Looking to break into the field of cybersecurity? Special guest Dr. Michael Hart, Assistant Professor of Computer Information Science at Minnesota State University, Mankato, gives his best advice! Nathan sits down with Dr. Hart to chat about the job market, skills needed for the field, recommended coursework, degrees, and certifications, and a plethora of other resources to get started. Plan your path to landing your dream cybersecurity career!
This episode concludes with news stories including a data breach at electronics company Panasonic and a cyberattack on Ohio-based DNA Diagnostics Center.
________________
News Sources:
Story 1:
Seals, Tara. "Panasonic's Data Breach Leaves Open Questions." Threatpost, 30 November 2021, https://threatpost.com/panasonic-data-breach-questions/176660/
Story 2:
Toulas, Bill. "DNA Testing Firm Discloses Data Breach Affecting 2.1 Million People." Bleeping Computer, 30 November 2021, https://www.bleepingcomputer.com/news/security/dna-testing-firm-discloses-data-breach-affecting-21-million-people/
Join Nathan, a cybersecurity expert, and Ham, an internet-savvy gamer, as they walk you through the cybersecurity world. Plus, get the latest security news and happenings from expert Mercy and hear from occasional special guests! Tune in weekly to learn about everything from the basics of personal security to fascinating topics like ransomware, the dark web, and hacking. #BeCyberAware!
Nathan: Welcome back everybody to the final
episode of the CyberAware Podcast, Season Two.
My name's Nathan Sloneker, your resident
expert on all things cybersecurity here
at Minnesota State University, Mankato.
And today I am joined as always
–
Ham: Dude, Nathan, it's so good to be
back in the studio once again, as always.
It's such a pleasure to be here.
Today we have yet another extended
episode, another great thing you love
to see from the CyberAware Podcast.
Today's special guest is Dr.
Michael Hart, assistant professor in the
Department of Computer Information Science
at Minnesota State University, Mankato.
What a great dude to have on the show today.
Nathan: I am excited for everyone
to get into this episode and listen
to what he has to share with us.
Ham: So if you guys are interested in
careers in cybersecurity, Nathan and Dr.
Hart will walk you through what's out
there for jobs and where to get started.
Learn about roles like cybersecurity
engineers, cyber crime investigators,
ethical hackers, and more.
So sit back, relax, and enjoy the show.
Nathan: Welcome back everybody.
This episode, we're going to be talking about the
cyber security field in general, including things
like career paths, resources, and certificates.
And today I'm joined by Michael Hart.
Welcome Michael.
Michael Hart: Hey, thank you
for having me today, Nathan.
Appreciate it.
Nathan: Happy you're able to join us here.
So I guess just a good start, if you
could just tell us a bit about yourself
and what cybersecurity means to you.
Michael Hart: Alright.
Well, thank you so much.
I'm
Michael Hart from the College of
Science, Engineering, and Techonlogy
at Minnesota State University, Mankato
and it's just a blessing to be in the department.
So in our computer information systems
area, we have a lot of different degrees.
Anything from computer science to
management information systems,
health informatics, data science.
So a lot of good areas to go into.
And so I get to teach in some of those
areas, you know, information security is
definitely a big passion of mine and I
teach our information security courses
at Minnesota State, along with Dr.
Christopher Veltos.
So, always was honored to teach in cybersecurity.
I have an extensive background in IT.
Been in the field for many,
many years since the nineties.
My first job, I started with just an internet
service provider and I worked with one of the
most exhaustive and extensive ISP's in the world.
I was mischievous at a young age and so I
did a lot of fun little hacking things as
a young kid in computer science and IT.
And so it was always fun to deal with different
types of bot chats and hotlines and we had
all kinds of ICS communication channels back
then, but we also had a lot of different
areas where you could download security
tools and security hacks and this and that.
And so working with an ISP and having to deal
with a lot of different types of attacks and
then being a young student and trying to learn
as much as I could and soak it in and being
mischievous just allowed me to kind of go in a lot
of different areas of this discipline and domain.
Nathan: The amount of jobs – there's, there's so
many potential jobs that someone can get into.
You got cybersecurity technicians or specialists,
you've got cybersecurity consultants,
analysts, penetration testers, architects,
engineers, managers, cybercrime investigators.
The list just goes on and on and on and on.
Figure out what you like doing and I guarantee
there's a job for you out there in the field.
And you said you do consulting.
Would you mind explaining for our
listeners here exactly what that means?
Michael Hart: Well, consulting a lot
of times just means that you're helping
out others that have a specific need.
And sometimes it's too expensive,
right, to have a specific individual
such as a threat hunter, for example.
It's just, it's too much money and you may only
need their services for a couple hours a week.
You don't need somebody
full-time that's benefitted.
And so it gives an organization the ability to
actually meet that need with just a few hours a
week, rather than having a full-time employee.
Nathan: Outsourcing, yep.
What made you, not even just cybersecurity,
but you know, IT in general, what made you
want to go into this field in the first place?
Michael Hart: Well, really, I
attribute that to my, to my dad.
I grew up with a data center
in my basement of my house.
I had it right there.
So I got to deal with a lot of equipment
just right there at home and having
a dad that really is good in computer
science and math was a huge benefit to me.
I took classes early on.
I went postsecondary to college early and
right away just fell in love with this area.
Nathan: So where did you end up going
to college then if you knew you were
wanting to get into this out of the bat?
Michael Hart: Well, the first college I
went to is just a technical college or
community college I guess you could say.
So my first degree is actually just a networking
degree, computer and device networking.
Back then, it was a little more traditional.
So we did everything from voice to telecom.
But networking was a big first step.
And one of the first certifications that I got was
the Cisco Certified Network Associate, the CCNA.
And then I went on to the
CCNP and so on and so forth.
So getting that networking background helped
a lot and it's always good to start somewhere.
There's a lot of different avenues
you can take but networking was mine.
Nathan: I mean, IT in general is such a
vast field, and cybersecurity even more so.
It incorporates so many different
aspects of IT in general.
As an assistant professor here, what would you
say are the top classes that you'd recommend
for someone to take if they want to get into it?
Michael Hart: That's a good question.
I think, in general, anything in science,
technology, engineering and math, in
the stem area, is a good place to start.
We really emphasize math a lot because
you got to have the math, math, math.
And now, if you're going to do proofs and theories
and become a cryptographer, yes, you know,
you're going to have to be very heavy in math.
But there's a whole lot of other areas too.
You can take a governance class.
Governance, security really relies heavily upon
policies, risk management, laws, precedence.
And so, you can start with the governance program.
You know, you can start with the business program.
On the management side, you
know, being a risk manager.
A lot of project management emphasis there.
So a lot of different avenues again on
the education side that you can start.
But generally speaking, a lot of high
schools now, you know, they have a CS
One, a computer science one course.
That's a really good course to take.
Just some type of computer
course early on in your career.
There's also some really good programs, which I
know we'll probably talk a little bit later about
as well but, CyberPatriot is a K through 12.
CyberPatriot is a youth cyber league and
there's a lot of courses in K through 12.
You just take that first CyberPatriot
course that really gets your foot
into the door and in cybersecurity.
Nathan: I personally didn't take too
many technology courses in high school.
I had a buddy of mine, like you brought
up CyberPatriot, he ended up doing
that and went to all the, I guess,
tournaments they have for that and whatnot.
He said he really enjoyed that.
And that's kind of what got him
kicked started in cybersecurity.
MIS is also a really good program for students
here if they want to go into cybersecurity.
It's so ingrained with the
business side of things.
You know, cybersecurity and technology
and business all go hand in hand.
So, I personally am just CIT major, but I
know that for students here MIS is one of the
probably the ones you should go for if you're
looking to get into cybersecurity at Mankato.
I'm actually going for CIT as my major, but
for my minor I'm going for criminal justice.
And that ties in and I have a bunch
of other peers in my program as well.
One of them was automotive technology.
The other one is going for graphic design.
One of them is doing a math minor but you
know, it's such a broad field to get into.
And these little niche minors that you can also
get your foot in the door in some areas as well.
Michael Hart: Yeah, Nathan,
you're right on the money there.
A lot of students don't realize all
the pathways into information security.
And it really doesn't matter which
degree, you know, you start with.
If you have a passion for it, then
you can build upon any degree in
this field, in this discipline.
I talk about law and governance just
because there's so many individuals we need
on that side, on the jurisdiction side.
A big need there right now.
We're dealing a lot with ransomware.
Ransomware is one of the hottest
topics right now in our discipline.
And I've been speaking a lot on
ransomware in some of my speeches.
And, you know, with ransomware,
a lot of it is sense and respond.
There is a psychological aspect to it.
There's multiple human discipline degrees
that could lead to your ability to sense
and respond to a situation like we see
with ransomware, where you kind of have
to sense and respond to the perpetrator.
Their mental state is a big dimension
of handling those types of incidents
appropriately, and you'd never know it.
We often say that in the onion of our
discipline, technology is the easy part,
people is the difficult part, right?
You just don't know, you can't
predict the person's side of it.
So you have to have those skillsets.
Nathan: It's not just technical skills,
even when you're hiring people, you
know, networking is a big thing.
And for most jobs, you're hiring someone based on
who they are and everything's going to be trained.
I feel like a lot of people always want
these hard set skills when really it's,
if you have a good work ethic and you know
what you're talking about, a lot of the
things they're just willing to train you.
They're going to train you from scratch, and
that's what I was talking about with some of our
past guests as well, is how that's what they look
for in hiring people in their sort of fields.
With ransomware as well, how the mindset of
like threat actors plays into their attacks.
Actually, for one of our episodes,
we ended up doing ransomware.
There's ransomware negotiators and types
of insurance and there's whole policies
that so many people wouldn't even think
that existed for these sort of attacks.
Michael Hart: My first week of lectures in our
introductory information security course at
Minnesota State University, Mankato is insurance.
Insurance is a big part of our discipline
and that's one of the most difficult parts of
selling information security to our superiors
is – Hey, you're paying for insurance.
It might happen.
It might not.
Nathan: Fair enough.
I feel like even companies nowadays,
they don't put enough stress on
how important cybersecurity is.
It's the backbone, especially for how
much technology runs the world nowadays.
Everything uses technology.
I'd be surprised to find a business or an
organization that doesn't utilize technology
in some way, especially the big name ones.
It's everywhere.
And it's only getting bigger and
it's only getting more advanced, more
specialized as we continue moving forward
with attacks and offense and defense.
Everyone's evolving.
Michael Hart: Yeah, absolutely.
It's really important I think as well – big
data has been a tremendous advocate for
information security, because as data has
become more pertinent to firm survival and to
our competitive advantage in organizations,
its protection has become even more critical.
Also, you know, the ethical, you know, aspect
with artificial intelligence and machine learning.
Some of the more dynamic aspects of what we're
seeing in organizations and how we're predicting
things has tremendously increased the need
for security as well and the ethics behind it.
Because we really don't know how ethical we can
be with ones and zeros at the end of the day.
It's very difficult to predict robotically what
those ones and zeros can turn into given any type
of backdoor trap, any algorithm manipulation.
So there's a lot of opportunities in these areas
and going beyond the traditional law and precedent
and some of those old adage areas, students should
really look for these new technologies and the
trending areas such as artificial intelligence
and big data if they want to get into this
discipline as well, because there's going to be
some key areas of need in the career paths in
those areas that traditional computer scientists
and IT individuals like myself that just didn't
have an introduction to in our early education.
So this gives students a tremendous
advantage over us older professionals.
Nathan: You're talking about
machine learning and AI.
How everything's moving towards more automation
and in certain fields, you know, we're always
talking about the job deficit in cybersecurity.
And as you stated earlier, a lot of
that's found in the public sector.
They're hurting for workers that are
able to help them out with security,
protection, all that sort of thing.
That's a big topic that is going around nowadays
and how public can compete with private sector
when it comes to cybersecurity jobs.
ML and AI, all moving towards automation.
Do you think the field itself is going to get
more specialized as we continue moving forward?
I mean, it already is, but it's going to be
crazy to see new technologies emerging and
just how specialized each job can actually get.
Michael Hart: It definitely is going
to continue to become more specialized.
Computer science as a discipline
was one of the traditional areas.
But prior to computer science,
you know, you had math degrees.
So you have math degrees, now you
have computer science degrees.
Now out of computer science, you know, you
have IT degrees, MIS degrees, data science
degrees, cybersecurity degrees now, which
is even a greater microcosm of a macrocosm.
So we're seeing degrees become more
specialized and we're seeing the same
thing in our discipline career wise.
Prior, we had an information security analyst.
Now we have incident analyst.
So just once again, a microcosm of a macrocosm.
Now we have specific incident analysts.
And we have pen testers, we have threat hunters.
These are very specialized areas now
of our field, specialized careers.
And by the way, pen testers and threat hunters,
you know, that sounds very promiscuous in some
ways, but what it is is it allows us to become
very good in a specific area of the discipline
and nonetheless, just because we're specialized,
doesn't mean we're not gonna have people that
need to have more of the general skillsets either.
Really, it depends on the company size.
The smaller the company, the more
skillsets you need to have in a
broad array of information security.
So when I work with smaller organizations
and consult with them, sometimes there's one
information security professional, if that.
And sometimes there's just the system
administrator that does the networking,
that does the IPS, the IDS, so on
and so forth, the networking, and
the systems in the virtual machines.
So I think the organizational size
has a lot to do with it too, just so
far as how specialized you become.
But I think over time, absolutely
we're going to become more specialized.
So far as the artificial intelligence,
will automation draw some positions?
Potentially, but often automation
also creates positions.
And as we get better at certain things, maybe
we'll see additional positions that we didn't
have elsewhere, just because of specialization.
Nathan: Okay.
Some of the more mundane tasks, that
might be what becomes automated.
The daily in and out sort of things.
Even with tools we have right now, for instance
Defender ATP, or that security center software
in general might already ping these sort of
things that you don't need to go hunting for.
Already kind of do some of
these automated tasks for you.
So, looking down the road, jobs might become
more specialized in that sort of sense.
And the more mundane tasks are just going
to be handled by machines and stuff.
In one of our last episodes with
our guests, we talked about what the
future of cybersecurity may look like.
It's crazy just seeing how, moving
forward, the types of technologies that
are arising and what comes with that.
I was reading recently – I think it's the
national security council, they release
a report like every four years hinting at
what they think the future may look like.
And they read a lot into how technology is
going to play into politics going into the
future on a world stage, geopolitical stage.
Whoever has the most technology is going to
be kind of the major players in the world.
And it's even leading into tech companies.
And these big, big corporations are actually
going to have a big say with what goes on in
the future because they're going to be the
ones who are dealing with all this technology,
from a private side standpoint as well.
Michael Hart: Yeah, that is a very good point.
If you look at what's come up in the news a
lot in politics, we've seen a lot of politics
around social media and some of these big
outlets, because it's so powerful to use
these platforms for political purposes.
So I think that it's very important to recognize
that and be cognizant of the general direction
and influence of big tech and those firms.
And so you make a very good point.
Nathan: I wouldn't say I'm excited or worried,
but you know, it's going to be taking a step back.
Cause I mean, going forward, that's
going to be definitely something I'm
going to be dealing with in the field.
If it's 20 years from now or whatnot, I'm
still going to be working for the most part.
So it'll be interesting to see.
Going back on some of the
stuff you were saying earlier
with the certificates.
You said you had a networking certificate.
I know here at Minnesota State University,
Mankato we offer information security
certificates, a networking technology
certificate, which are two kind of the
big ones that I personally am going for.
And then we have graduate degrees
here, like risk assessment.
Michael Hart: Yeah.
So, we definitely have a number of different
degrees here at Minnesota State University.
We have the PSM program.
It's a professional master's degree.
It's information security and
risk management is what it is.
And so, now, it is tailored toward working
professionals, but also students across a
broad array of spectrum take this program.
It starts with different types of
security and risk management courses.
So there's a researching and analyzing
information security course, there's a
research topics in information security.
But it also covers data communications
and networking, and there's a networking
course that's in the required courses.
We also go into information warfare.
Nathan: Yeah.
I'm taking that class right now with Dr.
V.
So I'm enjoying that right now.
Michael Hart: And the cyber risk
analysis graduate certificate, that
covers a lot of those same courses.
It's just nine credit hours though.
So it covers the research side, the
reporting and information security risks,
and then the information risk management.
We have similar information warfare
undergraduate versions of those and risk
undergraduate versions of those as well, as
well as network security, as you mentioned.
So certainly a number of different
degrees there at the graduate level.
And then undergraduate again, computer
science, computer information technology,
management information systems, health
informatics, all of these areas are excellent
feeder programs into information security.
Nathan: Okay.
Certifications – if someone wants to get
into cybersecurity, there's a billion
different certifications that you can get.
The biggest one, especially for
undergraduates or entry level positions
– CompTIA – your Security Plus certificate.
And even on the upper end of the
spectrum, you have things like your
CISSP – your Certified Information
System Security Professional certificate.
That's one of the top notch
certificates that you can get.
So I'd like your opinion on for a student
going in, what certifications would you
recommend for someone wanting to get
into the general cybersecurity field?
Michael Hart: Yeah, that's
a great question, Nathan.
CompTIA is an excellent organization.
They have a lot of good entry-level
security certifications.
And sometimes for a student, they just have to get
that first certification to build that confidence.
So I don't really recommend necessarily that
students take a very specific certification, I
just call my students – let's get number one,
let's get the first certification, you know?
So just get one, get one out of the way.
Once you start studying for them and you get
one, it bolsters that confidence, and then
hopefully it builds to other certifications.
But yeah, that CompTIA that you mentioned
– CompTIA has Security Plus, they have the
Network Plus certification, there's a PenTest
Plus, there's a cybersecurity analyst.
They're really starting to become
a little bit more granular.
If I can kind of carve something out with CompTIA
and the EC-Council, I would suggest take the
Network Plus to get that networking foundation,
then take the Security Plus, then potentially take
the Certified Ethical Hacking or PenTest Plus.
And then if you want to go to the management
side, the analyst side, do the cyber analyst.
And then you could go into, perhaps, the
CASP Plus, but that's where I would start to
kind of move over into like a GIAC, so the
Global Information Assurance Certification,
the GIAC, that's an entry level one.
It's well-respected with the government.
In fact, the National Security Agency
recognizes that when it gets into cryptography,
as well as the soft side, such as incident
response, network security, active defense.
So that's kind of the direction I would take.
There is a number of other areas.
So ISACA has got a couple of good ones.
They have a Certified Information
Systems Auditor on the soft side.
On the management side, the Certified
Information Security Manager – the CISM.
So you've got some good options there.
And then as you mentioned, really,
that top one is the CISSP, Nathan.
So that's probably the most recognized,
which is the Certified Information
System Security Professional, and it
covers a broad array of areas everywhere.
You know, everything from risk management to
asset security, uh, you know, so on and so forth.
Nathan: For introduction though, CompTIA I've
heard from mentors and just other professors,
that's a really good one to get your foot in the
door for that first entry-level job that you have
out of college, that's a great one to have and get
you a leg up over other people who are applying.
Michael Hart: Yeah, absolutely.
And you can even throw in some heavier
certifications on the Microsoft and Oracle side.
Software.
Oracle Certified Associate in Java.
Because you have to have that software
background, so I recommended a software
certification for my informationsecurity students.
Database certification too,
you know, would be great.
But networking side, Cisco again, really good.
Juniper, they've got great simulators.
So I love Packet Tracer, Cisco Packet Tracer.
I love GNS, GNS3 because these are
simulators where you can make a lot
of mistakes and not break anything.
Nathan: Moving off of certificates.
You know, in your opinion, resources besides just
college that people can refer to, to learn from?
If you want to dip your toe in the water
of cybersecurity, where you can go.
Michael Hart: Yeah, great question.
One of the things that I recommend is that
you head over to some type of simulation lab.
I talked about GNS3 and Cisco Packet Tracer,
but there's more exhaustive labs out there.
One of the best labs out there is Cyberbit.
And Cyberbit, it's just www.cyberbit.com.
They have a virtual SOCC, a Security Operation
Command Center and it allows you to actually
work within the context of real attack scenarios.
So Cyberbit is a good one.
In Minnesota here actually, we have
Cyrin, in Minneapolis, Minnesota.
It's used a lot for military and first
responders, but you can also get in there as
well through different students scenarios,
it's just cybersecurityintelligence.com.
But there's a lot of other
good cyber ranges out there.
Cloud Range out in Nashville,
Tennessee – one of the most advanced ones.
Accenture, they've got their Cyber
Fusion Center now in Washington, DC.
That's done an extraordinary job
training a lot of experts in the public
sector and private sector really.
So cyber ranges is one thing that I would look at.
Get yourself into a cyber range so you
can just start to actually deal with
attacks and work with the technology, with
IT infrastructure, so on and so forth.
We have a great club, a great student organization
here – the Information Security Student
Organization here at Minnesota State, and we do
the national collegiate cyber defense competition.
These competitions, just like
I mentioned CyberPatriot.
The CCDC competition is a
national collegiate program.
And these programs are excellent.
They really train you in a lot of
different areas of information security.
So one of the environments that they
train in is all virtualized, it's right
here on campus at Minnesota State.
And they learn how to work with low level
hardware issues, like buffer overflows.
They do all kinds of ethical hacking,
but they also do cyber defense.
They work with intrusion prevention systems, with
mainline ones, and intrusion detection systems.
And then, you know, the server side,
the virtual side, so on and so forth.
Nathan: So you brought up student
organizations that you can join.
Now, I don't know if there's a
stigma around, you know, you need
to know everything in order to join.
Would do you mind filling in?
Is it that students can just come and join,
you know, you might not know anything?
Michael Hart: Yeah.
So if you've never done anything beyond just
the graphical user interface on a computer and
you're like, there's no way that I can become a
hacker or there's no way I could do programming.
What I recommend is just head over to a lock room.
And a lock room is just an area where
you go in and you're given clues
and hints to try to find things.
You work with the team collaboratively and
you see, can you get out of the lock room?
Can you get out?
And how long does it take you?
A lock room is a great place just to
see how some of this stuff works in a
tangible form without using computers.
And it's a lot of fun and if you have a curiosity
in something as simple as a lock room, then
perhaps you have a career in information security.
It's that simple.
You don't have to again
have a degree or background.
Another thing is a hackathon because you
don't have to have any programming experience.
Hackathons can be just hacking code.
They can be hacking systems.
There is a bunch of different types of
hackathons, so that'd be another good
event just to join in and see if, you
know, if you've got any curiosity there.
Nathan: You're talking about the
escape room – I personally never have
considered that as a general interest.
It plays so well with information security.
I just hadn't ever thought of it myself.
What would you say are good traits and skills to
have going in when it comes to cybersecurity jobs?
Michael Hart: Curiosity, I think in general.
We've talked about the math, the analytical
skills, but the artistry side is just important.
You know, you've talked about, you have
a friends that are graphical artists.
Well, you know, we need individuals
that can create posters, but we
also need people with imaginations.
Because a lot of times, if you've got the
analytical skills, you have to dream and imagine
what a cybercriminal is going to come up with.
They come up with some pretty creative
ways to social engineer people.
A lot of good hackers, they're very good at just
having a conversation with you and all of a sudden
they have a key factor, a key piece of information
from you that allows them to compromise
the system that they're trying to get to.
It's that simple.
You have to be a good people
person on the social side.
On the mathematical side, yeah, if you
can do proofs and you can work with new
algorithms and encryption, that's excellent.
So a lot of broad spectrum of skillsets
there, but just imagination, I think critical
thinking, and thinking outside the box.
The ability to be artistic is a great skillset
as well as mathematical and analytical.
Nathan: There's so many different ways to break
an egg in this sort of sense with the field.
So I definitely agree with you.
That's a big soft skill to
have – out of the box thinking.
Going back on some of the stuff you were
saying earlier, a lot of people would say
the same thing, that people are the biggest
vulnerability in any organization you go to,
especially on like a cybersecurity perspective.
With that in mind, what would you recommend,
I guess, some of your biggest tips and tricks,
kind of a crash course that any general
average Joe can do in order to keep safe?
Both within their personal life and through
something like school or their company.
Michael Hart: Yeah.
No, that's a great question.
We try to do training at
every organization for anyone.
Sometimes, you know, you have to
just use your own, uh, senses, right?
To determine whether something
seems a little fishy.
No pun intended.
So, when you get an email from somebody
you don't know, you shouldn't trust them.
When somebody calls you that's not on your
contact list, don't give them information.
It's always hard because you want
to trust people, you know, you want
to expect the best out of people.
But unfortunately what we're consistently
seeing is in the most vulnerable of
situations, we see some of the best of
the best people and we see some of the
worst of the worst people, unfortunately.
Another thing that I spoke a lot on recently
in speeches is just how COVID, how our pandemic
that we're going through right now is being used.
You know, you have a lot of individuals
right now, unfortunately, that are using
their health to leverage an advantage in
our discipline in information security.
And so they'll send an email that says, oh,
you know, "here's a new medicine that's going
to help you fight this pandemic, this virus."
And you click on it, you know,
and it's a phishing attempt.
You're entering your credentials into
a fake website and they've got you.
Unfortunately we're seeing a lot of
attacks that are just out of the necessity
for somebody else to gain advantage.
And criminals, uh, are people just like
everyone else and they have a need.
They need potentially food.
And so how did they get food?
Well, they're using some type of illicit
behavior to take advantage of somebody
else that has money to gain money.
So we have to look at it from the
other side of the perspective too.
What's the motive of the hacker, of the criminal.
And sometimes it's somebody that
just needs something as simple
as food to survive the next day.
Nathan: Stepping into your attacker's
shoes is a big thing to know.
It's these mock situations and
hypothetical risk assessments.
Understanding where you're vulnerable.
See where the holes in the ship are, you
know, and offer how you can patch them.
We're coming close to our time here.
For our listeners here, you know,
your top three tips or takeaways
that you can just offer to everybody.
Michael Hart: I think that, uh, specific
to our discipline in particular,
you always have to be curious.
And out of curiosity and imagination,
always try to identify through your
passions the best avenue for success.
It's really important out
of curiosity to take action.
And to carve out your pathway.
Start somewhere.
Don't just essentially take the safe
route, you know, start somewhere.
I tell students a lot of times to
get into this discipline, you can
start just as a help desk technician.
Take that curiosity and do something with it.
Just do something somewhere in IT.
I don't care where in IT, just start somewhere.
Nathan: Great advice.
I agree with you 100 percent.
Michael Hart: Make sure you're always true to
yourself, that you have a value system, that you
have integrity, that you have a good attitude.
For you to be successful, it's really important
for you to have a positive outlook at all times.
To treat people with respect and have
gratitude and thankfulness for others.
You know, you never know, Nathan,
who your next boss is going to be.
I don't know how many times I've seen somebody
that said, oh, you know, "you're my boss now?"
After essentially the opposite being true.
You know, I was next in line for a
position and somebody else got the
position and now I'm under that person.
They're my superior.
And how did you treat that person?
Nathan: Yep, relationships change.
The person you might've been hanging
out with on the weekend and you guys
always would whine about your old boss
together, now they're in that position.
Michael Hart: Absolutely.
So yeah, always have a positive
outlook, have a good attitude.
Work well with people.
Just have integrity and respect
others, care for others.
That would be a second element.
And then third, always be
passionate and love what you do.
Life is short.
It is so short.
And we just can't emphasize that enough.
You have to love what you do.
You have to be passionate and you
have to enjoy life day to day.
Take it easy sometimes, give
yourself a little bit of a break.
Don't be too intense.
And just love those around you and
support others and be encouraging.
And so it's really just an honor to be here and
I'm so thankful again that you are taking action.
A podcast is precisely what we would define
as one of those action items, where you have
a passion and you have curiosity, you've
gone after it and you've developed something.
And you've made something
of yourself because of it.
And this is an extraordinary opportunity that
everyone can learn from that's listening to
the podcast is just go out and do something.
Take action in an area you're passionate about.
And it can be a small step first that will turn
into a giant step and something extraordinary.
Most big things start with something
very miniscule, very small.
So thank you so much for doing this podcast.
We really appreciate it.
Nathan: Well again, thank
you for joining us today.
We're honored to have you as a guest and I'm
hoping our listeners here and I, myself as
well, learned a lot from you this episode.
So again, thank you so much for
coming and joining us today.
I really appreciate it.
Michael Hart: Absolutely.
Thank you so much, Nathan.
Nathan: Well, I guess that about wraps up
this episode for the cybersecurity field.
Hopefully we have a few people who take an
interest in cybersecurity and are able to
do something with what they learned today.
And now let's get into the news.
Hey everyone, Nathan Sloneker here
filling in for Mercy with the news.
I'll be updating you with what's
going on in the cybersecurity world.
Before I get into the headlines, please
make sure to subscribe to our podcast.
Today's headlines are
–
A confirmed data breach at Panasonic.
On November 26th, 2021, Panasonic, a Japanese
based electronics company, announced a data
breach that had been ongoing for several months.
The cybercriminal accessed the
internal file server of the company.
This was discovered on November 11th, 2021,
and Panasonic still is unsure about the total
damage that incurred after the incident and
further investigations are still in process.
This attack becomes the second after another
attack on Panasonic India in 2020, when
financial and sensitive data was exposed.
Secondly, over two million people were affected
in a cyberattack on an Ohio DNA testing center.
In November 2021, a DNA testing center called
DNA Diagnostics Center reported to have suffered
a cyberattack where a database was hacked and
financial and account information from over two
million people were accessed by a cybercriminal.
The company confirmed that genetic testing
information had not been compromised.
Information accessed by the cybercriminal
includes names, credit and debit card
information along with security pins,
financial account information, and passwords.
This information was on an older
database from a genetic testing
organization that is currently inactive.
Be advised and monitor your bank . Accounts
regularly for any wary or fraudulent activities.
And that wraps up the news for this week.
Thanks again for listening
to the CyberAware Podcast!