Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:00):
This is a podcast from wor Now more of the
wr Saturday Morning Show and Larry Minty Welcome back. Last
week we found out that the Iranian military hacked the
Trump campaign. Last year, China hacked the US State Department.
These cyber attacks happen every single day. How can this
(00:22):
country protect itself? How can we protect ourselves? Let's ask
David Wolfe, vice president of Jess Solutions, a cyber security
expert who helps protect American companies from these attacks. David,
thanks so much for talking to us today. I really
appreciate your time. Let me ask you a question. There's
(00:43):
been recently a cyber attack that made news, the Iranian
attack on the Trump campaign. That follows earlier this year
and last year when China attacked the State Department, a
cyber attack on the State Department. It leads to the
question how vulnerable is our government to these cyber attacks?
Speaker 2 (01:05):
We all are, including our government. There was a recent
attack against Microsoft as well, Microsoft as well that shows
what these attacks do. The common attack they're doing right
now is that d DOS or denial of service, which
means they bombard our servers with its web servers and
(01:26):
with attacks from a lot of different devices, things that
we don't even realize, like our cameras, are all these
IoT devices that we've connected to the Internet become attack platforms.
So yeah, this is not something that's going to end
anytime soon. And it's kind of a back and forth
(01:47):
between our cybersecurity experts and THEIRS in terms of protection
and prevention versus them keep doing it. So it's going
to be an ongoing cyber warfare for many many years
to come.
Speaker 1 (02:00):
Saying ongoing side cyber warfare, So do you believe our
government is conducting similar attacks against other governments?
Speaker 2 (02:07):
We don't admit it, but I'm sure that it's It's
part of our We have a whole branch of the
military which is our cyber cyber force. And yeah, I
think that it's going to continue, both both sides of it.
Russia not happy with US supporting Ukraine and the things
that we're doing, so we see attacks from from there
(02:30):
and as well as what we see from China obviously
from Iran is ongoing North Korea. That North Korea is
always trying to take our money since we've put so
many limitations on them for trade and everything, that they're
one of the people that are doing the ransomware attacks
and the theft of American funds. We're talking billions of
(02:53):
dollars a year. This is not jump change. So and
they're being successful, so they're not going to stop because
is it is working. We have to be It is scary,
but you have to be vigilant. I mean, there's you
read about them every day, and I think I think
we're starting to get a little numb to them. I
think a lot of people are starting to hear about
it every day and say, well, what can I do
(03:14):
about it? There isn't much you can do about those
large scale texts, but you can be vigilant with your
own information and the way you portray yourself on the internet,
the way you share information on the internet. The social
engineering that they're doing, this new IAI fake they can do.
They can really do a lot of things today with
(03:35):
the new technology for very low cost. So yeah, it's
going to get harder and we're just going to have
to get a little bit smarter and a lot more
suspicious about anything. I think that people are still too gullible.
People are making donations to political campaigns and they're they're
probably on fake websites. Don't even know it. The money's
not even going to the campaign kind of that they want.
They're clicking on an AD that says, you know, I
(03:57):
don't care whether you're a Democrat, Republican or not. You
could be clicking on an ad that's not even really
run by that campaign, and uh, you know, they're they're fate.
They're doing this to take our money and and and
really the interference with their election. I think it's just
that I don't think they care about which candidate wins.
I think they just like us to be in turmoil.
(04:19):
I think it's they they think that if we're not
paying attention in one area because we're worried about this,
that we take our eye off of something else. Because
I don't know if they care about which who becomes
the president. It just seems like their just goal is
to make the week in America by making us divided.
And I think they're they're they're helping that cause. I mean,
(04:39):
I don't know when I talked to two other Democrats
Republicans that we're really you know, or friends and family
that were really not asking or wanting the same things
for our family and our kids and our and our
and our work and everything and that sort. I think
we really are a lot closer on on on topics
than we think. But they just sow the divine by
(05:01):
all this propaganda and these posts and these spots they
put up. So these Internet posts and things they do
are really just to make us more really kind of
go against each other. It's you know, dividing us and
conquering us.
Speaker 1 (05:16):
That way, just kind of causing chaos. We're talking to
David Wolfe, vice president of Just Solutions. He's a cybersecurity
expert who helps protect American companies from these attacks. Let's
talk about American companies for a second. I interviewed a
couple of years ago the head of Homeland Security in
New Jersey, and when I asked about cybersecurity attacks in
(05:39):
New Jersey on companies, he said, oh, we get a
dozen a day. He said, this is a constant. It's
always happening. And I said, why don't we hear about it?
He said, because they don't want them reported. That's why
it's important for us to reach out and say we
won't tell anybody. Is that what you deal with?
Speaker 2 (05:57):
Yes, it happens all the time. We have customers call
us probably weekly that have been compromised, very very common
compromise now is a business email compromise. They call it
our beec where they fish you and they basically get
into someone's email account within your company, and then they
actually monitor their emails flowing through your business. And then
(06:21):
when they see you having a conversation with a vendor
about paying a bill or making a purchase, they alter
payment information and they basically alter where the money goes
from ah standpoint, or they ask for pre payment on
something that normally you don't do. It's amazing how many
small businesses, very smart people that have fallen for this.
(06:44):
There is a customer recently that didn't have any cybersecurity
protection from us. They really were just what we call
a break fixed customer calls when they have a problem.
And sure enough, they had a problem because someone clicked
on a link from an email and they email back
to the person saying, well is this legitimate and the
person said yes, So they send them the multi factor
(07:06):
code and they got into their computer and before they
knew it, they were completely ransom And when I mean ransom,
what that means They encrypt your computer, your server, all
your information and the only way to get your information
back is to re load it from a backup or
pay the ransom. And the government doesn't want to pay
in the ransom because we're just perpetuating the problem every
time we pay a ransom. But sometimes these companies don't
(07:28):
have good backups and the only way to get their
information back is to pay the ransom. And you might think,
do they actually take the money and give you your
information back? About fifty to fifty they do. They are
running a business, believe or not. They even have a
help us to help you pay the ransom. So oh yeah,
it's crazy, like you can call their number and they'll
help you. They'll help you pay the ransom in bitcoin
(07:51):
or whatever. There's all these scams about getting I've had
owners of companies tell me that, Yeah, one of the
employee says, hey, you know, I'm a Walmart getting those
gift cards you want me to get. And then and
the owner's like, well, what are you talking about gift cards? Well,
I got your email. You said you wanted me to
pick up some gift cards you want to give out
the employees, So I was going to go pick them up.
You name it. That They are doing a lot of
(08:13):
trickery and Unfortunately, this has turned into a multi billion
dollar business and some statistics say it's it's reaching trillion,
and cybersecurity fraud is almost like the fifth or sixth
largest venue country, right up there with Japan in terms
of expenditures.
Speaker 1 (08:31):
Yeah, and that cross gets passed on to us, so
it cost all of us, It costs the American economy.
We're running out of time, but real quickly. If we
have a company listening that wants to get hold of
you and your company, how do they get a hold
of you.
Speaker 2 (08:44):
We're on the internet at justink dot com, just solutions
dot com, same same site. You can come to us
and we're happy to do an assessment for you. The
small businesses is probably six percent of the fraud going on.
So you hear the big stories in the news because
it affects millions of people, but everyday small businesses are
being in fact and individuals as well. So you really
(09:06):
got to be vigilant and stop being so trusting and
pick up the phone people and verify that it really
is truly the person you know or your bank or
whatever that's asking for this information. Don't click on links.
Do not click on links on your cell phone from
these text messages that you get, they are just trying
to get into your equipment, into your computers, into your phones.
Speaker 1 (09:29):
All right, David, thanks again. It was great talking David.
Speaker 2 (09:32):
Thank you, Larry appreciate it.
Speaker 1 (09:34):
Cybersecurity expert David Wolfe, vice president of Just Solutions.
Speaker 2 (09:39):
This has been a podcast from WOOR