UnHacked Episode 15 – The War Room-Surviving Cyber Attacks

Jimmy (Hats.ai):

  • Focused on AI data governance and security
  • Emphasized the importance of controlling where AI data is stored and processed
  • Warned about employees using free AI tools that could expose company data
  • Suggested AI adoption is moving 100x faster than early internet adoption
  • Recommended businesses implement AI now to maintain competitive advantage

 Mike Hornsby (BlockWorks):

  • Emphasizes prevention is possible with proper precautions
  • Provides vendor diversity by evaluating and scoring different security tools
  • Offers a free roadmap called "21 blocks" for security implementation
  • Noted many organizations haven't implemented basic free security measures like MFA

 Cynthia (CyberQP):

  • Focuses on password management and security
  • Addresses the problem of "standing privilege" in admin accounts
  • Provides identity verification for help desk password resets
  • Offers self-service password reset capabilities
  • Includes SOC 2 Type 2 certification

 Kelsey (Infamous Security):

  • Specializes in security awareness training
  • Uses behavioral science-based approach
  • Provides phishing simulation tests
  • Emphasizes the human element as the weakest security link

 Jennifer (Galactic Advisors):

  • Provides third-party cybersecurity assessments
  • Helps identify unknown vulnerabilities
  • Generates detailed reports (often 100+ pages)
  • Validates MSP recommendations to clients

Schedule Your Free Security Assessment

Key Takeaways:

The two biggest security vulnerabilities identified:

  • Phishing attacks (#1 threat)
  • Password breaches (#2 threat)

Critical Security Elements:

  • Employee training and security awareness
  • Strong password management
  • Regular third-party assessments
  • Incident response planning

Cultural Aspects:

  • Security awareness needs to be embedded in company culture
  • Leadership must participate in security training
  • Consider both incentives (rewards) and consequences for security compliance
  • Security should be treated as an ongoing journey, not a destination

Business Owner Advice:

  • Don't rely solely on internal IT or family members for security
  • Security needs constant updating and verification
  • Consider working with MSPs who have access to enterprise-level tools
  • Implement both preventive measures and incident response plans

The hosts emphasized that while 100% security might not be achievable, organizations can reach high levels of protection through proper implementation of security measures, regular assessment, and maintaining a security-focused culture.