1 00:00:00,430 --> 00:00:02,980 [Music] 2 00:00:02,980 --> 00:00:02,990 3 00:00:02,990 --> 00:00:05,420 mr. robot is probably one of the most 4 00:00:05,420 --> 00:00:05,430 mr. robot is probably one of the most 5 00:00:05,430 --> 00:00:07,639 mr. robot is probably one of the most accurate portrayals of what hackers can 6 00:00:07,639 --> 00:00:07,649 accurate portrayals of what hackers can 7 00:00:07,649 --> 00:00:09,169 accurate portrayals of what hackers can actively do if you're interested in 8 00:00:09,169 --> 00:00:09,179 actively do if you're interested in 9 00:00:09,179 --> 00:00:11,030 actively do if you're interested in hacking and and don't understand a lot 10 00:00:11,030 --> 00:00:11,040 hacking and and don't understand a lot 11 00:00:11,040 --> 00:00:13,129 hacking and and don't understand a lot of this the TV show itself actually 12 00:00:13,129 --> 00:00:13,139 of this the TV show itself actually 13 00:00:13,139 --> 00:00:16,189 of this the TV show itself actually employs hackers to work on the show to 14 00:00:16,189 --> 00:00:16,199 employs hackers to work on the show to 15 00:00:16,199 --> 00:00:18,019 employs hackers to work on the show to depict real life hacks that could happen 16 00:00:18,019 --> 00:00:18,029 depict real life hacks that could happen 17 00:00:18,029 --> 00:00:19,490 depict real life hacks that could happen in real life and it's a very very 18 00:00:19,490 --> 00:00:19,500 in real life and it's a very very 19 00:00:19,500 --> 00:00:20,689 in real life and it's a very very accurate portrayal everything that we 20 00:00:20,689 --> 00:00:20,699 accurate portrayal everything that we 21 00:00:20,699 --> 00:00:22,550 accurate portrayal everything that we see in today from being able to hack 22 00:00:22,550 --> 00:00:22,560 see in today from being able to hack 23 00:00:22,560 --> 00:00:24,800 see in today from being able to hack smartphones to getting access to a big 24 00:00:24,800 --> 00:00:24,810 smartphones to getting access to a big 25 00:00:24,810 --> 00:00:26,810 smartphones to getting access to a big corporation and being able to bring them 26 00:00:26,810 --> 00:00:26,820 corporation and being able to bring them 27 00:00:26,820 --> 00:00:28,310 corporation and being able to bring them to their knees from a cyber perspective 28 00:00:28,310 --> 00:00:28,320 to their knees from a cyber perspective 29 00:00:28,320 --> 00:00:30,050 to their knees from a cyber perspective so what's the top five things that you 30 00:00:30,050 --> 00:00:30,060 so what's the top five things that you 31 00:00:30,060 --> 00:00:31,939 so what's the top five things that you can do to make yourself more secure both 32 00:00:31,939 --> 00:00:31,949 can do to make yourself more secure both 33 00:00:31,949 --> 00:00:34,069 can do to make yourself more secure both at your business and your home number 34 00:00:34,069 --> 00:00:34,079 at your business and your home number 35 00:00:34,079 --> 00:00:36,500 at your business and your home number one use two-factor authentication or 36 00:00:36,500 --> 00:00:36,510 one use two-factor authentication or 37 00:00:36,510 --> 00:00:38,299 one use two-factor authentication or 2-step verification everywhere that you 38 00:00:38,299 --> 00:00:38,309 2-step verification everywhere that you 39 00:00:38,309 --> 00:00:40,459 2-step verification everywhere that you can now your banking systems Twitter 40 00:00:40,459 --> 00:00:40,469 can now your banking systems Twitter 41 00:00:40,469 --> 00:00:42,740 can now your banking systems Twitter Facebook all support the ability for you 42 00:00:42,740 --> 00:00:42,750 Facebook all support the ability for you 43 00:00:42,750 --> 00:00:44,299 Facebook all support the ability for you to enable an additional security feature 44 00:00:44,299 --> 00:00:44,309 to enable an additional security feature 45 00:00:44,309 --> 00:00:45,560 to enable an additional security feature that you may not know if you go to your 46 00:00:45,560 --> 00:00:45,570 that you may not know if you go to your 47 00:00:45,570 --> 00:00:47,750 that you may not know if you go to your settings it's in there you can enable it 48 00:00:47,750 --> 00:00:47,760 settings it's in there you can enable it 49 00:00:47,760 --> 00:00:49,430 settings it's in there you can enable it and every time that you log in it will 50 00:00:49,430 --> 00:00:49,440 and every time that you log in it will 51 00:00:49,440 --> 00:00:51,319 and every time that you log in it will register your computer and you can then 52 00:00:51,319 --> 00:00:51,329 register your computer and you can then 53 00:00:51,329 --> 00:00:52,910 register your computer and you can then get a text message to go into that 54 00:00:52,910 --> 00:00:52,920 get a text message to go into that 55 00:00:52,920 --> 00:00:54,170 get a text message to go into that system as a second form of verification 56 00:00:54,170 --> 00:00:54,180 system as a second form of verification 57 00:00:54,180 --> 00:00:56,869 system as a second form of verification and why that's important is because if a 58 00:00:56,869 --> 00:00:56,879 and why that's important is because if a 59 00:00:56,879 --> 00:00:59,299 and why that's important is because if a hacker gets access to your your password 60 00:00:59,299 --> 00:00:59,309 hacker gets access to your your password 61 00:00:59,309 --> 00:01:00,740 hacker gets access to your your password they still have to have access to your 62 00:01:00,740 --> 00:01:00,750 they still have to have access to your 63 00:01:00,750 --> 00:01:02,330 they still have to have access to your phone to get access to your account and 64 00:01:02,330 --> 00:01:02,340 phone to get access to your account and 65 00:01:02,340 --> 00:01:03,830 phone to get access to your account and that's really important by enabling that 66 00:01:03,830 --> 00:01:03,840 that's really important by enabling that 67 00:01:03,840 --> 00:01:05,420 that's really important by enabling that specific security steps probably number 68 00:01:05,420 --> 00:01:05,430 specific security steps probably number 69 00:01:05,430 --> 00:01:07,429 specific security steps probably number one number two don't use the same 70 00:01:07,429 --> 00:01:07,439 one number two don't use the same 71 00:01:07,439 --> 00:01:09,140 one number two don't use the same password everywhere I know it's hard but 72 00:01:09,140 --> 00:01:09,150 password everywhere I know it's hard but 73 00:01:09,150 --> 00:01:10,850 password everywhere I know it's hard but using the same password everywhere is 74 00:01:10,850 --> 00:01:10,860 using the same password everywhere is 75 00:01:10,860 --> 00:01:12,440 using the same password everywhere is probably the easiest ways that we break 76 00:01:12,440 --> 00:01:12,450 probably the easiest ways that we break 77 00:01:12,450 --> 00:01:14,030 probably the easiest ways that we break in as hackers so if you have the same 78 00:01:14,030 --> 00:01:14,040 in as hackers so if you have the same 79 00:01:14,040 --> 00:01:15,410 in as hackers so if you have the same twitter password is the same banking 80 00:01:15,410 --> 00:01:15,420 twitter password is the same banking 81 00:01:15,420 --> 00:01:17,090 twitter password is the same banking information those are things that can 82 00:01:17,090 --> 00:01:17,100 information those are things that can 83 00:01:17,100 --> 00:01:18,920 information those are things that can get you in some serious trouble number 84 00:01:18,920 --> 00:01:18,930 get you in some serious trouble number 85 00:01:18,930 --> 00:01:20,539 get you in some serious trouble number three make sure that you stay up to date 86 00:01:20,539 --> 00:01:20,549 three make sure that you stay up to date 87 00:01:20,549 --> 00:01:22,580 three make sure that you stay up to date those security patches every time you 88 00:01:22,580 --> 00:01:22,590 those security patches every time you 89 00:01:22,590 --> 00:01:23,810 those security patches every time you have a Windows Update that says hey I 90 00:01:23,810 --> 00:01:23,820 have a Windows Update that says hey I 91 00:01:23,820 --> 00:01:25,340 have a Windows Update that says hey I need to update your computer it's 92 00:01:25,340 --> 00:01:25,350 need to update your computer it's 93 00:01:25,350 --> 00:01:27,230 need to update your computer it's usually to fix a known attack that 94 00:01:27,230 --> 00:01:27,240 usually to fix a known attack that 95 00:01:27,240 --> 00:01:29,060 usually to fix a known attack that hackers have figured out to get access 96 00:01:29,060 --> 00:01:29,070 hackers have figured out to get access 97 00:01:29,070 --> 00:01:30,830 hackers have figured out to get access to your computer so keep up to date 98 00:01:30,830 --> 00:01:30,840 to your computer so keep up to date 99 00:01:30,840 --> 00:01:32,510 to your computer so keep up to date whether you're using a Mac they aren't 100 00:01:32,510 --> 00:01:32,520 whether you're using a Mac they aren't 101 00:01:32,520 --> 00:01:34,280 whether you're using a Mac they aren't impervious to attack or using Windows 102 00:01:34,280 --> 00:01:34,290 impervious to attack or using Windows 103 00:01:34,290 --> 00:01:36,380 impervious to attack or using Windows same thing update your systems that's 104 00:01:36,380 --> 00:01:36,390 same thing update your systems that's 105 00:01:36,390 --> 00:01:38,090 same thing update your systems that's the most important thing always keep up 106 00:01:38,090 --> 00:01:38,100 the most important thing always keep up 107 00:01:38,100 --> 00:01:39,620 the most important thing always keep up to date with what you're having out 108 00:01:39,620 --> 00:01:39,630 to date with what you're having out 109 00:01:39,630 --> 00:01:40,609 to date with what you're having out there same thing for third-party 110 00:01:40,609 --> 00:01:40,619 there same thing for third-party 111 00:01:40,619 --> 00:01:42,950 there same thing for third-party applications if you're using Java Adobe 112 00:01:42,950 --> 00:01:42,960 applications if you're using Java Adobe 113 00:01:42,960 --> 00:01:45,620 applications if you're using Java Adobe PDFs office documents those are all 114 00:01:45,620 --> 00:01:45,630 PDFs office documents those are all 115 00:01:45,630 --> 00:01:46,760 PDFs office documents those are all things that you want to keep up-to-date 116 00:01:46,760 --> 00:01:46,770 things that you want to keep up-to-date 117 00:01:46,770 --> 00:01:48,770 things that you want to keep up-to-date and that makes it much harder for us as 118 00:01:48,770 --> 00:01:48,780 and that makes it much harder for us as 119 00:01:48,780 --> 00:01:50,510 and that makes it much harder for us as hackers to break into your system 120 00:01:50,510 --> 00:01:50,520 hackers to break into your system 121 00:01:50,520 --> 00:01:53,569 hackers to break into your system number four social media be careful with 122 00:01:53,569 --> 00:01:53,579 number four social media be careful with 123 00:01:53,579 --> 00:01:55,010 number four social media be careful with how much information you actually put 124 00:01:55,010 --> 00:01:55,020 how much information you actually put 125 00:01:55,020 --> 00:01:55,490 how much information you actually put online 126 00:01:55,490 --> 00:01:55,500 online 127 00:01:55,500 --> 00:01:57,950 online we as attackers can look at that look at 128 00:01:57,950 --> 00:01:57,960 we as attackers can look at that look at 129 00:01:57,960 --> 00:01:59,959 we as attackers can look at that look at what you do your spending habits your 130 00:01:59,959 --> 00:01:59,969 what you do your spending habits your 131 00:01:59,969 --> 00:02:01,249 what you do your spending habits your what you might be doing from a 132 00:02:01,249 --> 00:02:01,259 what you might be doing from a 133 00:02:01,259 --> 00:02:02,660 what you might be doing from a day-to-day perspective going and buying 134 00:02:02,660 --> 00:02:02,670 day-to-day perspective going and buying 135 00:02:02,670 --> 00:02:04,700 day-to-day perspective going and buying Starbucks at a certain location those 136 00:02:04,700 --> 00:02:04,710 Starbucks at a certain location those 137 00:02:04,710 --> 00:02:06,050 Starbucks at a certain location those are all things that we can use to 138 00:02:06,050 --> 00:02:06,060 are all things that we can use to 139 00:02:06,060 --> 00:02:07,639 are all things that we can use to identify when you're going to be out of 140 00:02:07,639 --> 00:02:07,649 identify when you're going to be out of 141 00:02:07,649 --> 00:02:09,529 identify when you're going to be out of the country or when you're gonna be at a 142 00:02:09,529 --> 00:02:09,539 the country or when you're gonna be at a 143 00:02:09,539 --> 00:02:11,089 the country or when you're gonna be at a business meeting we can use that as a 144 00:02:11,089 --> 00:02:11,099 business meeting we can use that as a 145 00:02:11,099 --> 00:02:11,980 business meeting we can use that as a method to attack 146 00:02:11,980 --> 00:02:11,990 method to attack 147 00:02:11,990 --> 00:02:13,780 method to attack one of the main things that we do as 148 00:02:13,780 --> 00:02:13,790 one of the main things that we do as 149 00:02:13,790 --> 00:02:15,250 one of the main things that we do as hackers especially when it comes to 150 00:02:15,250 --> 00:02:15,260 hackers especially when it comes to 151 00:02:15,260 --> 00:02:17,050 hackers especially when it comes to social engineering is we create a sense 152 00:02:17,050 --> 00:02:17,060 social engineering is we create a sense 153 00:02:17,060 --> 00:02:18,490 social engineering is we create a sense of urgency something that you're 154 00:02:18,490 --> 00:02:18,500 of urgency something that you're 155 00:02:18,500 --> 00:02:19,870 of urgency something that you're familiar with but you have to take 156 00:02:19,870 --> 00:02:19,880 familiar with but you have to take 157 00:02:19,880 --> 00:02:21,400 familiar with but you have to take action upon so let's just say for 158 00:02:21,400 --> 00:02:21,410 action upon so let's just say for 159 00:02:21,410 --> 00:02:24,400 action upon so let's just say for example I am a Verizon customer and I 160 00:02:24,400 --> 00:02:24,410 example I am a Verizon customer and I 161 00:02:24,410 --> 00:02:25,870 example I am a Verizon customer and I have an Amazon package as getting 162 00:02:25,870 --> 00:02:25,880 have an Amazon package as getting 163 00:02:25,880 --> 00:02:28,210 have an Amazon package as getting delivered well if I as an attacker known 164 00:02:28,210 --> 00:02:28,220 delivered well if I as an attacker known 165 00:02:28,220 --> 00:02:29,860 delivered well if I as an attacker known Amazon package scan delivered sending a 166 00:02:29,860 --> 00:02:29,870 Amazon package scan delivered sending a 167 00:02:29,870 --> 00:02:31,300 Amazon package scan delivered sending a text message from a Verizon customer 168 00:02:31,300 --> 00:02:31,310 text message from a Verizon customer 169 00:02:31,310 --> 00:02:32,980 text message from a Verizon customer support service line coming from Amazon 170 00:02:32,980 --> 00:02:32,990 support service line coming from Amazon 171 00:02:32,990 --> 00:02:34,210 support service line coming from Amazon saying hey your package is being 172 00:02:34,210 --> 00:02:34,220 saying hey your package is being 173 00:02:34,220 --> 00:02:35,620 saying hey your package is being rerouted you need to log it to the site 174 00:02:35,620 --> 00:02:35,630 rerouted you need to log it to the site 175 00:02:35,630 --> 00:02:37,450 rerouted you need to log it to the site to get it delivered again it's something 176 00:02:37,450 --> 00:02:37,460 to get it delivered again it's something 177 00:02:37,460 --> 00:02:38,740 to get it delivered again it's something that an attacker can use so those are 178 00:02:38,740 --> 00:02:38,750 that an attacker can use so those are 179 00:02:38,750 --> 00:02:40,030 that an attacker can use so those are things that attackers can leverage is is 180 00:02:40,030 --> 00:02:40,040 things that attackers can leverage is is 181 00:02:40,040 --> 00:02:43,000 things that attackers can leverage is is urgency how you how you actually operate 182 00:02:43,000 --> 00:02:43,010 urgency how you how you actually operate 183 00:02:43,010 --> 00:02:44,440 urgency how you how you actually operate and all that information that you post 184 00:02:44,440 --> 00:02:44,450 and all that information that you post 185 00:02:44,450 --> 00:02:45,730 and all that information that you post online are things that we can use as 186 00:02:45,730 --> 00:02:45,740 online are things that we can use as 187 00:02:45,740 --> 00:02:48,370 online are things that we can use as attacks and last but not least personal 188 00:02:48,370 --> 00:02:48,380 attacks and last but not least personal 189 00:02:48,380 --> 00:02:50,020 attacks and last but not least personal information that's one of the biggest 190 00:02:50,020 --> 00:02:50,030 information that's one of the biggest 191 00:02:50,030 --> 00:02:51,790 information that's one of the biggest things that attackers can leverage to 192 00:02:51,790 --> 00:02:51,800 things that attackers can leverage to 193 00:02:51,800 --> 00:02:53,800 things that attackers can leverage to get access to your data things like 194 00:02:53,800 --> 00:02:53,810 get access to your data things like 195 00:02:53,810 --> 00:02:55,300 get access to your data things like Social Security numbers your credit card 196 00:02:55,300 --> 00:02:55,310 Social Security numbers your credit card 197 00:02:55,310 --> 00:02:57,340 Social Security numbers your credit card numbers a person is not gonna call you 198 00:02:57,340 --> 00:02:57,350 numbers a person is not gonna call you 199 00:02:57,350 --> 00:02:59,560 numbers a person is not gonna call you on the phone from a banking service and 200 00:02:59,560 --> 00:02:59,570 on the phone from a banking service and 201 00:02:59,570 --> 00:03:01,120 on the phone from a banking service and ask you for that type of information 202 00:03:01,120 --> 00:03:01,130 ask you for that type of information 203 00:03:01,130 --> 00:03:02,950 ask you for that type of information so whenever you get a call that's that's 204 00:03:02,950 --> 00:03:02,960 so whenever you get a call that's that's 205 00:03:02,960 --> 00:03:05,020 so whenever you get a call that's that's too good to be true or a call that is is 206 00:03:05,020 --> 00:03:05,030 too good to be true or a call that is is 207 00:03:05,030 --> 00:03:07,750 too good to be true or a call that is is a fraud services line call them back 208 00:03:07,750 --> 00:03:07,760 a fraud services line call them back 209 00:03:07,760 --> 00:03:08,830 a fraud services line call them back look at the number on the website 210 00:03:08,830 --> 00:03:08,840 look at the number on the website 211 00:03:08,840 --> 00:03:10,480 look at the number on the website themselves and call it back cuz a lot of 212 00:03:10,480 --> 00:03:10,490 themselves and call it back cuz a lot of 213 00:03:10,490 --> 00:03:11,760 themselves and call it back cuz a lot of times attackers will impersonate 214 00:03:11,760 --> 00:03:11,770 times attackers will impersonate 215 00:03:11,770 --> 00:03:13,900 times attackers will impersonate financial services they'll impersonate 216 00:03:13,900 --> 00:03:13,910 financial services they'll impersonate 217 00:03:13,910 --> 00:03:15,490 financial services they'll impersonate different organizations to try to get 218 00:03:15,490 --> 00:03:15,500 different organizations to try to get 219 00:03:15,500 --> 00:03:16,930 different organizations to try to get your personal information and use that 220 00:03:16,930 --> 00:03:16,940 your personal information and use that 221 00:03:16,940 --> 00:03:18,280 your personal information and use that to be able to make fraudulent charges 222 00:03:18,280 --> 00:03:18,290 to be able to make fraudulent charges 223 00:03:18,290 --> 00:03:20,320 to be able to make fraudulent charges it's when it comes to that your phone 224 00:03:20,320 --> 00:03:20,330 it's when it comes to that your phone 225 00:03:20,330 --> 00:03:22,960 it's when it comes to that your phone verify first go to their site call the 226 00:03:22,960 --> 00:03:22,970 verify first go to their site call the 227 00:03:22,970 --> 00:03:24,700 verify first go to their site call the site itself from there and then call to 228 00:03:24,700 --> 00:03:24,710 site itself from there and then call to 229 00:03:24,710 --> 00:03:26,170 site itself from there and then call to an actual person that's actually at that 230 00:03:26,170 --> 00:03:26,180 an actual person that's actually at that 231 00:03:26,180 --> 00:03:28,900 an actual person that's actually at that Institute itself