WEBVTT

NOTE
This file was generated by Descript 

00:00:07.039 --> 00:00:09.525
Candace Dellacona: Welcome to the
Sandwich Generation Survival Guide.

00:00:09.525 --> 00:00:14.775
I am your host, Candace Dellacona,
and I am so glad to welcome fellow

00:00:14.775 --> 00:00:21.075
sandwich generation member Dan Krutoy,
who is here to talk about all things

00:00:21.615 --> 00:00:24.735
security related to cyberspace.

00:00:24.735 --> 00:00:25.335
Welcome, Dan.

00:00:25.785 --> 00:00:27.165
Daniel Krutoy: Thank you so
much for having me, Candace.

00:00:27.165 --> 00:00:27.855
Real excited to be here.

00:00:28.500 --> 00:00:32.490
Candace Dellacona: Yeah, I'm so excited
too, so for our listeners, Dan and I

00:00:32.540 --> 00:00:37.640
work together with our clients and, we
had a really interesting conversation

00:00:37.640 --> 00:00:43.980
that I thought would be useful to
everyone out there as we navigate the

00:00:43.980 --> 00:00:50.850
world of cybersecurity and all of the
things that we should and should not be

00:00:50.850 --> 00:00:55.900
doing for every level of our sandwich
generation quagmire that we have.

00:00:55.920 --> 00:00:59.250
So Dan, you're the guy
to talk to about that.

00:00:59.250 --> 00:01:03.970
So maybe just fill us in a bit about
who you are, who you work for and

00:01:03.970 --> 00:01:07.320
then we'll get into kind of the
nuts and bolts of the topic today.

00:01:08.185 --> 00:01:08.725
Daniel Krutoy: Awesome.

00:01:08.725 --> 00:01:09.715
Thank you again, Candace.

00:01:09.715 --> 00:01:10.865
As mentioned, Dan Krutoy.

00:01:10.885 --> 00:01:16.335
So my title is Principal for a technology
firm called Pro4ia and I've been in every

00:01:16.335 --> 00:01:20.785
seat from a technology standpoint, from
the support side, help desk, to more

00:01:20.785 --> 00:01:23.035
client facing, to strategic and whatnot.

00:01:23.035 --> 00:01:27.200
And as you can imagine, technology
has evolved so much and changed.

00:01:27.230 --> 00:01:31.110
And that's what's exciting about being in
this profession is it never gets stale.

00:01:31.160 --> 00:01:33.850
And that's what gets me excited
in the morning, is talking about

00:01:33.850 --> 00:01:35.080
these different technologies.

00:01:35.410 --> 00:01:38.200
Candace Dellacona: So having that
bird's eye view I think it's really

00:01:38.200 --> 00:01:42.950
important for people to understand
is that, you work with executives

00:01:42.990 --> 00:01:44.910
but you work with families as well.

00:01:45.895 --> 00:01:51.805
And the families that you
work with are often concerned

00:01:51.835 --> 00:01:55.525
about privacy and security.

00:01:55.585 --> 00:02:02.265
And even though many people think
that that issue only impacts a

00:02:02.265 --> 00:02:05.385
family of wealth, I think one of
the things that we talked about

00:02:05.385 --> 00:02:09.105
as sandwich generation members is
that it really impacts all of us.

00:02:10.320 --> 00:02:14.820
So what I would love to talk about
today is because of the changing

00:02:14.820 --> 00:02:22.050
landscape and all of this incredibly
rapid increase in technology and

00:02:22.380 --> 00:02:24.510
the scams that go along with it.

00:02:24.880 --> 00:02:31.300
What are the best words of advice
and tips that you can provide to us

00:02:31.570 --> 00:02:34.090
to protect ourselves at every level?

00:02:34.570 --> 00:02:36.940
So can you talk a little
bit about that in general?

00:02:36.940 --> 00:02:40.960
Maybe let's talk about what the
dangers are and then how we kind of

00:02:41.800 --> 00:02:45.370
prevent being a victim of those scams.

00:02:45.850 --> 00:02:48.280
So what are you seeing out
there as kind of a trend?

00:02:49.030 --> 00:02:49.330
Daniel Krutoy: Yeah.

00:02:49.330 --> 00:02:50.350
And it's a great point.

00:02:50.350 --> 00:02:53.380
And talking about families and
talking about kind of personal

00:02:53.670 --> 00:02:57.890
outside of work technology it's so
prevalent in, in every aspect of it.

00:02:57.920 --> 00:02:59.540
And there's so much
overlap as well, right?

00:02:59.540 --> 00:03:02.580
You have your personal life that
overlaps with your business.

00:03:02.580 --> 00:03:07.070
But, going back to my earlier comment, how
technology has evolved cyber threats used

00:03:07.070 --> 00:03:11.785
to really be focused on, the office space
and, people would try to steal data there

00:03:11.785 --> 00:03:15.085
and you'd always have to lock your IT room
or lock your computer or things like that.

00:03:15.355 --> 00:03:17.785
But now with everything being
in the cloud now with everything

00:03:17.785 --> 00:03:19.040
being mobile and accessible.

00:03:19.690 --> 00:03:23.000
Your homes and your families
and I'll use my mom as a perfect

00:03:23.000 --> 00:03:24.320
example, being that tech guy.

00:03:24.320 --> 00:03:28.010
I get a call, at least once a day
or every couple days or a screenshot

00:03:28.010 --> 00:03:30.060
sent via text of, what is this?

00:03:30.060 --> 00:03:31.740
Or should I be clicking this?

00:03:31.790 --> 00:03:32.990
It's an update on my computer.

00:03:32.990 --> 00:03:33.950
Is this real or not?

00:03:33.950 --> 00:03:38.350
And yeah, I think to answer your question
is ask a question or ask questions.

00:03:38.400 --> 00:03:42.580
That's the number one thing is when
we implement and ask clients or even,

00:03:42.860 --> 00:03:47.830
families to invest in cybersecurity,
the number one thing outside of

00:03:47.830 --> 00:03:51.520
multifactor authentication, which
obviously adds that human element,

00:03:51.880 --> 00:03:55.970
is awareness, training, and being
aware of what you're clicking on, what

00:03:55.970 --> 00:03:57.820
you're doing who you're doing it with.

00:03:58.190 --> 00:04:01.010
That's the number one thing I would
stress is making sure people are aware.

00:04:01.015 --> 00:04:05.540
Because you're so distracted by, your
kids' homework and yelling at you while

00:04:05.540 --> 00:04:07.130
you're also working at the same time.

00:04:07.410 --> 00:04:10.810
That's the time that you click
on something accidentally and now

00:04:10.810 --> 00:04:14.290
money's being transferred to another
account, or now unauthorized access

00:04:14.290 --> 00:04:15.095
is happening to your computer.

00:04:16.375 --> 00:04:18.655
Candace Dellacona: So let's
talk about that and obviously

00:04:18.715 --> 00:04:23.995
those phishing expeditions that
the scammers send to all of us.

00:04:23.995 --> 00:04:27.275
But I think you bring up a really
important point that, there used to be

00:04:27.275 --> 00:04:32.480
a focus in the professional world and
a concern about cybersecurity in the

00:04:32.480 --> 00:04:36.200
professional world, but it's really
bled into everyone's personal life

00:04:36.200 --> 00:04:38.630
because we're all so technology minded.

00:04:38.630 --> 00:04:43.700
We all are looking for ways to be more
efficient and have all of our information

00:04:43.700 --> 00:04:46.350
in our phones and on our computers.

00:04:46.350 --> 00:04:50.025
And while it has made
our lives I think better.

00:04:50.345 --> 00:04:53.285
And I don't think most
people would argue with that.

00:04:53.335 --> 00:04:57.895
In terms of efficiency, it has opened
ourselves up from a personal perspective

00:04:57.895 --> 00:05:01.735
of not having the tech guy, your mom
is very lucky to have someone like

00:05:01.735 --> 00:05:05.515
you to be able to call at the drop
of a hat and say, Dan, what do I do?

00:05:05.515 --> 00:05:08.370
But are the scams that you're seeing?

00:05:08.740 --> 00:05:12.040
And let's maybe start with
the senior population.

00:05:12.140 --> 00:05:16.190
In terms of what people are dealing with,
I'll just tell you quickly that I was

00:05:16.190 --> 00:05:21.860
a victim of a cybersecurity issue where
someone somehow got a hold of my social

00:05:21.860 --> 00:05:27.140
security number and filed an unemployment
claim, and I had packages apparently

00:05:27.140 --> 00:05:30.410
being delivered everywhere, and there
were four credit cards open in my name.

00:05:30.410 --> 00:05:34.450
But are you seeing any
particular trends that are being

00:05:34.450 --> 00:05:36.370
perpetrated against seniors?

00:05:37.960 --> 00:05:40.850
Daniel Krutoy: Yeah, I'd say seniors
specifically that you've probably heard

00:05:40.850 --> 00:05:43.770
in the news, there's scenarios where
they get a phone call saying, one of

00:05:43.770 --> 00:05:48.075
your children is in jail and you need to
wire this money to get them out or they

00:05:48.075 --> 00:05:52.285
get texts to their phone saying, here's
a UPS delivery, you need to confirm your

00:05:52.285 --> 00:05:54.235
password so that it gets to your home.

00:05:54.545 --> 00:05:55.055
And things like that.

00:05:55.055 --> 00:05:58.335
Things that you know, look
like day-to-day scenarios that

00:05:58.335 --> 00:05:59.835
they may not be educated on.

00:05:59.865 --> 00:06:02.970
And it happens in the moment and you
don't really have time to think about

00:06:03.285 --> 00:06:04.965
it, is where they're targeting it.

00:06:05.065 --> 00:06:09.905
And social engineering is like a buzz term
in the industry because of technology.

00:06:09.965 --> 00:06:11.915
Information is available
everywhere, right?

00:06:11.915 --> 00:06:15.525
So if I Google someone's first and
last name, I can find their address,

00:06:15.525 --> 00:06:19.245
I can find their phone number, I can
find so much information about them.

00:06:19.555 --> 00:06:21.865
And what they do is they use
that as an opportunity to learn.

00:06:22.465 --> 00:06:23.485
What are their tendencies?

00:06:23.485 --> 00:06:26.095
What day of the week or what day of
the month do they pay their bills?

00:06:26.095 --> 00:06:30.085
What once they get into their systems,
it's not a matter of if it's when, right?

00:06:30.085 --> 00:06:33.055
So a lot of times we hear about
attacks that have happened and

00:06:33.055 --> 00:06:34.495
it happened on, a certain day.

00:06:34.495 --> 00:06:37.225
They've been in the system for
like six months just watching

00:06:37.225 --> 00:06:40.345
what you're doing because they
wanna understand the tendencies.

00:06:40.350 --> 00:06:41.310
That's what's happening.

00:06:41.350 --> 00:06:44.890
And also you've probably heard of
solutions like software as a service

00:06:44.890 --> 00:06:47.990
or hardware as a service where you can
pay, it's an operating expense where you

00:06:47.990 --> 00:06:50.020
could pay for solutions for a business.

00:06:50.020 --> 00:06:54.560
There's now cyber security hacking
as a service, so a bad actor can go

00:06:54.560 --> 00:06:59.120
online and for minimal amount of money
they can buy a piece of software or a

00:06:59.120 --> 00:07:04.390
package or a tool that empowers them
to go out and, go after people, right?

00:07:04.390 --> 00:07:05.320
It's a numbers game.

00:07:05.320 --> 00:07:09.130
If they send out this campaign or
whatnot to thousands of people,

00:07:09.130 --> 00:07:12.530
all it takes is one to click on
it and now you're in trouble.

00:07:12.665 --> 00:07:13.085
Candace Dellacona: Yeah.

00:07:13.085 --> 00:07:16.505
So when you talk about social engineering
you're essentially saying these bad

00:07:16.505 --> 00:07:24.225
actors are mining our social media
profiles to get information on us.

00:07:24.225 --> 00:07:24.340
Is that it?

00:07:25.015 --> 00:07:25.855
Daniel Krutoy: That's exactly it.

00:07:25.885 --> 00:07:27.295
You've also heard in the news, right?

00:07:27.295 --> 00:07:31.045
Facebook was selling people's information
and all of these other websites.

00:07:31.050 --> 00:07:33.965
Now, when you go on any website,
they ask you about cookies and do

00:07:33.965 --> 00:07:36.905
you have to accept or you can't
move forward until you accept a

00:07:36.905 --> 00:07:39.525
certain amount of data to be allowed.

00:07:39.525 --> 00:07:41.205
That's how these websites make money.

00:07:41.205 --> 00:07:45.265
They sell your data to all these
third party, broker sites or

00:07:45.265 --> 00:07:49.185
whatnot, that now, it's used for
marketing tools, but it's also used

00:07:49.185 --> 00:07:51.235
for, bad activities, so to speak.

00:07:51.285 --> 00:07:52.395
Yeah, that's exactly it.

00:07:52.395 --> 00:07:54.825
When you're on Facebook, when you're
on Instagram, when you're on social

00:07:54.825 --> 00:07:58.675
media, when you're shopping online,
all your information is now out there.

00:07:59.180 --> 00:08:02.610
And at some point it's gonna
eventually be available to somebody

00:08:02.610 --> 00:08:03.600
that wants to do something.

00:08:04.300 --> 00:08:06.570
Candace Dellacona: And look, we
all like to be connected through

00:08:06.570 --> 00:08:10.440
social media, whether it's, Facebook
or Instagram or what have you.

00:08:10.470 --> 00:08:15.190
But let's talk specifically about
the social media profiles and I

00:08:15.190 --> 00:08:19.600
think most of the listeners would
agree that most people feel that they

00:08:19.600 --> 00:08:24.250
enjoy that part of connectivity with
their loved ones or their friends

00:08:24.250 --> 00:08:25.990
that perhaps don't live close by.

00:08:25.990 --> 00:08:29.900
And, maybe for this, the home bound
seniors, that's a way that they can

00:08:29.900 --> 00:08:33.775
keep up with their grandkids or keep
up with family members who live across

00:08:33.840 --> 00:08:35.340
the country or out of the country.

00:08:35.640 --> 00:08:40.680
So how would you suggest just taking
it from a social media perspective?

00:08:41.675 --> 00:08:47.475
That you would come in and help a
client, quote unquote clean up what's

00:08:47.475 --> 00:08:52.215
in their social media profile to give
less opportunity to those bad actors.

00:08:52.215 --> 00:08:53.415
What are the tips for us?

00:08:53.975 --> 00:08:54.305
Daniel Krutoy: Sure.

00:08:54.335 --> 00:08:54.755
It's hard to say.

00:08:55.150 --> 00:08:58.040
But I think the common
knowledge around it is, the less

00:08:58.040 --> 00:08:59.210
information, the better, right?

00:08:59.210 --> 00:09:02.090
If you wanna post a picture of
something, that's great, but when you

00:09:02.090 --> 00:09:05.690
post a picture of something and where
you are and what you're doing right,

00:09:05.690 --> 00:09:09.800
that gives people kind of an idea
of, oh, they're in Cancun this week.

00:09:09.800 --> 00:09:10.880
That means they're not home.

00:09:10.880 --> 00:09:13.740
And I can Google this person's
address and next thing you know,

00:09:13.740 --> 00:09:14.820
there's theft at they're home.

00:09:14.825 --> 00:09:16.055
It's a double-edged sword, right?

00:09:16.055 --> 00:09:19.135
You use social media because you
wanna socialize and you wanna share

00:09:19.165 --> 00:09:20.485
what's happening in your world.

00:09:20.845 --> 00:09:24.505
But people also use that against you
because now you're sharing a little

00:09:24.505 --> 00:09:28.385
bit too much information that they
otherwise would've not known is happening.

00:09:28.405 --> 00:09:29.515
There's two aspects of it, right?

00:09:29.515 --> 00:09:32.800
You can secure your data
and your information, right?

00:09:32.800 --> 00:09:36.070
You don't want somebody going into
your Instagram account and hacking

00:09:36.070 --> 00:09:38.740
it and then sending things there
so that you can do that's, put

00:09:38.740 --> 00:09:40.390
multifactor authentication on it.

00:09:40.700 --> 00:09:44.000
Make a complex password, change
your password every six months,

00:09:44.000 --> 00:09:47.630
because a lot of people use the same
passwords for multiple platforms.

00:09:47.630 --> 00:09:50.330
So if they get into one system,
they're most likely gonna

00:09:50.330 --> 00:09:51.230
try all the other systems.

00:09:52.235 --> 00:09:56.565
So while that's a bit of a nuisance but
it takes 10 seconds versus if someone

00:09:56.565 --> 00:09:59.475
hacked into your account, now you're
spending countless hours trying to

00:09:59.475 --> 00:10:00.825
get back into it or things like that.

00:10:00.825 --> 00:10:02.585
So that's the data aspect of it.

00:10:02.615 --> 00:10:06.895
But now the social kind of engineering
that we talked about it is, that's really

00:10:06.935 --> 00:10:09.425
a conscious decision on the individual.

00:10:09.425 --> 00:10:13.715
How much information do you really wanna
give that you're, traveling somewhere

00:10:13.715 --> 00:10:17.435
or that you're doing something or that
you bought a new piece of jewelry and

00:10:17.435 --> 00:10:20.135
you'll see random things of people
sharing things that they're doing.

00:10:20.565 --> 00:10:22.590
And that's really that's
up to that, the individual.

00:10:23.685 --> 00:10:25.105
Candace Dellacona: Yeah, I
think that a lot of people

00:10:25.105 --> 00:10:26.635
struggle with that in general.

00:10:26.685 --> 00:10:31.335
And I think that, oftentimes we think
of the outside world in ways that why

00:10:31.335 --> 00:10:32.955
would anybody care what I'm doing?

00:10:32.955 --> 00:10:36.015
I couldn't possibly be
the one to be hacked.

00:10:36.435 --> 00:10:41.075
And having gone through it it
definitely was a wake up call for me.

00:10:41.385 --> 00:10:46.240
And I will also add, that the tagging
of other people, I think should

00:10:46.240 --> 00:10:48.340
be thought about with some care.

00:10:48.700 --> 00:10:52.780
A because other people might not
want to be tagged in a particular

00:10:52.780 --> 00:10:54.910
location or at a particular event.

00:10:55.270 --> 00:10:59.720
But I think, based on the situation
that you bring up where the phone call

00:10:59.720 --> 00:11:04.610
comes in for the senior and it's, the
caller on the other end is saying, your

00:11:04.610 --> 00:11:08.330
grandchild is in jail and they know
your grandchild's name because you've

00:11:08.330 --> 00:11:11.000
mentioned them and the social media post.

00:11:11.050 --> 00:11:13.270
It is a hard lesson to, to learn.

00:11:13.300 --> 00:11:17.060
And there is a tension there between
the connectivity and, feeling

00:11:17.060 --> 00:11:21.700
like you're up on the events of
your loved ones and your friends.

00:11:21.950 --> 00:11:25.190
And also being mindful that unfortunately
there could be people lurking in

00:11:25.190 --> 00:11:30.060
the background that perhaps don't
have your best intentions at heart.

00:11:30.640 --> 00:11:35.110
When you think about cybersecurity
for those who are in that older

00:11:35.110 --> 00:11:39.370
generation, and you talked about
your mom, so not clicking on things

00:11:39.370 --> 00:11:41.440
is one of your words of wisdom.

00:11:41.440 --> 00:11:42.400
And I think that's a good one.

00:11:42.400 --> 00:11:45.610
I've also been guilty of doing that
once in a while, being distracted

00:11:45.610 --> 00:11:52.840
and just trying to multitask what are
the other things that as children of

00:11:52.900 --> 00:11:58.020
the older generation or the nieces,
nephews, the quote younger for those

00:11:58.020 --> 00:12:03.770
of us in the middle, how can we set
our parents up in such a way to protect

00:12:03.950 --> 00:12:07.600
them even if they're out on, social
media and they're posting things.

00:12:07.600 --> 00:12:12.000
What are the things that you share
with your older clients as it

00:12:12.000 --> 00:12:14.550
relates to their own cybersecurity?

00:12:15.210 --> 00:12:15.540
Daniel Krutoy: Yeah.

00:12:15.580 --> 00:12:19.620
Great question, and I'd go back to
the core function of it is education.

00:12:19.650 --> 00:12:22.890
You gotta educate them on what
they're exposing themselves

00:12:22.890 --> 00:12:24.180
to by doing all these things.

00:12:24.180 --> 00:12:26.250
So I'll give a perfect example.

00:12:26.250 --> 00:12:28.770
I'm sure everyone you speak to
in the older generations like,

00:12:29.250 --> 00:12:33.030
AI this thing is coming and I'm
definitely not touching, I'm not

00:12:33.030 --> 00:12:34.410
getting involved, yada, yada, yada.

00:12:34.410 --> 00:12:36.390
But next thing you know,
they're using Waze, right?

00:12:36.390 --> 00:12:38.605
Waze is their GPS and that's AI.

00:12:38.635 --> 00:12:42.385
They're using AI and then
they say, alright, fine.

00:12:42.385 --> 00:12:43.105
That's not a big deal.

00:12:43.105 --> 00:12:46.345
And then they log into their bank account
and they're doing facial recognition.

00:12:46.925 --> 00:12:50.285
That's part of AI and that's
part of biometrics and technology

00:12:50.285 --> 00:12:51.455
and all these different things.

00:12:51.785 --> 00:12:54.665
So whether you like it or not, or
whether you wanna accept it or not,

00:12:55.325 --> 00:12:58.865
all these different technologies that
are available to you and that you're

00:12:58.965 --> 00:13:03.265
playing with are have some form of all
these new things that are involved.

00:13:03.265 --> 00:13:04.645
So you have to educate them on it.

00:13:04.715 --> 00:13:09.185
The other thing I would say is, sit
down with them and every single app

00:13:09.185 --> 00:13:12.425
that you use or your iPhone or things
like that, you have to really drill

00:13:12.425 --> 00:13:17.235
into the settings and the cyber
and security aspects of it, right?

00:13:17.235 --> 00:13:21.225
Because it's not just one button on
or off, like, Hey, I want cookies, or,

00:13:21.225 --> 00:13:22.515
Hey, I don't wanna share my information.

00:13:22.755 --> 00:13:26.845
There's so many different settings,
like location like tracking your

00:13:26.895 --> 00:13:28.185
information, all that other stuff.

00:13:28.185 --> 00:13:31.825
So sitting down with them and, if
they're using Facebook, go through

00:13:31.825 --> 00:13:35.645
all the Facebook settings and
one by one, go through all these.

00:13:35.645 --> 00:13:36.545
Do you wanna turn this on?

00:13:36.545 --> 00:13:37.205
Turn this off.

00:13:37.580 --> 00:13:39.110
That helps from that standpoint.

00:13:39.420 --> 00:13:43.390
Someone shared with me Gmail recently
was exposed or information was

00:13:43.400 --> 00:13:46.910
shared that you have to go into Gmail
and turn off a bunch of settings.

00:13:46.910 --> 00:13:49.950
Otherwise they're gonna share all of
your, personal information as well.

00:13:49.950 --> 00:13:54.620
So, educating them staying up to date
on the new threats that are out there.

00:13:54.620 --> 00:13:56.060
I think that's the number one thing.

00:13:56.370 --> 00:13:58.650
And then I'd say on a bare minimum, I
mentioned this a little bit earlier,

00:13:58.650 --> 00:14:00.150
so multifactor authentication,

00:14:00.300 --> 00:14:00.540
Candace Dellacona: Yeah.

00:14:00.540 --> 00:14:05.015
Can you go into that a little bit about
what multifactor authentication is for,

00:14:05.505 --> 00:14:06.775
a lot of people I think don't know that.

00:14:07.485 --> 00:14:07.815
Daniel Krutoy: Sure.

00:14:07.815 --> 00:14:10.665
So multifactor authentication's
kind of the full terminology a lot.

00:14:10.665 --> 00:14:13.215
It also goes as 2FA or MFA.

00:14:13.245 --> 00:14:15.795
So two-factor authentication
or multifactor authentication.

00:14:16.035 --> 00:14:20.255
So when you type in your password, if
you don't have MFA turned on, then if

00:14:20.255 --> 00:14:23.675
somebody gets your password, they type it
in from anywhere and then they can log in.

00:14:23.995 --> 00:14:27.955
What multifactor adds is that second
element, that human element of,

00:14:28.195 --> 00:14:31.985
okay, I got your password, but now
I need to authenticate a second way

00:14:31.985 --> 00:14:33.575
that requires human intervention.

00:14:33.575 --> 00:14:36.215
So let's say that bad
actor stole your password.

00:14:36.465 --> 00:14:39.575
You're located in New York and
they're logging in from, Russia.

00:14:40.005 --> 00:14:42.885
They need your phone or they
need that code to be able

00:14:42.885 --> 00:14:44.505
to go into it to get there.

00:14:44.755 --> 00:14:47.515
Or there's other methods to
just have that second factor.

00:14:47.515 --> 00:14:51.155
So turning that on and you'll see
majority of the websites, like banks and

00:14:51.155 --> 00:14:54.125
whatnot, they required at this point,
you can't even turn that feature off

00:14:54.395 --> 00:14:58.645
because, over 90% of breaches are because
of password compromise and someone

00:14:58.645 --> 00:14:59.995
let somebody in through the back door.

00:14:59.995 --> 00:15:03.360
So, I'd say make sure that that's
turned on for everything, and

00:15:03.360 --> 00:15:04.650
that helps a lot of the ways.

00:15:05.080 --> 00:15:07.990
And then the awareness that I mentioned,
just making sure they're educated on, if

00:15:07.990 --> 00:15:12.270
something doesn't look right just call,
call your grandson or your daughter or

00:15:12.270 --> 00:15:14.560
whoever and ask them did you send me this?

00:15:14.560 --> 00:15:15.820
Or should I click on this?

00:15:15.820 --> 00:15:16.660
Should I open this?

00:15:16.660 --> 00:15:17.770
And it's links.

00:15:17.770 --> 00:15:19.600
Don't click on links that
you're not familiar with.

00:15:19.600 --> 00:15:21.945
Even attachments can have,
some kind of thread in it.

00:15:23.040 --> 00:15:26.910
Even if it's from somebody that you know,
that person could have been compromised.

00:15:26.910 --> 00:15:30.930
And what they do is a trickle down
effect is they try to compromise everyone

00:15:30.930 --> 00:15:32.520
within that person's contact list.

00:15:32.520 --> 00:15:33.510
So then they send a link.

00:15:33.510 --> 00:15:35.640
So you have to be careful no matter what.

00:15:35.980 --> 00:15:39.220
And then as part of phishing
campaigns it's very simple to,

00:15:39.580 --> 00:15:43.720
change one letter or one digit in
someone's email address, right?

00:15:43.720 --> 00:15:47.640
So, if you have Candace in your email
instead of an E, sometimes they put

00:15:47.640 --> 00:15:49.420
a three at the end of your name.

00:15:49.420 --> 00:15:51.590
Or let's say you own a .com,

00:15:51.640 --> 00:15:53.080
they can change the Gmail.

00:15:53.300 --> 00:15:55.970
Obviously that's a bigger one,
but they could change an I

00:15:55.970 --> 00:15:57.500
to a one or things like that.

00:15:57.500 --> 00:15:59.750
So they try to manipulate
you in different ways.

00:15:59.750 --> 00:16:02.480
So it's really just trying to
be aware as much as possible.

00:16:02.830 --> 00:16:04.720
Candace Dellacona: As with any
sandwich generation issue, I

00:16:04.720 --> 00:16:06.500
think, communication is really key.

00:16:06.500 --> 00:16:11.450
And as we embark on this holiday season,
you bring up a really good bit of advice,

00:16:11.450 --> 00:16:15.800
Dan, which is to sit down with your aging
loved one and go through their phone

00:16:15.800 --> 00:16:20.700
with them and really take a look at the
settings on every app that they have.

00:16:22.035 --> 00:16:27.105
And it sounds like there is a way to
go through and make sure that the app

00:16:27.105 --> 00:16:32.385
isn't tracking and that there is only
necessary cookies and things like that.

00:16:32.385 --> 00:16:37.555
I think as a novice myself, I didn't
actually realize that the cookies

00:16:37.555 --> 00:16:41.355
request was not only for marketing,
but also to sell your information.

00:16:41.355 --> 00:16:44.595
I really did think it was
just for marketing purposes.

00:16:44.785 --> 00:16:47.865
I'm proud to say that I always
say no, but you're right.

00:16:47.865 --> 00:16:52.025
Like even these little sort of
subtle click and dialogue boxes

00:16:52.025 --> 00:16:55.535
that come up, we all have a tendency
to just kind of rush through them.

00:16:55.535 --> 00:16:59.825
So slowing down, taking a look at
the phone, looking at the settings

00:16:59.825 --> 00:17:03.245
with your loved one, and having the
conversation about not clicking.

00:17:03.815 --> 00:17:09.590
And I think that leads us to the next
generation, which is okay now our kids,

00:17:09.640 --> 00:17:14.320
where in many cases, maybe not yours,
but our kids are more technologically

00:17:14.320 --> 00:17:17.270
savvy than a lot of the parents.

00:17:17.270 --> 00:17:24.000
So can you talk about what you've seen in
terms of, influences and things that we

00:17:24.000 --> 00:17:31.490
should be looking out for or tips that you
can provide for parents looking to secure

00:17:31.520 --> 00:17:34.370
their children in the world of technology?

00:17:34.915 --> 00:17:37.325
Daniel Krutoy: That opens up a
whole other can of worms, right?

00:17:37.325 --> 00:17:39.095
It, once again, it becomes a choice.

00:17:39.125 --> 00:17:42.815
And the challenge is, I'm a parent
of a 9-year-old and a 7-year-old,

00:17:42.815 --> 00:17:45.585
and the conversations are already
starting of, when can I get a

00:17:45.585 --> 00:17:46.785
phone or can I have a phone?

00:17:46.785 --> 00:17:50.235
And you have the holiday season coming
up and birthdays and it's tough, right?

00:17:50.235 --> 00:17:53.385
Because it's not just the individual
conversation between you and your

00:17:53.385 --> 00:17:58.005
child, it's also, the peer pressure
of, I'm in school and some parents

00:17:58.005 --> 00:18:00.915
allow kids to have phones at a
certain age and some parents don't.

00:18:01.320 --> 00:18:04.170
And now you're fighting two
different battles of that.

00:18:04.170 --> 00:18:07.630
So I don't want to go down the
road of, what's right or wrong.

00:18:07.630 --> 00:18:09.220
'Cause there is no right or wrong answer.

00:18:09.520 --> 00:18:14.830
But what I would say is back to a similar
answer for the elderly is if you do get

00:18:14.830 --> 00:18:18.460
a phone for your child, Apple and iPhone,
I could speak to that specifically.

00:18:18.460 --> 00:18:21.030
I'm not a big Samsung
or Android phone user.

00:18:21.070 --> 00:18:22.820
I'm sure they have similar settings.

00:18:22.820 --> 00:18:26.210
You have sort of that parent child mode.

00:18:26.460 --> 00:18:29.550
And we actually did use that when
we did send my kids away to camp and

00:18:29.550 --> 00:18:30.840
they were gone for the entire day.

00:18:31.845 --> 00:18:34.695
We did want to track them, we did want
to be able to communicate with them.

00:18:34.995 --> 00:18:38.175
We were able to lock the phone down
completely so that they could only

00:18:38.445 --> 00:18:42.165
send and received phone calls and
texts from people in the contact list.

00:18:42.165 --> 00:18:44.865
So myself, my wife,
grandparents and whatnot.

00:18:45.205 --> 00:18:48.175
So if anyone tried to contact them from
the outside, it wouldn't go through.

00:18:48.575 --> 00:18:52.095
And then also if they were
communicating, with a grandparent,

00:18:52.095 --> 00:18:53.775
I could also see that text as well.

00:18:53.775 --> 00:18:56.625
So let's say, God forbid a
grandparent's phone was stolen

00:18:56.625 --> 00:18:58.935
and now you're communicating with
a child, you're at least seeing

00:18:59.595 --> 00:19:00.825
everything that's coming through.

00:19:01.195 --> 00:19:04.675
And it allows you to, authorize
any apps that they download, right?

00:19:04.675 --> 00:19:07.045
If they want to play a game,
you have to approve it.

00:19:07.045 --> 00:19:10.595
If they want to go to a website
it's locked down by default.

00:19:10.595 --> 00:19:13.635
You may wanna open up a certain
link that they can go to.

00:19:13.635 --> 00:19:17.415
So Apple definitely has all of
those features that you can employ.

00:19:17.790 --> 00:19:21.640
Candace Dellacona: And that's amazing
because as a parent of older kids to

00:19:21.640 --> 00:19:26.230
my knowledge that was not available all
the years ago when my kids got a phone.

00:19:26.230 --> 00:19:29.140
I mean, certainly the rule
in our house and as you point

00:19:29.140 --> 00:19:30.310
out, there is no right way.

00:19:30.310 --> 00:19:34.320
So, I don't wanna get any emails about,
my way is definitely not the right way.

00:19:34.320 --> 00:19:37.740
It was just worked for my family is we
would take the phones often at night.

00:19:38.170 --> 00:19:41.990
And plug them in and certain things
were not private in our house.

00:19:41.990 --> 00:19:45.080
And so that was sort of the way, it
was like maybe the old fashioned way

00:19:45.080 --> 00:19:48.140
of going through things, but I didn't
realize that there was an actual

00:19:48.140 --> 00:19:54.350
setting with certain providers that
would allow that kind of ability to

00:19:54.350 --> 00:19:56.390
put a protection around your kids.

00:19:56.790 --> 00:19:58.650
So the phone is one thing.

00:19:59.010 --> 00:20:01.530
What about being on the computer?

00:20:01.530 --> 00:20:06.150
Are there similar settings, Dan, that
you recommend in your house where you

00:20:06.150 --> 00:20:11.220
say, okay, the kids can do X, Y, and
Z, and how do you go about doing that?

00:20:11.885 --> 00:20:14.615
Daniel Krutoy: So whole other challenge
and something that comes up all the time.

00:20:14.615 --> 00:20:18.745
My kids personally get Chromebooks through
their school that allows them to, they

00:20:18.745 --> 00:20:22.615
use it in the classrooms for, various
activities and learning and whatnot.

00:20:22.885 --> 00:20:26.835
And for the most part it's locked down,
so they can't really do too much outside

00:20:26.835 --> 00:20:28.485
of what that platform is allowed.

00:20:28.845 --> 00:20:31.895
But without speaking with too much
knowledge, I hear my son and some of

00:20:31.895 --> 00:20:32.855
his friends talking about, there's.

00:20:33.510 --> 00:20:38.050
VPNs and special ways that they try to
work around and try to get to certain

00:20:38.050 --> 00:20:42.020
websites outside of just the ecosystem
that the Chromebook has allowed.

00:20:42.380 --> 00:20:44.900
So I think once again,
awareness and watching what

00:20:44.900 --> 00:20:46.100
they do it, it's tough, right?

00:20:46.160 --> 00:20:49.760
You can't sit there and watch every single
moment that while you are working and

00:20:49.760 --> 00:20:52.205
maybe they're on their Chromebook and
have a certain amount of screen time.

00:20:52.985 --> 00:20:56.285
Making sure that it's locked down and
making sure that you're observing.

00:20:56.285 --> 00:20:58.355
So when they're done for the day,
like you mentioned, you would take

00:20:58.355 --> 00:20:59.735
your kid's phone and charge them.

00:20:59.940 --> 00:21:02.560
You have the ability to go in and
look at the history if they went

00:21:02.560 --> 00:21:05.960
to certain websites or getting
redirected to certain websites.

00:21:05.960 --> 00:21:08.150
But that's the school version of it.

00:21:08.420 --> 00:21:11.640
If you have personal devices, the one
thing I would definitely say is, work

00:21:11.640 --> 00:21:15.760
computers should be completely separate
from, personal computers because

00:21:16.315 --> 00:21:17.725
there's a line of delineation there.

00:21:17.725 --> 00:21:19.345
You don't want to mix
and match, but it's hard.

00:21:19.345 --> 00:21:23.245
I know it happens and a lot of companies
actually employ, bring your own device, so

00:21:23.245 --> 00:21:25.445
you can't really stop that from happening.

00:21:25.445 --> 00:21:28.175
But if I could give you a best
practice or recommendation, I

00:21:28.175 --> 00:21:31.035
would say your work computers,
your work computer, your personal

00:21:31.035 --> 00:21:32.265
computers, your personal computer.

00:21:32.265 --> 00:21:34.360
And I'm not saying you
can't shop on Amazon.

00:21:34.455 --> 00:21:38.415
I'm not saying you can't go on websites,
but if your kids are gonna be using it and

00:21:38.415 --> 00:21:41.745
they're gonna be going to certain games
and gaming sites and things like that,

00:21:42.165 --> 00:21:43.575
you just don't want to take that risk.

00:21:44.175 --> 00:21:47.935
So if you do have that device where
they're using it just for personal

00:21:47.935 --> 00:21:51.385
use, there are settings in there for
sure that you can lock it down and

00:21:51.635 --> 00:21:55.085
windows or Apple allows you to say,
all right, this is a child of this

00:21:55.085 --> 00:21:59.645
age and there's a bunch of options you
can toggle to say, certain category

00:21:59.645 --> 00:22:01.625
websites they definitely can't go to.

00:22:01.905 --> 00:22:03.945
Or they predefine them for you.

00:22:03.945 --> 00:22:06.765
If they're within a certain age range,
they can go to certain websites.

00:22:07.065 --> 00:22:11.535
And then it's up to you as a parent if you
want to granularly say, all right, this

00:22:11.535 --> 00:22:13.030
site's okay, but that site is not okay.

00:22:13.692 --> 00:22:17.052
Candace Dellacona: No, I love that there
is the infrastructure already that sort

00:22:17.052 --> 00:22:22.092
of set forth within the technology,
whether it's, Apple or Android, that

00:22:22.092 --> 00:22:24.432
you do have the ability to reign it in.

00:22:24.692 --> 00:22:28.802
I think you probably have seen the
news that Australia, I think is the

00:22:28.802 --> 00:22:34.847
first country that has now locked
down social media sites for kids under

00:22:34.847 --> 00:22:37.077
16, which, I think is pretty bold.

00:22:37.147 --> 00:22:39.727
And I really admire the
intention behind it.

00:22:39.727 --> 00:22:43.867
It'll be interesting to see if it is
able to be enforced and if something

00:22:43.867 --> 00:22:45.487
like that is possible in our country.

00:22:45.487 --> 00:22:52.857
But until then, having the mechanism
in the device to try to control those

00:22:52.857 --> 00:22:57.787
outside features, so that you can
protect your kids or your elderly

00:22:57.877 --> 00:22:59.947
loved ones as much as possible.

00:23:00.207 --> 00:23:05.827
I guess my final question for you is,
let's say, the horse is out of the barn,

00:23:05.827 --> 00:23:07.867
as they say, and you have been hacked.

00:23:08.237 --> 00:23:13.367
What are the measures that you
recommend as an IT professional to

00:23:13.367 --> 00:23:18.107
try to repair and set yourself up for
success so that it doesn't happen again?

00:23:18.677 --> 00:23:19.067
Daniel Krutoy: Sure.

00:23:19.117 --> 00:23:20.917
I guess there's a couple
parts to this question.

00:23:20.967 --> 00:23:23.367
From a business perspective, if
we're looking at it, if something,

00:23:23.367 --> 00:23:26.307
a compromise has happened, let's say
to a computer, first thing you do,

00:23:26.307 --> 00:23:27.807
unplug it from the internet, right?

00:23:27.807 --> 00:23:30.397
Get it offline so it
doesn't spread any further.

00:23:30.427 --> 00:23:33.157
If it's an account, like a
user account email account or

00:23:33.157 --> 00:23:34.237
something that you log in with.

00:23:34.637 --> 00:23:36.617
Immediately try to secure that account.

00:23:36.617 --> 00:23:40.357
And when you say secure is change
the password, make sure if you don't

00:23:40.357 --> 00:23:44.157
have multifactor put it on there or
reset it so that it's just, locked in.

00:23:44.527 --> 00:23:46.377
From a personal standpoint same thing.

00:23:46.377 --> 00:23:48.507
If it's a computer, I would
unplug it from the internet and

00:23:48.507 --> 00:23:50.127
isolate it from that standpoint.

00:23:50.427 --> 00:23:53.377
If it's your email accounts
or some kind of login.

00:23:53.807 --> 00:23:56.207
First thing you need to do is
change your password immediately.

00:23:56.447 --> 00:23:59.387
Even if it's like a randomly
generated password of like 16

00:23:59.387 --> 00:24:00.977
characters with symbols and whatnot.

00:24:01.217 --> 00:24:02.837
Make it as complex as possible.

00:24:03.087 --> 00:24:05.667
A lot of these tools and systems
when you go in, they have

00:24:05.667 --> 00:24:07.397
some kind of logging feature.

00:24:07.397 --> 00:24:11.607
So you want to see who's logged in or kick
them out if you can or things like that.

00:24:11.607 --> 00:24:14.047
And then I would obviously
call a professional.

00:24:14.077 --> 00:24:17.562
And when I say professional, it could
be, a child, it could, or your son

00:24:17.562 --> 00:24:21.052
or daughter, I don't mean a little
child, but someone that, has some tech

00:24:21.102 --> 00:24:23.497
background or ability and work with them.

00:24:23.497 --> 00:24:25.542
And then, yeah you basically
have to find the root cause.

00:24:25.542 --> 00:24:27.732
Is it just isolated to
my Facebook account?

00:24:27.732 --> 00:24:28.602
Is it my bank account?

00:24:29.607 --> 00:24:31.887
Once you figure that out, then
you gotta make the phone calls

00:24:31.887 --> 00:24:35.337
to those places to make sure that
it hasn't spread any further.

00:24:35.647 --> 00:24:38.917
Run scans on those machines
with antivirus and whatnot.

00:24:39.307 --> 00:24:42.397
But if it's something bigger where it's
financial impact or others, I would

00:24:42.397 --> 00:24:43.417
probably get a professional involved.

00:24:44.257 --> 00:24:46.117
Candace Dellacona: Yeah, I
think that that's great advice.

00:24:46.197 --> 00:24:50.357
Look, as we said at the top of the
episode, technology is pretty amazing

00:24:50.357 --> 00:24:55.847
because it can offer us efficiency, it can
allow us to connect with people who aren't

00:24:56.207 --> 00:24:58.307
around the corner or in the same house.

00:24:58.307 --> 00:25:00.977
But there are also pitfalls
that we have to be aware of.

00:25:01.627 --> 00:25:05.587
And as with most issues that we
deal with, the sandwich generation,

00:25:05.827 --> 00:25:07.417
communication I think is key.

00:25:07.957 --> 00:25:12.067
So I'm really grateful for you
sharing the inside scoop today.

00:25:12.067 --> 00:25:16.427
I know that you deal with many more
complex things, so I appreciate

00:25:16.427 --> 00:25:19.967
you breaking down the simple
things for our audience today.

00:25:20.237 --> 00:25:20.537
Daniel Krutoy: Yeah.

00:25:20.747 --> 00:25:24.437
And can I give one more piece with AI
and someone actually mentioned this in

00:25:24.437 --> 00:25:26.877
one of the business groups, actually
a similar group that you and I are in.

00:25:27.357 --> 00:25:31.227
That with AI, your voice recording
within three seconds would be able

00:25:31.227 --> 00:25:35.402
to use that as a voice recognition
for a multifactor authentication

00:25:35.402 --> 00:25:37.502
that allows you to unlock an account.

00:25:37.502 --> 00:25:39.182
And I think three minutes
is what they said.

00:25:39.182 --> 00:25:43.172
If they record you for three minutes,
they can basically replicate your voice

00:25:43.322 --> 00:25:46.237
to do a full conversation and whatnot.

00:25:46.237 --> 00:25:47.197
And that's just today.

00:25:47.197 --> 00:25:49.942
So imagine a year from now and further on.

00:25:49.942 --> 00:25:54.052
So not only to break into accounts,
but those phone calls to the

00:25:54.052 --> 00:25:57.772
elderly, they can be using the
voice of their child or grandchild

00:25:58.192 --> 00:25:59.692
saying, Hey, send me this money.

00:25:59.692 --> 00:26:02.932
And that's a really scary thing and
I don't know what the right answer

00:26:02.932 --> 00:26:04.552
is today, but I'll leave you at that.

00:26:04.572 --> 00:26:07.542
Candace Dellacona: Yeah, So thanks for
leaving us with the most frightening

00:26:07.542 --> 00:26:11.872
thing I've heard in a really long time,
and particularly because, as a podcaster,

00:26:11.872 --> 00:26:15.102
I think my voice is out there, i'm
gonna end up having to hire your company

00:26:15.102 --> 00:26:16.632
when something like this happens again.

00:26:16.632 --> 00:26:21.172
But, I'm really grateful for all of
your advice and even if it's troubling

00:26:21.482 --> 00:26:24.482
to know what's out there, I think half
the battle is knowing what's out there

00:26:24.482 --> 00:26:25.652
so that we can protect ourselves.

00:26:25.652 --> 00:26:28.172
So thank you so much,
Dan, for joining us today.

00:26:28.632 --> 00:26:31.092
And all of your contact
information will be in our show

00:26:31.092 --> 00:26:32.452
notes for all of our listeners.

00:26:32.452 --> 00:26:33.142
Thanks everyone.

00:26:33.272 --> 00:26:34.212
Daniel Krutoy: It was great to be here.

00:26:34.212 --> 00:26:34.652
Thanks so much.