Leo Laporte (139:59)
This is brought to you today by thinkst Canary, our sponsor for this segment on security. Now, another great security solution. These guys get in, they're in the network, they're wandering around. So what do you do to protect yourself? For one zing. Just like this company, often these, you know, once the bad guy gets into your network, you don't know you've been breached. In fact, on average, takes 91 days for a company that has been breached to find out. Three months. That's three months. A hacker can wander your network, install stuff, look for security flaws like that webcam. You don't want them in your, in your network at all. So what's the best way to find out if somebody's in your network or maybe even a malicious insider going where they shouldn't? The Thinks Canary, it's a honeypot that can be deployed in minutes. And it can impersonate anything. A SCADA device, a server, a Linux box, an IAS server. I mean, really, there's dozens and dozens of personalities and these things. By the way, the folks who do the Thinks Canary are very accomplished white hat hackers. I mean, they teach governments and businesses how to breach networks. They know about this stuff and they've, they've created something that is very secure, rock solid, but can easily impersonate anything else. And when I say impersonate, it's a perfect impersonation. I have a Thinks Canary that is impersonating a Synology, nas and it's down at the Mac address. Bad guys aren't going to look at it and go, oh yeah, that's fake. It looks like in every respect, like a unprotected NAS, including the DSM 7 login and everything. But as soon as. Oh, the other thing I think Canary can do. I should mention this is really cool. Not only are they hardware devices that can assume any personality easily, they can also create files that are like tripwires you can put out throughout your network. They look like spreadsheets or PDFs or DocX's or whatever you want. I have spreadsheets that are called employee information, things like that on my network. XSLX files. And that's another thing. A bad guy goes, oh, I've been looking for that. But the minute they touch it, the minute they attack the Synology and try to log in, the minute they try to brute force my fake SSH server, that's a think scenario. And they're going to immediately tell you you have a problem. No false alerts, just alerts that tell you there's something going on. We've had a thing scenario for many years now. They've been with us for eight years and only once has it gone off. Although I'm really glad to have one even at my home home network here. And that was when Megan got, I won't name the name of the company, but got an external USB drive and it for some reason decided I'm going to go out and look for all the IP addresses and see what's on the other side. They were spying on us basically. And I got the alert. You can get it as a text message, an email, Slack Syslog, it supports web hooks, so they have an API, I mean, any way you want it. Immediately I got the message, I said, It's a 10.it's inside the network. And I went and I found it, I ripped it from the wall and that was that. It's the other thing. It's really fun to choose the profile for your things to Canary device because it can be anything. You could change. It's so easy to change. You can change it every day if you want. You pick the profile, register it with a hosted console for monitoring and notifications, and then you just go, okay, I'm done. Then you wait. Attackers who breach your network, malicious insiders, other adversaries, they cannot resist. You know, they may say, I'm going to find a webcam that has Linux running on it. Maybe they're going to do that, but before they do that, they're going to go, but, but first let's open this Excel spreadsheet with all the employees Social Security numbers on it. I think I want to download that sucker, right? Even in this attack you talked about, they didn't go for the webcam first. So the minute they hit your thinks Canary, you're going to know. And that's the key, is to know they're in the network. Now we just have one here. A small operation might have a handful, a bank might have hundreds. It really depends on your operation. But as an example, go to Canary Tools Twit. 7,500 bucks a year will get you five of them. That's enough for a pretty good sized business. Spread them around. You want them in every segment, right on every vlan. You want them in the places the bad guys are going to go. For that money, you get Things canaries, but you also get your own hosted console. You get upgrades, you get support, you get maintenance. This is such a good security solution. Of course it's not the whole thing. Security is a layer thing, but you got to have that layer that tells you there's somebody in the network. By the way, if you use the offer code, twit, twit. And the how did you hear about us box. 10% off the things canary. Not just for the first year, for forever, for as long as you own it. Also, if you're at all, you know, like, well, I don't know, here's. Or the boss says, oh, I don't know, here's the thing to tell the boss. It's a. There's a two month money back guarantee, 60 day money back guarantee for a full refund. I have to tell you, in all the years, eight years now that Twitter has been doing these ads, partnered with Things Canary, we've mentioned the refund. No one has ever claimed it. Because once you get it, once you see it, first of all, you fall in love with it. It's so cool. All you have to do is go to Canary Tools love, and you'll see what I mean. It's such a great idea. But also because it works. It does exactly what I just told you. Exactly what I said. It's exactly what you need. Visit Canary Tools slash Twit. Don't forget to use Twitter, the offer code. Put it in the how did you hear about us? Box. Just say twit, bing, bingo, bango, bongo. 10% off. I think this is the greatest solution. I love this. I remember when we talked to. I Think was Steve Bellavin, right, In Boston, Steve, at our event, LastPass event, Steve wrote the first commonly known honeypot in. You know, he wrote that book about In Search of the Wild Hacker or the Wily Hacker, and along with Bruce Cheswick. Oh, maybe it was Cheswick. I think it was Cheswick, actually.