Did you know that there are 370,000 NEW malware threats released every day and small businesses (and their bank accounts) are the #1 target? In this episode, Kristina sat down with Jeff Chandler, founder and CEO of Z-JAK Technologies and author of the book “Hacked! What You Must Know Now To Protect Your Business Financials, Customer Data, and Reputation From Cybercriminals” to discuss what you MUST know.
Are you a business owner? If you do anything on the internet, this episode is a MUST listen! Kristina sat down with a cybersecurity expert to discuss the number one threat to your business that even the BEST firewalls and anti-virus software can’t protect against and what you need to do now to remedy it!
Don’t miss this episode! Crucial information is being shared about the biggest security risks and what you need to do to stay safe if you’re going to store client data, confidential data and financial information.
Stay tuned for this episode! Kristina talks with a cybersecurity expert about the continual increase of mobile devices, cloud applications, e-mail, and social media sites connecting to your computer network and how to keep your network secure from malware threats and hackers!
BY THE TIME YOU FINISH LISTENING, YOU’LL UNDERSTAND how to optimize technology and keep your network secure, freeing you up to increase your quality of service and make more money doing what you love!
How are you keeping hackers and malware from infiltrating your sensitive information? Share with us and tag us on Facebook or Instagram @theringtheblingandallthethings
Connect with the host:
Social media @kristinastubblefield
Connect with our guest:
Z-JAK Technologies Free Executive Brief/Protection Guide Link:
Our vision is to bring vendors, venues, show producers, wedding groups and engaged couples to ONE amazing place! We have built a platform that you can use us to access local vendors, video and photo inspiration galleries, mood boards, wedding stories and articles, engagement stories, exclusive savings, wedding show and expo events in your area, online stores, resources like wedding registries and informative podcasts as well as education events! www.ringblingallthethings.com
Kristina Stubblefield 0:00
370,000 That's the number of new malware threats released every day. And small businesses and their bank accounts are the number one target. That's why I sat down with Jeff Chandler founder and CEO of Z-JAK technologies and author of the book Hacked - What You Must Know Now To Protect Your Business Financials, Customer Data and Reputation From Cyber Criminals to discuss what you must know.
You're listening to a Business Booster episode of the Ring The Bling And All The Things podcast. My name is Kristina Stubblefield. I'm a technology consultant, marketing strategist, business coach, and in the past a wedding vendor. In these podcast episodes, I'm providing impactful, easy to implement solutions and strategies for efficient workflow and business growth. Now, let's dive in to this episode.
I've been so excited about having this guest on the podcast. And I'm going to share why when Jeff sent me this statistic. I want I knew that I wanted it to be the first thing I shared with the listeners. According to September 2021, statistics from av test.org 370,000 new malware threats are being released every single day. Now, if you're a small business, you may be thinking, well, they're not really going to be targeting me, you need to stop right now and pay close attention to this episode. Because Jeff is joining us. He owns Z-JAK technologies. Jeff, thank you so much. As soon as I met you, the first words out of my mouth was, I really think you'd be a great guest for our podcast listeners. Thank you for taking time to come in and be on the podcast.
Jeff Chandler 1:56
Thank you, this is gonna be awesome. Can't wait to talk to you about this. Well, so
Kristina Stubblefield 2:00
I met Jeff, because he's just released a book called Hacked. If you're watching on our YouTube channel, you see that I have it in my hand. And for those listeners who don't know, I do have an IT background, I went to school for a Microsoft engineer. So I may have went flying through these pages. And in all honesty, because I knew this conversation could go in 100 different ways. I did ask Jeff to compile some things that he felt was important to share with wedding professionals. But to be honest with you, this is going to be good for any business owner. It doesn't matter if you're small, medium or large entrepreneurs, online course creators. If you're in any type of business space, you want to pay close attention to what you're getting ready to go over this statistic that you shared with me 370,000 a day.
Jeff Chandler 2:52
That's crazy, isn't it? It's so many every single day, it's just hard to keep up with it, especially as a small business owner, trying to understand what that threat means to you. It's just it's kind of terrifying, honestly, well,
Kristina Stubblefield 3:06
the first thing that went through my mind is you better have some good software in order to keep up with this many happening at a time. I'm assuming that's something you're going to talk about today as well.
Jeff Chandler 3:18
That's right, yeah, I'm gonna give you a few tips today. And so what we want to talk about is ways to help prevent that. But then also, we need to talk about what happens when it happens.
Kristina Stubblefield 3:29
Exactly right. Because a lot of times you think that it's not going to happen to you? Until it does, right? And then you're scrambling because you've not put any thought to it whatsoever. So first, I know with my background, a lot of people assume a viruses, malware ransomware. They think even though they have different names, they're all the same. Do you have any general explanation to understand the differences?
Jeff Chandler 3:57
Well, they're all bad to start with.
Kristina Stubblefield 3:59
They are all bad. You don't want any of them. Right? So
Jeff Chandler 4:02
So malware is the overall term. So malware describes ransomware, viruses, worms, Trojans, there's all sorts of sort of subcategories of malware. A virus just talks about how that particular infection spreads, just like it would if you had any other kind of virus. So it spreads from computer to computer, it might do something destructive to your computer, it could, it could be something as silly as doing a screen pop up. Or it could be something that sends you to a fake website ransomware. What that is going to do is that might sit on your computer for months while they collect data on you on your business. At some point, it's going to trigger that ransomware attack, and it's going to encrypt all of the data on your computer, and then they're going to ask for money to unencrypted data. So at that point, you have two choices. You can pay the ransom and usually they want to in bitcoins It can't be traced. Or you can use your backups and you can restore the data.
Kristina Stubblefield 5:05
One thing I want to push put in here is encrypted. For those who don't know what encrypted means. You want to share with them. Yes.
Jeff Chandler 5:14
So encrypted is typically, the easiest way to explain let me think about this would be basically locked, you cannot get to it, it's a scrambling the data. So you probably had the secret decoder ring when you were a kid, right? So you take the secret decoder ring, you spin it around, and you and then you scramble all the words and your data, so that you don't know the key to unscramble
Kristina Stubblefield 5:36
it. And it's not usable. It's not it's not usable at all right? Well, I know people are probably thinking, I don't want any of this to happen to me. And I think that's the key takeaway from this is preventing it. And I know you've come up with some items, you want to just jump right into them. Sure. Let's go for it.
Jeff Chandler 5:55
Okay, so what I wanted to do was come up with an I've actually got about 10,
Kristina Stubblefield 6:00
but I'm gonna cover it, you don't think we'll have time to cover all 10?
Jeff Chandler 6:03
It might take a while. I don't know how much time we have here. But it might take a while.
Kristina Stubblefield 6:06
I do like to talk. So you're probably right. So go right ahead. And I do appreciate that you've compiled that many.
Jeff Chandler 6:13
Right. So I'm going to go through I think the three to four, which I think are just critical, that make sure that you that you take care of number one, make sure that you're updating your systems. So when a patch comes out, make sure you're applying the patch.
Kristina Stubblefield 6:29
Okay, let us stop right there. They don't know what a patch is. Okay, update, we're talking about like Windows updates,
Jeff Chandler 6:35
Windows updates, application updates, all of it. So I
Kristina Stubblefield 6:39
shouldn't just let them sit there with the number just keep going higher and higher my notification bar? No, not at all. That also, that's not just hey, that's going to take time, that could make you susceptible.
Jeff Chandler 6:51
Right? Right. So these viruses, these Trojans, all of these different malware attacks, are looking for opportunities and defects in the code. So So like, for example, if you if you use Chrome, and you look in the upper right is section of Chrome, you'll see it every once awhile, say update, it starts green, then it turns yellow, then it turns red, are you going to say you shouldn't wait till it's red, you should not wait till it's red,
Kristina Stubblefield 7:18
to close all my tabs that I have open in order to do that update. But it's that important, right? It
Jeff Chandler 7:25
is very important. That typically what it's going to do, when you just click that update button in Chrome, it's going to reopen all the tabs you had. So it'll close everything. It'll reopen, now you're making me feel better. But it does take a little bit of time. So you know, maybe when you go get a coffee break, go to lunch, just click that button that day, take care of it, come back, and you're going to be secured.
Kristina Stubblefield 7:47
And I feel like a lot of people use Chrome, I've even found a lot of Mac users that that use Mac computers versus PC. They're using Chrome a lot of times,
Jeff Chandler 7:59
right? Yeah, you can use it on any platform Linux, Max or Windows.
Kristina Stubblefield 8:05
So one question in that realm, I feel like, I know a lot of people have already started getting notifications about Windows 11, do you recommend going ahead and if you're on Windows 10 to update, I would wait for now. Okay, you do recommend waiting, I recommend
Jeff Chandler 8:21
waiting just a little bit longer. I don't like to be the first one to adopt that, especially if I'm a new business owner, and you're not sure that all of your applications are going to work correctly. So let it let it run, let it bake for a couple of months.
Kristina Stubblefield 8:34
This is one update that should sit because I think what people might not realize is when there is a new operating system pushed out like that, you know, there are patches, or there are things that come out that you also have to say up with so
Jeff Chandler 8:51
right, and they're still supporting Windows 10. They're going to have updates for that for the next several years. So you're not going to miss any security updates by not updating to Windows 11.
Kristina Stubblefield 9:01
Okay, great information. I'm wondering what which what direction you are going to recommend,
Jeff Chandler 9:06
right? Yeah, and not even all the PCs will support Windows 11 Right now, there's some minimum security requirements for your computer's it will tell you if it's supported or not. But But either way, just wait a couple months, let it bake for a little bit and then and then make sure everything's gonna work a check with your vendors. So if you have some mission critical applications that run your your store, make sure they're gonna work on Windows 11. Before you do that update
Kristina Stubblefield 9:32
before you take the plunge. Very good advice. So just in that first tip that you've said, it's important to when those any updates come out on your software that you use, except windows 11, which we just covered. Make sure you set aside the time don't let it sit on your computer. Not only are you possibly bogging down your computer, you're opening yourself up to what we started off with any the bad stuff you don't want. Right Great tip
Jeff Chandler 10:00
Yeah, the Windows updates come out the second Tuesday of every month. So if you start looking forward around Wednesday or Thursday, you'll see those updates come out. Just take the time, make sure that you've got the auto update turned on, and I've got instructions in a document we're gonna talk about later, and turn that auto update on and just let it reboot.
Kristina Stubblefield 10:18
I just jotted that down. I wondered if you were going to recommend to have that on. And a lot of times I have mine set in the evening,
Jeff Chandler 10:26
right is what I do. That's what I do as well. Okay. All right.
Kristina Stubblefield 10:29
Are we ready to move on to the next one? Sure. Okay,
Jeff Chandler 10:32
so the next one is around passwords. So I knew
Kristina Stubblefield 10:35
this was this. Pay close attention. All of you all out there. If you have password as your password, you don't have password. We could get a list all day. Couldn't we? Jeff
Jeff Chandler 10:44
actually brought a list to the top 10 with me, you did this? Awesome. Okay, great top 10 most common passwords. 123456 is number one. Right? Unbelievable.
Kristina Stubblefield 10:56
And you know what I hear from my clients, because a lot of times I'm helping them with software because it ties into their marketing and things. Number one, they have the same password across the board. Burnt number two. It will be some variables and they're just like I I don't want a complex password. Yes, you do. And you're going to understand why. Okay, what's what's the next top one?
Jeff Chandler 11:21
Yes. So the next top one is 1234567890. My
Kristina Stubblefield 11:27
goodness. And then next one?
Jeff Chandler 11:29
Qwerty. So if you look at your keyboard, let's top the top of the keyboard. Qwerty cute of E RT y.
Kristina Stubblefield 11:36
Of course, yes. Okay, what else you got on there? Password? Number four? Of course.
Jeff Chandler 11:43
Right? Then 1234567 and 1234567812345. I love you 111111. Then 123123. That's the top 10 passwords right now.
Kristina Stubblefield 11:57
So this is the top 10 passwords that are being used.
Jeff Chandler 12:01
Right? What? If you have one of these change them? Now?
Kristina Stubblefield 12:07
If you have any? Well, I think you're going to have a little bit more than this. What do you recommend for a password before you go change? And let's finish the episode out. Don't run off right this second. Right? As soon as we're done. Yes. What do you recommend?
Jeff Chandler 12:18
So recommend a long password, at least one uppercase, one lowercase letter, a number special special character. What I do is use a password generator. So mine are at least 16 characters long. Most of them are 20 characters long. Then use a password manager and use a different password for all of your sites. Because what'll happen,
Kristina Stubblefield 12:40
okay, you all out there that are grumbling and rumbling right now just let Jeff finish it's really important.
Jeff Chandler 12:45
Yes, a password manager is really important here. And that's gonna save you, a password manager will generate all the passwords for you. It'll save all the different passwords. So it'll tell you that, that you've used this password before possibly, it'll help you generate all this new ones. It'll keep track of everything for you, then you just remember one really good password that goes to your password manager.
Kristina Stubblefield 13:07
And it's probably important. I'm sure there's some good free password managers out there. This may be one of those instances where actually paying for a password manager is better for you. Yeah, I
Jeff Chandler 13:20
believe most of them are paid and swim like last pass one pass Dashlane. There's a number of them on the market.
Kristina Stubblefield 13:26
I have heard LastPass quite a bit and you recommend that one? That's one to recommend? Absolutely. Okay, good, good. And you can look this stuff up. And we'll put links in the show notes as well for the stuff that we're talking about. And I know it can be frustrating, I too have found myself in that situation. Even with the education that I've had in the past. It's something that I think all of us most of us tend to Well, this one will be okay. Or this one will be okay. And I hope everyone out there is like no, I don't we have good solid passwords. Awesome. You're doing great. But I think we get caught up in our day to day things and I'll come back to that. Right it is really worth a few extra seconds to generate a password and use a password manager. So that's an excellent tip.
Jeff Chandler 14:15
Yeah, and so for your password manager for that really long password. An easy trick to learn that long password is take a sentence from from for example, let's say my favorite vacation is going to Disney World. I went there in 1993 for the first time, something along those lines just pick some sentences you can remember that whole sentence take the whole sentence and we'll hang on it will take the first character from each word of that sentence.
Kristina Stubblefield 14:42
Okay, get paid don't lose this yet. He's gonna He's gonna shorten it for you
Jeff Chandler 14:46
just take the first character from each word in that sentence. And then make that your password add in a couple special characters and you're good to go.
Kristina Stubblefield 14:54
Wow, that's and that long one is really that is really important for those out there who may not understand what it means to not have a secure password. Can you put into words what they're opening themselves up to.
Jeff Chandler 15:10
So here's what can happen. And especially on your email, this is really, really important. Because what will happen is, let's say that you have an easy password to crack on your email. Now, what's going to happen is they're going to start going to banking sites, they're going to go to a bank site, they're going to say, I forgot my password. Now they know your email, password, Gmail, Yahoo, whatever you're using, they get into your email account, now they can just click a link and reset the password to your banking account, to your retirement account to anything that you have access to is tied to that email, potentially, they can just reset that password and now they're into your banking site, and potentially take all that over. So so if you do nothing else on your, on your email, make that a good password, and turn on what's called multi factor authentication. So what will happen is, and I've got instructions for that as well, that I'm going to give you, you turn is
Kristina Stubblefield 16:07
compiled a whole PDF. I cannot thank him enough for doing that. I've been through it. And I was like, This is amazing. So you want to get that link in the show notes. Go ahead,
Jeff Chandler 16:17
right, so you turn on that multi factor authentication. And what it will do is when you sign into, say, your Gmail account, it will send you a text message with a code, or it'll say, click here, do you approve this, you click to approve it. And then you're going to have access to your Gmail account. So unless whoever is trying to get into your account has access to your phone as well, they will not be able to get into it to crack your email, which is a big barrier to prevent some of these other leveraging that to get into other sites for you.
Kristina Stubblefield 16:49
Here's what I've just heard. Stop complaining about the few extra seconds, you're causing yourself possibly each time you login, because what's at stake could cost you so much money, time energy effort, the mess that you're going to have to muddle through, because it's not going to be an easy fix. With all of that. It is worth the few seconds. Absolutely. That is that is what I want people to remember. It can be frustrating, but just remember what the alternative could be. Right?
Jeff Chandler 17:24
It'll make you feel good when you get that that alert at eight o'clock at night, you're watching TV and you get a pop up on your phone. It says someone from Iowa is trying to access your email account. You just hit decline. And they can't get in.
Kristina Stubblefield 17:38
Does that flag something to the company who whoever you're using? If it's like Gmail, does that? Does that get flagged to them?
Jeff Chandler 17:46
I'm not sure. Okay.
Kristina Stubblefield 17:47
I hope so. We would like to think so. Right? Hmm. That is such a good tip about passwords. And I think sometimes we know it, that we should have better passwords, but not always do we think about what the repercussions are. Right? So I'm glad we talked about that.
Jeff Chandler 18:06
Yeah. So I don't know, if you watch the show Shark Tank. I do. The episode they had last Friday, they talked about a startup company where they had lost everything because someone had access their bank account. It was able to clean out their bank account. And I've suspected happened because they were able to access their email account and then and then break into their bank account that way. I don't know that for sure. But that's what I would suspect.
Kristina Stubblefield 18:33
Honestly, it could cost you your business. Absolutely. That that is a sobering fact.
Jeff Chandler 18:40
I'll give you an extra kind of sobering statistic.
Kristina Stubblefield 18:44
I love statistics. My listeners know loves this another
Jeff Chandler 18:47
scary one. Okay, so they say that over half the businesses that have a cyber attack are out of business within a year. So that's pretty scary.
Kristina Stubblefield 18:56
Wow. Absolutely. Take the time. Get it on your calendar ASAP. If you cannot do it when your list when you listen to this episode, if you cannot immediately take time to do what Jeff has recommended. Make it happen soon. For your business for yourself for your family. This pertains down to individuals, not even businesses, right this can apply to anybody in so the other thing that you can do the people that are listening, Sharon's not here to say that we love a glowing five star review. But what you can do for your family, your friends, your business associates, anybody as you can share this episode with them. Because to be honest with you with these statistics, someone in the ring, the bling and all the things circle. Unfortunately, maybe multiple people are going to be affected by lack of secure passwords, right? It's sad, but it's true. Let's come together. And let's get this shared out so people really can understand. And these aren't, this isn't numbers to scare you. I'm if you know anything about me, I'm not a scare tactic person but what I am, I'm an advocate for small businesses, for entrepreneurs. And to think that a few seconds could cost you all the hard work you've put into your business could cost you that whole business, it is worth this. So please take a minute to share that. So okay, I'm off my soapbox. Jeff, go ahead. I know we've got more thing you compiled the list down. Right? Right. we'd be here all day.
Jeff Chandler 20:36
This is a shortlist. Okay. So the third one on my list is malware protection. So everybody's familiar with a traditional antivirus tools like McAfee, Symantec, those sorts of things. And they've really upgraded those now, where it's, it's total malware protection. So, so when you look at visiting site websites, so let's say you're going to Amazon, you're shopping for the holidays, and you're trying to get a great deal. And they've misspelled the word a little bit, well, some of these new malware protection services will look at that and can tell you this looks like a fake site and kind of give you a warning about it, or look for malware on the site. So that they might, you might visit one of these sites, and it's got malware loaded on it. And just by visiting the website, you've downloaded that stuff onto your computer without knowing it without knowing it's going to happen in the background, everything looks good. You've probably even given them your credit card. If if you've gone through trying to purchase something which is doubly not good. And that at that point, so you've not now you've got the malware on your computer. And you've given up your credit card information as somebody who shouldn't have.
Kristina Stubblefield 21:44
Oh, my goodness, I need a minute. Wow, the credit card thing that's a whole nother that's a whole nother episode. But I know a lot of people that disable the website portion of some of this of some of that software, do you have recommendations for what type of software?
Jeff Chandler 22:06
If you go and look at them, there's there's a number of them on the market, just make sure you're getting the protection, it's going to cover you checking the websites, it's not just the antivirus protection, it's going to check a number of those types of protections as well, their email, as well.
Kristina Stubblefield 22:20
So you're looking for what total protection,
Jeff Chandler 22:24
right some sort of total protection is going to cover everything, okay? It's a little more expensive, but it's definitely worth it.
Kristina Stubblefield 22:29
And do you. So if they're going to Google something total, it fires typically,
Jeff Chandler 22:36
typically, if you go to the website of the vendors, you're going to see like a basic, which might be free, it's just very, very basic support up to their sort of total protection. Okay, just I don't know what they call them each one, but look at
Kristina Stubblefield 22:49
those will. And we don't want to name drop on here. You know, there are some really good software's out there. So if you're not sure where to turn, if if you honestly, I have no idea what we're talking about, send me a message I will get with Jeff, and figure out a direction to point you in, I'm happy to do so. Because I understand there's a lot of people out there that just they don't know the difference. And they think that they have a protection or they've they have it but it's expired on their computer, right? Because they didn't renew it, they got a new credit card, it didn't renew now they forgot about it. So that total protection is really important. And you want to make sure it scans, websites and email.
Jeff Chandler 23:32
Right, exactly. Okay. And one of the things that we do for our clients as well is we have an additional layer of protection, we put on top of that malware protection that looks for ransomware. So what we do is we drop what we call trigger files or honeypot files onto the computer that nobody should ever touch. But if for some reason that file gets encrypted, because we know that nobody's supposed to be using this file, and it's just sort of a random file name somewhere on your computer. If something opens that file and tries to do something with it, we know something's going on that shouldn't be going on, because there's no reason to access it. Right. And it will lock the computer and try to protect you from that event.
Kristina Stubblefield 24:11
Wow. That's so that's a really nice, and that's something you offer. That's something we offer for our business clients. Well, what you just brought to my mind and maybe your I don't want to jump ahead if this is on your list, you can tell me
Jeff Chandler 24:21
backups. That's Nick. Next on the list is backups. A
Kristina Stubblefield 24:25
lot of people don't do them. I know. I know. I've had some people come to me that whose hard drive has crashed over the years, who has very important family photos, or business stuff that is nowhere else. And unfortunately, sometimes there is no way to recover that no matter what amount of money you want to pay, right. That's to me why backups are so important. But running a business operation day to day. You've got to have access if something happens. Right. I'll let you take over.
Jeff Chandler 24:58
Yeah, so backups are super important, like I said, but not only that, you've got it and you're running it, but that you're testing it. Because if you're not very you
Kristina Stubblefield 25:08
may not can't just back up and oh, it's gonna work. No, no testing it,
Jeff Chandler 25:11
I might even look like it says success the next day. But what we recommend is you go in, and occasionally just check spot check, somebody checks, and thanks, pull it up, make sure you can cover a couple random files off the backup, just to make sure that it's working.
Kristina Stubblefield 25:26
Okay, I have multiple questions. Do you have more about that before I dive in.
Jeff Chandler 25:31
So one of the things I want to add about backups is if you're using something like Google Drive, or Microsoft OneDrive, those files, a lot of times will sync with your local computer. So if you have a ransomware attack, it's going to sync those encrypted files to your OneDrive account and your OneDrive account is infected as well. So a lot of people don't know that your OneDrive account if Microsoft is not backed up. So if something happens, maybe you have a disgruntled employee that deletes a lot of files off the shared company file before they leave. So make sure you've got a backup of that cloud storage as well. And it's something we can do to
Kristina Stubblefield 26:11
some people say to me, well, it's in the cloud, it's fine. So I'll share what we do. And then you can pick it apart. Okay, fine with that. So we use Dropbox. And there are four of us that use Dropbox. We are on the Pro Plan, so individual logins. And I also do a backup. Unfortunately, I have started doing it once a month. And I used to do it once a week. The other thing I do, I backed that up to an external hard drive. And if I had no witness this with my own eyes some years ago, with someone that I still do things with, they backed up to an external, this not us another company backed up to externals. They also backed up to a second external Guess what? They got it out of there fireproof safe when they needed it? The one external wouldn't power on the second external didn't have anything on it. So what you have said, you know, I use I can't I have questioned myself in the past, like, rarely do I need to, but that has come to my mind about ransomware. Because it does sync it's set to auto sync. And if you don't have them backed up somewhere, you're it's backing up, it doesn't know. I don't think it knows. Unless they've changed their software, it doesn't know not to back those up. It just knows there's changes to the files, and it initiates a backup. So that's why I've put it to external. Now I do rotate my externals. So one month, I use one external the next month, I use a different external, right, my husband kind of shakes his head, but I'm like, You know what, and this really these statistics you shared with me, makes me circle back around to think this is probably something I should go to weekly. Or maybe even more daily.
Jeff Chandler 28:14
It depends on how much data you're okay with losing. So think about it.
Kristina Stubblefield 28:19
I don't want to lose anything. I work hard. I don't want to lose anything. We work hard as a team. So can you walk me through a lot of wedding professionals that I've heard from? They do a lot in the cloud? What do you recommend for if they use cloud systems, there are
Jeff Chandler 28:37
cloud backup tools out there. So just make it backups with stored off site and keep a history of those
Kristina Stubblefield 28:43
backups as well and don't have auto sync turned on then auto sync is
Jeff Chandler 28:48
fine. Okay, on your computer to the cloud, that's fine. But just make sure you've got multiple backups in there are timestamps. So So for example, you can go back to a point in time, potentially before the ransomware, hit, OK, recover all of your files. No, still doesn't guarantee anything, because sometimes the ransomware will, will try to wait out your backups. Okay, they might know that your backups rotate every 60 days. And so they're going to sit in in sort of wait. So they've got 60 days worth of stuff off, then they're going to encrypt everything, and then you have nothing to go back to.
Kristina Stubblefield 29:23
I mean, where does this stuff come from?
Jeff Chandler 29:27
It's a business. Unfortunately, it's a business and they don't have to follow the same rules I took from what you
Kristina Stubblefield 29:33
shared. Like this is a business that goes on. And you take a minute to wrap your mind around that what what Jeff sharing this malware viruses, these things we're talking about is a business. A lot of times happening outside the United States, right. And that's their job is what we're saying is to do nothing but this,
Jeff Chandler 29:55
right. You've heard of Software as a Service. So software is a service Things like, like a G Suite or office 365, Salesforce, all these tools that you use in the cloud, where they actually have people, they call it ransomware as a service. So these people will create the ransomware and sell it as a service. And they have a customer service line, they have helped desk, they will have refunds, you can go to read it, and you can file a grievance against a ransomware provider who didn't do do it correctly. So it's they weren't
Kristina Stubblefield 30:30
thinking you can get refund, because the ransomware you paid for didn't happen correctly.
Jeff Chandler 30:36
Right. That's how crazy it is.
Kristina Stubblefield 30:41
I wish we would have had that sentence in the beginning, honestly, that is, I will definitely make sure that gets in the teaser of this because I hadn't actually looked at it as a business until I read what I did. I was like, That makes perfect sense. I don't like it. But it makes perfect sense.
Jeff Chandler 31:00
Right? So when criminal is, I guess, through Reddit or some other means suing another criminal? Because they didn't do their job correctly?
Kristina Stubblefield 31:11
That doesn't sound broken to me at all. No. Oh, yes, it does it. just clarify, don't cut me off there. Yes, it does for our listeners. Wow, like this makes, and I know you compiled a lot more stuff. Is there anything else that stands out that you want to talk about?
Jeff Chandler 31:26
The last part is just training. So So these are my top five. So training is really, really important. So most attacks happen, because someone just makes a mistake, you can have all the best tools in the world. But if someone clicks an email they shouldn't, or put something into their computer that they shouldn't, you've opened a door for the criminals to have access to your computer. So we think training is a really important part of any sort of cybersecurity plan.
Kristina Stubblefield 31:58
What just triggered in my mind is all the working remotely. And if they're using their computer, for personal stuff, and that same computer for business, right, you're opening that door, even wider, possibly, right?
Jeff Chandler 32:16
And the problem you have is, as a business owner, if you're letting your employees use their personal computer at home to connect to your network, you don't have control over their antivirus is up to date, their patches are up to date, their passwords are under control, they haven't been infected, if they connect to your your company, computer network, and they've got a virus at home, because they didn't do something correct personally, now they're going to potentially infect your business. So we recommend, and no, for a small business owner to this, this is an expense. But buy a computer for your employees to use just for work stuff to use at home.
Kristina Stubblefield 32:57
We did that, that that is what we do. And I don't even want to mention the next sentence, I was going to say we're going to skip right over that. But that is that's what we've implemented with our team. I felt like all your stuff was valuable. So I know that you're gonna make this whole PDF that you compiled, available for everybody. But Jeff, if you're open to it, I would love to even revisit this conversation, you know, six months down the road. I know things change much faster than that. But I feel like this topic needs to be discussed on an ongoing basis. It's that important, right? I'd have you come back every week if you wanted to. But I know you're busy. And that's a lot to ask. But if you're open to it, maybe this is something we can revisit again. And I hope that this helps open some people's eyes. I love that you included the training part because I think sometimes you think of the overall picture, but not the individual tend to tentacles of the business. Like even not even remote workers. The workers you know, are if they're doing personal things on the computer. So I love everything you
Jeff Chandler 34:10
incorporated. Right, so So I just want to add last thing here. Oh, you've
Kristina Stubblefield 34:14
got you're gonna share something else. One more thing. So
Jeff Chandler 34:16
awesome. So plan for when this happens. It's not if because it's going to happen at some point. It's just probability, something's going to happen to you at some point. Make sure you've got a good plan. Make sure your backups are good. You can do all the great training in the world somewhat even people who are trained make mistakes. So just make sure you've got a good plan for when it happens. So that you're not one of the statistics. It goes out of business because you didn't plan
Kristina Stubblefield 34:42
properly. I will ask this. Where did you start that conversation? You're calling it a plan? Where do you even start that conversation that thought process? If business owners are listening whatever size business or they're just a solopreneur? Or do they start that thought process,
Jeff Chandler 35:00
right, so the PDF we just talked about. So I've got a top 10 list on there, I would start at the top, and work your way down, and then make sure you've got insurance as well.
Kristina Stubblefield 35:11
Okay, and if I remember that you mentioned that in there, it's a cyber insurance. Right, right, exactly. Okay. And if you even if you're not sure, if you're covered, if you think you're covered, it is worth that phone call to your insurance company to make sure you have some type of protection.
Jeff Chandler 35:26
Kristina Stubblefield 35:29
I could talk and talk and talk about this, I could see it, you know, and I don't want to scare people. But I feel like it's, it's something that if you don't hear on a regular basis, you can hear these numbers. And I hope we've shared enough stories to really drive home the point. This is small potatoes, compared to if you're on the other side of this thing in trying to muddle through it. small potatoes. Right. Okay, Jeff, I have some questions about you. First of all, let's talk about your book. Before we close this out. What made you want to write this?
Jeff Chandler 36:07
So for me, I came, I was a chief technology officer for an insurance company. And so I saw the kinds of things that we were able to do, because we had the staff to take care of it. But small business owners are really it's not that they're targeting small business owners. It's that they're scanning everybody. And they're looking for people who have potential security holes, you've heard the story about you don't have to outrun the bear, you just have to outrun your friend. Right? Right. So that's what we want to do. We want to outrun the other business owners who are not paying attention to this. And you don't want to be an easy target. So I want to make sure that business owners, and especially small business owners who don't have it teams, understand the risk, and then understand some basics things they can do to protect themselves, so that they're not an easy target for the criminals.
Kristina Stubblefield 36:57
Well, and underneath your title hacked. What you must know now to protect your business financials, customer data, and reputation from cyber criminals. And you know, we didn't really dive that much into it, but it is your reputation. It is absolutely your brand, your reputation. You've been doing this for a long time. Yeah, 3035 years, 35 years. Jeff knows what he's talking about. But what I really like is, you offer services to people. But yet you still took time to compile this information for those solopreneurs or small businesses that number one may not get how important it is or what you're up against, or what is potential that could happen. And like you worded it, not if but when that you took time to make sure that they had some knowledge, some quick tips, some things to start thinking about how much of a role this needs to be inside your business. So for those that are interested in learning more about this book, and they can get it online, it's on Amazon, right? No, oh, I'm sorry. It's directly through me directly through your website.
Jeff Chandler 38:06
Okay, just go to hacked book.com
Kristina Stubblefield 38:09
hacked book.com. You even gave me that link. And I still said that right? Got it. Okay. Um, hacked book.com. I think anyone? If you have a family member that's in business, or a solopreneur? Or is thinking about starting a business, what a great gift.
Jeff Chandler 38:29
And we just ask that you pay for the shipping. It's all
Kristina Stubblefield 38:33
to get the book, right. Really awesome. Well, I'm telling you, I've been through it. And I really believe the term he's used cybercriminals. I fully believe that. And I think it's shocking to hear about that. There's a whole business side to that going on, for those who tell us a little bit about Z Jack technologies.
Jeff Chandler 38:56
So So I left my my role as a CTO about a year and a half ago, and just want to get back out and do something, or entrepreneurial. So I just really enjoyed doing this. It makes me feel like working for smaller businesses. I feel like I'm really making a difference in helping people. And so that's why I started.
Kristina Stubblefield 39:16
Did you read my resume? No, that's it sounds like it came for me. There's so much. You're really appreciated you small businesses, what you do, it's like it's leaps and bounds for them. And there's just something special about that for me. And I'm sure you share some of the same sentiments.
Jeff Chandler 39:39
It feels more rewarding sometimes.
Kristina Stubblefield 39:42
Good word rewarding. That's the one I couldn't find. So what services do you offer?
Jeff Chandler 39:48
So we do a number of things. So everything from just consulting. If you just wanted to have me come in and just talk to you and say you know I'm on the right track even if you have an IT team, that people just get into third party perspective on what we're doing, you know, are the things that we can do to do better? What can we what can we do, we do manage IT services as well. So if a business just wants to outsource their it, I recently read the book who not how. So try to think of, of not how I'm going to get everything done, especially as a business owner and I have these same problems myself, I like to do it all,
Kristina Stubblefield 40:27
we all deal with it right? If somebody tells you different they're fibbing to you, right.
Jeff Chandler 40:31
So find the who, who can help me get this done so, so I hope I can be that who to a small business owner, to help them, take care of their it, make sure they stay protected, and just help them get that done. So we do that we do cybersecurity consulting. So if you've been hacked, and we can come in and take care of it, one of the things we also do is secured website hosting. So we'll make sure that if you've got a WordPress site, for example, we'll do all the patches for you make sure it stays up to date, so that they do everything we can to keep you from getting hacked and monitored for you. So updates on everything, we keep it updated for you every day, right. So it's just another another vehicle people could use to get into your business and potentially ruin your reputation.
Kristina Stubblefield 41:18
And if you don't know where to get started, or what you exactly need, that consulting service is a great place to start just kind of help figure that out. It's always nice to have that, that partner that person to guide you, towards the right path to help you and in this case, was something that's very instrumental in any business,
Jeff Chandler 41:39
right, and we will do a a score for you. So we'll go through our our maturity model, and we'll we'll score you and say, these are all the best practices up to what you might do if you are a fortune 500 company. And these are all the things that you should do at some point. But we're going to start somewhere. And so they're they're prioritized in order, and maybe you score a 25 to start out of 100, we're going to help you get higher and help you budget for it. Because I know it's expensive. So we'll make sure that we create a roadmap for you, that makes sense with what you can afford to protect yourself.
Kristina Stubblefield 42:18
Jeff, I cannot thank you enough for taking time to come in. For anybody that wants to connect with you. It will be in the show notes. But where can they visit? What is your website address?
Unknown Speaker 42:26
Kristina Stubblefield 42:29
Okay, great. You can also find him on social media. And we will have the information in the show notes like I mentioned. And I really, when I hesitate saying this, but I really do look forward to hearing the feedback. Some of it may be positive, some of it may be negative, some people are gonna say, Kristina, you're it's something else I need to do in my business. But there are things that are, oh, that's great to be able to do in my business. And there are some things that are mission critical. And to me, if you don't take that away from this episode, please reach out to me or Jeff, you can reach out to me, I'm going to direct you to Jeff. But invest that phone call or that conversation. Your business deserves it. Because like Jeff said, it's not if but when. And I hope that this makes an impact this episode on helping prevent someone from such a terrible attack, or maybe prevent one at all. So Jeff, thank you again for coming in.
Thank you. It's great.
Alright, until next time, everyone. If you like what you heard, please go and give us a review on your favorite podcast platform. And you can always visit our website to listen to previous episodes, or sign up for our newsletter to get notified when new episodes drop. Until next time everyone keep working on your businesses. Thank you for tuning in to this Business Booster episode of the Ring The Bling ANd All The Things. If you would like to get notified of new episodes, make sure to click the subscribe or follow button on your favorite podcast platform. For you can visit our website ringblingallthethings.com and join our email list. We welcome any feedback you may have. From topic ideas to questions. Just click the contact button on our website.
Transcribed by https://otter.ai
Jeff Chandler is the founder and CEO of Z-JAK Technologies.
With more than 35 years of experience as a developer, systems architect, business consultant, and insurance executive, Jeff is an expert in cybersecurity and technology.
Jeff served previously as Chief Technology Officer for Jefferson National Financial. He was part of the startup team that built the company and served in a number of roles over the years with that carrier.
Jeff recently authored the book “Hacked! What You Must Know Now To Protect Your Business Financials, Customer Data, and Reputation From Cybercriminals” directed at small business owners. It’s available at https://hackedbook.com