18 Burst results for "Mc Soft"
"mc soft" Discussed on Marketplace with Kai Ryssdal
"Even before president trump fired this country's top cyber security official last night for truthfully saying there was no fraud or software glitches that cost the president votes in the election. He lost even before that cybersecurity experts had been warning that the presidential transition period is a huge opportunity for hackers. Governments of course aren't alone in their vulnerabilities companies around the world. Continue to get hit by ransomware. Their computer systems infiltrated critical. Data locked up. ransom demanded. Funny thing happened not too long ago. Though one ransomware group took some of its proceeds and gave them to charity. Hackers maybe with a heart mono here's got about a month ago cyber security consultant brett callow at the firm mc soft emailed me a screen shot from the dark web. It showed the hacker group dark side posting receipts of ten thousand dollar donations to charities when for children the other for clean water. Nice stay said that play felt. It was only fair that they return some family that i had taken to charities have had you think kobuk is. We pleased tonight. It'll be held to change. Someone's life dark side talks to the public through blog posts in the dark web to be clear. This is a criminal outfit. But it's one of several trying to brand itself as on me sound a similar group which is not been named publicly recently hacked into a company locked up its data but then quickly reversed course. Investigators say the ransomware group responsible supplied decryption key. As soon as they would total. it's a hostile. This was in germany. Now bad people do seemingly good things in the offline world to this old newsreel shows men coming out of a depression era soup kitchen in chicago. Funded by the mobster. Al capone and so on a sunday and a very hot in japan. Violent organized crime groups gave sonam relief in twenty eleven and right now says social psychologists travaglino at the university of kent. Italian syndicates are providing pandemic aid. They're report from the europe which says the mafia in italy at the moment. Is this money. Supporting relation through the knockdowns. They ensure that everyone can eat. Travaglino says that kind of generosity serves the criminal enterprise by buying off the community the mafia the function around a rule. Which is the needs known as amish. Da which means rule of silence. You never report the police. they do. For example you never denounced them and that's really important for them to operate because they need the kind of level of public support and to get that support. Some cyber groups work to appear customer-friendly while committing their crimes. Like in that movie. La story from the ninety s. the two main characters chitchatting when a pleasant man with a gun approaches. Bob thank you very much. Cyber analysts catalysts. Act nice thinking that they're victims will come lee fork over the money. They have guaranteed response. Dawn's last services speedy polite that decryption to come with a guarantee that they will work. It's hard to know the actual motivations in any one particular case but atlanta more shot professor of cyber security at western sydney university in australia has interviewed many hackers in the course of her research when we were doing some interviews with people in in eastern europe than in russia the people in question perceived themselves to be like robin hood stealing from the rich to give to the poor. It's a way for crooks to appease their consciences she says in fact some even clean up and organiz victims files as they rip them off to be clear many are not buying this court. Altruism one nonprofit that the dark.
"mc soft" Discussed on 7 Layers
"Park to ransomware on the rice and in the news. Now that we have a deeper understanding of ransomware is prevent an attack. Going to look at the impact of ransomware as i mentioned before the wannacry attack resulted in nearly a billion dollars in damages in the span of only four days putting large financial burden on its victims. This financial impact victims can be devastating trend micro reports the average cost of a ransomware attack on business. His one hundred thirty three thousand dollars the same report estimated that ransomware attacks resulted in billion dollars in revenue for attackers twenty. Eighteen ransomware is big money for attackers in the industry continues to grow trend micro also reported over forty million attacks businesses between january twenty nineteen and april twenty nineteen. This growth trend has continued into twenty twenty. We saw a one hundred and forty eight percent increase in tax from march twenty. Twenty two april twenty twenty. This increase in tax doesn't just mean financial losses. Recent ransomware attacks have resulted in time loss to attack response in data recovery data leaks interference with healthcare education election systems and unfortunately death death. A september twenty twenty ransomware attack on hospital in germany resulted in the death of a patient. Though there is no explicit ransom. There was an extortion note left. The attack disrupted hospital systems for nearly a week. This systems ultimately crashed making patient data inaccessible due to this. The hospital transported emergency patients to different hospital. The woman's death was a result of this transfer though. This debt is the first reported. Death related to ransomware ransomware attacks on healthcare institutions aren't new mc soft reported seven hundred sixty four ransomware attacks against healthcare organizations in twenty nineteen weekend of september twenty fifth twenty twenty sources say.
"mc soft" Discussed on Risky Business
"Route of relevant components are compiled with stack cookies. And yes I've watched the statement is that this is going to be difficult to shell remotely. There's no word on whether or not like a local attack might have more options, which is you know for local could be worth considering perhaps but yeah, this is GonNa get a lot of people looking at this back because if you can make it work, you know you're going to be happy. That's really like Scorpio, from the from the Simpsons, I mean gentlemen I have the doomsday device. That point. That's all. Right, if Ip Stack Remote and we haven't seen one of those for a very long time ago bucket modular ABC's mom lost year or whatever but it doesn't really count. But. Yeah, it's a that's a that's a hell of a bog. Am I part of me wishes it was genuinely like straight up Codex excusable because. We love to see things burn a little bit sometimes. Now Yeah an explanation take. This is why we have at Amazon justification for all the work that's gone into exploit mitigation stuff over the years because it just saved your ass, a bunch trouble MC soft. So I guess good job there. Was a bunch other juicy bogs. Microsoft's patches this month turn either shape map of a shape bog does some hyper V. Blogs you? Good collections. GDI. Plus Aussie is that GONNA. Be like a nightmare to patches well because it's Included in all sorts. You're. GonNa get ironed, from. Third Party. EMP Editor. I mean. That's a good question. That's why. That kind of system. It can be really hard to tell whether it has been embedded component and stuff that remember when there was that really bad jd I bought years ago and they actually had to Microsoft, actually had to ship a tool that scan your system to see if it was on your box. I yeah, and it may well end up like we've seen that kind of thing with compression bugs Ed Lebron. James and things like that get compiled into stuff. So yeah, like those sorts of bugs deepened the graphics system and windows. Heaven the power really delivered the goods medic I'm sure all of your application.
"mc soft" Discussed on Security Now
"Looks like maybe just eyeballing it maybe eighty five percent were RDP. That down as a percentage can as eight. This makes is That big a problem. Yes, it is yes holy. and. These guys provide the raw data to back that up and it's windows RDP right? It's Microsoft Windows is a yes. Windows is one hundred percent RDP. and. So so email phishing did come up as a percentage which pushed the percentage of our DP down but it's holding it's own, and then of course, what happened in the Dow in Twenty Twenty and twenty? Well in the first and second quarters of two thousand twenty is due to that that Cova D- And the the the dramatic increase of hastily brought up RDP services in order to allow remote access s that began you know that essentially began fighting with with email phishing as an entry point. So those are the two but. Email phishing never even reached parody with RTP. It's it's it's gone up and down, but RDP is holding its own which I think is one of the one of the things that I it's GonNa spend some time talking about here in their report emphasis soft explained what's happened this year they said in recent months, organizations across every sector have come to rely heavily on remote desktop protocol to maintain business continuity while respecting social distancing and back up a little bit Leo, just to address your your your your comment remember that. There have been a series of really bad. Authentication problems with RTP. Don't they use VPN's and other solutions WHO's using? E. That's there are eighty, eight, hundred, thousand, eight, zero, thousand exposed RTP services on the Internet. It is absolutely crazy but they're just assuming that you know Oh. Yeah you know it must be secure because Microsoft says we can turn it on well. Microsoft said that once about Windows Printer and file sharing Cemil how that mean Barracuda in their ad says ninety one percent of all. ransomware attacks comes through a phishing email spear phishing emails, and everyone I heard about is a spear phishing email I can't imagine canon or carnival or any of these people's using RDP. That's crazy. In. In terms of number I'm sure it's the smaller guys that are deploying that technology that they need to. Anyway so so MC soft said however the rapid shift to remote. To remote working has also provided a unique opportunity.
"mc soft" Discussed on Security Now
"Garment Hack. Lawrence Abrams bleeping computer as we know, as always had a strong interest in ransomware. So I'm not surprised that his coverage of the Garmin ransomware attack was the most detailed of any I've seen nor that he's had access to some. Insiders who have reached out to provide him some extra tasty bits. Among. Other things an employee inside Garmon informed him that the initial ransom demand was for ten million dollars. Oh. Yeah. Holy Moly. Dead. Dead million dollars. Okay. We don't know what ransom was finally paid. But it seems more certain than ever. That Garmon did pay up Lawrence wrote. After a four day outage, Garmon suddenly announced that they were starting to restore services and it made us suspect that they paid the ransom to receive a decrypt her. then. Last Saturday. Lawrence posted today bleeping computer gained access to an execute, -able created by the garment it department to Decrypt a workstation and then install a variety of security software on the machine. Since wasted locker. That's the ransomware is an enterprise targeting ransomware with no known weaknesses in their encryption algorithm. Decrypt, her cannot be made for free. And remember that bleeping computer has has been sort of a focal point four. The less than well designed ransom. Where mistakes were found in the encryption which allowed for the creation of a no charge, dijk crypt door <hes> and those have been organized and are are and can be found through bleeping computer. So he said to obtain a working decryption key Garmon must have paid the ransom to the attackers and he said this is where he said is not known how much was paid, but as previously stated, an employee told bleeping computer that the original ransom demand was for ten million dollars. When extracted this restoration package? This is the one that they that they received. A copy of that had been prepared by garments it department. This. Restoration package includes various security software installers, a decryption key, a wasted locker decrypt door, and a script to run them all. When executed the restoration package, decrypt the computer and then preps the machine with security software. Garments stripped contains a time stamp of July Twenty Fifth Twenty Twenty, which indicates that the ransom was paid either on the twenty fourth or twenty fifth. Using the sample of wasted locker from the garment attack, that is the actual. The actual ransomware from the garment attack bleeping computer encrypted did a virtual machine. And tested the decrypt her to see if it would decrypt their files. He said in our test, the decrypt. Decrypt files. So Interesting was that the package received by bleeping computer included references to both the cyber security firm Ms Soft E.. M.. S., I S O. F T. R. M, m cysts, soft sorry. Emphasis soft, and the ransomware negotiations service cove wear. When bleeping computer subsequently reached out to cove where they were told that they do not comment on any ransomware incidents reported in the media. And similarly emphasise soft toll bleeping computer that they could not comment on any cases that they create decryption tools and are not involved in ransom payments. Brett callow a threat analyst at. Mc Soft said, I cannot comment on specific cases, but generally speaking emphasis soft has no involvement whatsoever in negotiating or transacting ransom payments. We simply create decryption tools. Okay. Now, that's interesting news. So it might seem odd for a reputable security firms such as m soft to to have anything to do with ransomware, but they have an interesting angle. As we know, the decryption side of the ransomware mess sometimes receives much less attention from the bad guys who need to create the decrypt her Dan, the encryption side. Consequently. The decrypt have tended historically to be buggy to crash or to for some reason, fail to fully undo the damage that they had originally done despite. Having, received a valid key. So that's where M soft comes in. They reverse engineer questionable ransomware decrypt. There's for which the decryption key is known. To create a more robust and reliable decrypt her for a victims systems. Emphasis soft ransomware recovery services, page states if the ransomware. If the ransom has been paid, but the attacker provided decrypt is slow or faulty. We can extract the decryption code and create a custom built solution that decrypt up to fifty percent faster with less risk of data damage or loss. So. This also explains why the decryption package garment finally used also contained legitimate security software. That extra security software along with improved decrypt, her may have been provided by emphasis soft or may have been. Put together by garments it. And of course, as we mentioned last week, now that evil corporate has been attributed as the creator of wasted locker and has been placed on the US sanctions list for using dry decks to cause more than one hundred, million dollars in financial damages. Paying this ransom could lead to hefty fines from the government. So do these sanctions sources familiar with cove where have told bleeping computer that the negotiation company has placed wasted locker on their own restricted list starting in early July and will not be handed handling negotiations for related attacks.
Garmin reportedly paid millions to resolve its recent ransomware attack
"Garment Hack. Lawrence Abrams bleeping computer as we know, as always had a strong interest in ransomware. So I'm not surprised that his coverage of the Garmin ransomware attack was the most detailed of any I've seen nor that he's had access to some. Insiders who have reached out to provide him some extra tasty bits. Among. Other things an employee inside Garmon informed him that the initial ransom demand was for ten million dollars. Oh. Yeah. Holy Moly. Dead. Dead million dollars. Okay. We don't know what ransom was finally paid. But it seems more certain than ever. That Garmon did pay up Lawrence wrote. After a four day outage, Garmon suddenly announced that they were starting to restore services and it made us suspect that they paid the ransom to receive a decrypt her. then. Last Saturday. Lawrence posted today bleeping computer gained access to an execute, -able created by the garment it department to Decrypt a workstation and then install a variety of security software on the machine. Since wasted locker. That's the ransomware is an enterprise targeting ransomware with no known weaknesses in their encryption algorithm. Decrypt, her cannot be made for free. And remember that bleeping computer has has been sort of a focal point four. The less than well designed ransom. Where mistakes were found in the encryption which allowed for the creation of a no charge, dijk crypt door and those have been organized and are are and can be found through bleeping computer. So he said to obtain a working decryption key Garmon must have paid the ransom to the attackers and he said this is where he said is not known how much was paid, but as previously stated, an employee told bleeping computer that the original ransom demand was for ten million dollars. When extracted this restoration package? This is the one that they that they received. A copy of that had been prepared by garments it department. This. Restoration package includes various security software installers, a decryption key, a wasted locker decrypt door, and a script to run them all. When executed the restoration package, decrypt the computer and then preps the machine with security software. Garments stripped contains a time stamp of July Twenty Fifth Twenty Twenty, which indicates that the ransom was paid either on the twenty fourth or twenty fifth. Using the sample of wasted locker from the garment attack, that is the actual. The actual ransomware from the garment attack bleeping computer encrypted did a virtual machine. And tested the decrypt her to see if it would decrypt their files. He said in our test, the decrypt. Decrypt files. So Interesting was that the package received by bleeping computer included references to both the cyber security firm Ms Soft E.. M.. S., I S O. F T. R. M, m cysts, soft sorry. Emphasis soft, and the ransomware negotiations service cove wear. When bleeping computer subsequently reached out to cove where they were told that they do not comment on any ransomware incidents reported in the media. And similarly emphasise soft toll bleeping computer that they could not comment on any cases that they create decryption tools and are not involved in ransom payments. Brett callow a threat analyst at. Mc Soft said, I cannot comment on specific cases, but generally speaking emphasis soft has no involvement whatsoever in negotiating or transacting ransom payments. We simply create decryption tools. Okay. Now, that's interesting news. So it might seem odd for a reputable security firms such as m soft to to have anything to do with ransomware, but they have an interesting angle. As we know, the decryption side of the ransomware mess sometimes receives much less attention from the bad guys who need to create the decrypt her Dan, the encryption side. Consequently. The decrypt have tended historically to be buggy to crash or to for some reason, fail to fully undo the damage that they had originally done despite. Having, received a valid key. So that's where M soft comes in. They reverse engineer questionable ransomware decrypt. There's for which the decryption key is known. To create a more robust and reliable decrypt her for a victims systems. Emphasis soft ransomware recovery services, page states if the ransomware. If the ransom has been paid, but the attacker provided decrypt is slow or faulty. We can extract the decryption code and create a custom built solution that decrypt up to fifty percent faster with less risk of data damage or loss. So. This also explains why the decryption package garment finally used also contained legitimate security software. That extra security software along with improved decrypt, her may have been provided by emphasis soft or may have been. Put together by garments it. And of course, as we mentioned last week, now that evil corporate has been attributed as the creator of wasted locker and has been placed on the US sanctions list for using dry decks to cause more than one hundred, million dollars in financial damages. Paying this ransom could lead to hefty fines from the government. So do these sanctions sources familiar with cove where have told bleeping computer that the negotiation company has placed wasted locker on their own restricted list starting in early July and will not be handed handling negotiations for related attacks.
"mc soft" Discussed on Security Now
"Using the sample of wasted locker from the garment attack, that is the actual. The actual ransomware from the garment attack bleeping computer encrypted did a virtual machine. And tested the decrypt her to see if it would decrypt their files. He said in our test, the decrypt. Decrypt files. So Interesting was that the package received by bleeping computer included references to both the cyber security firm Ms Soft E.. M.. S., I S O. F T. R. M, m cysts, soft sorry. Emphasis soft, and the ransomware negotiations service cove wear. When bleeping computer subsequently reached out to cove where they were told that they do not comment on any ransomware incidents reported in the media. And similarly emphasise soft toll bleeping computer that they could not comment on any cases that they create decryption tools and are not involved in ransom payments. Brett callow a threat analyst at. Mc Soft said, I cannot comment on specific cases, but generally speaking emphasis soft has no involvement whatsoever in negotiating or transacting ransom payments. We simply create decryption tools. Okay. Now, that's interesting news. So it might seem odd for a reputable security firms such as m soft to to have anything to do with ransomware, but they have an interesting angle. As we know, the decryption side of the ransomware mess sometimes receives much less attention from the bad guys who need to create the decrypt her Dan, the encryption side. Consequently. The decrypt have tended historically to be buggy to crash or to for some reason, fail to fully undo the damage that they had originally done despite. Having, received a valid key. So that's where M soft comes in. They reverse engineer questionable ransomware decrypt. There's for which the decryption key is known. To create a more robust and reliable decrypt her for a victims systems. Emphasis soft ransomware recovery services, page states if the ransomware. If the ransom has been paid, but the attacker provided decrypt is slow or faulty. We can extract the decryption code and create a custom built solution that decrypt up to fifty percent faster with less risk of data damage or loss. So..
"mc soft" Discussed on The CyberWire
"Say and their upcoming Asia Pacific and Japan Conference. Our guest today is Rsa. President Roh a guy with a preview of his conference keynote. Reality Check Cyber Security's story. The theme for the conference this year is the human element and I'd afflicted on what it is. That makes Suman you know I think the unique trade that humans have is that a storytelling species and as such I reflected on what the story of the cybersecurity industry is, and what impact it has in terms of the future of the industry, so that's sort of the thought process that led me do taking a storytelling perspective to the industry and the domain of cyber security. Can. You give us a little bit of a preview of some of the things you're planning to talk about. Absolutely the framing of the all talk. A story ARC equals to use the word. Is I talk about? I set it up I in terms of. Human Element being a theme for Cybersecurity, and why the human element is important, and the net of it is that while we obsess so much about the technology infrastructure that we are looking to protect in the cyber world. Intrinsically this is a very human john or we protect at the end of the day is the trust that we as humans have on technology and data. That's the end of the day will on our mission. So I. Think just framing the mission from a humanistic glance is the first thing that that I hit on? Next what I sit you know. The story on comprises of three episodes of will talk about the story. Be had in the industry. The story we have in terms of how we are, we are story today and close out with staying the story. We want germs hall. We should tell our story because way in my view the way you'd change. The few fugitive changed the world. Is, to, tell the story that you want to. I don the story. The story comes first the future. You Know I. IT strikes me that many of us together for the conference in San Francisco earlier this year, and and for imagine most of us. That was the last big. Get together that many of us had that was the last opportunity for the industry to really get together, and so much has changed in just a few months, since then I imagine that that must have played into your your thoughts. Here's. You were putting this presentation. Presentation together, absolutely indeed, it was top of mind, and you know the way I needed into. The story is like a block to a every great story has a blocked to as boy. We have a block to us in the last few months. Who would have thought at right on the heels of the San Francisco show the conference? We would all be Gordon. Dean shuttered ablaze, and and and of the world going through what has gone through. What I've reflected on my talk is some key learnings. What have we learnt through this global Amick that we've all been living through? And I've tried to draw inspiration you know in terms of those learnings into field of Cybersecurity, so that's sort of the overall flow of the talk that I. Intend to give. That's RSA President Rohit Guy. The RSA Asia Pacific and Japan Conference Kicks Off July Fifteenth. Freddie Mac the US Federal Home Loan Mortgage Corporation has disclosed data-breach. It's apparently a third party incident. Borrowers whose loans were serviced by one of Freddie Mac's due diligence. Vendors have received letters warning them of the breach. And Canada's Department of National Defence is continuing its investigation of last week's hacking incident. RMC The Royal Military College of Canada the Kingston Ontario College. That's the equivalent of the US. Military Academy at West Point or Britain's Royal Military College. At Sandhurst, the department of National Defence has said all early indications suggest this incident resulted from a mass phishing campaign. The financial, Post cites sources at the college is saying it was a ransomware attack. MC. Soft told the financial post that assuming it was ransomware. The gangs responsible were probably either d'appel payment or net walker, both of which steal data before they encrypt drives and submit their ransom demand net walker tends to add its victims to its public list, and then remove them once they begin negotiating payment, whereas d'appel paymbers style is not to disclose its victims until they refuse payment. Given that RMC hasn't shown up on anyone's list of victims yet. They're betting its d'appel Palmer. The Department of National Defence said that certain systems of the Canadian Defence Academy the Umbrella Organization for Canadian Military Education were also affected, but the locus of the attack was RMC who's networks have remained offline as a precaution. No classified information. The department says is at risk..
"mc soft" Discussed on Pro Rata
"Sporadic we'd take just ten minutes to get you smarter conclusion of Tech Business Politics under this show the FCC is message for facebook and possible space crash in Silicon Valley but first holding Holding cities ransom so last Friday the city government of New Orleans shutdown not at five. PM would normal Friday but hours earlier after the detection of a cyber attack in its municipal computer network but the city referred to as an abundance of caution resulted in all of its computer. Networks Internal and External Journal being taken off line city offices the physical ones were closed. And even the official New Orleans homepage unavailable now New Orleans officials say there is no evidence evidence that actual information was compromised but not all of it. Systems are back online. Yet and the overall episode reflects the vulnerabilities of city governments to cyber intrusions at a time time when more and more of their services including vital sometimes life saving information are being provided. Virtually one thing missing here from the New Orleans attack was a so called request for ransom. which is when a hacker demands money to put everything back to normal but ransomware attacks against US cities and towns are more common than you might think and often very difficult to navigate by the numbers here Barracuda Networks reported in September that fifty? US cities and towns had seen ransomware attack so far in two thousand nineteen and a more recent report from a company called MC soft puts the number north of one hundred and that latter report expands the figure to nine hundred fifty if you also include educational healthcare CARE systems now when it comes with how to deal with these attacks. There are no easy answers on the one hand. You don't want to encourage future intrusions by paying off the hackers but on the other hand the ransoms are often cheaper than not paying them and then having to fix the damage a lesson that many corporations have learned and begun to heed. The bottom line here is that what happened in New Orleans. Could well be coming to a city or town near you and it seems that the best possible solution in these cases at least for now is to pull the plug if fifteen seconds will go deeper with axios cities editor Kim heart but first this axios gives you the news and analysis. You need to get smarter faster. On the most important topics in our unique smart brevity grabbed format we cover topics from politics to science in media to tech subscribed to get smarter faster at sign-up Dot axios Dot Com and now back to the program podcast. We're joined now by axios. Cities Editor Kim heart do cities and other local government entities usually actually know when their systems systems are being attacked Not really in fact. The International City and County Management Association found that about thirty percent of local governments. Don't know how often their systems are attacked act and the ones that do know say that sixty percent or being attacked on a daily if not an hourly basis so they know they're being attacked they may not even know how often often though you look at the situation New Orleans and obviously we don't still know huge amount about the actual intrusion except say must have been more significant than probably you know some kid you know getting into the system because they decide to basically take everything off line from your perspective. was that prudent. In other words the New Orleans do the right thing kind of this abundance of caution strategy. Yeah I think probably so I mean I think the guidance coming out of federal and state governments is to if you see any sort of suspicious activity take everything down disconnect from the network and try to troubleshoot. It sounds like this. Troubleshooting is taking longer than they expected even as of an update on Nola dot com late last night. I'm an early this morning. A lot of systems are still down. Police are recording incidents manually. They had to put up a temporary website so that people could still do other city business and most of it is coming down to pen Henin paper and the city council meeting on Thursday is likely to be impacted as well so that suggests that they are expecting it to take upwards of a week to figure out what actually went down and how to fix it but I think in a city like New Orleans that's used to have had their fair share of disasters and emergencies to deal with. I think they are use. Used to going with the abundance of caution route in trying to be as careful as possible until a sniff out every corner is principally that these attacks both serious and not as serious areas are on the rise. Yes absolutely I think that cities and local and county governments are increasingly targets. I think hackers assume rightly or not that these city governments are lower staffed than corporations probably don't have as much. It and technically skilled workers who have a lot of cybersecurity training and knowledge on her up on all the latest trends and technological patches to help protect cities and systems from this kind of intrusion and so they're becoming easy targets corporations operations are definitely the top target because they have money and are often more willing to pay the ransomware attacks but they also have more talent and more skilled skilled workers to draw on to help guard their systems from these kinds of intrusions. So I think that one of the biggest problems that sitting in local governments are facing right now is that they just have a harder time recruiting recruiting and retaining the talent that they really need to help keep their systems secure in the most robust way you mentioned ransomware and let me ask about that. There's no indication there was a ransom request in this particular case in New Orleans Orleans but they often are an attack municipal systems and there seems to be a split philosophy. Here part of it is the whole. We don't negotiate with terrorists philosophy right. We can't pay ransom because if it gets out and becomes made public which it probably will because the payment from a public entity that's just going to encourage others to attack our system. The other argument is it often. It's cheaper to pay off the ransom. Rather than having to rebuild your entire system are either one of those philosophies seeming to win out right. Now you know it's really hard to say which one is winning out. I do think that there is evidence to show that the argument that if you pay a ransomware attacker than that just encourages that AH actively to continue experts out there have said well it's not really encouraging a market because the market's already there it's clear that the market is there in the increasing number of ransomware attacks however however for some cities the best response might be to pay the ransom than us the millions of dollars that would have been spent on recovering the systems after that to strengthen the cyber defenses before the the next attack so that they're more prepared going forward but a lot of cities Atlanta and Baltimore have been hit Baltimore chose not to pay the ransom and it might cost twenty million dollars to restore systems which is significantly more than what the ransom was in the first place I was like seventy five thousand dollars. Someone's really I think that there but but it really just depends on. I think what the city council decided to do. And what their particular resident base you know really feel strongly about since they you know their elected officials and they're trying to the citizens like what the federal role if any obviously we're talking here about local governments municipal government so we're talking about a lack of money and lack of technological resource is there federal role here and if so what is it i. I know there's apparently this call zero trust pilot program what can and should the federal government be doing. I think what the federal government is doing more of is trying to be be more of a resource for these governments. That just don't have the same amount of resources that the federal government does that mean for. The federal government also has a hard time compared to corporations of attracting the same amount of technical talent. But when you're talking about the intelligence community and essay and whatnot. They do have a huge amount of expertise to draw from and so the federal government is moving into the direction of zero. Trust as you mentioned and what that is it operates on the assumption that anything outside corporate network is a security risk a so anything anything that comes outside or even inside. That might be a little bit. Amiss is considered suspicious and at risk so administrators are using new precautions like end to end encryption multifactoral authentication identity access management and analytics to control access. No none of that probably sounds new to anyone who works in a corporation but it is still fairly new at the city level. And so but I think we're going to see more of is the federal government trying to not necessarily mandate specific activities like this but strongly encouraging it and providing more more and more training and resources so it sounds cities need to beef up but also keep a bunch of pen and paper handy if that doesn't Work Kim heart editor of cities. Thank you so much for joining us. Thank my final two right after this there is more news than ever before but these days it's harder than ever find it and to know what to trust axios. AM takes effort out of getting smart by synthesizing thing the ten stories. That will drive the day and telling you I. They matter subscribe at sign up dot axios DOT COM and now back to the podcast the final two and first of his facebook which may not have to wait long for new and very significant government regulation as first reported by The Wall Street Journal. The Federal Federal Trade Commission is considering immediate. Move to block the company from integrating the back end infrastructure of its three messaging platforms. which are facebook messenger her? What's APP and Instagram? Why this matters is that facebook's original decision to merge the three was viewed by some as a preemptive move against D C under the old mantra that it's harder to unwind merger once gets completed and facebook is desperately afraid of being forced to divorce? It's big blue APP from either of its sister. APPS so is racing facing to make them technologically inseparable now the FCC isn't yet commenting publicly but we're to move forward. It would have to do it this way. I ask for an injunction against against facebook in federal court and in court demonstrate to the judge that harm to consumers is likely if facebook proceeds with integration plans. The tricky part here will be improving harmed consumers given the facebooks products are free plan. Finally a company called Vector launch on Friday filed for chapter eleven bankruptcy protection which some view as the I possible crack in a recent boom small satellite launch companies vectored raised over ninety million dollars in venture capital funding since being formed in two thousand sixteen including leading by arguably the most venerated venture. Firm of all time sequoia capital but this past summer sequoia quietly decided to stop investing for the source saying that it felt vector was spending too much money and not meeting enough of its own projections. That decision may have led to two vectors lenders opting against providing new lines of credit thus leading to around around one hundred and fifty layoffs and the bankruptcy filing in short make your numbers for Lsu risk crashing. And we're done. Thanks for listening to my producers. Tim Show is Naomi Shaven. Have a great Barbie and Barney Backlash Day. And we'll be back tomorrow with another pro rata podcast..
"mc soft" Discussed on KDWN 720AM
"Eight seven seven D. O. C. D. A. L. I well I've our attitudes were supposed to be we do not deal with terrorists we do not give into terrorists will unfortunately an Alabama based health system had to pay all Packers because they were attacked in ransomware attack and it disrupted operations of three hospitals beginning on Tuesday morning this is going to assert a report by Tuscaloosa news it is closely follows an FBI warning that the number sophisticated attacks on businesses state local government is continuing to crime so basically climb so basically these ransomware attacks well I guess in crypt entire file systems and then attackers demand ransom payments usually a crypto currency by the correct description key and they say the last few years accord to Gizmodo turn it rains words had some businesses demanded big payouts and they are now probably one of the biggest targets of cyber security specialists in the Alabama incident medical seven hospitals in Tuscaloosa north port and finance were forced to switch to a manual paper system to track patient data while the systems were down all three hospitals had to diverge all but the most critical new patients to other area health care centers for the duration of the outage now we don't know how much was paid and you know the media does want to keep that under wraps because they don't want to incite other cyber criminals to do this but spokesman Brad fissures on Saturday morning that the company had teams working constantly to undo the damage and no patient information was compromised a data breach on Friday and AV medicine in Birmingham which hackers unsuccessfully tried to steal automatic payroll deposits appear to be unrelated wow the hackers trying to steal automatic payroll deposits well they could do anything I think not I mean they have the ability to do anything they say we work with law enforcement IT security experts to assess all options and executing the solution we felt in the best interest of our patients and in alignment with their health systems the mission now that is Fisher is I believe from the health system and I guess they're trying to explain why they gave it is a good purchasing a description key from the attackers to expedite system recovery and help ensure patient safety for envoys pretty reasons we'll be keeping confidential specific details about the investigation and according to what the attacker so the key confidential me they're not going to tell us what's going on so they say that the company is working with I. T. T. to use our own DCH backup files to rebuild certain system components after they obtain the decryption key so my concern is what did they have a back up system already did she will continue re directing patients other institutions in the meantime and this is a time intensive process so you know more about computers than I do all I know is that I am a medical office I had people trucks and we were starting to go electronic this was before I left to go teach we were starting to do the process of electronic I just was kind of overwhelmed with how our patient data will be kept safe you have to scan it into the system or by fax or by you know what when faxes come in like labs etcetera it gets up loaded but it gets upload into a system then you have to move the file and you know I'm like wait a second you know can my staff actively screw up and if they don't put the lab in with the file how will I know and be an old school I found the whole computer process very intimidating where if I can't look at my labs and I can't identify what's wrong you know what what if I can't you know at at a hit of a button see everything I need to just get the paper and so we basically aborted the electronic health record process a few times before we finally agreed to start doing it and I I didn't like it I just I didn't like it and I just didn't know how secure it was going to be I thought the V. mistakes you know I thought that a file would get into the system and if I didn't see it if it wasn't put in a file to be read by the doctor that it would never get looked at and you know a lot of lawsuits that happen out there it's not so much because the doctor is stupid or the doctor you know we didn't know who his or her medicine it's they never got to look at a lab so the lab was abnormal and it sat there somewhere so I didn't want that in a computer savvy and I can't say how many patients call me saying I haven't heard back my doctor did labs I have her back now many EHR systems are a little bit more sophisticated where they will flag account or they'll be in alarm all they see these are on red labs but again you can have a rogue employee going I want to get out of here on Friday let me just move them over I don't know and so you know at least with paper I could say you know what just reprint everything just reprint collapse and I could just look at the labs which is what I used to do I used to look directly at the labs that I would look at them to get on the charts and I was double do because I didn't want to miss anything so you know we should we pay out these ransomware attackers brick callow spokesman for cyber security firm M. S. M. C. M. so soft told Gizmodo pale to the fuel the drive ransomware tax the only way to stop attacks is to make them unprofitable that isn't to say impacted entity should never pay and it was like a hospital may have little choice in the matter but rather that they should bolster their security to avoid being a packed in the first place so most hospitals have great security systems isn't that the security is a good enough is that whatever system you think you have that is the best of the best ends up not actually a bean five months down the line over a year down the line and you know most security systems you drafted up the level of the sorcerers as we have an update to keep updating just like anti virus you guys like me my computer always cause you to update your anti virus I go we just did that two weeks ago what we talk about but because our security measures in place so earlier this month I am so soft released a report indicating that in the first nine months of two thousand nineteen at least six hundred twenty one government entities healthcare service provider school districts colleges and universities have been subject to ransomware tax six hundred twenty one ransomware attacks that means every month rather what seventy eighty that's a problem because of the tax amount possible to estimate due to lack of publicly available data but they think we're looking at the tens of millions or hundreds of nights four hundred ninety one of the attacks on healthcare providers healthcare providers so four hundred ninety one of the six of the twenty one is okay why is the health care such a a huge draw well because you know these I think the healthcare system is still kind of in a state of we don't look like we have our acts together you have it's a huge industry you have lots of people needing access see government officials only certain people have access but in health care systems usually everybody in the building you know and anybody that you know as as as medical records has access so I think the access is less encrypted that's my guess so Louisville Kentucky got attacked there was a dental offices verily a cloud management service Percy soft reported hundreds of dental offices attacked a hospital Wyoming was stacked so when the average patient goes I'm not gonna say anything that's going to my chart I want to keep it private so just take my word for it I need this I need that you're going to run into some problems because doctors can't write antibiotics they can't write a cut if they can't write certain things and you on the other and don't want to be overly open because you're afraid that that data is not going to be secure that other people can access it is that we kind of have the state of distrust we have the state of one not going to tell people that the mother to tell people the nitty gritty I mean you know many jumps up there are scared to death if they get a finger stick where in the cyber sphere there's going to be that data if they got exposed to something a doctor having HIV can kill the practice so a doctor is not really going to want to be open about that now you can use zero names I mean I'm sure Hollywood stars have suitable names you know when they go yeah because otherwise somebody could access Tom cruise's or Brad Pitt's medical records and if that's their stage today my guess is they have regular names but some stars that's just the name and that's just you know so you know our lack of protection our lack of faith in I mean a hospital systems have very expensive anti ransomware so my guess is these people were just smarter than their company that you know little of that they hired for the ransomware so MC soft encourages teaches individuals facing the attack to use free services available on the website and I. D. ransomware check with the specific type and version of the malware involved has already been cracked so if they have a type of malware.
"mc soft" Discussed on Security Now
"Lead two months of work to repair disrupted technology systems and files and five whereas paying ransomware attackers encourages continued attacks on other government systems as perpetrators financially benefit and six whereas the United States Conference of mayors has a vested interest in D. incentivizing these attacks to prevent further harm yeah seven now therefore be it resolved that the United States conference of mayors stands against unified ride stand united yes united against paying ransoms in the event of an I._T.. Security breach in other words were saying don't do it anymore. We're yeah we we stand united against paying what we're going to be paying. We're not we're not happy so anyway ransomware. I'm again it. It's right electronically air. They're all definitely we're against it unhappy where we're really somebody's Kassim help yeah so we got an email from a guy and I can't vet it so maybe I don't know you can or something named Brett Callo. He works for a company New Zealand Company. <hes> called MC soft his his point was a K.. Reoccupies is hard coded keys that sometimes are reused and those are the keys probably referred to by the F._B._i.. Absolutely it was unclear. He wanted to get the word out that you know they offer a download her that will check it against the keys that are known own. You know this is this is the website. I don't know anything about it. They say it's free of charge but the point being that he said I just wanted to get the word out that sometimes there is there you can get a key to decrypt it used and it may work and certainly should do that before you pay anybody any money. Yeah especially you know lots of bitcoin man. That's a lot of money wow. How long is this sure insurance going to be offered? I mean it's GONNA e E. That's that's exactly right. I I mean it. The premiums are going to start going up and or and it's the fact that the insurance company paid the round number one hundred thousand makes it sound like that was the cap on their payout for in that for this this particular county so you know it in fact the county may have decided well boy you know to get full coverage. It's going to cost the premiums are going to be too high so will will accept a cap of one hundred thousand because does whatever anyway believe it or not. Leo This problem not surprisingly actually has has created well. We already saw that created a law firm that specializes now resting yeah yes and now we have code aware DOT COM ransomeware remediation. They say so it C. O. V. E. W. A. R. E. DOT COM. We are the first responders to your ransomware handsome wear recovery cove where aggregates.
"mc soft" Discussed on Windows Weekly
"They're playing forty percent more games. Yep. Then they before they became a game pass member. So that's kind of interesting they're discovering these new genres these new they're playing all these back catalogue games that developers who built the games weren't getting that game play. Yeah. So it's interesting. It's a little unlike net flicks. Because it's not like, okay stopped renting my bought BUSTER thing. And I just up that way. And I'm doing it this way. It's actually like, no, no, no the game, developers are getting a lot more value out of it because people are discovering their back catalogue games. And that is that's pretty. Yes. Exactly. That's exactly right. And so that's kind of been cool. We'll see if that continues. Obviously love that to continue because we want this to be good not just for the game. But we want it to be really good for the game developers. So game passes big for us. And I think you can expect to see more interesting things in the game pests space, shall we say in in the next in the next year? So is there an opportunity to do game pass? You wouldn't call it this, obviously like an e three five kind of like different levels, and you get more at different price points kind of thing. Because you don't really do that right now, do you? That's a fascinating idea. Mary joe. I'm Joe the heck is wrong with you. No, he likes it. Words next year. You know, what that means? That means it's already in the pipeline. You just just accidentally hit right? Nothing. Chris. It means nothing came pass e e five you. I think you should join the naming team help us. I'm good at this. Job. Is there a naming team? That's what they do full-time. But we have a set of people called product marketers who do the messaging the positioning Mamer their job as a whole. Yeah. Exactly. So the surface go to surface team who does the products marketing for surface decided to call a rate name. Yeah. Surface. And that one, you know, had lots of lots of opinions on belief we fallen in love with his choice. Yeah. So stay tuned on game s I think there's there's a lot more to come. And I think you've already obviously already seen that we're working on this thing that we call project x cloud where you'd be able to stream games to your Android phone. And so this notion of you know, gaming with the people you want with the games we want on the device as you want is is big and game passes. A really it's a hidden gem to us getting there. So that would be helping them that would be a second. I've been to now let's get to the ones that you're gonna be like, dude, really. I think it was two years ago. Or I said, Mark my words, Microsoft teams is hidden gem for us, and I left after the call. You guys are like well that was really interesting interview. But man that makes. That was the one thing that you were kind of scratching your head. The reason I was so excited about MC soft teams then and I put it on the list. Now is we built that product very very quickly like the agile engineering that went from idea to actually shipping. Something was incredible. And now here we are a couple of years later and teams and I'm going to cheat. And I'm going to put Microsoft sixty five in there because teams comes with Microsoft, you sixty five these are very very big important products to us most people don't even know what Mike to sixty five is yet. It is a service that combines office three sixty five with our device, manageability and security technology called EMS with the windows subscription. And so if you're a CIO for the.
"mc soft" Discussed on AppleInsider Podcast
"Running office apps for MacIntosh ended for windows while I'm trying to remember what features it they have doesn't have they have unified the. Owed base. It is a unified code base in years. Past office, MAC and office for windows were entirely separate animals. They did not share unified code base and with office two thousand sixteen they do. And so what is what has happened here is that they have aligned and underlying it all is the same heart. Now, some features aren't surfaced in some features aren't present and the UI is different, but at the heart of it, these things are now the same. And that's a big victory because it was a monumental undertaking except surely much softwood like Todd is a slow up on. I honor doesn't crashes often was the MAC, so that doesn't sound like it can have all these features these hang of compile time, perhaps they choose to that. Yeah, absolutely. So that suggests that this than just component for a different machine for the that make choices of optimization will look subdued. Oh, that's to put office on max small. They want to reach as many people as they can, especially in the age of Google docs, especially in the age where they would face antitrust again or face complaints. Again, if if they did not have office on platform, so it is something that they would definitely do. The question is, could they poured it? And I think the answer is yes, as as many different architectures they've currently got it going for anyway. I mean they are visited arm with surface RT and not forgotten about that. Yes or no, you know, well that they're doing it again. They've got another product other arm in it, so they're going to keep looking at this and they're gonna make sure that office runs on it, whatever it is if we compile it for arm for the other thing and the code base is unified than our MAC gets. It's well. Okay. That makes sense. I think it's an interesting change in the world where before allegedly, arguably, MC soft at didn't go on the ipads because. Wasn't gonna succeed in it was it was going to be a rival and now feel like that's actually what's broken. Mike subs hold on would predecessor uses well, they've. Remember when they said that they were still focusing on what windows phone could be right now that we know that the answer is nothing that that windows phone took a dirt nap that this is not an issue, but I wanna talk about something else that popped up in Mingji close note, which is that besides his thinking that that this changes apple into a full stack arm shop a full stack shopper. They own everything including the graphics processor end the CPU because they would obviously if they're putting any series chicken MAC that they're also working on advanced driver systems systems for the apple car. And at that will also use a TSMC chip that is he said the launch, he thinks between twenty twenty three and twenty twenty five. So the apple cau- is not dead while we knew that it wasn't dead, but it's, it's still there. It's still evolving. Now there he thinks it's either going to support high automation of driver tasks or complete automation, including Navin driving. Now, this is interesting because we know that the apple maps crew out were dry. The world to to map everything. And I actually spotted an apple maps vehicle last weekend. I was standing in much driveway preparing for a road trip and the apple maps minivan rolled past my street. Did you follow it? I did not, but I photographed it. Okay. I think evidence if people following Patchett news, Google maps. 'cause just getting ahead of it a few times so that they would becomingly recorded somewhere now and you know, Google does this thing where they blur phases out and I expect apple as well if they'd even give us a street view. But if there's a street view from apple maps, they'll see me holding my iphone up photographing them, but I took rapid fire shots. I've got really great pictures of the apple Macs vehicle driving past me. I know nothing about. 'cause he said, particularly, notable type opposite cameras..
"mc soft" Discussed on WLAC
"Strike again good morning I'm Gordon Deal along with Jennifer Kushinka, on this Tuesday August twenty first glad you're with us and here's what we have, for you this. Hour giant Microsoft says it's identified new Russian hacking attempts at. Targeted a pair of conservative think tanks a Colorado man accused of murdering his pregnant wife and two daughters has. Changed his story students returning to Santa, Fe high school in, Texas after a deadly shooting face more scrutiny but. Some argue that underlying problems, remained at disparate attempt to improve TV ratings the Oscars are making. Changes those changes aren't being received well The academy pretty much out of nowhere. Announced that they were going to be overhauling the telecast of the Academy Awards are going to. Be moving, some category to the commercial break because they're sick of it stretching to you know four hours or even more than four hours each year and then they also announced this mysterious. New category for best popular film Wall Street Journal reporter Eric Schwartz all on, changes for the Academy Awards. He's here in about twenty? Minutes Microsoft says it's uncovered new Russian hacking attempts targeting targeting. A pair of conservative think tanks ahead of the midterm elections the tech giant accuses a hacking group affiliated with the Russian government of spoofing. The Hudson, institute and the. International Republican Institute, more from this, morning's Dave Duncan there's no sign the hackers were successful in getting anyone to. Click on the fake, websites, and both organizations said they've. Been targeted, before Microsoft said the hacking group is known as fancy bear the company says it's working with the potential target organizations MC soft was able to catch the spoofed websites as they were set up getting court approval to, see a certain fake domain names Gordon thank you Dave. On Sunday by the way national security adviser John Bolton suggested that Russia was not the only, threat in, the fall elections he also named China. Iran and North.
"mc soft" Discussed on Windows Weekly
"Good. All right. So that's sums it up, right? Nothing more to say. Man, great quarter great year. It's the Sasha and actually, you know, I in tied to their stock price thing. I one of the big changes that's occurred over the past. Several are few quarters was they were very comfortably in a spot with an order in Ford, a six million in profits on twenty two, twenty twenty five million in revenue. And that has exploded and what was the number? I I don't have the thing in front of me, but what was it? What was the revenues this past quarter, thirty four, maybe something like that. Their their profits in her high in the high single. It was seven, eight, nine, seven up there. This is the these things are going up. And you know, for all the talk of other the next IBM in for all my complaints about where's the money coming from whatever the money isn't just coming, it's it's, it's expanding. So you know, like I said earlier, they're doing something right. I have no idea what it is. Major sales reort last year when they had all those layoffs and there there could be something to that. You know that they've changed the way they're selling and approaching it differently. That may be playing in here too, as far as why it's growing so much faster now. Maybe. We're just guessing here. I would like. Down with like an excel spreadsheet to point out. How excel works because I literally. Then then she can explain non gap accounting. On I is this going to end we gonna go pass non gap gap that we ever going to get by this. I, I are we because I have to tell you, I find this to be very distracting. It is very hard to follow when they're talking about their earnings. This gap is not gap. What you comparing? Yep. I, yeah, I I know my, it's not my this is not a Microsoft. Neither of us. It's absolutely. And could we could we could it go away? I'm really getting tired of that. Let us break and then come back and talk about your tips and picks of the week. What do you say? All right time for a little coffee break in Berlin. While we talk about a way to give every IT person listening today a break in their life. If you're the person who gets the alerts. And I think probably we all right, you know, it can be like a pinball game when all the, you know, the life, the computer and the phone light up like Christmas trees, all these alerts most of which are related to something that happened. But that's something that happened is buried deep within the alerts, and then there's all these side effects you've got to as quickly as possible combs through this rubbish to find the pony. Or you could let MC soft find the pony for you. No, mere mortal can analyze all those alerts in and respond all those tickets and you don't want to. You don't have to, but Mook soft a. i. ops can and you don't even have to train it. You don't have to give it rules. It learns. It watches you. Of course, it's got a bunch of intelligence built in, but then as as you go, oh, reduce your IT alerts tickets by up to get this ninety percent guaranteed. You'll only see actionable work items. Not all the chaff that goes along with the thing. You got to work on. What they do is they cluster events all the things that happened to correllated situations. And this is the thing the machine learning is learning. All. This is all a piece of a puzzle of a situation. You don't have to look at another alert or ticket ever. Again, you just go, what's the situation? Let's fix it. It was developed for the enterprise because not because they want to take your job because they love you and they want you to do your job better. They want to turn you into a hero, no rules, no filters, no models. It's you don't have to do any digital work it. It just integrates with your existing tools. It Mook soft, AI ops, they have your back. They're not here to replace you. They're here to make you a support hero. Thanks to machine learning the lower the frequency and duration of repeat incidence. You will get back to doing what you do best..
"mc soft" Discussed on Windows Weekly
"Really is meaningful analyzing computers and what's going on with them and figuring it out and figuring out what to do so even though when when i say ai mc soft ai ops i'm not talking artificial intelligence i'm talking algorithm ick it ops really there is a either is machine learning involved in cutting down the number of alerts and tickets by ninety nine percent and by the way it works with all your existing it tools of course it has to write it's patented technology correlates the events into what they call situations basically actionable work items so you can focus on tackling the stuff that matters to you i have a case study hcl technologies you may know them from their award winning dry ice platform their global it managed service provider the dryest platform has as its event management layer mook soft ai ops and an hcl says that's helped clients streamline operational workflows reduce time in the detector correct life cycle of incident tickets in fact a thirty three percent reduction in meantime to restore one third less time that makes you a lot more effective so you could support more customers with service quality and keep up racial costs low and officiency hi you're gonna love it and i want you to try it get your boss to do it if it's not you or if you're the decision maker go to mook soft talk com get a demo m o o g s o f t mook soft dot com for mook soft ai ops reduce your it alerts and tickets by ten ninety nine percent right now mook soft am og so f t dot com we thank him so much for their support of windows weekly oh now we're talking is that what that is that for the royal wedding mary jo is that it is beautiful did you wear it is very fascinating for the record label i asked my daughter if we still have gigantic mexican hat thing this narrow whatever.
"mc soft" Discussed on Windows Weekly
"And so they're going to be doing that stuff and they're introducing a batter battle royale mode which also confirms thing i've been saying for long time which is that when you look at the game like fort night overwatch to some degree and certainly pudgy i kind of questioned why they're popular in some ways because i look at that and i think that's a game mode in college duty and so if you look at any college duty multiplayer experienced this gotta be like thirty something different game modes when you kinda mix and match all the variants and i never thought i've always thought that a battle royale mode would it be the easiest thing in the world colin duty to do i don't understand why they don't have this exact thing and now they're going to so they're going to get into that eastport slash battle royale thing about black ops for us so get nothing to do for the next six months but eventually this game will come out and then you know life will be good again mary jo's really done a great job of not passing out during that segment i was typing in the beer pick so that worked out well what it is but now i feel like drinking let's take a teeny weeny break and come back with the back of the book paul threaten mary jo foley will offer us their tips tricks codenames their beer picks but i heard from mugs soft mc soft i i've been learning about mook soft i'm not i'm not the frontline it guy anymore thank god i don't i don't have the carry the beeper but they're the people who do tell me one of the biggest problems is kind of beeper fatigue or pager fatigue actually nowadays is really isn't so much a beeper as messaging alerts email alerts notifications on your phone that kind of thing but you get too many of them it's just noise it turns in noise what you need is the right alert at the right time just the right alert just at the right time to give you an actionable item right and a lot of times that means is collapsing a bunch of alerts into one that kind of thing.
"mc soft" Discussed on This Week in Tech
"It's just so nice to have breaking news on a sunday that i had to start with this story but we have a huge huge bit of news to talk about with amazon what are crazy week they had so let me take a quick break have leo tell you about one of our great sponsors and then we're gonna come back and ask will you be buying an amazon robot for your home excuse me i want to interrupt this fine program hello leo here in japan where i'm very calm and relaxed because i'm not being bugged by t alerts are sponsor today moog soft specializes in reducing it lers giving you just the alerts you need so there's an actionable thing you can do look at this wouldn't you love to be here relaxed enjoying scenery enjoying life it people know how it is when you get those alerts and those tickets and their lighten up your monitor like a christmas tree you're not being productive you just being stressed out only your mortal can analyze is all those alerts and respond all those tickets will good news you can immediately reduce the noise with moog soft m double o g s o f t mooks off day i mc soft ai apps is an algorithm it ops platform that reduces it alerts and tickets by up to ninety nine percent guaranteed imagine that doesn't mean you don't get those tickets doesn't mean you don't get the alerts but you get the ones that count books off say i opt platform integrates with all your existing it tools it's patented technology correlates events this is the the key into actionable work items they call them situations so you focus on the situation on tackling the stuff that matters instead of ping ping ping ping ping let me tell you about one company that uses mooks off day i op seiichi l technologies era global it manage service provider and they build mook soft ai ops into their event management layer right within their award winning drives platform what does that to a well it's helped its clients streamline operational workflows reduce.