1 00:00:00,200 --> 00:00:02,559 Speaker 1: Right Manage my Health, you know the big data breach 2 00:00:02,640 --> 00:00:05,400 Speaker 1: that happened. Well, the fraudsters who got their hands on 3 00:00:05,440 --> 00:00:08,760 Speaker 1: the leaked health information may now be trying to scam 4 00:00:08,880 --> 00:00:12,559 Speaker 1: the customers directly. Late last year it was more than 5 00:00:12,600 --> 00:00:15,360 Speaker 1: one hundred thousand Managed my Health at one point eight 6 00:00:15,400 --> 00:00:18,560 Speaker 1: million patients had sensitive data stolen by a hacker group. 7 00:00:19,079 --> 00:00:21,440 Speaker 1: So what's going on now, Sean Lines is net Safe 8 00:00:21,520 --> 00:00:24,560 Speaker 1: Chief Online safety Officer, Sean good afternoon. 9 00:00:24,600 --> 00:00:28,880 Speaker 2: Good afternoon, So what's happening here? Well, this would be 10 00:00:29,080 --> 00:00:34,840 Speaker 2: typical of many sort of data breaches. When people leak 11 00:00:35,080 --> 00:00:38,440 Speaker 2: information goes out in the open market, people might wait 12 00:00:38,520 --> 00:00:40,800 Speaker 2: in order to use it thinking that the heat has 13 00:00:40,880 --> 00:00:44,440 Speaker 2: died down, and then and or sell that information to 14 00:00:44,479 --> 00:00:46,519 Speaker 2: other people and then the sort of scams kick in. 15 00:00:46,640 --> 00:00:49,840 Speaker 2: So not unusual to have that weight to lull people 16 00:00:49,880 --> 00:00:51,640 Speaker 2: into a slight full center security. 17 00:00:52,000 --> 00:00:54,080 Speaker 1: And what do we know exactly what they've got or 18 00:00:54,080 --> 00:00:55,680 Speaker 1: are they telling people what they've got? 19 00:00:57,520 --> 00:01:00,760 Speaker 2: Well that certainly when people are approaching individuals that they're 20 00:01:00,800 --> 00:01:02,720 Speaker 2: not saying, you know, we've got your information from Manage 21 00:01:02,760 --> 00:01:05,000 Speaker 2: my Health. Generally, what we're talking about here is people 22 00:01:05,240 --> 00:01:08,160 Speaker 2: that will be pretending to be maybe from manage my health, 23 00:01:08,160 --> 00:01:11,840 Speaker 2: but from other organizations too. We often see even the 24 00:01:11,920 --> 00:01:14,399 Speaker 2: these sons the really awful kind of thing, which is 25 00:01:14,840 --> 00:01:17,280 Speaker 2: what we call a recovery scam, where people may mention 26 00:01:17,480 --> 00:01:20,120 Speaker 2: manage my health, may even say we can help you 27 00:01:20,240 --> 00:01:24,640 Speaker 2: get your information secured again. All of these things are 28 00:01:24,720 --> 00:01:28,320 Speaker 2: unfortunately tried and tested paths for scammers and still successful 29 00:01:29,040 --> 00:01:31,360 Speaker 2: mechanisms for scammers to use. So people need to be 30 00:01:31,440 --> 00:01:34,720 Speaker 2: really really extra cautious around what it is they engage 31 00:01:34,760 --> 00:01:38,319 Speaker 2: with when they weren't expecting communication from from from these 32 00:01:38,319 --> 00:01:39,640 Speaker 2: agencies that people say they're from. 33 00:01:40,040 --> 00:01:43,160 Speaker 1: Sure, how do we not know where they are like that? 34 00:01:43,560 --> 00:01:45,399 Speaker 1: I mean, I'm assuming the photos that they've put up 35 00:01:45,400 --> 00:01:46,880 Speaker 1: and the names that they've put on the duck ri 36 00:01:47,000 --> 00:01:49,400 Speaker 1: are not really them, But how dokay, how can we 37 00:01:49,600 --> 00:01:51,080 Speaker 1: not track where they're coming from? 38 00:01:52,280 --> 00:01:55,280 Speaker 2: I mean, the people that do this, that make an 39 00:01:55,320 --> 00:01:57,240 Speaker 2: industry out of this and a living out of this 40 00:01:57,600 --> 00:02:01,040 Speaker 2: also are the ones with the with the tools that 41 00:02:01,040 --> 00:02:05,600 Speaker 2: they can keep themselves moving. And one of the great 42 00:02:05,640 --> 00:02:07,880 Speaker 2: things I suppose great and invert to comments about the Internet, 43 00:02:08,200 --> 00:02:11,040 Speaker 2: is it allows us to build a layer of anonymity 44 00:02:11,040 --> 00:02:14,560 Speaker 2: for ourselves. Unfortunately, this is something that people with criminal 45 00:02:14,560 --> 00:02:18,120 Speaker 2: intent employ. And you know, people can move around or 46 00:02:18,200 --> 00:02:20,680 Speaker 2: make themselves seem like they move around, you know, at 47 00:02:20,680 --> 00:02:22,519 Speaker 2: a speed that would be greater than any human could 48 00:02:22,520 --> 00:02:26,400 Speaker 2: actually move, but from country to country very quickly, making 49 00:02:26,440 --> 00:02:30,080 Speaker 2: it really difficult for any law enforcement organization to attract 50 00:02:30,080 --> 00:02:32,320 Speaker 2: them because you know, one day they're in country A 51 00:02:32,720 --> 00:02:35,320 Speaker 2: law enforcement starts to work. The next minute it seems 52 00:02:35,360 --> 00:02:38,320 Speaker 2: like they're in country B and first country's law enforcement. 53 00:02:38,760 --> 00:02:40,800 Speaker 2: You know, game over. There's nothing we can do to 54 00:02:40,840 --> 00:02:42,359 Speaker 2: chase you in another country on the other side of 55 00:02:42,400 --> 00:02:43,800 Speaker 2: the world, and that's what they rely on. 56 00:02:44,040 --> 00:02:46,280 Speaker 1: Is there a way for me to check whether my 57 00:02:46,520 --> 00:02:50,160 Speaker 1: information is being compromised or do you have to go 58 00:02:50,200 --> 00:02:50,960 Speaker 1: on the dark web? 59 00:02:51,960 --> 00:02:54,040 Speaker 2: No? I mean, and to be honest with you, going 60 00:02:54,080 --> 00:02:55,639 Speaker 2: on the dark web to try and find that out, 61 00:02:55,800 --> 00:02:58,520 Speaker 2: you're probably missing a step in terms of that. There's 62 00:02:58,520 --> 00:03:02,560 Speaker 2: probably some kind of relationship between a lot of these 63 00:03:02,960 --> 00:03:05,799 Speaker 2: people that share this or sell them so that there 64 00:03:05,840 --> 00:03:10,000 Speaker 2: are services like have I Been Pooned, which you can 65 00:03:10,320 --> 00:03:13,120 Speaker 2: get an information from from that safe's website, which will 66 00:03:13,120 --> 00:03:16,520 Speaker 2: allow you to look whether or not your email address 67 00:03:16,880 --> 00:03:18,400 Speaker 2: has been caught up, and it may give you some 68 00:03:18,440 --> 00:03:22,520 Speaker 2: information on the other parts of what's been leaked there. 69 00:03:22,960 --> 00:03:27,000 Speaker 2: But really the best defense for all of us is 70 00:03:26,560 --> 00:03:30,160 Speaker 2: to is to increase the amount of caution, if that's possible, 71 00:03:30,400 --> 00:03:32,880 Speaker 2: around what it is that we get, and making doubly 72 00:03:32,919 --> 00:03:36,680 Speaker 2: sure that we do not respond to unsolicited messages from agencies, 73 00:03:36,720 --> 00:03:39,560 Speaker 2: even if we have an existing relationship with them, but 74 00:03:39,680 --> 00:03:42,920 Speaker 2: to contact those agencies directly ourselves and make sure that 75 00:03:42,960 --> 00:03:45,160 Speaker 2: what we're being asked to do really does come from 76 00:03:45,160 --> 00:03:46,680 Speaker 2: the agency that it said that does. 77 00:03:47,040 --> 00:03:50,160 Speaker 1: Appreciate your time. Thanks Shawn sean Lyin's net Safety Online 78 00:03:50,160 --> 00:03:54,240 Speaker 1: Safety opposite is fourteen minutes after four. You really would 79 00:03:54,320 --> 00:03:56,400 Speaker 1: just like to hunt them down, wouldn't you? But I mean, 80 00:03:56,440 --> 00:03:58,320 Speaker 1: I don't know how. It's beyond me, and clearly it's 81 00:03:58,360 --> 00:04:01,360 Speaker 1: beyond even the most tech savy people that we have 82 00:04:01,440 --> 00:04:05,120 Speaker 1: in this country. For more from Hither Duplessy Allen Drive, 83 00:04:05,280 --> 00:04:08,720 Speaker 1: listen live to News Talks it B from four pm weekdays, 84 00:04:08,800 --> 00:04:10,960 Speaker 1: or follow the podcast on iHeartRadio.