Published: June 17, 2020, 10 a.m.
Have you ever wondered what strange things a digital forensic investigator has to dig through? Listen to this episode to find out.\xa0\xa0
Our guest for this episode is Jake Moore. Jake Moore is a cybersecurity specialist for ESET, Europe\u2019s number one internet security and anti-virus company. Jake previously worked in the police force for 14 years investigating cybercrime in the Digital Forensics Unit and Cyber Crime Team in Dorset.\xa0 In 2016, he was asked to implement cybersecurity advisers in order to make local communities more aware of ever-increasing cybersecurity threats.\xa0\xa0\xa0\xa0
Jake shares many experiences working in digital forensics and cybersecurity. We also discuss simple things you can do to keep cybercriminals away and social media accounts safe.\xa0\xa0
Show Notes: - [01:05] - Jake shares the background on how he got started in cybersecurity.\xa0
- [03:20] - Without an understanding of cybercrime and what they are doing there is a huge chance that these companies are going to end up losing millions of dollars down the line.\xa0\xa0
- [03:57] - When Chris was in college he was very interested in crime scene investigation and he did a ride-along with a crime scene investigator.\xa0\xa0
- [06:13] - Jake shares a story about a time he received a laptop as part of a murder investigation.
- [08:37] - In the UK, they have a system for reporting all cybercrimes called Action Fraud.\xa0
- [09:53] - Cybercrime and fraud are making up over 50% of crime in the UK.\xa0\xa0
- [11:03] - Prevention is the best cure.\xa0\xa0
- [12:31] - Use a password manager.\xa0 90% of people are using two or three passwords for everything.\xa0\xa0
- [13:29] - Jake also suggests turning on two factor or multifactor identification.\xa0 Every social media and email account offers it.\xa0\xa0
- [15:14] - If it hasn\u2019t happened to them or their nearest and dearest then people think cybersecurity won\u2019t happen to them.\xa0\xa0
- [17:22] - Sometimes in scamming emails they include an old password that they acquired from a data breach.\xa0\xa0
- [18:39] - Jake likes to make people aware that you can phish people\u2019s information.\xa0\xa0
- [21:04] - Even people with awareness tend to forget about things as soon as something amazing comes along.\xa0\xa0\xa0
- [23:24] - Cybercriminals are very crafty and they are doing their homework.\xa0
- [24:34] - They often feed their victims\u2019 egos just enough to get them to bite.\xa0\xa0
- [25:24] - Cybercriminals use urgency as one of the key factors.\xa0\xa0
- [26:06] - The use of authority is another key factor.\xa0\xa0
- [28:14] - Always backup your data.\xa0 This is a good practice for everyone and can be beneficial in many different circumstances.\xa0\xa0
- [30:31] - It is important to have a local back-up and a cloud back-up.\xa0\xa0
- [32:01] - Chris has two back-up cloud services and a rotating clone of his hard drive.\xa0\xa0
- [34:15] - Chris shares a back-up story about a company that he worked for.\xa0\xa0
- [35:19] - Some people learn the hard way and sometimes that is what it takes.\xa0\xa0
- [36:46] - It is important to have a place to store your photos and just use your phone for recent photos.\xa0
- [37:21] - If Jake\u2019s 73-year-old mum can do it then anyone can.
- [39:12] - Sometimes providing more information can almost backfire and trip people up.\xa0\xa0
- [39:44] - Awareness and education have to go hand and hand.\xa0
- [40:36] - The number one rule is never to click on any link in an email.\xa0
- [41:02] - Jake\u2019s best advice is to do one of the things they talked about today in the podcast.\xa0
Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.\xa0
Links and Resources: