Cybersecurity, We have to change, NOW!

Starting to feel like a broken record

Cybersecurity frustration, we have to change NOW

But, why do we have to change our attitude to cybersecurity?

“Kicking soap box along”

Sick of hearing and seeing the headlines?   Well you should be!

People do not believe that the cyber realm is a problem.

 The cyber world is here.  All around us!

And it is here to stay until its replacement comes around.

The realisation that our attitude to the cyber world has to change is our first step to understanding that we have an issue.

The digital world has made it easier for any organisation, especially small and medium business to enter any market.   They use the digital world to manage, manipulate and control data, to do business, to make a living.

The issue is our primary investment in the digital world is only thought about as a way to make money.

We make a minimal investment in security.   That minimal investment is seen at the personal and corporate level as well as the techological level from the manufacturers.

Hardware designers and software developers, in most cases, think in terms of time to market.

 This attitude is our downfall.   This attitude is our Achilles.

Until we make significant investment in protection, at the corporate, at the business, at the personal, more importantly, at the technological level, we will continue to be exposed to severe losses.

The last 20 years have shown that we know how to use a computer but we have limited understanding of what is really happening behind the screen.

We have demonstrably proof that a good hacker will not be seen when hacking a computer or a smart device like a phone or table.

They do not pop up on screens, they do not slow down the system, they have little impact on the underlying capability of the systems.

You maybe lucky enough to perceive a change or see something occur but for most, they are practically invisible in the real world.   If and when they get in they can decimate any system.

We are knee deep in technologically savvy humans, who understand how to use an application but fail to see or understand how the information is going from the app they are using to that nefarious place in the internet.

Don’t get me wrong, we all love the shiny new “insert technology here”, including me.   Very few of us take the time to actually look at what that app is doing.

What information is it recording, where is it stored and more importantly who has access to it.

We are already seeing the implementation of AI (artificial intelligence) and thinking it will be the be all and end all of security in the digital world.   Governments, scholars and enterprise are hedging their bets with AI or machine learning.

The true bad guys, the ones from nation states and cybercriminal organisations, are developing their own AI.

 AI v’s AI, what a way to go.   Hacking at the speed of light with humanity as the prize!

I find it fascinating that writers from the 70’s, like Stirling and Gibson, foresaw these issues, and many like them.   They were seen as far fetched.

In the light of today, how far fetched were they really.

We are starting to realise, some of marvels we have created, will have a detrimental effect on all man kind.

Do a quick google search for this (AI weaponized drone) and look at the first result.   Make sure little Johnny is not sitting next to you when you do it.

Is that where we are heading?

I don’t have the answers, and to tell you the truth, some of the questions are scary but need to be asked.

We do need to find some answers and soon.

Cybercrime is rampant but people just do not see it, why?

With the newest prediction that cybercrime will net $5 trillion (that’s $5,000,000,000,000.00) PA in 2021, most people still cannot see we have a problem.

To most people, cybercrime is not a problem.

I have been called a scare monger, these stats show that no level of scaremongering is going to resolve the problem or show it for what it is.

A frigging big problem!

To some, These are just statistics that can be manipulated wher

 

e needed.

Hopefully it is a wake up call!

Our attitudes have to change when it comes to digital systems.

When it comes to cybercrime!

When it comes to personal and business security in the digital world!

We are no longer allowed to say we have nothing worth stealing.

Everyone, everyone that has or uses a digital device – yes you reading this article everyone – is a target of digital crime.

To the digital criminal any information is important.

Any information combined with other information becomes more important information!

The more information they have the easier it is for them to get more information.

That information can them be used in so many different ways!

Business have to stop saying we are too small to be a target, it will never happen to me and the cyber criminal is stupid.

How can a bored 14 year old know more about the digital world than me.

Most of them do know more about our systems than the users.

Users see what is on the screen and what is typed by keyboard and clicking of the mouse.

Very few people understand what happens under the hood.

They do not start out as criminals, but they have five things going for them.

They are hacking to learn.

Learning about systems, vulnerabilities and more importantly,  learning about the digital world.

They learn how it all works.

Already they are ahead of 95% of standard users.

Time is on their side.

Time to find out how to hack.

I have seen someone spend 24 hours straight getting a system to work.

The payoff is the knowledge.

They use that knowledge and information to get more and more knowledge and information.

To hone their craft.

They talk.

They communicate with each other through skype, chat rooms and other online forums.

“I have got this far, what am i doing wrong to get it to work properly” is a question we see regularly.

This question and many like it will get hundreds if not thousands of responses.

They want to learn

Some because it is there, some to be famous, some just to know they can do it.

Of the hundreds of millions of wanna be hackers there are just as many reasons to do it.

There is no single reason.

The internet allows them to do that.

They have the passion

They have the drive, they have the understanding and they are developing their knowledge.

This alone makes them dangerous.

I highlight the lack of understanding in my lectures.

“I didn’t know they could do that!” is usually the response i get, followed by “it’s that easy?”

Yes they can do that and yes it is that easy.

To protect ourselves we need to educate ourselves.

We have to become paranoid.

We have to use common sense.

We have to increase awareness, awareness that the bad guys are out there and we are the targets.

Roger Smith is funny, scary, on point and is focused on one thing – increasing everyone’s awareness and understanding of the problems and issues associated with the digital world.
He was Runner up in the 2017 worldwide Cybersecurity Educator of the Year award and has been nominated for the 2018 Cybersecurity Educator of the Year award.  
He is a highly respected expert in the fields of cybercrime and business security and is a Lecturer at ADFA (UNSW – Australian Centre of Cybersecurity) on Cybercime, Cybersecurity and the hacking techniques used by the digital criminal.   
He is an Amazon #1 selling author on Cybercrime with his best selling book, Cybercrime a clear and present danger, going to number one on Amazon.   
He is the primary presenter for the Business Security Intensive (BSI) and author of the Digital Security Toolbox which is given away for free at the BSI.   He is a speaker, author, teacher and educator on Cybercrime and an expert on how to protect yourself, your staff, your clients and your intellectual property from the digital world.

Business Continuity – DNS is very important

Business Continuity in today’s world is all about keeping a business on line and is critical.

We, as an organisation, have been absolutely crippled by another companies incompetence when it comes to DNS, so business continuity was all important.

  • Our email and DNS was, up till 2 months ago, managed by Uber Global.
  • They were purchased by MelbourneIT who wanted to bring them and other purchased oprganisations into their primary system. (Including DNS)
  • The worst migration I have seen and worst of all we were caught in the middle of it.
  • Moving the system to Office 365 is normally not that difficult but we have been off line for close to 40 days.
  • We could not move the DNS zone file, we had no access to the mailboxes except through POP3 and IMap and some mail boxes worked and some did not.
  • I was then told by their senior Support manager that a record inside the zone file was talking to another zone file and I had to change the record in that zone file.
  • This was when I initiated action through my legal people and sent a request to the Australian Telecommunications Ombudsman.

Therefore business continuity is an important part of your business requirements.

When something happens you need to know that your eCommerce website will continue to work, your email will be received and delivered, your staff can access information when and where they need to.

SME’s and not for profit organisations are notorious for using the cheapest available systems.

Getting website built and having them hosted on small independent hosting services is common place.

This can have substantial impact on your organisation, not just in the cost area.

This is why we always use large organisations to manage our clients DNS, not including MelbourneIT.

But they are the most expensive, you may say!

They are more expensive for a number of very important reasons, the most important being 24/7 or 12/7 support.   Being able to email or call when you have a problem or need to make a change with your account is very important.

Other important components are knowing that their infrastructure is sound and secure and having a guaranteed up time / on line component through a Service Level Agreement (SLA).

Why DNS is so important

DNS (Domain Name Service) is one of the most important parts of the digital world.

If it stops everything else stops.

And I mean STOPS!

Those transactions that produce revenue will not happen!   That important email from a client will not be delivered!

When it stops, or your Internet connection fails or something else happens in the digital world then you need to be able to make a change ASAP then you need to know that your business continuity will kick in.

There is nothing worse than having your redundant link kick in and still nothing works.

As a business you need to ask these questions

  • Is their system and your account subject to a service level agreement?
  • Do they have agreed uptime?
  • If I want to do it myself is there “how to’s” on their portal?
  • Does the portal show all components of the DNS not just what they think is important?
  • Is their technical support available 24/7 or at a minimum 12/7?
  • Is it free or do I have to pay for it as needed?
  • Are they contactable by both email and phone with response times?

If you are an ICT service Provider you need to make sure that the DNS, the one that has been set up by the nominated person within the organisation, is correct and stable.   You need to check that you can make changes to it as needed.   If not then you need to change it to somewhere you can.

If you are that nominated person then you need to make sure that you understand the implications of the DNS failing, an IP address change or any of the myriad things that can impact the Digital World.

Just one other thing, if you are putting up a new website and the designer and web hosts asks you to change the DNS to their system “because it is easier” make sure they know what they are doing.   If not, things like email, smart devices and other important components of the business could stop working.   Website is great but the rest of the business based systems are just as important.

The digital world is 24/7 and the DNS component is critical to make it all work.    Make sure that at 1 AM on a Sunday morning that you have someone to talk to when all else has failed

If this article has made you think and look at the other parts of your business continuity then I have done my job!

Roger Smith is funny, scary, on point and is focused on one thing – increasing everyone’s awareness and understanding of the problems and issues associated with the digital world.
He was Runner up in the 2017 worldwide Cybersecurity Educator of the Year award and has been nominated for the 2018 Cybersecurity Educator of the Year award.  
He is a highly respected expert in the fields of cybercrime and business security and is a Lecturer at ADFA (UNSW – Australian Centre of Cybersecurity) on Cybercime, Cybersecurity and the hacking techniques used by the digital criminal.   
He is an Amazon #1 selling author on Cybercrime with his best selling book, Cybercrime a clear and present danger, going to number one on Amazon.   
He is the primary presenter for the Business Security Intensive (BSI) and author of the Digital Security Toolbox which is given away for free at the BSI.   He is a speaker, author, teacher and educator on Cybercrime and an expert on how to protect yourself, your staff, your clients and your intellectual property from the digital world.

Cybersecurity needs a new perspective, because the old ways are not working.

Cybersecurity, we are constantly reminded how effective the cyber criminal is.   

If not directly, everyone who is looking at the problem can see that the digital criminal is stealing everything.

Intellectual property, our access to money, access to technology, even right down to locking us out of our own information unless we pay the ransom.

This is the face of crime in today’s world.

It is faceless, persistent and very rewarding at the criminal level.

We are constantly told by multi nationals, government departments and politicians that we need to invest heavily in technology.

Throw new and more expensive technology at the problem and finally / eventually the problem will go away.

How is that working for you?

From my understanding – not very well!

We constantly see headlines on the internet or off line.

This organisation has been compromised and lost millions of credit card details, intellectual property and / or personal identification information (PII).   Every compromised system can be tracked down to simple and stupid mistakes.

In the fight against cybercrime, there are 3 inexpensive things that every organisation can do to fight the overriding situation.

All of them have been discussed, all of them have been tried and all of them, according to the high end masters, have failed.

That’s where we differ.   In most cases they haven’t been done right.

Education and Cybersecurity

  • We have to focus on the user.   The staff member in reception, the travelling sales guy on the road or the boomer in the board room.   They all need to have the understanding that they are targets.  The uneducated, illinformed and ignorant are the primary targets of the cyber criminal.    We have to lift the bar!
  • To make the digital world safer for the users, everyone has to understand that it is a dangerous place.   Maybe the headline to this section should be “ongoing education”.
  • The most important part of education is regularly refreshing the information about cybercrime.   Most organisations have a single cybersecurity induction process.  A single course on what you are allowed or not allowed to do with the resources of the company.  Do it once when you join and if you are there for 10 years you never have to revisit it.   This is not enough.
  • Education should be ongoing.   It should include posters around the office, a regular quiz on what is good and bad business security, regular courses, from the original onboarding / introduction through to a regular quarterly sit down for 30 minutes.   This also needs to be augmented with webinars, seminars and on line courses.
  • Your people should be sprouting about security to their family and friends.   Telling the world what they know about cyber criminals and their targets and how your organisation is protecting that information.
  • Digital security has to be front of mind if you want to protect your organisation.   It has to be second nature!

Communication and Cybersecurity

  • Both internal and external communication is absolutely critical to keeping your organisation secure.
  • Internal communication comes from the top down but input should be encouraged from every level.   Everyone’s should be looking at and talking about business security.   It should be discussed at the board level as well as morning tea.
  • External communication should also be encouraged.   Getting involved in message boards and chat sites is a start.   Incognito, like the bad guys, is OK.
  • Getting involved with similar organisations and regularly discussing problems and solutions that have worked or not.   All of this information can be applied to your organisation.
  • The digital criminal are constantly communicating – what worked, what didn’t work, how did it get changed to make it work are all important information for the digital criminal.   We need to have that level of communication in all organisations.

Penetration testing and Cybersecurity

  • This is another critical component of digital security.   When done correctly, it highlights lapses in concentration, incorrect configurations, unprotected systems and more importantly any other way for the bad guy to infiltrate your environment.
  • Penetration testing is also a way to verify your investment.   To make sure that it is going to do the things that it was purchased to do and show that there is no set and forget security in today’s world.
  • Penetration testing is not a man hunt, looking for a scape goat or looking for someone to blame.   In the digital world no single person can know it all, a pen test is finding those areas where you have made mistakes and fixing them before the bad guys discover the same mistake and exploit it to access your business.
  • To do a penetration test, the team should have no restrictions, because the bad guys will have no restrictions.   The bad guys will not worry about bringing down your web site, compromising your data server or hacking your email system – that is the way a penetration test should be run.   Prudence is the key, but to make your organisation as secure as possible it has to be done.   It is better to be compromised by someone paid to do it rather that someone who is out to make a quid on your mistake.   It is better to be compromised and have something fail than have it compromised by a bad guy and being under the pump, with financial and time restrictions, to fix it.
  • Every facet of the criminal should be used to make sure the organisation is secure.   From targeting the technology, through to targeting the users and social engineering.   Any and all tactics should be employed to prove your organsiation is secure.

We are constantly told by the high tech masters that by throwing more technology at the problem of cybercrime, we will fix it.   We have seen time after time that this is not the case.

Cybersecurity is a multi faceted process, may i even say holistic.

Every component is needed to make the business environment secure.   Education, communication and pen testing are up there with second generation firewalls, patching and application white listing.

The part that is most interesting is that all three are the human side of digital security.   They are constantly put down as a protective strategy by the technology gods we pray to.

A $15,000 investment in education, communication and penetration testing can have outstanding ROI for any organistion.

Want more information about how you can protect your organisation then please contact me on roger@rogersmith.com.au

Roger Smith is funny, scary, on point and is focused on one thing – increasing everyone’s awareness and understanding of the problems and issues associated with the digital world.
He was Runner up in the 2017 worldwide Cybersecurity Educator of the Year award and has been nominated for the 2018 Cybersecurity Educator of the Year award.  
He is a highly respected expert in the fields of cybercrime and business security and is a Lecturer at ADFA (UNSW – Australian Centre of Cybersecurity) on Cybercime, Cybersecurity and the hacking techniques used by the digital criminal.   
He is an Amazon #1 selling author on Cybercrime with his best selling book, Cybercrime a clear and present danger, going to number one on Amazon.   
He is the primary presenter for the Business Security Intensive (BSI) and author of the Digital Security Toolbox which is given away for free at the BSI.   He is a speaker, author, teacher and educator on Cybercrime and an expert on how to protect yourself, your staff, your clients and your intellectual property from the digital world.

Why social media makes you vulnerable to digital crime

Have you got thousands of followers (friends) on LinkedIn, Facebook, Twitter?

What level of trust do you apply to those “friends”?
When it comes to social media, we all seem to have a blind spot.   An acceptance, of that digital contact that we would not normally apply to the real world.
At most, we rely on the name of the person, a photo and maybe a recommendation from another friend.  Other times it’s just “accept”.   We have all done it!
Maybe it’s because it’s – new.
Being new (read shiny) we are in a hurry to build up our profile.
Build up our numbers!
Add new followers and follow others.
We have been told, by the social media platforms, that we need to use them for our business, our organisation, our sales, our marketing, even to find old friends and acquaintances.
Those people can help me, or better still I can help them.
But,
All of those people that are on your social media feeds.
Do you truly know them?
Are they who they say they are?
How many have you actually met face to face?
That is a problem with social media.   Once inside your network those “friends” have access to everything that you make available to them.
Like us, the digital criminal uses Facebook, Twitter and LinkedIn.   They have a more sinister use for social media.   Any social media!
They use it for social engineering, for finding out who you are, where you work, where you live, the make up of your family, who you know.   In other words – What makes you tick!
You see to them, social media is just another way to infiltrate their target market.
YOU
Roger Smith is funny, scary, on point and is focused on one thing – increasing everyone’s awareness and understanding of the problems and issues associated with the digital world.
He was Runner up in the 2017 worldwide Cybersecurity Educator of the Year award and has been nominated for the 2018 Cybersecurity Educator of the Year award.  
He is a highly respected expert in the fields of cybercrime and business security and is a Lecturer at ADFA (UNSW – Australian Centre of Cybersecurity) on Cybercime, Cybersecurity and the hacking techniques used by the digital criminal.   
He is an Amazon #1 selling author on Cybercrime with his best selling book, Cybercrime a clear and present danger, going to number one on Amazon.   
He is the primary presenter for the Business Security Intensive (BSI) and author of the Digital Security Toolbox which is given away for free at the BSI.   He is a speaker, author, teacher and educator on Cybercrime and an expert on how to protect yourself, your staff, your clients and your intellectual property from the digital world.

How to make your organisation less hackable

I have an infographic of the 200 larger hacks from 2015.   It is quite an eye opener.

 I will show it to you in the webinar.
We are so focused on throwing technology and more technology at the problem of digital crime that we keep forgetting the other side of the equation.
The problem is that you cannot throw all of the available technology at the problem, you do not have the money, expertise or will power to deploy them all.
The reason,  the range of technology is bafflingly wide.
For instance:
  • “threat intelligence” (seeing who is planning to attack your organisation.);
  • “end-point protection” (making sure all end points are protected, computers, tablets, phone);
  • “penetration testing” (testing your defenses the same way a hacker does);
  • “identity assurance” (are the right people accessing your data);
  • “incident response” (did they get in, how much damage was done and can we stop it from happening again); and
  • “anomaly detection” (has someone moved the data around your system or got it out);
My response is training, education, increased awareness, paranoia and common sense.
Stopping your staff from making that silly mistake that endanger themselves as well as your organisation.
But like most things in the digital world,  it is not a one shot solution.   It involves increasing digital awareness and keeping that awareness at a higher level that what most Organisations consider appropriate.
In the digital world, there is no hack proof operating systems, there is no uncompromised applications, there is no longer “no set and forget security”.
All technologies have some level of vulnerability.
In other words they can be hacked!
We are all human, we use the digital world because it is easy, convenient and gives us some edge over our competition.   We forget that what we see of the digital world and our technology is only a small percentage of their capability, less than 10% actually.
There are many facets to digital security, this is one that will be of interest to you
February 4 2016 – 1130 – 1230 How to make your organisation less hackable
Register here.  http://gowoa.me/i/qjTK
Don’t want to go through the hassle of registering, this will also be available presentation will also be available as a google hangout and periscope.
Roger Smith is funny, scary, on point and is focused on one thing – increasing everyone’s awareness and understanding of the problems and issues associated with the digital world.
He was Runner up in the 2017 worldwide Cybersecurity Educator of the Year award and has been nominated for the 2018 Cybersecurity Educator of the Year award.  
He is a highly respected expert in the fields of cybercrime and business security and is a Lecturer at ADFA (UNSW – Australian Centre of Cybersecurity) on Cybercime, Cybersecurity and the hacking techniques used by the digital criminal.   
He is an Amazon #1 selling author on Cybercrime with his best selling book, Cybercrime a clear and present danger, going to number one on Amazon.   
He is the primary presenter for the Business Security Intensive (BSI) and author of the Digital Security Toolbox which is given away for free at the BSI.   He is a speaker, author, teacher and educator on Cybercrime and an expert on how to protect yourself, your staff, your clients and your intellectual property from the digital world.

How to validate your business continuity plan

The chances of having a digital security accident are directly proportional to the amount of time and effort you put into making sure that it does not happen.
In business, it is said that if you have a plan “B” then you are not concentrating on business at 100%.
When it comes to the digital world everyone needs a plan B!
The digital world is a totally different animal, we have to rely on technology to reach it and we need our wits about us while we are there.
Making sure that you, as well as your organisation, are safe and secure, is not plan B, it is today’s business 101.
A simple power failure can stop your business!
A fire next door to your office can stop business!
A failure of the Internet can stop business!
A total failure of your primary business system can stop business!
How much of it is your fault?
Probably NONE!
You cannot control access to the power grid, or emergency services stopping you going to work, or your ISP going into administration.
That is why business continuity is not plan B, it is insurance.
It is insurance to ensure that your business will continue, because you have thought of all possibilities that will stop business.
You have done a risk analysis on your business and mitigated those risks.
But!
Have you thought of them all, and of the ones you have thought of, have you tested them.
Validating your business continuity is vital to your Organisations health.
January 27 2016 – Lunch and Learn – 1200 – 1230 – How to validate your business continuity plan
Register here.   http://gowoa.me/i/mY2G
Don’t want to go through the hassle of registering, this will also be available presentation will also be available as a google hangout and periscope.
Roger Smith is the CEO of R & I ICT Consulting Services, Amazon #1 selling author on Cybercrime, author of the Digital Security Toolbox and author of the SME Digital Security Framework.   Rapid Restart Appliance Creator.   He is a Speaker, Author, Teacher and Educator on cybercrime and how to protect yourself from the digital world. 

Why we are targets of cybercrime and what to do to stop it

I wish I had a dollar for every time I have heard “we are not a target of digital crime”.  I would have a couple of dollars by now.
This mind set, this lackadaisical attitude that we are not going to be a victim of digital crime is alarming.
Get infected with spyware, malware, a browser hijack or any type of virus and you have become a victim.   In most cases we think that it is not important.   It’s just a VIRUS!
To the digital criminal we are a gold mine, that is in the literal sense.
You have money they want it!
You have intellectual property – our personal identification information (PII) – they want it!
You have your technology, they want that as well!
Anything that makes us, US, in the digital world, they want.
In the real world we take precautions.
We exercise caution in dark alleys.
We do not get in strangers cars.
We keep our pin separate from our credit and debit cards
We lock our windows and doors
We arm and alarm our homes and offices
10,000 years has told us that anyone can take anything from us if they want to.
In the 30 years of the digital world – everything has changed.
In the digital world we take everything at face value.
“You sent me a link in an email, I will open it”
I will use a simple password so that I can remember it.
I will not protect myself, it is some else’s job
Do you now understand why this On Demand Webinar is important.
Thursday January 15 2016, 1130 – 1230 Canberra time.   Come and learn what the bad guys are doing.
Register here.   http://gowoa.me/i/z3M
Don’t want to go through the hassle of registering, this will also be available presentation will also be available as a google hangout and periscope.
Roger Smith is the CEO of R & I ICT Consulting Services, Amazon #1 selling author on Cybercrime, author of the Digital Security Toolbox and author of the SME Digital Security Framework.   Rapid Restart Appliance Creator.   He is a Speaker, Author, Teacher and Educator on cybercrime and how to protect yourself from the digital world. 

How much of a Digital Security hack is your fault?

We all know the bad guys are out there!

Stealing our money, our intellectual property, our technology!

They use our social media information, our personal information, our mistakes against us.

We see it every day.

it’s just a part of the mind numbing bombardment of information that we receive every minute, every hour, every day from the digital world.

Because of the overwhelm of this information we have two alternatives, we ignore it or we have sleepless nights!

Most Pay it little notice in our everyday that is life.

Our attitude, our “she’ll be right” approach, our “it won’t happen to me” mindset are all hurting our ability to stay safe in the digital world.

This philosophy is hurting our defenses. It is making us an easier target of the digital criminal than we should be.

What would you rather do?

React to a hack!

Spend time and money repairing the damage.

Tell your clients, your friends it happened!

Fill in the government or industry forms and hope the fines are not going to cripple the organisation!

Or the alternative,

But What is the alternative?

become proactive!

Think about what the digital criminal may do and make it harder for them.

Put some defenses in place, some defensive strategies,

What are you going to do about it?

Well this lunch and learn on demand webinar may help.

Information about the fundamentals of digital protection.

What you can do as a proactive strategy against the persistence of the digital criminal.

January 12 2016 – 1200 – 1230 – Lunch and Learn – How much of a hack is your fault http://gowoa.me/i/9Dyx

Don’t want to go through the hassle of registering, this lunch and learn on how much of a hack is your fault will also be available as a google hangout and periscope.

Roger Smith is the CEO of R & I ICT Consulting Services, Amazon #1 selling author on Cybercrime, author of the Digital Security Toolbox and author of the SME Digital Security Framework.   Rapid Restart Appliance Creator.   He is a Speaker, Author, Teacher and Educator on cybercrime and how to protect yourself from the digital world.