18:57] So it gets on your machine. It calls the bad guys up and says, Hey, here I am. What do you want me to do? And usually the bad guys. If it looks like a decent target, hop on your machine, poke around, try and spread laterally. As I explained, in some cases, what it does is it just uses your machine, particularly if it's just a home machine and there's nothing particularly valuable on it. [00:19:20] It uses that whole machine now as part of a botnet, and it uses your machine that it's taken over to attack other machines. And unless you're paying a lot of attention, you probably don't even know that it's happened. [00:19:37]What do you do here with ransomware? He gets in, it looks like it's something that it's not most often, it's a Trojan. Sometimes what happens is the bad guys are sending it all in because of a zero-day or more than likely because you haven't applied the patches to all of the software that you need to patch. [00:20:01] So there's a few different things here, right? That, that you gotta be careful of. So do those, you hear it a million times. The next thing you can do to help prevent this from happening is to make sure your usernames, email addresses passwords are unique for every site you go to. Because some of these bad guys just go to the dark web, they can download for free your email, address your password from hundreds of websites. [00:20:35] Yeah, it's available for them. It's been stolen, and it's been released in some cases, they have to pay for it, but, overall it's well worth their money spent to find out your username and password. So if you are working from home, let's say you're a homeworker for, let's say Colonial Pipeline here, making stuff up right now, a nonexisting company, and you're at home. [00:21:01] He was supposed to be monitoring the pipeline, make sure the right valves are open when they're supposed to be open, make sure the fuel is flowing. Make sure all of the bills are getting paid invoices going out. And you're just doing it from home. And in fact, you got a nice little laptop set up in the corner of the bedroom, on a table. [00:21:20]It's, it's the life. And then. All of a sudden you're losing control. Just what I, I know of two water systems where this happened. Yeah. Yeah. All of a sudden somebody finds your username and your password online and that email address. Yeah. Yeah. [00:21:41] joe@colonialpipeline.com. Perfect. Okay. So let's look in the dark web. Oh, here's Joe's. Password that he used over on LinkedIn back when we stole all of those LinkedIn usernames and passwords and emails and everything else. So let's just try that because we see that at colonial pipeline. There's this remote desktop server. [00:22:07] And we know that. Yeah, because we scan them in. There it is today, remote desktop server, you know what they eat the named it remote desktop, RDP dot colonial pipeline.com. Of course, we're talking about a fictional company here, but it's only now God, I use their name and email address and a password that has been used by Joe on one or more other websites. [00:22:31] So what do they do? They say. I'm going to try. Let me see. Let me see. I'm going to connect right now to the Microsoft remote desktop server at colonial pipeline. And let's try and log in as joe@colonialpipeline.com and let's cut, copy and paste the email address that he was or a password he's using it. [00:22:51] LinkedIn, you know what I just noticed he uses the same. Password even a few years back over at Facebook. So let's just try it. Oh, look at that. I'm in. I'm in. So what's the next step? The next step is, of course, they start to poke around a little, can I take control of this machine? Let's download my ransomware onto the machine. [00:23:13] And of course this fictitious company known as colonial pipeline. They don't have a really great firewall that looks at it. Everything that's being put onto a machine downloaded. So it's not even going to notice that we're installing the most common form of ransomware on the internet today. So let's get that on his machine at work. [00:23:35] Okay. At Tonya's machine at work and off. Okay. We got it. We're the remote controls working. So let's just connect from the remote. Desktop server and okay, so we're in now, let's see what other machines we can find on their network and off they go, this fictional company now because Joe had a username and a password that he has used before on another website, they were able to get into our fictional company. [00:24:06]Does that make sense to you? So now they're inside, they're moving around. They're taking control. They're finding the computers that are used to control the valves, the flow of oil, or whatever's in the pipeline. This. Day and okay, so we're all set. So let's go ahead now because we've got all of their files, including all of their banking information while we were in there and  [00:24:31] we  [00:24:31] Craig Peterson: grabbed all yeah. [00:24:33] All of the account numbers, all to their customer info. So let's let it loose. And now they start encrypting all of the data. And by the time this fictional pipeline company has figured out that they're on there. Guess what? Yeah. In fact, what happened was they found out that they had been hit with ransomware because the ransom messages came. [00:25:03] So that is how it could happen. And that could happen to almost any company out there. And the reputation damage is enormous. The amount of money that is going to cost them is enormous. It's more than doubled in the last year. The cost on average now is over $1.2 million because of a breach and ransomware. [00:25:29] And so now they're in big trouble. Really big trouble. So how could you have stopped this? That's where life gets interesting. And I have done a number of webinars on that very thing we've delved into in some detail, it's been about a year and I'm thinking what I'm going to do is just put together some little courses that if you're on my email list, you'll find out about just little free things in order to help you guys understand this a little bit better. [00:26:00]So I'll make sure you're on my email list. Craig peterson.com/subscribe, and I'll explain it all. So here's what you can do. First of all, get a various smart, next generation firewall. Now, one thing about cybersecurity that you'll find is there are a lot of criminals out there. A lot of criminals and. [00:26:25] I'm not just talking about the people that put ransomware on your machine. I'm talking about the people that are telling you to buy their VPN product because it's going to make you safe, and they're lying about it. And they're really lawyering their words. So that, that perception that you have is somehow you're going to be safe. [00:26:43] I'm talking about the people that will sell you this. Anti-virus software that not only do not need but could potentially open you up to even more security problems, just like the VPNs can open you up to more security problems. It is full. Of criminals. They just haven't been convicted yet. Okay. So it, it's definitely a problem, a very major problem for so many people and you just don't know. [00:27:14]So that's why I want to make sure you guys understand why it's happening and the how it's happening to can. Then go on to the next step and what do I need to do to keep it out? So a really good next generation firewall, by my definition, means that firewall is going to examine all data coming in and going out. [00:27:40] So it's going to be able to look at anything that's encrypted at websites that are encrypted at data that's being downloaded at zip files that are being downloaded and check the payload to make sure. That it is legitimate traffic. Okay. It sounds easy, but again, there's so many criminals in the cybersecurity business. [00:28:03] You have to look very closely stick around. [00:28:06] So if the bad guys have control of a machine and they are trying to download some malware, in this case, ransomware, the firewall is going to see that and stop it right there. [00:28:20]Most firewalls, all they'll do is block certain ports, or they will stop as someone on the outside from getting. To the inside, but what about you going to a website and downloading accidentally, or maybe purposely downloading some software? That's malicious. Or what about some guy the got onto your computer via your VPN connection or your remote desktop or team viewer, et cetera. [00:28:51] And now has control of your computer. You have to watch all of the data coming in, going out, and it all needs to be checked for. Any sort of malware. So that's one of the first things we always do. Now. The next thing has to do with your computer. I'm going to focus in on windows because that's what most people have. [00:29:14] Nowadays. If you have a Mac, you're relatively safe. If you have a Google Chromebook again, You're relatively safe. Just keep them up to date. All right. But windows, windows is a whole other world and you know how much I love windows. Yeah, not right. And I worked on it way back when in the empty days. [00:29:39] Anyhow. Microsoft Windows has built into it. Now, some very good software that can help protect you. Windows defender, make sure windows defender is turned on and is up to date. If you have windows. And it's a recent version, and you need to be running a recent version of windows. Then you have access to windows defender, turn that on. [00:30:08] And windows defender again, keeps an eye out for malicious software. Oh, really? Who knows windows better than Microsoft? I would argue there are some people, but as a general rule, Microsoft understands what they're doing here. They have kept it up to date, right? They have had major security problems in the past with windows, the vendor itself, but most of those are fixed now. [00:30:33] And to me, the measure of success isn't, Hey, it's a hundred percent secure because you and I both know that's a load of cow stuff, because nothing's a hundred percent secure. And whether it's made by Microsoft or it's made by Cisco. There could potentially be problems. So Microsoft has fixed the known problems anyways, in windows defender. [00:31:00] So make sure that is turned on. That's the first free tool I wanted to mention, and it is huge. The next one is, of course, make sure you're up. Dating your machine. I don't mean just windows, make sure all of the other software in your machine is being updated. If you're using a browser like Firefox or even Google Chrome, I have issues with Google Chrome from a privacy standpoint, but at least both of those browsers and many others that are based on either one of them, the both of those browsers do. [00:31:36] Update themselves automatically. So that's like a huge win. So they'll keep themselves up to date, but most of the Adobe software won't keep itself up to date. Most other third party applications that you might've bought and installed on your computer or downloaded. They're not going to keep themselves up to date. [00:31:56] So keep on top of that. That's the second thing you can do. That's usually free. I would say usually because Microsoft does sometimes charge you for upgrades. I'm not sure they're going to do that anymore. The whole naming scheme and everything else, numbering scheme for windows indicates that maybe they've dropped that idea. [00:32:18] Yeah. But some of these other vendors might charge you for new release. So let's say Microsoft really decides I'm working on our climb down. We're not going to let this malware continue to give us a black eye. And so they changed the way parts of the operating system work. And so that software you're using for your customer management billing, whatever might be requires an upgrade, which of course that vendor's going to call a major upgrade. [00:32:45] And now you've got to do the app. Great. And you've probably got to pay them in order to get your hands on that upgrade. So that's why I said usually free, not always free. Microsoft also comes with a firewall, and I use that term very loosely because it's an old style firewall. It is just protecting data on certain parts. [00:33:10] And Microsoft does a very poor job of configuring that firewall. Basically, Microsoft doesn't want any tech support calls. So they pretty much turned on all of the features that you could possibly have. And when it comes to the firewall, they just leave them all wide open. To me, that's a huge problem. So yeah, the firewall is turned on by default on windows. [00:33:38] It is by the way off by default on your Mac. And both of those companies take much different approaches on the Mac. Nothing is enabled that doesn't, isn't explicitly turned on. So there's not a whole lot of reason for a firewall because you don't have a file server running on your machine. SMB file sharing. [00:34:00] You don't have a way a web browser running on your machine, et cetera, et cetera, all of that stuff you have to turn on manually. So on windows. I've I have a course that I haven't released yet. That talks about how to harden windows. I did my improving windows security course. I released that in April of 21 and a lot of you guys signed up for it and I've had nothing but great feedback, a few legitimate. [00:34:28] Questions people have, but great feedback over the course. So I'm going to have to do one on specifically the firewall on, on windows and maybe the windows defenders as well, but you're going to want to turn off any services you're not using. And I do describe that in the improving windows privacy and security course. [00:34:50] So if you took that. You've Oh, and you did it. You've got really your mission locked down. Noah came anyways. I'm rambling. Next up. Remember I said that the malware calls home, both ransomware malware, calling home to say, Hey, look what I found. You want to have a poke around. And another piece of nastiness called a botnet. [00:35:18] Where the button that will again, call home to the bad guys and say, here I am, let me know what you want me to do. And very frequently they'll use your computer. It might be a home computer might be a business computer. They love business computers because usually they have a better internet connection. [00:35:37] And they'll use your computer. Just send out a hundred million pieces of spam to any email address they can find. And once they've done that, of course, what's attached to that email while ransomware or other nastiness that's out there. So how do you stop them from calling home? Again, the non-paid or the paid, I should say option is a really good next generation firewall. [00:36:05] So we had a client that has an office here and an office that's out of state. And what happened was one of their of state offices had connected in via a VPN that we had warned about. And being in properly set up and configured and protected. So they came in on that VPN, the bad guys did because they had control of these out-of-state computers and they found accounting files, and they started to upload them. [00:36:38] So we had a really good next generation firewall from Cisco in place of firepower firewall. And we've got all kinds of equipment in our data center that, that controls all of that, but it saw, wait a minute. There's data being exfiltrated we're seeing in their account information potentially. So I would shut it right down. [00:37:01] So they got a few megabytes worth of data out and that's it. We shut it right down. It was all automatic. And then it informed us, Hey, look at what we just did. You might want to have a closer look, which of course we did do. So having that next generation firewall that can recognize data coming into your network and going out of your network is crucial. [00:37:27] The other thing that you can do, and you can do it for free or paid, the $50 a month charge that we have for endpoint computers. In other words for desktops is includes a paid version of this. Which is more advanced, but you can get it also for free. And it's obviously it's not as good and as many options, et cetera, et cetera, not men really for business, but checkout open DNS online. [00:37:58] You can go there right now. Just open D N s.com. Open-domain name server.com. And you can find out how to do it there, but it is as simple as setting your name servers to the addresses. You'll find right@thebottomoftheopendns.com homepage. So you'd set it to two Oh eight 67 two two two-dot two, two, two. [00:38:26] And. Let it do its thing. So what happens now, once you've set up your DNS using open DNS, and again, you can get it for free and the low end. And then at the higher end, it's called Cisco umbrella and a lot more features, but when the bad guys trying call home, they need to convert the name of their server. [00:38:48] Into an internet address and open DNS is updated quite frequently. I know the commercial versions that we have are updated instantaneously 24 seven, whenever anything is discovered. And I think the free open DNS is pretty close to that. So put that in place. Do some of these other things I've been telling you about, and you're going to be 95% ish safe. [00:39:17] That's pretty good. Isn't it for nothing plus the firewall, which can cost you some real money. Some of these real fast firewalls can cost over a hundred grand for a very large business, you can start at just a few grand anyways. [00:39:32]Colonial pipeline. Of course it hit the East coast hard. It particularly hit the Southern state, some of whom declared States of emergency because of what was happening, panic buying. I don't know if you saw the pictures of people with a gap, with a gas in. [00:39:51] Trash bags, clear trash bags, people buying every fuel can, they could fill it up with gasoline, somebody dangerous things. I remember back in the sixties, a friend of my dad's had this beautiful Corvette. I'd love to have one of those nowadays, and he needed to get some gas for the lawnmower. So we went down to buy it, and he had a gallon jug that he filled up with gasoline. [00:40:17] Oh, my gosh. And we had this glass one gallon jug in the back with me. This was the Corvette where there was that little, a two piece window in the back. And that's where I was just a little kid. What happens if you're in an accident? It just, these people who are doing this are crazy. Plus the gasoline is almost guaranteed to break down that trash bag. [00:40:43] This it's just not true. What people have been doing. No man, no wonder people have been calling it the latest toilet paper fear, right? Where everybody went out to buy toilet paper, but this is a real. Problem. We've got Saudi you do remember this Aramco. They were probably hacked by Iran about a decade ago, and we've seen hacks against all kinds of other utilities, these public service, if you will utilities that provide us with. [00:41:14] Pretty much everything that we need for our daily lives. And colonial apparently had a cyber health assessment about five years ago, give or take. Now it sounds like it was the same thing that we do for businesses, a paid one versus the free ones. And I've got. A checklist that you can use. [00:41:36]I'll send it to you. All you have to do is ask me for it. And you can use that to get an idea of what are the things you should be doing to prevent this. What are the things you can do as well? And if you listen to the first hour today, show of course, I went through some of the free things you can do as well to help prevent all of this sort of thing. [00:41:56] So they did go through a cybersecurity analysis. Apparently, they did not follow through on all of the recommendations. And as I started out this segment today, one of the things that's really probable, probably behind this is because they didn't know what they needed to do. So many of us are using people who are great people. [00:42:22] They love computers. They've been learning a lot about cybersecurity, but none of the snow, everything. And unfortunately, so many of us just don't know enough. And we're talking about over one, 1 million to 2 million open jobs in cybersecurity. So everybody's hanging up their hat. Everybody's putting out a shingle saying I'm a cybersecurity expert person. [00:42:47] I've got months, even, maybe even years worth of training. That's all well and good, but you still need to have a third party come in and look, and then you have to follow the recommendations. That's the other big problem I found is businesses just not following the recommendations. And then we get calls back in on average. [00:43:08] I think we figured it out a couple of months back. It was like eight months after we do a cyber health assessment for someone they come to us and say yeah, we got hacked. Can you fix this for us? And in some cases, we're able to close things up and help them out. Just like the phone call we had this week. [00:43:25] And they had taken some of the right steps to make sure that they shut down these hackers. But there's a lot of things I just plain didn't do. And that's a problem, right? We have government contractors that are subs, and sometimes these guys have the primary contracts, and they're out there in the front line. [00:43:48] They have potential prison terms. If data is stolen, Now this last week, this week, right this week. Okay. It's Saturday now, president Biden signed an executive order that is starting to put teeth into these laws. If you even sell something to someone that ultimately has a contract with the federal government, you've got some serious liability now. [00:44:18] If data is stolen and we could get into a lot of details because it happens all the time and people have businesses and they say I just make X product, but the only customer for product X is the government. And you just had all of the purchase orders stolen. And think about Hogan's heroes, right? [00:44:40] If you remember that show back in the sixties and early seventies and in the whole Cogans heroes, what ended up happening is they were looking at it all saying what should we do? What can we do? When we're were to get a little bit of information and they do everything they possibly could to get that information back to London. [00:45:00] And sorry about that. A little phone ringing here. So they're trying to get all that information back to London. Some of it, they got back, some of it, they didn't get back, et cetera, et cetera. But just that little bit about wait a minute, now they just bought 50 of these. Therefore we're thinking that the military. [00:45:19] Is now starting to expand and is going to be doing this or doing that in this area, that area, right? Those little bits of information are valuable, not just to someone like Iran or to Russia or to China, it's valuable to competitors. So president Biden's latest little executive order is really starting to. [00:45:44] Bite into all of these contractors that have been, as we call a pencil whipping forms. Now the SPRs forums as the type of form, they have to go online. They have to report about what their compliance is for their cybersecurity maturity. They don't know what they're doing. They don't know what they're filling out. [00:46:01]I'm thinking maybe I should go ahead and. Put one more little trick into this whole thing. And that is have a a service where we help businesses fill out their paperwork and understand it. But the reason I haven't done that is because the businesses that I know that have been lying on these forums, pencil whipping the forums, they don't really want to know. [00:46:29] Cause then they have plausible deniability. So how do we solve this problem? It really bothers me, frankly. When we come back, I'm going to talk about these five urgent actions that are happening right now, where these 65 businesses, nonprofits, and NGOs have formed this ransomware task force. [00:46:51] What this is about, what it's hopefully going to help everybody out with. But I want to really emphasize again, do you guys. Make sure you have a good cybersecurity health assessment. You have to have that. And if you get a cha cybersecurity health assessment, I'm more glad this end of the paperwork, you can do it yourself. [00:47:14] Okay. The basics and you know what else I'm going to do. I'm going to have a training on this. That's available for free. I'll put that up on my website so that you know what each one of those questions really means. It's so that you can now. Have a good look at your cybersecurity. Cause I know a lot of you guys you're retired. [00:47:34] You have some money that you're trying to protect from these bad guys. A ton of you guys are small business owners like me, right? I've owned and run small businesses for decades now. And. We just are focused on our businesses and just don't know everything we need to know. We don't even know what we don't know right. [00:47:56] About cybersecurity. So I'm going to help you with that. But when we get back, we're going to talk about these fights. If you want to reach out to me, if you want a copy of any of these cybersecurity health assessment forms. I'll send them to you. No problem. Just email me. M e@craigpeterson.com or reply to tomorrow's email. [00:48:17] If you're on my email list, I'll be glad to get that off to you. No problems, no questions asked. I'm not going to be harassing you. If you want us to do a deeper dive, where we look at your systems, we scan them all. We help you prioritize it. We put together a series of steps that you can take to make sure all of the  is done in the order that it really should be done in. [00:48:42] Yeah. Be glad to do that, to that, to pay the assessment. There are a number of companies out there that do it. There's about 1200 nationwide. So you should be able to find somebody if you don't trust me, I get it. That's fine. But get one done, get a very good one done and go deep into it. We're also hopefully going to be able to get into some of the other articles, and you'll find all of these, of course, in tomorrow's newsletter. [00:49:09] And you can get that by just going to Craig peterson.com/subscribe by Google, wants people to use two factor authentication, which I think is a great idea. So it's going to start turning it on for you guys. App tracking. Apple has just gone above and beyond yet again in helping to keep our data secure. [00:49:30] Thank goodness, not just secure, but. Private Peloton man. They're hurting again. Total mess up on their part again, cybersecurity, absolutely cybersecurity problems. [00:49:42]Now we've mentioned here in the last hour about DarkSide ransomware, and these are groups. Both bad guys that have been doing ransomware for a long time and more lately, they've gotten together and built a company and this company actually sells ransomware services. Now I don't mean that if you've been hacked to go to the DarkSide and say, Oh my gosh, we got ransomware. [00:50:10] Fix it for us. No, they are selling. Ransomware as a service and the hers there. There's a huge problem with this. It's just absolutely amazing, but there's some security researchers out there who have been trying to find out okay. Who. Is using them. So let's give you a couple of numbers here. So you have an idea of how much money DarkSide is making by selling this as a service. [00:50:40] So they, they do everything. They write the software that holds your stuff ransom. They go ahead on that software, and we'll do tech support, not just for the people that have licensed their software, but tech support for you. The poor ransom me. Okay. All of that stuff, but according to what is in, let me see ZD net. [00:51:05] They went and had some researchers check out the DarkSide, ransomware variants website, and there's some forum posts there that indicate that affiliation with DarkSiderequires 25% of the cut for ransomware payments under 500,000. And it has a sliding scale. So if you can ransom somebody. For more than 5 million, all they want is 10% of the money. [00:51:36] Can you believe this talking about a real business? It's just incredible. So they are out there and they are really rampant now. And they've been doing it since last summer, this whole double extortion tactic and something they've really fine tuned where they say pay us. And we will decrypt your data. At least we'll give you the key and help you decrypt it, or don't pay us now, but pay us later. [00:52:03] So we don't release your data. As I mentioned, that's what's happened with the Metro DC Washington DC police department that got the data out of the police department, and they're threatening to release it. If the DC police don't pay the right money to them. So these guys, these researchers and this particular cases, fire, I said, they have found five groups that are doing rants that are linked with the DarkSide, bad guys. [00:52:36] And they've got these letters, numbers. It's not real names. It's just what they've been labeled. But the, I wanted to go through here. What these. Different affiliated DarkSide, ransomware gangs are doing so there's one where there's was to start with one we'll run through all five and what their tactics are. [00:53:00] But this first one, which is identified as UNC 26, 28 has been active since February this year. Now, remember how I mentioned how they'll get into your network and then they'll start to move. Laterally within the network, they'll try and infect other machines. If they get onto your home machine, they'll go through the VPN that you're using to connect to the office. [00:53:21] And. Once they're there, they'll start spreading between office machines. And there's some thinking that has actually happened in the case of the colonial pipeline. We'll know more details. I hope fairly soon I've been watching what the FBI has been saying. They send me updates, but I haven't seen anything. [00:53:41] That's publicly shareable at this point in time. Anyways. So this lateral movement is where they're really going to kill you. And this first group tends to move quickly from the initial infection where they get the software on your machine. And they're only lurking on your network for two, two to three days before they start the encryption. [00:54:06] That's all the time it takes for them to find all of your machines. Now they use suspicious authentication attempts, brute force attacks. Spray and pray tactics, all common spray and pray means they're just looking for anybody out there. They're not going after a specific target. They'll find your home, the computer and bam they're in and they'll just take bank account information, or they might use your machine for attacking other people, including by the way, attacking governments and governments don't take well to having your computer attack them. [00:54:40] Okay. So they. Apparently, I'm just trying to summarize all of this as we're going, but they get their initial access through legitimate credentials for corporate virtual private networks. What have I been telling you for a long time? VPNs are not the panacea. Most people think they are, and they purchase it from other criminals. [00:55:02] Next group, 26, 28. Is thought to partner with other of these services besides DarkSide and includes revival and net Walker. Another one has been active since at least January, they moved from initial access to ransomware deployment at an average of 10 days. So it used to be about two weeks. And that's where I've been saying for a long time, that most of the time when you get ransomware, They'll be in your network, poking around for a couple of weeks, but it's been so profitable. [00:55:36] They may well hire more people and spread more quickly. So instead of 14 days is now down to three to 10 days. According to this report, I'm looking at right now, from what FireEye has said and fire, I do do investigations of these types of things. And in fact, they got involved in some political stuff, not too long ago as well. [00:55:57] Team viewer home. My gosh, Microsoft team viewer. It's abused to maintain the persistence in connections. That's where they can continue to be on your machine. Get on a compromised machine, and then they exfiltrate your files before they encrypt them. Next one here, dating back for a little over a year. [00:56:20] They use a phishing name. Emails to deliver this DarkSide ransomware, and they use a smoked ham net backdoor. So there go here. This group can wait on your network and lurk for months ahead of when they actually fire up their ransomware and our friends. Over at Sofo said that they've been called in to assist on five different instances of DarkSide ransomware infection. [00:56:52] So there's a lot to know there's a lot to be concerned about, but remember they get in blocking them. The way I told you in the last hour is really going to help. It's going to stop more than 95% of them, and it doesn't have to cost you a dime. Mind you, the paid versions are going to be better, but that's the way that is. [00:57:13] And we also now have these 65 businesses, which includes some nonprofits, government organizations, and formed this ransomware task force. So that's, I think good. News to all of us world economic forums involved in this as well. And they're just trying to really help. Now, what I get concerned about is the government's involvement, and it's one thing for the government to follow up after an attack. [00:57:44] Okay. And it's another thing for the government to provide general information. In fact, you can find it. The small business association has quite a bit of stuff, not as detailed. I don't think it's anywhere near as good as the free cyber health assessment forms that I can send you. But they, we do have it. [00:58:01] A lot of places have it, and it is well worth looking into. I, so yeah, here we go. Average downtime due to ransomware attacks, 21 days, get that thorough cyber health assessment done. Now whether you do it yourself, you hire somebody to come in and do it. Or we did 1100 of these last year for free for listeners and their businesses. [00:58:29] So more than glad to do it as well. Just email me@craigpeterson.com and I'll get all the info out to you. [00:58:36]Look at what's happening right now with. [00:58:38] The whole colonial pipeline thing, and I am more than glad to help you guys out. And all you have to do is just go ahead and email me M e@craigpeterson.com. All right. Getting down to it here. Two factor authentication. A lot of people have started using. Text messages as part of two factor authentication. [00:59:02] So for instance, you go to a website, you put in your username, which is usually your email address, which is a bad idea from these people that coded up this terrible software, right? You should be able to choose your own username, so you can have a different username on every website, and then you put in your password. [00:59:19] And of course you guys. Best and brightest, you are using different passwords on every website, and hopefully you're also using a password manager to keep track of it all. I were really surprised. I looked at it. I had 1200, 1200 different. Accounts on different websites. So then you probably have more than you realize, but SMS, text messages are not the best way to do two factor authentication. [00:59:53] The idea behind a secure system, just a regular login security is, do have something, along with something you have. So there's something, is your username and your password. Something you have. That's a lot different, isn't it? And having your phone with you that can receive a text message is not really going to protect you, especially if they are out to get you. [01:00:17] So if you have a fair amount of money in investments, maybe you have some Bitcoin, et cetera, many. Times now there are a lot of examples I can cite of people who have had their phone number hijacked. So the bad guys remember the, all these data, leach data breaches, these leaks, where they've got your username, they've got your password, they've got your phone number. [01:00:42] So if they really want to take over everything, all they have to do is. Grab ahold of your phone number, because most of the time, how do you recover your password on our site? Oh, I just go ahead and have it, send me a text message. What happens if instead of that text message going to you, that text message goes to a bad guy because they've taken control of your phone number. [01:01:07] It happens. It happens every day. So Google has an idea that I think is a pretty reasonable one. And Google has for a long time, had an app called Google authenticator. And I used that when it first came out, and I played around with it a little bit nowadays I've been using duo, and I've got, go do all set up so that. [01:01:27] I can put in a one-time password thing, but that changes every 30 seconds or so. And you might've used those before. Sometimes it's a token, et cetera. But what Google has done for two factor authentication is they have it set up so that when you go to login. If you have a Google program on your smartphone, it will have you open up Google, for instance, the app on your smartphone. [01:01:55] And then you confirm that yes, it is me who is logging in. It's not a bad idea. They do it a little different on Android. Google's prompt is a full screen. Popup is built into every Android device as part of Google play services. So it's really pretty easy. This is going to be, I think, a good game changer because otherwise you're in trouble. [01:02:20] I just got a call. This is just crazy. Yeah. What a week, this week from another listener, who's a church. This particular church had been basically hacked and their main email account was hacked into the bank account. It just goes on and on. And it smells like they may have access to his text messages, which are used for account. [01:02:48] Recovery. So this type of two factor authentication thing that Google is pushing out. Yeah. I think is a very good idea. They're becoming a little more proactive and it's, I think it's going to be good. Yeah. Overall we'll see how this all goes. There are some other ways to do it. I think maybe some better ways, but this is not a bad way. [01:03:14] Now speaking about privacy versus security, we've been talking so far about security. That's what two-factor authentication is all about. And if you want a little privacy, Android slash Google is not the way to go. You know that already. I say every time that you should be using duck, Go, not Google to do searches online, to find stuff well, Apple released their newest version of iOS, which is of course the operating system for the iPhone and for the eye pad. [01:03:48] And I guess the iPod, right? Like the iPod touch and stuff, but this operating system has now code in it that pops up and asks you if you want to allow an app to track your activity across other companies, apps, and websites. This I think is a very good thing. At least, that they're trying to track you, right? [01:04:13] So Facebook has been complaining about this for a long time. The experts said probably 40%, maybe 60%, let's call it. 50% of people will allow the app tracking. It turns out that 96% of users in the us have opted out of app tracking. In this latest version of iOS, which to me makes a lot of sense. In other words, only 4% of people said, yeah, you can track me. [01:04:44] What does this mean? Obviously to you as a consumer, it might be good. It actually might be bad. Again, if I want to buy an F150 pickup truck, I wanna buy an F150 pickup truck. Now, maybe you could try and talk me into buying a Dodger Chevy or something else. I get it, but I want a pickup truck. I don't care about seeing ads for women's pajamas or you name it. [01:05:16] I'm looking for a pickup truck. So I want to see ads that are aimed at me for something that I want. I you're probably the same way you remember those days on the internet, where you were constantly getting these male enhancement. Emails. And they went out to everybody because they had no idea who you were. [01:05:38] They didn't have any information about you. And when Facebook and Google and some of these others came along, all of a sudden you were getting more relevant information. By not allowing them to track you, you are going to be getting ads that maybe aren't as relevant as they used to be. Now on the other side, it's nice not having them track you because it's none of their business. [01:06:04]But it's, I think it's overall a good thing. Reminds me of Tom cruise in minority report where he's walking past those billboards, and they scan his eye. As all that's possible from that distance. And they recognize him as, what was it, Mr. Tadashi or something? Not definitely not him. And they were trying to sell him something that were tied into what Mr. [01:06:29] Tadashi had purchased before. And the machines, just the billboard just thought it was Mr. DACI not the Tom Cruise character. So this is going to change quite a few things. If you are a. Business. You're going to have a little bit of a harder time trying to track people, which also means, by the way, and not distract people, but, find people that are of interest to you. [01:06:53]I want somebody that's a white male in his mid forties who drives an F150 that is 10 years old, which means, okay, he's probably going to buy another one. You're going to have a little bit of a harder time with some of that tracking. So it's going to cost you a little bit more for some of the advertising, but I think it's also going to drive down the cost of ads on some of these platforms, because they're not going to be able to target as closely as they could be for all right. [01:07:20] really we're everywhere. All you have to do is you can find the podcast. You can go to tune-in dot com and of course you can just ask your Amazon Alexa, Alexa, play. W G a N and off she'll go, there are so many articles to talk about this week. [01:07:36] You will find all of them in my newsletter. And what I typically do in the newsletter is not only do I go through hundreds of articles and put together a collection of what I think are the most important ones, the best ones for you guys to be able to follow. But I also send you right to the person's website that put the article out. [01:08:00] So they get a little bit of credit. Maybe they get a little bit of advertising revenue, that revenue we talked about in the last segment today. But I think that's the way it only fair to everybody involved. Although obviously I'm adding a lot of my own commentary. So if you want to hear what I had to say about it, Subscribe to my podcast. [01:08:24] Just go to Craig peterson.com/podcast. You can listen to them there, or if you are a podcast listener, I'd really appreciate a comment. Hopefully I've earned five stars from you. Just go to Craig peterson.com/itunes, and we will. At that point be able to track it a little bit subscribing to the podcast really helps us. [01:08:49] And that's how some of these podcasts are measured and I'm doing this all without any commercial content. On the podcast that I do, obviously here, there's some great companies that are supporting us and trying to get this message out. And I appreciate them for advertising, but on the podcast has used subscribing that really helps Peloton. [01:09:12] You do remember Christmas, was it last year or the year before Peloton running these ads and this guy was going to buy this exercise bike from Peloton for his wife. And it seemed like a great Christmas gift for her. She seemed to be very excited about it. And then all of these snowflakes started saying, Oh, that's just terrible. [01:09:35] I like it. Was you doing saying she's fat. What's going on? Obviously she wanted one of these Peloton bikes cause they are amazing. Peloton has done just a great job in tying it into internet training, and you've got a coach, and you've got some really good hardware. The only in the form of the bike and Peloton has some other things as well. [01:09:57] So they really got nailed over that one and I think a little bit unfairly. And then we also had here within the last week, two weeks. Recall by Peloton on two treadmill models. And this was following the death of a six-year old child who was pulled under one of these treadmills is a terrible, I know I've gotten caught up in them before as well. [01:10:24] And the consumer product safety commission said that the recall decision took some intense negotiation. Because they're, Peloton, they didn't want to get nailed for something and it wasn't really their fault. But the CEO of Peloton did admit that there was a mistake here, but this is just, it's a terrible thing to think of. [01:10:48] In addition to this death, apparently Peloton received at least 72 other reports, according to ARS, Technica of adults, children, pets, and or objects getting dragged under. The tread plus treadmill 29 children suffered injuries. Second and third degree abrasions, broken bones, lacerations pretty bad all the way around, you've got moving. [01:11:13] Parts stuff can happen. I don't know. It's do we really need a label on our lawnmower telling us not to use it, to cut our hair? It's bad. It's terrible in any of these things happen. Oh my gosh. I'm not going to read the details here, but this poor little boy's three-year-old son. [01:11:32] No, I'm the parent involved. I'm sure he felt feels this terrible. So there you go. That's problem. Number one, Peloton had and within the last week obviously a major problem considering what happened, but also. Piling on to what happened at Christmas, with all of the snowflakes complaining. [01:11:54]It's now come to light the Peloton exposed sensitive user data and continued to expose it even after it knew about the leak. So it's no wonder Peloton stock price closed down 15% on Wednesday. Now I've got to add to that, that because of the lockdown, starting to go away. A lot, fewer people I think are going to be exercising indoor on their Peloton, but it's still going to happen. [01:12:23] They've got a lot of stationary bikes got a lot of treadmills, but 3 million members, according to their stockholder report and the data exposed include the user IDs, instructor, IDs, group memberships workout stats, their sex and their age, their weight. If they're in a studio or not There's apparently another piece of personal data exposed that the Peloton still hasn't secured. [01:12:50] And so ours check Nicola where this article was published, said, we're not going to tell you about it because it's still being exposed. It's pretty bad. Apparently again, this is just bad programming. It's the API APIs, these application programming interfaces that are used by programmers. [01:13:09] That are used to connect to cloud services, et cetera required no authentication before providing the information. I was reading an article this week, too. On an API might've actually been theirs, but again, no authentication says, okay, we'll lock it down. We're going to lock it down. So how do they lock it down? [01:13:30]They put a username and password on it. Okay. That sounds reasonable. But if you had a username and password, you could access. Any personal information on any API call? I didn't just restrict it to yours. Oh my gosh. Yeah. Totally barked fixed. In fact that it looks like it was Peloton who botched that fix. [01:13:53] Okay. Move onto the next one. We've got a lot of stuff here I RRS is, has been for a long time. Warning people. Hey, listen. If you have an asset. And you sell that asset. You have to pay taxes, and we've got President Biden now saying, Hey, if you invest in a company and you lose money, it's too bad, so sad. But if you make money, now you've got to pay taxes on it. [01:14:19] And they're saying the same thing about, of course, Bitcoin investments and not just Bitcoin, any cryptocurrency trades. Now they have the IRS been granted permission by federal court in the Northern District of California to issue a John DOE summons. And what they have done is they've sent us summons off to this company called cracking and cracking is a us facing arm of something called pay word ventures, according to ZD Net. [01:14:56] And what they've said is they want information on any us taxpayers who conducted at least $20,000 or the equivalent in cryptocurrency trades between 2016 and 20. 20 now they're not alleging that there's any wrongdoing. Cause we know every last person that did a cryptocurrency trade and made money on it, paid the taxes. [01:15:22] And we already know president Biden is planning on increasing those taxes to over 30% ri

Craig Peterson's Tech Talk
Tech Talk with Craig Peterson Podcast: Intel, Apple, DDoS, BEC, Ransomware, Hackers, Third-Party Vendors and more

Craig Peterson's Tech Talk

Play Episode Listen Later Mar 27, 2021 80:30


I know that I have been telling you about this course that I have been making for you -- Guess what it is done and this week, I will be making it available.  It has taken a lot of work for both my wife, Karen and me but it is well worth it to get you this information on how you can Improve your Windows security.  I walk you through all the basics of tightening up your security on Windows 10 and not only that but why you have to. his week was quite busy for me with meetings and presentations for my business.  If you have not yet signed up for my email list do so today and you will be getting a large discount coupon for the course.  This will be the only time that we offer this type of discount so be sure you are on my list before we release the course. Craig Welcome!   Today we will talk about Intel and its war with Apple and what they did that they believe will give them an advantage but might just backfire big time. Then we will talk about DDoS attacks, BEC attacks, and Ransomware.  Then we will discuss how hackers are trying to get into Apple by trying to attack their developer's computers.  If you have been breached -- what did you learn you might be surprised.  Then what can you do if the Feds buy all your location data from one of their security consultants?  How much do you trust your security vendors? All that and even more, so be sure to Listen in. For more tech tips, news, and updates, visit - CraigPeterson.com. --- Tech Articles Craig Thinks You Should Read: Intel hires Justin Long to mock Macs in throwback to 2000s “I’m a Mac” ads ~4,300 publicly reachable servers are posing a new DDoS hazard to the Internet Ransom Payments Have Nearly Tripled Attackers are trying awfully hard to backdoor iOS developers’ Macs What CISOs Can Learn From Big Breaches: Focus on the Root Causes FBI: Business Email Compromise Cost $1.8B in 2020 One company wants to sell the feds location data from every car on Earth Tech Vendors' Lack of Security Transparency Worries Firms --- Automated Machine-Generated Transcript: Craig Peterson: [00:00:00] Hey, I did a webinar this week for the Massachusetts society for healthcare risk management.  I thought there were some things that everybody needs to know, not just healthcare providers. Hi everybody. Craig Peterson here. Thanks for joining me today. There is so much to talk about. I have such fun doing it too, which is great. We will be discussing this in some more detail and the ransomware numbers are just scary. I was approached to give this webinar. You probably know if you've listened for the long time that I have done hundreds. If not thousands of webinars over the years. I have been doing them for our friends at the FBI InfraGard program. I did them many times, two, three, four a month for years with them all on cybersecurity. Plus, I do the free webinars for. People who are on my email list.  I send out little audio grams every week as well, where I do a deeper dive, three minutes or so into a specific topic. It's really fun. I enjoy doing it. So I get approached all of the time, as I'm sure you can imagine doing these webinars for different organizations. I am always glad to do them. It might take me a little bit of time to schedule it into the schedule. You know how that goes, but I always end up doing them. This particular one was about risk mitigation because that's what these guys do, right? There's this society for healthcare risk management. How do identify the cyber threats? What are they preventing unauthorized access to PHI, which is your patient health information? Now, we all have personally identifiable information that's supposed to be protected and so is our healthcare information. So that's what we talked about, it was really fun to get into some detail, but there are a few things I wanted to bring up here with you guys. We're going to be including them this week. By the way, if you haven't noticed in my emails, I've been mentioning this Improving Windows Security course that is starting this next week. If you responded to one of my emails over the last few months where I said, Hey I'm going to be doing this course on Improving Windows Security. I would have probably responded to you saying, okay great. I'm working on it. We have been for months and because of has been months, what we're going to do for people who have asked for this already in responding to the newsletter that what I am going to do is give you guys coupons for this. So keep an eye on your email box. Everybody else. Okay. You're not going to get quite the deal. Actually, if you sign up today or tomorrow and get that newsletter should be going out a Sunday morning. Just respond and say Improving Windows Security so that you can get the full course, not just the free stuff that we're going to be giving. Man, you're going to love this anyway. It's just Craig peterson.com. If you want to sign up for that. I do these all of the time. One of the things that really stood out to me and I thought I would talk about actually, there's a few things is the security breaches in healthcare, because we all have some form of health care. If it's Obamacare, and guess what? Obama isn't your doctor. He's not seeing you, right? You've got a local doc. Sure. You go in, you talk to your doctor or they examine you. Maybe you have to go to the hospital, outpatient, whatever it might be. There are records of yours that are private, and there are people who want to get their hands on those records. Why is that? First of all this statistic just absolutely blew me away. A research company called black book market research, and surveyed about 3000 security professionals from healthcare provider organizations. 96% of those people who were surveyed believed that the bad guys are outpacing healthcare security, 96% of them. Isn't that just amazing? 56% are relying on medical devices using Microsoft windows seven. Seven hasn't been supported in quite some time. Eight isn't supported 8.1 has some support for it, but nowadays you pretty much have to be on Windows 10. If you want any support that is astounding. When you get right down to it. We also have the problem of medical internet of things, devices, M I O T think about, again, all of the devices a doctor uses. Now they might have an iPad that's relatively safe, but have you noticed there are Bluetooth thermometers now that they might use to check your temperature? Did you notice that even people who are in intensive care might be hooked up to an IV those things are connected via wifi and Bluetooth? The x-ray machines, the cat scans, everything now in the doctor's offices. Practically everything is electronic is hooked up to computers. We're helping a medical office right now doing a bit of a transition on their phone system so that they have integrated with their phone system. Now, automatic text reminders. If someone calls in or the office calls out, all of that is logged in the patient records, screen pops that come up and tell them, Hey okay is calling in and it shows all of the records before they even answer the phone. 56% of healthcare providers are using unsupported operating systems.  That's just on their computers. Most organizations don't even know what is inside their machines. Cause you remember almost every machine nowadays has a computer on it. Then on top of it, they're using this 20-year-old antivirus software and insecure systems. They're really not vetting things, failure to access. It's just absolutely crazy. Now the bad guys are able to get in about 86% of the time. That's according to Verizon's 2020 data breach investigations report. That's just crazy. 86% of them are about money. The attackers usually take the easiest route to obtain all this information that they need. 43% of the breaches are due to the cloud. How many of our businesses are saying Oh, I'm going to use the cloud. I'm going to use salesforce.com. This is an example. I'm not trying to pick on salesforce.com. They've had their problems, but so has pretty much everybody else it's. We're gonna use salesforce.com for all of our client records and emails going out to et cetera, et cetera. That's just a word for someone else's computer, the cloud. It is a computer. It is still existing out there. You cannot, whether you're in healthcare or you're a regular business, you cannot just push off the responsibility for your data to a third-party cloud provider. Now in the medical business, they have these business process agreements, BPA partner agreements that say, okay, you Google, I'm going to be paying you extra for this special healthcare version. So they pay extra and they get that special healthcare version. And Google says we will keep your data safe. Oh, okay. That's well and good, but you have to pay for that version. 43% almost half of the breaches were due to people trying to use. What's called the cloud. 27% were attributed to ransomware. It is running rampant and we'll get into some of those stats here in a minute. This is the part that I would think everybody needs to hear and that is your patient health information worth 20 times more than credit cards are worth. Did you hear that? 20 times more, 2000% more than credit cards. So you might ask yourself why does that matter? What's the big deal with my patient information? If they have your credit card, they can use it a few times, hopefully, you'll notice it pretty quickly. You're using something like a credit monitoring service to notice, Hey, wait a minute. What's going on here. If they've got your social security number, they could potentially buy a house or a car in your name. You don't know that they bought a car in your name until the tow truck shows up asking for the car back. Because it's now being foreclosed on, but guess what? You don't have it. It's not yours. You have to spend 300 hours trying and straighten it all out and clear up your name? But when it comes to PHI this patient's health information, probably has your social security number. Remember when you fill out those forms when you go to the doctor's office, criminals can pull off stealing your identity that can go undetected for months, but it's even worse than that, frankly, because if they have a child's information, Oh, so again, we're talking about a birthday to name and address a social security number because you remember the government's forcing us to get social security numbers for all of our babies as they're born. Yeah. So they've got that social security number, which will never be used to track us. Will only ever be used for social security and can not be asked by anyone outside of the federal government and the social security administration. Another promise from the federal government was completely ignored. That child's personal information can now be used for at least 10 years, probably closer to 15 years by a bad guy. It can be sold to illegal aliens who now have a name social security number and maybe a fake birth date because they're really a little bit older than they appear to be on that birth certificate. That's why it's worth 20 times more. It's really something's going on. All right. You are listening to Craig Peterson. We're talking about our health care information. We're going to talk a little bit more about that. We all have healthcare records and they have some of our most personal information. That's what we're talking about today in follow-up to a webinar that I did last week for the healthcare industry. We're going to talk right now a little bit more about your privacy. Hey everybody. Thanks for tuning in, Craig Peterson here. Getting right down to the real hard stats here on our healthcare records, a lot of them have been stolen. We covered that, of course, in the last segment. If you miss that, you can catch that online on your favorite podcasting app. I'm pretty much everywhere, nowadays. It's just crazy to think about because, in reality, we have had millions of records stolen, 300 million healthcare records stolen to be exact since 2015, which is pretty bad. I'm looking at a chart right now that I showed to this healthcare industry group that showing that the hacking event has almost doubled over the last three years, year to year, every year. So in 2018, 164 major hacks, 2019, 312. That's a good double. 2020, 430, which isn't quite a double. So we are seeing a lot of data being stolen. Of course, stolen data means misused data, which is a very big problem. Now, in the healthcare industry, they've got a separate problem. That is these HIPAA rules. Now HIPAA has been in place for quite a while. It's supposed to have been provided portability of our records. Does anybody have any real luck with that? I know there are some I haven't. Portability, I don't even know where my health records have ended up. Frankly, cause my doctor ended up closing up shop and I just have no idea. But it's supposed to be portability and privacy. Well, the most common violations of these HIPAA regulations revolve around professional hackers. Then you've got business associate disclosure. Remember I mentioned that. The cloud is not an excuse for not protecting your data. You cannot hand that off to a third party. There's many more that I go into in the presentation. Of course, I talk about some of the ransomware that's been going around the fines they can get from some of these. Then here's the next thing I wanted to talk with you guys about. And that is the amount of ransomware out there. I'm going to have a little bit of a ransomware offering. Take a look in some training and stuff here. Take a look at your emails. If you get my newsletter, it'll probably, I'm going to try and get this in for tomorrow's newsletter. The one that comes out on Sunday, if you're not a subscriber right now, go to craig peterson.com/subscribe. You'll actually see it on the site @craigpeterson.com. If you scroll around, do a few things on the site, it should pop up automatically for you. I'm going to make a note to myself here about the ransomware stuff. So you guys can hop on and get more information about how to protect yourselves too. Now we're just talking about healthcare and of course, this is every business and every person out there. I talked about this Conti gang. I don't know if you've heard of them. C O N T I. Now, remember what I've said before about ransomware. It used to be that you'd get ransomware. Your computer would now have it's data encrypted, and then it would pop up this big red screen up that said you've got ransomware in order to get to all of your data back because what the ransomware did was encrypt it. You need to go to this website. You need to pay this amount of Bitcoin to this Bitcoin wallet and off it goes, right? That's the idea. According to the FBI, about half of the time, you'll get all your data back half the time. That's even if you pay the ransom. And now, too, that the. The State departments might come after you, and the FBI, if you pay a ransom because now you are supporting terrorist organizations, not just criminal enterprises very big deal. Now the other side of ransomware, and this is what just hit with a few different medical providers here.  What I talked about was the Rehobeth McKinney Christian health center services, New Mexico, because now it's much more advanced instead of just getting on your computer, encrypting your files, demanding a ransom to get the decryption key. They even pre-install the decryptor for you. Isn't that handy? Yeah. What they are doing is they get onto a computer and then they start East-West spreading. Now we've seen that for years. I remember one of our clients, a car dealer, and this was five-seven years ago. They got some ransomware. Somebody clicked on something that they shouldn't have, and all of a sudden their machine gets ransomware. The machine, of course, is hooked up to the network and. It is also not just hooked up to the network, it is in fact, mounting drives from their file server. So his machine has access to all of these files. This guy was a manager over there at this car dealership. So he had access to all of the files. Think about that for a minute. What his machine did back then is it said, Oh great. Here's some network drives.  It started encrypting the S drive and the H drive and the K drive. All of these different letters for these SMB mounted drives from the file server. We were in there beforehand and we installed our security stuff. When his machine got this brand new strain of ransomware, and of course he didn't want us looking at what was on his machine. So we couldn't install all of the antivirus software because then we would have access to it. We've got another client that's like that too, where the owner of the business doesn't want us installing software to really keep his machine clean. I don't know why people do that. It just, are they just trying to play their cards close to the chest? Is that what they're trying to do? Are they looking at something they shouldn't be looking at work or ever? Why do people do that? If you got hints, let me know. Cause I would love to know me@craigpeterson.com. Why do people do that? Anyhow, his machine got the ransomware. It tried to start spreading to the file server. Now, we had special hardware and software installed. So we saw that spread start.  We immediately shut down. It was all automatic. It was just shut down. I shut down his network port, in fact, so his computer can go anywhere. His computer had the ransomware. We were able to just go ahead and restore from backup. The bad guys know that if all they're doing is encrypting your data, then who cares? You restore from backup. Now, hopefully, you're following a three-two-one backup scheme. Most places don't. Hopefully, you're testing it as well. We test every backup that we make for our customers every day. We usually about once a week, will, if it's a server or even a workstation, we will spin up the servers in a virtual environment and make sure that it can boot so that we know we have a good backup.  I got to tell you guys, most of the time the backups are not working and it gets to be a real problem. What these guys have figured, including this Conti gang is we're not going to be able to get as much money out of them by just encrypting their discs. We need to do something else. So while they're trying to spread East-West inside, what they're doing is okay, so they got a hold of this manager's computer. They start scanning for other computers and scanning for vulnerabilities scanning for ways it can gain access. Unfortunately, the statistics show us that most of us have file share turned on our windows machines. That's one of the things I talk about in my Improving Windows Security course, what to do, how to do, how to turn that off because that is the second target of ransomware. Once it gets onto your machine. You've got to turn off those file-sharing services. So we'll tell you what Conti and these other guys do once they're there in, and they have found another machine. Maybe it has filesharing services. Maybe it's good old-fashioned vulnerability because nobody patched. Man, I can't believe how fast this computer is. We just did an upgrade on my iMac here in the studio. It is blindingly fast now. But we're talking about. Ransomware and what's the Conti gang and others doing, nowadays. Hello everybody. Craig Peterson here. Thanks for joining us today. Appreciate you spend a little bit of time and I enjoy helping to bring you guys up to speed on what is happening. There's just so much of it. You wouldn't believe what I have to filter out. The Conti gang have been very successful, but their money started to dry up fairly recently when people figured out if they had a decent backup, they could just go ahead and ignore the ransom demand. Instead of paying that ransom, just go ahead and restore from backup. So they had to do something different. What the Conti gang did, as well as pretty much everybody else in the ransomware business, is okay, what we're going to do now is we're going to find all of the other machines we can find on the network. Then we're even going to have real people get onto these computers remotely that they've compromised and have a poke about. See is there patient healthcare information? Are the bank account numbers on this machine? Are there plans on what to do? Where to go? What's the business going to do next week? But particularly stuff they can sell right away. If you take credit cards, you know that the payment card industry is all over you if credit card numbers are stolen. Those are nowhere near as valuable as patient health record information. As I mentioned a little bit earlier, we're talking about 2000% more than 20 times more value to your healthcare records. Now what happens is the Conti gang says Oh looky. We've got patient information here. It has names, addresses, social security numbers. It has birth dates. It has diagnostic information, and then they upload it. We had something like this happened with one of our clients. It wasn't a ransomware attack, ultimately may have been.  They came in through an unsecured VPN and that they would not let us shutdown. We told them to shut it down and they didn't. In come the bad guys, they actually were coming up via Mexico in this case. Although I doubt they were located in Mexico.  They took that VPN connection, they used it now to get on to the computer and found something interesting. So they started to exfiltrate the data. In other words, Take that data and send it out. That's exactly what the Conti gang and others are doing now. We noticed, wait a minute, this is all automatic. Why is data going out from this host at that speed to this address at this time of day? It wasn't a normal pattern. So our hardware-software that's sitting there in their network automatically shut it down hard. They were able to exfiltrate just a tad bit of data and then it was stopped instantly. That's what they're doing nowadays. So the Conti gang gets your data and then they try and say pay up from an extortion standpoint. Instead of just holding your data ransom, they're extorting you. Saying, if you do not pay us we will release this data. The Conti ransomware gang has its own website out there. It's called a leak site. There are many of them out there. If you go to that site, I'm not going to give you the URL. It's right there. There's their logo. Conti gang has a logo and it says Conti news.  It's talking about how you can make your payments to them and what data was released and that this person paid up, but it was too late. We don't have the data anymore, which means it was released and too bad. So sad. I wouldn't want to be you. Here's another ransomware gang. I've talked about with the Massachusetts society for healthcare risk management in this webinar, and that's the Avedon ransomware gang. So again, they had stolen personal information. They had health information and they had not just the ransom side, but the extortion side built into it. This was in relation to an attack on the Capitol medical center in Olympia, Washington. They have leaked some of it they're threatening to leak even more. If Washington Olympia capital medical center doesn't pay up. Now, I went through here with Karen, helped me out with Karen and we got some other stats. First of all, 70% of the time now, ransomware results in data exfiltration. In other words, 70% of the time, your data is stolen prior to the file encryption.  Pretty bad. Pretty bad. Things can get particularly harmful because these ransomware attacks are a growing concern. They're disrupting patient care and healthcare, right? Disabling critical systems because they have been even holding ransom some of the diagnostic equipment, MRI machines that were connected to the network. There were running Windows.  Who would use Windows in the machine that's healthcare critical? Obviously interrupt revenue flow and they had to now go get involved with real expensive remedies. It really puts him in a very bad spot, very bad. We've had almost double the number of healthcare institutions attacked this year versus last year. I'm not going to go through all of these things here. I explained to them the difference between some of these real sites and fake sites and how you can get access to it. By the way, if you're interested in this, I did record this, I'd be glad to send it out to just let me know, just email me@craigpeterson.com and I can send you some of this healthcare stuff, the slide deck, or whatever you might like. Phishing campaigns, way up. You probably heard about that. I gave some examples of that emailing patient information without encrypting it. Wireless infusion pumps are, of course, compromised because they're running an operating system that hasn't been patched. Usually Windows. Think of that there's Windows in that infusion pump, but it could be a version of Linux. It's not patched. It's crazy. Vital sign equipment. Oh my gosh. We're also seeing that this patient's health information being stolen now is being used to create fake insurance claims. You might've been wondering in a previous segment here, I was talking about how. Much this is worth and it's worth a lot while this is one of the reasons it's worth a lot, your personal, private patient health information. If you have a diagnostic info and that diagnosis has been stolen, and then they can file a health insurance claim. Yeah. You see where I'm going with your information as though you received some treatment or some care for the diagnosis that was in your healthcare records. It's just that simple. The average cost of a data breach right now, by the way, if you are a regular business, it's $158 per record for non-healthcare and it's $408 per record. If you are in healthcare at all. That's a doctor's office. That's not just hospitals, it's anybody. And by the way, mobile breaches are really big 43% of healthcare organizations who reported a mobile breach, said the mobile breach caused long-lasting repercussions. Now, think about this. If you're a patient. How well are your records protected?  I can tell you based on what I've seen and talked with healthcare, people have seen statistics they're not protected very well at all. People will start going to jail over this. People in the healthcare industry that is. So just in case, you were thinking that couldn't happen to you. I'm gonna spend a couple of minutes now talking about what happened a long time ago, in February. 2021 with healthcare records. This is amazing. Hi everybody. This is not the healthcare network. No, it is not. I'm looking at these slides that I had put together, of course, based on research that I did,  for the Massachusetts society for healthcare risk management. It was an online webinar. I do webinars all the time. I do them for listeners where we talk about something that's hot in the news. You might see me doing various lives. I haven't done one in a little while. Do you think I should be doing Facebook lives or YouTube lives?  I know a lot of people have a real problem with Facebook. That's certainly understandable from my standpoint, but do you think it's worth it? Get on and I can answer questions and things. Let me know me@craigpeterson.com.  I've done them before.  I usually get a handful of people on. I'm not sure how much it's worth or not.  They are coming for you when we're talking about the health organization. So as healthcare organizations. So we're focusing on the bigger ones because that's who I was presenting to. I always make these slide decks. This one took me a week to put together right. Karen and I because there's so much research and I know I shouldn't spend that much time on these things, particularly if I don't charge for them, but I've got to do it. I was talking to a friend of mine who's an attorney. He said, do you know what? You would be one of the richest men in America if you did not have morals. Oh my. February 2021, we had Gore medical management out of Griffin, California, with 80,000 people affected. Nevada Orthopedic and spine center. Las Vegas, 50,000 people. UPMC life-changing medicine out of Pittsburgh and only 40,000 people there. Remember, this is February. 2021. Oh, wait. There's more Grand River Medical group out of Dubuque, Iowa, Harvard eye associates out in Laguna Hills, California, Texas spine consultant out of Addison, Texas. UPMC Health plans out of Pittsburgh, PA. Granite wellness centers, Grass Valley California. Granite is Northeast, people. Aetna Hartford, Connecticut. Isn't this something, February 2021. 12 Oaks recovery center, NAVAIR Florida. Pennsylvania Dalton teen challenge in Pennsylvania. Data Logic software, Harlington, Texas. Yeah, it goes on here. The house next door, Deland, Florida. Project Vita health center, el Paso, Texas. Just in February. Lake Charles Memorial health system, Lake Charles Louisiana. UT Southwestern medical center, Dallas, Texas. Hackley community care center out of Michigan. Rainbow Rehab center, Lavonia, Michigan. Jacobson medical hospital care center Elgin, North Dakota. Pitkin County, Colorado. Piedmont health services, North Carolina. Hope healthcare service, Fort Myers. I like Fort Myers. Jacobson Memorial hospital and healthcare in Elgin. You getting you guys getting the gist here and you pick it up what I'm putting down. Jacobson Memorial hospital. This was a data accident involving an employee email account potentially exposing current and former patient data to authorized individuals. You know what, the number one question I had. I got to put that together. Let me just jot this down so I don't forget. Gmail. Doctors. The Number one question I had was how do we stop doctors from using their Gmail accounts? That's the same type of thing that happened on February 23rd, 2021, right here, where they were forwarding email and this happens. We see this all the time. Somehow doctors think, I dunno, they're immune to these things, or it's not going to happen to them. I don't know. An email comes in and it comes into a secure email system.  Then the doctor configures it to forward his email that comes into the secure clinic, his doctor's office, whatever it is, forwards it to Gmail. What happens at that point? It's now in Gmail, it may or may not be secure. If you're not paying Gmail for your account, you can be pretty sure it's not terribly secure. There is an encryption standard, an email called TLS and Gmail does not provide TLS services, guaranteed, for free accounts. In fact, I don't think they provide them at all for Gmail accounts other than the paid accounts.  This is an absolutely huge problem. The FBI and the Department of Homeland security CISA came out with another warning here about healthcare. This is affecting all of us because this is our personal information. Why are healthcare records so much more valuable? I mentioned earlier a couple of things. One is they usually have a social security number, name, and address, so it can be used now to steal someone's identity. They often have diagnostic information. So that means it can be used to file fraudulent insurance claims. What else can you do with some of this medical data that is stolen? If they have your medical data, it's so much different than your credit card, because credit card you can cancel. In fact, even if you don't cancel, if you notice you get a new credit card, every what is it - three to five years, new credit card here it is. There's a new number, at least a new code on the back, right? CVC code.  You look at that and say new card okay, whatever. It's such a pain because you have to go and change it on any website or with anyone that's doing an automatic ordering. But when you get right down to it, What can happen if your credit card numbers are stolen? They can run up your credit card. You can, before you pay it, file a claim and say, Hey, someone stole my credit card number. That is bad. I did not authorize these charges and they will back out the charges for you, right? You haven't put a dime of your own money out there. Now, a debit card. Yeah. They've taken your money and now you got to fight a bit to get it back, but you can get it back from all the major credit card issuers, but you get a new credit card number. What happens if your social security numbers are stolen? Did you know that the social security administration will not issue you a new social security number? Is your number stolen? Did you know that? How about the rest of your information? Most people live in a home for at least 10 years, not longer. That's a lot longer than your credit card number's going to be around so they can now again, continue to file for loans under your name, your address, your birthdate, maybe for the rest of your life. This is our personal information. And as you probably noticed early on, I was talking about how upsetting it is to me that we have a national ID stamped on our forehead effectively. We have a social security number that we now have to use for everything it's called a social security number because it was put in place for this Fake insurance program that the federal government put together because it's not an insurance program. It is not run like an insurance program. They put it together and they called it social security.  They gave you a number because they had to keep track of your account. And really it was your account number.  Now it's used everywhere. There's proposals out there. Hey, let's come up with a digital ID, a digital identifier. A digital passport, if you will, as though that's going to solve the problem. The problem is we now have our data stolen. It's already out there. It's everywhere. Can you imagine what China might be thinking about doing with it? China has been, it's been verified now. China has stolen the records of pretty much every federal employee, every background check record of every background check that was done for clearance via the FBI. What's going to happen if they decide they really don't like us anymore and they just let loose? What a great way to shut down our economy. Like overnight, by all of a sudden creating millions of fake accounts. Using real identities, our identities. This is just nuts, it is absolutely nuts. We've seen these hacks and we just ran through some of the healthcare hacks that happened in February of 2021 one month. These are the ones we know about. Most of them are in fact, probably not reported at all. Add on top of that, now we have doctors that are working from home that are using what we're calling loosely, telemedicine. They're getting onto platforms that were never designed to keep our data safe is not HIPAA compliant. They are exposing our data even more than ever before. I don't have the answer for this, because they are not, I can guarantee you, they are not pounding down my door to have me come and help them. I could. That's what I do. They're not. In fact, when I reach out to most of them they hardly care at all. Not a big deal, right? Not going to happen to me, can't afford it. Yet they're pushing all of this burden onto us. It is extremely upsetting. Something has to be done. Something has to be done about healthcare. We need to enforce these HIPAA rules and regulations, and people need to go to jail for blatantly ignoring what they've been saying, by signing these forms, blatantly ignoring what they've been saying. They've been doing now for what 20 years? Visit me online. Craig peterson.com. Make sure you get on that newsletter so that you don't miss a thing. I think we beat healthcare to death in the last hour. We're going to be getting into a bunch of new topics here. This whole thing about Intel hiring Justin Long has stuck in my craw too. So we'll start with that. Hi everybody, Craig Peterson here. Of course, it sounds like its a stuck in my craw week, but we got to keep you guys informed and it just really irks me, that so many businesses are trying to do the right thing. They are spending money. They're getting training for their people. They're getting the right kinds of equipment. They might be buying stuff from me or whomever. It really doesn't matter. They're trying to do it right. That costs them. There's no question about it. They are competing against people who don't care. That's what really bothers me. They're competing against people that are barely spent a dime. Maybe they bought a SonicWall firewall 10 years ago, but that's the last time they did anything for security. To me, that is a sin and should be a crime.  If you've got a company, like maybe you've got a DOD contractor, and they've spent 200,000, maybe as much as a million dollars if their really quite a bit bigger on just trying to secure their networks and okay they sell to the DOD, but they sell to a lot of other companies as well. How do they compete? How do they compete against somebody that just hung up a shingle and is out there selling a competing product? Nowadays, you can't tell. This is an old one, right? Do you remember the Lycos commercials on the internet? No one can tell you're a dog. That's exactly what this is about. No one can tell going to the website. How good are you? How long have you been around? How much have you spent on cybersecurity? Is it any good? It's just nasty. It is really bad, bad stuff. We are getting attacked so much. Ransomware attacks have tripled in 2020 and remember ransomware isn't just ransomware anymore. Most of the time it's also got extortion built-in. It's just crazy. Make sure you are on my email list. If you're a home user, that's great. There's lots for you to learn. If you're a business that's great, there's lots for you to learn as well, and I'll let you sort it out. But even when I have stuff specifically for business or targeted to business concerns, there's stuff you can learn from it as an individual. I want you to pay attention to it, but you can only do that if you have my newsletter coming to you every week. Of course, the best way to do that is this go to my website, Craig peterson.com. You'll find it all there. I appreciate you guys. I, again, I just can't say it enough. You have been great. I appreciate all of the feedback I get and I answer all of the emails. Again. It might take me a little while it usually takes a few days. But I do answer them and I answer them personally. Most people are really shocked when they get a newsletter, they hit reply. I replied to them. Thinking that I must be some big internet marketer, which I'm not, I'm here for you. I appreciate everybody that signs up for the list. You guys referring to people. It's interesting. Every time I send out my weekly newsletter, I get even more people signing up for the newsletter. So you guys must be forwarding it to your friends. Who is then signing up?  I really appreciate that too. Cause I want to get the word out. 99% of what I do, what I say, is absolutely free to anybody who will care to listen.  It's there for you. I really do want to help. You might remember these commercials from way back in the two thousand in the double ots, triple ots. Hello, I'm a Mac and I'm a PC. Hey Mac. Did you hear the good news PC choice chat? Sorry, I didn't hear you there. What'd you say, allow me to introduce the top-of-the-line PC? Okay. What are you doing in a pizza box? Go on, rip it in half. And since it's beautiful that he needs an upgrade and I'm having a very difficult time finding pictures of my friend. I couldn't hear you through my virus-proof mask. Bongiorno. Hello. Let's go to the commercial. We are a commercial. Let's go to another commercial, your first class, all the way PC and Danesh. You are banished. I have to chuckle when I hear those. Isn't that great? Those are just excerpts from some of those commercials from years ago. Of course, get a Mac. What Apple was doing at the time performed by John Hodgman. He was the guy that did the PC side and Justin Long, who was the guy that did the Mac side saying I'm a Mac.  It's fascinating to me now that Intel has decided to go ahead and hire Justin. Now what's most fascinating about it is that Intel hires Justin. Wait, what are we comparing here? A PC is when you think of it, it's Windows, right? You're not thinking about Intel inside. You're buying a Windows machine. You're not buying a computer because of the chip it has in it, most of the time, right? You might buy this is when I said faster chip or that one has a slower chip. That makes a lot of sense. You're buying a computer so you can run an application. I remember very well back when the Apple two came out, the two-plus and people bought them in droves because of an application. You could get VisiCalc on there, a spreadsheet program.  It was the first, it was the best. It was the most popular at the time.  Then others came out that were arguably a lot better. But it still sold. VisiCalc still sold and went over to the Windows platform. So Justin is now doing commercials talking about Intel. So he's saying on the Mac, you can't touch the screen, which by the way, you can if you get a touch screen for the Mac, No two ways about it. I have one sitting right in front of me. I use this on my Mac it's a touch screen. I use it for doing presentations. I can highlight things, move things around, touch things, open them up, click on them with my finger right there on this screen. None of those have anything to do with the fact that inside that might be an Intel processor. We've got Intel now out there with I think misleading, but potentially you could argue, that they're misrepresenting Intel. All Intel is doing is providing the main processor maybe some other support chips on there. Maybe it's using Intel memory. I don't know, but in reality, what we should be comparing is our Mac, our Intel-based Mac versus our Intel-based Windows computer. Remember Macs will still run Intel. I just gave it away. Did you catch that? What's really going on here. What's really going on is, Apple is upset with Intel for some very good reasons. Intel has been massively overcharging for its processors for a very long time.  Intel processors have never been that great, frankly, but because of what was called the WinTel monopoly. Intel really went along for the ride. They went along with the ride with Microsoft because people bought Windows so they could run Excel or whatever the other applications were, that they wanted to run. So what has Apple done? When Apple came out with the iPhone, it never had an Intel processor in it. The same thing's true now, with all of the new Apple equipment that's coming out. So your I-phones don't use Intel processors, your iPads, don't use Intel processors. I have sitting right in front of me, a Mac mini that has an M1 processor from Apple. And in fact, Apple right now is trying to get rid of Qualcomm as well. It can help increase their profit margins, but these things are not easy to design and implement. It took Apple years to get to the point where they had one that was really quite a good processor. I can buy a Mac mini with an Apple processor in it that is better than a hundred percent faster than a Mac mini with an Intel processor, for less money. The Apple chip costs me less money than the Intel-based processor and it's twice as fast according to Adobe, who just released their performance metrics on illustrator and Photoshop. Intel is getting very nervous because they're seeing their business go down the tubes. Intel has not been able to deliver on lower power processors. It has not been able to deliver on faster processors other than going to multiple cores.  It's also having problems with manufacturing, the smaller, thinner, and thinner processors, which help with of course, using less power that makes them faster and they have less heat. Intel is saying, Oh my gosh, we're in trouble here because even Windows runs without Intel processors now. You can get a surface tablet that doesn't have any Intel in it and run windows on it. So they're in trouble there. They're seeing to the market share that's being taken from Microsoft by these Google Chrome tablets. Chromebooks, which are laptops, which are very inexpensive, very fast, very user-friendly, and very secure. Although, Google does spy on you a bit and they don't use Intel. What does Intel do? We're going to hire Justin and make people very confused about what's really going on. Don't worry about those ads, stick with anything you need to use. If you can get out of the space of windows. Get out of this space of Apple. Go with something as simple as you can. Maybe Linux, maybe ChromeOS. Hey, it's 2021, and ransom payments have nearly tripled then targeting many factoring healthcare, construction and the average ransom is now $312,000. Hi everybody Craig Peterson here. We were talking a little bit earlier about ransom and ransomware gangs.  We've talked about how it can just totally destroy somebody. If you're a home user and let's say that they get onto your computer and they encrypt all of your photos your grandpa, grandma, your parents. You've got pictures of the kids and grandkids, great-grandkids, whatever it might be on your computer.  Now, they're demanding $10,000. If you ever want to see your pictures again. That is a very good reason to have your photos and other documents you care about somewhere else, not on your local computer. I know far too many people who hook up a local hard disc to their computer and then back up to it. They're backing up to a USB drive that just isn't going to cut it. That USB drive is attached to your computer. If your computer gets ransomware on it, it's going to encrypt your USB drive. That's why I advise people if you are going to have to use a USB drive, let's say you've got a database that you have to open, but you don't have to have it open all day long. Put it in an encrypted volume and only mount it up and decrypt it when you're using it.  Then go ahead and re-encrypt it when you're done.  That's called data at rest. The idea is when you're not using it, nobody has access to it. That's what you should be doing. Remember too that if you still have that disc plugged in, and if that disc is encrypted, they can still encrypt it and hold you ransom. But they're not going to be able to do the extortion because the data they have is encrypted. They have no idea what they have. They may not even grab it because some of this ransomware software is just that smart. Ransomware gangs now that are aiming at businesses are grabbing even more money than they've ever been able to get before. The average amount that's paid, jumped 171% in 2020. There's a new report out from Palo Alto Networks. They provide all kinds of networking equipment. You probably know, I already use Cisco primarily we've used some Palo Alto. We've stuck with Cisco. I like that integrated environment, but Palo Alto is good. Just not great. Palo Alto uses data from ransomware investigations, these data leak sites, as I mentioned earlier, where some of these ransomware gangs post to the data that they have stolen from people. Those are called data leak sites.  They looked at some of those things to try and figure out what's going on out there in the industry. They found that these main industries, which are manufacturing and healthcare, construction companies had almost 40% of all ransomware attacks in 2020. It's just amazing because again, the ransomware attacks are being fine-tuned to go after organizations that have data that is very valuable. The highest ransom paid that we know of was $10 million. Isn't that amazing.  The highest ransom demand was $30 million. Almost a third of the average demand paid more than $312,000. So it's just crazy. When you start looking into this and these ransomware groups are really getting ahead of the defenders. They are using all kinds of different types of innovation, which is again, why antivirus software does not work. I put that into my presentation. In fact, I had in the presentation here, some slides with John McAfee, I had him for one of them, and then I had a quote from now trying to remember what he was. He was a high-end guy in Symantec which makes Norton, and both of them said this, "their software is just useless" bottom line. It's useless because these ransomware gangs are using different techniques, different styles, they're improving things, pretty dramatically, frankly, and getting these ransoms up higher and higher. By the way, they are still being paid using cryptocurrency and that surged 311% last year. By the end of 2020, ransomware payments began to decline.  A lot of that seems to be because the victims don't believe they're going to be able to get their data back, which is correct as I've mentioned before. Be very careful out there. If you are a victim of ransomware, realize guys, you're probably not going to get your data back even if you pay. Also, realize that there is another extortion coming your way in most of these cases.  That extortion is to pay up or I'm going to release your data to everybody. Then you're going to have to decide what to do. Cleaning up after ransomware isn't cheap. The average cost of forensic engagement is over $73,000 for enterprises and 40 grand for small and medium businesses. It's pretty bad what they're doing right now. All right next up here. We've got attackers who are going after specific targets. Now I mentioned that just now, but in this case, what they're doing is they're trying to get back doors into iOS developers' Macs. Here's how it works. If you have an iPhone or an iPad that is running an operating system. That's based on a Unix kernel called iOS that's Apple's operating system for those mobile devices. It behaves differently than the desktop operating system. That makes sense, right? Windows trying to shoehorn in the touch screens without really considering all of the implications of that, I think was a huge mistake. If you want to go back many years in Windows eight when they introduced tiles. On my archive, you will find me saying that very thing. However, If you are a developer for iOS, you're not going to be using Windows. You are going to be using a Mac. What the Mac developers use is something called X code. This is a developer tool that Apple makes available to developers who are writing apps for iOS or Mac OS, as well. The bad guys are doing a supply chain attack and they are putting fake libraries that are being used by the developers, into the developer pool. The idea behind that is if they can get this fake little library in there, they can then take control of any machine that's running that library. I don't want to get into this too techie here and have people zone out, but it tells you something here that the bad guys, rather than attacking iOS head-on like they do with Windows. They are trying to get into the developer libraries and get in that way. Now they are, don't get me wrong, they are trying to do this with Windows. It's just usually so easy to use a new zero-day on Windows, as opposed to going into all the trouble to try to get into developers' machines in order to install these back doors. It's also known as a home watering hole attack, and they send this to targeted developers. There's a visual studio project that's available right now with a proof of concept exploit for some of this stuff, but we're aware of it. We're trying to deal with it. Apple is trying to deal with it. Windows eight is happening in that area as well. GitHub has seen a whole lot of problems with this type of injection and the whole industry is working hard to stop it. I think that makes a whole lot of sense. All right. Let's talk about selling the feds, location data from every car on earth. Does that make sense? I don't know. Apple made a change in its podcasts. We'll talk about that as well. Hey, are you somebody who listens to podcasts as well as the radio Apple figured something out to the most other podcasters really figured out some years ago? So we're going to talk about the one-word change. Apple just made it. You're listening to Craig Peterson here on news radio, WGAN AM 560 and FM 98.5. Thanks for joining me today. As we've been talking about some of the great articles out this week that I was going to say the great questions that have plagued humanity, but. I don't think that's quite true. There certainly are questions we all need to have answered and I answer your questions as well. Make sure you go to Craig peterson.com. You can right there. Sign up for my newsletter. You can send me a question if you'd like to right there, or you can just email me M E@craigpeterson.com. I'd be more than glad to answer them. It is a wonderful thing to be able to help you guys out. I appreciate you so much for spending these two hours here with me on your Saturday. Podcasts are something that Apple really kicked into gear. I've been for more than 20 years doing what today we would call podcasts, and that is making available audio from our radio show. Audio from interviews. All kinds of audio for people to listen to.  Many other people do. It has become a huge thing. Now there are millions of podcasts out there covering every topic you can think of talking about long tail, just microscopic and lead nailed down different topics. Apple had the iPod. You might even remember that. And I still use an iPod to this very day. I still have my iPod classic and I that's the one I use. So it is how old now? 12, 13, 14 years old. I don't know, pretty old. And I've had to replace pieces in it. But I really liked that user interface. It's pretty easy to use. I have over the years, I've put a lot of different music on there and I've also put podcast. It is an iPod with video, which means that it can play certain videos.  It has been a wonderful little device. Because of the iPod and the popularity of people listening to the audio, like my show, Apple was able to really dominate that market. They became known as podcasts because of the Apple iPod. People could carry them around with them. Nowadays we stream, for instance, you can listen to WGAN on tune-in, which is available as an app. It's a website. You can listen any time anywhere. It just couldn't get much easier for any of us. It's fantastic. You can certainly download them into the app. You can download them into the Apple podcast app that's there on your iPhone. On Android with Google play. In fact, you'll find my podcast on all of those platforms, but what is really different about all of this is that now Apple is no longer the leader. It looks like Spotify is about to take over the leadership position in the podcast if they haven't already.  I've made sure my podcast was on Spotify. I hadn't had it on there. They had changed the rules. I don't know some time ago might've been last week. I really don't know. But they changed the rule since the last time I looked. It was easy enough to get mine on there. I think they wanted me to pay before. Now I have a podcast that's in the top 10% of all podcasts worldwide, which I think is pretty darn cool, frankly.  We're having thousands of people listen every week and that just does my heart good. I stopped doing the podcast for a while and it really hurt me, while it was like a year and a half- two years and I wasn't releasing content. I really lost traction because I had 20 million-plus downloads of the podcast, which I can still say, because that's true, but I've only had about a quarter-million downloads in the last little while still top 10% of all podcasts worldwide. What Apple is trying to do now, is try and help people understand a little better and get rid of fear by changing one word in podcast land. If you go to Apple for instance, if you go to Craigpeterson.com/apple. That's what it is you'll see. It'll take you automatically to the Apple podcast page. Once you're on the Apple podcast page, you'll see that you can listen right there on the page. It might open your podcast app or on your Mac. It might automatically open your music player, they keep changing the names of some of these things and let you subscribe. If you do, I would really appreciate it. The word is "subscribe." That word has been a problem apparently for Apple because most people when they think of subscribing they're thinking they have to pay for something. You see where they're coming from. So a lot of people didn't want to subscribe because they didn't want to pay. Podcasts are free. No one charges you for them. Now, there are some subscription models. Don't get me wrong, but in general, podcasts are free. What Apple has done now is they changed the word, subscribe to follow. Which they think most people will understand. Following someone doesn't cost you anything. That comes from all of the social media platforms that have really changed things up for them. This change to the Apple podcasts app is going to come with the release of iOS 14.5 and.  We'll see if it actually makes it in there. It was noticed by PodNews, which is a website that reports on the podcasting industry. They were showing, Hey, look at this beta version of iOS where they're changing it. So that's how we know it's coming. I think it makes sense. Edison research I've quoted them before they're a market analysis company. They found that 47% of people who don't listen to podcasts thought it cost money to subscribe to podcasts. That's true with most of these apps nowadays, you can get it for free, but they also have paid versions.  In Tune-In the paid version, lets you pause, live radio, and go back and listen to it later. I used to use that a lot back in the day. You also have different features on these different podcast listening apps. Most people are confused about it. 47% think it costs money to listen. So Edison research vice president or senior VP Tom Webster said the reason for this is because of the one word subscribe. That's a huge problem with nearly half the people surveyed. Won't listen to a podcast because they think they have to pay for it. Now, Spotify, which is edging up, if not surpassing Apple with the number of people who listen to podcasts has already switched. They're using the word follow to describe the feature that adds your favorite podcasts to your playlist. Spotify has also played around with this idea of paid podcast subscriptions, which could be separate from the idea of a paid podcast offering. It's a premium paid music and everything else. So it's I think it's going to be interesting. We'll see. Apple has switched pretty clear to help get rid of some of the confusion on its platform. Have a look for me, Craig Peterson in your favorite podcast app. Sometimes the easiest way to find me is just to go to Craig peterson.com/the name of your favorite podcast app. All right we've got one more segment here before we leave for the day. So don't go anywhere. We've got one company that wants to sell the U.S. Federal government location data from every car on earth. Did you even know that was possible? We're going to talk about what's going on. Hey everybody. Thanks for listening. This is, of course, Craig Peterson. Man, we have a problem coming our way and then get another one. This has to do with our cars. You might have heard, I heard that Massachusetts decided that they would start charging attacks based on how many miles you drove in the Commonwealth, and the reason behind all of this, supposedly, and it probably is, was that we have cars that don't burn any gas, electric cars, and they are using the same roads. They need the same law enforcement people. They need the same bridge repairs as everybody else, but they're not paying any gas tax. So how do we make them pay as they should? Mass it hasn't gotten very far with that yet. There's this port in your car called an ODB port or ODB2. This is a port that was mandated by the Federal Government I think in the late seventies when they started this whole mess up. That port gives them access to the onboard computer. That's there in your car? Hint. ODB, onboard computer. Important there in your car. There's so many three-letter abbreviations that sometimes I kind of mess them up. So Mass was saying, we can just hook up your car now we're hooking it up anyways when we're checking the emissions cause your car squeals on you. It's not like the days back in the eighties where they would stick a sensor up the tailpipe. To see what your emissions were like. They just ask the computer. What are the emissions like? What's the NOx? The CO2 emissions? How fast is he accelerating? That same port has been used to give trap traffic tickets but in different areas. Yeah. OBD port, I just looked it up just to make sure I had the right name for it. And it's been used to give tickets up in Canada and Montreal. There's a report that came in of somebody that was racing up and down one of the main streets in Montreal and the police got there and nobody was racing up and down. But a car by the description was there. So they pulled the car over, they hooked up the OBD reader to the port in the car. The car said, yeah, I have been going at this speed recently. The cops gave the guy ticket just based on that. Our cars had been squealing on us for a long time. Mass wants to use it to say, how many miles has the car driven?  Then there's questions about can you charge people mileage, not in your state? Obviously, they are already. If you live in New Hampshire and you happen to drive into Mass one time and you buy gas there, you are paying mass gas tax, which by the way, Charlie Baker apparently wants to double. There are some limits, but I don't know how far they go. There's a lawsuit right now in the Supreme court between New Hampshire and Mass, over Massachusetts charging income tax to New Hampshire residents that never even stepped set foot in the state of Mass. So it's really convoluted. We have over 9,000 different tax jurisdictions here in the United States, and that makes things really crazy. When you think about all these different government agencies that want to put their hands in the Till and want to do stuff. How does that tie into the cars? Our cars are getting smarter and smarter. This port that was put in decades ago was the first step. The car's squeal on ya and the tell information that should be private. Some of the cars now, these better, faster, smarter cars, like the Teslas keep track of everywhere you've gone. Where you're driving? How fast you're driving? The cameras are actually recording all of the activity, everything that they see. There's seven cameras on these cars and all of that stuff is stored and could be pulled out, certainly in a court of law. We're seeing in some jurisdictions that their police want to get their hands on it. There is something going on right now. There's a company out there called Ulysses. They are a surveillance contractor, and they're claiming that they can remotely geo-locate vehicles in nearly every country, except for North Korea and Cuba on a near real-time basis. That's from Vice motherboard. So Ulysses is obtaining vehicle telematics from data that's coming out of these embedded sensors and communication centers that are in our cars and in the roadways. Some of these cars are now sharing data. This is a technology that was pioneered by NASCAR and formula one so that the cars could avoid accidents with each other. So the cars could be much safer for the drivers. That makes sense. The cars all talk to each other on this mesh network. Now we have these companies that have these autonomous features self-driving cars if you will, that are doing much the same thing. They are looking to use mesh communications and some of them already are. By grabbing things from these connected cars, like the engine temperature, your acceleration, where you started your journey, where you're ending the journey, it is a real problem. There are more new cars now being added to cellular networks. The new cell phones. Here's an article from ARS Technica from a couple of years back, it says in particular, this Shanta Sharman Consulting noted that AT&T has been adding a million or more new cars to its network each quarter for the last 11 quarters. While they didn't break out the numbers for other service providers. It also revealed that Verizon is set to make at least $1 billion from the internet of things and telematics and previous research from Gartner suggested that in this year, a few years back, 98% of new cars will be equipped with embedded modems. It's probably close to a hundred percent by now, by the way. Our Teslas and pretty much any other self-driving car is guaranteed to be called home because they use that call home function in order to upload new software for the car in case there's some sort of a problem to upload driving data so that they can figure out why did the driver have to hit the brakes or grab the steering wheel to make it smarter? So our cars are recording all of that data is coming together. Ulysses claims it can currently access more than 15 billion vehicle locations around the world each month and estimate that by 2025, 100% of new cars will be connected and transmitting gigabytes of collectible data. Definitely a concern here. Definitely concern. Keep an eye out fo

Cybersecurity and Compliance with Craig Petronella - CMMC, NIST, DFARS, HIPAA, GDPR, ISO27001
Craig Petronella and Sanjeev Verma discuss Preveil - A highly secure, CMMC and ITAR compliant end to end encrypted email and file storage

Cybersecurity and Compliance with Craig Petronella - CMMC, NIST, DFARS, HIPAA, GDPR, ISO27001

Play Episode Listen Later Feb 25, 2021 57:09


Craig Petronella of Petronella Technology Group, Inc. and ComplianceArmor.com and Sanjeev Verma discuss a highly secure, CMMC and ITAR compliant, end to end encrypted email and file storage solution called Preveil that helps vastly accelerate compliance mandates with regulations such as CMMC, DFARS, NIST, ITAR, HIPAA, GDPR, and more. Be sure to contact Petronella for special discounted pricing on an exclusive compliance bundle that we've created and customized for our audience that combines the power of Preveil with Petronella's policies, procedures and security controls to greatly enhance the cybersecurity maturity level and SPRS score of your firm! Get your system security plan (SSP),   plan of actions and milestones (POAMs), required policies, procedures, DFARS/NIST SPRS self assessment score as high as possible in record time, with most of the mappings already done for you!

The Virtual CISO Podcast
CMMC Compliance: The Nuances You Should Know

The Virtual CISO Podcast

Play Episode Listen Later Jan 12, 2021 54:27 Transcription Available


The DFARS interim rule that went into effect on November 30th has a lot of nuances to it — and many out there have questions about how it applies to them. In this episode, I sit down with Corbin Evans, Principal Director, Strategic Programs at National Defense Industrial Association, to get answers to some of the most common questions about these CMMC nuances, including: - What do DIB orgs with a 7012 clause in their contracts need to do now? - What happens if you submit a low SPRS score? - What are the different types of CUI? Check out this resource we mentioned during the podcast: - https://www.dodcui.mil/ To hear this episode, and many more like it, you can subscribe to The Virtual CISO Podcast here. If you don't use Apple Podcasts, you can find all our episodes here.

FIGHT THE FUTURE: club classics. past. present. w/ Steve Callaghan
FIGHT THE FUTURE #037 | Ferry Corsten, Chris Lake, Nic Fanciulli, Dale Howard + More!

FIGHT THE FUTURE: club classics. past. present. w/ Steve Callaghan

Play Episode Listen Later May 25, 2020 60:07


00:00    - 1.  Klaas vs Finn - "I Love You" (Van She Tech Remix) [Ugly Truth] [2006]06:04    - 2.  Kris Menace - "Walking on the Moon" (Respect to U-Tern) [New State] [2006]09:18    - 3.  Weiss - "First Sight" [Island Records] [2020]13:23    - 4.  Manyfew + Voost - "Off my Mind" (Extended Mix) [SPRS] [2020]16:17    - 5.  Dale Howard - "Close to Me" (Extended Mix) [Armada Subjekt] [2020]20:20    - 6.  Heller & Farley Project - "Ultra Flava" (Original Flava) [Feel The Rhythm] [1995]25:22    - 7.  ATFC + The Cube Guys - "Samba For Maria" [Cubed Recordings] [2020]  28:54    - 8.  Nic Fanciulli - "Werk (Move Your Body)" [Rekids] [2020]31:58    - 9.  Chris Lake - "I Remember" [Black Book Recordings] [2020]35:55    - 10. Armand Van Helden + Herve + Solardo - "Power of Bass" [Ministry of Sound] [2020]40:31    - 11. Because of Art - "Elevate" [Nothing Else Matters] [2020]43:58    - 12. Farius - "Forever" [Enhanced Progressive] [2020]48:14    - 13. Ferry Corsten - "Tomorrow" [Flashover] [2020]52:30    - 14. 747 - "Aurora Centralis" (Tin Mans's Spaced Remix) [Aquaregia] [2020]56:45  - 15. Dance 2 Trance - "We Came in Peace" (91' Mix) [Suck Me Plasma] [1991] Follow Me:  linktr.ee/stevecallaghan

FIGHT THE FUTURE: club classics. past. present. w/ Steve Callaghan
FIGHT THE FUTURE #037 | Ferry Corsten, Chris Lake, Nic Fanciulli, Dale Howard + More!

FIGHT THE FUTURE: club classics. past. present. w/ Steve Callaghan

Play Episode Listen Later May 25, 2020 60:07


00:00    - 1.  Klaas vs Finn - "I Love You" (Van She Tech Remix) [Ugly Truth] [2006]06:04    - 2.  Kris Menace - "Walking on the Moon" (Respect to U-Tern) [New State] [2006]09:18    - 3.  Weiss - "First Sight" [Island Records] [2020]13:23    - 4.  Manyfew + Voost - "Off my Mind" (Extended Mix) [SPRS] [2020]16:17    - 5.  Dale Howard - "Close to Me" (Extended Mix) [Armada Subjekt] [2020]20:20    - 6.  Heller & Farley Project - "Ultra Flava" (Original Flava) [Feel The Rhythm] [1995]25:22    - 7.  ATFC + The Cube Guys - "Samba For Maria" [Cubed Recordings] [2020]  28:54    - 8.  Nic Fanciulli - "Werk (Move Your Body)" [Rekids] [2020]31:58    - 9.  Chris Lake - "I Remember" [Black Book Recordings] [2020]35:55    - 10. Armand Van Helden + Herve + Solardo - "Power of Bass" [Ministry of Sound] [2020]40:31    - 11. Because of Art - "Elevate" [Nothing Else Matters] [2020]43:58    - 12. Farius - "Forever" [Enhanced Progressive] [2020]48:14    - 13. Ferry Corsten - "Tomorrow" [Flashover] [2020]52:30    - 14. 747 - "Aurora Centralis" (Tin Mans's Spaced Remix) [Aquaregia] [2020]56:45  - 15. Dance 2 Trance - "We Came in Peace" (91' Mix) [Suck Me Plasma] [1991] Follow Me:  linktr.ee/stevecallaghan

Software Process and Measurement Cast
SPaMCAST 590 - Future of Testing, An Interview with Nancy Kastl

Software Process and Measurement Cast

Play Episode Listen Later Mar 15, 2020 38:06


The SPaMCAST 590 features my interview with Nancy Kastl. Nancy and I discussed testing and the future of the testing profession. The future of testing is not cut and dry; in the short run more automation and in the long-term more codeless testing and AI might replace entry-level testers. An eye-opening interview! Nancy’s Bio: Nancy Kastl is an accomplished professional with over thirty-five years of experience as a consultant, facilitator, and instructor in software quality and testing. As an entrepreneur and consultant, she brings her expertise in strategic planning, quality management, software testing, process re-engineering, and measurement to every engagement.  As the executive director of SPR’s Testing Services, she provides thought leadership to clients, formulates solutions to their needs, and provides daily guidance and oversight to SPRs on-shore testing team in Chicago. She is the founder and President of the Chicago Quality Assurance Association. Nancy is a frequent conference speaker and served as the QUEST conference chairperson for twelve years. She loves photography, being surrounded by nature, and traveling. Reach out to Nancy on LinkedIn at linkedin.com/in/nancy-kastl-416170  And check out SPR at https://spr.com/work/ Re-Read Saturday News  This week we continue our re-read of Crucial Conversations: Tools for Talking When Stakes Are High, Second Edition by Patterson, Grenny, McMillan, Switzler with Chapter 3, Start With Heart.  This chapter begins to teach the reader “how” to dialog. Start with heart means that we have to establish our goal before getting involved in a dialog.  Week 1 - Logistics, Forewards, and Preface - http://bit.ly/2wls1Mq  Week 2 - Chapter 1: What’s a crucial conversation? And who cares? - http://bit.ly/3a7Kivp  Week 3 – Chapter 2: The Power of Dialogue – http://bit.ly/3aO4cMa   Week 4 - Chapter 3: Start With Heart - http://bit.ly/2UbJizK  If you do not have a copy or have tossed it at someone during a crucial conversation, it is time to buy a copy. Please use the link https://amzn.to/34RuZ6V (using the link helps support the blog and podcast). Book Club Starting Soon Jon M Quigley and I are starting an online book club to read and discuss the classic books that underpin the lean, quality and agile movements.  The name of the book club is “Quality, Agile, and Lean Classic Books: Greatness in the Workplace”. The first book is Out Of The Crisis by Deming (don’t have a copy — https://amzn.to/32XAH81)  We are starting our dialog on Friday, April 10th and the event will run over 7 sessions (we will avoid as many religious and national holidays as possible). We are only opening 10 seats for each group of sessions. We are changing a one time fee of $3.13 which equates to 4.95 (ish) once Eventbrite factors in their fees to encourage people that sign up to show up. More information and sign up at http://bit.ly/2IsPPkf  Next SPaMCAST The SPaMCAST 591 will feature my interview with Shelisa Bainbridge.  Shelisa is the Head of Human Centered Delivery (HCD) at Agile by Design. We talked about human-centered design, why design thinking is important, women in tech and agile, and more. This is a powerful interview with a ton of useful ideas. Also, I may have some special content in the feed over the next few weeks. A little lagniappe because we all deserve it right now. 

Wat Ik Wou Dat Ik Wist
Jubileumaflevering: Wat Zij Wouden Dat Ze Wisten

Wat Ik Wou Dat Ik Wist

Play Episode Listen Later Aug 18, 2019 45:23


Het is vandaag 18 augustus en dat betekent dat ik mijn eerste podcastaflevering precies een jaar geleden uploadde! We zijn nu 46 afleveringen verder en ik ben zo blij dat ik dit gestart ben! Ter ere van de 'verjaardag' van mijn podcast heb ik een speciale aflevering. Ik heb namelijk zowel mijn luisteraars als mijn eigen vrienden en familie gevraagd of ze me wilden vertellen wat zij wel eerder hadden willen weten. Al hun spraakberichten vol inzichten en life hacks heb ik in één aflevering gegoten. Veel luisterplezier!Enne, vergeet niet met de Sprs.me-winactie mee te doen op mijn Instagram-account: www.instagram.com/watikwoudatikwistpodcast

Draw The Line Radio Show
#020 Draw The Line Radio Show 23-10-2018 guest 2nd hour Miss Lois, feat 1st hr Jacki-e & Eric Louis

Draw The Line Radio Show

Play Episode Listen Later Oct 24, 2018 120:06


This is Draw The Line Radio Show presented by jacki-e, featuring my mix in the first hour composed entirely of music made by women and then, for the second hour, I hand the decks over to a female DJ. My guest this week is Miss Lois who comes from the Netherlands who has appeared at events in the Netherlands, Ibiza, Belgium and Germany. Links for Miss Lois:- https://soundcloud.com/misslois https://www.misslois.com/ https://www.facebook.com/DJMissLois https://www.instagram.com/DJMissLois/ In my mix in the first hour I'm playing all three tracks from my single 'Marionette' on which I collaborated with American DJ and Producer Eric Louis which is released by Get Physical Music on 26th Oct 2018. https://www.beatport.com/release/marionette/2416097 If you like the tracks played in the show, please support the artists by buying their music. It's time to say NO to gender imbalance in dance music. it's time to Draw the Line!! Tracklist 1st hour Jacki-e in the mix:- 1. Jacki-e & Eric Louis - Marionette (Jazzuelle's Spaced Out Dream remix) Get Physical Music promo to be released 26th Oct 2018. Pre-order link https://www.beatport.com/release/marionette/2416097 2. Just Her - War on Myself ft Meri Everitt (original mix) Suara. 3. Schallfeld - Epidot (Ann Clue remix) Complex Textures. 4. Jacki-e & Eric Louis - Marionette (Jazzuelle's 6am Discoremix) Get Physical Music promo to be released 26th Oct 2018. 5. Jacki-e & Eric Louis - Marionette (original mix) Get Physical Music promo to be released 26th Oct 2018. 6. Beth Lydi - Soaked (original mix) Snoe. 7. Elena Pavla - Do Not Sleep (original mix) Low Groove Records. 8. Ann Clue - Dreamcatcher (original mix) Various Files Records. 9. Boris Brejcha - Everybody Wants to go to Heaven (Ann Clue remix) Fckng Serious. 10. Elena Pavla - Night People (original mix) Totum Music. 11. Stacy James - Gotta be Strong (original mix) DeepDownDirty. 12 Violent Blondes - Yueueechiga (original mix) Civil Disobedience Records. 13. Black Girl White Girl - Mind Warp (original mix) Relief. 14. Black Girl White Girl - Skinny Fries (original mix) Relief. 15. Klaudia Gawlas - The Whirl (original mix) Redimension. 16. Deena Abdelmahed - Tawa (original mix)InFine Music promo to be released 16th Nov 2018. 17. Steve Shaden - Dialer (Fernanda Martins remix) Loos Records. 18. Marika Rossa - Monday Morning (original mix) Oxytech Records. 19. Violent Blondes - Kontrau Fido (original mix) Civil Disobedience Records. 20. Klaudia Gawlas - Niet (original mix) Redimension. 2nd hour Miss Lois - An Exclusive Guest Mix for Draw The Line Radio Show 1. Denny Berland – El Chango (original mix) Sosumi Records. 2. Gabry Venus  - El Bandolero (original mix) PM Recordings. 3. Jude & Frank – Mi Libertad (original mix) Black Hole Recordings. 4. Gianluca Vacchi – Viento (original mix) SPRS. 5. Alex Guesta - Babarabatiri (original mix) Under Town Records. 6. David Tort – Strangers (original mix) AFTR:HRS. 7. Daddy’s Groove – Latido (original mix) Spinnin' Records. 8. Aguster López - Boom Boom (original mix) Only Music Mixes. 9. Rayven & Valexx – 2Nite (original mix) Sono Music. 10. Riki – Aguita De Coco (original mix) Soulfreak Records. 11. Miss Lois – Organgasm (original mix) Streamin Music. 12. Edson Pride – Show Me Drums (original mix) Matinee Music. 13. Antranig - Big Ass Drums (original mix) Dirty Bird. 14. Clean Bandit – Solo (Miss Lois Remix) Free Download https://soundcloud.com/misslois/clean-bandit-solo-miss-lois-deep-tribal-mix 15. Edson Prides – Fuego en la Discotheca (Johnny Bassl remix) 1Tribal Records. 16. House of Labs – Hard and Loud (original mix) House of Labs Records. 17. Apolo Oliver, Fernando Ruiz - C'mon (original mix) Mumix Records. 18. Diogo Ferrer - Let's Go (original mix) 1Tribal Records. 19. The KLF - What Time is Love (original mix) Arista. 20. Tom Siher - The Melody (original mix) Guareber Recordings Draw The Line Radio Show is A Darker Wave production.

FIGHT THE FUTURE: club classics. past. present. w/ Steve Callaghan
FIGHT THE FUTURE #010 | Steve Angello, Chemical Brothers, Richard Grey, Kidnap + more!

FIGHT THE FUTURE: club classics. past. present. w/ Steve Callaghan

Play Episode Listen Later Mar 30, 2018 60:19


TRACKLIST FOR #010 00:22 - 1.  Steve Angello Feat. Sam Martin - "Nothing Scares Me Anymore" [Size] [2018] 03:58 - 2.  Madison Mars Feat. Caslin - "All They Wanna Be" (Extended Mix) [Enhanced] [2018]   06:59 - 3.  Livin' Joy - "Dreamer" (Radio Mix) [MCA] [1994]    10:04 - 4.  Nikita Warren - "I Need You" (Nush Club Mix) [VC Recordings] [1996] 15:33 - 5.  Richard Grey - "That Thing!" [Casa Rosa] [2018] 18:38 - 6.  Provenzano + Cube Guys - "Babele" [SPRS] [2018] 22:28 - 7.  !!! - "Happiness is a Warm Yes it is" [Warp] [2018] 25:48 - 8.  Detlef Feat. Dajae - "Deep Dip" [Relief] [2018] 29:15 - 9.  Jesse Perez vs DJ Mind-X - "Never Talk to Aliens" [Defected] [2018] 33:51 - 10. Brother Brown - "Under The Water" (Brother Brown Club Mix) [FFRR] [1999] 38:28 - 11. Kidnap - "Ashes" [Birds That Fly] [2018] 42:39 - 12. Dosem - "Why Give Up Before We Try" [Anjunadeep] [2018] 45:44 - 13. Throbbing Gristle - "Hot on the Heels of Love" (Ratcliffe Remix) [2004] [Novamute] 51:39 - 14. The Chemical Brothers - "Star Guitar" [Virgin] [2001] 56:45 - 15. A Man Called Adam - "The Easter Song" [Other] [1998] Follow Me: http://www.soundcloud.com/stevecallaghan http://www.mixcloud.com/stevecallaghan http://www.twitter.com/djstecallaghan http://www.facebook.com/stevecallaghanmusic

FIGHT THE FUTURE: club classics. past. present. w/ Steve Callaghan
FIGHT THE FUTURE #010 | Steve Angello, Chemical Brothers, Richard Grey, Kidnap + more!

FIGHT THE FUTURE: club classics. past. present. w/ Steve Callaghan

Play Episode Listen Later Mar 30, 2018 60:19


TRACKLIST FOR #010 00:22 - 1.  Steve Angello Feat. Sam Martin - "Nothing Scares Me Anymore" [Size] [2018] 03:58 - 2.  Madison Mars Feat. Caslin - "All They Wanna Be" (Extended Mix) [Enhanced] [2018]   06:59 - 3.  Livin' Joy - "Dreamer" (Radio Mix) [MCA] [1994]    10:04 - 4.  Nikita Warren - "I Need You" (Nush Club Mix) [VC Recordings] [1996] 15:33 - 5.  Richard Grey - "That Thing!" [Casa Rosa] [2018] 18:38 - 6.  Provenzano + Cube Guys - "Babele" [SPRS] [2018] 22:28 - 7.  !!! - "Happiness is a Warm Yes it is" [Warp] [2018] 25:48 - 8.  Detlef Feat. Dajae - "Deep Dip" [Relief] [2018] 29:15 - 9.  Jesse Perez vs DJ Mind-X - "Never Talk to Aliens" [Defected] [2018] 33:51 - 10. Brother Brown - "Under The Water" (Brother Brown Club Mix) [FFRR] [1999] 38:28 - 11. Kidnap - "Ashes" [Birds That Fly] [2018] 42:39 - 12. Dosem - "Why Give Up Before We Try" [Anjunadeep] [2018] 45:44 - 13. Throbbing Gristle - "Hot on the Heels of Love" (Ratcliffe Remix) [2004] [Novamute] 51:39 - 14. The Chemical Brothers - "Star Guitar" [Virgin] [2001] 56:45 - 15. A Man Called Adam - "The Easter Song" [Other] [1998] Follow Me: http://www.soundcloud.com/stevecallaghan http://www.mixcloud.com/stevecallaghan http://www.twitter.com/djstecallaghan http://www.facebook.com/stevecallaghanmusic

JOURNEYS
Xabi Only - Journeys #008

JOURNEYS

Play Episode Listen Later May 3, 2017 59:00


Follow me: Facebook: http://fb.me/xabionly Twitter: http://twitter.com/xabionly Youtube: http://youtube.com/xabionly Mixcloud: http://mixcloud.com/xabionly Instagram: http://instagram.com/xabionly Tracklist: 01. deadmau5 - Polaris [mau5trap] 02. Dannic & Promise Land - House It (For The Love Of) [release of the week] [Fonk] 03. ATTLAS - The Machinery Chewed [mau5trap] 04. Alan Fitzpatrick - Trance, Init [Drumcode] 05. Alan Fitzpatrick feat. mc r1bbz - Wait A Second [Drumcode] 06. deadmau5 x ATTLAS - Bad At Titles [mau5trap] 07. Crusy - Sa Forada [Bibliothèque] 08. Havoc & Lawn vs. SOVTH - Can’t Do That [Sosumi] 09. Alex Guesta - Bang To The Beat Of The Drum [Kryteria] 10. Kryder & Roland Clark - Unity (Sensation Chile Anthem 2017) [SPRS] 11. Tom Staar & Corey James - Bird Flu [Cartel] 12. WIll K & Sebjak - Kumasi [track of the week] [NoFace Records]

DJ JIM
DJ Jim – Electrospeed Radio Show 302 (17.03.2017)

DJ JIM

Play Episode Listen Later Mar 20, 2017 58:52


Выбирай лучший трек выпуска: https://vk.com/djjimrussiaDj Jim представляет еженедельное радио-шоу "ElectroSpeed"!В ночь с четверга на пятницу с 0 до 1 слушай на Dfm, а также на других fm станциях в разных регионах и странах.II DjJim.RU II iTunes II ВКонтакте II FaceBook II Twitter II Instagram II Mixcloud II SoundCloud IIПрограмма выходит с 2008 года.Если вы хотите получать записи эфиров для еженедельной ротации на вашей интернет или FM радиостанции, вам сюда: djjim.ru/radioshow 1. [Прокачали] Dutch Movement & Feestdjruud - Turn The Tide (Freestyle Mix) [Kontor] 2. [Прокачали] Ini Kamoze - Check Hotstepper (DJ Kuba & Neitan Edit) [Free] 3. Sagan & Gregori Hawk - Bounce [Showland] 4. Tom & Jame vs Holl & Rush - Move On Me [Hexagon] 5. Morgan Page feat. Lissie - Don't Give Up (Vigel Remix) [Armada Music] 6. [Прокачали] Lost Frequencies - What Is Love 2016 (KBN & NoOne Bootleg) [Free] 7. [Музыка больших танцполов] Breathe Carolina & IZII - Echo (Let Go) (Husman Remix) [Spinnin' Remixes] 8. [Прокачали] KatyBee - Take Me Away (Into the Night) (Cj Stone Remix) [C47 Digital] 9. [ES-27] Helsinki pres. Bass Camp - The Crown (DJ Jim Remix) [Free] 10. DeFreight - About You [Gold Compilations Label] 11. Antoine Delvig & Paul Vinx - Blondies [Revealed] 12. Sunstars - Honorado [Revealed] 13. Tony Junior x Dada Life - Make You Rage (DJ Kuba & Neitan BigKick Mashup) [Free] 14. Lucky Charmes & Awiin - Bass 187 [SPRS] 15. Taku-Hero & Funk Machine - Fun Lovin [Revealed] 16. Banghook - Pay Day [Big Fish] 17. [Прогресс недели] Above & Beyond - 1001 [Anjunabeats] 18. [Exclusive] Bassjackers & Brooks - Joyride [Spinnin'] 19. Madison Mars feat. Sanjana Ghosh - We Are The Night [Thrive] 20. [Russian Production] Red Square - First Sight [N/A] 21. Virtual Riot - Init [Disciple]

DJ JIM
DJ Jim – Electrospeed Radio Show 302 (17.03.2017)

DJ JIM

Play Episode Listen Later Mar 20, 2017 58:52


Выбирай лучший трек выпуска: https://vk.com/djjimrussiaDj Jim представляет еженедельное радио-шоу "ElectroSpeed"!В ночь с четверга на пятницу с 0 до 1 слушай на Dfm, а также на других fm станциях в разных регионах и странах.II DjJim.RU II iTunes II ВКонтакте II FaceBook II Twitter II Instagram II Mixcloud II SoundCloud IIПрограмма выходит с 2008 года.Если вы хотите получать записи эфиров для еженедельной ротации на вашей интернет или FM радиостанции, вам сюда: djjim.ru/radioshow 1. [Прокачали] Dutch Movement & Feestdjruud - Turn The Tide (Freestyle Mix) [Kontor] 2. [Прокачали] Ini Kamoze - Check Hotstepper (DJ Kuba & Neitan Edit) [Free] 3. Sagan & Gregori Hawk - Bounce [Showland] 4. Tom & Jame vs Holl & Rush - Move On Me [Hexagon] 5. Morgan Page feat. Lissie - Don't Give Up (Vigel Remix) [Armada Music] 6. [Прокачали] Lost Frequencies - What Is Love 2016 (KBN & NoOne Bootleg) [Free] 7. [Музыка больших танцполов] Breathe Carolina & IZII - Echo (Let Go) (Husman Remix) [Spinnin' Remixes] 8. [Прокачали] KatyBee - Take Me Away (Into the Night) (Cj Stone Remix) [C47 Digital] 9. [ES-27] Helsinki pres. Bass Camp - The Crown (DJ Jim Remix) [Free] 10. DeFreight - About You [Gold Compilations Label] 11. Antoine Delvig & Paul Vinx - Blondies [Revealed] 12. Sunstars - Honorado [Revealed] 13. Tony Junior x Dada Life - Make You Rage (DJ Kuba & Neitan BigKick Mashup) [Free] 14. Lucky Charmes & Awiin - Bass 187 [SPRS] 15. Taku-Hero & Funk Machine - Fun Lovin [Revealed] 16. Banghook - Pay Day [Big Fish] 17. [Прогресс недели] Above & Beyond - 1001 [Anjunabeats] 18. [Exclusive] Bassjackers & Brooks - Joyride [Spinnin'] 19. Madison Mars feat. Sanjana Ghosh - We Are The Night [Thrive] 20. [Russian Production] Red Square - First Sight [N/A] 21. Virtual Riot - Init [Disciple]

Max Gabriel presents : Legraib Radio
Max Gabriel presents:Legraib Radio (Legraib Radio 011)

Max Gabriel presents : Legraib Radio

Play Episode Listen Later Apr 7, 2016 51:18


Legraib Radio 011 1.ZHU - In The Morning 2.Simon Kidzoo - The Six 3.Cedric Gervais - De Ja Vu 4.Deepjack - Us 5.Watermat - Empire 6.Nopopstar - Do You Want More? 7.David Vrong - Jacky 8.DJ Disciple & Dru Hepkins ‎- When I Die

mind genius in charge daddy's groove dj disciple spinnin records can you feel mindshake akami sprs doorn records dear deer records zhu in the morning zerothree music
BOBINA
Nr. 368 Russia Goes Clubbing

BOBINA

Play Episode Listen Later Oct 31, 2015 60:07


1. Yahel & Eyal Barkan - Voyage (Eelke Kleijn remix) [SPRS]2. Tony Jonior & JETFIRE feat. Rivero - Police [DOORN]3. Showtek feat. VASSY - Satisfied (First State remix) [SKINK]4. Dash Berlin & DubVision feat. Jonny Rose - Yesterday Is Gone [ARMADA TRICE]5. Lauren Aquilina - Ocean (Arty remix) [ISLAND]6. Marcus Schossow - Aware [AXTONE]7. {CLUBBERS CHOICE} Armin van Buuren feat. Cimo Frankel - Strong Ones [ARMADA]8. Armin van Buuren & Cosmic Gate - Embargo [ARMIND]9. {EXCLUSIVE FROM RUSSIA} PROFF - Losing My Mind [ZEROTHREE]10. Andrew Bayer - Celestial [ANJUNABEATS]11. Airbase - Epoch [IN TRANCE WE TRUST]12. Matt Cerf & Feel feat. Jaren - Leave The Light On (Suncatcher remix) [ALWAYS ALIVE]13. {CLASSIQUE} Bobina feat. Elles De Graaf ‎- Lighthouse (Sean Tyas remix) [MAELSTROM] 

BOBINA
Nr. 368 Russia Goes Clubbing

BOBINA

Play Episode Listen Later Oct 31, 2015 60:07


1. Yahel & Eyal Barkan - Voyage (Eelke Kleijn remix) [SPRS]2. Tony Jonior & JETFIRE feat. Rivero - Police [DOORN]3. Showtek feat. VASSY - Satisfied (First State remix) [SKINK]4. Dash Berlin & DubVision feat. Jonny Rose - Yesterday Is Gone [ARMADA TRICE]5. Lauren Aquilina - Ocean (Arty remix) [ISLAND]6. Marcus Schossow - Aware [AXTONE]7. {CLUBBERS CHOICE} Armin van Buuren feat. Cimo Frankel - Strong Ones [ARMADA]8. Armin van Buuren & Cosmic Gate - Embargo [ARMIND]9. {EXCLUSIVE FROM RUSSIA} PROFF - Losing My Mind [ZEROTHREE]10. Andrew Bayer - Celestial [ANJUNABEATS]11. Airbase - Epoch [IN TRANCE WE TRUST]12. Matt Cerf & Feel feat. Jaren - Leave The Light On (Suncatcher remix) [ALWAYS ALIVE]13. {CLASSIQUE} Bobina feat. Elles De Graaf ‎- Lighthouse (Sean Tyas remix) [MAELSTROM] 

Make One - We Want Progressive
Make One — We Want Progressive (007)

Make One - We Want Progressive

Play Episode Listen Later Oct 3, 2014 60:00


We Want Progressive #007 With Make One Tracklist 01. Myon & Shane 54 & Kyler England - Summer of Love (Club Mix) 02. Estiva & The Spacies - Voices (Estiva Mix) 03. Knife Party - Begin Again (Original Mix) 04. Parker & Hanson - Gravity (Jason Ross Remix) 05. Boom Jinx & Meredith Call - The Dark (Kevin Wild & Judah Remix) 06. Maor Levi - Pick Up The Pieces (Original Mix) 07. Heatbeat - Buenosaurus (Original Mix) 08. Sandro Silva - P.L.U.R. (Original Mix) 09. Paul Oakenfold & Cassandra Fox - Touch Me (Beat Service Remix) 10. Solis & Sean Truby with Audrey Gallagher - Skin Deep (Original Mix) 11. Roman Messer ft. Christina Novelli - Frozen (Yuri Kane Remix) 12. Ben Gold Feat. Christina Novelli - All Or Nothing (Original mix) 13. Bilal el Aly & York - Access (VillaNaranjos Mix)

progressive tracklist original mix aly bilal captivating solis paul oakenfold estiva myon roman messer anjunabeats boom jinx sean truby armada music love club mix sprs suanda music armada trice enchanced kyler england summer heatbeat buenosaurus original mix armada music bundles knife party begin again original mix ride recordings hanson gravity jason ross remix planet love records
Arsenal Sweden Podcast
91. Arsenal Sweden - S04 Avsnitt 5

Arsenal Sweden Podcast

Play Episode Listen Later Sep 29, 2014 57:24


Snackisar i S04E05: Kan man vara nöjd efter 1-1 mot Sp*rs? Borde Alexis ha startat i den matchen? Hur går det egentligen för Lukas Podolski? Och vem ska spela mot Chelsea och Galatasaray nu när Ramsey, Arteta och Wilshere antagligen saknas? GÄSTER: Axel Asplund och Lars Lundstedt PROGRAMLEDARE: Hans Larson (hans.larson@arsenal.se) INTRO: Admir Sahman (@AdmirSahman) OUTRO: Danny Graft - Arsenal

Showtek presents: Skink Radio
Skink Radio 015 - Showtek

Showtek presents: Skink Radio

Play Episode Listen Later Jun 10, 2014 60:00


We're back with a brand new episode of our monthly podcast! Tracklist: 1. Peking Duk - High Feat Nicole Millar (Fuckin Matt Remix) [Vicious Bitch] 2. John Christian - Next Level (Nicky Romero Edit) [Protocol Recordings] 3. Hard Rock Sofa - Arms Around Me [Axtone] 4. Arno Cost & Norman Doray - Apocolypse (Kryder & Tom Staar Remix) [Spinnin’ Records] 5. Mark & Kremont – Amen [SIZE] 6. DadaLife - Born (Mercer Remix) [So Much Dada] 7. Sultan + Ned Shepard & John Dish - Renegade Master [Musical Freedom] 8. Karim Mika - Ohh Shit [Revealed Recordings] 9. Tujamo - Hey Mister [Mixmash Records] 10. Max Vangeli – Grim [SIZE] 11. Showtek & Justin Prime ft. Matthew Koma – Cannonball (Earthquake) [Kryder Remix] {SPRS} 12. Denis Koyu – Ruby [Axtone] 13. Showtek - We Like To Party (Twoloud remix) [SPRS] 14. Ftampa - 5 days [Doorn Records] 15. Alvaro – Shades [Musical Freedom] 16. Tiesto - Wasted (Ummet Ozcan remix) [Musical Freedom] 17. Deorro & J Trick - Rambo (Hardwell Edit) [Revealed Recordings] Connect with Skink: Join us on Facebook → bit.ly/SkinkFB Follow us on Twitter → bit.ly/SkinkTwitter Subscribe to our channel now! → bit.ly/SkinkYT Join Showtek's Skink Radio Spotify Playlist! → spoti.fi/1pwhNJM Connect with Showtek: Join Showtek on Facebook → facebook.com/showtek Follow Showtek on Twitter → twitter.com/showtek Follow Showtek on Instagram → instagram.com/showtek Subscribe to Showtek's channel now! → youtube.com/showtek Join Showtek's Skink Radio Spotify Playlist! → spoti.fi/1pwhNJM More info → showtek.nl Connect with 2-Dutch: Join 2-Dutch on Facebook → facebook.com/2dutch Follow 2-Dutch on Twitter → twitter.com/2DutchAgency Follow 2-Dutch on Instagram → instagram.com/2DutchAgency Follow 2-Dutch on Soundcloud → @2-Dutch Follow 2-Dutch on Spotify → open.spotify.com/user/2-dutch More info → 2-dutch.com

Modern Summer
Modern Summer 10 - 2 Hour Mix

Modern Summer

Play Episode Listen Later Jan 29, 2014


1. Galantis - Smile (Kaskade Edit) [Big Beat] 2. Sick Individuals & Axwell feat. Taylr Renee - I Am [Axtone] 3. Dyro feat. Radboud - You Gotta Know [Revealed] 4. David Guetta feat. Skylar Grey - Shot Me Down [Jack Back] 5. R3hab & Lucky Date - Rip It Up (Nicky Romero Edit) [Protocol] 6. DVBBS & Vinai - Raveology [Spinnin'] 7. Switchfoot - Who We Are (Michael Calfan Remix) [Atlantic] 8. Borgeous - Invincible [Spinnin'] 9. Martin Garrix - Animals (Victor Niglio & Martin Garrix Festival Trap Remix) [Spinnin'/SPRS] 10. Martin Garrix - Animals [Spinnin'] 11. DVBBS & Borgeous - Tsunami [Spinnin'/Doorn] 12. R3hab, Nervo & Ummet Ozcan - Revolution (Vocal Mix) [Spinnin'] 13. Syn Cole - Miami 82 (Avicii Edit) [PRMD] 14. Syn Cole feat. Madame Buttons - Miami 82 (Vocal Mix) [PRMD] 15. Lana Del Rey vs Cedric Gervais - Young and Beautiful [Spinnin'/Polydor] 16. Thomas Gold feat. Kaelyn Behr - Remember [Axtone] 17. Tritonal & Paris Blohm feat. Sterling Fox - Colors [Protocol] 18. Tom Staar feat. In Atlanta - Staars [Spinnin'] 19. Ferry Corsten feat. Jenny Wahlstrom - Many Ways [Flashover/Robbins] 20. Armin van Buuren feat. Cindy Alma - Beautiful Life (Protoculture Remix) [Armada] 21. Armin van Buuren feat. Cindy Alma - Beautiful Life [Armada] 22. Deorro feat. Madeleine Jayne & Adrian Delgado - Unspoiled Perfection [Cr2] 23. Deorro - Dechorro [Dim Mak] 24. Audien - Elysium [Spinnin'] 25. Leon Bolier - Disco Davai [Spinnin'] 26. Benny Benassi feat. John Legend - Dance the Pain Away (Benny Benassi Basic Extended) [Ultra] 27. Armin van Burren - Save My Night [Armada] 28. Nicky Romero & Krewella - Legacy [Protocol] 29. Bad Boy Bill & DJ Bam Bam feat. Miss Palmer - Looking for Something [PRMD] 30. Dimitri Vegas & Like Mike, DVBBS & Borgeous - Stampede [Spinnin'] 31. Dimitri Vegas, Moguai & Like Mike - Mammoth [Spinnin'] 32. Dimitri Vegas, Moguai & Like Mike - Mammoth (Heroes X Villans & Carnage Remix) [Spinnin'] 33. Avicii feat. Salem Al Fakir - You Make Me (Extended Mix) [PRMD] 34. Don Diablo & Matt Nash feat. Noonie Bao - Starlight (Could You Be Mine) [Axtone] 35. Dyro - Black Smoke [Revealed] 36. Hardwell feat. Matthew Koma - Dare You (Extended Mix) [Revealed] 37. Justin Prime & Sidney Samson - Thunderbolt [Spinnin'] 38. Mako - Beam (Dannic Mix) [Revealed] 39. Dillon Francis feat. Totally Enormous Extinct Dinosaurs - Without You (The Rebirth) [Mad Decent] 40. Martin Garrix & Jay Hardaway - Wizard [Spinnin'] 41. The Chainsmokers - #Selfie [Dim Mak] 42. Chris Malinchak - If U Got It [Sony UK] 43. Quintino & Moti - Dynamite (Yellow Claw Remix) [Spinnin/SPRS] 44. Alvaro & Mercer feat. Lil Jon - Welcome to the Jungle [Revealed] 45. Hardwell feat. Colin McLoughlin - Call Me a Spaceman (Unplugged) [Revealed]