 Hey, it's time once again for voiceover body shop or Vio Bs, that's right. Anyway, we got a great show tonight. If you are interested in cyber security Well, everybody looks at that and their eyes rolled to the back of their head. Well, you should be yeah It's time to get interested it's it's because everybody's we're all online And we've got a pop your head out of the sand and watch this show Absolutely because our guest tonight is a an expert in cyber security and a voice actor But not a lawyer interestingly enough Luke Turan Luke say hi Hello All right, he's gonna talk about cyber security and also our very good friend from Orlando and our number one website For voiceover guys Joe Davis Joe. How you doing? Doing well and just playing some guitar auto-harp banjo mandolin Irish penny whistle, you know entertaining myself All right and feeding Danny lines to squirrels. That's right And that so if if you've got a question on cyber security for your Vio website And for your online Vio life and all that kind of stuff stay tuned We got great guests who can answer your questions on these coming up now on voiceover body shop now from the outer reaches They came Bearing the knowledge of what it takes to properly record your voice over audio And together from the center of the Vio universe. They bring it to you now George Wittem the engineer to the Vio stars a Virginia Tech grad with the skills to build set up and maintain The professional Vio studios of the biggest names in Vio today and you Dan Leonard the voiceover home studio master a professional voice down with the knowledge and experience to help you create a professional sounding home Vio studio and Each week they allow you into their world Bring you talks with the biggest names in the voice of a world today Letting you ask your questions and giving you the latest information to make the most of your voice over business Welcome to My voice over body shop is brought to you by voice over essentials dot com home of Harlan Hogan signature products Source elements remote studio connections for everyone voice actor websites dot com where your Vio website isn't a pain in the butt Vio heroes dot com become a hero to your clients with award-winning voice over training J. Michael Collins demos when quality matters and voice over extra Your daily resource for Vio success and now live to drive From their super secret clubhouse and studio in Sherman Oaks, California Here are the guys Greetings, I'm Dan Leonard and I'm George Wittem and this is voice over body shop or Vio Bs And here we are in the brand-new Voice over body shop complex as we can see the our staff working hard up there getting us all the latest voice over news Looking good looking good it is it is and we've got a great guest tonight Luke Turans can be with us and Joe Davis again if you've got questions for them about cyber security for your online Vio life Now is the time to ask it. I know Jeff Holman is in the chat room In Facebook because we got rid of the other chat room. It was yes. Yeah, but Facebook dead weight a lot a lot easier Uh, so you can streamline everything and that's how you make things work better So how are you surviving so far? Um doing lonely Yeah, you know getting out of the house a little bit more here and there um you know, it's it's I get out more often than many many people probably do because of being in topanga You can get up into the hills get up into the mountains sneak around a little bit There are still places to go if you're if you know where to look And so that's that's really helped quite a lot and the fact that I you know, some of us have yards We can go outside Get fresh air, you know, so it's it's It's getting old don't get me wrong But it's not a massive adjustment for people that for me who who works from home a lot But I know there's some clients of mine who would sure love me to come over whether I have to wear a scuba suit scuba scuba or rebreather tank to do it So it might be happening sooner than later that I might be coming out Seeing clients again somehow high vex suit. Maybe yeah, there you go Hey, the thing is is who's gonna know except them I mean, is there like a a a home uh a home visit police out there or something? And not that I'm aware of no no, I mean as long as the as long as both parties are You know, can what is the word there's consent? Yeah, sending the mutual consent. Yes So we'll see how that goes. Yeah, I can't wait. Yeah. No, it's going well working remotely I mean, I'm just fortunate that this is something we you dan too, but Been we've been doing this for so long remote support. So It hasn't been a terrible adjustment. No, but there's just a lot more of it There's just a lot more of it. We're staying quite busy. Yeah, absolutely Well, because we do things online, we have to you know, there are other people out there That want to take advantage of the fact that we're all online and uh, so Tonight we decided we'd get somebody on who knows the voice over world well because he's a well established voice actor But he's also Someone who has been involved in cyber security An excellent combination. Let's welcome Luke Truann. Luke. Welcome to the show. Thank you guys Thanks for having me on the show today Now that's an interesting combination of things that you do uh, so You know your your voice actor But you've been in the cyber security business And I my immediate thought was and you're doing voice over I don't quite get can you tell us a little bit about how you've been able to mix your careers of cyber security and voice over Yeah, basically I I love two different things really well, you know voice over cyber security and uh, even after I stopped doing Cyber security full-time. I still kept it as Something that I did uh to kind of keep my studio functioning properly and make sure it was secured and uh, so yeah, just kind of kept um kept going even after I was out of the industry and then voiceover is just totally fun and awesome you get to work in your pj's And uh at your house. So yeah, what kind of stuff is what what kind of products and types of voiceover work? Have you been doing? Uh, so recently I finished an intel on brand uh slash explainer video, which was really fun Super fun with a local marketing company right here in Atlanta Cool. Yeah. Well, you're you're gonna talk to us about a newsletter That uh that you've been putting out because you know, as I was saying when when you start talking cyber security it's like I'll let the cyber security people do that right, right, but Then you get all these these reminders, you know, there's a vulnerability here. There's a vulnerability there What tell us tell us about this this bi-weekly newsletter that you're starting. It's called the vox roundup Right, so it's called the vox roundup and it's uh, it's V o c s. So it's a play on, you know voiceover cyber security You're right blah blah blah And so it um, it's just one of those things that I was already doing for myself And so I figured that other people could definitely benefit from the research I'm already doing and so I decided to start a little newsletter Which is going to be launching really soon right now people can sign up obviously ahead of time But yeah, that's so that's kind of um The current state and then what it actually is I would I would call it like the latest cyber security news Related to voiceover and studio technology. So it's kind of related to not just the tech but also to business aspects as well Hmm Yeah, I mean It's amazing when you click on something and it's like oh, why did I click on that people are they're very very good at disguising what things are and And they're getting better at it Uh, yeah with with all the technology threats and vulnerabilities that we're just talking about How do you know What is a real threat and if it could affect the technology being used in your voiceover studio? Well, that's a great question. So when I do research I do use some special capabilities that are available even in google that a lot of people don't even know about it And being a cyber security background Um, I kind of had been using those my entire career And so I just like hey, why don't I just use them to do my research uh to kind of find the vulnerabilities And then so, um, I'm able to find very relevant Uh vulnerabilities using these search capabilities that are directly related to you know computer software web based tech And of course any studio gear if it does happen, which is more rare for the gear to actually have a vulnerability But it does happen and then I take that and apply it directly to voiceover Makes complete sense. But right. Yeah, how is it that? Why well, I guess we could ask why would people do this? Of course, they want to be able to make money being able to Threaten our security and taking our, you know, our social security numbers and our bank accounts and all these other things But what are some of the other things that that you know that these hackers are trying to do to us? Well, not only are they trying to trick you but they're obviously trying to steal your identity, which is a really big issue And then once they um steal your identity, obviously that's um And they can really do anything at that point But uh, they'll trick you through fishing campaigns through Stuff you can't even see online like you can hit a website and there's something called a cross site scripting vulnerability or a drive by or a pop under and If your browser say chrome has a um an unpatched vulnerability They could immediately have access to your uh your browser and then start loading things in memory They could technically take over your computer and then plant other stuff to kind of take it even farther and escalate privileges So it's it's really automated these days So it's hard to know when that's actually going to hit your space So it's good to have everything kind of taken care of all the time Yeah, so I there must be new threat. There's new threats all the time I mean, it's it's amazing. I mean, I opened my email the other day And it was I can't remember who it was for but it was something in windows because I was working on a pc and suddenly it's like It's it every time I try to open a program it opens another program and I just click I mean, what what is that somebody just trying to just trying to plant spam or what are they doing? Well, I mean that could be any number of things that could be a um And a malicious advertisement that's on a web page That they they have decided to do, you know An actual paid for advertisement with google which has been known to be malicious But google scans for that now a lot more than they used to but still every now and then it'll pop up because they do new Techniques to get those ads through, you know, the the checkpoints And so it could be something like an ad or it could be some temporary file that was actually downloaded to your system That get then gets um activated at a different point in time. So it could be a lot of different things Hmm. I mean, I mean immediately I'm what the one thing is is it's like I open, you know, if I open a program Immediately another program opens up or if I open a web page and something go, oh, you want this don't you? Like no, I just click out of it, but it keeps doing it now I gotta figure out how to get rid of it which is one of the more right That's part of the pop-ups right exactly. Yeah So so who is this information for and is the information Going to be super technical in your newsletter So yeah, the information is actually for um for all voiceover pros I mean, it's kind of a relaxed format But it's it's kind of like a coffee shop style You know approach to technical issues that we all need to kind of know the information to And I kind of like to say, you know We've done the work or I've done the work and you get to sit back and you know, see if it applies to your studio You know, not all of everything is going to apply to your studio all the time But if you have something that's easy to understand in a non-technical way, you can um, you know quickly see if that does apply to your studio and um dive even deeper because there's going to be some quick links in the newsletter as well is some short commentary And uh, I always like to say there's going to be some tl dr type style comments If you don't even want to get into the article didn't read right exactly. Good job. Yeah Those are one of those those are those acronyms that I've seen around the web I must have seen tl semi colon dr a million times and didn't know what the heck they were talking about I had to google it But that's what it means Right, that's google's good for that Yep. Yeah, I mean I I would read I would read something like this If it was simple and how are you planning on taking These chunks of information that are just basically, you know geek speak And turn them into The average voice actor can actually understand Right And so that um, you know throughout a career of being in that field You know, I've had to learn how to actually explain technical concepts To what's you know Considered the sea level right non technical group of it, which is an audience And so I'm very used to breaking down really advanced concepts into non technical You know language And so I'm going to use that ability to kind of do the same with each article as it's necessary You know, you know, I'll read through the articles pretty quickly And um, you know, I can digest them pretty quickly because I'm familiar with the content And I can scan through and see if it applies to any voiceover type of studio gear pretty quickly Right So because I I can I can read really quickly. So that's super important I mean, I know I know for dan and I too when we're working with voice actors We're dealing with a different kind of tech, but we're still trying to be really cautious to not over jargon eyes or you overly use jargon And that because it's it's very easy to throw jargon at it like tl or dr tl dr You know, these are languages. It's almost like a second language that is spoken in computer circles. So Um more and more, you know, sea level. Is that what you said sea level? Yes, the executive level. Yeah, exactly. More and more that stuff's trickling into those worlds They're getting more and more of that especially as you work with younger um Yeah, it's we definitely work really hard to make sure everybody understands these concepts So I get that totally is I'm glad that you're doing that because I don't know anybody else really doing that for this field It's awesome. Yeah, what's a good example of saying taking something like What you were just saying see what was that george? Sea level sea level. I hadn't heard it ever that term before but sea level meaning Executive level. So right when you're dealing with executives in a big company They don't want to hear too much jargon. They don't want to hear a lot of detail They need to know the really important stuff the bullet points the things that are going to matter to them In a way they understand so that's sea level, right? Right. That's right. Take the same approach You know review the article see how it applies to the different technology piece and apply it to the voice over You know space and then what you do is like some fun commentary. You don't make it boring and um uninteresting Yeah Well, one of the things that you know One of the great things in the voice over business is that a lot of people use max Of course when they use a pc. I go you really need to be using a mac for for voice over Uh for a lot of different reasons Uh, and then of course the other people who are political I would never use a mac Well, okay, that's that's your problem But do I need to worry about so much about cyber security so much if if I have You know a good old, you know mac laptop here or or mac mini or something like that I they used to say that You know because not as many people had max even though they're like one of the biggest companies in the world now That they it was a pc world and people were not trying to attack max. I take it that has changed a bit That has changed quite quite a bit a lot more than I think people realize malware bites actually just released a study that over the last year the um Mac attack vectors and the mac frequency of attacks is actually I think they said it had quadrupled. It was like a crazy amount of increase and so it's even even getting um Worse as the years go on so it's it's only increasing at this point So yes, even if you have a mac you still need to be mindful of these cyber security threats and vulnerabilities Um, you know, I can give you a quick example of one that sure On may 11th. There was an article about the thunderbolt vulnerability on if you guys saw that no so it basically says that if an attacker had physical access they could easily plug in a flash drive and run some software programs and Read anything out of memory and out of an encrypted hard drive even if your laptop is locked and unattended Because of this vulnerability with a thunderbolt Right. Wow. So it's they would custom code like uh, like a program and let's say that you're at starbucks or whatever And we're not really doing that a lot right now But if you were uh, you and you let's say you went to get a couple napkins It would take them literally about 20 30 seconds maybe less To pop into flash drive go one two three four five or less And the program would run they'd get whatever they wanted and then they could unplug the flash drive and be out of there And it's all possible because of this thunderbolt vulnerability Hmm, but this is a thunderbolt flash drive, right? Has to be a thunderbolt flash. Obviously. Yeah It could be something like that somebody could custom make something. Um, yeah, but if you know stuff like that, um If it's not patched like if you didn't know that there was a patch because you don't follow cyber security which a lot of people don't Then you wouldn't run the security updates maybe that week But if you kind of had something come into your inbox that said hey, you know, there's this vulnerability You would easily go. Okay. Well, I can just build that into my little admin time that I do each week for my studio Which you should be doing that by the way And then you could patch it and then you would you know cut that one out of the mix Yeah How quicker are the companies like say mac and and you know and microsoft at finding these vulnerabilities I take it they've probably got staffs and staffs of people just watching in the internet and going Oh, we've got this problem. Or is it something that's like, hey, you know, you got a vulnerability here You might might want to fix this Yeah, it's not quite that loose. They're actually extremely tight with their um, their security Um, they have like you said, they have teams and teams You know doing nothing but that and they actually have their own, you know, penetration testing and you know rnd quality and quality control and you know all sorts of teams But then on top of that they open up these bug bounty programs for the hackers of the world To get paid basically to break into their stuff So there's a lot of people helping them out in addition to their own staff Wow windows does the same thing microsoft does the same thing. Yeah, so it's important To well one have antivirus software on your on your computer and anti malware and all these other things But like you were saying make sure that you are doing the updates when they come Right. Yeah, there is a safari vulnerability not too long ago for mac specifically That involved um an unpatched safari version could actually they could gain access to your web camera So that one's pretty pretty relevant to pretty much everybody. Yeah, well, they wouldn't see anything interesting. So And um, yeah, you wouldn't even know potentially that it was happening unless you're you know, you saw your light on Right, right, but um, yeah, you could easily hit a malicious website and then uh, the you know They would be in if the malicious code was on that website or you got redirected to it by another means like a phishing attack Like your netflix account has been hacked click here to you know Immediately respond because they always say do it immediately to get you to act really quickly Right jargon alert jargon alert. Yeah jargon alert, right fish attack phishing attack tell everybody tell everybody what a phishing attack is So, yeah a phishing attack is basically a very Very convincing email that looks like it's from a major service provider like like a bank like wells fargo or netflix or one drive Which is a file sharing service from microsoft? And these emails are so convincing that they look like they actually came from the provider and when you click on it Typically now The link would go to a website which would run the code But they also have these really official looking landing pages that look exactly like The um the office login page for example, right Or a bank page and then you would type your credentials in Thinking you're logging in then they could have your credentials or they could run any code They want while you're on the website And especially if you don't have a patched of vulnerability Then that makes it even easier for them to get into your system and do whatever they want steel identity plant keyloggers You know blah blah blah whatever right then we get domain name Like a domain name like google search.com or something right well like with google.com Yeah, not google.com, but it would be like A.google.com or some other yeah, you know high level domain like another part of the google.com Would be in front of that to the left of the the name Yeah, I mean, I've seen companies like just tack on another word Right into the end of your company's name. So it it looks kind of official But it's not actually google.com for example. It's something else Yeah, exactly zoom that's part of the zoom vulnerability that was an issue with the redirections and the uh the fake URLs that were floating around Yeah, oh really? Yeah. Yeah, and I and I got zoom bombed early on when we first started everybody started zooming and it was like Oh, how do you get you know and they they quickly shut that down and they and they really are improving their their security So why is it these people who are so brilliant at computers and and hacking and all this stuff? Why aren't they running the companies? That do all the websites. They're really oh now Now we can talk about black hat versus white hat. Yeah, exactly Right or gray hat, you know some of the dances between both like neo and the matrix, you know Oh, yeah, like a double agent Right like a double agent, right? Yeah, fascinating. So when are you planning on launching? You know the vox newsletter Um, yeah, so I was going to do it on the 18th, which is next monday Excellent and and how how are people going to be able to sign up? Um, they can actually go to the vocs roundup.com Really and it's right there Just click on get the newsletter and you'll get a nice little welcome email that kind of introduces you to it and When we go live, uh, you'll get the the newsletter first first edition. All right Well, think I think now it's time to bring in another guy who we know knows computers inside out backwards and upside down Especially when it comes to websites And that is the principal guy over at voice actor websites.com joe davis joe Welcome back to our show once again Thank you so much. I uh, I'm just looking forward to getting a pop under here No, you won't get one So your job, you know your business is building voice actor websites And you're very busy doing that What can people do to make sure that their website is as secure as possible as as luke was talking about It's a good question. So um, and just to clarify now, we don't just work with voice actors We do agents producers casting casting directors ad agencies. So, um, lots of areas that are attached to the voice over industry too And there's some Basic things on the website side But before even we go there, I want to say the stuff that luke was talking about Is relevant to your website also because if someone compromises your computer Most likely they're going to be able to get access to the credentials for your website So i'll dig into that a little bit more later, but uh, let's say you have a website on wordpress and You say, okay, you know, I go in every six months to make a change Well, that means it's probably outdated meaning wordpress issues updates just like windows or os x or safari or chrome All of these software platforms offer updates Wordpress does the same thing and sometimes you can go A month or two without an update sometimes there's multiple updates per month if vulnerabilities are found And so the the more frequently that something goes wrong meaning someone discovers one of these vulnerabilities The more likely that an update is going to come and some of them are minor meaning There's very little likelihood that anyone will ever actually Use this or it's not that dangerous, but other times Luke and I were having a conversation over the weekend And there was a wordpress vulnerability that happened Within the last week or two that was quite significant So you want to make sure that you're staying on top of those type of updates when wordpress issues an update I would say in general maybe Depending on how complex your website is you might want to wait a day or or you know a few hours Just to make sure that if there's a problem with that update it gets caught before you do it So sometimes being the first person to update anything is not a good idea because that can introduce new bugs I see luke laughing so he knows what i'm talking about But uh in general keeping on top of those updates is a good idea and then Most websites have plugins and themes and especially uh on the wordpress platform, which is a great platform It's the most popular CMS content management system out there meaning Kind of a drag and drop interface to creating a website It relies on a theme beyond the wordpress core theme and plugins And those things need to be kept up to date too because again vulnerabilities are discovered And also conflicts happen. So sometimes maybe wordpress issues an update that Breaks something with a plugin that you've had and so even if there's not a vulnerability you should stay on top of those updates because After one or two generations sometimes your plugins will just stop working Right. That's what I pay you to do though It's like I don't understand what this thing is. It's supposed to update it You have friends in mid-level places. That's that's that's a very important thing to have If you're just joining us our guests are luke truan, who is a cyber security expert and voice actor and is launching The vox roundup, which is a newsletter for voice actors for and Others to talk about cyber security that you can understand and joe davis, of course from voice actor websites dot com Who manages a lot of our websites and gets them all set up If you've got a question for them Now would be a great time to throw it into the facebook chat room or in the comments there And jeff holman is standing by and we'll be able to reload the relay those questions to our great guests in just a couple of minutes so Really, it's it's our website really tied to you know our entire computer security. I mean can people get into My computer if they were able to hack into my website potentially so again, just like luke was saying that if you visit a website that is compromised in some way And there's malicious code on there and it's able to be executed on your computer The same is true of your own website And so if your website is compromised and there's bad code on there that hackers have done something That maybe downloads a file to your computer That can potentially give them access and so The two securities of both your own computer at home and your website I'd say are definitely connected now What a lot of hackers will do is they don't want the owner of the website to know that their website has been compromised Because it's more valuable to them that they Are able to collect data or infect visitors to the website because that represents a much larger Pool as opposed to just infecting the owner And so what they'll do is they'll make the malicious code only run When someone comes from a google search So with the website, it's possible to tell the entry point meaning How did someone come into the website? Did they type in the url directly or did they come from google yahoo being one of the search engines? And so what they'll do is once the hackers get control of your website They will inject this code that says Don't run anything bad if the website is typed in directly Only run this bad code if it comes from google Therefore a website owner is a lot less likely to know that it happened And i've seen this happen many times where someone's completely unaware that their website has been hacked because They don't go to google to find themselves. They type in their own website And so when they type in their own website everything looks fine only when someone comes in from a search Does that bad code get executed? But again, it goes in both directions So if your website is compromised it could potentially compromise your computer And if your computer is compromised it can definitely compromise your website If you've saved those logins in your web browser if you've saved them in a word document If you have a password manager and they get those credentials There's a lot of ways that it could cause major problems. So you want to keep both up to date Any security is only as strong as its weakest link Yeah, I mean I when I noticed that you know that somebody had you know Somebody successfully phished me it doesn't happen often because i'm usually pretty sharp about that But this one was like it was like it was it was a google thing And as you've got to update this and i'm like But what did I immediately do is I changed my google password So uh, which is I guess an important thing to do probably fairly fairly often Hackers are clever and that is something you can do is change your password on a regular basis But um utilizing people's own not nothing to do with um security in and of itself but utilizing people's Uh desire to to help to want to do the right thing is also something that hackers take advantage of so There's these um stories that you read about periodically where Hackers will want to get into a system that is closed off from the internet And so what they do is they take a thumb drive Which is um has its own internet access And they leave it next to the parking spot of an employee of a business that they want to gain access to What happens the employee goes out to his car sees a a thumb drive wants to be helpful Says oh, I want to return this to whoever it is. Let me see who owns it plugs it into their computer Suddenly their computer is compromised So um while it's wonderful to do the right thing you have to be careful And that's that's a a different version of phishing, you know, that's not sending an email That's actually a physical form of phishing. Yeah Once again, if you've got a question for luke truan on cyber security for your veo world or joe davis Who is talking about cyber security for your websites? Throw it in the chat room right now so we can get to him because right now We're going to take a break and we're going to try and get to some of those questions Right after these incredibly important messages so stay right This is the latin lover narrator from jane the virgin anthony meadows, and you're enjoying dan and george on the voice of her buddy shop Well, hello there I bet you weren't expecting to hear some big voiced announcer guy on your new orientation training for snapchat. Were you? This is virgin radio Well, okay. We're not that innocent. There's genes for wearing and there's genes for working Dickies because i ain't here to look pretty She's a champion of progressive values a leader for california and a voice for america. It's smart It's a phone. It's a smart phone, but it's so much more It's a the files are ready. Don't forget to pick up the eggs. What time is hockey practice? Check out this song It's the end of the road for rig This is your knee rig when hope is lost the i8 from bmw Who said saving the planet couldn't be stylish Hey, it's j michael collins. I bet you think i'm going to try and sell you a demo now, uh I think they speak for themselves, but I will give you my email. It's j michael at jmc voiceover dot com Now if dan will stop waxing this mustache for a minute. We'll get back to the show Well, hey there hero. We interrupt the award-winning shenanigans of voiceover body shop for this public service announcement 1.5 billion That's how many students there are in the world primary secondary college university 1.5 billion And that's how many were sent home several weeks ago along with the 90 million teachers and professors who teach them And as they left those teachers and professors were all told by their principals and deans Hey, keep teaching your classes from home. Okay, you know how to do that What that facebook live thing and that youtube and that zoom thing you don't have to do that Don't you sure everybody does except Many of those teachers don't even know where to start What camera to use what microphone to use how to set up lights how to use zoom And what makes online classes different from in-person classes But I do I know how to do that I've been doing that for years and I thought well, maybe I can help so I spent day and night for the past few weeks putting together a course on how teachers can do all that and I figured You know what I'll sell it for 49 bucks. Anybody can afford 49 bucks, right? But then at the last minute I decided to do something different I decided to set aside the money and give it away for free So now through may 6th any teacher can have the course forever for free And I've got a favor to ask of you If you're a teacher Or if you know a teacher or two and with 90 million in the world who doesn't know a teacher or two Would you let them know about this? The course is available at teachyourcourseonline.com and I'm going to ask dan and george To make that link available on the v obs website and maybe Mention at a time or two on the air in and the notices that they sent out. Would you guys do that for me? Okay, great. The course again is at teachyourcourseonline.com Help me help teachers be heroes at home as well as in the classroom That's teachyourcourseonline.com Thank you very much We believe in creating fast mobile friendly responsive highly functional designs that are easy to read and easy to use You have full control no need to hire someone every time you want to make a change And our upfront pricing means you know exactly what your costs are ahead of time You can get your voice over website going for as little as 700 dollars So if you watch your voice actor website without the hassle of complexity and dealing with too many options Go to voicehactor websites.com where your vo website shouldn't be a pain in the you know, what? This is bill ratner and you're enjoying voiceover body shop with dan lennard and george widham v obs dot tv Which camera and we're back here on voiceover body shop. We're talking with luke truann and joe davis talking about Cyber security stuff. We just don't normally think about When we're you know, we're like oh send the email gotta go. Oh, here's an audition But we just don't think about these sorts of things, but george you had a bunch of questions I knew you would totally geek out on these guests So you've you've got some questions go for it Totally man. Oh, yeah My daughter was addicted to the movie home for a while the purple alien movie Um And in that movie there was the smart all the smart people all the smart guys They're supposed to solve all the problems, you know, and there are a bunch of aliens with giant brains plugged into the computer and they're Pulsating That's this room right now. This is what we're talking about here So um in terms of web web browsers are some browsers better overall Security wise than others that you recommend people use whether on mac or windows I know what i'm using but what do you guys recommend in terms of just general security on your web browser Sure joe you want to go first? So I think there's security from a standpoint of getting hacked and then there's security from a standpoint of privacy And so they're not exactly the same thing And i'll be curious to hear what luke has to say about from the security standpoint Duck duck go actually is a alternative to Google and they have their own web browser now, which supposedly Doesn't do any tracking so as opposed to The the company that you're using as your web browser and your search engine collecting all the information about you and building an advertising profile You want to avoid that and have a higher level of security? I would say duck duck go would be a good way to go. Um in terms of the the major web browsers meaning firefox chrome internet explorer which has became edge which is now rolling out to a new web browser that microsoft has uh personally, I like chrome the best But I am I and I think it's more secure in some ways But because it's so widely used it also gets attacked a lot But I'd love to hear what luke has to say on that and he may have a different opinion in terms of security So I'll piggyback off of what you said is that there is definitely a difference between general security and privacy And um, I do like duck duck go. Um, I personally use start page And they're both kind of similar with the way they handle results and so I would say um they provide a certain level of anonymity and and It's basically what interface you like the best in terms of that level But we're talking about search engines and right search web browsers, but so both No browsers are next right But search engines, you know duck duck go in the start page and there's you know, there's some other ones But those are the big ones. Um, you're you're anonymized until you click on the link Then they can track your ip and everything else about your browser and blah blah blah so That's when the browser comes in. Uh, my favorite browser is Actually typically chrome because it's the most compatible with modern day and I'll put that in parenthesis modern day websites and technologies What it still has an issue with only because they don't keep up with their technology as governmental websites So you have to be careful with that um But in terms of privacy The chromium based browsers are right now the best in terms of actual security there is some times that you can do they the hackers can do sandbox escaping And that's been some of the vulnerabilities that have dropped in the past. And so they've done patches for that. There's pretty bad vulnerabilities for google chrome not too long ago that it affected pretty much everybody on the planet So joe, what are you gonna say? Oh, I was gonna say loop. Can you um define the difference between chrome and a chromium browser or chromium based browser? Yeah, sure. So a chrome A google chrome is what we all know is chrome Um google did uh, basically opened up their code basically the uh, their entire platform to open source community And said here's our code that we use for our our browser, you know, not the actual proprietary code But the general open source portion of it and said here build your own And so other companies have come up and built their own chrome type based browsers and it's called chromium at that point And another I guess a version of that would be the new microsoft edge browser that's coming out and then the brave browser would be another example of that All right. All right. Cool. Again, george just to clarify when you said those are search engines Duck duck go is a search engine or a star page, but it's also a web browser So they built their own um web browser that you can put on your mobile device or on your computer Right, does it have any gotchas in terms of like, well, you know, I'm using brave But the audio on my piece on my mac Doesn't flow. I can't use google hangouts for phone calls, for example Did you have any idea? Have you tried that with duck duck go on a mac? I know it's pretty specific I I have not tried that yet, but um the um The browsers that you mentioned like brave, for example, it does go through an encrypted channel called the tor network Which is part of the I guess technically is part of the dark web the deep web whatever you want to call it And so because it's encrypted it probably doesn't pass all the necessary traffic I haven't done the specific research on that yet, but I might now since you asked the question Go to it All right, another one. Um, I have a few more but i'm going to will it down because we are getting some audience questions too um Let's see And password managers, I've mentioned last pass you guys find those a really really smart idea using one of those past password managers So I have some kind of mixed feelings on those. Um, yeah, they're kind of good And they're kind of Not so great. I won't say bad because they do work well when there's not a vulnerability that you can just hack right into it um But it's kind of the same philosophy of putting all of your eggs in one basket, which I don't really like to do Um, it is okay. I'll put an asterisk there. It is okay to say use, um A password storage Program that offers a multi-factor meaning That when you type in your password it sends your phone a code then you have to type in the code I was going to actually ask about two-factor authentication or multi-factor too I I'm not using it much because it because of the it seems daunting to get everything using that So what's your favorite tool? That would be my last question. But what's your favorite tool for getting multi-factor? authentication happening Well, there's multiple tools depending on what platform you're on for example If you're using one login, then you're going to use their multi-factor You know for their particular website to log in which then would allow you to log into other websites You know behind the scenes then of course you're using like Microsoft Office 365 they have their own version of multi-factor as well And so and it goes so on and so on the banks have their own and so whatever system you're on You're going to use their multi-factor option I've seen a lot of people with password managers Where they they keep all their passwords in there But then the password for their password manager is just stored in a regular text document And so as Luke said, you're putting all your I someone basket and then that's sitting out there. So I I think password managers are only as good as Their system plus your ability to protect your credentials. So if you're going to leave those credentials out in any way Then I would say they're not a good idea They are better than just storing all your passwords in a regular document but Storing your stuff in a encrypted document or at least you're if you're going to write your last pass or whatever password manager you use those credentials Keep those encrypted too if you're going to store them anywhere And some of these password managers do require Two-factor authentication even to use them So and I would say if they give you that option to do that because Yeah, it's maybe a little bit of a pain in the neck and a little bit of an extra step But it gives you that much more security I realize already that I'm using last pass and and any time I'm using last pass I do have to go through a An unlock process to use it. So me too. I'm I'm usually I'm usually trying to remember my Okay, it all remembers most of my passwords, but I can't remember the password for last pass There's a trick to that. Oh good. Good. I was gonna say mine mine is a really mine's a sentence But it's just a sentence I created a long time ago and for whatever reason at the time it was easy to remember We'll tell you how good it is. What's the sentence? Your mother is a No, but you know coming up with a sentence can be sometimes a lot easier to memorize way harder to To hack right? Absolutely. Yeah. Yeah, definitely. Yeah, just a quick note with two-factor authentication A lot of in fact both now google with android and apple with the iphone Allow you to check your text messages online, right? And so if someone gets access to your online credentials They could even get around the two-factor authentication because they could receive The the factor online, you know the the additional code or whatever it is and then intercept it and punch it in So even using two-factor is not unbreakable That's right. And I'm sure somebody out there in the audience is thinking well There's a vulnerability about the google password Second, you know the multi-factor authentication app. There's a vulnerability against that and somebody can hack it and that's true There has been but they did patch that And but that's another way you can easily get into your accounts is that you can have these different authentication apps like microsoft has one and then when you log in it sends your Phone a message and it doesn't give you a code, but it says approve or deny And so you don't have to worry about the code. You can just kind of click your phone and go boom. Yes. I'm in So that's another way to do that and then all right keeping track of passwords There's a couple ways you can figure out if it has been involved in a public breach Have I been pwn.com? Yeah, that's a good one as well. And then there's a google extension you can put in there Which also searches public breaches Oh boy, it gets scary after a while. Yeah, sometimes ignorance is a little bit blissful just a little bit Here's a question from a fred norse about file virus scanners So a lot of these other ones that you've we've heard about a lot of them are free Like avg avast and malware bytes Do you feel like any of those are they any of those effective? So in terms of effectiveness, um real-time scanning is not usually a feature in the free version You get a trial with a fully functioning, you know A browser protection, you know real-time scanning and some other features But as soon as that trial is down and finished It's not doing any real-time protection. So it's not really going to help you in terms of like a real-time attack Either in the web browser or if something actually gets in your temp files and tries to run Um, but as a standalone scanning app malware bytes has always been the go-to Uh, basically for cleanup when somebody does have a potential issue So you kind of get what you pay for in other words, you know And also not all antivirus programs deal with malware or adware vice versa So you want to make sure that just because you have a program doesn't mean you're covering all of those bases and then there's also Firewall there's all kinds there's different levels of security and different types of malicious things that can be done So, you know a tracking cookie which tracks what you do online Is not nearly as malicious as something that's trying to steal your browser passwords, but it's still tracking you So you have to figure out what level you're comfortable with That's right. And if somebody does get on your system, they can actually um And let's say you're logged into your bank, for example And somebody did get on your system and you're still logged into your bank They could actually take that bank session cookie and use it again to get into your account All right, we got potentially. Yeah, we got one last question here from Dominic Carlos He says I've heard Joe talk about wanting your website host to be based in a server in your country Why is that and are there more security vulnerabilities with hosting your website out of country? Very good question So there are various reasons and this actually I'm really glad he asked this question because I want to talk about cds also Uh, so there's a SEO and also talent seeker reason to have your website hosted in the country where you want to get hired And that's a little bit different than the country where you are physically located So the reason to have it in the country where you're physically located is you probably are in the same time zone If you need to call their support you can You speak the same language Etc, but the reasons to have your website hosted in the country Where you're trying to generate business Is that it will probably load faster because it's being served from a server there so just physical location of the server being in that area is helpful and then also Google is aware of where your website is hosted in what country and what country is being served from and Although we don't know everything that goes into google's algorithm We can be pretty sure that google is going to give some sort of benefit to a website That is geographically targeted towards your audience where you're trying to reach them And so I would say there are good reasons to host if your target market is the us then host in the us There is something you can use called a cdn or a content delivery network Where you run your website through this cloud-based software and then it helps protect against security Problems doesn't hundred percent, but it helps protect, but it will also Depending on which one you use Serve it from the location They have servers all over the world and it'll serve the website from the location Closest to the person that's requesting the website So it really doesn't matter where your website's hosted It matters that your cdn has a location in that place CDNs can be free. They can cost money. It is a good one is generally a small added expense So it depends on how important these things are to you, but that is a potential option Alrighty and on that note, we are sorely running out of time here But I wanted to get a couple of addresses in there first off Luke the web address for Your newsletter once again It's the vox roundup.com. Okay. Yeah, it's https Ah, you have to put that in there. Make sure you put that in there I just typed the vox roundup.com into my browser nothing special and it came right up outstanding Good to know just the https. Yeah Make sure you would imagine that in there and joe, of course we can find you at www.voiceactorwebsites.com All right Well guys, thanks for being with us tonight And uh, I can't wait to start reading this and going. Oh, I know what you're talking about All right interesting. All right. All right. Well, george and I will be right back to wrap things up right after this This is anthony menders. You're watching voiceover body shop Your dynamic voiceover career requires extra resources to keep moving ahead Now there's one place where you can explore everything the voiceover industry has to offer That place is voiceover extra.com Whether you're just exploring a voiceover career or a seasoned veteran ready to reach that next professional level Stay in touch with market trends coaching products and services while avoiding scams and other pitfalls Voice over extra has hundreds of articles free resources and training that will save you time and help you succeed Learn from the most respected talents coaches and industry insiders when you join the online sessions Bringing you the most current information on topics like audio books auditioning casting home studio setup and equipment marketing Performance techniques and much more. It's time to hit your one-stop daily resource for voiceover success Sign up for a free subscription to newsletters and reports and get 14 bonus reports on how to ace the voiceover audition It's all here at voiceover extra.com. That's voiceover x t r a dot com From voiceover essentials.com. It's the relationship savior the multicolor led vo recording sign Not just a stock on the air or recording sign. It's our exclusive voiceover recording sign This brilliantly lit led 20 color beacon tells everybody at home, which is currently everybody. Hey, I'm auditioning recording podcasting narrating or broadcasting here and a few moments of relative quiet would be very much appreciated What's more the wafer thin remote control lets you choose a multitude of options from color to brightness flashing to fade in and out You can even set up your own personal codes red means i'm recording blue playing back green It's a wrap plug in the seven foot long cord and hang it on a door knob or wall hook using the included chain For voice workers silence really is golden and gold is one of the 20 colors you can choose from Order yours now for just $69.95 from voiceover essentials.com. That's voiceover essentials dot com It's time to talk about our sponsor source elements the creators of source connect Which is probably something by now if you're watching this show you've heard of Source connect is a very popular tool for connecting your studio to others around the world And it's never been in more demand than it is now So if you haven't already if you're one of the few remaining voice actors who haven't done this head over to source dash elements dot com and sign up for a 15 day free trial But I will say this there's a little bit of a learning curve to get it up and running So Before you stumble around on their website if you can't find your way through sometimes it's a little daunting um, I did a tutorial on this and it's at george the tech s c Slash sc for source connect you can head over there and check out this tutorial video It's about an hour long. It covers a lot of ground But it'll get you oriented on setting up an iLock account And setting up and installing source connect standard for the first time That's the version that you need as a voice actor to be compatible with all the professional studios and engineers Out there that use source connect. You must have source connect standard So get yourself set up get your trial license running So you can be ready to go and understand how it works and have all the little Details out of the way. So when you're asked do you have source connect or your agent says do you have source connect? You can actually say yes So get ready and be prepared and get signed up with source connect. We'll be right back to wrap this up. Thanks first This is anthony mendez you're watching voiceover body shop There she goes. All right, and we're back Uh I'm sorry. My eyes are rolling to the back of my head every time I people start talking about this stuff. It's like whoosh But hopefully the the vox roundup will make things a little more understandable for me I definitely think you want to subscribe to that newsletter Dan. I definitely and I think you all should too Who are our donors of the week? We've got donors. We've got donors We've got lots and lots of donors as usual. We have shana pennington baird lee pinney Don griffith martha con Dominic carlos craig gullsby pat kennedy michael curns and christy berns a couple new names in that list. Thanks for You new donors and thanks especially to all the recurring Subscribers who uh did the little subscription option on paypal on the website. We appreciate it every little bit Helps now next week on this show. We're going to do tech talk number 33 Believe it or not. We got a re-rack for that. So if you got questions toss them in the chat room and email them in because We love getting questions from people Uh, also, you don't have to show us your booths right now because we're gonna be in this in this magnificent studio Until we all get to be together again, and then we'll start showing booths again But send them in because there's some pretty interesting booths that we've been seeing and we've been seeing a lot more of them lately since we've been Talking to people in their booths So it's kind of interesting. We have all righty. Well, we need to thank our sponsors like harlan hogan's voiceover essentials One of the others that we should talk about right now, but i'm not looking at the script voiceover extra elements voheroes.com voice actor websites.com And jmc demos all righty and the dan and marcy lendard foundation for the betterment of live and recorded webcasting Jeff holman on chat room duty tonight and our technical director joining us all the way from somewhere else in burbank sumer lino who Keeps it running How we do this we don't know but it seems to be working. So I guess we'll just keep doing it for another nine years Anyway, that's going to do it for us tech talk is next This is not an easy business. Look at all the weird stuff you got to deal with now cyber security But we're here to talk about it. So join us each week here on voiceover body shop. I'm dan lendard And i'm george wittem and this is voiceover Body shop or vo b s See you next time kids Thank you