Discover
Plaintext with Rich
Plaintext with Rich
Author: Rich Greene
Subscribed: 2Played: 4Subscribe
Share
© 2026 Plaintext with Rich
Description
Cybersecurity is an everyone problem. So why does it always sound like it’s only for IT people?
Each week, Rich takes one topic, from phishing to ransomware to how your phone actually tracks you, and explains it in plain language in under ten minutes or less. No buzzwords. No condescension. Just the stuff you need to know to stay safer online, explained like you’re a smart person who never had anyone break it down properly. Because you are!
14 Episodes
Reverse
Hard truth: security often fails when everyone is doing their best. We explore how a chain of reasonable choices wider access to unblock a task, a quick exception to meet a deadline, one more tool to feel “covered” quietly drifts systems away from safety until a small shock exposes a large weakness. No villains, no recklessness, just incentives that reward momentum over friction and patterns that compound risk in the background. We dig into four recurring culprits: temporary decisions that n...
A breach that looks like a normal login can slip past the loudest alarms. That simple truth reshaped how we think about defense and led us to a clearer model: access is the attack surface, and trust must be earned every time. We unpack zero trust in plain language, showing how to move from implied safety behind a perimeter to conditional, per-request decisions that scale across cloud, remote work, and vendor ecosystems. We start with the core signals that drive better decisions: identity tha...
Your defenses can be flawless and still fail when the breach starts upstream. We unpack how modern supply chains software updates, cloud services, MSPs, contractors, and open source libraries turn everyday trust into an attack surface, and what it takes to build resilience without grinding work to a halt. From tampered updates to phished third-party accounts and poisoned dependencies, we map the repeat patterns that let one supplier compromise ripple into hundreds of customers, and explain wh...
Most breaches don’t start with malware. They start with a feeling. We explore why social engineering works so well in ordinary moments, and how attackers lean on urgency, authority, and fear to push quick clicks, rushed approvals, and hasty payments. From email to texts, calls, QR codes, and AI‑polished messages, the goal is always the same: capture your action before your judgment arrives. We walk through clear definitions to separate phishing from the broader field of social engineering, t...
Your screens don’t go dark first they go quiet. We walk through how modern ransomware begins with access, not chaos, and why double extortion flipped the incentives: attackers steal sensitive data, then encrypt to amplify pressure. That shift turns incidents into business crises that touch legal, communications, customer trust, and sometimes survival. We unpack the boring but true entry points phishing, password reuse, exposed remote access, lagging patches, and over-privileged vendors and s...
Your house didn’t suddenly become unsafe it became chatty. Doorbells, cameras, smart TVs, speakers, and even “just a light bulb” are small computers that inherit real risk the moment they join your Wi‑Fi. We unpack how convenience-first design leads to weak defaults, vague support lifespans, and devices that quietly age while the internet around them gets smarter. No scare tactics, just a clear look at how attackers actually operate at scale and why most compromises happen without anyone spec...
A breach without a break-in sounds strange until you realize the cloud rarely fails with drama it fails with defaults. We walk through why identity has replaced the physical perimeter, how ordinary configuration decisions create extraordinary risks, and what actually happens once an attacker lands. No scare tactics, just a clear path from common pitfalls to practical fixes you can deploy this week. We start by translating the cloud into plain terms: rented compute, storage, and identity syst...
Your name or username doesn’t unlock an account—reused secrets do. We dig into why the internet’s copy‑and‑paste approach to passwords keeps failing and show how passkeys flip the model from disclosure to proof. With a device‑bound private key and simple gestures like a tap or a glance, sign‑ins get faster while phishing and credential stuffing lose their fuel. No more shared secrets to steal, replay, or resell. We walk through what passwordless really means, not the hype: identity proven wi...
A thief can steal your secrets without opening a single box. That’s the unsettling reality behind harvest now, decrypt later the strategy that makes quantum risk a present-day problem for data with a long shelf life. We unpack how today’s public key cryptography underpins trust on the internet and why future quantum machines could unravel that trust for traffic already captured. We start by breaking down encryption in plain language fast, shared-secret systems for bulk protection and public ...
Your data doesn’t vanish after a breach it enters a market. We break down the dark web as a logistics layer for cybercrime, not a mythical place, and show how stolen credentials and identity records are bundled, priced, and resold based on freshness, completeness, and volume. The result isn’t always a dramatic wipeout; it’s usually slow, quiet harm that surfaces as odd charges, medical bills you don’t recognize, and loan denials that make no sense. We start by stripping away myths: the dark ...
Identity theft doesn’t start with a stolen wallet; it starts when systems decide an imitation of you is good enough. We dig into how small bits of personal data collected by countless forms, portals, and programs get copied, merged, and resold until they become convincing profiles that pass automated checks. That’s why the hit often lands months or years after a headline breach fades, and why the fallout feels less like a single loss and more like an administrative grind that drains time and ...
A familiar voice calls. The phrase you’ve heard a hundred times lands with urgency. Your gut says act now wire the money, share the code, approve the access. That reflex once kept work moving and families safe. Today, AI can borrow the voice, mimic the cadence, and ride your instincts for sixty seconds. That’s long enough to cause real harm. We dive into the mechanics of modern deepfakes: how a few public breadcrumbs voicemails, Zoom clips, social videos train models to sound and look convin...
Lock the digital doors without the panic. We unpack cybersecurity in simple, human terms and show how calm design, not fear or jargon, keeps your email, money, photos, and work safe from boring mistakes that become costly emergencies. The goal is straightforward: protect digital things that matter while accepting that people are busy, distracted, and human. We start by reframing cybersecurity as everyday decision-making: what needs protection, who should access it, and what the plan is when ...
Most tech talk feels like it was written for someone else. We’re changing that with a simple promise: short, story-driven breakdowns of security and technology that swap jargon and fear for clarity you can act on. One topic, one takeaway, ten minutes or less built for the 99% who use tech every day and want to feel confident, not overwhelmed. We lay out how the system actually behaves, not just what the headlines scream. You’ll hear why security fails less from lack of intelligence and more ...



