
We’re in celebratory mood as we celebrate our 200th episode, but there’s still time to discuss Fatima the ballerina who the UK government wants to become a cybersecurity expert, why women are quitting the tech industry, and a smartwatch which might be putting your kids at risk.
Plus don’t miss our featured interview with Mimecast’s Michael Madon.
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Maria Varmazis.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
My name's Graham Cluley. Woo-hoo!
And for details, you would go to smashingsecurity.com/live. Be there, be square. Graham will be so embarrassed if there's only me. Yes.
And coming up on today's show: Graham grabs his ballerina slippers, Maria is going to look at women in tech, and I'm looking into smartwatches for kids and asking you, Maria and Graham, whether you would do this or not.
He is the Senior VP of Security Awareness, and previously— I know he won't me saying that— but he used to work at the U.S.
Treasury Department, and he was awarded the National Intelligence Distinguished Service Medal, and he won a Bronze Star.
Because did you see all the kerfuffle on the internet this week? A kerfuffle?
And the ad was basically saying, she should hang up her ballet shoes and pirouette her way into a new career. So there's a picture of this girl.
Rethink, reskill, and reboot. And it's all part of the Cyber First initiative run by the UK government.
She was, I think she was a ballerina.
And I—
So presumably they thought she would be better at running the UK's test and trace operation than a former horse jockey who used to be in charge of TalkTalk when that got hacked.
That's probably their thinking. But many a cybersecurity expert might have made the mistake originally of beginning and forging a career in the arts instead.
And it's saying to you, yeah, your job's rubbish. You're never going to make a career out of that. Come and be cyber instead.
Well, that's— How many ballerinas do you think have been told, "Oh, you know what? You're so amazing.
It's just that no one's actually coming in to see you, and it doesn't really look great on screen right now, and we don't have all that sorted out for digital ballet." So maybe what's happening is the government's kind of saying these are people that could get a secondary career whilst we deal with the pandemic, earn extra skills.
Yes, maybe?
UK Chancellor Rishi's point of view is that he has been sort of pronouncing upon the fact that many people who work in the arts at the moment might want to retrain.
Which did create quite a kerfuffle because other people are saying, well, it's almost a debasement of all the artistic jobs which are out there. And how would we feel if—
There's not— there's— I'm looking at the ad again. I want to— I'm looking at it now. Let me look. Okay.
And in the UK compared to the US certainly values the arts more. There's more funding from the public compared to the United States.
But here in the States especially, it's and right now during the pandemic, you can't make a living off of it very easily.
And a lot of artists are told you need to have a real job in addition to your art job to survive.
You know, which frankly is just pretending to be someone, isn't it? And doing a funny voice and not walking into the furniture.
And then you'll have dancers and you may have painters. But at the very top, at the very top, you have podcast co-hosts.
It says Fatima's next job could be in cyber, as though that is the most wonderful place to be. No, I don't agree with that.
Yeah, I mean, I know lots of freelance journalists, for example, who they say that they are freelance journalists but they have a day job to pay for that, and that sucks ass that that's happened.
Yeah, I think it's the arrogance of the "could be" in cyber, like even a ballerina could be that smart, you know. There's something about the "could" that maybe is a bit jarring.
Carpal tunnel goes so well with that pirouette.
This is an opportunity for you." Despite the fact you've worked your ass off for years and years and all you ever want to do.
Literally, Graham, because I bet her ass she could hold 5p between those cheeks.
Good Lord, I heard it from my dad growing up.
Because you need different, you need different brains to tackle all these different problems. It's basically a social problem. How are people attacking us?
And instead, they'd been diverted into cyber.
Because when I, as someone who grew up— excuse me, voice is cracking, this is how passionate I feel about this— somebody who grew up of the age of AOL chat rooms, when I hear your next job can be in cyber, my brain goes somewhere entirely different, especially when she just doesn't know it yet.
I'm like, oh, that sounds like a threat. So that's— so the language of this ad is actually what gets me a little bit— wow, my voice. This today. Amazing.
And so maybe my echo chamber is filled with the word cyber and I totally directly put it into cybersecurity. I'm drinking the Kool-Aid for 20 years now.
government uses cyber a lot and then the private sector in the U.S. hates it. And there's that whole thing there. And I personally always cringe when I hear cyber, 'cause I go, ugh.
Do you?
And these were the same people who were defending Fatima or whatever and say, oh, she should stay as a ballet dancer. But they're saying, oh, she shouldn't have used the word cyber.
It's a fricking ad.
Cyberspace, cyber warfare, Cybermen. You have to be a Doctor Who fan for that one. Yeah, okay. Cyberbullying, cybersex.
But I didn't dare put down security because I thought that'd give it away.
But a bit clumsy. The amount of whinging. I agree with you. It was just like, "Oh, this is terrible." And it's just like, well, yeah, it's not great, but we don't all have to moan.
And then they start complaining about the word cyber.
Okay, so you're saying Fatima's next job could be in cybersex with brackets.
I know I'm not the only one.
Who's still in the '90s, who's thinking of cybersex. That's right.
That's not that kind of podcast. The tweet that we were tagged in was this: Fact of the day, 50% of women who take a tech role drop it by the age of 35. Oh, okay.
And the source of this data was a study by Accenture that came out this year. So Accenture is a big consultancy firm. They do stuff like this.
Some people don't find these studies credible, whatever. I'm just going to take it at face value.
Yeah, they did a huge study called Resetting Tech Culture: 5 Strategies to Keep Women in Tech, because it is a notorious problem in the industry about the pipeline and why do women leave and all this stuff.
And can I ask, Maria, why did you leave tech?
Are we talking about only women who code, or are we talking about women who work in the tech industry in general regardless of the role?
I mean, it's a topic near and dear to me because I went to school for computer science and I was an earlier version of the pipeline problem where halfway through engineering school I changed to a completely different major.
So, yeah, okay, so it's all this stuff is perception, right?
But I know many women who are software engineers. So the stat of 50% of them leaving by 35 roughly tracks with my anecdote.
Because if we put forward oh, we've got a solution to this problem, I would be a bazillionaire and I would just retire right now because I'd be all set.
I echo a comment that somebody made in the Twitter thread, what's the stat for men? The reasons that people leave are very different.
But I wouldn't be surprised if it's not terribly dissimilar for men. By a certain age, some people just go, I can't deal with this anymore and I'm leaving.
If you don't consider this tech and running a tech company and working with tech firms all the time. But my reason for leaving was your staff, people who were working for you.
I just think when I did the climb, I had a number of wins, but I also got kicked back in a way that I found quite hard. And by the end of it, I just couldn't take it anymore.
It made me sick to my stomach to even support it.
You talk to other people who work in other industries and you go, you know what, they are fulfilled with what they're doing and they're not going through half the crap that I'm going through.
So why am I putting up with this? And that kind of sticks with you.
And again, it really does, Carole, as you say, just a huge setback where you go, it's really hard to bounce back from it. You just go, I don't know why I'm putting up with this.
That's basically what I think corporations are to the artistic mind.
They've gotten better at, since I was in college, helping to nurture an environment where women who want to code or work in the tech industry feel like they can be themselves.
And I know in my conversations with other women who have left, some of them are engineers, some of them just in the tech industry like me, it's when you get to the corporate world, then that's when you have to really start conforming to what they think a woman corporate needs to act and behave like and look like.
And especially techie men generally have been given a pass. You can kind of be like the crusty old guy in the corner who doesn't shower very often. I will say that is changing a lot.
People are sort of willing to put up with like genius techie guy being who he is and give him a lot of space.
But if you're a woman, you got to fit this very narrow sense of what a woman in corporate life has to be. And that's just not what a lot of us sign up for.
Like, not all parents, but a number of parents, you know, what are they— what's the word— helicopter parents. Yeah.
And I think I saw a lot of that with some of the people I knew, and I used to think, oh God, just let them be.
But now today I'm like, whoa, if I had a kid right now in this situation, I'd be wanting to keep serious tabs on them, right?
Like, just know where you are, who you're hanging out with, what are you doing, are they infected? I don't know, just everything. Now, you guys are both parents.
Do you feel different since 2020 happened and all the bullshit that came with it?
And also many can't because they're in homes where the parents are remote workers or stay-at-home parents and the kids are being homeschooled. All that time must be exhausting.
And so maybe if you wanted them a little out of sight, but you wanted to know kind of where they were and what they were doing, you might employ technology to help you out a little.
And today we're going to talk about one of these little pieces of technology and see what you think. Okay.
So it's called the X4 smartwatch designed by Norway-based company called— I can't remember the name— Xplora. Xplore with an X, no E-X. Oh, really?
Obviously any product which contains the word smart in its name is gonna start alarm bells ringing, isn't it?
On their official website, the Xplora watch piece of kit on sale for right now £159 instead of the retail £179. So there's a sale.
They say the most advanced children's smartwatch to date. So you can swim, phone, capture great photos, and interact with recognized entertainment brands.
So as parents, you guys are— I'm guessing at this point you're going, yeah, yeah, not for me. Thanks though.
I mean, my son is sort of talking about wanting to wear a watch and things, and I'm trying to work out what I should get him, but this feels overkill to me.
Well, it's got GPS, right?
They— you can have the messages come in, so there's SMSs they can send, and they can, you know, you can interact on the phone with them, go, where are you?
You should be home for dinner, and all that kind of stuff.
So this is— the idea behind this is that you can limit the functionality and that it's more ideal for a younger audience or an older, more elderly audience that might be bamboozled by all the tech.
We're offering localized speaking support to you." Teams in each of our markets to ensure a world-class experience. Okay, so put that little crazy kitten in your basket.
Okay, how many companies are up front, not just with complying with GDPR, but they're using it as their big sales pitch?
So maybe you're feeling a little bit okay, you know, and they're based in the EU, you know, they're in Norway, they're following— you know, their data is in the EU, they're following GDPR, and the portfolio of products is basically the, the wholesale pitch is this is an effective and safe way for you parents to stay connected to your children without giving them access to the internet at too young an age by a smartphone.
So that is the whole idea behind the X4 Xplora product.
And they get that parents are also increasingly nervous about tech and data snarling and all that kind of stuff and bad stuff, cyber stuff. So hand clap to them.
You know, this is good.
Okay, researchers at Mimonic, a security firm in Norway, decided to do a little digging into this kid-friendly GDPR-compliant easy peasy to use smartwatch that's great for kids.
Yeah, and what they found is inside the popular smartwatch designed exclusively for children, it contains an undocumented backdoor that makes it possible for somebody to remotely capture camera shots, wiretap voice calls, and track locations in real time.
Why?
So the researchers, Sand and Likness, used a modified USB cable, soldered it onto the pins exposed at the back of the watch, and using an interface for updating the device firmware, was able to download the existing firmware off the watch and allowed them to inspect the insides of the watch, including the apps and the various code packages that were installed.
So after doing more poking around, they said sending the SMS triggered a picture to be taken on the watch and was immediately uploaded to the Xplora server.
Okay, one of the researchers, Sand, wrote, there was zero indication on the watch the photo was taken. The screen remained off the entire time.
So I'm reading this going, oh my God, this is serious, right? Yeah. And then they have this line about how 19 of the pre-installed apps on the watch were developed by Qihoo 360.
This is a Chinese security company and app maker. Yeah. And one of the subsidiaries jointly designed the X4 with Xplora.
So basically, Qihoo are in bed with Xplora here on this one, and they manufacture all the watch's hardware. Ransware.
I was yakking to my husband, my smooth, super smart husband, about all this.
And Dan Goodin actually mentions this later down in his article. So anyway, there's loads and loads of information on how they actually did this.
Go see the links on the episode webpage. Okay, so you're thinking this watch now, you're thinking, oh, it doesn't sound so good, right?
You're thinking this sounds awful that this could happen.
So it turns out the research teams at Mimonic contacted Explora and said, "Hey, dudes, look what we found." And they issued a statement and they said, I'm gonna say it in short, but basically, "Thanks for telling us." And then they say, "Note, it would be really difficult to make use of this backdoor." So quote, "To make use of the functions, someone would need to know both the phone number assigned to the watch." It has a slot for a SIM card from a mobile phone carrier, right, that exists on the watch.
And they would also need to know the unique encryption key hardwired into each device. So then I'm like, oh, that's a different kettle of fish, isn't it? I don't know.
If you're after people who might have this particular device, then maybe you'd just run through a whole bunch of phone numbers to see which ones hit it or hit one of these devices.
It may not be that you're after a specific kid. You could just be after any kid.
Alright, hang on, why does it have the functionality that if you send a particularly crafted SMS, it will then take a photograph without the actual wearer being aware that it's happened?
There's a smartwatch that they're saying, "This is for kids." It had an undocumented backdoor on the watch as detailed by the Mimonic researchers, but by all accounts, it would be a bit of a pig to take advantage of.
However, what the fuck's it doing there in the first place, guys?
To say how this could have accidentally been a, "Oops, how did that end up in there?" You know, I'm imagining right now there must be a lot of difficult conversation between the two technology partners that have created this watch because this is not a fun place to be.
That's my view anyway. But you know, I just think, actually coming back to your point in the beginning, I'm up for basic phones.
Bring back the Nokia 3310, bring me back Snake, the brick.
So if I had my phone on silent, I would just have this little light flashing and it was—
In fact, tens of thousands of companies rely upon LastPass to protect themselves.
LastPass Enterprise simplifies password management for companies of all sizes and helps you secure your workforce. So whatever the size of your business, go and check it out.
Go and visit lastpass.com/smashing to find out more. And thanks to LastPass for supporting the show.
The idea behind this free ebook is it gives you a guided tour of how the MITRE ATT&CK framework can totally simplify and strengthen your cybersecurity skill strategy.
It literally is a go-to framework. Learn more at immersive labs.com/smashing. And thanks to Immersive Labs for sponsoring the show.
Safeguard your organization against phishing, business email compromise, and risks of ransomware with Mimecast awareness training, an important layer of defense that picks up where Microsoft security leaves off.
Mimecast's unique breed of awareness training creates real change in your people and how your organization thinks about security. The video modules are funny and engaging.
The phishing test examples are from real-life emails your employees have clicked on.
And the real-time dashboard gives you access to individuals' test results, allowing you to focus on the employees that need it the most.
Mimecast email security and awareness training creates real change in your people. Real life, real time, real change.
Learn more about the impact of security awareness training by downloading the free State of Email Security report at smashingsecurity.com/mimecasthub. Mimecast.
Relentless protection. Resilient World. And welcome back. And you join us at our favorite part of the show, the part of the show that we to call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish. Doesn't have to be security-related necessarily.
Really?
It's called Scribble. I love Scribble! It is, you know this? I do. I love it, yes. So there's a ringing endorsement. Scribble is spelled S-K-R-I-B-B-L-E. And then .io.
That is the name of the website. And it is basically, it's sort of Pictionary, isn't it?
What happens is you are put into a room with about a dozen other people and one of them is nominated. They're given a word and they have to draw it on the screen with their mouse.
And everyone else is trying to guess what the word is.
And of course everyone— I'm terrible at drawing with a mouse. I don't have one of those, what are they called? The stylus.
Stylus or skating pad or whatever they're called, you know. But anyway, that is my pick of the week, scribble.io, but scribble is spelled in a weird way.
So look at it in the show notes. Scratch. Scribble. So Crow, you're the odd one out there because you've never played Scrabble.
It's a game called Hades and it's by Supergiant Games. And they've made a whole bunch of amazing games like Bastion and Transistor, both of which I've enjoyed a great deal.
This one— Oh, yeah, of course.
And the plot of the story is basically you're the Prince of Hades, like you're Hades's son, and you're trying to escape the underworld.
And you will attempt it many, many, many, many times, and you will die over and over and over.
And every time you die, you learn something new, and you start over right at the beginning, but you kind of take some of that knowledge with you.
So you can't memorize the layout of a room or how a fight's gonna go because it's always random.
But the game is very smart about how it designs making the fights easier if you're not a fighting type person.
And normally, the kind of game where you just die over and over is not very interesting.
But they work it into the plot of the story in such a way that it's actually necessary for you to advance the plot. And they turn it on its head. It's very creative. Super, super fun.
And yeah, I highly recommend it. It's really fun.
I don't know what its rating is, but should I play it in front of my 3-year-old? I don't know, but I have.
It's super huge, because I have been working in secret with the lovely Anna Brady since the summer, and we've been grabbing tiny little moments together online, and we finally have something to show for it.
And because I made the deadline of the 200th show— yay!
You guys, get ready because I, Carole Theriault, announce a brand new hilarious podcast, Sticky Pickles, co-hosted with my very good friend Anna Brady, the Anna Brady that has appeared a number of times on Smashing Security.
Sticky Pickles, like being stuck in a pickle. Sticky Pickles, it's all about getting stuck in a pickle and having to think on your feet about how you might get out of it.
And we've obviously designed these to be as hilarious and ridiculous and cringeworthy as possible.
She doesn't know my story, I don't know hers, and it has absolutely nothing to do with technology. I know, don't cry, people.
But if not, you want to listen, you can go to stickypickles.com and you'll be redirected and you can listen directly.
So for the next wee while, our plan is to drop a new episode every Friday at noon UK time.
Your job, if you like what you hear, right, is to freaking tell me because I love doing it. But you know, if a tree falls in the forest, no one's there to hear it.
Who gives a fuck, right?
So if you like it, our plan is to make 1,000 downloads. Small potatoes for some.
Please, should we have guests on the show? It adds work, but if it's worth it, we'll do it. So it's down to you guys.
I bet most of our listeners, if they go through their podcasts on their phone, that some of them don't even have one podcast that is only presented by me.
That's how we did this, because we thought we need to cheer ourselves up. So it is fun, and it does get crazy.
Okay, I'm not going to give anything away, but imagine you're hosting a work party at your home. Right?
Everyone in my whole echo chamber can't believe that, but I've never actually seen a full episode in my life.
So my— I'll set this up for Anna to be within cringeworthy, you know, oh my God, I have no idea how to handle this.
And then I'll— we'll set the question, let her just try and wiggle out of it live on air.
Now, this is a very exciting thing for people within the industry, but there might be some people out there that don't even know it exists.
So I've invited Michael Madon, Head of Security Awareness at Mimecast, to join us. Michael, thank you so much for coming on the show.
It's really, in some ways, October begins the holiday season for hackers because they're ramping up for our actual holiday season and October is when they begin the ramp-up of their attacks.
On our side, for awareness month, I think the industry, I think we picked October really because of that, because we know that the holidays are a time when people are at their most vulnerable to do things like click something that's interesting, go online to interesting sites and buy cool stuff for Aunt Mildred.
But the hackers know that too.
And so October is a time when we really as a community come together to inform companies, to inform people, to inform Aunt Mildred that your computer is the coolest thing ever, but it's also really, it could be very dangerous and to be vigilant when you use a phone, your computer, etc., because there are criminals out there who are literally targeting you to get your information and to do things like empty your bank account.
So you have all these people that may have done all their online shopping within the secure perimeter of the business and now are doing a lot of that home shopping or that shopping on their home computers.
Do you see that that is going to cause some problems?
So what was before the virus, what was happening was there was this movement of work and home and personal life just really conflating into this well, some people would say a beautiful flower, but others would say this mess, right?
And so working from home and being stuck within four walls, I think has only compounded the problem, right? So I think people may be shopping at home with the home computer.
They may be shopping with their work computer. I think personal and work has been just mushed together more than it, more than it ever has.
I think since we started working with computers, there's never been a time where I think the separation between work and home has been less.
So I think what it has done, I think the virus and also compounded with just the general stress and turmoil that people feel in their, you know, the effect of the virus or a political system, is just putting people under a tremendous amount of stress.
And so what does this all mean? So the hackers love this because for them this is a field day, right? It actually really is a holiday, and here's why.
So typically what hackers do is they look for vulnerabilities in people, right?
They look for when people are not paying attention and they literally target people with things they think they'll be interested in.
So what they're really looking for is a person who's very busy, very distracted, under a lot of stress, and not paying attention. Well, welcome the great year of 2000.
Here we are, right? People are under an insane amount of stress, totally distracted, and oh, and there's one more component, craving information.
So the hackers are exploiting all this and they're having a field day. Hacks have gone up hundreds of times. And we see this in our own systems.
And if you don't train, and if you don't train yourself and train employees, the situation becomes pretty dire.
What do you think are some of the key, what are the key things they need to address in terms of awareness?
If there is any one or the three messages you need them to get across to all their employees, what would you say that is?
So in that capacity, we worked on issues like sanctions, right? Sanctioning Iran or Iranian entities or North Korean entities, et cetera.
So often I'll get phone calls from people that I used to work with who are working with clients and have questions about treasury things.
So I get a call from a former colleague of mine who said, look, I have, I represent a client.
They are an engineering firm with a lot of IP, super, super cool energy stuff that's very, very important.
They got hit by a ransomware attack, and the ransomware attack hit them exactly where their IP was, and they were frozen up and they couldn't work.
So they were, the ransom attack was for $3 million, which they were going to pay. Yeah.
So they work with their attorneys, they were going to pay it, and at the last minute, and it was all above board, and at the last minute, the attorney said, sorry, wait a minute, you can't pay this ransom because the ransomware attacker is actually associated and affiliated with a designated entity.
And you can't, if someone is a designated entity by the UN or by the US, you literally can't send them money. It's like sending money to a terrorist organization, right?
And how did this happen? One of their employees clicked on a link, clicked on, it was actually an SMS, you know, went through their phone.
They also got the same message on their computer and they clicked that.
And so their phone was completely compromised and then their work computer was completely compromised and it was one person. And actually, there's no great answer.
There is no great answer. And the only right thing, which is unfortunately to say, is don't get into that situation.
What are you trying to suggest people should do when they're to employ that technique?
So at the end of the day, if a person is getting an email that seems in any way, or a text, or honestly even a phone call, right, like a solicitation of some kind that seems in any way dodgy, chances are it is dodgy.
And there's no real big downside if you think it's dodgy and it's not, so what? You've checked it out.
But before you click on that link, either in your phone or on the computer or you provide any sort of personal information on the phone, which most banks, almost all banks will never require, stop and think about that and just take a tactical pause.
And at the end of the day, the safest thing you can do is just delete it.
And also block numbers that come in, set up email filters that were things just go to spam and you don't have to look at them.
And then on the corporate side is you have to have a layer of security that blocks as best as possible these phishing attacks that come in.
I mean, this is the number one threat that a company has for compromise is the individual, right?
So I think it's one, educate the individuals so if they see something, they take a tactical pause, take a breath and say, wait, should I really be clicking on this?
Is it really worth it, it seems funny, something's misspelled or the URL doesn't make any sense or this just doesn't seem right, ignore it or delete it.
And then on the company side, they have to provide protection for their employees so that their employees aren't overwhelmed with the attacks.
One for their online shopping where maybe they're not 100% confident that everything is above board and then having one that they use for banking and for more of their really serious trusted work?
The answer is maybe.
And then I started using that on my home computer too, especially with working from home and the fact that we're all just more vulnerable and we're all so interconnected with each other that if a hacker really wants to get at you, right, they can compromise one of your friends and pretend to write an email from that friend, right?
It won't be exactly the same, right?
Likely it'll be strange, or likely they may be asking for information or asking you to send them money or saying they're in a panic and they've gotten held up.
So it is very possible that one of your friends or colleagues has been compromised too. So I think a VPN is actually probably a nice way to go.
It's a little bit of a pain, but it does provide extra comfort on a personal computer. And then I do think setting up different personas, that's a really good point.
I do think setting up different personas that are separated from each by things always use different passwords. 100%. Always. And also multifactor authentication.
Again, it's a little bit of a pain. It is so much better to use multifactor authentication.
You know, places like Google or Microsoft, they all have multifactor and they've all made it pretty much as easy as possible.
So I think they just go, "I've just set it up as a default and that means it'll be safe enough." And I think that is a really, really dangerous approach.
And I try and encourage people to go and look at the configuration docs.
The problem though is those pages are always designed completely differently and it can be really frustrating.
If you look at, for example, a company that's in AWS, LastPass is only as secure as you want your configuration to be.
If the analogy's with your house, how secure do you want your house? You don't get your house with a bolt on it. You get a key set, but you don't have to use it.
It could be wide open. Do you want an alarm system? Do you want motion detecting? Are you actually gonna lock your door or just get the house the way it is and it doesn't come locked?
So I think that that's really the analogy that people should use.
I think for someone who's not necessarily sophisticated in looking at configuration, what I would say is this, if you're gonna download something, go to the actual website where that thing is.
Don't download something from a link. Like I would absolutely go to the actual website or go to the App Store.
Now, companies who want to provide training to their employees need to get their skates on and need to do it virtually, I guess.
And the reason why we set it up so it would work in a virtual environment from the beginning was not that we predicted this insanity to happen, but because training needs to meet people where they are.
And people, many, many people do not want to take any sort of training behind a desk.
We designed our training so that we meet people where they are and they're not always behind their desk.
So what I would encourage companies to do is find a security awareness training program that really meets people, meets employees where they are, and also has a learning methodology that incorporates microlearning so that it's super short and people don't have to click through PowerPoint slides, God forbid.
And the last part, which is really the most important, is that a security program that addresses the hearts and minds of the employee, right?
Ultimately, cybersecurity training and awareness training is a hearts and minds campaign, right?
It's about changing the way people think about security from something they have to do, like compliancy, to something they want to do, that they're committed to do, right?
From compliance to commitment is really what you're looking for in a program.
If you want more information on this, please visit smashingsecurity.com/mimcasthub, and there you can find the State of Email Security 2020 report that has been published by Mimecast.
Michael, anything to add?
You know, it's actually very, very hard for a company to actually prove that they work.
They look at tests and they say, look, people on phishing tests have gone down to 2%, but that's a test. It's hard to really demonstrate efficacy.
And what's so cool is that we just finished up research that shows definitively with 30,000 to 40,000 customers that if you don't have Mimecast awareness training, you're 5.2 times more likely to click on a bad link.
I mean, that was really meaningful for us because now we can show and then continue to learn from what we're doing.
You can tell you've been in the industry a long time. I'm not saying you're long in the tooth or anything. Very long, long time. You see, I told you. Told you it's good, right?
It's hard to believe we've got this far, but we have to thank all, yes, each and every one of our lovely listeners, our sponsors, our amazing guests like Maria Varmazis, who's been on the show this week.
And don't forget, if you want to be sure never to miss another episode, and you really shouldn't, because we're gonna have at least another 200 fabulous episodes for you in the future.
Subscribe in your favorite podcast app, such as Apple Podcasts, Spotify, or Pocket Casts. And don't forget Sticky Pickles as well.
Kick me. Mwah. Mwah. Mwah. Mwah. You chums rock. Also, high five to this week's Smashing Security sponsors, Mimecast, LastPass, and Immersive Labs.
Their support helps us give you this show for free. Check out smashingsecurity.com for past episodes, sponsorship details, and information on how to get in touch with us.
Remember to show up on Thursday, 8 o'clock UT time, smashingsecurity.com/live.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Maria Varmazis:
Show notes:
- Smashing Security LIVE STREAM!
- Fury over Government campaign suggesting ballet dancer could retrain in cyber security — London Evening Standard.
- Dying swan or lame duck? Why 'Fatima' the ballerina's next job was tripping up the government — The Guardian.
- "For those worried about Fatima she’s almost certainly not called Fatima and almost certainly will never work in cyber. The image is from a US photographer based in Atlanta, Georgia." — Ciaran Jenkins on Twitter.
- The Vocabularist: How we use the word cyber — BBC News.
- Resetting Tech Culture: 5 strategies to keep women in tech (PDF) — Accenture and Girls Who Code.
- Exposing covert surveillance backdoors in children’s smartwatches — Mnemonic.
- Undocumented backdoor that covertly takes snapshots found in kids’ smartwatch — Ars Technica.
- Introducing the Xplora GO — YouTube.
- Commerce Department to Add Two Dozen Chinese Companies with Ties to WMD and Military Activities to the Entity List — U.S. Department of Commerce.
- Skribbl — Free Multiplayer Drawing & Guessing Game.
- Hades — Super Giant Games.
- Sticky Pickles — A new podcast by Carole Theriault and Anna Brading.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
LastPass Enterprise makes password security effortless for your organization.
LastPass Enterprise simplifies password management for companies of every size, with the right tools to secure your business with centralized control of employee passwords and apps.
But, LastPass isn’t just for enterprises, it’s an equally great solution for business teams, families and single users.
Go to lastpass.com/smashing to see why LastPass is the trusted enterprise password manager of over 33 thousand businesses.
Mimecast’s State of Email Security 2020 report helps you understand the most pervasive threats and how they attack organizations at their email perimeters, from inside the organization (through compromised accounts, vulnerable insiders, social engineering), or beyond the organization’s perimeters (the domains they own and their brands via impersonation).
Grab your copy at smashingsecurity.com/mimecasthub
Immersive Labs delivers hands-on, challenge-based training and exercises to make your team ready to fight real-world threats.
Check out their free ebook all about the MITRE ATT&CK framework, and how you can use it as part of your cyber skills strategy and improve your security posture by identifying weaknesses. Visit immersivelabs.com/smashing now.
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, on the Smashing Security subreddit, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, Spotify, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.



Great podcast as usual, congratulations on the 200, but would people be so upset if that was a footballer?
:D :D :D