Featuring: Brett Gallant, founder of Adaptive Office Solutions and author of "Cyber Attack Prevention." The discussion centers on real-world cyber attack case studies, vendor security risks, and the transformative power of proactive cybersecurity.

Key Case Studies Discussed

Case Study 1: Manufacturing Company TeamViewer Attack

The Incident:

  • A manufacturing company suffered a complete production line shutdown due to ransomware
  • Attack vector: Unsecured TeamViewer access managed by a vendor
  • Ransom demands were printed on company printers (unusual delivery method)
  • Production was down for 3 days, with ongoing issues weeks later

Financial Impact:

  • Direct recovery costs: $6,000
  • Lost production value: ~$300,000
  • Ongoing productivity losses: Potentially millions due to system optimization issues

Root Causes:

  • Wide-open TeamViewer access with no security controls
  • Admin-level credentials on compromised machine
  • No network segmentation
  • Open RDP allowing lateral movement
  • Complete lack of cybersecurity measures

The Twist:

  • Attackers returned 3 days later targeting the accounting system
  • Only caught due to newly implemented Security Operations Center (SOC)
  • Poor network architecture accidentally provided some protection initially

Case Study 2: Business Email Compromise (BEC) Attack

The Incident:

  • Attackers impersonated bank representatives and company owner
  • Used recent, legitimate business transaction details to build credibility
  • Convinced employee to surrender authentication key fob
  • Total theft: $400,000 across two transactions
  • Recovery: Only $160,000 recovered (net loss: $240,000)

Sophisticated Tactics:

  • 60+ days of reconnaissance before striking
  • Changed supplier contact information 45 days prior
  • Registered new VoIP number in same geographic area
  • Demonstrated deep knowledge of company operations and relationships

Aftermath:

  • Company refused free government cybersecurity grant
  • Declined to implement any security measures
  • Brett terminated the client relationship
  • Company was attacked again 3 weeks later
  • New IT provider's "solution": Wipe computers and install Kaspersky antivirus

Critical Vendor Security Issues

TeamViewer Vulnerabilities

  • Permanent, unchanging connection IDs
  • Weak default passwords (6 characters, lowercase only)
  • No authentication required to connect
  • Vendors often use identical passwords across multiple clients
  • Susceptible to social engineering attacks

Manufacturing Industry Risks

  • Production line control systems vulnerable to remote access attacks
  • PLCs and IoT devices create additional attack vectors
  • Vendor access often unsecured and unmonitored
  • Critical infrastructure can be completely compromised

Best Practices for Vendor Management

  • Implement on-demand access only (no persistent connections)
  • Require vendors to contact IT for access approval
  • Use network segmentation/VLANs to isolate vendor-accessed systems
  • Audit vendor cybersecurity policies and practices
  • Demand security documentation before granting access

Brett's Three-Phase Security Framework

1. Risk Audit

  • Comprehensive assessment of cybersecurity posture
  • Evaluation of Microsoft 365/Google Workspace monitoring
  • Review of two-factor authentication implementation
  • Software update and patch management analysis
  • Backup testing and verification
  • Vendor access point identification
  • Network segmentation assessment

2. Gap Closure

  • Prioritized remediation of identified vulnerabilities
  • Implementation of monitoring and detection systems
  • Establishment of proper access controls
  • Network segmentation and VLAN configuration

3. Resilience Testing

  • Ongoing monitoring through Security Operations Centers
  • Regular backup testing and restoration procedures
  • Incident response planning and testing
  • Continuous security posture evaluation

AI Security Considerations

Current Challenges

  • Uncontrolled "Wild West" AI adoption in businesses
  • Data leakage through improper AI tool usage
  • Lack of AI governance policies
  • Employees using personal AI accounts for business data

Recommended AI Security Practices

  • Establish clear AI usage policies
  • Audit AI tools for data handling practices
  • Determine what information can be shared with AI systems
  • Implement monitoring for AI usage compliance
  • Provide secure, approved AI tools for business use
  • Train staff on safe AI practices

Positive AI Applications

  • AI-powered advisory boards and consultation
  • Language learning and translation
  • Business strategy development
  • Enhanced decision-making support

Personal Transformation and Business Impact

Brett's Journey

  • Lost 130 pounds through disciplined health routine
  • Transformed from business bottleneck to visionary leader
  • Implemented "train them, trust them, let them lead" philosophy
  • Grew monthly recurring revenue from $18,000 to $120,000 over 3 years
  • Adopted "80% done by someone else is 100% awesome" mindset

Key Leadership Insights

  • "Put the oxygen mask on yourself first"
  • Personal health directly impacts business performance
  • Delegation and team empowerment drive growth
  • Courage to change is essential for transformation
  • Physical fitness enhances mental clarity and decision-making

Critical Security Checklist

Top 5 Security Priorities

  1. Monitor SaaS Environments - Implement logging and monitoring for Office 365/Google Workspace
  2. Two-Factor Authentication - Enable MFA on all critical systems and accounts
  3. Software Management - Maintain current, managed software across all systems
  4. Backup Strategy - Implement, test, and verify offsite backup systems
  5. Vendor Security - Audit and secure all third-party access points

Warning Signs of Poor IT Management

  • Reliance solely on antivirus and backups
  • No mention of two-factor authentication
  • Absence of Security Operations Center (SOC) or Endpoint Detection and Response (EDR)
  • Reactive "break-fix" approach instead of proactive management
  • No network segmentation or access controls

Government and Industry Resources

Available Support

  • Government cybersecurity grants (varies by region)
  • Cybersecurity frameworks and guidelines
  • Industry-specific security requirements
  • Professional cybersecurity assessment programs

Regulatory Considerations

  • Healthcare organizations must report breaches
  • Defense contractors face mandatory reporting
  • Food processing and critical infrastructure have specific requirements
  • Failure to report can result in additional penalties and lawsuits

Expert Recommendations and Key Takeaways

Mario Zaki's Advice

  • "Start somewhere, do something now"
  • Controlled environment preparation costs 10-100x less than post-breach recovery
  • Don't wait for a panic situation to implement security

Brian LaChapelle's Wisdom

  • "Focus on yourself first to improve business performance"
  • "Find your 'who' to implement the 'how'"
  • Personal health and clarity directly impact business decision-making
  • Delegate cybersecurity to trusted team members if needed

Brett Gallant's Philosophy

  • "You can't prescribe without diagnosing"
  • "Be the hero in your own story"
  • "Go from zero to hero" in cybersecurity preparedness
  • Take ownership of both personal and business transformation

Justin Shelley's Challenge

  • "Follow the path of most resistance"
  • Address avoided problems head-on
  • The pain of avoidance exceeds the pain of resolution
  • Look for blind spots and tackle them directly

Episode Resources and Next Steps

Immediate Actions

  • Contact Brett Gallant via Instagram/LinkedIn with "15 ways" for free cybersecurity document
  • Assess current vendor access arrangements
  • Review TeamViewer and similar remote access tools
  • Evaluate AI usage policies in your organization
  • Schedule cybersecurity risk assessment

Long-term Strategy

  • Implement comprehensive cybersecurity framework
  • Develop vendor management protocols
  • Establish AI governance policies
  • Create incident response procedures
  • Build culture of security awareness

Contact Information

  • Visit: unhacked.live for show notes and resources
  • Connect with experts through provided social media links
  • Submit your cybersecurity stories or questions for future episodes

This episode powerfully demonstrates that cybersecurity isn't just about technology—it's about leadership, decision-making, and having the courage to address uncomfortable truths before they become devastating realities.