Easy Prey

Minimizing Damage From Cyberattacks with Stuart Madnick


Listen Later

Many use the internet considering it more like a walk in the park rather than realizing it is more like a trip down a dark alley. Today’s guest is Stuart Madnick. Professor Madnick has been a faculty member at MIT since 1972. He has served as the head of MIT’s IT group for more than 20 years. During that time, the group has been consistently rated number 1 in the nation among schools for information technology programs. Dr. Madnick is a prolific writer and author or co-author of over 380 books, articles, or technical reports and textbooks. He has a degree in Electronic Engineering, Management, and Computer Science from MIT. He has been a visiting professor at Harvard University and six additional countries.

Show Notes:
  • [1:10] - Dr. Madnick shares his background and current role at MIT.
  • [2:53] - There were examples of cybersecurity attacks predating the internet through floppy disks.
  • [4:02] - In the late 90s and early 2000s, the internet experienced a boom of users.
  • [5:50] - In other industries, safety is a priority.
  • [6:53] - Everything, even toothbrushes, have computers in them.
  • [8:30] - Most know of the common scams, but there are people who still fall victim to them.
  • [9:18] - Some of the really poorly written scam emails are intentionally created this way to find the most gullible.
  • [10:15] - Dr. Madnick describes spear phishing and the rise in these cases.
  • [11:30] - In some cases, only a couple hundred dollars could be enough for a scammer and they add up quickly.
  • [13:03] - Don’t feel bad if you are hit by a believable scam.
  • [14:11] - Most people do not consider what to do to minimize damage.
  • [16:56] - If something bad happens to your computer and/or your data, what is your plan?
  • [18:54] - Dr. Madnick shares some corporate examples of cyberattacks.
  • [20:23] - We constantly have several subconscious decisions that we don’t consider the consequences of.
  • [22:16] - Maintaining certificates and security is a tedious and manual task.
  • [23:51] - Data is tracked by how attacks were successful rather than how many were unsuccessful.
  • [26:10] - Larger companies are starting to give more attention to cybersecurity but the progress is very slow.
  • [28:31] - Cybersecurity can be considered a catastrophe.
  • [29:30] - What does a cyber catastrophe look like?
  • [31:40] - Outages and malfunctions are possible and in catastrophes, a solution can take weeks or more.
  • [33:22] - It may not be likely that a catastrophe will happen, but it is possible, and we are unprepared.
  • [36:12] - You can’t avoid all risks, but you can minimize the damage done.
  • [39:31] - Cybersecurity tends to be a low priority.
  • [41:17] - What is a “zero-click vulnerability?”
  • [43:12] - Cybersecurity education is outdated in most schools.
  • [44:43] - You can put a better lock on your front door, but if you put your key under the mat, are you any more secure?

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. 

Links and Resources:
  • Podcast Web Page
  • Facebook Page
  • whatismyipaddress.com
  • Easy Prey on Instagram
  • Easy Prey on Twitter
  • Easy Prey on LinkedIn
  • Easy Prey on YouTube
  • Easy Prey on Pinterest
  • Cybersecurity at MIT
...more
View all episodesView all episodes
Download on the App Store

Easy PreyBy Chris Parker

  • 4.6
  • 4.6
  • 4.6
  • 4.6
  • 4.6

4.6

28 ratings


More shows like Easy Prey

View all
Stuff You Should Know by iHeartPodcasts

Stuff You Should Know

78,293 Listeners

Criminal by Vox Media Podcast Network

Criminal

37,436 Listeners

This Is Actually Happening by Wondery

This Is Actually Happening

10,465 Listeners

All In The Mind by ABC listen

All In The Mind

757 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,002 Listeners

Swindled by A Concerned Citizen

Swindled

9,837 Listeners

The Jordan Harbinger Show by Jordan Harbinger

The Jordan Harbinger Show

12,029 Listeners

The Perfect Scam by AARP

The Perfect Scam

1,086 Listeners

Hacking Humans by N2K Networks

Hacking Humans

314 Listeners

People Who Read People: A Behavior and Psychology Podcast by Zachary Elwood

People Who Read People: A Behavior and Psychology Podcast

283 Listeners

The Dr. Phil Podcast by Dr. Phil McGraw

The Dr. Phil Podcast

13,807 Listeners

Scamfluencers by Wondery

Scamfluencers

7,248 Listeners

Infamous by Campside Media / Sony Music Entertainment

Infamous

1,130 Listeners

The Case Of by ABC listen

The Case Of

293 Listeners

Scam Factory by Wondery

Scam Factory

442 Listeners