 Hello, this is Matt Darnell with comptel.cloud, comptel.cloud, like up in the sky. Here is always joined by Greg Jackson, Greg, good to have you here. We're back. We're back, baby. Sorry about that. We missed last week. We had some unforeseen circumstances that didn't allow us to do that. But today we're going to be talking about cyber security. Easy subject. Easy subject, right? I mean, that's more than, I mean, long password. That's all there is talking about, right? That's it. We're done. Absolutely. Okay. That's it, everybody. Okay. It's been a great show. Thanks. We had that there. We're going to talk about cyber security. I mean, what is it? How do people define it? The different kinds there are and from computers to software to network to everything cyber about that. But as always, we're going to start off with some current topics here that are kind of near and dear to our hearts. So this first one here is, you know, there's going to be the Los Angeles Rams and Dallas Cowboys are going to be playing a pre-season game here at a Loha Stadium. I'm not even sure if it's week one or week two or week three, you know, and because, you know, week three, usually the starters play for the whole half, you know, and otherwise like week one, they play one drive maybe, and week four, they sometimes a few, few snaps. So I'm not sure which week it is, but we were looking at getting tickets and they're cheap, right? A very cheap. Well, defined cheap, right? Compared to ticket to go on the space station, it is cheap. So I'm here on ticket master. And you can see that if I go here, let's say to the lowest price seats, the lowest price seats and again, they're all resell. Can you put that on the screen? I think we have that technology here. We will put that on. Okay. Oh. Okay. Yeah. No, no problem. Yeah. But yeah, so the problem was, it's a cyber security issue, but the problem was that within like five minutes, every seat was gone. And it sounds like summer school. Does it? I don't know. I mean, it's been a while since I was on summer school, but I did go to summer school every summer to have that, but every, but these bots, you know, these people, they buy the tickets and then they resell them, you know, it's just one of those things where it's one person. I don't know how they're able to do that because you have to use different credit card numbers. So there's got to be a way where to say you've got to be a person. I mean, I'm sure they use CAPTCHA, you know, where you have to get to do what's two plus three and click the square with all the buses on it, you know, and, but they somehow they're able to do it. And so the cheapest ticket is over $100. And the face price is like 35, you know, and so we're going to go to the game, but we're literally going to be walking around the parking lot and buy tickets, you know, that way. So what happens if you buy something that's not legit? Well, you got to look at it. You know, I've done this. You're comfortable. Well, I mean, they have a little holograms on them and that type of thing. So and you can kind of tell by the person and the best way to do that is if there's a family, you know, or a bunch of people, a lot of times, oh, Susie and Johnny couldn't make it, you know, so they've got an extra ticket. And then, you know, they, and then they'll, they'll sell you, you know, two or two of theirs. So both of my boys really want to go to the game, but I'm not willing to pay that markup tax to have that there. Yeah. So there's got to be a way to make that better for Ticketmaster or I'm thinking of first thing in my mind is the, the airport, you know, the quick pass or what do they call that thing? Were you going in front of the line? I know, I know, you're gonna say fast, fast. It was like Disneyland, but, but, you know, you register ahead of time. You probably go to not some lottery, but you just get in the system, maybe use your code and now they validated you. So I think there's probably some value in, you know, having people checked out first where they have to mail you the tickets. And it's got to be a different address or something. But that's really, I think that is a cybersecurity issue because I mean, they're people game in the system, you know, and they just have these bots that just the second thing and any concert, like the Bruno Mars concert we had here. I mean, those were just. Imagine Ticketmaster, is it Ticketmaster? Is that what you're on? Yeah, Ticketmaster. Imagine Ticketmaster and how much money they're losing. I bet you they've got to be solving that problem. This is not the only place that this happens. Well, they're still selling the tickets. But I mean, they're losing revenue though, right? How, how, how are they losing? Because someone, you're saying someone's selling it for more than what they bought it for? Right, they're selling it for more than face, face price. Right. Well, I mean, face value. So imagine if someone sells something that you sold for more money. I mean, the first thing that pops in my mind is, I could have sold it for more money, but they could figure that part out. They could keep some of that additional revenue. Well, a lot of times the person doing the event stipulates how much the tickets can cost. Also, they usually say, this is how much I want the tickets to be. Like the NFL, they won't, the tickets are too high. They don't want to be that, that guy. So that guy's got the one with the scalpers. That guy's got scalpers in there. I want the tickets to be 100. Then he brings his scalpers in behind and sells them for two. But my golf brooks are all those, you know, really big out. They dictate how much the tickets will cost this, this, this, this, and to different places. And the ticket masters, they're just immediate. We're just selling tickets here. But people just buy them, they flip them and have that there. So that's a bummer. I mean, all these people, they want to come see them. Especially the Rams, you know, they got Todd Gurley and Jared Goss. The locals, I would imagine. This is painful. Absolutely. Absolutely. Have that there. All right. So Sunday. Big day. What Sunday? Big day on Sunday. It is World Backup Day. World backup. We're going to back up the world. We're going to make a carbon copy of the world. You've heard me say this before. I've been downloading the internet for 15 years and I just can't keep up. So I don't even know how I'm going to back it up now. Right? And that's just the internet, right? Everybody, if you go to worldbackupday.com, that is the world, and it's March 31st. And I like they're saying, don't be an April fool, right? Back up your data. So tell me, your personal data that you have, pictures, you know, homemade movies, obviously no copy-protected things. How do you back them up? Cloud, on-site, floppy disks? Yeah, I'm beyond floppy disks. I had an Olympus 2.5 megapixel when I started my archiving and that was many, many moons ago. And I've got a few terabytes of just family photos and stuff that I've accumulated over the years, documents that I scan in. And I use a Drobo at home. A Drobo. Yeah. Okay. So is it a rack mount or is it one of the bread box looking views? That's a really good description. It's like a bread box. Okay. I mean, it's super heavy. It's got, you know, five drives in it, got, you know, like, 24 terabytes in it. Okay. Which is a lot, right? 24 terabytes is a lot. So let me ask this. Do you have anything off-site? So if there was a fire in your house and that burned up, how much of that could you get back? I'm only in the cloud probably backing up about a fifth of that. A fifth of that. And you have chosen which pictures are important? No, no. So I've got a lot of data that I, my total data repository is probably in the 10, 15 terabytes, given that I've got a 25 terabyte container. And then I probably have- And just people, we're talking terabytes here. So there's a megabyte, right? And then we've got a gigabyte, and then a terabyte. And a normal, small, like word document is maybe a hundred kilobytes. Right. And the pictures may be five megabytes. Yeah. So you've got five megabytes, and then 200 of those, you've got a gigabyte. Yeah. And 1,000 of those 200, you've got a terabyte. Yeah. So that's a lot of storage. And you've got 15 terabytes. Yeah. Okay. And then I splice up, like the personal stuff's probably in the 1.5, two terabyte range. Okay. And then that stuff goes to the cloud. So it's automatically, or do you have it placed different places? Yeah, I've had to be strategic about it. Okay. And after a while it gets hard, it's kind of a shell game at that point, because with all those free accounts, but now with some of the Office 365 benefits, I'm starting to piecemeal. You can't, they've got their file size. So you're paying for this. This is not a free, you're not using a free service, sir. Right. You just run out of time, and then eventually you just start paying. Yeah. So you have more money than time when it comes to backing things up. Yeah. Okay. And I mean, some of the things that we saw for people, it's not the backup that's the problem. It's the restore. So how long am I waiting, you know, reeling to wait to get it restored? Yeah. It's hard. And then securing it and locking it. So all your pictures are in the cloud and those kind, but maybe disk images or those kind of. Oh, yeah, I've got it. Those are, that's what you keep. If you lost, it's a bummer, but you know, it's not going to be the end of the world. Yeah. I mean, hundreds of DVDs worth of MP3s. I mean, I started during Napster, you know, collecting stuff. Napster. Wasn't that illegal? Wasn't that in a movie or something? I thought so. I don't know. I never used it myself. I've read about it on the internet, but yeah, so it is hard. And my problem with pictures is like with my cell phone, when I'm at the beach or something and I'm taking a picture, I say, tap, tap, tap, tap, tap, tap, you know, I'll pick the best one. You don't do the hold and hold? Which I hold in the burst? Yeah. That's true. It's 100 shots. Yeah, exactly. Two seconds. I think, okay, I'll take five and one is going to be good. That's right. What happens? You just take all five. You get all the time to go through and select the only ones you want, right? Well, I tag them. I do meta tags on there so I can be able to find it later. And I have the geo tagging there, so I cross index by that. And the weather of that, right, that's the problem. We got all this data and we're backing it up, but restoring it is a challenge. But then finding it, assuming you can get it restored. But if you're just trying to find it after the fact, that's the problem. And we just got to have computers help us. They need to be able to look at my pictures and tell me that's a fire hydrant, that's a this, that's a map. That's what CAPTCHA is for. I wonder if they're learning. And they say that you can pay people for that. It's like, I'm going to show you nine of my pictures, click all the ones with me and my wife. That's how CAPTCHA began. Yeah, they were making money with it. So worldbackupdate.com, you definitely want to go ahead and do that. All right, so something else, we'll talk about two Apple things here. So there's a big announcement on Monday. There's going to be an Apple card, which is basically, I think it's Wells Fargo Bank, stamped Apple on that. Like you have a United Credit Card, you've got three United Miles, or you've got Hawaiian Airlines, or that kind of thing. Apple is going to have their own card now. Of course, it's made out of titanium. It's got all those things in it. How many Starbucks points do I get with it? You know, does the Starbucks take Apple Pay? It'll probably be the only place you can use it as one that takes Apple Pay. So I mean, are you going to run out and get an Apple card? I didn't even get a Starbucks card. I'm not big on credit cards. They are cool though. You're not big on credit cards? No, I'm not big on credit cards. Meaning, you're cash only? No, I mean, I just don't like having a bunch of credit cards out there. It's just hard to keep track of. I've got one. You've got one? Okay. And cash. So with the Apple card, it's supposed to be, you know, it's going to be cheaper because they're not going to pay all the big fees, and you know, it's made out of titanium, and it's laser etched, and you know, you think that stuff doesn't matter, but you know, we're an Android family. And my son, you know, I bought some AirPod looking headphones. And he immediately called you out on them. They're mine. They're mine. They're mine. I want those. They're mine. And so I said, why don't we get you your own? Because he already has Bluetooth, you know, the sports kind, but there's a wire connecting the two. Like J-Birds or something? I don't know. But yeah, it goes over the ear for the sports, so it doesn't fall off. But he took those, and I said, I'll buy your own pair. And I said, let me buy this better pair. He goes, no, they don't look like Air Pods. He wants to have Air Pods. All his friends have iPhones. I make him get an Android, but they are good at that marketing and branding. They have to be white. They have to look just like the Air Pod. So it's really, I think, okay, the Apple credit, who's going to care that it says Apple on it? But then I look at my son, and he wants an iPhone worse than anything. He wants Air Pods. He wants everything white, you know, that kind of thing. So remember the days, there was a, we'll get to that right after the break. So again, this is Matt Darnell. We're supporting your tech here on Think Tech Hawaii. Be back in 60 seconds. Hey, loha. My name is Andrew Lanning. I'm the host of Security Matters Hawaii airing every Wednesday here on Think Tech Hawaii live from the studios. I'll bring you guests. I'll bring you information about the things in security that matter to keeping you safe, your co-workers safe, your family safe, to keep our community safe. We want to teach you about those things in our industry that, you know, may be a little outside of your experience. So please join me because Security Matters, aloha. Aloha. I'm Dave Stevens, host of the Cyber Underground. This is where we discuss everything that relates to computers that just kind of scare you out of your mind. So come join us every week here on Think Tech Hawaii. www.cyberunderground.com, 1 p.m. on Friday afternoons, and then you can go see all our episodes on YouTube. Just look up the Cyber Underground on YouTube. All our shows will show up, and please follow us. We're always giving you current, relevant information to protect you. Keepin' you safe. Aloha. Matt Darnell again with comtel.cloud here with Jackson, and we are going to be talking about cyber security. And that is such a broad topic. Now why don't you take a minute here and talk a little bit about, you know, how you see cyber security, how you define it in real layperson terms. Yeah, so, and you're right, it's a very broad topic. So cyber security, it's kind of like how I used to define IT support. It's basically anything from the wall outlet out. So if it's inside a wall that's probably has some component of cyber security. We're talking anything from cameras, and I mean, it's pretty in-depth. So cameras, phones, PCs, laptop servers, wireless access, scanners, copiers. It's anything in your office that plugs into a wall. That's what you need. That's probably the most lay way of saying it. There's an actual definition of it. Once you leave the wall, now you've got the internet, cloud repository. You know, a lot of people are doing cloud now, so you've got your applications, hardware, you've got data security. So people are putting up these little doorbells that you push in codes. You've got the doors that you go into that you scan your badge, the parking lots with the RFID. All that is in a bubble and more in a bubble called cyber security. And the tough part is that many people, it's just too much. I mean, I'm in IT and I'm struggling to just put it all together. But as you look at everything, and the most important part I left out was what about phones, all that stuff. A lot of this stuff has been around. Security is in many ways meant to help retain the information that you're responsible for, but it does affect you. It affects the people that are around you, including customers. So we're talking about a thing from locking down your phone to locking down your, even these little pads that people use for control panels on their desks or they're trying to use it to check in. You'll go to doctor's offices now. You can check in on the iPad. All that stuff has to get locked down. Cash registers at the grocery store and go on. So cyber security is just the protection of, and cyber, you have to break it down. It's kind of a general term for electronics. Yeah. Right? And we have that. So it is just security. Watches, rings. Absolutely. Yeah. You have a smart ring? No. Well, you've seen those little, they got the health rings now. But imagine that. Like it's got a health ring. It's collecting all your data. The sports watches now that do all your, you know, where have you been? Your heart rate? Yeah, absolutely. It goes up the cloud. The skate weight scales? No, and just the tracking, you know, of people running. Yeah, so it is, and if I look at the definition of cyber security, it's the protection of computer systems from theft or damage to the hardware, software, or electronic data, as well as disruption or misdirection, you know, of the services that they provide. And, I mean, it's a shorter list of things that aren't affected by that than things that are affected. That's right. I mean, practically everything in your world. I mean, we've talked here about toothbrushes that can track how, you know, we're going to have a competition between our kids who brushes their teeth the longest. Have that. So we have all of that there. And the way that people are able to use it, like, did, when they, when all these people found all the secret bases in Afghanistan and based on, you know, they have these heat maps for the where people run. And they would look at like Afghanistan and there was a real bright spot in this little region and there was this circle that all these people are running around this circle. Oh, and guess what? That happens to be a military base where there are SEAL guys and special forces and they're exercising and they're tracking their their workouts there. So that, you know, so just say, wow, that's the bad guys by tracking, you know, who's working out where they can figure out where the special forces folks have that. And that's at the life or death level, right? A lot of times people are talking about, you know, I don't want someone to break into my network and steal my Wi-Fi. You know, the relatively innocuous level and there's such a varying level of degrees we can have. What's that security? What the way people is, you know, like one of those old time scales, I've got security on one side and I've got ease of use on the other side. If I want really good security, my ease of use is going to go down to the toilet, right? 15 letter passwords, six multiple characters. I usually use the word freedom over here, but yeah, freedom, right? And the other way, if I've got really good ease of use, my security is going to, you know, my security is going to, like we have a client that we do network scans and do that and they have their password is very ease of use. They never, people never have to change their password and they never delete your account after, you know. That's no problem. Yeah, ease of use is phenomenal, phenomenal. You get a password, you're there 18 years later, you'll have the same password, right? Yeah. But security is, you know, compromise, you know, when they're able to do that. So having that level and I think that's the biggest problem that people have is how much is enough cybersecurity? And there's not a real answer. I think how much, unless you say we're dealing with patient records and we need to be HIPAA compliant, there are minimums. And that's the challenge is that if you're waiting for someone to tell you to be secure, you're probably, you know, you're probably looking for trouble. And I think that's why you have all these laws coming in, you know, how you have to lock things down. You've got outside agencies that want to secure things because their reputation will be at stake. You've got government agencies forcing financial institutions, healthcare organizations to lock down their data. They're even paying them in meaningful use to make it happen because people aren't going to spend the money unless someone tells them. And because it does cost a lot of money. And what they realize is that if you don't lock all that information and when the information is leaked, then you're fine. So people that aren't taking any measure at all. I mean, give me your phone. Right there is one of the first. And that wasn't coached. No. That's one of the first things. Why would you? Social engineering. Social engineering. There you go. Oh, sure. Oh, you want the password? Yeah, yeah, there you go. But it's one of the things where we trust. And trust is very much like what you're talking about. A lot of the CEOs are separated from their CEOs because either one, they don't understand it. They don't have somebody they can explain it. But if they're closer together to understand the risks involved in that communication becomes so important because now funding becomes easier. And that's really the challenge. I don't think most IT people that I've talked to in the past, they just need enough money to make it happen. And the challenge is who's going to give money. So either government agency is going to give it to you because you have to by law or a CEO is going to figure out a way to fund your project. And most CFOs will give the IT side just enough to make it work. Right. I mean, what's your budget? I need a thousand dollars. OK, you can have 300. Yeah. Let's say I need 10,000 to make it work. 20,000 to make it work insecure. Here's 10,000 dollars. Exactly. You figure it out, right? Have that. That value proposition is tough for the IT people. They struggle to articulate the importance. And it's possible that you could violate every cyber security rule and never have any effect. It's possible you could do everything known current man and get a zero-day exploit and you're done. Yeah. So it's really a difficult thing to do for people. And so that's where companies like us come in. Right. And we know one way normal. We know what state of the art. We can develop a value proposition. For instance, let me tell you a story. I was working with a military. This is back when I was a young man, probably 1995. They had one of those entry. They had to punch in a code, right? And the next time I went there, the neat thing was you would just press one button. It was 1 through 0. But all the numbers would appear on random spaces. Because, well, what's the threat? Well, somebody is looking with binoculars and seeing the pattern that you're doing. Well, it also sticks. The pattern sticks, right? When I was really young and I was working at banks and they had the little buttons that you push. Open the door a little. I wouldn't push them. You'd always look at three that were used. That was one of the other reasons they did that. Like on my phone screen. It shows the swipe button. You can see it. It's either Z up on the upper. Yeah. So just those little things from there. And then we get, you know, hard drive encryption. I mean, is that how important is that? That if somebody steals this physical hard drive, you know, they're going to be able to read it. Even that's nebulous. I mean, I worked directly with somebody that thought they were getting a full disk encryption. And they found out later that, and this is from a multi billion dollar company that provided the encryption. And they found out that they were not encrypting file names. And that was a hippo violation. So you couldn't read the file. But you could read the file name. Yeah. So you could tell the names of all the people. So depending on how you name your files, which most health organizations are going to say, Greg Jackson has, you know, you know, some kind of cancer or whatever. But now I've got a hippo violation. It's a huge, huge problem. And, you know, people, if people have questions, they certainly call us. You know, whether it's offsite backup, whether it's, you know, the ability to work through these cybersecurity issues are really hard. And there's a $10 solution and there's a $10,000 and on up to as much money as people have got. You said probably the most important part that I hope everyone walks away with today, which is it's about the people and a good example of like if you just train your people the right way. We've got one person that I work with. He does so much training with security. He actually has plans that he uses with his staff. He'll have like competitions. If you get, if you take an exam, this like security exam, it's like social engineering, things like that behavior. Would you click on this? He does it and then he gives out prizes. But what he's done is he's trained his staff to be secure. I think in the last we saw Oregon State. I think that they were just, it was malware. Some of it, they were, they were blocked from Microsoft because, because they accepted an email and huge. You train your people. That is your number one biggest point of have an issue. That's right. Old employee and malicious or that's right. Yeah. So if you want to give us a call again at 356-00-00 Just do 356-00-00 in Puka until somebody answers the phone. We'll, we'll be there for you. We'd love to talk. We love talking about this kind of stuff. We love helping some medium-sized business. Just walk through those kind of problems. You have webinars, you have seminars, and all, all these kinds of products. So again, thank you very much. Great for joining us. This is Matt Darner with Compto.Cloud. We're on Think Tech by Aloha.