Launch of The 2017 Guide to Identity Security: Crush Hackers, Scammers & Thieves
Welcome, welcome, welcome. I told you I was going to be back. Now I’m back. Identity Security. How did I get this to print out correctly? I printed it backward so no more showing up on the screen backward. I listened to my audience. So, hey, Morgan Wright, Identity Security. Yeah, I made a mistake here that’s why I crossed it out. MorganWright.us, IdentitySecurity.com, and @morganwright_us. If you can’t find me you are not trying hard enough.
What am I here to do today? I’m here to talk about the release of the 2017 guide to Identity Security. How to defeat, I don’t just mean defeat, I mean how to crush hackers, scammers, and thieves and be prepared for them. I’m going to show you how to download this guide. How do you download this guide? You go here. IdentitySecurity.com/guide. I’ll put all this information on there as well. Just remember, we’re launching this. I’m going to talk about this today. This is the 12 do’s, the 12 don’ts, and you know why I’m going to talk about this today?
Because Yahoo got hacked again. One billion accounts go hacked. How many data breaches have we had? Folks, I’m telling you. You got to take control of your security and your own privacy back into your hands. You can’t trust these corporations. If you’re a small business, if you’re a family with is also a small business as well, you need to have this information. Again, the launch. It is now official. It’s out there. The 2017 guide to Identity Security. I should change that to how to crush. How to crush hackers, scammers, and thieves at their own game.
Getting The Guide
Here’s what we’re going to do. Go here, download this now. IdentitySecurity.com/guide. I’ll also put that, this is going to auto post to Facebook with my stuff. Let’s talk about this first thing. What I want to do, there are 12 do’s, there are 12 don’ts so I’m going to break this down into about four do’s today. I’ll do four do’s tomorrow, four do’s on Monday and then we’ll end up with the don’ts. It’s kind of the 12 days of Christmas, we got to get some things in.
When you look at this here, when you download this here you’re going to see the first one. It says to use two-factor authentication. If you don’t know what it is then you absolutely need it. If you click there I’m going to take you to a page that explains two-factor authentication to you. What is two-factor authentication? Actually, there are two parts to this. There’s two-factor authentication. There’s two-step verification. They both are designed to accomplish the same thing, which means you can’t just use a username and a password, there has to be the third piece in there to allow you to log into something. For example, everything I do is off of Google. All of my accounts are Google, not just Gmail, that’s at Gmail.com, but my MorganWright.us, my IndentitySecurity.com, some other things that I have all use Google.
Why do I do that? Because I enforce on all of those and if I have team members, I enforce this. You have to have a username, a password, you also have to have what’s called two-factor authentication. It’s a thing called authenticator on there. I know this is backward, here, but this is the way it looks like. It tells you what account do you want to log into, so I have to put a username and a password and see this number right here? I have to input that six digit code. It’s only good for 30 seconds. After 30 seconds it goes away, it recycles and then you have to start this process all over again. If you have an account that supports two-factor authentication, you absolutely need to be using it.
I go into more detail in the document. When you download your 2017 guide to Identity Security. I do the 12 do’s and don’ts as kinda cheat sheets right up front and then I go into more detail there. I have links to more resources and I’m actually putting together an academy right now that’s going to be a very intensive, maybe six to eight module academy where I mean, I go into detail. This is not the bad kinda detail. You do not have to be a computer scientist to understand this.
All you have to be is you have to be somebody who knows how to turn on a computer, knows how to click a mouse, knows how to type in a username and a password. If you’ve got a smartphone, which I think most everybody does, I’m going to give you all the tools you need right now to crush hackers, scammers, and thieves.
Number 2…Not That One
The second one, remember we talked about the second one. There’s four do’s we’re going to talk about today. Update your security software and operating system. It’s kind of like when you run out of gas because you don’t put gas in the tank, men. I do that time. Actually, I’m proud of this. I have several pictures of my expedition when it says 0 miles to empty. Well look, folks, you can’t do that. There’s a reason they put out updates to your operating system. Some of these are because of what they call zero-day exploits. Zero-day exploits mean that nobody knows about them. That means only one person has discovered this and it’s a vulnerability, it’s a flaw in something.
I just found out about this today, in fact. I just downloaded and updated the latest version of Skype for Mac. Why? Because I found out today about a five-year-old, five-year-old back door that was in Skype for Mac. Are you kidding me? You guys couldn’t figure this out after five years? But again, so they figured this out, now I had to update it. If you have Windows, if you have Mac, if you have anything else … I’m giving something back from some folks like Bill Guyther and stuff, says it’s kind of intermittent. Hopefully, it won’t come out that way, maybe it’s just your connection.
I’ve got strong Wifi signal here. I’ve got fiber to the home. Just suck it up, buttercup. You’ll be good, Bill. Anyway, make sure that you update your security operating. That means your phones, that means your tablets, that means your desktop, whatever it is you just want to be protected against the latest vulnerabilities.
The third thing is, remember that song Put a Ring on it? Well folks, put a PIN on it. Put a PIN or a passcode on all of your devices. Would you tape your house key to the front door, like I say here, and go on vacation? I think not. On your smart devices, on your phones, on your other things you have the chance to either put in a passphrase, a passcode or a PIN number. That’s again, that third layer of protection. That means if somebody got your phone they’d have to figure out your PIN number.
The one key thing on that, too, is to make sure that if you have the availability, Android and IOS do this as well, make sure that after a certain number of attempts, and with IOS it’s ten attempts, with Apple it’s ten attempts, that it wipes your phone. Just wipes it, turns it into a brick. True story, happened to me in Malaysia.
My Travel Story
I was doing some traveling internationally. I was actually going over there to work with the Malaysian police. I’m in the airport, been a long day traveling. I actually had my phone here. Was trying to pull up my itinerary, I literally just set it down on the counter just like this. I reach down to get my itinerary to find out where it is I needed to go, I reached back up my phone was gone. There’s a whole story that goes behind this that’s in my book, Identity Predators, I’ll tell you about it at the need, but I tracked it because I was able to track it through Find My Phone, one of the features. Guess what I did? I didn’t wait for them to log on.
I sent a command to it, wiped it and turned it into a brick. Then I ran around the rest of the trip holding up an iPad to my ear on Skype trying to talk, but again, that’s not the point. The point it I should have been more aware. Even though they got ahold of it, I had a PIN on it, I enforced it, I sent several times, I said, “Look, I’ll pay you $500, just get me my phone back.” They still didn’t do it so I wiped the phone, turned it into a brick. Make sure you put a PIN on it. Make sure you put a passcode on it. If you’ve got the new iPhones and some of the Android phones support this too, use the touch ID. That’s a great way too because now it’s biometric so you use that.
The fourth thing we’re going to talk about today and then we’re going to end up there. The fourth thing is to encrypt your home wireless network and turn on personal firewalls. You don’t want the wiz kid from next door creeping on you. That means no matter what you have, you’re going to have to do a little bit of use Mr. Google, go out there and find out how do I encrypt my home wireless network. It’s called WPA, Wifi Protected Access, that’s kind of the standard one right now.
What it does, it makes sure that between your device and your access point, if this is your access point, which is my water, and this is the device, between here and here it’s encrypted which means hopefully it’s protected. We’ll talk about VPNs later. There’s a difference between just encrypting your network and using a VPN, which is a Virtual Private Network. What you’re going to want to do is make sure that your Wifi access point in your home is encrypted. Even if you have guests come over some of these have guest networks to where you can keep them on a separate portion of that and make sure that they don’t get into your home network.
Just One More Thing
The other thing, too, is many of your devices, whether it’s Windows or Mac have what they call personal firewalls. That means you can actually turn on things on your Mac or on your Windows machine or even on your router where it kind of blocks some of these bad connections, these nefarious little connections where they’re trying to come in and they scan millions of devices that they’re looking for vulnerabilities. In fact, if you have a Netgear router, you may want to think about updating or getting rid of it. Two of them have such gaping holes in these things. They actually drove Mac trucks through them without even skimming the sides of the truck through a small little router like that. You need to get this stuff out there.
That’s All For Now
Remember, those are the first four things today. Use two-factor authentication. If you don’t know what it is then you need it. Update your security software. It’s just like running out of gas, you don’t want to do that. Put a PIN on it. Put a passcode on it. Whatever you do, make sure that there’s a third way to have to get into your devices. The fourth thing today, encrypt your home wireless network and turn on personal firewalls. That’s the first four today.
Tomorrow I’ll go over the next four if I have time. I’m in a meeting all day long so if I do it tomorrow or I may get to it on Monday. In any event, we’re going to do the 12 do’s, the 12 don’ts. Now, here’s the fun part too folks. If you go here, here’s IdentitySecurity.com, here’s this, if you go here and you register the other thing I’m going to do is put you on a list. You may actually be able to get my book for free when it comes out. It’s called Identity Predators, win the war against hackers, scammers, and thieves.
Go Crush It
Folks, this is how to crush them, so go here. Go here. IdentitySecurity.com/guide. Get your good stuff. I’ll put this out to everybody on Facebook. It will auto post to my blog at IdentitySecurity.com. I will transcribe this and have it posted up as a transcript so you can hear the brilliant and insightful commentary that goes with this. Yes, you can tell I’ve been broadcast trained. Actually, I just had to turn down Fox. I was supposed to be on Fox tomorrow but I’m in a meeting all day long around the Russian hacking.
Folks, here a hack, there a hack, everywhere a hack hack. It’s not about Rs and Ds this election, it was about ones and zeros. That’s what define it. The lack of cyber security, a billion accounts breached at Yahoo. Five-year-old backdoor in Skype, folks. You got to start taking control of your own privacy and security and there’s only one way to do that. That’s to become an identity security warrior. Join warrior nation, join me. Go here, find me here, MorganWright.us, IdentitySecurity.com, and @morganwright_us. This is designed for small businesses, families. I’m going to give you the tools, techniques, tactics that you need to crush hackers, scammers, and thieves. Until next time, folks, shields up, stay safe.