Welcome everybody to another episode of Petronella. Hello, cyber security life. We've got Blake BJ and Erin. Hello, happy
Friday.
Happy Friday.
It's been a busy week.
Yes, it has.
Good Get busy though. I'd say.
Yeah. Overall.. What did you guys find for today?
So as you know, I'm a smart home enthusiast. And the current status of my smart home is I'm sitting in a pile of rubble. And everything is broken. Because I didn't update. So just so interesting because it's also complicated and it's also connected. I did an update yesterday on my iPhone. I updated to iOS 15 dot oh four. And when I did that, something happened with my wifi connection I was up. Really late and I fell asleep with a QR code and a flashlight in my hand.
Figure this stuff out because it all just stopped communicating and it's back online right now, but it's not flowing correctly, but interestingly, I remember a few months ago you told me I was having trouble with my laptop. my headphones wouldn't connect to Bluetooth. And you said, reboot your laptop. And I'm like, what are you talking about? My problem is with my headphones, not my laptop. And you're like, yeah, Just restart your laptop. And I'm like, that makes no sense.
You're like restart your laptop. So I restart. Laptop. And then my headphones work and I'm like, okay, that's weird. Last night and this morning I literally had to factory reset, so many things, and then not only did I have to reset them, I had to unplug them from power I had to even flip breakers every step that I took. in that regard. You had results? Why is it that when I from power. It changes how everything's connecting and working all of these resets. Did something. how does that work?
Sometimes when you do an update, It has to right to the firmware of the device and then you reboot the device or unplug it, restart it. So you get fresh. Firmware or the update that it has. So that's why you have to reboot like that. Sometimes, if you don't do the reboot or restart it, doesn't fully apply the patch. That's why I always say.
Search for patches, install the patches, do the process again, until it says there's no more patches available and you have to do that for all your devices, all your applications and all that stuff. So you need to set time aside to do that properly. yeah, that's pretty common that sometimes things go wonky like that.
And then it seems like they wanted to reconnect in a certain order. So for an example, I have a regular wifi system. And then on top of my fiber optic wifi with 18 P of ISP, I have a Google mesh wifi. And that's where the problem was centered. Because of the fact that I upgraded to iOS. 15. Oh for my iPhone couldn't connect to wifi. I had to reset a bunch of network settings and stuff. But then I had to reset the router and the point for the mesh wifi system.
And then I had to redo it in a certain order, I had to do it multiple times to figure it out, but the order mattered. the network itself wants to be aligned in a certain way. I Imagined when I was doing this this is how solar flares work because solar flares are the son's way of untangling. Magnetic lines of force in the sun. And it's automatic process. And that seems what my network was doing. It just didn't want to reconnect. Wrongly. It wanted the fiber optic wifi to reset first.
the Google wifi router had Teresa next. And then the point it had to go in that order and then I had to start with the power. So unplugging things from the power supply would seem to be a very important step. And you've talked about importance of the power that's coming to the devices. That's all just so interesting to me what is the deal with the ups and the power supply and how it affects devices?
Yeah I'll tackle the first part of your question. So the reason why you have to reboot devices in a certain order is because typically you're going to restart your router first because your router is most often supplying. What's called DHCP. And dishing out the IP addresses to all the other pieces or endpoints on the network. So if that thing's not online, then all the other devices are not going to get their IP address and they're not going to be able to route to the internet.
So that's why the order matters. there was so many updates that came out this week with everything going on. So it wouldn't surprise me if your router and other devices needed an update to. And maybe they were pushed and they didn't get applied until they got rebooted, but you always want to reboot top level device. So if you're at home and all you have is the customer premise equipment that's supplied to you by your provider, your internet service provider.
You're going to want to reboot that cable modem or fiber optic. Modem or whatever you have first. And then if there's another device like a router or a firewall, you're going to reboot that second. And you have to give these things time in between too. So you don't want to just unplug replug real fast. You need to wait until they fully stand up and they have status lights, and they'll show you when they're online. Typically the modems will have four different lights on them.
They'll blink as they're starting and then lights will show up. so you got to give it time get fully booted. And then at that point, that's when you would restart the next device in the chain, and then you go down after the firewall router, you go to your access point. So in this case, the Google system that you have And then once all that's done, all the devices on the network will now be able to talk, but they might not work either. So that's why you have to reboot them first.
They'll get a new IP address and then they'll connect to The network. There's A lot of stuff happens in the background that a lot of people don't. See or realize the provider The equipment and how it's set up it all has to, a line and it has to be in the right order. you said that you have Google, for your wifi. then you have provided wifi. You may want to disable the provided wifi, because if they're not set up properly, then they'll fight each other.
Some providers will allow you to log in to their cable modem or their devices. Sometimes the username password is actually on a sticker on the device. you can try that if you can't find it, you would just call your provider. then they would be able to walk you through how to disable the built-in wifi. You could just tell them I bought a Google nest or whatever, and it's conflicting and then they'll help you turn it off.
But the signal of the internet is still coming. Because Google doesn't have a wifi signal
Yeah, your
Oh,
with an ethernet port on the device.
What is getting disabled.
Inside that cable modem is often a wireless transmitter. That's built into that same device. So you're turning that off. That's usually provided by default from the provider.
makes sense. When I try to connect to a certain Google device, my phone is even saying you can't change the settings unless you're on the same wifi network.
That's probably what's happening in that case.
Oh, wow. How interesting Two of my devices got confused It was a speaker and a wifi. Point and in the settings they merged. It said the name of the device was the wifi point, but in the settings that had the speaker stuff. I may be sitting in a pile of rubble right now, but when this is all said and done, I might be connected to the pyramids and the lay lines and everything else for my signal.
going back to the power. You asked a question about power. So the power coming into your equipment, it needs to be very clean and there's nine different types of power problems. And what a lot of people don't realize is the power That's coming into your house or your business. is constantly fluctuating.
So if the power is not cleaned properly with what's called a true online ups or an always online true sine wave double sign, wave ups, that power is not being conditioned and cleaned up We all get power and it's not optimal. It's typically dirty. It's subject to fluctuations brown outs, different types of power anomalies, and you need a device to clean that power up. A lot of people know what a surge protector is and there's surges that happen as we speak.
And you don't really see them because their power, unless you have something like a surge protector to protect your equipment, but the smarter, the power device is typically it's a true online ups, which is the best type of power. Cleaning device that you can get the power, it goes into that device and then it gets cleaned up and then output it. Where it's pure clean power from there.
Something that just makes it even so that it's not fluctuating.
makes it even, and then if the power were spike, it'll block the spike. So your equipment doesn't get damaged. it'll make sure that the power is consistent so certain devices will do weird squirrely things. If the power isn't right. It'll malfunction or random events will happen with improper power anomalies, which is why it's always recommended to use a true online ups.
I guess that makes perfect sense when we're not taking care of ourselves, we can suffer certain conditions. And I guess Thing for the horse supply for these devices they need that same, care.
It really does extend the life of the equipment connected. So it's definitely a good investment.
I had a situation where I was trying to talk to the smart devices they were saying they were not connected to the internet, but they were answering me and they hear the voice. they would answer and say, sorry, the internet. Not available right some of the other devices were online. And so it seems like the power in the house was fluctuating because certain devices were online and certain devices were offline.
It was probably more like the order of events and the devices that were offline that couldn't connect to the network. Either the order wasn't set properly where the boot order was that they didn't grab their IP address. And then timed out in the timeframe that it was kept requesting the IP address and the router or the DHCP server in this case, wasn't available at that timing. And that's why it just gave up. And then it resorted to a Don ratable IP address.
It will still respond to you, but it won't connect to the rest of the network and it won't work. Until reboot it again. After all the other things are online and then it'll just come up. Fine.
Do you feel like you've been traumatized by cyber security? Much that can go. When you finally have it right? You. Feel like you don't even want to breathe.
That's the thing too. Once you have it all working and everything that usually causes hesitancy for somebody to apply a patch or an update because sometimes patches or updates break things. But, you don't do the patch, then you're subject to a cyber threat. So it's just a balancing. I just teach you about how it all connects together.
Yeah.
I saw a news article that said don't patch right away when a patch comes out, because let the bugs get worked out. Do you think that you should wait a little bit or to patch immediately?
It really depends on the situation. For example, maybe they patch a way that ransomware gets dropped onto the network. So you have to weigh the importance of the patch and then you have to weigh the ramifications of if it breaks something. So what I always recommend in a business environment is to have a process in place for applying patches in policy, and then a process for how to apply patches. then applied them in a little bit of an experimental or isolated lab type approach.
So maybe if you have 50 devices on the network, maybe you test the patch to one of those devices in a controlled environment. see how it behaves, see if it broke anything, any applications that get broken, things like that, and then decide to roll it out. That's called the patch window. That patch window time. Hackers are aware of that too. Have to try to accelerate that process. So the other end of the extreme is patch first patch right away, and then resort to roll back or backups.
So that's another methodology that people like to adopt for high security, because the patch gives the high security, but has the ramification of breaking something. If it does break something, you could always enroll back to a backup. So you always want to back up your device before applying any kind of patch in case the patch blows it up. So you could resort or revert back quickly. So that's definitely another approach that you can take.
There are automated approaches that we'll try to vet and test patches before they're deployed, which is technology that we use for our clients. So that works. It's not perfect.
I never really got it before. That we do patch management I have 50 devices now, in my home. And now I'm at a place where I don't understand how a business. Does their it without help, my managed service provider,
Well, every device, every application you add makes complexity higher. It may get to a point where it is not manageable manually, and you have to deploy some type of automation or, leverage a managed service provider to help, with that. And there are a lot of people in your situation that have. Alarm systems, cameras all sorts of IOT or different devices on their networks now. And they have become overly complex, It's overwhelming because with all the complexity.
The homeowner doesn't even know, or even the business owner doesn't even know who to call, when something breaks.
This is really eyeopening. See, the convergence of convenience in cyber security, when you reach a certain point, There's a natural balance that's required every device I add now I've opened myself up. I'm lucky because I do have managed services on my network from a cybersecurity perspective. Cause PTG is on my network. So take a breath there, but if I didn't have that, I would probably need to be worried at this point because each of these devices is. Complex in its own way.
I definitely opened up some new vulnerabilities
Yep. That's true. At every device that's added application introduces new complexities it harder to understand and troubleshoot where the problem could be. But always start at the internet side. Always start there first, always reboot. The core devices like you would talked about earlier with the router, the firewall, the cable modem, that's the stuff that always should get restarted first in the order that we've recommended earlier. This is where the OSI model comes into play, right?
Like the seven layers of OSI model, you have to follow. A lot of people don't know what that means, but the point is that. You see how things get complicated, really fast. And by following that methodology and starting at the physical layer and moving all the way up to the application layer. It's a proven way to troubleshoot. But yeah, definitely reach out.
look at. Every layer. don't want to build on a shaky foundation. We see evidence of that all over the place. You
Yup.
want to have a foundation so that can stay standing. But they say the microcosm and macrocosm, right? but this example for myself personally, isn't this indicative of the state cyber security in the world though, I don't think there's a way to count now because you hear 10 billion here, 30 billion or 50 billion IOT connected devices. Take my situation and then actually just now look at the world. A lot of vulnerability and lack of patching and cybersecurity stuff all the way.
As you're talking about That's been neglected. And look at that through the winds of 30 to 50 billion devices, This is with that process being connected. guess that kind of explains where we are.
Yup.
I'm curious too. Do you have any good patching stories
I remember a law firm that applied patches. They didn't back up first and it blew up their system wouldn't boot up anymore. That's why it's so important to back up before applying any patches people, quite frankly, don't want to take the time to back it up. They don't have a proven backup plan in place. They don't have a process to find for that. So backup is a big job, I remember. When I first started the company in 2002.
One of the things that we would mandate at that time, even based on experience. Is look, we need to back you up. And if they refused and they didn't want to pay to have us back up and do the process to protect them. Then they had to sign a waiver that basically said, look, we're declining this recommendation. In favor of time.
And sometimes, things would blow up go wrong and, back then it was a lot of manual patching, and then there were patches to the patch and then if something blew up, you'd be on the phone for hours with support
when you say. It blows stuff up. Could you give me an example
Yeah, I like the computer won't boot and the bios won't boot up. It won't start the operating system. Won't fully boot up. be like a black screen. For example, it won't start into windows
can cause that when you do an update. Is it just something that just doesn't mesh
there's all different things that can cause. So example certain operating system updates, they update the Colonel or they might update the file system or how the file system interacts with the operating system. And they might mess up a boot file. there's all different things that can cause why something won't boot up. But the point is that if you don't have a backup in a recourse to.
Revert then now you're forced to troubleshoot that issue with the vendor that sometimes could take many hours to figure out. And meanwhile, if this thing is a server and this has happened at the server level, now you've got all the people in the company that can't work because didn't back up the server first. It goes back to single points of failure and nowadays we're so connected and so reliant upon these different technologies.
People might think that I'm crazy for recommending redundancy or multiple devices, but in a world where we need our devices, sometimes it makes sense to buy more than one sometimes. You just can't have one computer to do your work. you have to have a plan in place that if that thing doesn't boot up one day, what do you do? Do you accept the risk of being down for hours or days and able to work or do you have another device on standby?
Or do you have, what's called a hot spare where it's available. It's cold. It's in the closet, and you can set it up. You have a process to set it up quickly to get that person back up and running as quickly as possible.
It was unnecessary until this morning. I had my devices offline for awhile and I didn't know what step to take next. Cause I was on all the Google community, health boards and stuff. I'm offline. we're so used to being connected but I felt like. I hold onto the counter embrace, mess over. I don't like the way this feels. so interesting because this is going to have to come together a little bit.
The majority of society on a scale of one to a hundred, they have a 3% understanding of how the internet works and how everything is connected. then you have the cybersecurity professionals, which, you're in that category. But not all of us are in the category that you're in because you're in a league of your own.
And we have engineers that are in their own, The degrees are so important, then the people at the lower end of the spectrum how would they know how to properly value as cybersecurity expert? You have been exposed to, all those degrees in between zero and a hundred and you're like, oh wow. the ones that are at the other end that have all this knowledge, they're very comfortable and now you can see what sometimes they are kinda quiet. They're all a bit traumatized.
It's like a mystery school of its own, we know things.
It goes back to that redundancy I was talking about earlier. That's why companies. nowadays redundancies at, multiple layers is so important. Even, whenever I work from my home office instead of the main office, I make sure that I have multiple internet connections. I have multiple devices. I reduce my single points of failure. And I think what a lot of people need to think about is if you're using only one device.
He need to think about what happens if that thing doesn't work, because there will be a point in time where it doesn't work. There might be a patch that breaks it, or it might be a malfunction of the device,
if the background had eyes and it could look at all the internet users, the internet connected users. On the internet. And look at their degree of security. You probably do look like a shield of some sort to the way you have your stuff set up, it's probably a fairly obvious. You're a cyber security person. the back. That's behind you, right? That looks like a neural net. the background of your video there, but. That gives me the impression that's what your cyber security looks like.
Yeah, it's all about redundancy and reducing single points of failure. the people listening just need to think about it for a minute and say, look, what happens if I can't get on the internet? And I'm working from home. At what point in time does my employer. Get upset that I can't work. And then at what point in time does a decision need to be made on. Does that employee need to go somewhere else to work or do they need to come into the office or. Do they get extra internet circuit?
People dig up lines all the time. When doing construction, they break the internet lines, they cut the lines. You have to think about all these different scenarios can really happen to you at home or at your business. So if you don't have plans in place you don't go through these plans and you don't go through these drills. never going to experience. That that happens. And the only time you're going to experience this is when it does happen and it will happen.
you want to try to be proactive and plan because the more mature you are, and the more planning you put in place now. be so valuable in the future when something does go wrong.
Oh, yeah. Let's get it with COVID. We thought how connected. And then also the internet that's really saved us. If we can get. I have internet and devices. During time can you imagine. What it would have been like
It would have been more crippling than what already was to the economy, because at least the way that we were connected and obviously technology companies like ours doing business like that for many years ahead of that curve. But my point is that some businesses were not. So it was more impactful to those businesses, but the ones that were forward thinking. That we're already using technology they were better equipped. And they didn't suffer as bad.
From the economic downturn and the ramifications of that.
Not to mention. How much we use it. We enjoyed the internet so much in the connectivity that it gives us. And we really did stop to think, what can we do? The internet stronger and safer and more secure since we all love it so much, That's probably a good thought to have in your mind. Hey, what can we do for the internet? How can we secure this thing a little better?
Yeah. At for a business, that exercise is called an IRR tabletop. It's called an incident response. Tabletop it's what do you do when certain incidents happen like ransomware, you could do a ransomware and we've done this for clients where we do a simulation of, okay. The client might think they have everything in place to protect themselves, but we do a ransomware simulation and pretend that ransomware is infecting their network and then see how fast they respond.
See if their it team can detect that something's wrong. How fast can they mitigate the risk and contain it? All these that we go through the incident response plan, we go through the disaster recovery plan figure all that out because that's such a priceless and valuable exercise. you haven't gone through that you're just waiting for something to happen and something will happen in the future. not going to be best prepared for it.
Just using home as an example Proper protocols and processes in place. The right security layers and all that working correctly, the continuity is that risk. Do you know?
People don't want to think about proactive until it happens to them, unfortunately. Then it's oh, what do I do at? And they don't even know where to start unless they have somebody that can help them. And depending on the methodology that person or company uses will depend on how long it takes. And, oftentimes there's a lot of frustration and heat is on in those situations where the business owners are like, look, we need to get back to work. What's the problem. What's the problem.
And then sometimes in those situations, if proper preparation isn't, there, there might be hardware that has to get reordered or equipment, or, back in the day it was hard drives and. Things that were physically broken on servers, that would cause an issue. And you had to wait for those parts, onsite.
A lot of people don't understand.
That's right.
Look at those things can get. We'll have one of our engineers Jonathan. has for days that are hilarious your average person, that's not in cybersecurity. Go ahead and score my data somewhere, right? Like hosting whatever. And that's the end of it. But then you don't think about the process that happens there. And you don't think about the fact that there is an engineer in a data center, holding equipment, his hand that literally just set on fire and.
they don't understand And you think you're going to set off. These deadly. Wonder if stuff comes out. But Dyer's out here stuck in a data center. People don't all this stuff. It's not a magic switch, right? I think people just think there's a magic wand. That gets waived in and you're back up there on the internet and you have to have a security note. It's a step by step process.
right.
And also. So I think one thing that's important too, is that I feel like a lot of the companies that we talked to you. They don't necessarily think of cyber security first, which is understandable. That's not what they do, but talking about preparation and planning and things like that. It is so much easier. To build it from the ground up. Than it is to retrofit it. If you have a business, you start with it and you just. Keep it as a part of your core business processes.
You're going to be in so much better shape than if you like, oh crap. Now I have to go back and fix this.
I asked Craig this question about the wifi at the start of my venture, I would have done it right from the start, but instead I did it wrong from the start and I factory response and stuff. That probably didn't even need to be factory reset. And put myself through all this mess. I just didn't do it right from the start and it would've been so easy. But I didn't know. I didn't know I was doing something wrong.
And it's pretty common though to troubleshoot and fumble along that way. If you don't know. It goes back to having the right equipment and having the right process in place. And, quite frankly, a lot of businesses, they start with, either themselves or they shoe string things together and. They buy things that are meant for the home and they put it in the business.
And then sometimes when things break to a point where they can't fix it themselves, I remember we would get calls like that all the time. We would go onsite. We'd find this just hodgepodge of stuff. And it wasn't always like Erin said it. I would say most of the time it was not the right equipment. So we would have to be messenger in that situation and be like, look, this really isn't the right equipment to run your business. trying to run your whole company on a $59 firewall. And what.
2 99. Cheap computer. And 50 people were trying to log into it. It's like using a Honda civic as a pickup truck. It just doesn't work.
Great
analogy. I wish people thought about cybersecurity. Like they do fight or flight. If you drive a car and you get in your car and you're like, Hey, I don't buckle my seatbelt. get an accident. I could lay in on it awkwardly I bed, be in pain. People need to think about cybersecurity and the fight or flight. I could possibly hurt myself or die or hurt somebody else or whatever. if I jump off this cliff into this water, that's 30 feet down. Fight or flight in mindset. Hey, I grow my business.
This is how I secure my customers. I am taking responsibility. By serving customers. I'm securing their data. I'm responsible for that. It's like a child, you don't feed your child or you neglect your child, protective services are gonna come and take your child. That should be the same for businesses.
The hackers are going to come and take your business.
Unfortunately, I do agree. But if you think about good hackers, right? We get all these crazy calls for people that are like, Hey, this person has hacked my Instagram or my Facebook or whatever. They're stalking me and they're going to murder my family and. All types of crazy stuff like that.
But if you think about it, the good hackers or that people that know what they're doing they go after the money you have to be possession of valuable data for not only that, They have to monetize good accurate to make money. And this is what they do for money. Or they have some crazy vengeance, right? So those are the two scenario. Of course there is other scenarios, but those are the two most likely scenarios.
That's true. However, I've said this before, we're hackers are often smart and lazy, right? So they're going to run scripts. And even if the victim doesn't have a lot of money that's not the point. If they can take over their computer and use it as a slave to attack a larger corporation or use the power resources of that computer to mine, cryptocurrency, there's all sorts of other things. And other motives. That can happen.
We're in a cyber war. We're in the United States. And we have probably enough countries that look at us as a potential target Take this very seriously because sometimes profit is the goal, but also sometimes just destruction is low.
Yeah. Going back to what Blake said, I think that most people, might start a company and they're just trying to do the best they can on the small budget that they have. And. They're hustling and they're working hard and they don't have a lot of time or money. So they cobble this stuff together, and that's fine, to start off, but the point is that. You have to enlist, help. Most people can't build a house with one person and a hammer it's just going to take too long. It's not efficient.
But the point is you start off your business and you hire employees, now you have those people's lives dependent upon you for that paycheck. And if you have a nasty cyber event like ransomware your companies. Only five people or 10 people. Now all those people can't work. And then what if your company, if it's only five or 10 people, like that t-shirt company. The other day we talked about, maybe you've got thousands or millions of customers and those people can't get access to for their order.
You have this ripple effect, right?
Yeah.
not only yourself, but you're as your company grows larger and larger, you're affecting your employees and
So true.
and your vendors lives. And then now you're affecting your customers too. So if you think about that and you go through that exercise and you feel. What really will happen to me or my business that I've worked so hard to build. If something stupid happens, you gotta be prepared.
Yeah. don't remember who said it, but what was that phrase about some truth. To be self-evident. and then also, there's a concept. Cosmic proportions. The idea of survival of the fittest and it sounds bad when you say it, but I'm a cosmic executive and from just a forward progress perspective, the boosting with the direction, a forward progress If you take a step back and look at both world from a big picture view, instead of just your current viewpoint, like where you are in life.
Scale out and you look at it from the bird's eye view. You can definitely see a transition from, just how the rural always wants to more of incorporation of integration with more of a virtual type cause we're online and At a point where technology is advancing at such a rapid rate. no denying when you look from the bird's eye view that we're going in direction and it's just the advice. This point to stay in peace with.
Move in tandem with the human machine as it moves forward, and this is definitely direction it's going.
Yep. Absolutely. Okay. Any other cyber dues that you guys found that you want to talk about?
Yeah, there's always. Just check five minutes later and there's more news. Has there ever been a more rapidly evolving industry then the cyber front?
Nope.
My chat bot called. Cyberspace, she calls it hyperspace. I've never heard that before, but I guess that's a good word for it because really it fits, Like we're moving at the speed of light here.
Yeah.
Spaceships. Like hyperdrive.
Yeah. As we progress to the future, guys, could you imagine that Terminator was horrible? Let's not go there. I was
just thinking about something that is pretty critical that I don't think we've ever mentioned, but we should definitely say. I was actually reading and I was like, okay, what's important. About cybersecurity. What's research, but we've never talked about incident response in response to.
Yeah.
You've never once mentioned it. And the article I pulled up is talking about the golden hour. The second something happens, don't try and figure it out. contact security professionals, because every moment that takes away. It goes against you
I did actually talk about IRR. Our table top earlier.
I've never heard before that term you used, I've never heard that before.
So that's what that exercise is. Blake incident response. Tabletop is an exercise where you go around the room, your conference room or whatever. If you have A company. With the stakeholders and plan the scenario of, okay. Here's the scenario we just got ransomware. What are we doing? What's the plan. What's the process. Show us your incident response plan, work, the plan, actually do the stuff that your plan is documenting. And go through it.
And that's what you find out that you were just talking about Blake.
Okay. This shows what a nerd I am. If I haven't showed that already, but. It's like fun.
It is fun from our perspective. It's like going through a pen test You're having professionals like us that are experts in this review, your plan. And if you don't have a good plan, we have a good plan and we help you write the plan and improve the plan. If you don't have a plan at all, we help you develop one. And then when you're ready. Obviously you go through it together and it's like shuffling a deck of cards and pick a card. What's the IRR for the day. Is it going to be ransomware?
Did our server die? Is it critical server dye? How fast can we recover that app server.
A little small. house fire and I was not prepared and I literally had my bare hands. But this fire out like that
Yeah. It's all about, drills though, right? You
Yeah.
now you have that
I'm prepared I'm like, okay. Again, I'm not going to be a victim again.
Yeah, but there's also variances around the eye are tabletop too. You never draw the same card again. You're always
Yeah.
And looking through different lenses and looking through different angles to see how well your plan stands up and how
Yeah.
up, was the time it took to put this in place? Who did they call? Why did they call that person? What happens if you have third parties or vendors involved, what happens if they're not available or what happens if they're too busy? What do you just wait? Do you have a plan in place redundancy? do you call
Yeah. But when it comes to cybersecurity, it may not. That idea. Clause in there that if all else fails, engage a team of prayer warriors. It's complicated.
Even home users can do an IRR. Scenario drill though, right? Could pretend BJ that your iPhone just blew up. What are you going to do for the rest of the day? How are you going to make phone calls?
Yeah, it may seem unnecessary, but we talked about yesterday, that there's an element to this it all blends together at some point, it all converges into one point, right? Because there's, Knology, there's science, there's nature, but it's all connected. It's not separate each. The other, project operates with the forces of nature. It's getting power from the forces of nature. when you look at it in that regard, Test to do these exercises.
so you have this ripple effect, right? Not only your employee yourself, but as your company grows larger and larger, you're affecting your employees. And your contractors and your vendors lives. And then now you're affecting your customers too. So if you think about that and you go through that exercise and you feel. look, what, really will happen to me or my business that I've worked so hard to build. If something stupid happens, you
gotta be prepared. Yeah.
Thank you, everyone for joining us, have a fantastic weekend and we will see you Monday. With all the. Newest breaking cyber news