Jeremiah Baker: Cyber Security

Jeremiah Baker: Cyber Security

Released Thursday, 2nd January 2025
Good episode? Give it some love!
Jeremiah Baker: Cyber Security

Jeremiah Baker: Cyber Security

Jeremiah Baker: Cyber Security

Jeremiah Baker: Cyber Security

Thursday, 2nd January 2025
Good episode? Give it some love!
Rate Episode

Episode Transcript

Transcripts are displayed as originally observed. Some content, including advertisements may have changed.

Use Ctrl + F to search

0:00

This is Mike McCallow. It's the

0:02

inventor and author of profit first.

0:04

And I have extraordinary news for the

0:06

first time ever. The app is

0:08

here that automates profit first

0:10

entirely around the principles I

0:12

created. I have been involved in every

0:14

stage of the development of this

0:16

app. It has all of the

0:19

principles of profit first, plus all

0:21

of my newest findings. Your business

0:23

is about to be permanently profitable.

0:25

Get the app today. Today,

0:29

right here, right now, this

0:31

is the moment that you

0:33

will finally say, I'm growing

0:35

my accounting practice, and you're

0:37

going to discover exactly how,

0:39

right here, right now, on

0:41

the Grow My Accounting Practice

0:43

Podcast. Welcome back, everyone. I'm

0:46

Ron Saharian, co-founder of Profit

0:48

First Professionals. And I'm Liz

0:50

Sporn, a guide here at Profit First

0:52

Professionals. And you listeners are listening to

0:54

GMAP where we teach you step by

0:56

step how to grow your accounting, bookkeeping,

0:59

and coaching practice. And we're going to

1:01

give you an action that you can

1:03

take right away to grow your practice.

1:05

It's the GMAP Now task. Actually, it's

1:08

not the GMAP Now task because Mike

1:10

is not in the studio today. He's

1:12

still traveling, but he'll be back on

1:14

the next episode. So, Mike, thanks for

1:17

traveling. It's Fred in the Gospel of

1:19

Prophet Purse. And also, we got a

1:21

great guest today. I'm really excited

1:23

about today's guest. Jeremiah Baker is

1:25

going to be joining us, sharing

1:27

a little bit about cybersecurity. And

1:29

of course, thank you guys so

1:32

much for listening. Don't forget to

1:34

subscribe, like, comment, and turn on

1:36

your post for notifications so that

1:38

you never miss an episode. Never,

1:40

never miss an episode. I know we're

1:42

closing in on our 500th episode, Ron.

1:44

Yeah, in this episode today, this

1:47

is brought to you by Impressia

1:49

Bank. Check out Bank Impressia, guys.

1:51

They're profit-first certified, profit-first friendly. They

1:53

do the allocations, all great stuff,

1:56

and they're going to be coming

1:58

up on next episode. or in

2:00

the future episode. So I'm excited

2:02

about that as well. Me too.

2:04

Yeah, Robin and Mary Kate, they're

2:06

just fantastic humans. Great job. So

2:08

wow, Liz, today, technology hasn't been

2:11

on our side, has it? You

2:13

know what though? You know what

2:15

has our Gen X sensibilities of

2:17

we're going to MacGyver this until

2:20

it works. So for all of

2:22

you listeners, we are now coming

2:24

to you live from Zoom, which

2:27

will be the first time we've

2:29

ever done it. So we'll, we'll

2:31

see how this episode works. So

2:33

Liz and I can see each

2:36

other. We can see our guests,

2:38

but it's cameras off because we

2:40

have low bandwidth. So normally, you

2:42

know, and this is, this has

2:45

got to be fun. Everybody's not

2:47

even solar flares. Like, didn't we

2:49

have solar flares last time we

2:51

were recording? And there were just

2:54

things wrong and retro, mercury, retro

2:56

grave, whatever that. Mercury is always

2:58

in retrograde. I feel like. So

3:00

it's either that or solar flares.

3:03

Those are the two reasons. All

3:05

right. Or. Or you've done something

3:07

really bad Ron and it's karma.

3:09

It's not me. I'm an angel.

3:12

It's whatever you have done My

3:14

life is karma. All right, let's

3:16

talk to Jeremiah. This is our

3:19

second time trying to talk to

3:21

this gentleman, and I'm so excited.

3:23

Jeremiah Baker, author of Confessions of

3:25

a Hacker, has spent 17 years

3:28

identifying cybersecurity weaknesses for major clients

3:30

like casinos, banks, and corporations. He's

3:32

been featured in major outlets like

3:34

the New York Times, Wired, and

3:37

he shares his real world insights

3:39

on how cyber criminals operate and

3:41

how stay protected. And I'm still

3:43

curious because one of his unique

3:46

talking points, the unique thing about

3:48

Mr. Baker is he grew up

3:50

in a giant family of 56

3:52

foster siblings. So I would like

3:55

to talk about that. And without

3:57

further ado, welcome, Jeremiah. Good morning,

3:59

Liz. Good morning, Ron. Thank you

4:02

for making a second attempt here.

4:04

And I do believe it may

4:06

be Mars in retrograde. Let's blame

4:08

that. Oh, I'll take Mars. even

4:11

more. I mean, last time we

4:13

said it was straight-up hackers. The

4:15

hackers do not want you to

4:17

talk. I know. I think it

4:20

is a true story. I love

4:22

it. So Jeremiah, what are some

4:24

confessions of a hacker? Sure. Well,

4:26

the title is obviously a little

4:29

catchy, right? Yeah, absolutely. So basically,

4:31

the point of the point of

4:33

confessions of a hacker is 17

4:35

years of spending 17 years being

4:38

hired to hack into banks, casinos,

4:40

hospitals, corporations, and so forth. We've

4:42

seen the same things or similar

4:44

things happening over and over to

4:47

good people. And that bothered me

4:49

so much that I said, look,

4:51

got to sit down, write a

4:54

book, put these stories into a

4:56

book so that people will know

4:58

how they're being attacked and compromised,

5:00

taking advantage of. and then how

5:03

to prevent those same things from

5:05

happening to them. And that's because

5:07

most of the time folks don't

5:09

know how these things are happening

5:12

or what's even happening until it

5:14

does happen. And then it's too

5:16

late oftentimes to have a remedy

5:18

for the attack or for the

5:21

cybercrime. So really, Confessions of a

5:23

Hacker is an awareness book of

5:25

stories. uh, with attacks and. Including

5:27

breaches and wire fraud and theft

5:30

and how to not have those

5:32

things happen to you or your

5:34

organization. Those, those stories make me

5:37

sweaty. My mom, I can't really

5:39

either. Are we also talking about

5:41

personal experience, Jeremiah? Have you been,

5:43

you know, maybe before you got

5:46

into this, do you have any

5:48

experience or family experience by being?

5:50

Oh, sure. Yeah, maybe

5:52

not as much about hat well

5:54

a little bit of hacking but

5:57

mostly scams and that's what a

5:59

lot of these things are they're

6:01

really financial and disruptive cyber scammers

6:03

and criminals So it's like financial

6:06

fraud and things like that of

6:08

course have had things with with

6:10

websites being compromised which could be

6:12

considered a traditional hack and then

6:15

of course the identity theft stuff

6:17

and all of those kind of

6:19

things that that many of us

6:21

have experienced Yes, and the interesting

6:24

thing is over 17 years seeing

6:26

how things were pretty quiet back

6:28

in those early days and how

6:30

they've progressed in frequency and the

6:33

amount of damage that they have

6:35

on good people. Let's talk about

6:37

that because I'm no longer receiving

6:40

the emails from the Nigerian Prince

6:42

in order to, you know, give

6:44

him a hundred thousand and I'll

6:46

get five more back. How have

6:49

things progressed over the years? Where

6:51

are we today? And how can

6:53

the accountants, bookkeepers that are in

6:55

coaches listening to this, fortify their

6:58

organizations or even amplify their knowledge

7:00

to wade through this? Good question.

7:02

I think probably the best way

7:04

to answer that, especially from an

7:07

accountant's perspective, and honestly, it's everyone's

7:09

perspective. Um, maybe thinking about what

7:11

the bad guys, what the cyber

7:13

criminals are after and what they,

7:16

what they want to get. And

7:18

I can share a few examples

7:20

with you that have continuously seen

7:22

over these, over these years that

7:25

happen. Um, a lot of times

7:27

what bad guys are after one,

7:29

of course, it's money. Like they

7:31

want to do some kind of

7:34

fun transfer fraud or including wire

7:36

fraud and a number of other

7:38

things so that they can siphon

7:40

money away from us. And or

7:43

our clients, but they also a

7:45

lot of times will also want

7:47

to do things like disrupt the

7:49

business Make it so that the

7:52

business can't function They may want

7:54

to hold you hostage per se

7:56

an extortion scam to try to

7:58

say hey I have this thing

8:01

of yours and or maybe some

8:03

negative information on you that if

8:05

you don't pay me I'm going

8:07

to make public that could hurt

8:10

you your business You don't want

8:12

the public to know about you

8:14

those things have become quite common

8:16

and And to be succinct one

8:19

of the things that I see

8:21

over and over which is basically

8:23

what I consider modern-day bank robbery

8:26

and and that's really just folks

8:28

getting into let's say an email

8:30

account or some kind of business

8:32

account for someone in the C-suite

8:35

be it like a chief financial

8:37

officer, CFO or a VP of

8:39

sales, someone that has the ability

8:41

to make decisions about money moving

8:44

around. And what the bad guys

8:46

will do is they will get

8:48

credentials either through finding them on

8:50

something called the dark web or

8:53

if there's been a major breach

8:55

and your username and password have

8:57

been and have shared publicly or

8:59

dumped onto the dark web. The

9:02

bad guys will get this information

9:04

one way or another. They will

9:06

then attempt to log into, let's

9:08

say, email accounts. And then they

9:11

start acting as if they are

9:13

the CFO and requesting things like

9:15

wire transfers, fund transfers, and things

9:17

like this. And or... um, redirecting

9:20

a purchase, like a major purchase

9:22

from a large client. And I

9:24

have a few, uh, stories about

9:26

those that I do share in,

9:29

in the talk, Confessions of Acre

9:31

and in the book, um, about

9:33

where things have happened. Like for

9:35

example, as CFO went on vacation,

9:38

someone had sat in his email

9:40

account for about three months or

9:42

so watching how he would transfer

9:44

funds to understand the rhythm. so

9:47

that when they did their attack,

9:49

it didn't look out of the

9:51

norm. They were more successful this

9:53

way. And again, this is the

9:56

modern day bank robbery situations, and

9:58

this happens a lot. So this

10:00

individual is on vacation and once

10:02

the out of office triggered,

10:05

the bad guys knew, okay, look,

10:07

he's going to be out of

10:09

the office for a little bit.

10:12

We are going to instruct someone

10:14

inside the organization that handles wire

10:16

transfers to transfer to a few

10:19

accounts. And that resulted in about

10:21

a $500,000 theft pretty quickly.

10:23

Oh my gosh. That's not uncommon.

10:25

And again, something like that could

10:28

have likely been prevented if that

10:30

CFO, for example, had something called

10:32

multi-factor authentication, which adds a second

10:34

step. They get a code to

10:36

their phone, to an app, or

10:38

SMS text message. Even if you

10:41

have the username password, they wouldn't

10:43

have been able to easily get

10:45

in and they may have moved

10:47

on to another target, the bad

10:49

guys being they. the criminals, but

10:51

he didn't have it. And that

10:54

resulted in them basically being able

10:56

to do whatever they wanted to

10:58

do in this particular case. And

11:00

that's an all too common scenario

11:03

that we've seen. over almost the

11:05

last 20 years. And as you

11:07

can see, that's not necessarily a

11:09

hack, like a highly technical thing.

11:12

It's something that could impact all

11:14

of us, but could have also

11:16

been somewhat prevented relatively easily. And

11:19

even if they did get into

11:21

the account with MFA attached, multi-factor

11:23

authentication, if there was another verification

11:26

method on wires, not being able

11:28

to easily be sent out without

11:30

another person saying, hey, did you

11:32

really intend to send it? here, and

11:34

that would have added an extra layer

11:36

for that wire to not be sent

11:38

out. So none of those things were

11:40

in place, made it very easy. Yeah,

11:42

well, as with profit first

11:45

profit first professionals, we're constantly

11:47

allocating money into various different

11:49

bank accounts on various different

11:52

days throughout the months throughout

11:54

the years throughout whatever. I'm

11:56

sitting here going holy crap.

11:59

How do would I identify

12:01

if somebody's already in the system

12:03

watching me and just waiting for

12:05

me to put on my out

12:07

of office email? But in addition,

12:09

right, we have close to 500

12:11

episodes of GMAP out there. So

12:13

my voice is out there. AI

12:15

is gonna take my voice. So

12:17

how is there anything I can

12:19

do today? To see if somebody's

12:21

snooping on us and yeah Yeah,

12:23

absolutely the first well given that

12:26

we're on a podcast you instantly

12:28

made me want to jump in

12:30

on your computer and take a

12:32

look You know not not a

12:34

funny situation, but that was my

12:36

my instinct. Yeah First things first

12:38

so I would have someone in

12:40

your IT department and or yourself

12:42

Go into first and foremost change

12:44

password on your on your account

12:46

So there's someone is logged in

12:48

and then if you have the

12:50

ability in whatever platform you're using

12:52

to log out all other users

12:55

Just completely make sure everyone's logged

12:57

out and then there are things

12:59

your IT team can do to

13:01

go in and look for things

13:03

like Have there been any rules

13:05

set up? Are there any hidden

13:07

folders or or messages being sent

13:09

out that are then hidden from

13:11

me and there's a whole kind

13:13

of operation that you would do

13:15

to do a cleanup on your

13:17

email account, which is relatively simple

13:19

for an IT person. But then

13:21

I would go back and apply

13:24

at the very least, apply the

13:26

basics, which are getting multi-factor authentication

13:28

with an authenticator app like Google

13:30

Authenticator or Microsoft's product. There's a

13:32

lot of them out there that

13:34

are trusted and you can look

13:36

them up so that you get

13:38

that extra code even if someone

13:40

does have your username and password.

13:42

and then of course having just

13:44

old-fashioned policies on how making a

13:46

little bit more difficult for money

13:48

to be sent around even if

13:50

someone does get the ability to

13:52

start making those requests but those

13:55

are the things I would do

13:57

like right away just to get

13:59

you in a good place. And

14:01

then, of course, there are more

14:03

advanced things that can get applied

14:05

to email, your email platforms with

14:07

filtering and, you know, all the

14:09

anti-mailware and all the checking. But

14:11

that's something that I would consider

14:13

a second step. First step is

14:15

to kind of go in and

14:17

do those initial diagnostics with your

14:19

IT team. Yeah, start with an

14:21

inquiry to your IT department to

14:24

say, hey, guys, just do some

14:26

snooping around. Make sure that there

14:28

isn't hidden messages, hidden folders. Yeah,

14:30

and and if it's helpful that's

14:32

exactly what we've done in recent

14:34

times where I was flying into

14:36

New York into the city and

14:38

When I landed I was set

14:40

to go for a board meeting

14:42

that day for one of our

14:44

companies in our portfolio and I

14:46

received a phone call just as

14:48

I was getting out of LaGuardia

14:50

saying hey I think I've been

14:52

attacked and it was a person

14:55

that runs a finance business working

14:57

with ultra high net worth individuals.

14:59

So you can imagine some people

15:01

worth hundreds of millions of dollars.

15:03

And he said they're getting emails

15:05

from me saying that that I

15:07

have this great cryptocurrency investment that

15:09

I found, and I would like

15:11

to share it with them. But

15:13

they thought a friend of mine

15:15

and a colleague, and I think

15:17

it was even a client, said,

15:19

hey, here's a screenshot. This doesn't

15:21

seem like something you would do.

15:24

Is this really you? And he

15:26

said, it's not, but I don't

15:28

see. I'm not sending these emails.

15:30

But they're coming from me. How

15:32

is that happening? So we jumped

15:34

on with his staff, his IT

15:36

staff, and started digging around inside

15:38

of his email account. We could

15:40

see that, of course, someone was

15:42

logged in acting as him. And

15:44

they had set up something called

15:46

email rules to hide the emails

15:48

from him. So he wasn't seeing

15:50

that traffic of emails flying around.

15:53

Luckily, they had not changed. the

15:55

password on the account. He also

15:57

did not have multi-factor authentication MFA

15:59

on his account for logging in

16:01

and we got really, really lucky

16:03

because we were able to remedy

16:05

the situation within a few hours.

16:07

We had him in pretty good,

16:09

a pretty good situation, but it

16:11

could have gone wrong. If they

16:13

had changed, what if they'd changed

16:15

the password and that, and now

16:17

we can't even log in, that

16:19

would have added an extra layer

16:21

of difficulty to, to fix the

16:24

situation. Not impossible. That's where I

16:26

went. I was like watching the

16:28

fact that they can just immediately

16:30

change the, the. the log in

16:32

and now you're done. It's over.

16:34

Yes. And that did, yeah. And

16:36

that did, that actually did happen.

16:38

I know I'm full of stories

16:40

here, but that did happen. And

16:42

hopefully they're helpful to folks listening

16:44

because that did happen to another

16:46

individual that was an ultra high

16:48

net worth person. He was on

16:50

answering work email in his office.

16:53

He received a message on his

16:55

Instagram account from a contact saying,

16:57

Hey, check out these vacation photos

16:59

that we have. He clicked the

17:01

link. Just not knowing he was

17:03

distracted doing something else click the

17:05

link and what that did is

17:07

there was some malware in the

17:09

Link it took over his account

17:11

in the attacker the cybercriminal then

17:13

changed his username and password and

17:15

started to send out Again cryptos

17:17

investment scams to his contact list

17:19

and it became extremely difficult to

17:22

remedy And again, this talks about

17:24

social media where it's just another

17:26

part of what we would call

17:28

your attack surface, things that the

17:30

bad guys can go after or

17:32

your footprint. And what they did

17:34

then was they changed everything, contacted

17:36

Instagram, hey, can you help? One

17:38

of the remedies, at least at

17:40

that time, this was about a

17:42

year and a half ago, was

17:44

they need to see, they do

17:46

kind of a face scan from

17:48

your phone. Yeah. Make sure that

17:50

it's you. Well, this person never

17:53

put any pictures of himself up.

17:55

being cautious because he didn't want

17:57

to be seen on Instagram. So

17:59

it took a month or more

18:01

to get remedy because there's no

18:03

kind of at that time there

18:05

was no helpline or anything like

18:07

that. It was kind of an

18:09

automated account recovery process. Yeah. And

18:11

he had a very difficult time

18:13

fixing that and and that was

18:15

in particular case a crypto scam.

18:17

It could have been they could

18:19

have sent anything with access to

18:22

that account. So, yeah, it's it's

18:24

scary. You're telling that story. I

18:26

think that's what happened to profit

18:28

first on Instagram. Because we had

18:30

to go like, as you're saying

18:32

that, I'm like, Oh my gosh,

18:34

that's what happened to us. Our,

18:36

our entire Instagram was shut down

18:38

for profit first professionals about a

18:40

year and a half ago. And

18:42

we didn't know why we didn't

18:44

do anything. And they asked for

18:46

a picture of the user and

18:48

it's me. Like I'm the main

18:50

person in there. I'm not on

18:53

the website. I'm not on Instagram.

18:55

We had some reels, but it

18:57

really wasn't me. So they said,

18:59

Nope, you can't get back in.

19:01

You don't have any authority. You're

19:03

not, you're not even real. I

19:05

don't know who you are. As

19:07

you're saying that, I was like,

19:09

Oh, we were hacked. We were

19:11

hacked. Right. We, and they, we

19:13

don't know why they took it

19:15

off. They, you know, we got

19:17

logged out or locked out. It's

19:19

so crazy. Um, so I just

19:22

have a question. So. Jeremiah, your

19:24

stories are horrifying. So thank you.

19:26

It is almost Halloween here as

19:28

we're recording. What are we a

19:30

day away from Halloween? It's timely,

19:32

right? So it's mischief. Nice. These

19:34

are helpful. They are very well.

19:36

And so here's my question. Our

19:38

audience is primarily made up of

19:40

accountants and bookkeepers and financial coaches

19:42

and their whole business. So when

19:44

you said, you know, what are

19:46

they after? Money, disruption, extortion, all

19:48

those things. Our. members in our

19:51

audience, they hold a lot of

19:53

information. Many of them have teams

19:55

and many of them have teams

19:57

who are overseas. So there are

19:59

so many levels of complexity in

20:01

terms of having an overseas team,

20:03

having access to all of your

20:05

financial data, banking accounts, routing numbers,

20:07

all those things. What are some

20:09

of the the most basics aside

20:11

from multi-factor authentication and the, you

20:13

know, authenticator apps, what are some

20:15

of the things that financial firms

20:17

specifically need to, to know? And

20:19

one of the ways you wrote

20:22

down based on what you're saying

20:24

is it's efficiency versus safety. And

20:26

so like in your rubric of

20:28

decision-making, efficiency has to be last

20:30

to me in this universe and

20:32

it has to be safety number

20:34

one. So what are some, what

20:36

are some things that financial institutions

20:38

can do? Sure. Sure. That's a

20:40

good question. So I think the

20:42

way that I would like to

20:44

frame this is think about it

20:46

from the worst case scenario and

20:48

then kind of reverse engineer all

20:51

the way back. So speaking about

20:53

this with folks, it's always what

20:55

are you willing to tolerate? So

20:57

if someone were able to get

20:59

in and essentially, let's say you

21:01

get hit with ransomware, for example,

21:03

and it shuts down all your

21:05

systems, are you all okay with

21:07

that? Can you survive? Or would

21:09

it be better, for example, if

21:11

you had all your data backed

21:13

up and segmented and properly backed

21:15

up, encrypted, and also practice restoration

21:17

exercises so that you can then

21:20

stand everything back up without paying

21:22

a ransom, for example? Which one

21:24

would you pick? I would think

21:26

most people would say I'd rather

21:28

be able to restore my business

21:30

pretty quickly versus not having that.

21:32

And unfortunately, a lot of times

21:34

folks don't have proper backups that

21:36

are encrypted and segmented and go

21:38

through restoration exercises so that even

21:40

if they were compromised, they could

21:42

get back up within a reasonable

21:44

period of time and be functioning

21:46

again without any loss. So to

21:48

that point, to be a little

21:51

bit more specific. I would look

21:53

at the worst case scenario, reverse

21:55

engineer from there. What am I

21:57

willing to tolerate? And then I

21:59

would put Of course, the basics

22:01

in place, which is making

22:03

sure that every account has

22:05

multi-factor authentication on it, preferably

22:07

with an app versus text

22:10

messaging because, yes, phones can

22:12

be compromised and ported out

22:14

and people can intercept your... text

22:16

messages and so saying things like

22:18

that. So scary. Sorry. Sorry. I'm

22:21

sorry. My phone is the only

22:23

thing that is here. It's here

22:25

for me. My concern is now

22:28

as I'm looking into this new

22:30

fancy fancy camera that tracks all

22:32

my movement moves all over the

22:35

place and everything. I mean, am

22:37

I not? I don't I don't

22:39

know if I have, you know,

22:42

special protection for this. camera,

22:44

right? Do I need special protection for

22:46

this camera or is this I don't

22:48

even know anymore? Correct. Yeah. And

22:50

that's the thing that's the thing with

22:52

video and and maybe what I'll do because

22:55

I feel like I got a little bit

22:57

rambling. So I'm going to go back one

22:59

step and just say the basics are make

23:01

sure you have understand all

23:03

the things that exist in your

23:06

environment, your footprint, what can be

23:08

attacked? How are they attacking such

23:10

as the fund transfer fraud? business

23:13

email account, business account takeovers

23:15

and these types of things,

23:17

have those basics in place,

23:19

but then also make sure you

23:22

understand who, from a permissions

23:24

perspective, who has the ability.

23:26

to send and receive finances, for

23:28

example. You need to know that.

23:30

You need to have policies in

23:33

place, cybersecurity policies. Have second steps

23:35

in your fund transfer process so

23:37

that even if someone got a

23:39

hold of your email account or

23:42

had the ability to request a

23:44

wire, it's not so easy to

23:46

just say, please send it and

23:48

then it goes out. There's an extra

23:50

step that gets involved. preferably human to

23:52

human, if not through a known phone

23:54

number where you can pick up the

23:56

phone, call them, you know, send them

23:59

a letter in the mail. Whatever you

24:01

need to do, but just to

24:03

make sure that it's not so

24:05

easy For the bad guys and

24:07

if this is helpful What I've

24:10

seen and heard from cyber security

24:12

insurance providers those who end up

24:14

getting a call post event is

24:17

that about 80% of the claims

24:19

that they're receiving come from only

24:21

a few things and that is

24:23

One, it's these email and business

24:26

account takeovers where the bad guys

24:28

are able to get in and

24:30

access our emails or any system

24:32

that we have be it a

24:35

CRM, an accounting platform, whatever that

24:37

is, and then do bad things.

24:39

And then that then leads to

24:42

the next bit, which is fund

24:44

transfer fraud, which is FTF. And

24:46

that usually is a result of

24:48

an account takeover attack. That's about

24:51

60% of the claims from what

24:53

I read recently. And then the

24:55

remaining 20% in that 80 think

24:57

ransomware. So people are getting attacked.

25:00

Everything's getting frozen down. The bad

25:02

guys request money, crypto, some form

25:04

of payment in exchange to send

25:07

a key to unlock. the files

25:09

so that the company can get

25:11

back up and running. And then

25:13

the remaining 20% is an assortment

25:16

of things such as denial of

25:18

service attacks, traditional data breaches where

25:20

someone got in and we're exfiltrating

25:22

data and things like that. But

25:25

if we look at it from

25:27

the from the large, large perspective,

25:29

80% coming from those three things

25:31

give or take. And sometimes those

25:34

three things have or are often

25:36

have relatively simple methods. For protecting

25:38

against those attacks and and again

25:41

with all of this the challenges

25:43

Once the attack happens or the

25:45

crime happens. It's very very difficult

25:47

to to remedy and It's much

25:50

better to have a little bit

25:52

of prevention on the front end

25:54

and to be aware of those

25:56

attacks. So the basics do go

25:59

a long, long way in this

26:01

case. I'm just thinking our footprint

26:03

is so large now because most

26:06

people are working at two locations,

26:08

home, office, phone, three. Now, these

26:10

cameras and everything, I mean, like,

26:12

I'm not sure if... You know,

26:15

all technology is created or protected

26:17

equal is what I'm getting at,

26:19

right? Yeah, absolutely not. Yeah. So

26:21

what are some of the least

26:24

protected things out there that we

26:26

might want to shore up? Sure.

26:28

Well, again, looking back at the

26:30

risk, least protected, I wouldn't count

26:33

on anyone to, you know, unless

26:35

it's our internal cybersecurity team at

26:37

our companies, but I wouldn't account.

26:40

these third-party vendors, a lot of

26:42

time what happens is people think,

26:44

well, this video platform or this

26:46

accounting platform or this CRM, that's

26:49

a big giant company. They have

26:51

my security and best of mind.

26:53

That's what they're saying. That's what

26:55

they're saying. Well, I don't even

26:58

think they're saying it. I think

27:00

we just assume it. I don't

27:02

think they're saying it. Yeah. Yeah.

27:05

Go ahead. No. Sorry. Take it

27:07

off right now. What into it

27:09

is this global behemoth? Their security

27:11

department has invested hundreds of millions.

27:14

They're so much better protected than

27:16

we are. Right. Yeah. And that's

27:18

why I think it's a good

27:20

idea. We call those third party

27:23

vendors is just get them to

27:25

share what they're doing, what their

27:27

policy is and how they're protecting

27:30

and then always again think what's

27:32

the worst that could happen if

27:34

they were compromised. in a negative

27:36

way. Where does that put me

27:39

from a risk mitigation perspective? Can

27:41

I recover from this? Would this

27:43

be threatening to the livelihood? of

27:45

my business. being very cautious and

27:48

then going back to some of

27:50

the basics that we mentioned here,

27:52

which is, you know, again, the

27:54

multi-factor authentication, having things properly encrypted,

27:57

having them backed up so that

27:59

you can restore if something does

28:01

happen, or even with encryption, making

28:04

it very difficult if someone does

28:06

get it to actually read any

28:08

of the data that sits in

28:10

the files or whatever was taken,

28:13

just making it so hard for

28:15

the bad guys instead of easy

28:17

for the bad guys. And look

28:19

at everything that connected or anything

28:22

that we log into or anything

28:24

where we put credentials into to

28:26

log in a username, a password,

28:29

our phones, even IoT, Internet of

28:31

Things devices such as cameras and

28:33

even refrigerators and printers. I have

28:35

crazy stories that I could share

28:38

around how those things have been

28:40

compromised. But everything that's connected is

28:42

potentially has the potential to be

28:44

compromised and utilized. And we just

28:47

want to make it as users

28:49

in this wonderful world we live

28:51

in, we want to make it

28:54

hard for the bad guys by

28:56

doing the basics. It's so timely

28:58

that you're talking about third parties

29:00

and their level of security. We

29:03

work with banks and we have

29:05

a few preferred banks that we

29:07

work with, Bank Impressia and Relay

29:09

Bank. We went through a lot

29:12

of security protocol checks to make

29:14

sure that their security is up

29:16

to speed. We really, really went

29:18

really deep to make sure that

29:21

these guys were the partners we

29:23

want to choose. Yeah, that's great.

29:25

There's banks out there that are

29:28

saying their profit first, that we

29:30

have no relationship with. There's banks

29:32

in other third parties out there

29:34

that are leveraging not only our

29:37

brand, but other brand. giving a

29:39

false sense of security. So, you

29:41

know, I'm saying all you listeners

29:43

out there, you know, we do

29:46

a great job of making sure

29:48

that our partners are secure, are

29:50

timely and are up to speed.

29:53

Don't work with somebody that is

29:55

saying that we're friendly. We know

29:57

those guys look to make sure

29:59

that the partners that are really

30:02

legitimate partners. I mean, is there

30:04

a way to I mean, how

30:06

do we know that? Yeah, that's

30:08

great advice, Ron, is just literally

30:11

don't trust what people say, validate.

30:13

Right. So pick up the phone

30:15

all. That oftentimes goes a long,

30:18

long way. Oh, I've had you

30:20

all banks and tell them to

30:22

shut it down because, you know,

30:24

they're not, I don't even know

30:27

what their technology is yet they're

30:29

leveraging our name. Yeah. So if

30:31

someone called you and said, hey,

30:33

For example, Ron, are you affiliated

30:36

with these folks? And you're like,

30:38

no, we're not. Yeah. So that's

30:40

validation, validate. And then you go,

30:42

then, unfortunately, you had to go

30:45

to those folks saying, hey, this

30:47

is a misrepresentation of our affiliation.

30:49

Yeah. But validation goes a long,

30:52

long way. And a lot of

30:54

these things as well, just in

30:56

general, is why would we give

30:58

anyone the benefit of the doubt

31:01

and or trust, especially when the

31:03

level of risk is so high?

31:05

Am I willing to swallow this

31:07

if something goes bad? And if

31:10

not, then it's time to go

31:12

validate. You know, it's so so

31:14

I love what we do with

31:17

our partners. We have a special

31:19

partner badge and also a member

31:21

badge that links back to our

31:23

site that validates them that they

31:26

are actually, you know, approved. They

31:28

are a legitimate certified profit first

31:30

professional. They are a profit first

31:32

professional partner. So we do have,

31:35

you know, that stuff that links

31:37

back. Is there anything else that

31:39

we might be able to do?

31:41

to assure that these are our

31:44

ideal partners, that they are safe.

31:46

And just to clarify, Ron, you

31:48

mean to make sure that those

31:51

that are claiming to be affiliated

31:53

with you with D&D are? Yeah,

31:55

I think some of the simplest

31:57

things you can do is, and

32:00

I know this sounds very generic,

32:02

and there are more things you

32:04

can do, but essentially setting up

32:06

kind of if these things are

32:09

done online, where someone's online a

32:11

business and they're claiming that they're

32:13

partnered. is setting up things like

32:16

as simple as a Google alert,

32:18

anytime your name plus organization comes

32:20

up and say, hmm, let me

32:22

validate that. I love the Google

32:25

alert. We forgot about that. That's

32:27

free and easy. So that'll catch

32:29

anything new that comes up. And

32:31

then the next thing to do

32:34

is to continuously, and again, I

32:36

know this is a lot of

32:38

this stuff is not fun and

32:41

or fancy, but it is to

32:43

simply just have someone or individually

32:45

do it once a month set

32:47

of policy, just to scour the

32:50

internet and look for folks on

32:52

Google, for example, that have your

32:54

name on their website. And if

32:56

it's not a partner, it's not

32:59

a partner. and it needs to

33:01

be handled. So it's kind of

33:03

very similar to like when Main

33:05

Street type businesses, restaurants and so

33:08

forth, they'll have Google reviews and

33:10

different review platforms. They're using kind

33:12

of what we consider reputation management

33:15

services to kind of make sure

33:17

that what's being said is genuinely

33:19

true. And unfortunately, this is just

33:21

something we all face, right? We

33:24

don't know. People can say anything

33:26

on the internet. That's the problem.

33:28

Jeremiah, that is the truth. And

33:30

with that said, can you believe

33:33

we're at a time? That was

33:35

fast. I could do that. Really,

33:37

I could listen to your spooky

33:40

stories and your advice a thousand

33:42

times. Like they're so simple. You're

33:44

so good. Jeremiah, where can our

33:46

audience learn more about you? Where

33:49

can they pick up confessions of

33:51

a hacker? Sure. How can they,

33:53

you know, work with you? Yeah,

33:55

absolutely. I think the best way,

33:58

and this is what I enjoy

34:00

doing is, again, my main goal

34:02

is just to help people know

34:05

what's happening, how to not have

34:07

it happen to them. And that's

34:09

why I share. these story formats

34:11

in the book and even in

34:14

keynote presentations around the world, just

34:16

awareness first and then what can

34:18

we all do that are oftentimes

34:20

simple and easy fixes. But the

34:23

best way, and this is what

34:25

I like to do, is connect

34:27

with people on LinkedIn. And that

34:29

way we can use Messenger. We

34:32

can chat. We can, you know,

34:34

if someone needs help with something,

34:36

if I can't help, I can

34:39

direct them in the right direction.

34:41

If I can help them, then

34:43

I'll help them the best that

34:45

I can and so forth. But

34:48

I think that's probably the easiest

34:50

and best way to get in

34:52

touch with folks. It's just Jeremiah

34:54

Baker on LinkedIn. Awesome. Well, also,

34:57

my friend, thank you very much.

34:59

Stacy. Thank you. Yeah, thank you,

35:01

Liz. Thank you, Ron. Yeah, you

35:04

guys as well. Stay safe. Thank

35:06

you. Have a great Halloween. Yeah.

35:08

Oh yeah, yeah, Halloween. That was

35:10

great. Oh my gosh. All right,

35:13

so now it's time for our

35:15

takeaways, Ron. That was great. That

35:17

was delightful. I'm glad it worked.

35:19

I'm glad this totally worked. Yeah,

35:24

yeah, absolutely. Thanks, Jeremiah. So what

35:26

did what did I take away

35:28

80% comes from I mean, I

35:31

took a lot away but it

35:33

comes from three primary sources of

35:35

neglect email. CRM, fraud and ransomware.

35:37

Those are the three things. Make

35:39

sure you guys have your policies

35:41

up to date as well. I

35:43

mean, yes, the basics and so

35:45

simple. I loved the thinking and

35:47

we do this with so many

35:49

things. What's the worst case and

35:52

work yourself backwards? So that idea

35:54

of whether it's income targeting, what

35:56

do you want? And let's figure

35:58

it out. about how to get

36:00

there or for this, what is

36:02

our risk? What can we tolerate?

36:04

Literally, if we know we're running

36:06

profit first in our business, we

36:08

know that we have $150,000 in

36:10

our profit account, is that it?

36:13

Can we stand $150,000 worth of

36:15

extortion? That sounds terrible. Right, and

36:17

also don't trust everybody, don't trust,

36:19

your partners make validate, trust and

36:21

validate. Yeah, Mike, Mike has done

36:23

that. He's talked about that before.

36:25

And, uh, oh my God, what's

36:27

her face as CEO? Yeah, her

36:29

face. Yeah. So my brain is

36:31

broken, but you know, he has

36:34

the code and she has the

36:36

password. Right. So, you know, it's,

36:38

we have all sorts of tripling

36:40

things. Oh, it's so good. Awesome.

36:42

That was, that was really helpful.

36:44

Yeah. Okay. All right. What's that

36:46

now what? The trippy question. Yeah.

36:48

All right. So I have a

36:50

trippy question and I can see

36:52

Jeremiah, he's still here. So usually

36:55

we say goodbye, but I'm going

36:57

to invite him into this one

36:59

because you're curious and this answer

37:01

could be funny. So these are

37:03

just very basic sort of conversation

37:05

starter questions, but what fashion trend

37:07

that you followed was very cool

37:09

then it is no longer cool

37:11

now. Are you pants? I was

37:13

hoping someone would say parachute pants.

37:16

I mean, I would still wear

37:18

them. The Z-cavary cheese, is that

37:20

what you wore? No, I never

37:22

had the Z-cavary cheese and I

37:24

never did the tuck and fold.

37:26

I was a member's only kid

37:28

in parachute. There you go. I

37:30

feel like you still have your

37:32

member's only jacket. I did with

37:34

tanging and microfiber. Of course you

37:37

did. I know you do. Jeremiah,

37:39

how about you? I was going

37:41

to say having a mullet haircut

37:43

in the 80s, but I see

37:45

that that has come back. Oh,

37:47

it's back with a vengeance. I

37:49

love it. Oh, I love the

37:51

rat tails gross the mullet. The

37:53

Malay is delightful. Any other embarrassing

37:55

fashion trend? Shoulder pads. I didn't

37:57

see. I you know what? I'm

38:00

going to stand by all of my fashion

38:02

choices. I'm not going to lie. I

38:04

am a very classic person in general.

38:06

So even when it was like knee

38:09

high socks and Mary Janes, that's still

38:11

cool because it's always, it's already back.

38:13

So I'm standing by all of them.

38:15

There's nothing I wouldn't wear

38:17

right now. Nothing. Right. I don't

38:19

say that very confidently in any

38:21

other realm. I'll get you to say no

38:24

real fur. I'd probably wear it if

38:26

it's my grandma's. I already have it.

38:28

So I'm not buying a new one.

38:30

All right, that's great. Ron, thank you

38:32

gentlemen. What do you

38:34

have as your insider access?

38:36

Yes, please. Yes, this is

38:38

insider access. This is stuff

38:41

that we're doing here at

38:43

Profit First Professionals that you

38:45

can also do with your

38:47

organization. And that is a

38:49

review with your insurance policy,

38:51

with your cybersecurity provider on

38:53

the phone with them. This

38:55

is something that we take very

38:57

seriously and we want to make

39:00

sure that if anything happens that

39:02

we are up to date with

39:04

the insurance because you know insurance

39:06

it's happening all over the place

39:08

and. People are losing their cyber

39:10

insurance. We lost ours like three,

39:12

four times. So we had to

39:14

constantly find new ones, constantly find

39:16

new ones. And each time we

39:18

find a new insurance provider because

39:20

somebody else canceled it, right? We

39:22

have to go through an audit

39:24

again to make sure that the

39:26

team, you know, isn't sitting on

39:29

their loyals because there might be

39:31

a little, little, little, little words

39:33

written in fine print that another

39:35

agency may not have that the

39:37

new agency has. So make it

39:39

priority to sit down with your

39:41

cybersecurity team and your insurance team

39:43

to make sure that you are

39:45

fully covered. Excellent. Boom. I'll do

39:47

that. I was just gonna say

39:49

boom. All right. Well, we're out of

39:51

time, my friend. We did it. Wow.

39:53

That's it. Awesome job, guys. Thank you

39:55

very much, Jeremiah. Thank you, Liz. Thank

39:58

you. Yes, thank you. Yeah, don't forget

40:00

to review subscribe to grow my accounting

40:02

practice podcast and also Liz. What else

40:04

do they need to do? You know

40:06

what, if they are interested in learning

40:08

a little bit more about how to

40:11

work with Ron, how to work with

40:13

myself, how to become a member of

40:15

Profit First Professionals, I encourage you. I

40:17

implore you to go to ProfitFirstProfessionals.com. There

40:19

are two options. Once you get there,

40:21

become a Profit First Professional or find

40:23

a Profit First Professional. If you click

40:25

that become, you'll have an opportunity to

40:27

have a call with Ron or myself.

40:30

We'll share a little bit about what

40:32

membership looks like, the benefits and the

40:34

joy of being in this crew. And

40:36

then we'll also See if it makes

40:38

a match, if it makes sense for

40:40

you as your firm is growing and

40:42

you're looking to bring more advisory to

40:44

your business. So, profitfirstprofessionals.com. Have a great

40:47

day, everybody. Do it now. Do it

40:49

now. All right. Thanks, everyone. Have a

40:51

good day. Bye. Thank you. Bye-bye.

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features