Let’s Chat Cyber Security

0:20 Hey everybody, welcome to Chuck Yates needs a job, the podcast. Just checking my hair. It's not a good hair day. So anyway, but happy to have you guys on. Pat Shannon, T. Sean Shannon. T.

0:35 Sean making his third appearance. I was once myself and once

0:52 I was a character, Dr. Love. You were Dr. Love. Yeah, exactly. And that girl was really funny too Oh yeah, I forgot her name. Yeah. No, it was very cool to come on. So this is kind of

0:57 crazy. So you've been on as an Emmy award-winning comedy writer. You've been on Dr. Love, and now you're coming on as a cybersecurity expert?

1:09 Yes, I guess, if now, but it's not a character. But yes, okay, fair enough. We're not a character So, Pat, I'm gonna hope. that you're the brains of this operation. Ooh, me too. Yes,

1:22 exactly. No, so Pat, tell me real quick, so T-Shawn's background, it's been on the podcast before, written comedy, did stand up comedy, we've talked about how meeting through Brother Charlie

1:37 and all that. Pat, what's your background? My background's IT. So

1:43 in college, I was working in a data center and followed that, worked 10 years for CompuServe right out of school and was already in

1:54 the thick of it from data communications, internet before the internet and always had a security element to my job. And I've been in data, IT,

2:06 cybersecurity, pretty much my whole career.

2:11 And we did a program 10 years ago That was an industry leader, a Gartner magic quadrant leader. Uh, but I, we did that for my then employer and we didn't have a chance to evolve the program and it

2:24 was something I always wanted to get back to, and, um, we had an opportunity to do it and we came up with the cyber tips program. Okay. And just so you all started a company to do this. You did.

2:36 Okay. So what, cool. What's cyber tips? So cyber tips are bite size, if you will, uh, 60 second videos that are designed to, you know, engage the end user, make them fun, interesting, you

2:50 know, quick, don't try to do too much, get in, get out and, uh, put a smile on their face and keep cyber on, on their mind. And it's really for the, the 99 of the, you know, population that

3:03 aren't cybersecurity experts that are

3:06 typically blamed for 84 of all cyber preaches. And so that's what we do is really engage those end users, typically end users are trained and then fished by their company the rest of the year. And

3:20 doesn't really seem fair. So this is a way to keep them engaged and interested in cybersecurity. I compare it to schoolhouse rock for grownups. Yeah. And you talk about schoolhouse rock. What do

3:32 you remember about schoolhouse rock? And junction, junction, what's your function And everybody knows the bill. Look at the birds Yeah, yeah, yeah, yeah I'm just a bill at all

3:41 those Yeah, and those are memorable. And that's what ours are And we've actually had independent research studies prove our approach is 300 more effective for long-term learning gains than

3:55 traditional training programs. And people love 'em, and we get fan letters,

4:04 we get, I mean, we get groupies, if you will. So, 'cause they're fun, they're engaging, and they're, you know, the 60-second bites that people are used to in this era of social media. That's

4:18 because I had on a couple of lawyers, and one of the things they were talking about cyber was, and you said 84 earlier, they said vast majority. But same thing, it's still the easiest way in a

4:32 corporation is a human being clicking on an email, right? Yeah, through an employee. That's the quickest way. That's the quickest way you're going to get in trouble. Because we had the colonial

4:45 pipeline system literally shut down, literally gas lines in Florida and all that. And it was supposedly some guy that clicked on an email that said, You want to see big boobies? Yeah. Who does it?

4:59 Yeah. He said, Not at work. Not at work, of course. No, and that's one of the lessons we give. There's things you do on your work systems, things you don't, and it's just, you know, it's

5:12 acceptable use

5:15 of those programs, but that is kind of, It's just a constant awareness of these. And I liken it to buying insurance, okay? We buy insurance once a year because we have to. And what do we see

5:28 throughout that year as tons of, you know, comedy-based commercial campaigns, whether it's progressive or Geico or the Liberty Mutual, they all have their little catchphrases, but it's just to

5:41 keep you thinking, you know, that company, but insurance We're not, you know, pushing a product. We're just pushing cybersecurity for the masses and making it kind of mainstreaming it for the

5:54 general public. And the way you guys work, and then I want to get into the creative process and hear about the funny stuff, but if I'm a company, I basically pay you and get to run these videos.

6:07 Is that kind of the model? Yeah, so companies invest in these real elaborate, You know, training programs, we're not trying to replace those. They have phishing simulation tools, we don't do

6:17 that. We're more of a PR campaign for all those tools and programs they've invested in to keep reinforcing those messages and to promote their, you know, all their cyber, you know, dialogue

6:30 throughout the year and do it in a fun way that people actually wanna watch. So now the necessity of an Emmy award-winning comedy writer comes in. Yeah, that's where that comes in, buddy. Yeah.

6:44 So give me one of these bets.

6:49 Well, I mean, it's different things for different ways. Like one is a guy who does a top 10 list. Okay. And he goes to the top 10 appetizers andor cybersecurity tips. Number 10, the blooming

7:04 onion. Number nine, don't click on an embedded link that you weren't expecting. Okay, number, number, where are we? Eight. Potato skins, potatoes skins. And then, so I mean, that's an

7:21 example of, dude, people love top 10 lists. Magazines lived on them for years and still do everything on, hey, here's the top five sketches of all

7:33 time. Oh, I used to beg, I used to beg mom and dad to let me stay up just until the top 10 lists is over on the bottom. So, that's like one example of ways you can engage people into something to

7:46 listen for one minute and give them information that they need about cybersecurity. Yeah. And

7:54 we don't get into great detail of cybersecurity but we do hit the major points. Yeah. Like a big thing is cyber hygiene and that's what you have to, and that's just basically things you have to do

8:08 all the time, like brushing your teeth,

8:11 with your computer, you have to back up your data. That saves you from ransomware, you know? If people get in your system and they lock all your stuff, if you've backed up your data, you don't

8:23 have to pay the millions and millions of dollars most these companies you're doing, you know? You know what was crazy is we had a portfolio company at Kane Anderson that got hacked and everything

8:34 got frozen, right? Yeah. Guy calls up and says, I want4, 999 And the CEO goes, All right, why, why for none of it? Supposedly the FBI gets involved at5, 000. Yeah. And

8:50 so it was kind of one of these things. And Roger, our CEO, negotiated with the guy and said, All right, I'll give you the money for you to unlock the data. And he had to go get Bitcoin to send

9:01 him Bitcoin and all, but he said, You gotta tell me how you got in. And the hacker kind of true to his words said, sure I'll tell you, gets the money. And it turns out the hack that they got in

9:14 on, we found that in 14 other portfolio companies that it was out there. And so we were able to kind of patch it up. But this stuff's real, it's happening every day. It happens all the time and

9:29 it happens and we do videos that you can show to your parents. So your parents are getting swindled and it's stuff. The videos we make, you can apply to your real life as well as to your business

9:41 life. Yeah. Does that make sense? Like your work and then, but at home, yeah. You learn what dot to click on, you learn, you know, like there's this new company in USA Today did a big article

9:54 about it. And it's T-Moo, do you know T-E-M-U? So it's this, they did a commercial on the Super Bowl and they do this super cheap clothing, but it's a company in China

10:11 It's just, it's to mine your data. And they do all these things just, and it's all about getting information, selling crap for no money, really. And then it's, yeah, USA Today, we revealed it.

10:25 So I'm working on one for that right now to warn people about that. And so I mean, basically it's warnings. A lot of it is current events of how they're running the scams, what the new version of

10:38 the scam is 'Cause it seems like they've gotten a lot smarter. I mean, back - Yeah, well, I mean, that's the problem with AI. 'Cause AI is gonna make their phishing emails, it's gonna get rid

10:52 of the grammatical errors. I mean, one of the big things, the big plus, I think, for Americans is that a lot of these companies are doing it are in non-English speaking countries. So they're the,

11:06 you know, dear friend, Happy times to you, you know, stuff like that where you could sniff it out, but now it's not as easy with AI, 'cause AI can co-create this and make it more grammatically

11:20 correct. So, I mean, yes, they are always evolving what they do. Right. And that's, and also another thing I talk about is, or we show is about how like, you have to be aware of what you're

11:34 up against, you

11:36 know? Like, if I told you there's a mean seven-year-old outside, you're not gonna be scared, are you? And I tell you, it's a seven-year-old bear. Okay, now, suddenly, hey, wait a minute.

11:49 And that's what these hackers, it's not just one guy in a basement. Yeah. It's, there's literally countries that do it. There's organized criminals that like, when they break one of your

11:59 passwords, they have like a whole company, they have a whole section of their company searches for social media. then they have another one that searches for your banking and they have all these

12:10 individual departments that are going to attack you. If they get one password, they're going to check it on all your accounts. And that's one of the big reasons you don't want to have the same

12:20 password over and over again on different accounts. Because when they crack one, you know. Yeah. And that's part of what we preach. You know, one of the other recurring segments is rock and roll

12:32 pass phrases And you use rock lyrics to build your password. And we do different rock songs every quarter. So it's not watching the same video over and over again. And, you know, if we do it, we

12:46 feature, we feature Lizzo

12:50 Elvis when the Elvis movie came out. Pitbull, Jay-Z, and Alicia Keys. I mean, it's always something different and just keeps them engaged and keeps them thinking And because, and you wanted to

13:04 become second nature to them.

13:08 And that's not gonna happen with just annual training and fishing attacks. So that's the approach is make this a engaging, interesting venture for them. And so. 'Cause I mean, the other thing

13:24 that has to be different today and I think they're kind of interrelated is, I don't know the last time I got on a computer I do everything on my phone these days. So there's gotta be issues

13:39 surrounding being a phone. And I think that ties into remote working 'cause we all started doing that during the pandemic. Yeah, and that's when we released this program. And, you know, I don't

13:50 know of, you're familiar with his baseball card theaters, right? On his YouTube channel, T-Shone Shannon, those spaces. That's what inspired me to get him to do this and to do this together is

14:02 that he's got, I was cataloging them one day. And he had like 80 something to those videos. He's probably well over a hundred now, but it was just these

14:10 little bite-sized comedy bets that were one of his passions, baseball cards, and I'm thinking, boy, we can do the same thing with cyber tips. And that's kind of where this came, and he actually,

14:22 we just released a baseball card theater version of cyber tips. 'Cause the baseball card theater is one of the funniest things on the planet. Yeah. I still don't know, is it a hairdryer that you

14:34 do to blow a card out of the way. He's got a leaf blower now. The leaf blower.

14:39 Just like to do a fan. I used to do a fan, and now he's got a leaf blower, so we just use the leaf blower. Yeah, you definitely need to go see baseball card theater because the old baseball cards

14:49 are great to see that. And so that's where you came up with it. 'Cause something else that I'm worried about is it seems like the

14:58 internet's

15:03 now embedded in everything. it's in your TV, it's in your clock, that's your crockpot. Yeah, your crockpot, yeah, exactly. I have a crockpot that's connected to the Wi-Fi. Yeah, exactly. I

15:16 mean, I guess people are coming in through that potential. Yeah, they had a big shutdown. They did a denial of service using the internet of things, which are all these devices that are connected

15:27 to the internet to do, to shut down a network. This was a couple of three years ago, at least And so, yeah, those things aren't typically, you know, protect it, you don't, you know, install

15:40 your ring doorbell and think, oh, now I gotta go set the security settings. And that's one of the things we talk about. There was the high profile baby monitors that were getting hijacked and

15:50 creeps were talking to kids inside their cribs and stuff like that. So, yeah, all that stuff's vulnerable. We do a video on that on, hey, set up a guest network on your home Wi-Fi and set up all

16:03 those devices on that. and then separate that from your main computer 'cause you're working at home and segregate those to give you at least some buffer from the crepes and criminals out there. And

16:19 you talked about the Bitcoin on the ransomware attack your company had. I mean, with cryptocurrency, you're not gonna be able to enforce or punish these bad actors. And they're gonna continue to

16:37 be able to survive out there. And to your point, if you do it under a certain dollar amount,

16:46 the FBI or the authorities won't even get involved with it. So that's gonna be the ongoing challenge of these cyber attacks and the limited remedies you really have. Yeah, does the cloud make this

16:58 even more difficult or does it potentially make it safer?

17:04 but it depends how you protect yourself.

17:09 You still have to be vigilant in passwords and not leaving doors open to where they can sneak in through your TV. Yeah, I mean, everything's vulnerable to some extent. So the cloud can provide you

17:26 a lot of latitude for backing up your data. You talked about backing up your data, back it up in the cloud, back it up on a hard disk and or multiple medias and then keep one of those offsite. And

17:40 that's something I did in college. I was, every day I worked for a healthcare system here in Houston and daily we would take the backup tapes with all the information and we'd take them off premise

17:52 and put them in a safe. So if anybody did attack them or something happened to the data center or whatever, you had a backup of all your data. Individuals don't want to probably be that diligent in

18:05 doing it daily, but they want to do that because everything's digital now. People are putting other family photos on

18:15 digital media. Your whole life can be really accessed from a

18:23 digital standpoint. It's just good habits to get into good cyber hygiene like he talked about

18:31 That kind of remedies a lot of things that you would deal with. Does the multi-factor thing we have to do now go log on to YouTube or go on to Gmail? Is that helping? It's helping, but it's not

18:50 perfect and

18:53 whether you're doing your online gambling or your email or login most work systems require it nowadays.

19:02 You know, that was a high profile attack with one of the biggest technology companies in the world, just last year. And it was a, the multi factor, what was up, a, um, just a attack where they

19:15 just keep pepper in you to say yes. And just to keep the notifications going away, you finally just, okay, yes. And, and then next thing, you know, they have all your credentials and have

19:26 access to whatever you would have access to at work And so that those things happen, use it wherever you can. Uh, we did want to, we did want an online gambling, which some companies may or may

19:39 not choose to show. Cause I mean, we make it real clear, we're not promoting online gambling, but let's be honest, 85 billion to be in spent every year doing it. So someone's doing it. Uh, and

19:50 if you're going to do it, you know, don't use your work system to do it and do it safely and responsibly. And then we've put a little disclaimer, and if you have a problem, call 1-800-GAMPLE. We

20:02 want to make sure we're covering our I love that cop out major league baseball. They kicked out Pete Rose, but they've so sold out the gambling. But then it's like, Hey, here's the odds. Hey,

20:12 if this guy hits a home run and this guy hits two foul balls and this other guy makes an error, you can triple your money. But if you have a problem, call this number. Really? Okay. That cured

20:24 everything. If someone has a problem. Oh, I like, I like how they find teams for not disclosing injuries. Really? What does that have to do with anything? It's ridiculous. Was I not going to

20:36 watch the Astros game? Because I was not playing. Is that what it was? Yeah. And you know, people get burned with their multi factor. I didn't enough talk about funds, things like sports back

20:49 to this crap. But the one big thing with that is like, sometimes they'll get one password And so they'll call you. And if they find your home number, they'll call you and go, hey, this is the

21:03 bank. Someone's trying to access, we're gonna send you a code right now. And I'm gonna need you to read that code back to me. 'Cause we're here at the bank and I think, and we've had some trouble

21:15 and we wanna make sure you're safe. So can you read that code off your phone to a, like you could never do that. Right. Never, you know. And especially if they called you, don't ever, you know,

21:28 be very cautious, always look at a known number, but multi-factor authentication is just, it's a great tool, but it can be manipulated if you don't use it correctly. And that's some of the stuff,

21:42 the videos we talk about. Yeah. And I mean, that's how older people get tricked and to give it away a lot of their money. There's another one where they, if they, a big thing you gotta look out

21:57 for is when they're trying to get you to change. a routing number for payment. There was a guy who there was a realtor company that got hacked and they would send emails to the people selling their

22:10 house and they go, Hey, hey, just the heads up at Steve and it's coming actually from Steve's account because Steve's been hacked, because here's the new routing number we need you to send the

22:20 house payment to. And I mean, these people lost500, 000 because they sent it to them and even though it looked so it's always important, especially if payment changes that you got to call the

22:33 people go, Hey, is this for real? Even if it's coming from a known source? I mean, that's how tricky things are these days and how easily and we talk about that. And the graphics are so good

22:45 these days. No. That's another big difference. You were talking about bastardizing the English language, but the graphics, I mean, it's ATT on it. Yeah, no. Yeah, whatever. And yeah, it

22:57 pays to. invest in that for them. And that's what they do, you know? You got the deep fakes going on out there. You've got the voice cloning now where they can get enough of your voice samples

23:10 from your social media to - Your grandson is now calling up, needing money to get out of jail. Yeah, that happens to my parents all the time. How about their green kids? That's probably true

23:21 though. No, no, no, no,

23:25 no, but my parents with my children, with my children have a secret word, you know, just - What is it? Yeah, exactly.

23:37 But perfect. But now. Patty Hearst. Yeah, Patty Hearst, exactly. Exactly. No, it's -

23:45 I was a kid when that happened, by the way. I was gonna say the Lindbergh baby, but Patty Hearst, much hipper, and current. Much hipper

23:56 No, that's crazy. It's how you you know, you have to be appealing to this wide generation. We have Tim Meadows in our videos and he's somebody different. The ladies man. The ladies man. The

24:08 ladies man to you. I get my friends, I call in favor of you guys. But my freshman in college sees that and she goes, that's the principle for mean girls. Oh no, it's not. And that's who he is

24:19 to her and somebody else. And then my senior in college, he calls me up and he said, Hey, Chet Barkley's on the Mandalorian So in that's - Chet Meadows, that's his name. That's his character

24:32 name on our thing, he's Chet Barkley. Yeah. Oh, nice, nice. But no, so that gives him a point of reference and makes it more engaging. And just, I had a big fortune 500 electric utility,

24:49 electric and gas utility using the program. And the one girl that runs the program for that company, Her mom and her brother are both. what do you call the lineman and for the company? And she

25:03 always runs them by them to get their feedback. They go, No, these are great. She goes, Well, this is the same stuff we tell you all the time. And said, Yeah, but you got Tim Meadows telling

25:11 me that. And that makes a difference. It makes it interesting and memorable, so. Yeah, but I mean, that's the thing. It's short doses, it's stuff you have to know, and it's done in a humorous

25:27 way And, you know, you learn without learning, which is schoolhouse rock. Right.

25:35 So what are the top three things we need to be doing? Just cybersecurity stuff. Well, password is super important. The change early and all of a sudden. Well, but not so much anymore, but you

25:49 gotta have a super long and strong password. It's gotta be preferably now over 12. Wow.

26:09 There's a new program out where they show that they can crack like six, numerous, six digits of a password in like under 20 seconds. No way, really. Yeah, there's these programs it's insane. So

26:16 password, I think password's one of the biggest things to do. And you can't keep a list of your passwords on your computer, you should get a password manager I think that's important, 'cause it's

26:29 important to have different passwords for you. It's the very least, and you shouldn't,

26:34 you should have it for everyone. But if you have a social media, you can have that for, but don't let any of it blend over to your banking or your work, you know? And if you wanna have one for

26:46 you, that's fine. For like all your Instagram accounts or whatever, and Facebook and all that, if you wanna use it, you really shouldn't. But that way, if you get hacked only your social media,

27:00 which I think is more important to people. So maybe I'll share that right. And then at work, just have the same one. And then for your email. The bank counts. Yeah, the bank accounts, but I

27:09 think password is a big thing. You got to have numbers, you got to have letters, you have to have capitalization you, got to have symbols. And more than 12. That's interesting. Yeah, that's

27:20 what they're suggesting now. We had a client that was moving from an eight character minimum to a 15 character minimum requirement for that company. So yeah, the password guidance is kind of

27:33 evolving, but you have to understand what your company requires and not just rotate, you know, the same passwords between accounts, don't, you know, make minor changes to your previous one,

27:45 just enough changes where they'll accept the new one, you know, just come up with a new passphrase, you know, pick another rock song, get another, Get a Harry Styles song, or. or something

27:57 like that and just keep it fresh, keep it, but, you know, he mentioned cyber hygiene. I mean, that's what individuals can do. And, you know, in the four elements of cyber hygiene is password,

28:10 you know, strong password management, strong email management, backing up your data and upgrading, updating your systems. Every time there's a new update available, don't put that off. And you

28:21 do those things That's what I got to take the new Apple update. And it's a beast. And I don't like the new one that just came out with. But hey, you got you got to do it because that's where

28:32 they're patching vulnerabilities that existed in their code. And that's what you have to do to keep, you know, try to keep one step ahead of the hackers. Yeah. Yeah. But the other big thing is

28:44 segregating your usage. You mentioned you can do everything on your phone. We all have multiple devices that probably a work-issued computer or laptop. You got your smartphone, tablets, whatever.

28:55 Do your personal stuff on your personal devices and do your work stuff and segregate that. It's too easy not to do that. And then you're not gonna get hurt at work by something you might've done on

29:06 your personal social media. And a lot of companies will restrict that themselves, but smaller companies and small municipalities,

29:18 schools, different folks like that, they might not have all those limitations put in and restrictions put in So that's where you gotta educate and really teach those people to protect themselves and

29:29 their information. Everybody knows who you bank with. Everybody knows, I mean, anybody that wants to know, can find out who you bank with. Go to your social media, know who your friends are,

29:39 know how to be convincing and socially engineering you, but that is still the biggest concern of those social engineering attacks. So limit the information you put on there, set

29:53 your privacy restrictions My wife, she looked at. Anybody that shows up, doesn't show up for work, you know, for their shift, maybe on the night shift and sees them out drinking margaritas on

30:03 their social media page for lunch or during that afternoon, Well, now I know why they called in sick. But that's things you don't want your boss knowing. So, you know, don't, unless you're an

30:15 influencer, you have no real reason to not lock down your social media.

30:22 And plus the other thing, just from a personal point of view, you really want to tell your everybody that can see you on social media, that you're not at your house, and then you're in New York

30:33 City. No, exactly. Yeah, wait till you get home to tell everybody to brag about it. Yeah, no, that's right. TMI, right, everybody?

30:43 The one thing I did that a guy gave me advice on was create a unique

30:52 email address, email address that you know for banking and medical issues. So, you know, don't subscribe to anything. Don't go to only fans or whatever. No, you should have a throw down email.

31:06 Yeah. You know, I mean, for any time you're trying to win a freely sandwich at your hot belly or whatever. Yeah, or when you have to sign up if you're trying to read an article, oh, we need

31:17 your email. Yeah, I would suggest you get an email. I have a fake email I use It's, I mean, it's a real email, but it's not connected to my regular email. Yeah, yep, so that's important.

31:31 Totally segregate with school notices, things like that. Don't have those sent to your work email. Keep that for a separate one. And to your point, for obviously banking and healthcare,

31:46 absolutely. And since most people have Gmail, you can connect them so you can look at one than the other and you can keep separate. If I'm, if I'm CIO of a company or CEO or some, some C-suite

31:58 person at a company, what's,

32:05 what's a good piece of advice for those folks kind of outside of buying the schoolhouse rock videos? Well, and, and that's what, you know, that, this is kind of a, a niche, we've created.

32:18 Okay. I mean, our program really doesn't exist out there. And, you know, the C-suited are, are liable in, you know, public companies. Should they get hacked? They, they can be ultimately

32:28 liable. Hey, show them you're doing everything you can. I mean, this is a

32:35 complementary program, a complimentary with an E, but a complimentary program and just show them, yeah, we're going to great lengths to protect, you know, the company, protect our people and,

32:49 yeah, do everything, anything and everything you can. I mean, I have clients that get 13 minutes a year to do formal training with their employees, and that's it. And they've got to pick two or

33:01 three videos out of their

33:04 compliance training that fits into that window. This is something that is typically optional viewing, but it's so engaging and fun. They typically watch them. Yeah, do everything you can to keep

33:17 that message in going. And you know what? We have one client that does a government contracting and they bill out in segments. Our videos are so short that it doesn't cost them any billable

33:28 segments, 15 minutes. If you do a five-minute video and you can't bill out that 15-minute segment, so they actually calculate it over a half a million dollars in savings by adopting our program

33:41 over what they were doing prior. Oh, interesting This is a PR campaign for all their cyber initiatives, and that's what you've got to do is keep promoting that messaging. I'm just a bill, didn't

33:54 get you an A in government class, but hey, it gave you

33:59 the basis of what legislative process goes through. That's what we are, we're tips and reminders. And that's what you gotta kinda keep it, keep pounding it into 'em, but pounding it in in a fun,

34:12 friendly way. And we've also done like hired to make a specific program for companies too. So we do that as well Gotcha. On top of their, you know, whatever their own personal message was. So I

34:26 got three things. One, I wanna hear really stupid story that somebody did on cyber. Andor I wanna hear funniest story from your career of some sort. Andor I

34:38 wanna hear

34:49 what are we gonna be talking about we redo this podcast in like three or four years. like what happens in cybersecurity, future stuff that we're not talking about now, but is on the horizon. So I

35:01 gave you a grab bag. Oh man, that's a big grab bag. I don't know. You think of the funny stuff up. AI is what's gonna continue to just drive this whole market, okay? And to his point, it's

35:15 gonna make it everything, every hacker more capable on socially engineering the individual, and it's gonna continue to evolve the deeper. You're right, it's voice, we've got one of the voice AI

35:32 around here, and we're making really stupid songs, and it's like, make me sound like Steven Tyler, and boom, I'm Aerosmith. I saw one with Johnny Cash singing the Barbie song. Yeah. Yeah, I

35:43 mean, they're gonna be able to impersonate anybody doing anything that the actual videos are getting better. you know, there's still things with the eyes not matching, you know,

35:58 the voices and the mouse and everything like that. But that's only gonna get better. So FaceTime is coming. I mean, potentially. Yeah, and they're not, yeah. And you've seen as deep as painted

36:10 on hats and as baseball card theaters. Yeah. Yeah, I mean, those are gonna look great now. You won't be able to tell, like Photoshop How much Photoshop has improved from the old days when they

36:22 tried to do it, the glue they had on a real picture. Dude, that's what we're going for with AI. I mean, the Reef Face app is amazing. You know, when I got booted, a friend said, Hey, you

36:36 wanna try this new app, Reef Face? And so I sat around and, you know, put my face on Beyonce and stuff and, you know, just tick on down the list. It looked real Yeah,

36:50 yeah, no definitely be honest. I never looked so bad though Yeah, that's totally true. Well, I also think the, I'll say the older generation, 40 and older, are gonna be in trouble with 20, I

37:03 mean, 40 and under, has so much more technological advancements and education, that that's why so many old people are getting swindled out of money, and I say older old people, and people,

37:15 boomers.

37:18 I mean, young guys like us Yeah, exactly.

37:22 No, that's actually a really good point, 'cause to some degree, my parents are insulated from this 'cause they're not running around on their phones all the time at all. You and I are on our

37:33 phones all the time, and when that stuff gets good. Yeah. Yeah. They tend to panic more when actually attacked, or you want a funny story. One of my colleagues, he lives down in Galveston lives

37:49 on the beach and but has a lot of retired. friends, and the guy goes, one of his neighbors comes over and says, Hey, I just got an email, somebody saw me on my computer camera, watching porn,

38:03 and now they're blackmailing me. And he goes, That's a scam, and he goes, No, no, no, really, I was doing it. The guy's coughing. No, no, no, I do that all the time, he's like, Yeah,

38:14 but this is a scam, no panicNo, no, no, it wasn't a little weird to the stuff, all right, no, stop telling me. So you know Germany? Yeah, I know Germany, no, don't bring that up, I don't

38:27 want to know what's happening in Germany. Still the best porn joke of all time is Y'all's dear sweet brother Charlie talking about disabled porn. I had to call the hotel and say, 'I'm sorry, I

38:40 thought it was handicapped

38:44 people, I've been sex. ' Can you please turn my porn back on? I pushed the disabled porn and then it disables the porn to put my pants on and go back down to

38:55 the front desk. Dude, that's a good joke. Ron White actually stole that joke. That son of a gun. He did. He did because I saw, I saw Charlie do that joke 30 years ago, 35 years ago. It was a

39:08 good one. Yeah. You do enough good jokes. People steal them. Yeah. Sometimes it's kind of an honor to be stolen by Ron White. Yeah. You

39:18 know, Ron White's funny. I don't know. He know that. I don't be mean to Ron. I like Ron White. I think he's funny. I fell for the final tour and bought tickets to it. Now I'm going to go see

39:30 him in January. Oh, at the smart financial. Yeah. He he he said final tour. Well, I'm glad he's playing there because there's so many comedians playing there I've never heard of. I know that

39:43 that I'm just blown away by that. I have no idea. It's like, wow, this guy's played a six thousand seat theater. Dude, have you heard David Tell's album yet? The skanks for the memories? I

39:54 should have brought that CD. Oh yeah. I'm telling you. No, I need to get a listen to that. 'Cause last time we talked, I told y'all this. Last time we told you told me to go read, you listened

40:01 to it. 'Cause it is one of the best comedy albums ever. Yeah. But back to cyber security. Yeah. Chuck, here's the thing. Well, you know, the other scam that they have is where you get a text

40:14 message from the CEO. Hey, I need you to go buy me some gift cards 'cause we have to pay off this thing and I need gift cards. And it's people who've never gotten a text message from their CEO,

40:28 but you feel the pressure of authority telling you what to do. And I'm gonna give you the money back. Just, I need you to do it and I need you to send me the code so I can get 'em, you know, it's

40:38 important. I need it by five. And that, I mean, that's the other thing. It's always pressure. There's always a time constraint when they do these things to people And it's, yeah, people fall

40:48 for them 'cause they're,

40:50 put under, they're putting pressure situations from authority figures, whether it be the, the IRS. Look, we're going to garnish your wages. We're sending people to your house. If you don't send

41:01 us500 by today, it has to be by today and go buy a gift card. Anytime anyone tells you to go buy a gift card, you're getting scammed. Well, you know, in the workers at the, at the drug stores

41:14 are actually coached at a lot of times and trained to where if somebody comes in to buy a bunch of gift cards, they go, What's going on? Can I ask what's going on? And I've heard numerous stories

41:25 of people talking people out of those scams that were going to purchase them for that very reason. We had

41:33 a portfolio company where, let's say the guy's email was R. Jones at XYZ Corp Somehow they were able to send something that was Robert Jones XYZ at

41:47 Corp. So the email looked the same. And,

41:53 you know, the email was exactly what you said, the pressure of, hey, you gotta get this sent. I'm stuck in this meeting. The sky keeps bitching at me that we haven't sent this wire. He's

42:05 threatening to shut down the rig. Can you go send this? CFO doesn't give it a second thought. Wires300, 000 out the door. Like, I never sent that email, you know? So, and I mean, that's,

42:18 and they can, if not even change it, they can puppet it, you know? And make it look exactly like the email. I mean, that's the other big thing. Like, you can get calls on your phone and it'll

42:29 say, you know, mom or whatever. Yeah. They can mimic what you already have. And we did a video on the Shark Tank lady that got hacked and she did a cool thing and that they duped her out of like

42:43 almost400, 000 this European real estate deal and as soon as she found out she got duped, she went public with it and kind of self-reported to the world in this case, but it enabled law enforcement,

43:00 other people to get involved and minimize the damage if not, maybe not catch the guys, but claw back some of those funds and things like that. So that's the other thing we're always preaching is in

43:13 our videos is, hey, if you think you messed up, tell somebody and self report that so they can, you know, take, you know, appropriate actions to do that. So to remedy it or minimize damage.

43:27 Yeah. Yeah. Crazy. Crazy what they're done. All right. Close us with a funny story. Okay.

43:36 Can we tighten this up and I'll think of a funny story and then I'll tell it to you. Yeah. Give us a. Okay. You know what? Here's a good one Here's a good one. So the lighting guy at Saturday

43:46 Night Live. So I worked at Saturday Night Live for and the lighting guys, Phil Himes, and he lit the original Kennedy Nixon debate. That's how old this guy is. So he lit that, they say, he

43:59 worked at NBC so long he used to light radio is what they say about this guy. So he's Phil Himes, and he's, dude, he is so funny, like,

44:12 so okay, so Phil Himes, so you would write sketches and there's 20 shows a year, and I probably average about a sketch or a sketch and a half a season. I mean, for a per episode. Yeah. So, but

44:26 sometimes I'd get like three on, and then I'd go three weeks without a sketch or three shows, and then the four-shot, I'd get one. And so when you get a sketch on, you would go in the production

44:37 booth, and he's in there with the director and everybody else, and if it'd been a while since you hadn't had a sketch on, you would walk in and you're just hoping to kind of sneak in and hopefully

44:46 nobody's noticed that you haven't been there in a couple weeks and you walk in and this guy every time you still work here I didn't what I haven't seen this guy in forever I didn't know I remember

44:57 last year you were here but wow okay so he's that guy just a ball buster dude so funny and so smart like he would sit there and while they're directed if the director was killing you with shots or

45:11 whatever he'd lean over she's killing you with that shot kid you gotta get the two there you don't know who he's talking to so he's super smart so he comes out and Garth Brooks is the host and the

45:24 musical guest is Chris Gaines, Garth Garth

45:31 Brooks's alter ego or whatever from Australia or something yeah that guy's a weird little soul patch yeah

45:37 the jazz dot whatever you want to call it. So he comes out and they're doing the monologue and we're coming and so the lighting guy's out there and first of all busted his balls to begin with. Are

45:47 you wearing the cowboy hat during the monologue? Well yeah yeah I mean that's my thing. You're killing me with lighting but okay fine. Now what are you wearing for music and it Garthburg's ghost?

46:01 Well Chris hasn't decided what Chris is going to wear yet and this old guy just goes and walked away and dude even Garth Brooks broke out laughing man it was so funny but it was so funny because he

46:17 talks about himself in third person and that's actually kind of a good thing if you're a performer and it you know it's branding it's it was branding before branding when you talked about yourself in

46:27 third person because when I would pitch him ideas. It would be like, uh,

46:34 Yeah, man, I think that's funny. I don't think Garth can do that though. It's very strange, but it's like, I understand it, but I mean, that was kind of a funny one. A Phil Himes story, a

46:45 story no one knows. I like that, I like it. Chuck likes it. Chuck likes it. Chuck likes it. Chuck likes it. I

46:52 don't know if I'm more mortified or if I feel better about cybersecurity. Well, you can't live in fear. Well, that's the other big thing our program does. It's not fear-based It's, you know,

47:03 the more you know, the better, you know. And it's not condescending. And it's not condescending. He writes it like you're talking to a smart friend. I mean, that's what you're always talking to

47:15 your smart friend going, Hey, you gotta look out for this. And that's how it's treated. I mean, you can't live in fear, but a lot of it is fear-based, there's this one where, well, what can I

47:27 do now? You can file for bankruptcy. It was a sweet lord that's not helping people and now you're scared to where you can't even make decisions. Yeah. You know and that's so yeah no you can't live

47:42 in fear. I mean yeah there's bad people out there you know there's turds everywhere. Yeah and they'll try to scam you and uh you know. Yeah you got to keep promoting good behavior. I mean and and

47:55 you got to keep it fresh keep it interesting. Keep it fun. Don't try to do too much. We have 150 episodes now and we keep adding new content. We just did a big release on all the AI related

48:07 content and related issues were topical. We talk about Taylor Swift and or AI passing the SAT doing 40 points better than the previous iteration and doing bits around that and making it interesting

48:26 and fun. Check it out. It's gtevercom.

48:33 or wwwgtevercom and get a taste. Your people will love it. Go. Thanks you guys for coming on. My pleasure, sir. Thanks for having me. I enjoyed it.

Let’s Chat Cyber Security
Broadcast by