Microsoft is to blame for these hacks as much as the Russians and China

preview_player
Показать описание
[As heard on WGAN 2021-06-02-wgan. The following is an automated transcript.]

Craig Peterson: [00:00:00] Good morning, everybody. Craig Peterson here. Thanks for joining me this morning. I was talking more about this Commonwealth of independent states. In case you're not aware of it, these are the countries that were part of the Soviet Union. Now not all of them are in it, but the majority of them are. And why are the hackers going out of their way to avoid hacking?

[00:00:25] It might be a red herring, frankly, but it also might be because there could be some severe penalties for them and how you can use that in order to help save you from getting hacked. So all of that here this morning, as well as a little bit more about the meatpacking plant that had to close down here throughout.

[00:00:49] North America. So here we go with Mr. Matt, Gagnan

[00:00:54] Matt Gagnon: [00:00:54] 7:36 on WGAN morning news. A good time to talk to Craig Peterson, our tech guru, who joins us at this time every Wednesday. Of course, you also hear him on Saturdays at one. When he talks about all these topics and more in more depth, Craig, how are you this morning?

[00:01:12] Craig Peterson: [00:01:12] Oh, WGAN is always a good time. Not just when I'm on, I'd do a little something extra,

[00:01:17] Matt Gagnon: [00:01:17] a little something extra. Thanks so much for joining us here. Of course, for that little something extra right now, Craig Peterson, I do have to ask you first about. Meat hacking. I've been plugging it all morning here.

[00:01:30] Obviously, we had the oil pipeline hack. Now we have beef plants forced to shut down because of a cyber attack here. So these cyber attacks are happening with increased frequency. And are a problem. Tell me, sir, what's happening here and what it means for us?

[00:01:45]Craig Peterson: [00:01:45] We have a whole crew of people internationally.

[00:01:49] Some are in Russia, some are in China. Of course, we've talked about North Korea and others before who are trying to make money. And the way they can make money is by going after targets that are particularly rich that have the money to pay the ransom. And that's why they're going after these guys. It's like Sutton. Why did he Rob banks, supposedly? Because that's where the money was. And in this case, that's really what they're doing, Matt.

[00:02:20] Matt Gagnon: [00:02:20] It certainly is where the money is, and they're happening with, it seems like greater frequency or at the very least greater visibility because they're going after big stuff here.

[00:02:28]Do you expect this to continue? I know that there's been some talk hereafter the pipeline attack that we're going to reinforce our infrastructure and make sure things like this don't happen again. Any truth to that.

[00:02:37]Craig Peterson: [00:02:37] Yeah, there is there, there's a number of things that are going on right now to try and tighten things up.

[00:02:43] But I've got to say this JBS, which is the company that was attacked here, this meatpacking company, that basically a quarter of all of our beef and a fifth of all of our poultry is packed to there. They responded pretty darn well. They didn't, obviously, keep the hackers out, but nothing is a hundred percent.

[00:03:05] They immediately did something thing that solar winds took a not soldier cringe, but were a colonial pipeline, took a little bit longer to do. And that is, they shutting me down very quickly. Yeah. They started to look, see what was going on. They immediately brought in a team of people. This is what they do.

[00:03:25] They help bring companies back from a ransomware attack. They brought in a lot of people, so they could start restoring all of the systems. It looks like from backups and then starts turning things back on one at a time. I imagine they'll tighten up some of their security operations, which we. All need to do, which goes right into your question of are we going to do more?

[00:03:49] Is there more we can do? And the answer to that is absolute. Yes. Every one of us, that most of the time the bad guys are using what is called zero-day attacks initially, which means there is a vulnerability in something very often in Microsoft windows or in a firewall. And the bad guys know about it, but it hasn't been patched yet.

[00:04:15] But I got to tell ya that is only really used against these very big operators where there's a whole lot of money involved. Most of the time, we're getting hacked. Because we haven't patched. Now I know how painful it could be the patch. Okay. Especially when we're talking about Microsoft, you can apply their patches and then brick to your machine.

[00:04:38] In other words, turn your machine into something that's almost useless, and it's going to take you days to recover. So people are weighing that back and forth. Is it worth, potentially knocking myself off the air for a day or two or...
Рекомендации по теме
Комментарии
Автор

Why would microsoft leave so many open permissions. This is basic computer security. Like wtf. Stop using windows for infra structure. Windows is the most insecure operating system they could use.

eliinthewolverinestate