Going Further And Higher - Education Podcast

What makes universities and colleges attractive targets for cyber criminals?

Shakespeare Martineau Season 2 Episode 1

[S1:Ep7] - In this episode, Smita Jamdar speaks to Mike Wills, Director of Strategy & Policy at cyber security company CSS Assure about the serious threats universities and colleges face and what they can do to protect themselves from cyber-attacks.

Find out more about our education team here.

Find out more or get in contact with our education team here.
See all of our other episodes here.

00:00:06.569 --> 00:00:13.679

Smita Jamdar: Welcome to going further and higher Shakespeare martino's podcast in which we discussed topical, or indeed long running things in higher further education.

 

3

00:00:14.280 --> 00:00:18.210

Smita Jamdar: My name is sweet agenda and i'm partner and head of education here at Shakespeare Martino.

 

4

00:00:18.600 --> 00:00:28.080

Smita Jamdar: And in today's episode we're discussing a subject that conspires to be topical long running difficult and important all at the same time and that's cyber security.

 

5

00:00:28.860 --> 00:00:41.370

Smita Jamdar: Luckily, to make sense of it all i'm joined by my colleague Mike wells Mike is director of strategy and policy as our sister company CSS assure which specializes in advising on managing risks relating to cyber and data.

 

6

00:00:42.390 --> 00:00:53.070

Smita Jamdar: So Mike the last just survey of the sector, which came out at the end of last year, highlighted a number of really interesting things about the sectors relationship with cyber security and.

 

7

00:00:53.520 --> 00:00:59.700

Smita Jamdar: Firstly, it was clear that the majority, but not all of those responding sorry, it is a key risk and a strategic priority.

 

8

00:01:00.480 --> 00:01:09.030

Smita Jamdar: And secondly, despite this, the majority weren't confident that they were handling it all that well and and, thirdly, I think it was recognized that the measures.

 

9

00:01:09.510 --> 00:01:20.340

Smita Jamdar: That were needed to manage it could be seen as quite complex and expensive so from your point of view, what do you think makes universities and colleges such an attractive target for cyber criminals.

 

10

00:01:21.450 --> 00:01:27.810

CSS Assure - Mike Wills: Well, good morning sweet, so thank you so much for inviting me to join us today so because, clearly, one of my favorite subjects so.

 

11

00:01:27.810 --> 00:01:30.570

CSS Assure - Mike Wills: i'm delighted to be able to talk to you and your listeners on this.

 

12

00:01:31.530 --> 00:01:41.220

CSS Assure - Mike Wills: and the first thing i'll start off by saying is cyber security is now in life skill and it's pervasive across our whole world, so not just.

 

13

00:01:41.640 --> 00:01:57.840

CSS Assure - Mike Wills: Business or education or universities or higher education, further education but us as individuals and as a really important point alone we shouldn't compartmentalize this we should realize that it would affect us in every day in shapes and forms, we still don't do realize I don't recommend.

 

14

00:01:58.860 --> 00:02:07.500

CSS Assure - Mike Wills: But in order to answer your question is really important to understand what motivates cyber criminals and, at the end of the day, they are criminals, including the title, they want.

 

15

00:02:07.740 --> 00:02:13.920

CSS Assure - Mike Wills: A payday from this otherwise there's no point in doing this they're not doing it out of the goodness of their heart they're here to get a transaction.

 

16

00:02:14.490 --> 00:02:21.180

CSS Assure - Mike Wills: And because of that universities are highly attractive targets opportunities to them for a number of reasons.

 

17

00:02:21.840 --> 00:02:31.680

CSS Assure - Mike Wills: Firstly, there's a significant amount of people that whether that our students or the teaching or the Faculty staff support and admin staff, the donors, be it.

 

18

00:02:32.490 --> 00:02:41.040

CSS Assure - Mike Wills: You know supplies and for the company, whether people there's personal data, whether it's personal data there's opportunities, because cyber criminals can steal that.

 

19

00:02:41.340 --> 00:02:48.180

CSS Assure - Mike Wills: And then they can sell it on the dark web and other cyber criminals can get hold of it, and we can start to use that.

 

20

00:02:48.510 --> 00:02:56.670

CSS Assure - Mike Wills: To target individuals through identity theft may be or other things, so people is the fundamental interest to cyber criminals.

 

21

00:02:57.330 --> 00:03:04.410

CSS Assure - Mike Wills: Then there are other opportunities there as well, when you consider the amount of research on the and the intellectual property.

 

22

00:03:04.830 --> 00:03:14.790

CSS Assure - Mike Wills: That are developed in university that's highly attractive again, because this is the cutting edge of technology, or you know future commerce and criminals recognize that that.

 

23

00:03:15.180 --> 00:03:22.230

CSS Assure - Mike Wills: is valuable to someone so again, it often comes back to criminality and theft so they're very interested in getting in there and.

 

24

00:03:22.560 --> 00:03:29.910

CSS Assure - Mike Wills: and stealing that information and then either again sending it on the dark web to the highest bidder, or you know they might be doing it to undermined.

 

25

00:03:30.270 --> 00:03:40.380

CSS Assure - Mike Wills: The individuals that are doing it all, for having an effect, you know potential stock price or something like that in the markets if it's found out that you know high profile companies developing something.

 

26

00:03:40.740 --> 00:03:51.900

CSS Assure - Mike Wills: And all of a sudden that ips be breached, so that there are numerous threads and it's it's it's often not simple Simon can was going to do this to achieve that they can often be many, many layers.

 

27

00:03:52.560 --> 00:04:10.230

CSS Assure - Mike Wills: And then the last one I would I would suggest it's interesting to them is um you hear a lot now about ransomware ransom is all about holding people to ransom an education and higher education, particularly it's a hugely competitive, as we know, globally, not just in the UK.

 

28

00:04:11.370 --> 00:04:16.530

CSS Assure - Mike Wills: and reputation is everything, and particularly in this Kobe title postcode air one would hope.

 

29

00:04:17.460 --> 00:04:22.020

CSS Assure - Mike Wills: The ability to deliver virtually all within your learning environment is fundamental.

 

30

00:04:22.620 --> 00:04:32.430

CSS Assure - Mike Wills: To what universities do now, if a cyber criminal can disrupt that or stop you from being able to operate in the way that you need to to deliver your value proposition.

 

31

00:04:32.880 --> 00:04:42.300

CSS Assure - Mike Wills: Well, they can hold you to ransom for that, and you know, universities, potentially won't want to damage the reputation, they need to be back to deliver as quickly as possible.

 

32

00:04:42.600 --> 00:04:49.050

CSS Assure - Mike Wills: And there may be cases where they choose to pay that ransom because they've just got to get back to normal operating as quickly as possible.

 

33

00:04:49.440 --> 00:04:59.760

CSS Assure - Mike Wills: Again, cyber criminals know that so there's I mean there were many things, but there's sort of three key points about you know why universities or education institutions are of interest to them decide.

 

34

00:05:00.750 --> 00:05:04.800

Smita Jamdar: That we're not, I think that's incredibly helpful because it sort of makes it.

 

35

00:05:05.160 --> 00:05:15.690

Smita Jamdar: Much easier to understand if you're a specialist in the cyber area when you start thinking about well it's obvious in a way they've got the data they've got the people there, their asset rich from the point of view of.

 

36

00:05:16.800 --> 00:05:20.490

Smita Jamdar: Cyber criminal, so what why wouldn't they attack them and you talked about ransomware.

 

37

00:05:20.820 --> 00:05:22.770

Smita Jamdar: yeah and you know and again.

 

38

00:05:22.890 --> 00:05:32.730

Smita Jamdar: Just survey, I think, highlighted that that's something that seen by the sector is a real risk at the moment I know we've seen some live examples of this over.

 

39

00:05:33.540 --> 00:05:43.290

Smita Jamdar: The last couple of years, but what other kinds of cyber threats, you know, apart from ransomware what else should universities be worried about if in this area.

 

40

00:05:44.130 --> 00:05:51.060

CSS Assure - Mike Wills: I mean there is it's like working in a talk shop or workshop, there are many tools to do a job and.

 

41

00:05:51.780 --> 00:05:59.940

CSS Assure - Mike Wills: a really important point to note is this a cyber attack is not the end state it's not the aim is a digital tool it's a.

 

42

00:06:00.690 --> 00:06:14.490

CSS Assure - Mike Wills: Digital rock for a winder or digital crowbar to get you X it gets you access to do something and they tend to be for things that are cyber criminals after they ought to do their motivations they want money.

 

43

00:06:15.120 --> 00:06:24.630

CSS Assure - Mike Wills: we've already talked about they want to create mischief because they can because it's a way of demonstrating ego or credibility or a building a name of an industry.

 

44

00:06:25.260 --> 00:06:32.850

CSS Assure - Mike Wills: They want to create mayhem and you know define you may have it could be either you look at the wanna cry, which is the cyber attack they hit the.

 

45

00:06:32.880 --> 00:06:45.300

CSS Assure - Mike Wills: NHS that created mayhem and they can do, and the last one is there might be a military context and let's not get into what's happening in the group at the moment, but that these tend to be the full context where cyber attacks are used.

 

46

00:06:45.780 --> 00:06:52.230

CSS Assure - Mike Wills: And there are many different tools, you can do it so ransomware is just a process of locking you out of your system.

 

47

00:06:52.830 --> 00:06:58.110

CSS Assure - Mike Wills: You come in the morning you turn in desktop your laptop in your peril and you want to be able to use it, all of a sudden.

 

48

00:06:58.410 --> 00:07:06.150

CSS Assure - Mike Wills: It either doesn't come on or there's a smiling skull or any number of images that they're saying you know only goodness knows how many bitcoins if you want to get back in.

 

49

00:07:07.230 --> 00:07:17.130

CSS Assure - Mike Wills: But how they get to that point they need access and the only way they can get access it by going to infiltrate or penetrate the system.

 

50

00:07:17.730 --> 00:07:26.520

CSS Assure - Mike Wills: And that can be done in a number of ways that can be done by very clever people dealing with code manipulating and seeing if there's any.

 

51

00:07:27.150 --> 00:07:33.090

CSS Assure - Mike Wills: Vulnerable points in what we call the architecture, the way that a system that digital system of digital portal might have been built.

 

52

00:07:33.480 --> 00:07:48.450

CSS Assure - Mike Wills: And they can look to exploit gaps and things cyber securities it doesn't go away or cyber resilience, you know you what you might have had a patch Thursday out on the Internet, you know when apple sends out or window sends out patches they're doing it for a reason.

 

53

00:07:48.750 --> 00:07:51.420

CSS Assure - Mike Wills: Because they were found a vulnerability and so just.

 

54

00:07:51.480 --> 00:07:59.250

CSS Assure - Mike Wills: Point please make sure you, you know, everybody at home and at work you're doing that because we don't touch that there's a there's a whole there's a vulnerability.

 

55

00:07:59.730 --> 00:08:12.270

CSS Assure - Mike Wills: And I use the example with clients a lot when you go to bed at night, you make sure your front door is locked and your windows closed and not viewing security it's the same field digital systems if they're not maintained we forget about things you leave doors and windows open.

 

56

00:08:12.690 --> 00:08:15.540

CSS Assure - Mike Wills: And that means that cyber criminal can come in and do something.

 

57

00:08:16.260 --> 00:08:20.460

CSS Assure - Mike Wills: So it can be a direct attack using you know coding and clever stuff.

 

58

00:08:21.630 --> 00:08:25.590

CSS Assure - Mike Wills: or it could be through phishing emails we would heard about phishing emails and.

 

59

00:08:26.040 --> 00:08:33.210

CSS Assure - Mike Wills: And you know, there are hundreds of thousands of access points to an institution they only need to be successful, once.

 

60

00:08:33.600 --> 00:08:46.770

CSS Assure - Mike Wills: And we all sit there and say i've had phishing emails I can I know that at night they're not you know they're laughing or they're credible, but that but that's not the case, there are laughing incredible ones, but you know cyber criminal gangs, in particular, this is organized crime.

 

61

00:08:47.280 --> 00:08:49.290

CSS Assure - Mike Wills: And they have business plans and.

 

62

00:08:49.290 --> 00:08:54.270

CSS Assure - Mike Wills: strategies and budgets and resources and all of these things which they can use to.

 

63

00:08:55.320 --> 00:09:01.740

CSS Assure - Mike Wills: To develop these products really credible females mainly working with a client and maintenance had their website completely closed.

 

64

00:09:02.220 --> 00:09:11.310

CSS Assure - Mike Wills: it's a high identical, and you know, one of the things we're working out with them, so why have they done that what is their motivation what's the strategy for doing that because.

 

65

00:09:11.340 --> 00:09:13.470

CSS Assure - Mike Wills: You don't do that unless they have a plan.

 

66

00:09:13.500 --> 00:09:20.100

CSS Assure - Mike Wills: Because always just a waste of time and effort, and so you know with phishing emails you know they can be so credible.

 

67

00:09:20.400 --> 00:09:30.090

CSS Assure - Mike Wills: That anyone anyone, you know the greatest cyber security practitioners could be tracked and if you're having a bad day you're rushing you're hung over God, for better or whatever it takes one click.

 

68

00:09:30.600 --> 00:09:44.490

CSS Assure - Mike Wills: You know, we have to be lucky every single time so I can release the lucky ones, and then, if you consider how many people email him from home into work, email into the network of the system, thousands of thousands of people every single one of them.

 

69

00:09:44.970 --> 00:09:52.530

CSS Assure - Mike Wills: Is a potential opportunity for cyber criminal to get it, you know so that's I mean that's fishing, and you know it's about manipulation of people.

 

70

00:09:52.890 --> 00:10:05.760

CSS Assure - Mike Wills: Now we could get into coercion, you know we talked about espionage and coercion here, you know people will build target packs on individuals if there's a very specific piece of intellectual property, they want you know they will go after it.

 

71

00:10:06.240 --> 00:10:18.810

CSS Assure - Mike Wills: and humans are infallible everyone has weaknesses and and you know this is this is back to spy games and and and such like, where people will look for weakness and individuals, and it does happen.

 

72

00:10:19.710 --> 00:10:21.930

CSS Assure - Mike Wills: Is their data is their gambling is there.

 

73

00:10:22.020 --> 00:10:32.430

CSS Assure - Mike Wills: Other things, how can what money can I dangled if you do this for me I plug this into here or do that for me i'll do that you know here's a payday an incident they've got access.

 

74

00:10:32.730 --> 00:10:38.820

CSS Assure - Mike Wills: And it might sound far fetched it might sound James Bond the kings money all of that sort of thing, but it really does happen.

 

75

00:10:39.150 --> 00:10:41.670

CSS Assure - Mike Wills: And again, there are many tools.

 

76

00:10:41.880 --> 00:10:45.300

CSS Assure - Mike Wills: I wouldn't want to explain all of them, most of them come for a human being.

 

77

00:10:46.470 --> 00:10:47.850

CSS Assure - Mike Wills: Quite line up to that hope that was you.

 

78

00:10:48.000 --> 00:10:57.600

Smita Jamdar: know I can what What was really interesting as you were talking was, I was reminded of the fact that last summer the QA and just put out a.

 

79

00:10:58.470 --> 00:11:03.840

Smita Jamdar: bullet in about contract cheating and its relationship with cyber security.

 

80

00:11:04.230 --> 00:11:13.140

Smita Jamdar: and cyber crime, and I think it was just as you were talking it struck me that there is so much that you've given examples of that is a real life issue for hire and further education so.

 

81

00:11:13.890 --> 00:11:18.630

Smita Jamdar: What the QA Bulletin said was that, based on research done in America in Australia sorry not America.

 

82

00:11:19.170 --> 00:11:23.850

Smita Jamdar: And they'd found that sal so these people that you paid to write essays for you.

 

83

00:11:24.150 --> 00:11:34.140

Smita Jamdar: were putting Code into university websites, so that students will automatically redirected to their websites and perhaps believed that it was you know, a legitimate thing to do.

 

84

00:11:34.650 --> 00:11:49.500

Smita Jamdar: That once those students that then been drawn into using the services, some of them were them being blackmails either just for money or presumably given what you've just said, they could then be used as being blackmail, so that you can get access to.

 

85

00:11:49.980 --> 00:11:51.420

Smita Jamdar: Its other information.

 

86

00:11:51.630 --> 00:12:00.600

CSS Assure - Mike Wills: As such a complex web and the layers in this are again there was grand strategy at play here, the organizations that do this are incredibly.

 

87

00:12:01.980 --> 00:12:05.730

CSS Assure - Mike Wills: forward thinking, and you know you've hit the nail on the head there so.

 

88

00:12:06.330 --> 00:12:12.690

CSS Assure - Mike Wills: cheating, you know cheating and unfortunately education has has always been a thing, but the challenge now.

 

89

00:12:12.990 --> 00:12:24.390

CSS Assure - Mike Wills: is exactly as you say how people can be exploited because of a website is cloned you know, a student potentially goes there thinking it's about think they've put in their personal details and put in their information.

 

90

00:12:24.660 --> 00:12:29.250

CSS Assure - Mike Wills: You don't know just by going to that website, whether the criminals actually turned on your web camera.

 

91

00:12:29.670 --> 00:12:40.800

CSS Assure - Mike Wills: and your webcam is now you're now being recorded during these end up potentially because when you when you click a link or when you go to a URL unless you're 100% certain about the you know the domain address the URL.

 

92

00:12:41.760 --> 00:12:46.800

CSS Assure - Mike Wills: Actually, what you're doing you're in a particular licks and email you're hitting an execution button.

 

93

00:12:47.490 --> 00:12:55.740

CSS Assure - Mike Wills: And we look at and say it's a blue piece of text which is underlined and it says it's going there but doesn't always mean it's there you could be you could be executing malware.

 

94

00:12:55.950 --> 00:13:01.530

CSS Assure - Mike Wills: Down onto your computer spyware and stuff of that you know you just wouldn't know because you got the skills to do it.

 

95

00:13:02.910 --> 00:13:12.090

CSS Assure - Mike Wills: But I think you know I can absolutely see, as you said, if they've gone to a spoof site, the harvest data so that's a day one, they can sell the personal data, the individual.

 

96

00:13:12.360 --> 00:13:18.540

CSS Assure - Mike Wills: payday to now they have access to a person's attending an institution or a business that's potentially.

 

97

00:13:19.410 --> 00:13:31.680

CSS Assure - Mike Wills: available in terms of an access point we can manipulate that payday three could be coercion of subversion as we've just spoken about how how could they be used for could just be payday for could just be bribery of the individual.

 

98

00:13:31.920 --> 00:13:46.860

CSS Assure - Mike Wills: Because they carried out something and all sudden their their future is in jeopardy, because of you know they've carried out an act which is you know illegal or you know cheating or when all of those things so it's so I mean I guess the next question is, what can you do about it well.

 

99

00:13:47.190 --> 00:14:00.630

Smita Jamdar: It was exactly wisdom say listen to that it made me want to you know turn everything off go into a bunker never imagined sort of basically communicate by way of carrier pigeon, which is clearly not that not the solution so yeah what can we do about it.

 

100

00:14:01.170 --> 00:14:11.430

CSS Assure - Mike Wills: Well, I think the first point to say is we're already living in that in this world, so you know, hopefully for 95 90% of people were surviving okay at the moment.

 

101

00:14:12.030 --> 00:14:24.480

CSS Assure - Mike Wills: But we can always do more, and you know, as I said, I can't say enough to everyone, cyber resilience is now a life skill, you have we have to understand that we are living with this, and this is about being disciplined.

 

102

00:14:25.110 --> 00:14:31.740

CSS Assure - Mike Wills: Okay it's very easy to is not working on slow wisest lives click this or i'm in a rush or whatever don't do that.

 

103

00:14:32.160 --> 00:14:34.260

CSS Assure - Mike Wills: You know, because if you're at home if.

 

104

00:14:34.320 --> 00:14:42.990

CSS Assure - Mike Wills: If you lost the keys to your front door of your House, or you thought someone had had had got them and we're exploiting those key you would change your locks right.

 

105

00:14:43.380 --> 00:14:53.760

CSS Assure - Mike Wills: yeah just saying, I think the password to login site as a digital key if you thought someone had your digital key if you use your analogy of your home, you would change your kids and your locks.

 

106

00:14:53.850 --> 00:15:01.650

CSS Assure - Mike Wills: should change your passwords and stuff like that, so the point is, we you know we're living with this at the moment, what we need people to understand to be hard to hack.

 

107

00:15:02.130 --> 00:15:12.600

CSS Assure - Mike Wills: that's what you're worth it, because you know, unfortunately, there is no, there is no perfect solution, because if you've got enough money enough time and enough expertise.

 

108

00:15:13.410 --> 00:15:22.410

CSS Assure - Mike Wills: A successful cyber attack can occur, but understand that we're dealing with criminality and criminals do not want to get caught, because then it's been time President that's not fun.

 

109

00:15:22.800 --> 00:15:34.050

CSS Assure - Mike Wills: You know, and so actually they're going to say how can I achieve what I want to achieve in the quickest way without exposing myself and expose myself essentially get caught so that that is a motivation that's really important to understand.

 

110

00:15:34.380 --> 00:15:40.980

CSS Assure - Mike Wills: So if you are harder to hack unfortunately than 7080 90% of anyone people that that criminal will probably go elsewhere.

 

111

00:15:41.370 --> 00:15:45.810

CSS Assure - Mike Wills: it's the same for universities again unless there's a particular piece of research going on day one.

 

112

00:15:46.110 --> 00:15:59.280

CSS Assure - Mike Wills: If one university it's harder to happen, the other they're going to go after the other one because 100,000 student records from one or whatever it's 10,000 student records from one university or the other doesn't matter you know still money that can be monetized so.

 

113

00:16:00.420 --> 00:16:01.770

CSS Assure - Mike Wills: You know the.

 

114

00:16:03.120 --> 00:16:08.400

CSS Assure - Mike Wills: Universities will deliver particular staff and i'm not entirely sure about students but.

 

115

00:16:08.880 --> 00:16:19.350

CSS Assure - Mike Wills: Some do will do cyber awareness things, but you know what people going out and other courses on border will do is once a year, you know and sometimes it can be paying lip service to.

 

116

00:16:19.800 --> 00:16:27.990

CSS Assure - Mike Wills: And you know I can't remember either three weeks ago, let alone if i'd done a course six months ago, you know what what does it mean, and I think it needs to be a mindset to say you know.

 

117

00:16:29.070 --> 00:16:36.240

CSS Assure - Mike Wills: you've got to be disciplined in this, because you protect your home you protect your bank accounts and stuff you've got to realize this is all now and interconnected.

 

118

00:16:36.660 --> 00:16:44.700

CSS Assure - Mike Wills: So I think one it's just staying aware and again, as you know, three shakes the MIT CSS we've got a whole regime of education tutorials where we're trying to.

 

119

00:16:45.150 --> 00:16:49.830

CSS Assure - Mike Wills: make people understand their resilience and and become a heart attack so i'd say that's really, really important.

 

120

00:16:50.130 --> 00:17:01.380

CSS Assure - Mike Wills: And there's an individual responsibility, as well as an organizational responsibility because, again, particularly as a university, you have to understand that your students are a vector of attack against you.

 

121

00:17:01.740 --> 00:17:09.810

CSS Assure - Mike Wills: yeah so you can't just go well it's not my problem if that they're doing that, actually, you have obligation or responsibility to say well i've got to help these people.

 

122

00:17:10.080 --> 00:17:16.170

CSS Assure - Mike Wills: Be more as it is because, in effect, it protects me so this ultimately comes down to having a really.

 

123

00:17:16.530 --> 00:17:30.240

CSS Assure - Mike Wills: Good comprehensive program of resilience of cyber resilience to make sure that you know, because sometimes people do one thing or the other, and now it's great, but actually when you when you when you straight from one area system that presents a weakness in that area, so it's.

 

124

00:17:30.240 --> 00:17:36.780

CSS Assure - Mike Wills: About you know, so we would always suggest having going to credible supplier to come in to do a cyber resilience assessment.

 

125

00:17:37.200 --> 00:17:43.260

CSS Assure - Mike Wills: And that's done against regulatory frameworks internationally regular regular regulatory frameworks.

 

126

00:17:43.650 --> 00:17:50.580

CSS Assure - Mike Wills: A best practice have been developed over the last you know 10 1520 years and benchmark yourself, where do we get out what are we not good at.

 

127

00:17:51.090 --> 00:17:57.390

CSS Assure - Mike Wills: And then you can have a roadmap for remediation and make sure it's right, and no one has the money right now to pay for this.

 

128

00:17:57.660 --> 00:18:02.520

CSS Assure - Mike Wills: You know, and the time or the other, because there's so many transformational programs going on.

 

129

00:18:02.910 --> 00:18:10.980

CSS Assure - Mike Wills: And, but at least you've got a plan, or at least you can then say right now we can forecast, now we can budget now we can build a program that education, you can do that can go on our roadmap.

 

130

00:18:11.490 --> 00:18:15.750

CSS Assure - Mike Wills: And, God forbid that information is stolen, and you have to go to the information commissioner's office.

 

131

00:18:16.410 --> 00:18:30.570

CSS Assure - Mike Wills: and say look this this has happened it's much better to say we've had this, but you know what we were trying to do something about it and here's the steps that we've taken rather than going oh yeah kind of knew it was a threat, but you know we're busy and.

 

132

00:18:30.600 --> 00:18:37.560

CSS Assure - Mike Wills: We didn't have much money and so again, there are many reasons to do and again since this show can help with that if people needed to be.

 

133

00:18:38.370 --> 00:18:43.380

Smita Jamdar: Great I mean Mike Thank you very much, because what you've done there is make something which I think a lot of us.

 

134

00:18:43.740 --> 00:18:50.610

Smita Jamdar: know about in the abstract, I think, quite comprehensible and quite practical and that's I think great so thank you very much for that.

 

135

00:18:51.060 --> 00:19:02.010

Smita Jamdar: And thanks very much to all of you for listening and we hope you'll join us next time so don't forget to hit the subscribe button and, if you like, what you've heard, please do leave a review for now it's goodbye for me and.

 

136

00:19:02.490 --> 00:19:03.990

CSS Assure - Mike Wills: it's goodbye, for me, thank you for having.