Easy Prey

Minimizing Damage From Cyberattacks with Stuart Madnick


Listen Later

Many use the internet considering it more like a walk in the park rather than realizing it is more like a trip down a dark alley. Today’s guest is Stuart Madnick. Professor Madnick has been a faculty member at MIT since 1972. He has served as the head of MIT’s IT group for more than 20 years. During that time, the group has been consistently rated number 1 in the nation among schools for information technology programs. Dr. Madnick is a prolific writer and author or co-author of over 380 books, articles, or technical reports and textbooks. He has a degree in Electronic Engineering, Management, and Computer Science from MIT. He has been a visiting professor at Harvard University and six additional countries.

Show Notes:
  • [1:10] - Dr. Madnick shares his background and current role at MIT.
  • [2:53] - There were examples of cybersecurity attacks predating the internet through floppy disks.
  • [4:02] - In the late 90s and early 2000s, the internet experienced a boom of users.
  • [5:50] - In other industries, safety is a priority.
  • [6:53] - Everything, even toothbrushes, have computers in them.
  • [8:30] - Most know of the common scams, but there are people who still fall victim to them.
  • [9:18] - Some of the really poorly written scam emails are intentionally created this way to find the most gullible.
  • [10:15] - Dr. Madnick describes spear phishing and the rise in these cases.
  • [11:30] - In some cases, only a couple hundred dollars could be enough for a scammer and they add up quickly.
  • [13:03] - Don’t feel bad if you are hit by a believable scam.
  • [14:11] - Most people do not consider what to do to minimize damage.
  • [16:56] - If something bad happens to your computer and/or your data, what is your plan?
  • [18:54] - Dr. Madnick shares some corporate examples of cyberattacks.
  • [20:23] - We constantly have several subconscious decisions that we don’t consider the consequences of.
  • [22:16] - Maintaining certificates and security is a tedious and manual task.
  • [23:51] - Data is tracked by how attacks were successful rather than how many were unsuccessful.
  • [26:10] - Larger companies are starting to give more attention to cybersecurity but the progress is very slow.
  • [28:31] - Cybersecurity can be considered a catastrophe.
  • [29:30] - What does a cyber catastrophe look like?
  • [31:40] - Outages and malfunctions are possible and in catastrophes, a solution can take weeks or more.
  • [33:22] - It may not be likely that a catastrophe will happen, but it is possible, and we are unprepared.
  • [36:12] - You can’t avoid all risks, but you can minimize the damage done.
  • [39:31] - Cybersecurity tends to be a low priority.
  • [41:17] - What is a “zero-click vulnerability?”
  • [43:12] - Cybersecurity education is outdated in most schools.
  • [44:43] - You can put a better lock on your front door, but if you put your key under the mat, are you any more secure?

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. 

Links and Resources:
  • Podcast Web Page
  • Facebook Page
  • whatismyipaddress.com
  • Easy Prey on Instagram
  • Easy Prey on Twitter
  • Easy Prey on LinkedIn
  • Easy Prey on YouTube
  • Easy Prey on Pinterest
  • Cybersecurity at MIT
...more
View all episodesView all episodes
Download on the App Store

Easy PreyBy Chris Parker

  • 4.6
  • 4.6
  • 4.6
  • 4.6
  • 4.6

4.6

27 ratings


More shows like Easy Prey

View all
The Joe Rogan Experience by Joe Rogan

The Joe Rogan Experience

225,557 Listeners

The School of Greatness by Lewis Howes

The School of Greatness

21,283 Listeners

The Jordan B. Peterson Podcast by Dr. Jordan B. Peterson

The Jordan B. Peterson Podcast

34,049 Listeners

The Diary Of A CEO with Steven Bartlett by DOAC

The Diary Of A CEO with Steven Bartlett

6,980 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,876 Listeners

Swindled by A Concerned Citizen

Swindled

9,759 Listeners

The Jordan Harbinger Show by Jordan Harbinger

The Jordan Harbinger Show

12,013 Listeners

The Perfect Scam by AARP

The Perfect Scam

1,091 Listeners

Hacking Humans by N2K Networks

Hacking Humans

314 Listeners

Strictly Stalking by PodcastOne

Strictly Stalking

2,525 Listeners

Huberman Lab by Scicomm Media

Huberman Lab

28,264 Listeners

Killer Psyche by Wondery | Treefort Media

Killer Psyche

4,618 Listeners

Betrayal: Season 4 by iHeartPodcasts and Glass Podcasts

Betrayal: Season 4

7,060 Listeners

Scamfluencers by Wondery

Scamfluencers

7,084 Listeners

What Came Next by Broken Cycle Media

What Came Next

624 Listeners