<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Cybersecurity & IT Operations]]></title><description><![CDATA[Clear, concise breakdowns of cybersecurity breach disclosures, 8-K filings, and postmortems, highlighting what’s missing, misleading, or obscured.]]></description><link>https://blog.moveontech.ai</link><image><url>https://substackcdn.com/image/fetch/$s_!p1sq!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28aff2ed-be87-4a86-a8bc-14c71a054f00_800x800.jpeg</url><title>Cybersecurity &amp; IT Operations</title><link>https://blog.moveontech.ai</link></image><generator>Substack</generator><lastBuildDate>Tue, 05 May 2026 10:33:17 GMT</lastBuildDate><atom:link href="https://blog.moveontech.ai/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Joe Robertson]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[jorotechre@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[jorotechre@substack.com]]></itunes:email><itunes:name><![CDATA[Joe Robertson]]></itunes:name></itunes:owner><itunes:author><![CDATA[Joe Robertson]]></itunes:author><googleplay:owner><![CDATA[jorotechre@substack.com]]></googleplay:owner><googleplay:email><![CDATA[jorotechre@substack.com]]></googleplay:email><googleplay:author><![CDATA[Joe Robertson]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The F5 Breach: A 2025 Echo of SolarWinds]]></title><description><![CDATA[A nation-state attack on F5&#8217;s Big IP reignites fears of deep infrastructure compromise.]]></description><link>https://blog.moveontech.ai/p/the-f5-breach-a-2025-echo-of-solarwinds</link><guid isPermaLink="false">https://blog.moveontech.ai/p/the-f5-breach-a-2025-echo-of-solarwinds</guid><dc:creator><![CDATA[Joe Robertson]]></dc:creator><pubDate>Sat, 18 Oct 2025 23:11:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!isoT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097e2416-a71f-4586-a075-532e33e87912_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!isoT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097e2416-a71f-4586-a075-532e33e87912_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!isoT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097e2416-a71f-4586-a075-532e33e87912_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!isoT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097e2416-a71f-4586-a075-532e33e87912_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!isoT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097e2416-a71f-4586-a075-532e33e87912_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!isoT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097e2416-a71f-4586-a075-532e33e87912_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!isoT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097e2416-a71f-4586-a075-532e33e87912_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/097e2416-a71f-4586-a075-532e33e87912_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1309030,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.moveontech.ai/i/176525028?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097e2416-a71f-4586-a075-532e33e87912_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!isoT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097e2416-a71f-4586-a075-532e33e87912_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!isoT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097e2416-a71f-4586-a075-532e33e87912_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!isoT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097e2416-a71f-4586-a075-532e33e87912_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!isoT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097e2416-a71f-4586-a075-532e33e87912_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In 2020, the <a href="https://www.fortinet.com/resources/cyberglossary/solarwinds-cyber-attack">SolarWinds attack</a> shook the foundations of corporate IT and cybersecurity. What made it so devastating wasn&#8217;t just that a major software vendor had been breached; it was who they were and what their product touched.</p><p>SolarWinds&#8217; flagship software was designed to monitor the health of entire corporate networks. It tracked whether servers were up or down, measured performance, and triggered alerts when something looked off. To perform that function, SolarWinds was granted some of the deepest levels of access imaginable inside corporate and government systems. When that system was compromised by a nation-state actor, it meant that tens of thousands of networks, both private and public, were suddenly vulnerable.</p><p>Control SolarWinds, control the network. That nightmare became a reality.</p><h3>Fast Forward to 2025: The F5 Big IP Breach</h3><p>Now, five years later, another storm is brewing, and it feels eerily familiar.</p><p>Cybersecurity firm <strong><a href="https://my.f5.com/manage/s/article/K000154696">F5</a></strong><a href="https://my.f5.com/manage/s/article/K000154696"> has disclosed that its flagship </a><strong><a href="https://my.f5.com/manage/s/article/K000154696">Big IP</a></strong><a href="https://my.f5.com/manage/s/article/K000154696"> product was compromised </a>by a sophisticated nation-state threat actor. While F5 says its operations remain unaffected, the implications reach far beyond its corporate walls.</p><p>Big IP is not just another network device. It is one of the foundational technologies behind how modern networks are protected and managed. F5 pioneered the concept of virtualized firewall appliances, and its products are deeply entrenched across industries, including government agencies and Fortune 500 companies.</p><p>Much like SolarWinds, Big IP sits at the heart of digital infrastructure: decrypting traffic, managing load balancing, and deciding what gets in or out of a network. In many ways, it is a digital gatekeeper, and now that gatekeeper has been breached.</p><h3>The Alarming Details</h3><p>According to F5&#8217;s disclosure, portions of their <strong>source code</strong> were accessed and exfiltrated by the attackers. That detail cannot be understated. Source code is the blueprint of any software system. With it, an adversary can study the internal workings of a product, replicate its behavior, or identify vulnerabilities hidden deep within. Once a threat actor holds that level of insight, the playing field changes completely.</p><p>F5&#8217;s guidance so far has been straightforward: <strong>update immediately</strong> to the latest version of Big IP software. That directive alone signals how serious the situation is. When a company urgently tells customers to patch, it typically means that viable attack paths are known internally, even if not publicly disclosed.</p><h3>What We Don&#8217;t Know Yet</h3><p>The uncertainty is what makes this breach especially concerning. We do not yet know how this source code theft will be weaponized, or whether it already has been. Will attackers use the code to craft targeted exploits? Could they engineer counterfeit versions of F5 software? The answers remain unknown, but history has shown that such breaches often echo for years.</p><p>F5&#8217;s prompt patching effort is a good sign, but it is also a reminder of how fragile digital trust has become. When the very systems designed to protect networks are themselves compromised, the ripple effects are immense and long-lasting.</p><h3>Hoping for Containment</h3><p>For now, the best defense is vigilance: apply patches, monitor logs, and assume that attackers are already studying what they have obtained.</p><p>If we are lucky, this will end as a contained event, a cautionary tale rather than the next SolarWinds-scale catastrophe. But as we have learned before, the real test comes months later, when the first signs of exploitation begin to surface.</p><p>Let&#8217;s hope this time, the patch really is the end of the story.</p>]]></content:encoded></item><item><title><![CDATA[Legal Discovery in Cybersecurity Breaches]]></title><description><![CDATA[Is your law firm asking for the right information?]]></description><link>https://blog.moveontech.ai/p/legal-discovery-in-cybersecurity</link><guid isPermaLink="false">https://blog.moveontech.ai/p/legal-discovery-in-cybersecurity</guid><dc:creator><![CDATA[Joe Robertson]]></dc:creator><pubDate>Thu, 02 Oct 2025 17:25:58 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/175126421/c02d0e27e2161401c18a895f5d0d12d2.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Most breaches in large companies can be attributed to a failure in policy and procedure, not an overwhelming attack. I cover the basics of what you should asking for in this video.</p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity in Real Estate: An Overlooked Risk]]></title><description><![CDATA[Sensitive data, independent agents, and little training: a recipe for risk]]></description><link>https://blog.moveontech.ai/p/cybersecurity-in-real-estate-an-overlooked</link><guid isPermaLink="false">https://blog.moveontech.ai/p/cybersecurity-in-real-estate-an-overlooked</guid><dc:creator><![CDATA[Joe Robertson]]></dc:creator><pubDate>Sat, 06 Sep 2025 00:15:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!9nCk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe36804e9-4f12-4948-89ff-ac45792c24a0_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9nCk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe36804e9-4f12-4948-89ff-ac45792c24a0_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9nCk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe36804e9-4f12-4948-89ff-ac45792c24a0_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!9nCk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe36804e9-4f12-4948-89ff-ac45792c24a0_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!9nCk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe36804e9-4f12-4948-89ff-ac45792c24a0_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!9nCk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe36804e9-4f12-4948-89ff-ac45792c24a0_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9nCk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe36804e9-4f12-4948-89ff-ac45792c24a0_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e36804e9-4f12-4948-89ff-ac45792c24a0_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9nCk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe36804e9-4f12-4948-89ff-ac45792c24a0_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!9nCk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe36804e9-4f12-4948-89ff-ac45792c24a0_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!9nCk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe36804e9-4f12-4948-89ff-ac45792c24a0_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!9nCk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe36804e9-4f12-4948-89ff-ac45792c24a0_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Somewhere along the line in the past few years, I got my real estate license. My brief exposure to the industry has shown me that pound for pound, no sector may be more exposed to cybersecurity threats than real estate.</p><p>At my brokerage, an incident occurred where a threat actor obtained information off Zillow about an unsold land listing. They reached out to our brokerage requesting to relist with us. They had done their research. Using the same public records available to us, they identified the legitimate owner of the land. Then, they impersonated them, creating a Gmail address that closely resembled the owner&#8217;s name, and initiated contact.</p><p>They used the same social engineering techniques common in corporate attacks. They created a sense of urgency, insisting the property be listed immediately. Not wanting to lose what seemed like a legitimate client, our broker obliged and listed the property. A few days later, the actual owner of the land contacted us, and the listing was quickly removed without financial loss. Still, the experience gave our brokerage pause and raised serious questions about how to handle similar situations in the future.</p><p>For me, it was a moment of reflection, connecting my experience in corporate cybersecurity with the vulnerabilities in real estate.</p><div><hr></div><h3>Why Real Estate Is a Prime Target for Cyber Threats</h3><p><strong>1. Real Estate Agents Handle Extremely Sensitive Data</strong><br>Agents collect names, phone numbers, addresses, pre-approval letters, and even copies of escrow checks containing account details. For a threat actor, a real estate transaction is a goldmine of personal and financial information, all bundled together.</p><p><strong>2. Agents Operate as Independent Contractors</strong><br>Unlike corporate employees, most agents use their own laptops, personal email accounts, and whatever level of security knowledge they happen to have. Many do not use enterprise-grade tools, and in some cases, they may not even have up-to-date antivirus software. This means that when you email a scanned escrow check, there is no guarantee it is being stored or transmitted securely.</p><p><strong>3. Rogue Attacks and Long-Tail Consequences</strong><br>Imagine becoming a victim of identity theft months or even years after closing a home. A new credit card appears on your credit report, or a fraudulent loan surfaces. Would you ever trace it back to a real estate agent&#8217;s compromised inbox? Probably not. This lack of visibility makes real estate an especially appealing vector for cybercriminals.</p><p><strong>4. Lack of Cybersecurity Training</strong><br>In the corporate world, we sit through monotonous but necessary cybersecurity training sessions. Real estate agents, on the other hand, are required to complete Continuing Legal Education (CLE) to maintain their license. Yet cybersecurity awareness is not part of the curriculum. This gap leaves agents unprepared to identify phishing attempts, social engineering tactics, or malware threats.</p><div><hr></div><h3>What Can Be Done?</h3><p>We could shoot for the stars and require brokerages, many of which operate on the independent contractor model, to begin treating agents like full-time employees. This would include providing secure devices, standardized email platforms, and mandatory training. But that is unlikely to happen overnight.</p><p>A more practical step would be to integrate cybersecurity training into the real estate licensing process and CLE requirements. Even basic awareness could help prevent many of the attacks currently slipping through unnoticed.</p><p>In cybersecurity, you eventually learn to stop blaming end users. Incidents are inevitable. What matters is how organizations prepare for and respond to them. Real estate has not reached that stage of maturity yet. The industry still treats cyber incidents as anomalies instead of inevitabilities. Until that mindset shifts, it will remain one of the most exposed sectors.</p>]]></content:encoded></item><item><title><![CDATA[Why the Terminator Wasn’t Science Fiction After All]]></title><description><![CDATA[AI, humanoid robots, and one tiny security flaw could turn your living room into Skynet.]]></description><link>https://blog.moveontech.ai/p/why-the-terminator-wasnt-science</link><guid isPermaLink="false">https://blog.moveontech.ai/p/why-the-terminator-wasnt-science</guid><dc:creator><![CDATA[Joe Robertson]]></dc:creator><pubDate>Tue, 26 Aug 2025 00:29:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!AGSw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F883e70b7-ee02-4d85-aed7-7888ff7ba75f_422x421.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I can&#8217;t remember exactly how old I was when <em>Terminator 2</em> came out, but I definitely wasn&#8217;t driving yet. I must have watched that movie 20&#8211;30 times. I was always fascinated by futuristic sci-fi films, and this one had the perfect mix of suspense and imagination. Add in the teenage version of John Connor with his tech skills, and I could relate, because like him I was the kid constantly tinkering with computers and getting into things online that I probably shouldn&#8217;t have. Only slow dial-up speeds saved me from getting in more trouble!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AGSw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F883e70b7-ee02-4d85-aed7-7888ff7ba75f_422x421.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AGSw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F883e70b7-ee02-4d85-aed7-7888ff7ba75f_422x421.png 424w, https://substackcdn.com/image/fetch/$s_!AGSw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F883e70b7-ee02-4d85-aed7-7888ff7ba75f_422x421.png 848w, https://substackcdn.com/image/fetch/$s_!AGSw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F883e70b7-ee02-4d85-aed7-7888ff7ba75f_422x421.png 1272w, https://substackcdn.com/image/fetch/$s_!AGSw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F883e70b7-ee02-4d85-aed7-7888ff7ba75f_422x421.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AGSw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F883e70b7-ee02-4d85-aed7-7888ff7ba75f_422x421.png" width="422" height="421" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/883e70b7-ee02-4d85-aed7-7888ff7ba75f_422x421.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:421,&quot;width&quot;:422,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:221582,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.moveontech.ai/i/171943830?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F883e70b7-ee02-4d85-aed7-7888ff7ba75f_422x421.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!AGSw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F883e70b7-ee02-4d85-aed7-7888ff7ba75f_422x421.png 424w, https://substackcdn.com/image/fetch/$s_!AGSw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F883e70b7-ee02-4d85-aed7-7888ff7ba75f_422x421.png 848w, https://substackcdn.com/image/fetch/$s_!AGSw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F883e70b7-ee02-4d85-aed7-7888ff7ba75f_422x421.png 1272w, https://substackcdn.com/image/fetch/$s_!AGSw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F883e70b7-ee02-4d85-aed7-7888ff7ba75f_422x421.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">John Conner hacking an ATM in Terminator 2</figcaption></figure></div><p>John Connor also carried the lifelong burden, never escaping it in the sequels, of being the only one who knew how to fight the machines as humanity&#8217;s savior. For the record, I hope no one expects me to fill that role when the machines turn on us, because I&#8217;m out. Still, with the rapid advancement of AI and humanoid robots, that day feels closer than ever. It may not look exactly like <em>Terminator</em>, but there will come a moment when we think: &#8220;Wow&#8230; we really should have seen that coming.&#8221;</p><h3>How Could This Actually Happen?</h3><p>We&#8217;ve already seen incidents reported out of China involving humanoid robots behaving aggressively toward humans. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7r-L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c9b12ea-e6bf-4548-89e8-55d8a2b53187_576x567.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7r-L!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c9b12ea-e6bf-4548-89e8-55d8a2b53187_576x567.png 424w, https://substackcdn.com/image/fetch/$s_!7r-L!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c9b12ea-e6bf-4548-89e8-55d8a2b53187_576x567.png 848w, https://substackcdn.com/image/fetch/$s_!7r-L!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c9b12ea-e6bf-4548-89e8-55d8a2b53187_576x567.png 1272w, https://substackcdn.com/image/fetch/$s_!7r-L!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c9b12ea-e6bf-4548-89e8-55d8a2b53187_576x567.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7r-L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c9b12ea-e6bf-4548-89e8-55d8a2b53187_576x567.png" width="576" height="567" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5c9b12ea-e6bf-4548-89e8-55d8a2b53187_576x567.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:567,&quot;width&quot;:576,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:345346,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.moveontech.ai/i/171943830?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c9b12ea-e6bf-4548-89e8-55d8a2b53187_576x567.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!7r-L!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c9b12ea-e6bf-4548-89e8-55d8a2b53187_576x567.png 424w, https://substackcdn.com/image/fetch/$s_!7r-L!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c9b12ea-e6bf-4548-89e8-55d8a2b53187_576x567.png 848w, https://substackcdn.com/image/fetch/$s_!7r-L!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c9b12ea-e6bf-4548-89e8-55d8a2b53187_576x567.png 1272w, https://substackcdn.com/image/fetch/$s_!7r-L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c9b12ea-e6bf-4548-89e8-55d8a2b53187_576x567.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>From the first time I saw progress in AI, I thought: &#8220;Oh boy, they&#8217;re going to put an AI brain into a humanoid robot sooner or later.&#8221; And here we are.</p><p>In a lab, a glitch like that might just be chalked up as a code malfunction. Send it back to the developers, patch it, and move on. Do I expect a simple malfunction to launch Skynet? Not exactly. But human error, negligence, and shortsightedness certainly play a role in my thinking.</p><h3>The Path to the Living Room</h3><p>When humanoid robots first enter everyday life, they will be an exclusive luxury. The wealthy will use them as housekeepers, cooks, or even babysitters. But over time, as competition increases and production scales, prices will fall. Eventually, humanoid robots will become common household appliances.</p><p>Here&#8217;s the catch: in order to make them affordable, production costs must come down. And if there is one area companies love to cut corners, it is cybersecurity.</p><p>Imagine the &#8220;Amazon Special&#8221; version of a humanoid robot walking into all households. How do you think updates and patches will be delivered? My suggestion would be to require in-store updates, similar to how you take your car to the dealer for certain proprietary fixes.</p><p>But realistically, that will not happen. Instead, these robots will almost certainly connect to Wi-Fi for updates and maintenance. Once that happens, they are subject to the same vulnerabilities as your phone or work laptop. If the security is not airtight, a breach could hand control of your robot to a malicious actor.</p><p>And from there? I will let you imagine your own nightmare scenario.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-fef!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95af7bfe-31a2-4b5d-b6c9-239e50ed9f28_468x441.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-fef!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95af7bfe-31a2-4b5d-b6c9-239e50ed9f28_468x441.png 424w, https://substackcdn.com/image/fetch/$s_!-fef!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95af7bfe-31a2-4b5d-b6c9-239e50ed9f28_468x441.png 848w, https://substackcdn.com/image/fetch/$s_!-fef!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95af7bfe-31a2-4b5d-b6c9-239e50ed9f28_468x441.png 1272w, https://substackcdn.com/image/fetch/$s_!-fef!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95af7bfe-31a2-4b5d-b6c9-239e50ed9f28_468x441.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-fef!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95af7bfe-31a2-4b5d-b6c9-239e50ed9f28_468x441.png" width="468" height="441" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/95af7bfe-31a2-4b5d-b6c9-239e50ed9f28_468x441.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:441,&quot;width&quot;:468,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:347075,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.moveontech.ai/i/171943830?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95af7bfe-31a2-4b5d-b6c9-239e50ed9f28_468x441.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-fef!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95af7bfe-31a2-4b5d-b6c9-239e50ed9f28_468x441.png 424w, https://substackcdn.com/image/fetch/$s_!-fef!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95af7bfe-31a2-4b5d-b6c9-239e50ed9f28_468x441.png 848w, https://substackcdn.com/image/fetch/$s_!-fef!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95af7bfe-31a2-4b5d-b6c9-239e50ed9f28_468x441.png 1272w, https://substackcdn.com/image/fetch/$s_!-fef!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95af7bfe-31a2-4b5d-b6c9-239e50ed9f28_468x441.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[Why You Have Open A Ticket]]></title><description><![CDATA[Google discloses salesforce instance breach due to tech support vishing campaign]]></description><link>https://blog.moveontech.ai/p/why-you-have-open-a-ticket</link><guid isPermaLink="false">https://blog.moveontech.ai/p/why-you-have-open-a-ticket</guid><dc:creator><![CDATA[Joe Robertson]]></dc:creator><pubDate>Sun, 10 Aug 2025 20:17:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DbKV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3882a103-e85f-47ea-aa0d-1c270feb17cb_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DbKV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3882a103-e85f-47ea-aa0d-1c270feb17cb_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DbKV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3882a103-e85f-47ea-aa0d-1c270feb17cb_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!DbKV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3882a103-e85f-47ea-aa0d-1c270feb17cb_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!DbKV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3882a103-e85f-47ea-aa0d-1c270feb17cb_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!DbKV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3882a103-e85f-47ea-aa0d-1c270feb17cb_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DbKV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3882a103-e85f-47ea-aa0d-1c270feb17cb_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3882a103-e85f-47ea-aa0d-1c270feb17cb_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2181384,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.moveontech.ai/i/170630798?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3882a103-e85f-47ea-aa0d-1c270feb17cb_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DbKV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3882a103-e85f-47ea-aa0d-1c270feb17cb_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!DbKV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3882a103-e85f-47ea-aa0d-1c270feb17cb_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!DbKV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3882a103-e85f-47ea-aa0d-1c270feb17cb_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!DbKV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3882a103-e85f-47ea-aa0d-1c270feb17cb_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Opening a ticket to get help from IT can feel like the most annoying part of your day. You just want someone to pick up the phone, fix the problem, and let you get back to work. Instead, you are forced to fill out forms, describe the issue in detail, and wait for a reply. It can feel slow, bureaucratic, and completely unnecessary, until you understand the real reason behind it. More on that later.</p><p><strong>The Incident</strong></p><p>A recent disclosure by Google revealed that attackers successfully infiltrated a Google Salesforce environment, one user at a time.</p><p><strong>Credit where it&#8217;s due:</strong> <a href="https://cloud.google.com/blog/topics/threat-intelligence/voice-phishing-data-extortion">Google&#8217;s disclosure</a> was clear, detailed, and left little unanswered. The methods and motives of the attackers were well documented. This is how you disclose a breach in a thorough, airtight way, allowing your organization to move on.</p><p>The attack vector was not the most efficient, but it was effective. The threat actors used social engineering vishing calls, impersonating tech support. Once on the line, they convinced victims to launch a Salesforce data extractor, which enabled the download of a large portion of the environment, as outlined in the report.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BIiE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd510e3f0-8e27-4257-9104-55b8f963e350_1600x1039.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BIiE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd510e3f0-8e27-4257-9104-55b8f963e350_1600x1039.png 424w, https://substackcdn.com/image/fetch/$s_!BIiE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd510e3f0-8e27-4257-9104-55b8f963e350_1600x1039.png 848w, https://substackcdn.com/image/fetch/$s_!BIiE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd510e3f0-8e27-4257-9104-55b8f963e350_1600x1039.png 1272w, https://substackcdn.com/image/fetch/$s_!BIiE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd510e3f0-8e27-4257-9104-55b8f963e350_1600x1039.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BIiE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd510e3f0-8e27-4257-9104-55b8f963e350_1600x1039.png" width="1456" height="945" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d510e3f0-8e27-4257-9104-55b8f963e350_1600x1039.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:945,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BIiE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd510e3f0-8e27-4257-9104-55b8f963e350_1600x1039.png 424w, https://substackcdn.com/image/fetch/$s_!BIiE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd510e3f0-8e27-4257-9104-55b8f963e350_1600x1039.png 848w, https://substackcdn.com/image/fetch/$s_!BIiE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd510e3f0-8e27-4257-9104-55b8f963e350_1600x1039.png 1272w, https://substackcdn.com/image/fetch/$s_!BIiE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd510e3f0-8e27-4257-9104-55b8f963e350_1600x1039.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Leaking Salesforce data is not inherently disruptive to business operations, and scraping it one victim at a time is tedious. So why bother?</p><p><strong>Extortion.</strong> Salesforce data can include client lists, pipeline details, financial information, and more. The attackers were likely betting that some companies would pay a ransom to prevent public release or to have the stolen data deleted. While the ransom success rate may be low, the payouts from a single lucrative target can be significant if the stolen information is sensitive enough.</p><p>Google also noted that exfiltration attempts continued for months after the initial incidents. This suggests the attackers collect data from many organizations during a campaign, then sift through it later for the most valuable details.</p><p><strong>How can you prevent this kind of breach?</strong></p><p>Every breach is preventable with the right awareness and processes. Training users to recognize and resist fake tech support calls is critical. This is the reason IT insists on strict ticketing procedures. &#8220;We will not call you unless you open a ticket&#8221; is not just us being annoying; it is a safeguard for your company data. It is the last line of defense against an increasingly sophisticated AI powered vishing campaigns. </p>]]></content:encoded></item><item><title><![CDATA[Women's Dating App Breach Widens]]></title><description><![CDATA[Tea provided an updated disclosure notifying private messages were leaked]]></description><link>https://blog.moveontech.ai/p/womens-dating-app-breach-widens</link><guid isPermaLink="false">https://blog.moveontech.ai/p/womens-dating-app-breach-widens</guid><dc:creator><![CDATA[Joe Robertson]]></dc:creator><pubDate>Sun, 03 Aug 2025 01:46:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!FhVn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69938439-a0d9-4772-82af-0482551216df_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FhVn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69938439-a0d9-4772-82af-0482551216df_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FhVn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69938439-a0d9-4772-82af-0482551216df_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!FhVn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69938439-a0d9-4772-82af-0482551216df_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!FhVn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69938439-a0d9-4772-82af-0482551216df_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!FhVn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69938439-a0d9-4772-82af-0482551216df_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FhVn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69938439-a0d9-4772-82af-0482551216df_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/69938439-a0d9-4772-82af-0482551216df_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3110493,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.moveontech.ai/i/169964366?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69938439-a0d9-4772-82af-0482551216df_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FhVn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69938439-a0d9-4772-82af-0482551216df_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!FhVn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69938439-a0d9-4772-82af-0482551216df_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!FhVn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69938439-a0d9-4772-82af-0482551216df_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!FhVn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69938439-a0d9-4772-82af-0482551216df_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>One of the phrases I hate reading in breach disclosures is &#8220;at this time.&#8221; It&#8217;s a placeholder that sounds cautious but signals uncertainty. <a href="https://www.teaforwomen.com/cyberincident">In the latest update from Tea</a>, it shows up four times.</p><p><a href="https://blog.moveontech.ai/p/tea-dating-app-meant-to-protect-women">As I wrote last week</a>, the Tea dating app breach appears to have started with a legacy system, left online for compliance. They seemed confident that the data exposure was limited to that outdated system, not affecting newer users. That distinction mattered. It helped them avoid notifying their growing user base and kept the scope of the incident tightly controlled.</p><p>But yesterday, private message archives from a <a href="https://www.malwarebytes.com/blog/news/2025/07/tea-dating-advice-app-has-users-private-messages-disclosed">much newer database were leaked</a>.</p><p>These messages aren&#8217;t just metadata or email addresses. They contain deeply personal, private conversations. Some people are calling this a second breach. That might be true, but based on the timing and nature of the data, it&#8217;s more likely part of the same compromise.</p><p>Still, the company repeats: &#8220;At this time, we have found no evidence of access to other parts of our environment.&#8221;</p><p>This is the nightmare scenario in cybersecurity. You think you&#8217;ve contained the breach, and then something surfaces that tells you the hole is deeper than expected. The messages leaked yesterday will likely result in more disclosures and require additional explanation from the company. For this reason Tea is likely hoping this is the last time they need to update the disclosure. </p>]]></content:encoded></item><item><title><![CDATA[Tea Dating App Meant to Protect Women Just Became a Cautionary Tale]]></title><description><![CDATA[A breach of a women-only dating platform exposed private data to the dark web]]></description><link>https://blog.moveontech.ai/p/tea-dating-app-meant-to-protect-women</link><guid isPermaLink="false">https://blog.moveontech.ai/p/tea-dating-app-meant-to-protect-women</guid><dc:creator><![CDATA[Joe Robertson]]></dc:creator><pubDate>Sat, 26 Jul 2025 15:05:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Aw2N!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F054ceedd-9f02-46d6-ac4f-dd7a10f1a256_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Aw2N!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F054ceedd-9f02-46d6-ac4f-dd7a10f1a256_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Aw2N!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F054ceedd-9f02-46d6-ac4f-dd7a10f1a256_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Aw2N!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F054ceedd-9f02-46d6-ac4f-dd7a10f1a256_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Aw2N!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F054ceedd-9f02-46d6-ac4f-dd7a10f1a256_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Aw2N!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F054ceedd-9f02-46d6-ac4f-dd7a10f1a256_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Aw2N!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F054ceedd-9f02-46d6-ac4f-dd7a10f1a256_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/054ceedd-9f02-46d6-ac4f-dd7a10f1a256_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Aw2N!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F054ceedd-9f02-46d6-ac4f-dd7a10f1a256_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Aw2N!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F054ceedd-9f02-46d6-ac4f-dd7a10f1a256_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Aw2N!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F054ceedd-9f02-46d6-ac4f-dd7a10f1a256_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Aw2N!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F054ceedd-9f02-46d6-ac4f-dd7a10f1a256_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Oh boy. I wish I didn&#8217;t have to write about this one, but news is news.</p><p>For those who don&#8217;t know, there&#8217;s a social media app out there (female only) that lets users upload names and photos of men from dating apps or social media. That info gets cross-referenced with criminal records, marital status, and crowd-sourced stories from other women who have dated them.</p><p>Here&#8217;s an ad pulled from their website:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!KE4J!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb5b3f4-4f73-4f17-8d16-da81c85b6da8_1080x426.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!KE4J!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb5b3f4-4f73-4f17-8d16-da81c85b6da8_1080x426.png 424w, https://substackcdn.com/image/fetch/$s_!KE4J!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb5b3f4-4f73-4f17-8d16-da81c85b6da8_1080x426.png 848w, https://substackcdn.com/image/fetch/$s_!KE4J!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb5b3f4-4f73-4f17-8d16-da81c85b6da8_1080x426.png 1272w, https://substackcdn.com/image/fetch/$s_!KE4J!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb5b3f4-4f73-4f17-8d16-da81c85b6da8_1080x426.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!KE4J!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb5b3f4-4f73-4f17-8d16-da81c85b6da8_1080x426.png" width="1080" height="426" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dcb5b3f4-4f73-4f17-8d16-da81c85b6da8_1080x426.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:426,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!KE4J!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb5b3f4-4f73-4f17-8d16-da81c85b6da8_1080x426.png 424w, https://substackcdn.com/image/fetch/$s_!KE4J!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb5b3f4-4f73-4f17-8d16-da81c85b6da8_1080x426.png 848w, https://substackcdn.com/image/fetch/$s_!KE4J!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb5b3f4-4f73-4f17-8d16-da81c85b6da8_1080x426.png 1272w, https://substackcdn.com/image/fetch/$s_!KE4J!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb5b3f4-4f73-4f17-8d16-da81c85b6da8_1080x426.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I&#8217;m not going to get into the problems with online dating or the ethics of what this app is doing. This is a cybersecurity blog. But the reality is, the service Tea offers is controversial. Most apps are focused on defending against threat actors who want to steal data for profit. Apps like this also have to defend against people who attack for fun, to make a point, or just because they can.</p><p>And someone just did exactly that.</p><h3>The Breach</h3><p>Tea was recently breached. Selfie photos and government IDs of the women using the app were leaked online. The very people the app was built to protect.</p><p>This wins the award of being the first disclosure I&#8217;ve seen coming from a <a href="https://www.tiktok.com/@theteapartygirls/photo/7531218170422594829?_r=1&amp;_t=ZT-8u4xxKx4i4s">TikTok post</a>. Not a news outlet, not a press release. You can only find the <a href="https://www.teaforwomen.com/cyberincident">website link to the disclosure</a> from their TikTok post.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1bFP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0d60e37-9219-4a0e-8253-231c256d172e_899x874.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1bFP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0d60e37-9219-4a0e-8253-231c256d172e_899x874.png 424w, https://substackcdn.com/image/fetch/$s_!1bFP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0d60e37-9219-4a0e-8253-231c256d172e_899x874.png 848w, https://substackcdn.com/image/fetch/$s_!1bFP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0d60e37-9219-4a0e-8253-231c256d172e_899x874.png 1272w, https://substackcdn.com/image/fetch/$s_!1bFP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0d60e37-9219-4a0e-8253-231c256d172e_899x874.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1bFP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0d60e37-9219-4a0e-8253-231c256d172e_899x874.png" width="899" height="874" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b0d60e37-9219-4a0e-8253-231c256d172e_899x874.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:874,&quot;width&quot;:899,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1bFP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0d60e37-9219-4a0e-8253-231c256d172e_899x874.png 424w, https://substackcdn.com/image/fetch/$s_!1bFP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0d60e37-9219-4a0e-8253-231c256d172e_899x874.png 848w, https://substackcdn.com/image/fetch/$s_!1bFP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0d60e37-9219-4a0e-8253-231c256d172e_899x874.png 1272w, https://substackcdn.com/image/fetch/$s_!1bFP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0d60e37-9219-4a0e-8253-231c256d172e_899x874.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>What Went Wrong?</h3><p>The root cause is one I&#8217;ve seen too many times: an old archive system. It&#8217;s no longer tied to revenue, so no one prioritizes securing it. But they keep it online anyway, for the sake of compliance&#8230;but is that really necessary?</p><p>Just because you&#8217;re required to store data for legal reasons doesn&#8217;t mean it has to be online and accessible at all hours of the day for the rest of time. It doesn&#8217;t. Archive it properly. Store it offline. Bring it back only when a formal legal request comes in. What you shouldn&#8217;t do is leave it sitting on a live server forever just so you can run a report when needed.</p><p>My guess is that&#8217;s what happened here.</p><p>And now, all the personal info meant to be protected is sitting in one central place. That central place got breached. Now that data is out there, and it&#8217;s easy to use for the wrong reasons.</p><h3>Will Tea Recover?</h3><p>Probably.</p><p>We still have a long way to go when it comes to cybersecurity. But not if consumers don&#8217;t care.</p><p>The top comment on that TikTok expresses my concerns.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xOtk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe336fd03-d415-4928-8a8b-9dcfc229e084_488x704.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xOtk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe336fd03-d415-4928-8a8b-9dcfc229e084_488x704.png 424w, https://substackcdn.com/image/fetch/$s_!xOtk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe336fd03-d415-4928-8a8b-9dcfc229e084_488x704.png 848w, https://substackcdn.com/image/fetch/$s_!xOtk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe336fd03-d415-4928-8a8b-9dcfc229e084_488x704.png 1272w, https://substackcdn.com/image/fetch/$s_!xOtk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe336fd03-d415-4928-8a8b-9dcfc229e084_488x704.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xOtk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe336fd03-d415-4928-8a8b-9dcfc229e084_488x704.png" width="488" height="704" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e336fd03-d415-4928-8a8b-9dcfc229e084_488x704.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:704,&quot;width&quot;:488,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:88434,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.moveontech.ai/i/169307775?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe336fd03-d415-4928-8a8b-9dcfc229e084_488x704.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!xOtk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe336fd03-d415-4928-8a8b-9dcfc229e084_488x704.png 424w, https://substackcdn.com/image/fetch/$s_!xOtk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe336fd03-d415-4928-8a8b-9dcfc229e084_488x704.png 848w, https://substackcdn.com/image/fetch/$s_!xOtk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe336fd03-d415-4928-8a8b-9dcfc229e084_488x704.png 1272w, https://substackcdn.com/image/fetch/$s_!xOtk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe336fd03-d415-4928-8a8b-9dcfc229e084_488x704.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Want to read more about cybersecurity and data breaches?</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.moveontech.ai/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.moveontech.ai/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity in Mergers & Acquisitions]]></title><description><![CDATA[What happens when you plug two computer networks together?]]></description><link>https://blog.moveontech.ai/p/cybersecurity-in-mergers-and-acquisitions</link><guid isPermaLink="false">https://blog.moveontech.ai/p/cybersecurity-in-mergers-and-acquisitions</guid><dc:creator><![CDATA[Joe Robertson]]></dc:creator><pubDate>Tue, 22 Jul 2025 02:56:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!JcIM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1bd7052-b2b1-4406-84e3-3fec60d1dfe1_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><a href="https://blog.moveontech.ai/p/united-healthcare-group-breached">I recently wrote</a> about yet another subsidiary of United Healthcare Group that was breached in a cybersecurity incident. I thought I&#8217;d cover how difficult it is to secure companies that have grown through M&amp;A.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JcIM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1bd7052-b2b1-4406-84e3-3fec60d1dfe1_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JcIM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1bd7052-b2b1-4406-84e3-3fec60d1dfe1_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!JcIM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1bd7052-b2b1-4406-84e3-3fec60d1dfe1_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!JcIM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1bd7052-b2b1-4406-84e3-3fec60d1dfe1_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!JcIM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1bd7052-b2b1-4406-84e3-3fec60d1dfe1_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JcIM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1bd7052-b2b1-4406-84e3-3fec60d1dfe1_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c1bd7052-b2b1-4406-84e3-3fec60d1dfe1_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1693553,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.moveontech.ai/i/168916416?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1bd7052-b2b1-4406-84e3-3fec60d1dfe1_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JcIM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1bd7052-b2b1-4406-84e3-3fec60d1dfe1_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!JcIM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1bd7052-b2b1-4406-84e3-3fec60d1dfe1_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!JcIM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1bd7052-b2b1-4406-84e3-3fec60d1dfe1_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!JcIM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1bd7052-b2b1-4406-84e3-3fec60d1dfe1_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>If you work in corporate America, chances are mergers and acquisitions (M&amp;A) affect your work whether you want them to or not. At some point, a company becomes so successful that it saturates its growth opportunities in its core product. When that happens, the easiest way to add new revenue streams is often by acquiring or merging with another company rather than building something internally.</p><p>Every merger or acquisition includes a due diligence process to verify that the companies involved are what they claim to be. Among the many items reviewed is the cybersecurity posture of the target company. In an acquisition, this is typically a one-sided review. However, cybersecurity is rarely prioritized highly enough to stop a deal. It is unlikely that an M&amp;A transaction will fail solely because of cybersecurity risks.</p><p>That means if you are responsible for cybersecurity during the M&amp;A process, you should be prepared to make it work, one way or another.</p><p>After the deal closes, there is usually an &#8220;earn-out&#8221; period during which the acquired or merged company continues to operate as usual. During this time, security leaders from both organizations must work together to create a plan to merge the two networks and security operations into a single environment.</p><p>This is when gaps appear, and they can be costly if overlooked.</p><h3>Knowledge gaps</h3><p>One of the hard realities of M&amp;A is redundancy. When two companies combine, fewer staff are needed. Morale is often low during the transition, and employees who know they may be leaving are not always motivated to help. Knowledge transfers frequently leave holes, and it is not uncommon to discover a server or device months later that no one understands because the person who knew about it was let go. You cannot secure what you do not even know exists.</p><h3>Data gaps</h3><p>Even in well-run IT environments, documentation is rarely perfect. Do you have a full inventory of internal and external IP addresses? Are you confident that your vulnerability scans cover all of them? Can you produce an accurate list of servers and their patch statuses? How certain are you that the list is complete? Or will you stumble upon virtual machines that were forgotten? These are common issues that must be addressed during the integration.</p><h3>Technology gaps</h3><p>One company uses Gmail, while the other uses Microsoft 365. One side has Palo Alto firewalls, and the other uses Cisco. Eventually one approach has to prevail, but sometimes companies try to maintain both at least for a while. When technology stacks do not align, users and administrators both face a steep learning curve with unfamiliar tools and settings, which increases risk.</p><h3>Configuration standard gaps</h3><p>Even when two companies use the same technology, the way they configure it can be very different. Over time, each IT team develops its own practices, and administrators are often very opinionated about the &#8220;right way&#8221; to do things. To maintain strong security, consistent configuration standards need to be established and enforced. This can be challenging but is critical.</p><div><hr></div><p>When you look at many of the high-profile breaches in recent years, it is hard not to wonder how many were caused by weaknesses introduced during the M&amp;A process. Large organizations often have dozens of past acquisitions layered into their operations, each with its own IT department and its own bad habits. Without a disciplined approach to cybersecurity in M&amp;A, security hygiene can quickly erode.</p>]]></content:encoded></item><item><title><![CDATA[United HealthCare Group Breached (Again)]]></title><description><![CDATA[But do we really care?]]></description><link>https://blog.moveontech.ai/p/united-healthcare-group-breached</link><guid isPermaLink="false">https://blog.moveontech.ai/p/united-healthcare-group-breached</guid><dc:creator><![CDATA[Joe Robertson]]></dc:creator><pubDate>Sat, 19 Jul 2025 14:45:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Nao2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafcabdf2-d183-433c-967d-dc7451cb4166_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Nao2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafcabdf2-d183-433c-967d-dc7451cb4166_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Nao2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafcabdf2-d183-433c-967d-dc7451cb4166_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Nao2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafcabdf2-d183-433c-967d-dc7451cb4166_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Nao2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafcabdf2-d183-433c-967d-dc7451cb4166_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Nao2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafcabdf2-d183-433c-967d-dc7451cb4166_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Nao2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafcabdf2-d183-433c-967d-dc7451cb4166_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/afcabdf2-d183-433c-967d-dc7451cb4166_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1938423,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.moveontech.ai/i/168714197?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafcabdf2-d183-433c-967d-dc7451cb4166_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Nao2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafcabdf2-d183-433c-967d-dc7451cb4166_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Nao2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafcabdf2-d183-433c-967d-dc7451cb4166_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Nao2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafcabdf2-d183-433c-967d-dc7451cb4166_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Nao2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafcabdf2-d183-433c-967d-dc7451cb4166_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Fresh off being <a href="https://open.substack.com/pub/beyondthefirewall/p/guest-postmedicare-breach-disclosure?r=5tjhas&amp;utm_campaign=post&amp;utm_medium=web">featured in </a><em><a href="https://open.substack.com/pub/beyondthefirewall/p/guest-postmedicare-breach-disclosure?r=5tjhas&amp;utm_campaign=post&amp;utm_medium=web">Beyond The Firewall</a></em> for the Medicare breach disclosure, I went looking for a new breach to analyze. I can&#8217;t say I&#8217;m surprised, but once again we find ourselves in the healthcare industry. And once again it is a subsidiary of UnitedHealth Group (UHG) that has <a href="https://hackread.com/unitedhealth-health-tech-firm-episource-breach/">fallen victim to a cybersecurity incident</a> that exposed the personally identifiable information (PII) of millions of customers.</p><p>In 2024, <a href="https://www.twingate.com/blog/tips/United%20Healthcare-data-breach">another UHG subsidiary was breached</a> in a much more high-profile incident that received far more media attention. More on that later.</p><h2>The Disclosure: Timing and Gaps</h2><p><a href="https://oag.ca.gov/ecrime/databreach/reports/sb24-605327">The disclosure itself</a> offers little to analyze beyond the timeline and the notification process.</p><blockquote><p>&#8220;On February 6, 2025, we found unusual activity in our computer systems. We quickly took steps to stop the activity. We began investigating right away and hired a special team to help us. We also called law enforcement. We turned off our computer systems to help protect our customers and their patients and members. We learned that a criminal was able to see and take copies of some data in our computer systems. This happened between January 27, 2025 and February 6, 2025. To date, we are not aware of any misuse of the data.</p><p>What Information Was Involved: On April 23, 2025, we began informing customers about what specific data may have been involved. The data that may have been seen and taken was not the same for everyone and includes contact information (such as name, address, phone number, and email), plus one or more of the following:</p><p>&#8226; Health insurance data (such as health plans or policies, insurance companies, member or group ID numbers, and Medicaid, Medicare, or government payor ID numbers)<br>&#8226; Health data (such as medical record numbers, doctors, diagnoses, medicines, test results, images, care, and treatment)<br>&#8226; Other personal data such as date of birth&#8221;</p></blockquote><p>On February 6, UHG claims it identified and contained the breach. Over two months later, in April, it began informing affected customers. Yet it was not until this past week, nearly six months later, that the company made the breach public by filing disclosures with the states of Vermont and California. Further research suggests that other states may have received notifications as well.</p><h2>Why No SEC Filing This Time?</h2><p>During the 2024 breach, <a href="https://www.sec.gov/Archives/edgar/data/731766/000073176624000045/unh-20240221.htm">UHG filed an 8-K</a> with the SEC. This time, however, they only notified individual states. Why did they consider the 2024 breach significant enough to report to the SEC but not this 2025 incident, which involved data loss affecting 5.4 million patients?</p><p>The only plausible answer is that they did not believe it was &#8220;material.&#8221;</p><p>The SEC requires an 8-K filing for material cybersecurity events. To be fair to UHG, the rules around cybersecurity disclosures on Form 8-K are still new and vague. Some have even argued that these requirements should be <a href="https://www.investmentnews.com/fintech/rethink-cybersecurity-disclosure-rule-sifma-urges-sec/260669">eliminated or culled</a>. Notably, UHG even tried to walk back the materiality of the 2024 breach, despite the fact that it disrupted insurance payments and operations for weeks.</p><h2>What Does &#8220;Material&#8221; Really Mean?</h2><p>At its core, materiality means that investors need to know about an event because it impacts the company&#8217;s bottom line.</p><p>In the 2024 incident, UHG experienced widespread disruption. Systems were down and insurance payments were not being processed. That clearly affected operations and investor confidence.</p><p>But the 2025 incident? They &#8220;only&#8221; lost the personal information of 5.4 million patients.</p><p>No big deal, right?</p><h2>We Still Have a Long Way to Go. How Do We Fix Disclosures?</h2><p>Cybersecurity disclosures remain inadequate, not just in healthcare but across all industries. Accountability and transparency are still sorely lacking.</p><p>Only requiring disclosures when an incident threatens the stock price is not the right approach. For starters, only publicly traded companies fall under these disclosure requirements. Private companies are only required to notify states in the way UHG did for this breach. Don&#8217;t even get me started on small business and independent contractors. Many of whom possess very sensitive data. I&#8217;m looking at you attorneys and real estate agents.</p><p>I am not calling for heavy-handed regulation, and I respect the privacy of businesses. Disclosing every single incident across the board is neither reasonable nor feasible.</p><h2>The Question Is: Do You Really Care?</h2><p>Looking back, the uproar from the 2024 UHG incident was not because personal information was lost. It was because insurance payments were not being made. Yet we know that data for more than 100 million users was stolen.</p><p>If it had only been data for 100 million users, would it even have made the news outside of cybersecurity circles? Probably not.</p><p>That tells me that as a whole we have become numb to our personal data being stolen.</p><p>It does not have to be this way. But it will continue if we do not demand more accountability when handing over our data.</p>]]></content:encoded></item><item><title><![CDATA[Inside the Breach - CISO Edition]]></title><description><![CDATA[The Calm and the Chaos: A CISO&#8217;s Perspective]]></description><link>https://blog.moveontech.ai/p/inside-the-breach-ciso-edition</link><guid isPermaLink="false">https://blog.moveontech.ai/p/inside-the-breach-ciso-edition</guid><dc:creator><![CDATA[Joe Robertson]]></dc:creator><pubDate>Mon, 14 Jul 2025 22:57:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!6F9d!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7875da5a-3802-4b69-9b57-8abe94c660e3_1024x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6F9d!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7875da5a-3802-4b69-9b57-8abe94c660e3_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6F9d!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7875da5a-3802-4b69-9b57-8abe94c660e3_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!6F9d!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7875da5a-3802-4b69-9b57-8abe94c660e3_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!6F9d!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7875da5a-3802-4b69-9b57-8abe94c660e3_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!6F9d!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7875da5a-3802-4b69-9b57-8abe94c660e3_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6F9d!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7875da5a-3802-4b69-9b57-8abe94c660e3_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7875da5a-3802-4b69-9b57-8abe94c660e3_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3344522,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.moveontech.ai/i/168342834?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7875da5a-3802-4b69-9b57-8abe94c660e3_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6F9d!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7875da5a-3802-4b69-9b57-8abe94c660e3_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!6F9d!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7875da5a-3802-4b69-9b57-8abe94c660e3_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!6F9d!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7875da5a-3802-4b69-9b57-8abe94c660e3_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!6F9d!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7875da5a-3802-4b69-9b57-8abe94c660e3_1024x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Not all days in cybersecurity are exciting. This is especially true in the case of leadership positions. Gone are the days of fixing vulnerabilities, responding to SOC alerts, otherwise generally being responsible for pressing the buttons to make the environment more secure. In leadership, these tasks are replaced by reviewing reports, assessing trends, and working with counsels to ensure we can agree to the security requirements of a new client contract. These can be tedious days. This all changes the moment you are breached.</p><p>You were hopeful this day would never come but now that it has you instantly become the center of attention for the entire company. No time to stress, this is what they paid you for. You call your family and tell them you&#8217;ll be working late knowing that late probably means through the night. Until the situation is contained and systems are back online, it&#8217;s a difficult situation to excuse yourself from.</p><p>When will we be back online?<br>How did it happen?<br>Do you know what they took?</p><p>These are all questions you will be asked multiple times and you will likely not have answers to all of them. All you can do is work with the information you have at the moment and follow your incident response plan. You communicate clearly, even if the answer is &#8220;we don&#8217;t know yet,&#8221; and you keep everyone focused on the process: contain, eradicate, recover, and learn. Staying calm under pressure and projecting confidence, even in uncertainty, is your most critical contribution. Every decision is scrutinized, and how you handle these moments will define how your leadership is remembered.</p><p>During the height of a breach, the CISO becomes the anchor in a storm of chaos. You are not just managing a technical incident&#8230;you&#8217;re managing people, expectations, and fear. Your role shifts into that of a crisis manager: coordinating teams, briefing executives, keeping stakeholders informed without creating panic. You have to translate technical realities into business impacts in real time, often while making tough calls with incomplete data. The hours blur together, but you maintain discipline, ensuring logs are collected, decisions are documented, and the narrative stays under control. You are the one who ensures the company has a fighting chance to emerge intact.</p><p>The end of the breach allows the company to move on from the issue but your job may continue for several more weeks if not months. Does someone need to be held accountable? I often find breaches are a result of oversight or failure to enforce policy. What information was lost and what is our responsibility to our clients for notification? You will work through all the intense details of the breach with your legal counsel to ensure that your message is accurate while limiting exposure. And of course, you take the necessary steps to ensure this does not happen again.</p><p>Cybersecurity leadership is hard. And breach is a humbling experience that will teach you this quickly.</p>]]></content:encoded></item><item><title><![CDATA[Inside the Breach - CLO Edition]]></title><description><![CDATA[Writing statements, assessing materiality, and meeting disclosure obligations under pressure]]></description><link>https://blog.moveontech.ai/p/inside-the-breach-clo-edition</link><guid isPermaLink="false">https://blog.moveontech.ai/p/inside-the-breach-clo-edition</guid><dc:creator><![CDATA[Joe Robertson]]></dc:creator><pubDate>Wed, 09 Jul 2025 17:24:01 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!0IEz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa59c9b44-eb49-4d7b-a7bf-b414ab03b424_1024x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0IEz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa59c9b44-eb49-4d7b-a7bf-b414ab03b424_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0IEz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa59c9b44-eb49-4d7b-a7bf-b414ab03b424_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!0IEz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa59c9b44-eb49-4d7b-a7bf-b414ab03b424_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!0IEz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa59c9b44-eb49-4d7b-a7bf-b414ab03b424_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!0IEz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa59c9b44-eb49-4d7b-a7bf-b414ab03b424_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0IEz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa59c9b44-eb49-4d7b-a7bf-b414ab03b424_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a59c9b44-eb49-4d7b-a7bf-b414ab03b424_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2625487,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.moveontech.ai/i/167923978?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa59c9b44-eb49-4d7b-a7bf-b414ab03b424_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0IEz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa59c9b44-eb49-4d7b-a7bf-b414ab03b424_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!0IEz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa59c9b44-eb49-4d7b-a7bf-b414ab03b424_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!0IEz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa59c9b44-eb49-4d7b-a7bf-b414ab03b424_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!0IEz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa59c9b44-eb49-4d7b-a7bf-b414ab03b424_1024x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div data-attrs="{&quot;url&quot;:&quot;file:///C:/Users/iam1s/Downloads/ChatGPT%20Image%20Jul%209,%202025,%2012_21_41%20PM.png&quot;}" data-component-name="AssetErrorToDOM"><picture><img src="/img/missing-image.png" height="455" width="728"></picture></div><p>Now that I have addressed the <a href="https://substack.com/home/post/p-167662390">Medicare disclosure</a>, let&#8217;s return to the <em>Inside the Breach</em> series. Today, we examine the Chief Legal Officer&#8217;s (CLO) role during a cybersecurity breach.</p><p>Outside of the CISO, no executive may have a more immediate and impactful role during a breach than the Chief Legal Officer.</p><h2>On the Clock from the Start</h2><p>If a cybersecurity breach is disruptive enough, the outside world will notice quickly. From the moment the news breaks, the CLO must work with PR to craft a statement that acknowledges the disruption, updates stakeholders on the progress of restoring services, and reassures investors.</p><p>In the early hours or days of the breach, details are often unclear, and rumors of worst-case scenarios may already be spreading. Even so, a statement still needs to be written based on the facts you have at hand.</p><h2>Navigating Legal Obligations</h2><p>As more details come in, the CLO moves quickly into action. Reviewing client contracts to determine breach notification requirements, meeting with company leadership to assess the materiality of the breach, and, if the company is publicly traded, preparing to file an 8-K disclosure with the SEC all become priorities.</p><p>These steps require both speed and precision because mistakes at this stage can erode trust and increase legal risk.</p><h2>Closing the Loop</h2><p>Once the investigation is complete and all facts are known, it is time to draft the final notifications. The 8-K filing becomes part of the public record, explaining the breach and its impact. In addition, every affected client must be formally notified, often within strict regulatory deadlines.</p><h2>Why the CLO Matters</h2><p>The CLO plays a critical role throughout the breach. Writing accurate statements that stand up to both legal and technical scrutiny is a challenge that cannot be underestimated.</p><p>This is why I offer a consulting service specifically designed for general counsels and law firms, helping them respond to breaches with confidence and clarity.</p>]]></content:encoded></item><item><title><![CDATA[Medicare Data Breach Preview]]></title><description><![CDATA[Article coming soon]]></description><link>https://blog.moveontech.ai/p/medicare-data-breach-preview</link><guid isPermaLink="false">https://blog.moveontech.ai/p/medicare-data-breach-preview</guid><dc:creator><![CDATA[Joe Robertson]]></dc:creator><pubDate>Thu, 03 Jul 2025 17:40:37 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/167457995/9b156ed31dd57323c672fc98a829d6f1.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>I went looking for breach news the other day and saw Medicare made a disclosure. I would like to know that the source of the external information has been contained.</p>]]></content:encoded></item><item><title><![CDATA[Inside the Breach - CHRO/CPO Edition]]></title><description><![CDATA[Performance, Policy, and People: HR&#8217;s Overlooked Role in Cyber Incidents]]></description><link>https://blog.moveontech.ai/p/inside-the-breach-chrocpo-edition</link><guid isPermaLink="false">https://blog.moveontech.ai/p/inside-the-breach-chrocpo-edition</guid><dc:creator><![CDATA[Joe Robertson]]></dc:creator><pubDate>Tue, 01 Jul 2025 14:29:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!dLC_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57fc4261-fb81-4244-84a8-50cf31f92db9_1024x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dLC_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57fc4261-fb81-4244-84a8-50cf31f92db9_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dLC_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57fc4261-fb81-4244-84a8-50cf31f92db9_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!dLC_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57fc4261-fb81-4244-84a8-50cf31f92db9_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!dLC_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57fc4261-fb81-4244-84a8-50cf31f92db9_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!dLC_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57fc4261-fb81-4244-84a8-50cf31f92db9_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dLC_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57fc4261-fb81-4244-84a8-50cf31f92db9_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/57fc4261-fb81-4244-84a8-50cf31f92db9_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dLC_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57fc4261-fb81-4244-84a8-50cf31f92db9_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!dLC_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57fc4261-fb81-4244-84a8-50cf31f92db9_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!dLC_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57fc4261-fb81-4244-84a8-50cf31f92db9_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!dLC_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57fc4261-fb81-4244-84a8-50cf31f92db9_1024x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>While the HR department may not be the first phone call during a cybersecurity breach, it undoubtedly has a vital role to play.</p><p><strong>Operational Disruption</strong></p><p>During a breach, critical systems may be taken offline. Employees may find themselves unable to perform their duties or meet performance objectives. As the lead HR representative, you may need to collaborate with management to revise performance metrics, ensuring fairness in light of the disruption.</p><p><strong>Employee Support and Well-Being</strong></p><p>On the technology side, your IT or Security team may be working long hours, possibly for several days straight, trying to contain the incident and restore systems. If team members have worked 48 hours without rest, how should that be reflected in time-off policies? HR must consider how to recognize their efforts, support recovery, and ensure compliance with labor guidelines and well-being standards.</p><p><strong>Policy Violations and Accountability</strong></p><p>If the breach resulted from a policy or procedural violation, HR may need to be involved in the investigation and any disciplinary action. Did the responsible employee complete the required security awareness training? Was the breach caused by an honest mistake, or was company policy intentionally circumvented? HR must help answer these questions with objectivity and consistency.</p><p><strong>When IT Is the Source</strong></p><p>What if the breach originated within the IT department? If an employee with elevated access violated policy, HR must manage the delicate balance of supporting the investigation while continuing to work with the department to restore systems. This requires coordination with legal, compliance, and leadership teams.</p><p><strong>HR's Role in Crisis Management</strong></p><p>These are just a few of the complex challenges HR may face during a cybersecurity breach. Such events often create unprecedented and uncomfortable situations, requiring HR to act with flexibility, sound judgment, and a clear understanding of both employee and organizational needs.</p>]]></content:encoded></item><item><title><![CDATA[Presenting to the Board on Cybersecurity]]></title><description><![CDATA[Keep it Simple!]]></description><link>https://blog.moveontech.ai/p/presenting-to-the-board-on-cybersecurity</link><guid isPermaLink="false">https://blog.moveontech.ai/p/presenting-to-the-board-on-cybersecurity</guid><dc:creator><![CDATA[Joe Robertson]]></dc:creator><pubDate>Sat, 28 Jun 2025 17:26:41 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/167055306/474682c8145f470e1b5d38f4956451b5.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>You don&#8217;t need to light the world on fire when presenting to the board. Know your audience and keep it simple and non-technical.</p>]]></content:encoded></item><item><title><![CDATA[Inside the Breach: CFO Edition]]></title><description><![CDATA[Balancing crisis costs, regulatory risk, and boardroom expectations]]></description><link>https://blog.moveontech.ai/p/inside-the-breach-cfo-edition</link><guid isPermaLink="false">https://blog.moveontech.ai/p/inside-the-breach-cfo-edition</guid><dc:creator><![CDATA[Joe Robertson]]></dc:creator><pubDate>Thu, 26 Jun 2025 20:41:45 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!cT8a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a6bd6fe-13ea-4095-be23-a1ba2d85dcdb_1024x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cT8a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a6bd6fe-13ea-4095-be23-a1ba2d85dcdb_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cT8a!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a6bd6fe-13ea-4095-be23-a1ba2d85dcdb_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!cT8a!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a6bd6fe-13ea-4095-be23-a1ba2d85dcdb_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!cT8a!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a6bd6fe-13ea-4095-be23-a1ba2d85dcdb_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!cT8a!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a6bd6fe-13ea-4095-be23-a1ba2d85dcdb_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cT8a!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a6bd6fe-13ea-4095-be23-a1ba2d85dcdb_1024x1536.png" width="236" height="354" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1a6bd6fe-13ea-4095-be23-a1ba2d85dcdb_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:236,&quot;bytes&quot;:2753305,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.moveontech.ai/i/166926484?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a6bd6fe-13ea-4095-be23-a1ba2d85dcdb_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cT8a!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a6bd6fe-13ea-4095-be23-a1ba2d85dcdb_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!cT8a!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a6bd6fe-13ea-4095-be23-a1ba2d85dcdb_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!cT8a!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a6bd6fe-13ea-4095-be23-a1ba2d85dcdb_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!cT8a!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a6bd6fe-13ea-4095-be23-a1ba2d85dcdb_1024x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Many organizations have their top IT position reporting to the CFO. If that&#8217;s you, as the CFO, you now carry the significant burden of leading during a cybersecurity breach.</p><p>Already deeply involved in risk management, the CFO must continuously assess threats based on technical feedback from the IT team. Questions arise rapidly:</p><ul><li><p>Can we recover?</p></li><li><p>Should we consider paying the ransom?</p></li><li><p>How much will downtime affect revenue?</p></li></ul><p>These are just a few of the high-stakes decisions you must confront. As the person closest to the CEO with direct insight into the IT team&#8217;s latest updates, you play a critical role in real-time decision-making. Meanwhile, calls with legal counsel start piling up as you assess potential fines and SEC reporting obligations.</p><p>As you begin to emerge from the crisis, you recognize a fiduciary duty to shareholders: preventing this from ever happening again. This typically leads to unplanned spending to patch the vulnerabilities that allowed the breach. Cybersecurity consultants may seize the moment, proposing solutions that significantly increase your technology spend.</p><p>You trust your IT team, but the technical details behind the breach are complex. You are not convinced the root cause was the absence of certain tools. Your instincts to protect the organization&#8217;s budget are valid. In many cases, breaches stem from failures in policy or procedure rather than missing technology. Every improvement in tooling helps, but you will remain vulnerable if you do not first address weaknesses in governance.</p><p>That is where I come in at MoveOn. I help identify the policy and procedural gaps that led to breaches, ensuring the fundamentals are solid before you commit to expensive new tools.</p>]]></content:encoded></item><item><title><![CDATA[Inside the Breach: CEO Edition]]></title><description><![CDATA[First reactions, tough calls, and leading through chaos.]]></description><link>https://blog.moveontech.ai/p/inside-the-breach-ceo-edition</link><guid isPermaLink="false">https://blog.moveontech.ai/p/inside-the-breach-ceo-edition</guid><dc:creator><![CDATA[Joe Robertson]]></dc:creator><pubDate>Wed, 25 Jun 2025 13:14:33 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!_fnx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F126985d3-ccad-4e23-8152-e837562f3fa4_1024x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_fnx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F126985d3-ccad-4e23-8152-e837562f3fa4_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_fnx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F126985d3-ccad-4e23-8152-e837562f3fa4_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!_fnx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F126985d3-ccad-4e23-8152-e837562f3fa4_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!_fnx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F126985d3-ccad-4e23-8152-e837562f3fa4_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!_fnx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F126985d3-ccad-4e23-8152-e837562f3fa4_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_fnx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F126985d3-ccad-4e23-8152-e837562f3fa4_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/126985d3-ccad-4e23-8152-e837562f3fa4_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3021146,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.moveontech.ai/i/166807411?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F126985d3-ccad-4e23-8152-e837562f3fa4_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_fnx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F126985d3-ccad-4e23-8152-e837562f3fa4_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!_fnx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F126985d3-ccad-4e23-8152-e837562f3fa4_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!_fnx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F126985d3-ccad-4e23-8152-e837562f3fa4_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!_fnx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F126985d3-ccad-4e23-8152-e837562f3fa4_1024x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em><strong>This is a series on what it looks like behind the scenes for corporate roles during a cybersecurity breach.</strong></em></p><p>Maybe you&#8217;ve seen news articles written about cybersecurity breaches and the outages and data loss that come along with them. But did you ever wonder what goes on behind closed doors at the executive level of companies? Each company should have an incident response plan that defines what happens. But those plans don&#8217;t prepare you for the stressful moments you will encounter.</p><p><strong>CEO</strong> &#8211; The CEO is pissed, first and foremost. They have a business to run, and getting the computers back online is not something that was on the agenda today. At the beginning of the breach, the CEO always has one question: How long will it take to fix? At this point, it doesn&#8217;t matter what data was lost if the company can&#8217;t make any money.</p><p>As the breach continues and the CEO meets with the other executives, they start to realize that this incident is now something that will have to be dealt with head-on. If the impact is customer-facing, the CEO may be getting calls and requests for private updates on the situation from clients.</p><p>The longer this continues, the harder the CEO&#8217;s job becomes. They know the company is on the clock in more ways than one, and not having answers for clients is not an option. The CEO will be requesting regular updates from technology leadership and will take a keen interest in their plan to bring systems back online, often with plenty of advice.</p><p>As hard as the CEO&#8217;s job is during the breach, it becomes even harder afterward. Now they have to win back the trust of all their customers. There may be media appearances and interviews, which means constantly working with the PR and legal teams. They also have to tend to the IT department and make sure the necessary changes to prevent this from happening again are actually implemented. That&#8217;s bandwidth they would rather use elsewhere, but putting this nightmare behind them becomes the top priority.</p><p><strong>Next Article: The CFO</strong></p>]]></content:encoded></item><item><title><![CDATA[Insider Threat Disclosure Review]]></title><description><![CDATA[Offshore contractors sell data to threat actors]]></description><link>https://blog.moveontech.ai/p/insider-threat-disclosure-review</link><guid isPermaLink="false">https://blog.moveontech.ai/p/insider-threat-disclosure-review</guid><dc:creator><![CDATA[Joe Robertson]]></dc:creator><pubDate>Tue, 24 Jun 2025 22:50:56 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/166767762/316eb03b1f2c932a3475967e22dd86c9.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>A financial company lost customer data due to multiple offshore contractors being bribed by a threat actor. I dive into their public disclosure and highlight some potential issues.</p>]]></content:encoded></item><item><title><![CDATA[Helping Executives Pinpoint True Root Cause in Cybersecurity]]></title><description><![CDATA[I look at an example of a common issue - missing backups]]></description><link>https://blog.moveontech.ai/p/helping-executives-pinpoint-true</link><guid isPermaLink="false">https://blog.moveontech.ai/p/helping-executives-pinpoint-true</guid><dc:creator><![CDATA[Joe Robertson]]></dc:creator><pubDate>Tue, 24 Jun 2025 01:11:43 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/166691115/65fcdf09d35f000bac11ab23e0d88ab6.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>This is an example of a service I provide company executives and law firms. I dive into a disclosure from the past to determine the true root cause of cybersecurity breaches or major outages. In this case it was no one was assigned to monitor or test backups.</p>]]></content:encoded></item><item><title><![CDATA[Backups Are Not Backups If You’ve Never Tried to Restore Them]]></title><description><![CDATA[Revisiting a 2017 GitHub Database Outage and the Lessons Learned]]></description><link>https://blog.moveontech.ai/p/backups-are-not-backups-if-youve</link><guid isPermaLink="false">https://blog.moveontech.ai/p/backups-are-not-backups-if-youve</guid><dc:creator><![CDATA[Joe Robertson]]></dc:creator><pubDate>Sat, 21 Jun 2025 16:00:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!PAHn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F709ea485-7c1d-4351-9996-60be1910402c_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PAHn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F709ea485-7c1d-4351-9996-60be1910402c_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PAHn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F709ea485-7c1d-4351-9996-60be1910402c_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!PAHn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F709ea485-7c1d-4351-9996-60be1910402c_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!PAHn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F709ea485-7c1d-4351-9996-60be1910402c_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!PAHn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F709ea485-7c1d-4351-9996-60be1910402c_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PAHn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F709ea485-7c1d-4351-9996-60be1910402c_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/709ea485-7c1d-4351-9996-60be1910402c_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PAHn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F709ea485-7c1d-4351-9996-60be1910402c_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!PAHn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F709ea485-7c1d-4351-9996-60be1910402c_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!PAHn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F709ea485-7c1d-4351-9996-60be1910402c_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!PAHn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F709ea485-7c1d-4351-9996-60be1910402c_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Backups are a bit of a lost art. I could write an entirely separate article on why that is, but that&#8217;s for another article. <a href="https://about.gitlab.com/blog/postmortem-of-database-outage-of-january-31/">Let&#8217;s revisit the GitHub outage of 2017</a>, read between the lines, and see what lessons we&#8217;ve learned from the chaos and the importance of backups and testing.</p><h3>To Be Fair To Github</h3><p>This incident took place in 2017, a very different time for data security and compliance. The level of transparency GitHub demonstrated during the outage was commendable, though it likely wouldn&#8217;t be legally advisable by today&#8217;s standards. Having been in similar situations myself, I have a lot of empathy for teams who sacrifice everything to restore systems. It&#8217;s both poor form and bad karma to be overly critical of our peers during moments like these. You&#8217;ve been there too. So, credit where it&#8217;s due: well done to the GitHub team for getting things back online, and apologies for featuring you in one of my articles.</p><h3>What Happened?</h3><p>On January 31, 2017, GitLab.com went offline for nearly 18 hours. An engineer trying to fix a database issue accidentally deleted data from the primary database server, thinking it was the backup server. As a result, a large amount of user data was permanently lost. This included around 5,000 projects, 5,000 comments, and 700 user accounts.</p><p><strong>Why didn&#8217;t backups save them?</strong></p><p>GitLab had multiple backup systems in place, but none of them worked when needed:</p><ul><li><p>Their main backup process, using a tool called pg_dump, had been failing silently for weeks due to a version mismatch. No one knew because the alert emails were being rejected by the mail server.</p></li><li><p>Live database replication had already failed before the incident.</p></li><li><p>Snapshot backups were either too old, too slow to use quickly, or not enabled at all for the most critical systems.</p></li></ul><p>In the end, the only usable backup was a manual snapshot made six hours earlier. Everything created after that point was permanently lost.</p><p><strong>What went wrong with recovery?</strong></p><p>Restoring the system took so long because the GitLab team had to copy hundreds of gigabytes of data across very slow cloud storage. That alone took 18 hours. To make matters worse, the recovery tools and instructions were incomplete or unclear, which caused further delays and uncertainty during a high-pressure situation.</p><h3>The Incident was not the issue</h3><p>The reason I like using this incident as an example is because the level of detail shared during the outage paints a clear picture of what really happens behind the scenes during a technology crisis. Whatever your disaster recovery plan was, if you even had one, you might find yourself tossing it out the window once you realize the procedure you wrote down doesn&#8217;t actually work in practice. That&#8217;s exactly what happened here, for a variety of reasons.</p><p>Put simply, the GitHub team had never tested a full recovery of their database environment before they were forced to. The incident was the result of both technical issues and human error. But if you work in technology, you have to expect that kind of thing. People make mistakes. Software has bugs. %#!@ happens. That&#8217;s why we have contingency plans.</p><p>Here are two questions every executive should be asking their technology teams:</p><ol><li><p><strong>If we lost everything, what does recovery look like?</strong></p></li><li><p><strong>When was the last time we tested that?</strong></p></li></ol><p>I can almost guarantee the first answer will be <em>&#8220;restore from backup&#8221;</em> and the second will be <em>&#8220;never.&#8221;</em></p><h3>Testing full recoveries is not so simple</h3><p>There are a number of problems with most backup architectures out there.</p><p><strong>Infrastructure is expensive</strong> &#8211; Whether it&#8217;s cloud or on-prem, I know more than one CFO who nearly had a heart attack at the cost of fully upgrading our core infrastructure, where backups must connect to. Premium storage capable of handling a live workload is a huge cost driver.</p><p><strong>Backup software can be even more expensive</strong> &#8211; I remember receiving a true-up bill from my backup software salesman after an infrastructure upgrade and thinking, <em>that&#8217;s more expensive than the hardware!</em> Now I had to go to an already-angry CFO and show him a new backup bill.</p><p><strong>Backup storage is slow</strong> &#8211; Our production storage is costing us a fortune, and our software costs are just as high. We have to start saving money somewhere, right? Buying the cheapest disk possible for backups is usually a no-brainer. Sure, it may take 3 to 5 days to perform your first full backup, but after that, deduplication takes over and it gets much faster. The problem is that you can afford to be patient with backups, but not with restores.</p><p><strong>You can&#8217;t test without being disruptive</strong> &#8211; Remember that infrastructure upgrade that made your CFO angry? Well, it&#8217;s sized appropriately and for growth. It is not sized to have a full copy of your backup restored alongside it for testing. In order to test without being disruptive, you need another copy of your infrastructure, completely separate.</p><h3>Don&#8217;t most companies require testing for compliance?</h3><p>Yes, testing is required, but the definition of a "test" is often determined by the organization itself. As technology engineers, we make do with what we have. A common way to test is through a partial recovery. This is typically done by restoring a much smaller portion of your environment, maybe a handful of servers or even a single database. As long as you're able to do that, you can meet the compliance requirements for most environments.</p><h3>What can be learned?</h3><p>How many organizations are in the position of never having tested a full recovery? If I had to guess, just looking at the Fortune 500, I would estimate 70 to 80 percent. But the real question is: how many executives in those organizations actually realize this?</p><p>If I take my technology cap off and put on my business hat, I really don&#8217;t want to deal with technology. I just want it to work and be secure. My interest in the details of our disaster recovery testing is low, and I assume my tech team has it handled. My interest in hearing about additional spend on technology is even lower.</p><p>Now, if I put my tech hat back on, I know that proposing a comprehensive disaster recovery testing plan is going to be a hard conversation. We will either need to increase spending to expand the backup and testing environment, or we will have to take production offline to make room for testing. That test could take days, because we bought the cheapest storage possible for our backups.</p><p>Neither side wants to have this conversation. And that is how we end up where 70 to 80 percent of companies are: with a partial disaster recovery test that does not resemble what recovery from a full-blown disaster would actually look like.</p><p>So we wing it when it happens, just like GitHub did.</p><h3>What can be done?</h3><p>Let&#8217;s assume we can&#8217;t fix the disconnect between the business side of the house and the tech side through better communication. We are tech people, after all, and not all of us are people persons.</p><p>Backups often fall outside the purview of cybersecurity and into IT operations. As a result, when it comes to compliance checks and audits, they are frequently overlooked. We tend to be far more concerned about preventing breaches than about recovering from them. This is a mistake. We need to assume a breach will eventually happen, and we must treat recovery as equally important as prevention.</p><p>Backups deserve more attention in both the NIST and ISO standards. A full recovery test requirement should be included in the controls. The scope of disaster recovery testing should not be left entirely to individual organizations to define.</p><p>On the legal side of the house, we should push for full recovery testing to be included in contract language.</p><p>One of the most important parts of securing your environment is putting into writing what secure actually means. Security is not just about prevention. It also means being able to recover from the worst-case scenario, and that capability must be documented and tested.</p>]]></content:encoded></item><item><title><![CDATA[The New Face of Social Engineering]]></title><description><![CDATA[Is your organization ready for AI Impersonation in Video Conferencing?]]></description><link>https://blog.moveontech.ai/p/the-new-face-of-social-engineering</link><guid isPermaLink="false">https://blog.moveontech.ai/p/the-new-face-of-social-engineering</guid><dc:creator><![CDATA[Joe Robertson]]></dc:creator><pubDate>Sat, 14 Jun 2025 18:02:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!fGF4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F256542f3-d50c-46ea-843f-49aa6fdd3573_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fGF4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F256542f3-d50c-46ea-843f-49aa6fdd3573_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fGF4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F256542f3-d50c-46ea-843f-49aa6fdd3573_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!fGF4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F256542f3-d50c-46ea-843f-49aa6fdd3573_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!fGF4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F256542f3-d50c-46ea-843f-49aa6fdd3573_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!fGF4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F256542f3-d50c-46ea-843f-49aa6fdd3573_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fGF4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F256542f3-d50c-46ea-843f-49aa6fdd3573_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/256542f3-d50c-46ea-843f-49aa6fdd3573_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Generated image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Generated image" title="Generated image" srcset="https://substackcdn.com/image/fetch/$s_!fGF4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F256542f3-d50c-46ea-843f-49aa6fdd3573_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!fGF4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F256542f3-d50c-46ea-843f-49aa6fdd3573_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!fGF4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F256542f3-d50c-46ea-843f-49aa6fdd3573_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!fGF4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F256542f3-d50c-46ea-843f-49aa6fdd3573_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>One of my talents is being able to see how technology evolves from its infancy to broader adoption. But as I heard Garth Brooks once say, <em>&#8220;For every blessing, there is a curse.&#8221;</em> Having this talent while working in cybersecurity means I often find myself worrying about how to defend against attacks before the rest of the world even sees them coming.</p><p>Having seen how effective phishing can be using nothing more than text, one of my biggest concerns now is <strong>AI impersonation during live video calls</strong>. I found one major example, <a href="https://www.cnn.com/2024/02/04/asia/deepfake-cfo-scam-hong-kong-intl-hnk">where a finance worker in Hong Kong transferred </a><strong><a href="https://www.cnn.com/2024/02/04/asia/deepfake-cfo-scam-hong-kong-intl-hnk">25 million dollars</a></strong><a href="https://www.cnn.com/2024/02/04/asia/deepfake-cfo-scam-hong-kong-intl-hnk"> during a video call with what he thought were co-workers and executives.</a></p><p>The most chilling part of the report:</p><blockquote><p>The elaborate scam saw the worker duped into attending a video call with what he thought were several other members of staff, but all of whom were in fact deepfake recreations, Hong Kong police said at a briefing on Friday.</p></blockquote><p>Imagine getting a meeting invite from a spoofed email address that appears to come from your boss. You join the call and see your manager and several colleagues, all speaking normally. What would you do?</p><p>I would like to believe I could spot subtle cues. Maybe the lack of micro-expressions or off cadence in speech. But the truth is, this technology is getting dangerously good.</p><h2>This Is Not Difficult to Do</h2><p>So how easy is it to pull this off? Let me walk you through a simple demo I created using <strong>ChatGPT</strong> and <strong>HeyGen</strong>.</p><p>In this case, I asked ChatGPT:</p><blockquote><p><em>"What is the single most important thing organizations can do to secure themselves in cybersecurity?"</em></p></blockquote><p>ChatGPT responded with a pretty good answer.</p><div class="native-video-embed" data-component-name="VideoPlaceholder" data-attrs="{&quot;mediaUploadId&quot;:&quot;8fbe746b-f1fa-40b7-a82b-e12e8382134b&quot;,&quot;duration&quot;:null}"></div><p>I then used HeyGen to clone my voice and mimic my behavior based on a video I recorded months ago. I pasted the AI-generated script into the HeyGen tool and produced a <strong>polished, believable video</strong> without speaking a single word into a microphone.</p><p>Now imagine this process happening in real time.</p><div class="native-video-embed" data-component-name="VideoPlaceholder" data-attrs="{&quot;mediaUploadId&quot;:&quot;a4437973-9a55-4d7f-8cba-565ddc17a1ef&quot;,&quot;duration&quot;:null}"></div><h2>Real Time AI Integration into Video Calls is the risk</h2><p>While my example was built manually, we are quickly moving toward <strong>real-time integration</strong>. Tools like ChatGPT are already being embedded into voice assistants and live chat platforms. Soon, we will see AI agents join video meetings, responding and adapting on the fly.</p><p>In the Hong Kong attack, the threat actor built an elaborate multi-person deepfake simulation. But they did not have to. A simpler approach would be to use an AI agent to <strong>join the meeting silently</strong>, just to <strong>listen in and collect intelligence</strong>.</p><p>There are already many legitimate services that do this for note-taking. I use one. But it is not a stretch to imagine those same tools being used by attackers.</p><h2><strong>How Companies Can Protect Themselves</strong></h2><p>Here are <strong>six practical strategies</strong> organizations should adopt right now:</p><h4>1. <strong>Implement Multi-Channel Verification for Sensitive Actions</strong></h4><p>If a request comes through video, confirm it via another medium. Require a phone call or secure messaging confirmation for tasks involving financial transfers or sensitive information.</p><h4>2. <strong>Lock Down Calendar Access and Meeting Links</strong></h4><p>Ensure calendars are not publicly indexed or visible. Disable "join before host" and always verify who is joining.</p><h4>3. <strong>Train Teams on Deepfake Awareness</strong></h4><p>Just like phishing simulations, run <strong>video-based social engineering drills</strong>. Teach employees how to question even familiar faces when high-stakes decisions are involved.</p><h4>4. <strong>Use Code Words or Security Phrases</strong></h4><p>For executive-level communication, establish internal passphrases or behavioral cues that AI would struggle to replicate. I&#8217;m sure many of my former colleagues and I would have some fun with this one!</p><p>This is far from a complete list but it&#8217;s a start. We&#8217;re entering a brave new world with AI being part of lives and our jobs. It&#8217;s best to prepare rather than react!</p>]]></content:encoded></item></channel></rss>