Cyber Intelligence for Your Small-Medium High Tech Business

Resources mentioned in the session:

  1. Your custom Cyber Intelligence Report
  2. Last Pass password manager

Phishing scams targeting customers… Hackers stealing login credentials… Bitcoin ransom schemes… If you think these dark web nightmares only happen to huge corporations, think again.

The bad news is dark web nightmares like these can happen to any size business (not just huge corporations). 

I just heard about a $1M company that had to pay a $38K ransom to get their customer data base and other crucial data back! No kidding!!

Bad actors on the internet target even very small companies, seeking personal information about employees, phishing for customers’ logins, passwords, and credit card numbers, and aiming to fraud anyone they can get access to. Eeek!

Fallon and I had this happen to us, actually! Happy to share, if you want to hear about it.

The good news is that you can find out how to prevent cyber security breaches that affect small and medium-sized businesses on this free, 20-min, live session. Join us. Don’t miss this sesh!

The 20-ish minute session is hosted by me, Cindy Zuelsdorf, 🙂 with guest John Bellamy, CEO of DarkXposed, an Australian cyber risk intelligence monitoring solution that helps companies protect their brands, customers, and cashflow. 

When you check out the replay, you’ll:

  • Find out why it’s important for small-medium businesses to monitor cyber threats
  • Discover how hackers gain access to a team member’s credentials, putting the entire business at risk
  • Know the difference between cyber security and cyber intelligence (and why it matters)
  • Get an overview of the cyber intelligence solutions options available to non-enterprise level businesses
  • Understand the impact on brand and reputation a cyber attack can have for a business of any size

Resources mentioned in the session:

  1. Your custom Cyber Intelligence Report
  2. Last Pass password manager

Transcript (auto generated)

3
00:00:05.220 –> 00:00:19.129
Cindy Zuelsdorf (Kokoro Marketing): alright welcome. I am so glad you are here for cyber intelligence, for your small and medium high tech business. I’m here with my buddy. John. Hey, John, how are you doing?

4
00:00:19.430 –> 00:00:21.140
John Bellamy (DarkXposed – Cyber Intelligence): I am fantastic.

5
00:00:21.350 –> 00:00:40.289
Cindy Zuelsdorf (Kokoro Marketing): Hey! Good morning. Good morning to you. So if you’ve ever worried about your company and fishing scams like hackers stealing your staff or your customer logins. Bitcoin rent, ransom type things and wondered if there’s anything you can do about it, or wondered. Hey! My company’s too small. I don’t need to worry about it.

6
00:00:40.660 –> 00:00:46.280
Cindy Zuelsdorf (Kokoro Marketing): This is definitely the right place for you, and I used to think all those types of worries were really for just big companies. But John shed some light… So today, in the next 20 ish minutes we’re gonna look at some common things, common pitfalls, things you can do to avoid it. But first over to one of the LIVE! On crew for a platform. 30 sec platform tour…

8
00:01:05.630 –> 00:01:06.830
Ashley Haley (LIVE!): Alright.

9
00:01:08.120 –> 00:01:21.299
Ashley Haley (LIVE!): So right now we are all here in the main stage, and you can get here a few different ways. You can either click on this button in this main area, or you can use the left hand of your screen where we

10
00:01:21.310 –> 00:01:24.939
Ashley Haley (LIVE!): sort of have a table of contents and click on it here.

11
00:01:25.040 –> 00:01:44.600
Ashley Haley (LIVE!): When you wanna move rooms. It’s the same thing you don’t need to exit out of the room you’re currently in. You can just click on the room you wanna join and you’ll get a message that looks like this. If you didn’t wanna do that. Just click cancel. If you wanna make the change. If you click open Zoom Meetings you’ll immediately leave the room you’re currently in and jump into the new room.

12
00:01:44.800 –> 00:01:55.970
Ashley Haley (LIVE!): If you want to get back to that main map view, you just go here onto your left hand side, click, map view and you will get back to this main area where you have your full selection.

13
00:01:55.980 –> 00:02:07.979
Ashley Haley (LIVE!): So later on, I think we’ll be splitting up into Speaker rooms so you can either join Cindy or John’s room down here, and we have a few other networking rooms you can go to if you wanna have your own separate chats.

14
00:02:08.650 –> 00:02:10.389
Ashley Haley (LIVE!): Alright any questions

15
00:02:12.120 –> 00:02:15.850
Cindy Zuelsdorf (Kokoro Marketing): that’s perfect. Thank you so much, Ashley. Appreciate it.

16
00:02:16.900 –> 00:02:26.290
Cindy Zuelsdorf (Kokoro Marketing): Alright. Well, John, let’s get right into it. You are totally pro on cyber intelligence. I watched a talk that you gave, and you talked about a small company that had a scammer get into their accounting system and sit there for a year observing. And then what happened after that was totally unbelievable. Is this typical stuff? And what’s the dark web doing out there? And just tell us that story.

18
00:02:42.610 –> 00:03:10.470
John Bellamy (DarkXposed – Cyber Intelligence): Yeah, it’s it’s it’s always funny, right? Because you hit the nail on the head. So many small businesses think “I’m too small. They only they’re only after the big corporates that won’t worry about me.” And then, all of a sudden, you have like this incident. Yeah, they, they infiltrated their systems. They set there for many, many months, did nothing just set up multiple backdoor entries, understood, you know, the inner workings of our in their crms that are in their finance systems, and all of that.

19
00:03:10.470 –> 00:03:35.599
John Bellamy (DarkXposed – Cyber Intelligence): And in this case they sent out close to, I think it was around about 400 plus in invoices, and about just shy of 50 grand. So you know, it was a little over 10% of the invoices got paid. This example was a tree lopping company like an arborist. So so these guys here, the only

20
00:03:35.600 –> 00:03:43.740
John Bellamy (DarkXposed – Cyber Intelligence): reason they found out about it was because their clients rang them up. Going, hey? I paid that invoice like 3 weeks ago. When are you coming out to cut down these trees?

21
00:03:43.740 –> 00:04:07.389
John Bellamy (DarkXposed – Cyber Intelligence): From from that. So that was crazy. Another similar example was a law firm where exactly the same process and she was a family lawyer. So did a lot with divorces. So obviously, there’s heightened tension in those types of situations, anyway. And all they did was change the the trust account details of where the money was being paid.

22
00:04:07.390 –> 00:04:25.389
John Bellamy (DarkXposed – Cyber Intelligence): So you know, husband or wife was putting balances in for divorce settlements, and legal fees into a trust account. And yeah, it was the hackers trust account. So they caught it with about 30 grand and one of my personal favorites.

23
00:04:25.590 –> 00:04:47.630
John Bellamy (DarkXposed – Cyber Intelligence): was a not not. No, I wouldn’t say an old lady or anything like that, but you know she was. She just wasn’t used to doing things, and she she was in the Us. And they the Irs reached out to it by phone, right, and they literally had her. That scared that she walked into a bank

24
00:04:47.760 –> 00:05:17.099
John Bellamy (DarkXposed – Cyber Intelligence): and did a transfer from one bank account to another bank account, which was the hackers bank account for about, you know, 2530 grand there as well whilst they were on the phone with a and the instructions were, make sure you put your phone in the pocket. Because we, you know, the banks will probably get a bit wary about it, and it’s and it’s these things like everyone goes like, how stupid was this person! But

25
00:05:17.330 –> 00:05:39.990
John Bellamy (DarkXposed – Cyber Intelligence): yes, that comes into it. But you, you know, you hear these things over time. If you that caught up emotionally and you just like Oh, no, you know, I’m gonna get this fine or whatever it might be. People just react differently. Whatsapp is a great one as well. We hear it all the time of a little, you know 100 to $500 transactions that happens through Whatsapp, the usual

26
00:05:39.990 –> 00:06:06.549
John Bellamy (DarkXposed – Cyber Intelligence): hey, mom? I left my wallet at home. You know, or I’ve had to cancel my credit cards. Can you transfer me a couple of 100 bucks? I’m at the supermarkets now. I’ve got to pay for blah blah blah and mom or dad does it instantly. So they they sort of like all of these, you know, we’ve we’ve all probably heard the stories right, you know, of of people that are doing this, but when it comes to, when it comes to small businesses, and or business in in particular.

27
00:06:06.560 –> 00:06:13.710
John Bellamy (DarkXposed – Cyber Intelligence): Really, it comes down to your data right? And and like, I know, I’ve worked

28
00:06:13.710 –> 00:06:36.739
John Bellamy (DarkXposed – Cyber Intelligence): bloody hard to build a business, you know, to build that database to create, that s, that correct, that asset, continue to put all that time, energy, and effort in long days, long hours, and all of these things. And and to think that one little cheeky bugger could come in and destroy at all is is not very appetizing from from that perspective. So so

29
00:06:36.980 –> 00:06:57.409
John Bellamy (DarkXposed – Cyber Intelligence): the biggest thing that I see for small businesses is, if you have a database once again, whether you’re using, keep another type of Crm, whether you’re just using it on 0 or quickbooks or an excel spreadsheet. Right? If you’re capturing client data, there is value there, right? You’ve put energy and effort into that.

30
00:06:57.410 –> 00:07:07.790
John Bellamy (DarkXposed – Cyber Intelligence): And so so yes, we are worried about our own business and being infiltrated within our own business and our data being leaked out there.

31
00:07:08.020 –> 00:07:34.480
John Bellamy (DarkXposed – Cyber Intelligence): but more, not more importantly, but on top of that it’s the brand reputation. And this can be the killer like this can be something that will literally shut your business down. Imagine for a moment like these couple of scenarios, someone’s infiltrated. They’ve got access to your data. And then all of a sudden, they’ve they’ve run a phishing campaign because they got access through your data, run that through to your client, base or supplier base.

32
00:07:34.480 –> 00:07:58.989
John Bellamy (DarkXposed – Cyber Intelligence): And then the next thing you know it’s all tied back to you. And you know your your business is gone like ransom. They they, the ransom never even has to be made right from a monetary perspective. It’s literally we’ve just now got access to your systems. And we’re just gonna start infiltrating or acting as you to send information out to your database.

33
00:07:59.130 –> 00:08:19.760
John Bellamy (DarkXposed – Cyber Intelligence): and just expose them. And it’s the gift that keeps on giving. It’s like the life cycle of of hacking. It just keeps going with that expose you. They drive through. They expose somebody else that clicks, that link exposes through so it’s always it’s always fun. But the biggest challenge with small businesses is, she will be right, mate, it will never happen to me.

34
00:08:20.450 –> 00:08:24.870
So we we hear it all the time, and it will. Yeah.

35
00:08:25.360 –> 00:08:44.709
Cindy Zuelsdorf (Kokoro Marketing): wait fallen. And I had something crazy happen where and we had it happen twice where somebody was messaging her. To say, Oh, hey, you know this is, it’s, you know, saying they’re me that I was. I can’t remember the exact details. I’m getting on a plane. I’m doing a webinar in an hour or 2. Could you put?

36
00:08:44.710 –> 00:09:07.380
Cindy Zuelsdorf (Kokoro Marketing): Go out and get a bunch of like 10 gift cards? Something like that? Send the info over to me. So I can give these with the webinar and sounds like this seems weird, which was correct, cause I’m not gonna ask her to spend money for the company. That’s crazy town, you know, maybe 10 bucks to buy a book or something, but not not something like that. And so she asked a clever question that was like a personal question that

37
00:09:07.380 –> 00:09:31.690
Cindy Zuelsdorf (Kokoro Marketing): you know, somebody’s not gonna know the answer to something she did last weekend something like that. And it happened a couple of times, and we had to stop and think about what we were doing at the company. And just, I’m like, what if what if that person would have reached out to someone else on the team. Would that person have realized it? And when you ran this report on Ccorl marketing? And you showed stuff that you found in the dark web which totally shocked me.

38
00:09:32.230 –> 00:09:45.980
John Bellamy (DarkXposed – Cyber Intelligence): Yeah, the the usernames and passwords are out there and and like in that type of scenario that happens like not many people talk about it, but happens so frequently, and people go ha! Like, how do they know that?

39
00:09:46.250 –> 00:10:00.279
John Bellamy (DarkXposed – Cyber Intelligence): Like I’m on a plane, or I’ve left the country, or I’ve done this. And it’s because they’re in systems, right? They’ve got access. And this is what I mean that they can sit there and don’t do anything, but they’ve got these little flags that pop up

40
00:10:00.430 –> 00:10:08.210
John Bellamy (DarkXposed – Cyber Intelligence): through that, and it might not necessarily be that they in your system, but they could be in a supply system. So, for example, it could be in

41
00:10:08.210 –> 00:10:33.209
John Bellamy (DarkXposed – Cyber Intelligence): you know, like a toll provider so if you’re if you’ve gone through driving through roads and your your tolls ticked off, or something like that, they might be in that toll provider, and then they might have some matching stuff on the back end and go, oh, okay, well, we know that you’re away right now, or you’re traveling great. Let’s infiltrate there, or they’ve noticed that, you know you’ve you’ve booked a flight. So your flight provider, they’ve got the dates, all of those

42
00:10:33.210 –> 00:10:48.300
John Bellamy (DarkXposed – Cyber Intelligence): be from the the you know, the airline that you’re with could be with the bank that you’re banking with. There’s all of these different facets, and it’s just it’s just a matter massive data, gathering exercise. And this is why I always say it’s like, it’s it’s

43
00:10:48.300 –> 00:10:54.620
John Bellamy (DarkXposed – Cyber Intelligence): uncanny. The similarities between, like, think of like a marketing agency.

44
00:10:54.620 –> 00:11:07.610
John Bellamy (DarkXposed – Cyber Intelligence): Where they’re helping small businesses build their database, create these lead magnets and lead funnels to drive conversations, leads, sales, and all of that. And it’s literally

45
00:11:08.270 –> 00:11:30.789
John Bellamy (DarkXposed – Cyber Intelligence): very similar processes that the bad guys are doing the hackers, but they’re doing it for evil right? But it’s the same process like that. They’re reaching out there to to drive leads to, to capture data that they can put through a funnel to get people to get to click that link. All we want you to do is to click that link and then, now we’ve got access.

46
00:11:30.900 –> 00:11:44.600
John Bellamy (DarkXposed – Cyber Intelligence): and before you even find out, we’ve got access because people go well, I’ll just change passwords in the shutdown. No, no, no, they’ve set up multiple backdoor entries. So yeah, it’s it’s it’s crazy, crazy, crazy things that can happen

47
00:11:45.280 –> 00:11:53.819
Cindy Zuelsdorf (Kokoro Marketing): you told about a client you worked with. That was, the company is about a million dollars. So not a giant company.

48
00:11:54.370 –> 00:12:05.780
Cindy Zuelsdorf (Kokoro Marketing): But nonetheless, you talked about a 38,000 ransom they had to pay to get their data back. And I was just shocked that a company that size would be at risk.

49
00:12:06.180 –> 00:12:34.800
John Bellamy (DarkXposed – Cyber Intelligence): Yeah. And and this is the thing like it. It it’s like the ransom sort of the end result. Like, if you get to that Ransom stage. You know that there’s some. Usually there’s some serious stuff that’s that’s gone down like, you know you’ve you. You really number one. You never want to pay the ransom. You! That’s where you actually want to engage. The liam neesons from taken you know you want to engage those people. But in the cyber intelligence space. They’re not cheap.

50
00:12:34.800 –> 00:12:49.700
John Bellamy (DarkXposed – Cyber Intelligence): It’s from a remediation perspective. They’re not cheap, but depending on, you know, certain factors, because the challenge with paying the ransom is once you’ve paid. It’s, you know, it’s it’s like governments that you know the the the public line of

51
00:12:49.730 –> 00:13:10.770
John Bellamy (DarkXposed – Cyber Intelligence): we never pay rent since and all that. And the reason behind that is because as soon as you’ve paid it doesn’t mean that they’re gonna give you all the data back, anyway, and even if they do once again, they’ve set up multiple backdoor entries. And then you’re on the list of someone who will pay so fantastic if we can get $500, or 10 grand or whatever out of you, we know we can get more.

52
00:13:10.900 –> 00:13:22.290
John Bellamy (DarkXposed – Cyber Intelligence): So this is, yeah, there’s there’s all those aspects there. So it’s sort of like. the the reality is nowadays is

53
00:13:22.420 –> 00:13:43.760
John Bellamy (DarkXposed – Cyber Intelligence): the chances of your data being, you know. You know, leaked if you like, and sold on the dark web. And that’s the area that we that we specialize in is pretty down high, right? Like it’s it’s it’s going to happen at some point. That’s sort of the that’s sort of the the way you gotta look at it. So what we’re seeing now is

54
00:13:43.760 –> 00:14:12.240
John Bellamy (DarkXposed – Cyber Intelligence): early detection is the new prevention right? And that’s sort of what you’ve got to look at. We know at some point our data is going to be leaked. Our passwords, our personal identification information data, burst. Social security numbers all that just depending on the breach. That’s happened once again, whether it was you or somebody that you’ve got data with. That that information is going to be leaked at a point. Right? So it’s then about, how do we identify when that happens

55
00:14:12.240 –> 00:14:32.519
John Bellamy (DarkXposed – Cyber Intelligence): early enough in the piece so that we can get on top of these things? So a couple of a couple of little things just like from a from a tip perspective. Never save passwords in browser. Okay? So if you’re using Google Chrome, and it says, save to chrome, or save to safari, or save to keychain, and things like that never save

56
00:14:32.520 –> 00:14:50.819
John Bellamy (DarkXposed – Cyber Intelligence): those passwords in browser. Biggest thing. So there’s a there’s a technique called steel, a logs. And for example, we can. We can run a report on like a steal, a log scenario, and when they.

57
00:14:51.460 –> 00:15:04.689
John Bellamy (DarkXposed – Cyber Intelligence): if if they get access to that keychain in Browser, they don’t just get the one password. They get all of the passwords that you have saved in there through one little hack. Right?

58
00:15:04.870 –> 00:15:25.870
John Bellamy (DarkXposed – Cyber Intelligence): So it’s yeah. It’s it can be quite devastating from from that side. You know. Th. So that’s that’s the big one, you know. The at the the standard one is always, you know, think before you click like, have a look at the URL you know they that will. They call it typo squadding, so they’ll go and buy like

59
00:15:26.120 –> 00:15:52.120
John Bellamy (DarkXposed – Cyber Intelligence): I don’t know. Let’s let’s say verizon.com, for example. They. I’m not saying that they’ve been hacked, or anything like that, but that they might change one character, or, to all, slightly tweak it character, or change the extension of that, or put like a sub domain in front of it. Or you know all of these different little bits and pieces. So. You know, tha, that scenario is yeah, is is

60
00:15:52.120 –> 00:15:58.820
John Bellamy (DarkXposed – Cyber Intelligence): particularly in the financial institutions. Is is pretty. Yeah, pretty terrifying.

61
00:15:58.860 –> 00:16:24.050
John Bellamy (DarkXposed – Cyber Intelligence): And unfortunately, II look at. Unfortunately, when they do a lot of those things, they don’t invest the time in making the websites look identical to the company. So I know, Cindy, we’ve spoken about this with Keep before. Like if I if I was gonna be a bad guy and I’m trying still information from keep, I would I would literally replicate the login screen like to the to the nth degree.

62
00:16:24.060 –> 00:16:47.890
John Bellamy (DarkXposed – Cyber Intelligence): And I’ll just. I’ll redirect people to my dodgy login screen, and when they put in their user credentials I would just refresh them and redirect them straight back. To them, to the actual login screen, and they’ll probably be like, oh, that was weird. Never even think about it, or I would redirect them through to, hey, we’ve had an issue with your billing. We need you to update your credit card, but once again, have it.

63
00:16:47.890 –> 00:16:56.229
Cindy Zuelsdorf (Kokoro Marketing): you know, have it look pretty good. And then we go. So yeah, it’s it’s what do we do? What do we do as regular people?

64
00:16:57.080 –> 00:17:16.080
John Bellamy (DarkXposed – Cyber Intelligence): So so what you don’t do is you don’t dig a hole and put your head in that. And you know, just so. So the the key is I I’m taking. I’m gonna make a big assumption, right? That you will all investing in some form of best practice cyber security. So

65
00:17:16.442 –> 00:17:37.449
John Bellamy (DarkXposed – Cyber Intelligence): what I mean from that perspective is, you might have like a Norton antivirus or a trend, micro or you’ve worked you work with a managed service provider. And they’ve they’ve got the security perspective sorted. Okay, so there’s cyber security. And then there’s cyber intelligence, right? So it’s really important to understand the distinction between the 2.

66
00:17:37.450 –> 00:18:05.160
John Bellamy (DarkXposed – Cyber Intelligence): Cyber security is like your State and Federal police. Okay? So they they they secure what’s within the border. Okay? So if you think about your hardware and all of that they secure what’s what’s in the border there they’re looking for. Known malware, all of you know all of the bits and pieces that the hackers are trying to trying to put this so they’re looking for looking at what’s known and trying to protect your border

67
00:18:05.240 –> 00:18:25.889
John Bellamy (DarkXposed – Cyber Intelligence): from an insi cyber intelligence perspective. Think of like intelligence agencies. CIA Isis here in Australia. All, all of that we’re we’re looking at what’s beyond the border. We’re looking at future potential threats that may not have. Nothing might not have happened yet. But these are threats that are identified.

68
00:18:25.890 –> 00:18:38.220
John Bellamy (DarkXposed – Cyber Intelligence): So we’re looking outside of the wire outside of the border of your hardware, your systems. And what we’re looking for there is primarily credential monitoring. Okay, that’s like our foundational piece

69
00:18:38.220 –> 00:18:43.510
John Bellamy (DarkXposed – Cyber Intelligence): is is looking at. If you think you’ve got your business email domain.

70
00:18:43.510 –> 00:19:10.919
John Bellamy (DarkXposed – Cyber Intelligence): or domains. From that perspective, we’re looking for app for anything associated with that domain and the strings associated. So it could be, you know, email addresses, passwords, personal identification. And we wanna notify you as soon as soon as we’ve identified. Essentially, we wanna notify you that, hey? There has been this credential specifically and potentially, this password

71
00:19:10.920 –> 00:19:35.589
John Bellamy (DarkXposed – Cyber Intelligence): has now been sold whether it’s sold for the first time or sold again. Out on the dark web. You know. Do something about it right to throw it up. If you chain, make sure you’ve changed your passwords, all of these all of these little base level points, but it’s notifying you ahead of time so that you can ideally prevent ahead of time a future disaster happening.

72
00:19:35.640 –> 00:19:41.010
John Bellamy (DarkXposed – Cyber Intelligence): From there. So, as an example, Cindy, as you know, we

73
00:19:41.350 –> 00:19:48.760
John Bellamy (DarkXposed – Cyber Intelligence): we ran before the call. Just did some research on those who who have registered to attend

74
00:19:48.810 –> 00:20:05.379
John Bellamy (DarkXposed – Cyber Intelligence): and so we’ve got there’s there’s a couple of outliers as far as credentials that are exposed and up for sale right now on the dark website. So the most we saw from people was about 260 credentials. So that’s not one individual.

75
00:20:05.660 –> 00:20:34.509
John Bellamy (DarkXposed – Cyber Intelligence): Yeah, so, yeah, and this is a historical yeah of of live going back a couple years. Yeah, so that’s that’s pretty high on, you know. We had others that would like 67, 29, 1 0 5. I’m reading off my list. 82231532919, you know, this is the 121. So there’s a

76
00:20:34.680 –> 00:20:48.620
John Bellamy (DarkXposed – Cyber Intelligence): revealing somebody’s like giving away somebody’s secrets. What did you see? So we could see all of the essentially the the team members, if you like, and the email addresses. So if you had multiple team members.

77
00:20:48.620 –> 00:21:06.029
John Bellamy (DarkXposed – Cyber Intelligence): current or past right team member credentials there. There was a bunch of identification information. So some people would have like data birth. Some people might have credit card details, address information, all of that that type of information. But the big one is the passwords. So, for example.

78
00:21:06.030 –> 00:21:23.749
John Bellamy (DarkXposed – Cyber Intelligence): you know and know what like. If you see if I mentioned someone’s password. Don’t react, or anything like that, and go that’s mine, or anything but like people who had passwords with like the at symbol. Capital DUD. You know, starting with that, or hawk or love.

79
00:21:33.180 –> 00:21:50.300
John Bellamy (DarkXposed – Cyber Intelligence): I think it would be tiger. T-g, e, and then we’ve redacted the rest. You know. Hulk is there? Which is another one? Dina? Yeah, you know. So there’s all of these different all of these different passwords. That we can see

80
00:21:50.300 –> 00:22:19.670
John Bellamy (DarkXposed – Cyber Intelligence): might be recognizing their own passwords right now is what you’re saying, potentially, yeah, potentially. But yeah, that may or may not be. But yeah, that’s that’s just. I’ve just picked a singular password. Yeah, it is like you did it for Kokoro. And it did reveal a bunch of passwords. Now, most of them to me look like things that we’d use in the past. But nonetheless you got a hold of them, and you also revealed that there were a bunch of

81
00:22:20.490 –> 00:22:47.549
John Bellamy (DarkXposed – Cyber Intelligence): team members that didn’t exist on Team Kikoro, that we’re trying to log in and do different things which completely freaked me out when I saw that. Yes, so they might have set up a different email address. So yes. So there’s a whole bunch of things. I remember the the the funniest one. And it’s not really funny. Was. I was speaking to a a financial advisor firm, and I was on. I was on the go. It was a husband, wife, director team.

82
00:22:47.550 –> 00:22:53.149
and I was on on a call like this with them, and and we mentioned a couple of passwords, and

83
00:22:53.150 –> 00:23:03.880
John Bellamy (DarkXposed – Cyber Intelligence): their faces went white, and then they were just horrified. Because they were like they looked at each other, and they like that is the password that we use for our bank accounts.

84
00:23:04.000 –> 00:23:06.160
John Bellamy (DarkXposed – Cyber Intelligence): That’s the same email address.

85
00:23:06.170 –> 00:23:17.220
John Bellamy (DarkXposed – Cyber Intelligence): It was the same password that they used. They had. You know, a reasonable stock and property portfolio to log in to those those kind platforms.

86
00:23:17.280 –> 00:23:19.099
John Bellamy (DarkXposed – Cyber Intelligence): And they were like.

87
00:23:20.320 –> 00:23:29.369
John Bellamy (DarkXposed – Cyber Intelligence): you know, thankfully, I hadn’t. I hadn’t been breached, or being ransomed, or anything along those lines. But for them it was like just this.

88
00:23:29.540 –> 00:23:37.649
John Bellamy (DarkXposed – Cyber Intelligence): You know, mind opening, you know, thing of like holy crap. We need to be so much more diligent than what we are.

89
00:23:37.830 –> 00:23:58.550
John Bellamy (DarkXposed – Cyber Intelligence): You’ve gotta. You’ve gotta remember, like technology, as we all know, AI and all of the machine learning and all that. It’s advancing like so quick. What took 5 h, you know, for 5 5 years is now taken, you know, 5 s. Essentially so. So the bad guys are able to crack these passwords like

90
00:23:58.630 –> 00:24:07.830
John Bellamy (DarkXposed – Cyber Intelligence): tens of thousands, if not billions in a matter of seconds. Right? So you’ve really got to be thinking about

91
00:24:08.190 –> 00:24:22.120
John Bellamy (DarkXposed – Cyber Intelligence): your passwords. And this new reports out now with the expansion of quantum computing and all of those things coming out. So if you’re using, like last pass or one password, a dash line like password manages, which.

92
00:24:22.120 –> 00:24:50.969
John Bellamy (DarkXposed – Cyber Intelligence): Let’s be clear. I great great things to utilize. But what they’re saying now, advancements in yeah. So do we right the advancement in quantum computing they’re not even gonna cut the mustard in the future. So so the governments and you know, at B and and other other key players are looking at using lattice models. So instead of just the singular key that they’re pulling from different areas, all of that

93
00:24:51.060 –> 00:25:13.139
John Bellamy (DarkXposed – Cyber Intelligence): but one of the best ways to create a password nowadays. Which is sort of counter intuitive to password managers. Right? Yeah. The bad guys are the hackers. Yeah. The the the one of the best ways to create a password is what they call like a long string text. So like, I like eating ice cream by the beach on Sundays.

94
00:25:13.260 –> 00:25:31.470
John Bellamy (DarkXposed – Cyber Intelligence): Right? Now, that’s not a password of mine, but but something like that where it’s a, you know, throw in a couple of characters and things like that. But it’s a it’s a longer. Stretch of phrase, something like that could in the current environment take a trillion years to crack

95
00:25:31.530 –> 00:25:38.660
John Bellamy (DarkXposed – Cyber Intelligence): versus, you know, password, which will take not even a second. Yeah. So it’s it’s pretty interesting.

96
00:25:38.930 –> 00:25:48.540
Cindy Zuelsdorf (Kokoro Marketing): We gotta wrap. We’re gonna go to the speaker room so that you can ask all your questions in there, cause I know there’s a ton of questions.

97
00:25:48.750 –> 00:26:13.049
Cindy Zuelsdorf (Kokoro Marketing): What are? I don’t know what are the top? One or 2 things we can do is just regular humans to protect ourselves. I heard, if I’m capturing data, if I have a company that captures any data accounting data, Crm, anything, there’s value. Denver pay the ransom. Never save my password in the browser. Credential monitor monitoring. Is it? Monstering text, password? But what would be the top? One or 2 things.

98
00:26:13.440 –> 00:26:41.890
Cindy Zuelsdorf (Kokoro Marketing): Number one, you’ve got to have your security in in check. So cyber security you have to be doing that without a doubt. Number 2. Credential monitoring so like what we’re talking about, it’s it’s just a must nowadays right? Credential monitoring from that perspective. And the easiest way to to check. If you have exposure, is just to reach out to us from there I can drop a link in, if if that’s cool. Cindy.

99
00:26:41.890 –> 00:26:45.590
John Bellamy (DarkXposed – Cyber Intelligence): yeah, so there’s just yeah. There’s a link there. If you wanna check

100
00:26:45.590 –> 00:26:51.159
John Bellamy (DarkXposed – Cyber Intelligence): just put in your details and then we and we’ll come back to you and let you know if there’s any exposure.

101
00:26:51.200 –> 00:27:05.649
John Bellamy (DarkXposed – Cyber Intelligence): a a. And so so they’re the main 2 things. The the other thing is, you’ve got it. You’ve just got to be diligent and be aware like this is the the number one. The number one cause of cyber incidences is is literally human error.

102
00:27:05.800 –> 00:27:23.689
John Bellamy (DarkXposed – Cyber Intelligence): Right? It’s over 90% of cyber incidences are caused by human error. That’s you, me, your team, whatever it is. So you’ve got to be diligent and which comes down to education. Yeah, they’re they’re the 3 main things. But you got to be investing.

103
00:27:24.250 –> 00:27:25.949
Cindy Zuelsdorf (Kokoro Marketing): All right. Let’s

104
00:27:26.500 –> 00:27:40.909
Cindy Zuelsdorf (Kokoro Marketing): go. I put the link in the chat to go to the Speaker Rooms, and you can add, just don’t, Pepper John. With all your questions. I’ll go to my Speaker room, and if you want to talk to me about something, I’ll be in there and see you all. Thank you for being here.

105
00:27:40.940 –> 00:27:45.719
Cindy Zuelsdorf (Kokoro Marketing): No worries. Thanks, Cindy. I’ll see you in the Speaker room cheers, everyone cheers.