Eric D. Brotman, CFP®, is the CEO of BFG Financial Advisors, President of Brotman Consulting Group, LLC, host of the Don’t Retire… Graduate! podcast, and author of the award-winning book, Don’t Retire… Graduate!Use code "unhacked" for a 25% discount on Eric's book: https://dontretiregraduatebook.com/ In our pre-interview meeting, Eric said: “Very few things keep me up at night. Not stocks, not capital hill, but having my identity stolen and company infiltrated.” And he has a great reason for this. Several years ago his company was hit with a ransomware attack.
We make a lot of assumptions in the world of tech and cybersecurity. The most common one I see is assuming that a vendor is properly protecting your data. And honestly, that feels like the only option since we can't really see behind the curtains. But what if I told you there is a way to verify that your vendors have the proper cybersecurity safeguards in place? Take a listen!
How will tariffs impact cybersecurity? As costs rise, we will be forced to make difficult decisions. Many will choose not to upgrade old technology which gives the bad guys a huge advantage. Here's what to do about it.
Last week we talked about how AI can improve processes and output. Today, we’re going to talk more about the security side of AI.
Like all things in tech, AI is a tool that can be used for good or bad. Today we talk with Chase Friedman, managing partner of Alpine Anchor, about leveraging AI to improve processes, outputs, and profitability.
This week we talk with Jonathan Steele, a prominent high-stakes divorce attorney who doubles as a cybersecurity expert.At Steele Fortress, Jonathan leverages his unique blend of legal and cybersecurity expertise to provide comprehensive cybersecurity and privacy consulting services. His deep understanding of both the legal and technical aspects of cybersecurity and privacy makes him a valuable asset to any organization looking to bolster their security posture and navigate the complex landscape of cybersecurity laws and regulations.
Compared to 2023, ransomware attacks increased 4x in 2024. Why? Because it's EASY! With RaaS (Ransomware as a Service), anyone can be a successful bad guy. On average, it only takes someone 74 minutes to pull off a cyberheist. No skills required. This is the problem. Take a listen to learn the solution.
It's bad enough that cyber-thugs are coming for our businesses. And our bank accounts. But there's a new threat that is gaining traction: class-action lawsuits. But there's good news! A Plan of Action with Milestones (POAM for short) is your get-out-of-jail-free card. Listen up... and we'll break it down!
Tim Golden of Compliance Scorecard joins us to discuss the meaning and importance of measuring against an official security framework
As business owners and execs, we are responsible for EVERYTHING! While cybersecurity may not be your native language, it is critical to learn enough to make informed decisions. UnHacked is a great place to start!Today we talk with Christian Espinosa about the cybersecurity basics, as well as his 7 Step Secure Methodology.
In today’s episode, we talk about a disgruntled doctor, his real/understandable problems, and [perhaps] a bigger problem with mindset; and as always, wrap it up with the formula to protect your business from Boris Grishenko.
How do you REALLY know that your IT company has you properly protected? How do you know you are getting what you pay for? This is one decision where you cannot afford to be wrong.
We've spent the last 3 weeks breaking down the formula in significant detail: using industry standards, protect your technology, protect your data, and protect your people. That will get you to about 97% secure. But... what about that last 3%? What if you do everything right and STILL get attacked? How do you survive a full-blown cyber incident? Today we interview the great Robert Cioffi and learn exactly what he did when everyone's worst business nightmare came knocking on his door.My #1 key takeaway: CULTURE. Retreat to your war room and dig deep on your company core values. Who are you as an organization? Let that be your #1 guide when rubber hits the road. Takeaway #2: community. "No matter how brilliant you are, there’s always something to learn." Get involved in your local community and your industry's community.Takeaway #3: “You really need to be following some sort of framework”. This is what we talk about week after week when we suggest following industry standards and best practices. There are dozens of frameworks out there. Some are required by government regulation (PCI, HIPAA, NIST, CMMC, etc.). Others, like CIS, are designed to be self-regulated. Follow the ones that best suit your business model.
In his book "Future Crimes", Marc Goodman said something that has been burned in my brain for years:“If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology. Cybersecurity is a people problem, not just a technical one.”What's the #1 threat to your organization? IT'S US! WE ARE THE PROBLEM!The truth is, we can follow every standard, control, and best practice under the sun, but all it takes is a careless or uninformed click or tap and it's game over. So, if people are the problem, what is the solution?Proper toolsEducationPolicies and proceduresCultureWhile this might be part 3 of our miniseries, treat yourself to an invaluable discussion of the #1 best thing you can possibly do to protect your business: take care of your people!
Data backup used to be simple: a tape drive on the server and you're good to go! Now data lives everywhere. Taming this beast can be a challenge to say the least. Here's a quick-start guide:Go through each department and major function in your business (BizDev, Operations, Finance, HR, etc.)Identify the technology used for eachMake a note of where the associated data is storedCreate a plan for backing it up and testing the processMost important: review this process regularly because things change!
For Cybersecurity Awareness Month, we decided to do something special. So over the next 3 weeks we will deep-dive on each of these areas and give you a list of what needs to be done, as well as how you can verify that it’s implemented. This week: Protect Your Technology
In today’s episode, we are going to answer the burning question I know you all have: “What in the hell is the Dark Web?” Spoiler alert, we talk about the tame stuff on here. It is a vile place to hang out. That said, our breach breakdown of the week is 23andMe. This is old news, but the proposed settlement is happening now. … Then, as always, we’ll wrap it up with the formula to protect your business from Boris Grishenko.
In today’s episode, we are going to talk about how to spot a phishing email (and how to get your whole company to do the same), dive into a $5 Million lawsuit for not paying the ransom, and as always, wrap it up with the formula to protect your business from Boris Grishenko.
In today’s episode, we are going to talk about how to make sure ALL of your critical data is backed up, we’ll break down 2 specific security events that sent over a quarter million dollars up in smoke, and as always, wrap it up with the formula to protect your business from the likes of Boris Grishenko.
In this week's episode, we help business owners get proper cyber security insurance coverage, and make sure it’s paid in an emergency.