Featuring: Brett Gallant, founder of Adaptive Office Solutions and author of "Cyber Attack Prevention." The discussion centers on real-world cyber attack case studies, vendor security risks, and the transformative power of proactive cybersecurity.
Key Case Studies Discussed
Case Study 1: Manufacturing Company TeamViewer Attack
The Incident:
- A manufacturing company suffered a complete production line shutdown due to ransomware
- Attack vector: Unsecured TeamViewer access managed by a vendor
- Ransom demands were printed on company printers (unusual delivery method)
- Production was down for 3 days, with ongoing issues weeks later
Financial Impact:
- Direct recovery costs: $6,000
- Lost production value: ~$300,000
- Ongoing productivity losses: Potentially millions due to system optimization issues
Root Causes:
- Wide-open TeamViewer access with no security controls
- Admin-level credentials on compromised machine
- No network segmentation
- Open RDP allowing lateral movement
- Complete lack of cybersecurity measures
The Twist:
- Attackers returned 3 days later targeting the accounting system
- Only caught due to newly implemented Security Operations Center (SOC)
- Poor network architecture accidentally provided some protection initially
Case Study 2: Business Email Compromise (BEC) Attack
The Incident:
- Attackers impersonated bank representatives and company owner
- Used recent, legitimate business transaction details to build credibility
- Convinced employee to surrender authentication key fob
- Total theft: $400,000 across two transactions
- Recovery: Only $160,000 recovered (net loss: $240,000)
Sophisticated Tactics:
- 60+ days of reconnaissance before striking
- Changed supplier contact information 45 days prior
- Registered new VoIP number in same geographic area
- Demonstrated deep knowledge of company operations and relationships
Aftermath:
- Company refused free government cybersecurity grant
- Declined to implement any security measures
- Brett terminated the client relationship
- Company was attacked again 3 weeks later
- New IT provider's "solution": Wipe computers and install Kaspersky antivirus
Critical Vendor Security Issues
TeamViewer Vulnerabilities
- Permanent, unchanging connection IDs
- Weak default passwords (6 characters, lowercase only)
- No authentication required to connect
- Vendors often use identical passwords across multiple clients
- Susceptible to social engineering attacks
Manufacturing Industry Risks
- Production line control systems vulnerable to remote access attacks
- PLCs and IoT devices create additional attack vectors
- Vendor access often unsecured and unmonitored
- Critical infrastructure can be completely compromised
Best Practices for Vendor Management
- Implement on-demand access only (no persistent connections)
- Require vendors to contact IT for access approval
- Use network segmentation/VLANs to isolate vendor-accessed systems
- Audit vendor cybersecurity policies and practices
- Demand security documentation before granting access
Brett's Three-Phase Security Framework
1. Risk Audit
- Comprehensive assessment of cybersecurity posture
- Evaluation of Microsoft 365/Google Workspace monitoring
- Review of two-factor authentication implementation
- Software update and patch management analysis
- Backup testing and verification
- Vendor access point identification
- Network segmentation assessment
2. Gap Closure
- Prioritized remediation of identified vulnerabilities
- Implementation of monitoring and detection systems
- Establishment of proper access controls
- Network segmentation and VLAN configuration
3. Resilience Testing
- Ongoing monitoring through Security Operations Centers
- Regular backup testing and restoration procedures
- Incident response planning and testing
- Continuous security posture evaluation
AI Security Considerations
Current Challenges
- Uncontrolled "Wild West" AI adoption in businesses
- Data leakage through improper AI tool usage
- Lack of AI governance policies
- Employees using personal AI accounts for business data
Recommended AI Security Practices
- Establish clear AI usage policies
- Audit AI tools for data handling practices
- Determine what information can be shared with AI systems
- Implement monitoring for AI usage compliance
- Provide secure, approved AI tools for business use
- Train staff on safe AI practices
Positive AI Applications
- AI-powered advisory boards and consultation
- Language learning and translation
- Business strategy development
- Enhanced decision-making support
Personal Transformation and Business Impact
Brett's Journey
- Lost 130 pounds through disciplined health routine
- Transformed from business bottleneck to visionary leader
- Implemented "train them, trust them, let them lead" philosophy
- Grew monthly recurring revenue from $18,000 to $120,000 over 3 years
- Adopted "80% done by someone else is 100% awesome" mindset
Key Leadership Insights
- "Put the oxygen mask on yourself first"
- Personal health directly impacts business performance
- Delegation and team empowerment drive growth
- Courage to change is essential for transformation
- Physical fitness enhances mental clarity and decision-making
Critical Security Checklist
Top 5 Security Priorities
- Monitor SaaS Environments - Implement logging and monitoring for Office 365/Google Workspace
- Two-Factor Authentication - Enable MFA on all critical systems and accounts
- Software Management - Maintain current, managed software across all systems
- Backup Strategy - Implement, test, and verify offsite backup systems
- Vendor Security - Audit and secure all third-party access points
Warning Signs of Poor IT Management
- Reliance solely on antivirus and backups
- No mention of two-factor authentication
- Absence of Security Operations Center (SOC) or Endpoint Detection and Response (EDR)
- Reactive "break-fix" approach instead of proactive management
- No network segmentation or access controls
Government and Industry Resources
Available Support
- Government cybersecurity grants (varies by region)
- Cybersecurity frameworks and guidelines
- Industry-specific security requirements
- Professional cybersecurity assessment programs
Regulatory Considerations
- Healthcare organizations must report breaches
- Defense contractors face mandatory reporting
- Food processing and critical infrastructure have specific requirements
- Failure to report can result in additional penalties and lawsuits
Expert Recommendations and Key Takeaways
Mario Zaki's Advice
- "Start somewhere, do something now"
- Controlled environment preparation costs 10-100x less than post-breach recovery
- Don't wait for a panic situation to implement security
Brian LaChapelle's Wisdom
- "Focus on yourself first to improve business performance"
- "Find your 'who' to implement the 'how'"
- Personal health and clarity directly impact business decision-making
- Delegate cybersecurity to trusted team members if needed
Brett Gallant's Philosophy
- "You can't prescribe without diagnosing"
- "Be the hero in your own story"
- "Go from zero to hero" in cybersecurity preparedness
- Take ownership of both personal and business transformation
Justin Shelley's Challenge
- "Follow the path of most resistance"
- Address avoided problems head-on
- The pain of avoidance exceeds the pain of resolution
- Look for blind spots and tackle them directly
Episode Resources and Next Steps
Immediate Actions
- Contact Brett Gallant via Instagram/LinkedIn with "15 ways" for free cybersecurity document
- Assess current vendor access arrangements
- Review TeamViewer and similar remote access tools
- Evaluate AI usage policies in your organization
- Schedule cybersecurity risk assessment
Long-term Strategy
- Implement comprehensive cybersecurity framework
- Develop vendor management protocols
- Establish AI governance policies
- Create incident response procedures
- Build culture of security awareness
Contact Information
- Visit: unhacked.live for show notes and resources
- Connect with experts through provided social media links
- Submit your cybersecurity stories or questions for future episodes
This episode powerfully demonstrates that cybersecurity isn't just about technology—it's about leadership, decision-making, and having the courage to address uncomfortable truths before they become devastating realities.
