Scott Alldridge
๐ค SpeakerAppearances Over Time
Podcast Appearances
One of the things that people get kind of in love with this idea with a new tool.
So if we know my, you know, IT guys said we're going to deploy this one new tool and that somehow one tool is going to put us in a better, you know, protected state.
And that's just a fallacy.
That's not true because you've got to have all the layers.
And so we joke about a fool if the tool is still a fool.
You really you really got to have a strategy and a philosophy around how you're deploying and protecting your business with your cybersecurity.
And it starts with leadership.
And I talk about that in the book a lot.
Yeah.
And we usually get pulled in ex post facto right after the fact of the hack or the breach and they're looking for stuff.
And it'll cost a business between seven and 10 times more money.
after a breach happens than if they did put the preventative tools a little bit like brushing your teeth right you do the or medical you do the preventive maintenance stuff and you're going to avoid hopefully some catastrophic event yeah it's like would you rather have you guys on hand when it when and if it happens or after and maybe you can't even fix it at that point
yeah exactly a lot of times it's too far gone yeah if a hack actually happens or a breach like that one of the important things actually a lot of people is they'll just start erasing rebuilding stuff but it's actually really important to protect the forensic data because if you are going to bring in you'll report at the fbi or even bring in some of the you know smart folks
that we work with and that we do to do the forensics to understand how it happened to prevent, you know, kind of root cause you can prevent the breach from happening again.
So it's kind of important to stop, drop and roll, if you will, when a breach happens and not overreact, but yet you're concerned because you're trying to get your business back in, you know, back in business or back online.
And it's very, very stressful.
It's a very difficult situation and you really don't want to be in that situation.
the hackers so um pretty small percentage because they're pretty smart um like i said they're kind of winning the game but um i think statistically they're saying that less than 20 percent okay you can actually get to sources that is small yeah there's a lot of interesting technologies you know like proton mill which is a switzerland-based system they have proton technologies they really are become proxies and hiding people behind things you really can't
You know, nobody can trace down where it's actually coming from.
From ProtonMail.