Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

Digital Social Hour

Scott Alldridge: Zero-Trust Cybersecurity: The Key to Staying Safe | DSH #1513

28 Aug 2025

Transcription

Chapter 1: What is the main topic discussed in this episode?

0.031 - 13.373 Scott Alldridge

Yeah, so if you go to public Wi-Fi, because there's such weak security protocols, so there's little hacks that you can put in, and you can basically see the streams of data that are going on, and then they have emulators, so you can almost, they literally can almost emulate your screen and watch everything you're doing.

0

Chapter 2: Why is data considered valuable in cybersecurity?

13.513 - 16.278 Scott Alldridge

Holy crap. Snip password, passwords, they can do all kinds of stuff.

0

Chapter 3: How do hackers exploit weaknesses in systems?

16.298 - 22.107 Scott Alldridge

They can even do little applets to log on to your phone or your mobile device, your laptop, and basically just make a copy of it. Wow.

0

30.457 - 36.894 Sean Kelly

Okay, guys, we got Scott here today, cybersecurity expert. What's new with you, man? I know you got the book launch and you're busier than ever.

0

36.954 - 39.06 Scott Alldridge

Yeah, well, thanks for having me on.

0

Chapter 4: What are the implications of the MGM cyber attack?

39.361 - 43.01 Scott Alldridge

I'm really excited to be here. Big fan of you and your show.

0

Chapter 5: How can advanced multi-factor authentication enhance security?

43.09 - 47.881 Scott Alldridge

And so it's really cool. Thanks. But yeah, I... I live in the world of cybersecurity.

0

47.901 - 49.303 Sean Kelly

That's where I camp.

0

Chapter 6: What are the legal consequences for hackers?

49.343 - 53.189 Sean Kelly

Clash of two worlds right now because I'm in the entertainment business and you're in cybersecurity.

0

53.93 - 72.821 Scott Alldridge

Yeah, it's a crazy world out there. There's just so many threats and things that are going on that it's almost hard to get your head around. The growth of the cybersecurity hacks and the ransomware stuff that we read about really almost every day. in the news. It's crazy. And it's obviously a global problem.

0

72.881 - 80.46 Sean Kelly

Yeah, because data is really valuable. So these people or groups want to basically get all this data, right? That's how they're hacking into these companies for the data.

0

80.677 - 99.698 Scott Alldridge

A hundred percent. Yeah. They're, they really want the data is the value and certain types of data is more valuable than other types of data. So, you know, they love, you know, healthcare data, not only for the healthcare, you know, kind of HR, the doctors and the nurses, but they patient data is really valuable too. So on the dark web, which is where a lot of this lives and,

0

99.678 - 122.253 Scott Alldridge

That's one of the problems, quite frankly, is it's becoming so prolific for anybody. If you're a middle schooler or a high schooler that really loves tech and you want to start hacking, just get the Tor browser, go on the dark web. You can actually join a franchise for ransomware and to do hacking. Wow. So you pay $299, you get a kit, they give you some tools, some training.

122.733 - 127.157 Scott Alldridge

And then if you go out, try to hack maybe some local businesses or whatever you can, because, you know, you're connected.

Chapter 7: How does quantum computing affect password security?

127.197 - 144.113 Scott Alldridge

So you really can, you know, we get hacks from all over the world that come into the U.S. and get businesses. And the other things are going way down to small businesses. But you basically can join up a franchise, crazy as it is, and they'll bring in, if you can't hack in, they'll bring in one of their experts, one of the really good threat actor guys, and they'll actually...

0

Chapter 8: What strategies can businesses implement for reliable backups?

144.093 - 150.662 Scott Alldridge

uh, work with you and then they'll split the profits of the ransomware. So once I get the Bitcoin and it's a sophisticated world.

0

150.822 - 167.665 Scott Alldridge

And the other thing is, is that, um, a lot of times when they finally do negotiate and, you know, they show up with a black screen and all your networks down, I mean, just kind of imagine, you know, your whole thing is whether you're a small business and a coffee business or you're, you know, a hospital, you know, your systems come to a complete halt. So you just get a black screen of death.

0

167.705 - 182.062 Scott Alldridge

As we say, it's got a text file. It says, Oh, by the way, we have all your data encrypted. Please pay, you know, 50 Bitcoin to, you know, whatever, 100 Bitcoin or whatever. And so then in a couple of cases, we've been pulled, you know, pulled into ex post facto of, you know, ransomware.

0

182.503 - 196.258 Scott Alldridge

They're ready to settle and negotiate because they didn't have proper backups and some of the things you should have in place. And they said, oh, call our 1-800 number to our call center and they'll settle up the transaction. So they're so sophisticated. They actually not only have franchises, they have call centers. Wow.

0

196.278 - 207.533 Sean Kelly

That's crazy. A call center just for reaching settlements. Yep. 100%. Yeah, some of these hacks are clever. The crypto ones are crazy because those are hard to trace, right? And really impossible to trace.

207.553 - 226.142 Scott Alldridge

And that's why they want to be paid in crypto, too, because they can't they can't trace the dollars. You know, the FBI or Interpol can't trace them. Yeah. So those ones, what can you really do? There's nothing you can do unless you go into where I talk about my book. We talk about zero trust, which is kind of a methodology. It's about layers of security.

226.122 - 245.545 Scott Alldridge

But one of the big prerequisites to this method of zero trust to enhance your cybersecurity is you assume breach. Because we look at all these big companies, even the casinos, they spend millions of dollars on cybersecurity. They have the best and the brightest people, guys that are making half a million bucks a year. expertise, all the tools, and yet they still get hacked.

245.565 - 257.935 Scott Alldridge

So the idea of assume breach, if you're a smaller business and they're going downstream and the threat actors are going for very small businesses, you can be a business with 500K or a couple million dollars in revenue and they're going after you. They're going after everybody. And it's become-

257.915 - 285.188 Scott Alldridge

so crazy it's growing so fast 10 trillion this year in cyber um you know hacks that will happen that cost businesses that's supposed to grow in the next three years to over 20 trillion holy crap so it's going to double in three years it's crazy so i was just going to ask who the who the targets are but it sounds like just everyday mom and pop businesses exactly and that's really a lot of the reason that i you know kind of wrote the book there's an altruism to it that i kind of want to raise the tide that floats the boats of everybody being more aware about security and so

Comments

There are no comments yet.

Please log in to write the first comment.