Easy Prey

Minimizing Damage From Cyberattacks with Stuart Madnick


Listen Later

Many use the internet considering it more like a walk in the park rather than realizing it is more like a trip down a dark alley. Today's guest is Stuart Madnick. Professor Madnick has been a faculty member at MIT since 1972. He has served as the head of MIT's IT group for more than 20 years. During that time, the group has been consistently rated number 1 in the nation among schools for information technology programs. Dr. Madnick is a prolific writer and author or co-author of over 380 books, articles, or technical reports and textbooks. He has a degree in Electronic Engineering, Management, and Computer Science from MIT. He has been a visiting professor at Harvard University and six additional countries.

Show Notes:
  • [1:10] - Dr. Madnick shares his background and current role at MIT.
  • [2:53] - There were examples of cybersecurity attacks predating the internet through floppy disks.
  • [4:02] - In the late 90s and early 2000s, the internet experienced a boom of users.
  • [5:50] - In other industries, safety is a priority.
  • [6:53] - Everything, even toothbrushes, have computers in them.
  • [8:30] - Most know of the common scams, but there are people who still fall victim to them.
  • [9:18] - Some of the really poorly written scam emails are intentionally created this way to find the most gullible.
  • [10:15] - Dr. Madnick describes spear phishing and the rise in these cases.
  • [11:30] - In some cases, only a couple hundred dollars could be enough for a scammer and they add up quickly.
  • [13:03] - Don't feel bad if you are hit by a believable scam.
  • [14:11] - Most people do not consider what to do to minimize damage.
  • [16:56] - If something bad happens to your computer and/or your data, what is your plan?
  • [18:54] - Dr. Madnick shares some corporate examples of cyberattacks.
  • [20:23] - We constantly have several subconscious decisions that we don't consider the consequences of.
  • [22:16] - Maintaining certificates and security is a tedious and manual task.
  • [23:51] - Data is tracked by how attacks were successful rather than how many were unsuccessful.
  • [26:10] - Larger companies are starting to give more attention to cybersecurity but the progress is very slow.
  • [28:31] - Cybersecurity can be considered a catastrophe.
  • [29:30] - What does a cyber catastrophe look like?
  • [31:40] - Outages and malfunctions are possible and in catastrophes, a solution can take weeks or more.
  • [33:22] - It may not be likely that a catastrophe will happen, but it is possible, and we are unprepared.
  • [36:12] - You can't avoid all risks, but you can minimize the damage done.
  • [39:31] - Cybersecurity tends to be a low priority.
  • [41:17] - What is a "zero-click vulnerability?"
  • [43:12] - Cybersecurity education is outdated in most schools.
  • [44:43] - You can put a better lock on your front door, but if you put your key under the mat, are you any more secure?

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:
  • Podcast Web Page
  • Facebook Page
  • whatismyipaddress.com
  • Easy Prey on Instagram
  • Easy Prey on Twitter
  • Easy Prey on LinkedIn
  • Easy Prey on YouTube
  • Easy Prey on Pinterest
  • Cybersecurity at MIT
...more
View all episodesView all episodes
Download on the App Store

Easy PreyBy Chris Parker

  • 4.7
  • 4.7
  • 4.7
  • 4.7
  • 4.7

4.7

30 ratings


More shows like Easy Prey

View all
Criminal by Vox Media Podcast Network

Criminal

37,513 Listeners

The School of Greatness by Lewis Howes

The School of Greatness

21,181 Listeners

20/20 by ABC News

20/20

11,779 Listeners

48 Hours by CBS News

48 Hours

10,744 Listeners

Health Report by ABC

Health Report

132 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,056 Listeners

The Perfect Scam by AARP

The Perfect Scam

1,087 Listeners

What Was That Like - True Stories. Real People. by Scott Johnson & Glassbox Media.

What Was That Like - True Stories. Real People.

1,907 Listeners

Dateline NBC by NBC News

Dateline NBC

47,345 Listeners

WHEN DATING HURTS by Evergreen Podcasts

WHEN DATING HURTS

349 Listeners

Killer Psyche by Wondery | Treefort Media

Killer Psyche

4,701 Listeners

Body Bags with Joseph Scott Morgan by CrimeOnline and iHeartPodcasts

Body Bags with Joseph Scott Morgan

2,142 Listeners

Betrayal: Weekly by iHeartPodcasts and Glass Podcasts

Betrayal: Weekly

7,974 Listeners

The Mel Robbins Podcast by Mel Robbins

The Mel Robbins Podcast

19,574 Listeners

If I Can Be SCAMMED, So Could YOU! by MsRomanceScam

If I Can Be SCAMMED, So Could YOU!

1 Listeners