
Sign up to save your podcasts
Or


You don't get locked out first. You get watched. Someone maps your systems quietly, copies your data quietly, and waits until they're sure you can't avoid the conversation. Only then do the screens go dark.
This episode breaks down how ransomware actually works today and why double extortion changed the stakes completely. It explains how modern ransomware operations move slowly at first, stealing credentials and exploring systems before copying data and triggering encryption. The real leverage isn't locked files, it's the threat of publishing what was already taken. The episode walks through the most common entry points (phishing, reused credentials, unpatched remote access, over-privileged vendors), why ransomware crews now operate like supply chain businesses, and what to do during an incident. The starter kit covers immutable backups, multi-factor authentication, fast patching of internet-facing systems, administrative sprawl reduction, network segmentation, endpoint detection, credential hygiene, and building a one-page incident response plan.
Whether you're a small business owner who thinks you're too small to be targeted or a leader who needs to understand why backups alone no longer solve the problem, Plaintext with Rich lays out the new reality.
Is there a topic/term you want me to discuss next? Text me!!
YouTube more your speed? → https://links.sith2.com/YouTube
Apple Podcasts your usual stop? → https://links.sith2.com/Apple
Neither of those? Spotify’s over here → https://links.sith2.com/Spotify
Prefer reading quietly at your own pace? → https://links.sith2.com/Blog
Join us in The Cyber Sanctuary (no robes required) → https://links.sith2.com/Discord
Follow the human behind the microphone → https://links.sith2.com/linkedin
Need another way to reach me? That’s here → https://linktr.ee/rich.greene
By Rich GreeneYou don't get locked out first. You get watched. Someone maps your systems quietly, copies your data quietly, and waits until they're sure you can't avoid the conversation. Only then do the screens go dark.
This episode breaks down how ransomware actually works today and why double extortion changed the stakes completely. It explains how modern ransomware operations move slowly at first, stealing credentials and exploring systems before copying data and triggering encryption. The real leverage isn't locked files, it's the threat of publishing what was already taken. The episode walks through the most common entry points (phishing, reused credentials, unpatched remote access, over-privileged vendors), why ransomware crews now operate like supply chain businesses, and what to do during an incident. The starter kit covers immutable backups, multi-factor authentication, fast patching of internet-facing systems, administrative sprawl reduction, network segmentation, endpoint detection, credential hygiene, and building a one-page incident response plan.
Whether you're a small business owner who thinks you're too small to be targeted or a leader who needs to understand why backups alone no longer solve the problem, Plaintext with Rich lays out the new reality.
Is there a topic/term you want me to discuss next? Text me!!
YouTube more your speed? → https://links.sith2.com/YouTube
Apple Podcasts your usual stop? → https://links.sith2.com/Apple
Neither of those? Spotify’s over here → https://links.sith2.com/Spotify
Prefer reading quietly at your own pace? → https://links.sith2.com/Blog
Join us in The Cyber Sanctuary (no robes required) → https://links.sith2.com/Discord
Follow the human behind the microphone → https://links.sith2.com/linkedin
Need another way to reach me? That’s here → https://linktr.ee/rich.greene