When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best practices that give the highest ROI.
As business owners and execs, we are responsible for EVERYTHING! While cybersecurity may not be your native language, it is critical to learn enough to make informed decisions. UnHacked is a great place to start!Today we talk with Christian Espinosa about the cybersecurity basics, as well as his 7 Step Secure Methodology.
1/21/25 • 59:52
In today’s episode, we talk about a disgruntled doctor, his real/understandable problems, and [perhaps] a bigger problem with mindset; and as always, wrap it up with the formula to protect your business from Boris Grishenko.
1/14/25 • 56:18
How do you REALLY know that your IT company has you properly protected? How do you know you are getting what you pay for? This is one decision where you cannot afford to be wrong.
11/26/24 • 45:24
We've spent the last 3 weeks breaking down the formula in significant detail: using industry standards, protect your technology, protect your data, and protect your people. That will get you to about 97% secure. But... what about that last 3%? What if you do everything right and STILL get attacked? How do you survive a full-blown cyber incident? Today we interview the great Robert Cioffi and learn exactly what he did when everyone's worst business nightmare came knocking on his door.My #1 key takeaway: CULTURE. Retreat to your war room and dig deep on your company core values. Who are you as an organization? Let that be your #1 guide when rubber hits the road. Takeaway #2: community. "No matter how brilliant you are, there’s always something to learn." Get involved in your local community and your industry's community.Takeaway #3: “You really need to be following some sort of framework”. This is what we talk about week after week when we suggest following industry standards and best practices. There are dozens of frameworks out there. Some are required by government regulation (PCI, HIPAA, NIST, CMMC, etc.). Others, like CIS, are designed to be self-regulated. Follow the ones that best suit your business model.
10/29/24 • 87:31
In his book "Future Crimes", Marc Goodman said something that has been burned in my brain for years:“If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology. Cybersecurity is a people problem, not just a technical one.”What's the #1 threat to your organization? IT'S US! WE ARE THE PROBLEM!The truth is, we can follow every standard, control, and best practice under the sun, but all it takes is a careless or uninformed click or tap and it's game over. So, if people are the problem, what is the solution?Proper toolsEducationPolicies and proceduresCultureWhile this might be part 3 of our miniseries, treat yourself to an invaluable discussion of the #1 best thing you can possibly do to protect your business: take care of your people!
10/22/24 • 51:27
Data backup used to be simple: a tape drive on the server and you're good to go! Now data lives everywhere. Taming this beast can be a challenge to say the least. Here's a quick-start guide:Go through each department and major function in your business (BizDev, Operations, Finance, HR, etc.)Identify the technology used for eachMake a note of where the associated data is storedCreate a plan for backing it up and testing the processMost important: review this process regularly because things change!
10/15/24 • 40:25
For Cybersecurity Awareness Month, we decided to do something special. So over the next 3 weeks we will deep-dive on each of these areas and give you a list of what needs to be done, as well as how you can verify that it’s implemented. This week: Protect Your Technology
10/8/24 • 54:27
In today’s episode, we are going to answer the burning question I know you all have: “What in the hell is the Dark Web?” Spoiler alert, we talk about the tame stuff on here. It is a vile place to hang out. That said, our breach breakdown of the week is 23andMe. This is old news, but the proposed settlement is happening now. … Then, as always, we’ll wrap it up with the formula to protect your business from Boris Grishenko.
10/1/24 • 44:58
In today’s episode, we are going to talk about how to spot a phishing email (and how to get your whole company to do the same), dive into a $5 Million lawsuit for not paying the ransom, and as always, wrap it up with the formula to protect your business from Boris Grishenko.
9/24/24 • 46:54
In today’s episode, we are going to talk about how to make sure ALL of your critical data is backed up, we’ll break down 2 specific security events that sent over a quarter million dollars up in smoke, and as always, wrap it up with the formula to protect your business from the likes of Boris Grishenko.
9/17/24 • 54:26
In this week's episode, we help business owners get proper cyber security insurance coverage, and make sure it’s paid in an emergency.
9/3/24 • 61:15
In this episode, we talk about how to know the difference between good and bad popup alerts, break down the largest data leak ever, and as always, wrap it up with the formula to protect your business from Russian hackers.
8/20/24 • 39:56
In prepping for this episode, I ran a quick survey of those who work from home. There was a consistent theme: the flexibility is nice but the loneliness is real. Here's how to help your team deal with the challenges while ensuring security and productivity.
8/13/24 • 53:54
This week we discuss bank fraud and lessons learned from the CrowdStrike debacle.
8/6/24 • 37:40
The show producer has not yet provided a description for this episode.
7/23/24 • 37:28
The show producer has not yet provided a description for this episode.
7/18/24 • 56:42
What do Mormon Crickets have to do with cybersecurity? TBD. Meanwhile, here are some crucial protections you need to have in place before you leave for that next business trip or family vacation.
6/14/24 • 52:06
Unconventional Tricks for Maximizing Tech ROI
6/7/24 • 53:31
Leveraging AI in your small business may be the most important thing you do. But make these mistakes, and it may be game-over.
5/31/24 • 70:16
I can't tell you how many times I've heard, "I've moved to the cloud, now I'm safe!" Nothing could be farther from the truth. In fact, a recent study of 600 organizations found that 95% had suffered some form of a cloud-related breach. We have to stop this! Listen to Episode 18 to find out how.
5/21/24 • 45:20
I like to say that once you've been hit, you can never get UnHacked. Well, let's take a look at the worst-case scenario and create a plan. Just in case.
5/3/24 • 39:07
In this episode, the hosts discuss the importance of company culture in cybersecurity. They emphasize the need for businesses to prioritize cybersecurity and create a culture that values and promotes security practices. They share stories and examples that highlight the consequences of neglecting cybersecurity and the benefits of implementing a strong security culture. The hosts stress the importance of ongoing training and education for employees, as well as the need for leadership to set the tone and lead by example. They also discuss the financial implications of a breach and the relatively low cost of investing in cybersecurity compared to the potential losses from a breach.
4/25/24 • 32:46
In a very literal sense, without the proper formula for cyber security, your business is likely to suffer an attack from which you may never recover. This episode could save the life of your business.
4/12/24 • 84:50
The show producer has not yet provided a description for this episode.
3/28/24 • 61:58
I like to say, "If cybersecurity protections aren't a giant pain in the ass, you're probably not doing it right." Passwords come to mind. Super long, super complex, never use the same one twice, and change it every 30 - 90 days. That's a pain in the ass right there! But... Here's why it's important and how to keep it simple (well, simple-ish).
3/21/24 • 54:13
Your janitor has keys to your office and is expected to enter the building when nobody's home. What if they were paid to plant spy equipment on your computers? True story! How do you protect against that?!?! Well... we'll tell you exactly how!
3/4/24 • 51:16
The sad reality of cybercrime (and crime in general) is that there will always be criminals. Like I was taught when I worked as an armed guard for an armored car company: our goal is not to eradicate crime, our goal is simply to make it happen to somebody else. Cybercriminals WILL steal money. The question is: will it be YOU? Don't be low hanging fruit. Listen to this episode as we teach you how to "Make It Happen To Somebody Else".
2/19/24 • 44:23
In most episodes we talk about the devastating financial and emotional cost of a breach. This time, as far as public record goes, "The company does not expect the incident to have a material impact".A Russian state-sponsored attack on HPE (Hewlett Packard Enterprise) "targeted 'a small percentage of HPE mailboxes' used by staff in cybersecurity...." Hmmmmm. Ok...?Well, public record is what it is. That said, what can we learn? Take a listen and we'll break it down for you!
2/8/24 • 40:23
An Ontario hospital system is hit with ransomware. 20,000 appointments cancelled. 267,000 patient records leaked. 3,000 employee records leaked. That's all you've got?? Child's play! Here's a $480 million class action lawsuit to go with it. Enjoy!
1/25/24 • 50:48
Key point: It's all about the people. We are the weakest link in the cybersecurity chain. Training, policies and procedures, and 3rd party assessments are your friend.
12/21/23 • 41:02