ChangED

October Is For Cybersecurity, Not Just Pumpkins

Andrew Kuhn & Patrice Semicek Season 3 Episode 4

Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.

0:00 | 26:02

What did you think of the episode? Send us a text!

Think banks have the toughest cyber problems? Our conversation with Shane and Tony from the MCIU tech team flips that assumption fast. K–12 is the most targeted sector in the U.S., and the reasons are both simple and sobering: sprawling device fleets, legacy systems, budget constraints, and a mission that demands access over friction.

The path forward is thoughtful defaults, clear exceptions, and honest communication about why a block exists or a change is required. When people understand the reason, they adopt the rule—and stop turning to risky workarounds. Along the way, we share taglines, a few laughs, and a reminder that October’s Cybersecurity Awareness Month is a kickoff, not a finish line.

If you care about keeping learning safe and systems resilient, don’t miss this one. Subscribe, share it with a colleague who clicks too fast, and leave a review with your best tip for spotting a phish—we’ll feature our favorites next week.

Want to send us a show idea or just say hi? Email us at: thechangedpodcast@gmail.com!

Chaotic Intro And Hosts Banter

SPEAKER_06

Welcome back to Change Ed. Change Ed. The number one educational podcast in the entire Keystone Commonwealth. Because it's not a state. I am one of your hosts, Andrew Kuhn Education.

SPEAKER_01

For dropping that social studies knowledge today's episode. We are a training. Now we're crossing the borders into social studies.

SPEAKER_06

Yeah, we're about education in general. I I was in the middle of saying my name.

SPEAKER_01

I think everyone knows who you are by now.

SPEAKER_06

I'm one of the hosts of the show.

SPEAKER_01

We've changed it again because I had a shit last week.

SPEAKER_06

Yes, it was very public and very loud.

SPEAKER_01

And here with me is Patrice Semitek, apparently a host now. I've been promoted from co-host. Also out of the Montgomery County Intermediate Unit. And I'm still an educational consultant. Did I say that, Everton?

SPEAKER_06

Yeah, just so we're clear up, we're not getting you new business cards. It's still gonna say co-host on your business cards. You need to like scratch it out.

SPEAKER_01

It's because I'm a female.

SPEAKER_06

With us here today.

SPEAKER_01

Every time. Every time. You open the door and I just walk around.

SPEAKER_06

I'm like, I don't know how to get out of this. It makes me feel so uncomfortable. I can't imagine what our how our listeners are three daughters. Yeah.

SPEAKER_01

They come back for it because they're like, keep giving them crap.

SPEAKER_06

Well, here with us today, something we've never had on the show before. People who have never ever listened to our podcast.

SPEAKER_01

That's every episode. Oh, this is a good one. We've only had one episode with a listener.

SPEAKER_06

And we have two individuals that work with us here at Montgomery County Intervention Unit and have been very important in allowing us to be able to do this because their work makes our work work. Wow, that is some smoke.

SPEAKER_01

So we want to welcome to the show two people who apparently make everything possible. What is happening?

SPEAKER_06

I don't know. Go ahead. You know your other host. Go ahead and introduce them.

SPEAKER_01

No, I'm gonna let them introduce themselves. Like Shane and Tony.

Meet Shane And Tony From IT

SPEAKER_06

Welcome to the show, Shane and Tony.

SPEAKER_00

Thanks for having us. Yes, thank you.

SPEAKER_02

It's quite the show.

SPEAKER_00

Quite the intro. I like this. So yeah, I'm Shane. I'm the tech director here at the IU. And then Tony.

SPEAKER_05

Tony Bickard. I'm the assistant director.

SPEAKER_00

And I have listened to an episode of your podcast.

SPEAKER_05

Have you?

SPEAKER_01

Which one? And I'm sorry.

SPEAKER_00

I'm trying to remember. It's one of the very first ones.

SPEAKER_01

Oh, I'm very sorry. Was I on it? Was I allowed to be on it? You were actually. I wasn't. I had to prove myself.

SPEAKER_06

This is not gonna work. You two together on this podcast.

SPEAKER_01

No, it's definitely it's gonna be the highest rated episode ever.

SPEAKER_05

Tony, you got my back. I am first time listener, first time guest.

SPEAKER_01

Tony, Tony is like Switzerland.

SPEAKER_05

Yeah.

SPEAKER_01

He's not gonna support either one of us.

SPEAKER_06

Yeah, Tony's like, I'm just I'm a first-time caller.

SPEAKER_01

He's just gonna watch the dumpster fire.

Taking Over October With Cybersecurity

SPEAKER_06

Now, gentlemen, when we talked about you coming on the show, you were telling me that you in your work are actually competing with trying to take over a cause for October. October can be fire prevention month. It's also breast cancer awareness month. And now Well, we're trying to steal from those two. You're trying to take over and make it a new month. Is that right?

SPEAKER_00

I wouldn't say we're trying. We are taking it over. Oh Cybersecurity Awareness Month.

SPEAKER_06

Time let drop.

SPEAKER_00

Yeah, exactly. Everyone already knows we're taking this over. Tony has kicked it off. Actually, Tony did send the Tony sent an email this morning. Uh, we have a whole campaign running for the month of October with some fun stuff coming down the pipeline. So it is going to be a fun month of nothing but cybersecurity initiatives.

SPEAKER_01

Wow. Sounds riveting.

SPEAKER_06

I want to be clear. I mark that email as spam because I I've done the training. Anything from Tony is usually spamming me. I don't even trust him. So what is what does that mean by with Cybersecurity Month? Because this is something that is important. It actually impacts everything we do. So when I say that your work allows us to do our work, it's very true. It's it's happening all the time behind the scenes. But why does cybersecurity matter in the month of October? Because the other the other 11 months I don't care about it. But this month I care about it.

SPEAKER_00

Yeah, this is the month, the only month that matters. Halloween and cybersecurity.

SPEAKER_06

Oh, that's okay. It's Halloween. You don't want to be scared.

SPEAKER_05

Yeah. Okay, yeah. You know, shameless self-plug. My birthday is in October as well.

SPEAKER_01

So that's it. That's a really good thing.

SPEAKER_05

That's why we had it on the show. Thank you. Surprise. Okay. So October is the month for cybersecurity awareness. And what we're doing is kind of just letting everybody know that cybersecurity is everybody's responsibility. There's only so much we can do from a tech side. You can have, you know, all the bells and whistles. But what truly matters is making sure that our end users and the folks that are at their computers every day know, you know, what it takes to make sure that the bad guys stay out.

SPEAKER_04

Yeah.

Why End Users Matter More Than Tools

SPEAKER_05

And that's what we're doing. We're reminding everybody of little tips here and there. We're doing some training. We're doing some phishing campaigns that help everybody learn what to look for and what to look out for.

SPEAKER_01

So I did like your short and sweet one about cell phones. Was it yesterday or this morning I read it? And I was like, yes, I have an apple. I'm not the green in the chat, but I tended to think for a very long time that my Apple was impervious and I'm learning that it's not necessarily the case anymore.

SPEAKER_05

That is true. That is true.

SPEAKER_01

So that was a good one to start with. I liked it.

SPEAKER_05

We try to do a uh first Sunday of the month. Each Sunday night at the first of the month, we do a tech tip.

SPEAKER_04

Yeah.

SPEAKER_05

And like you said, we like to keep it short and sweet. And we also do provide some links that go to, you know, detail.

SPEAKER_01

I don't click scary.

SPEAKER_05

Yeah. The the irony of the line. The irony of putting a link in the I don't want to be put on I don't want to be put on the watch list.

SPEAKER_01

Like I've gotten uh like oopsie poopsie, you touched a link you shouldn't have.

SPEAKER_05

It happens. It happens. And that just lets us know that we have our work cut out for us and we need to do some more training. Tracy needs more training. Yeah. Yeah. We don't really do it by name. That you don't? No.

SPEAKER_01

Oh. We don't look at it by the way. Well then how come I'm getting targeted emails?

SPEAKER_06

They definitely have a leaderboard that like it ticks up and this fool is always clicking the link. You know what you could also do is in the instill March Madness, make it October Madness, and you can have like your final four. Of who is the worst?

SPEAKER_00

Oh wow, really make a feel back.

unknown

Yeah.

SPEAKER_01

Publicize it.

SPEAKER_05

By office or by person?

SPEAKER_06

Still. Oh, by office might be a little more safe, but but Patricia would win no matter what, whichever way you go with it. So it's fine.

SPEAKER_00

But the good news is you would at least learn through the process. Yes.

SPEAKER_01

Yeah.

SPEAKER_00

So that would be a good idea.

SPEAKER_01

I got two congratulations emails last week.

SPEAKER_06

So what a really good educational look on that, right? Like you're learning no matter what.

SPEAKER_01

Yeah. I I like the confetti that comes with the congratulations email. Feels good. I I, for one, also actually like I've never gotten a congratulations email.

Training, Phishing Sims, And Mobile Myths

SPEAKER_06

You've never had you. Oh me? Yeah, I like watching your congratulations email. No, I like the videos, the training videos, because I I any kind of video like that is not easy to make. And you're gonna watch it and you're like, oh my gosh. But the humor they put in there was subtle, but it very intentional. And there's some in there, it's almost like a Disney movie where like there's extra humor that's layered in. Like if you're not watching for it, you won't see it. So I really appreciate the way that it was written, which is I can't believe no offense. I can't believe I'm saying that about a tech video. I've never seen one where I'm like, oh, this is actually pretty funny.

SPEAKER_00

Yeah, about a tech video and cybersecurity. Yeah, we're trying our best to make them more engaging because we know it's a it's a dry subject. It really is.

SPEAKER_04

Yeah, yeah.

SPEAKER_00

But we're we've engaged with um new platform. We do think the trainings, that was one of our big things, was to get a training platform that was a lot more engaging. Yeah, still got the point across, but not as dry and just tough to really, you know, you guys are busy. We understand that. So they're they're also short, what about two minutes? I think.

SPEAKER_05

Yeah, anywhere from two to like six. So I think six is the longest one. I wish everybody could watch all the videos because I watched a lot of them already. And there are recurring characters who play role.

SPEAKER_01

Oh, it's like a sitcom.

SPEAKER_05

Yeah, it is. And so you'll see the same folks throughout just doing different topics and different So Tony.

SPEAKER_06

If you watch them all in one sitting, we call that binging. So you binge watched these.

SPEAKER_05

I won't, you know, I had to go through and I had to kind of curate a list that I wanted to send out. And, you know, if we're only doing one a month and there's way more videos than that, I had to narrow it down. And you know, I wouldn't call it the best of because there's a lot of really good ones, but stay tuned for ones I may slip in here and there. That you know, Tony's favorites, things like that.

SPEAKER_06

These are like Tony's top hits. That's right. Yeah. So it's almost like Delilah. We could call in and maybe make a request and maybe I'll throw one out there for the end of the day.

SPEAKER_01

Delilah, holy throwback.

SPEAKER_06

Yes, pre-prodcasting.

SPEAKER_01

Is she even on anymore?

SPEAKER_06

I don't know, but I could definitely know?

SPEAKER_01

Shane's kind of young. Shane, do you know who Delilah is?

SPEAKER_00

Delilah from I'm trying to Oh no.

SPEAKER_01

From the radio.

SPEAKER_00

From what?

SPEAKER_01

From the radio.

unknown

Oh man.

SPEAKER_00

Sleepless.

SPEAKER_01

Did you ever watch Sleepless in Seattle?

SPEAKER_00

I didn't.

SPEAKER_01

So you know how they met on the phone where you would call in? Delilah was the one that you're too young. I can't believe I'm saying that. You would call in and like you would basically like sob story with Delilah, and she would answer it with a song, right?

SPEAKER_06

Yeah, yeah. And your whole life was fixed. You're like, I feel great about myself now that's a good one.

SPEAKER_01

Tina Turner played, I'm great. Yeah. Tina Turner played fixes everything.

SPEAKER_06

Oh he was a girlfriend. Today, too.

SPEAKER_00

This is great. Yeah.

SPEAKER_01

Wow. Sleepless in Seattle is a movie by Tom Hanks and Meg Ryan.

SPEAKER_00

I've I swear I've seen that. I'm trying to wow.

SPEAKER_01

I never I never usually I never usually feel old.

SPEAKER_00

We'll wrap it up here and be done.

SPEAKER_01

So yeah.

SPEAKER_00

Come on, your podcast. Yeah. We're being insulted left and right. No, no, insulting.

Making Dry Topics Engaging

SPEAKER_01

I was saying you're young. Take it as a compliment. Oh my lord. Wow. You're right. Shane and I are not a good combo.

SPEAKER_06

Yeah, I actually really like this now. I'm glad we're doing this. This is like a pink, there's a roller coaster of emotions in this podcast. Yes, it's the full gamut.

SPEAKER_00

Well, I I was gonna say back to like movies, but well, Tony and I can talk movies all day if you need to. Not a problem. I can even give you recommendations for shows and movies on cybersecurity, which are pretty cool.

SPEAKER_01

Oh, yeah. So that sounds great.

SPEAKER_00

Yeah, I think you would love it. We'll put those in our show notes.

SPEAKER_01

Wow, these are like long, full-fledged movies.

SPEAKER_06

Are they are they? The question is, are they like legit movies that the cybersecurity themes of cybersecurity?

SPEAKER_00

Yeah, yeah. The the latest one I told you about with Robert De Niro. Uh Zero Day, wasn't it?

SPEAKER_05

Zero Day.

SPEAKER_00

Zero Day, yeah. That was actually really good. That was good.

SPEAKER_01

Can you assign that to us as homework? Can we can we have that as part of our emails? Like next week.

SPEAKER_00

We'd have to pay for a streaming service. And then we get in trouble for paying for a streaming service. Yeah.

SPEAKER_06

But then we get bonus points. So if we click on something, oh, he watched the movie, we're good.

SPEAKER_01

You watched the movie, can I watch whatever else is on Netflix?

SPEAKER_05

You might get a congratulations email.

SPEAKER_01

Oh, with the confetti. Yeah.

SPEAKER_05

Yes.

SPEAKER_00

But see how we loop that to Cybersecurity Awareness Month. One thing that I do want to push, and I always like to say this when we do trainings, is that when you look at the research on the different industries that are targeted with cyber attacks, education is the number one industry in the United States, and it's K-12. Higher ed still does get targeted, but it's K-12 for many reasons.

SPEAKER_01

It's very lucrative.

SPEAKER_00

Yeah, it's a lucrative, unfortunately, operation because districts, you know, we we tend to not have as much funding or resources available, and we tend to be a little bit behind. I hate to say that, where we're trying to catch up and stay ahead of these standards, but it's so expensive to, you know, and you have keep ahead, some kids who uh are smarter than we are who like to circumvent systems. They sure do. It's kind of like whack-a-mole sometimes.

SPEAKER_01

So you just leave yourself open to a lot. And then you have like a lot of like I even think about the high school or middle school my kids go to. There's so many devices that are potentially on your network, and you can't, there's no way you can manage all the phones and all the iPads and all the laptops. Like it's a lot.

SPEAKER_00

And we're seeing like attacks that are happening where it's not maybe traditionally what you would think, where it's like we do have that like classic, you know, phishing attempt and staff members entering stuff they shouldn't have, clicking a link they shouldn't have. But we're also seeing districts where their, say, a maintenance system is has they have their own server that hasn't been updated. And that was the the way to essentially tunnel in through a network where no one's really even paying attention to something like that. Right. And all of a sudden that was connected to the network, and that was a and now they have all that student data with it.

SPEAKER_01

Right, right.

Why K–12 Is The Top Target

SPEAKER_00

So just unique ways that people don't realize, like how bell systems are tied into everything. Like, yeah, and you were talking about phones, how there's more than just traditional laptop, yeah, yeah, phone or you know, tablet that people can use too, you know. There's dishwashers that are on the internet these days. It's crazy, yeah. Yeah, yeah. Point of sale systems for lunch. Like it's everything has an internet connection.

SPEAKER_06

That's why I don't wash my diggers. Just uh keep everybody safe. You know, thank you. We appreciate that.

SPEAKER_05

Yeah, we appreciate that. Yeah, yeah, for your cyber help.

SPEAKER_01

You could use like soap in your hands.

SPEAKER_06

Manual wash my hands, you mean with soap?

SPEAKER_01

Well, I hope you do that too.

SPEAKER_00

Well, I hope you're just collecting rainwater off your roof at home.

SPEAKER_06

Yeah. Non-digital rainwater.

SPEAKER_00

Yeah, non-digital rainwater. No.

SPEAKER_06

One of the things I think is so fascinating that I've been I've been thinking about during this whole conversation is that there are so many points of exposure that your obvious has to be concerned with for across the board. And and now you're throwing in this, like you know, this maintenance, you know, or like these other things are you're like, you would not think about that. So you need to have some level of awareness for everything. And then the second thing that I'm thinking about is how innately as human beings, we can rationalize why we don't have to worry about something. The point that you just made about like schools are actually the most at risk. That would not have been at all what I thought, where I was like, Burst, school. What would you have to do? We're we're nothing, right? Compared to you know, I'd be more concerned about a larger bank when in reality that bank probably has it on lockdown in a way that we don't. So it's I guess it's false assumptions that we make, and then and then we're like, I'm just I'm just I'm just a teacher. Like, why would my computer, if I click here, what would that have? But it sounds like it could create a huge ripple effect just from that one one incident. Is that correct?

Hidden Entry Points And IoT Risks

SPEAKER_00

Yeah, and that's definitely correct. And that's what we've seen working with the districts a few times, you know, and seeing even here times at the IU. I mean, stuff happens, and I do think to your point, people think you have measures in place. We have our firewalls, we have all these security measures in place. So if I do accidentally click something, I should be okay. Maybe I'll get a slap on the wrist, but you know, I I'll be fine. What we're trying to push is that yes, in theory, our stuff should be in place. It should be, I would say, you know, it's up to, I mean, we stay on top of everything and keep all the tech directors updated when anything needs patched instantly. You know, we're sending out messages and whatnot to help the districts, but all it takes is that one little mistake and that one little click that no matter what we put into place, it still finds its way through. And we always at our tech council meetings always say it's not a matter of if it happens, it's a matter of when and are you ready to take it.

SPEAKER_01

And I can't imagine just how exponentially rapidly that's not a right way of saying it, but like how things are changing so, so quickly. Like you can put all these things in place, but it still takes time, even if you were like a major tech conglomerate, like people are still finding all these new ways of absolutely getting in and doing stuff. So even us 10 years behind where we should be most of the time, like I can't even imagine how quickly all of that's changing, even with the addition of AI. I'm sure there's like bots that are out there creating this stuff that are coming in and attacking, and I'm sure they know what all the firmware and all that stuff is already capable of.

SPEAKER_05

And I think it's funny too that you mentioned um banks, Andrew, because in our industry, there's a level of convenience that's needed too. At a bank, you you know you're gonna be inconvenienced because of the security that's in place. Whereas in education, we try to balance security and convenience. And that's you know, that's uh a gamble sometimes because the more secure it is, the less easy to use. So we we find ourselves in that position a lot.

SPEAKER_01

So how do you make those decisions by telling us we can't have Google? Well, obviously, I look right at Shane. I give him a hard time. I'm like Jane, like just from my Google Drive.

SPEAKER_05

We make the best decisions we can giving the information that we have at the time. And um, a lot of times feedback helps, you know, guide us because if we're being too restrictive, yeah, obviously we want to open it up a little bit, but we we don't want to compromise security to do that. Right. And it's it's challenging. It really is.

SPEAKER_00

It is.

SPEAKER_01

I can't imagine being in your positions because not only are you trying to do what you know is best, but now you're trying to navigate the humans that are involved in it. I'm sure it comes with a lot of not so nice emails and not so nice conversations that come in because they're people just don't understand.

SPEAKER_05

Well, we're working really hard to bridge that gap between I've noticed a major change in like the communication that's coming up.

SPEAKER_01

And I think it it's really good.

SPEAKER_05

That's really important to us. The customer service side of it, the it's okay, it's okay to say no, but you want to say no, and here's why, and try to give it a lot of.

SPEAKER_01

I think knowing why makes a huge difference. Yeah, absolutely. Absolutely.

SPEAKER_00

I always joke and I'm like, people only come talk to us when they have a problem. Yeah, I want people to come talk to us when they have an idea or like, yeah, you know, let's work with you guys on finding these solutions rather than just super unapproachable, Shane.

SPEAKER_01

Tony, I could go to Tony for anything, but you, I'm like, Well, you see me ride my bike around town and like the wicked witch.

Balancing Security With Convenience

SPEAKER_06

I mean, let's be honest, you didn't even you didn't even know about Delilah, so I'm gonna go back to it. All of our listeners know about Delilah. That's because they're 95. Yeah, they're well.

SPEAKER_00

You targeted the really great audience. 95-year-old podcast listeners, yeah. That's fantastic.

SPEAKER_01

Yeah, 95-year-olds who want to hear about security, you know, science education.

SPEAKER_00

Yeah, so you've captured like a market of about four people.

SPEAKER_01

Yeah, that's fantastic.

SPEAKER_00

They may have just lost all four. They may have lost all four with us. I'm so sorry. Yeah, yeah.

SPEAKER_02

Well, maybe we'll reach a younger crowd now that you've got to be.

SPEAKER_06

My grandmother still writes checks. That's how she says cybersecurity on top.

SPEAKER_02

I still write checks.

SPEAKER_00

I still laugh at checks. Here's all of my banking information. Here you go.

SPEAKER_01

Seriously, but the Boy Scouts only take checks. That's one of those things we're like, here's literally everything you need to identify me. Why don't you copy my driver's license while you're at it?

SPEAKER_06

We're almost given the illusion of like this is more secure, but we're handing over literally everything. Everything very similar to what we're talking about with in education. We're like, we're good. We're like, actually, we're not good, right? And here's what we have to do, we have to work together.

SPEAKER_01

That's a really good analogy.

SPEAKER_06

Thank you. I wrote it like that.

SPEAKER_01

Chain made.

SPEAKER_06

Oh they started that over.

SPEAKER_00

Yeah, one word into the thought, and it's like we gotta scratch this, start it over. That was garbage. Delete, done, delete.

SPEAKER_02

We're so professional here.

SPEAKER_00

This is exactly how I imagined this going. I'm so glad. When are we starting?

SPEAKER_06

Yeah. Do you hit record? What happened?

SPEAKER_02

Yeah, that's my favorite. This is how I imagined it going.

SPEAKER_06

Yeah, when people say, How is this gonna go? We're like, you just wait.

SPEAKER_02

You just talk to us for five minutes.

SPEAKER_06

Imagine a train wreck going over the side of a cliff and you've you're on fire. Just getting there. You're just getting started.

SPEAKER_00

Oh, this will be great. Then when I ride my bike in the neighborhood tonight, the tree sees me. You'll be embarrassed. I won't be.

SPEAKER_06

No, he'll be like, I know Deliles, I heard it. I watched.

SPEAKER_01

I got on a cassette tape. On a cassette tape. If I feel like I've either done something or I'm being attacked or whatever, like how do I know what to do?

SPEAKER_05

Well, the first thing you would do is report it to us and to you guys, yeah. Yeah, we would take over from there and put the folks, you know, the right folks in the right place to, you know, remediate.

unknown

Yeah.

Reporting Incidents The Right Way

SPEAKER_00

And that's actually a good point because we're trying to get people to use like the the built-in tools that we have where if you feel like via email something came through suspicious or maybe you did click on something you weren't sure of to still report it to us. If you email me or Tony or call us and we're busy, yeah, and it really was something where the clock is ticking, we have it set up on the back end so where when you report it, our team picks it up immediately and starts looking at it rather than I think people think, oh, if they contact someone directly or forward it, it'll it'll get resolved quicker. It actually kind of slows it down a lot of the time. So we prefer you to actually use those tools.

SPEAKER_04

Yeah, yeah.

SPEAKER_00

Because we have it all set up where it's it's like it's triggering a whole something, yeah. Tricking of event, so to speak.

SPEAKER_05

Or forward it to support rather than to an individual. That way the full team gets to look at it.

SPEAKER_06

Yeah. Uh Tony, I know that that this is your first time on the show and probably listening to the show. Last time too. We're thrilled to have you.

SPEAKER_03

Last time.

SPEAKER_06

One time one time caller, one time listener. Yeah. And Shane, since you've been listening before, you know that we typically end the show with a second to last final word. Because Andrew always has to have the final thing. As the host host, you know, capital H host. I have to have the last word. But we're not going to do that today. Oh. Because there's something that's missing from your Cybersecurity Awareness Month, and that is a tagline. So I'd love to hear from everybody what a tagline would be if you came up with a tagline for Cybersecurity Awareness Month.

SPEAKER_00

Well, no, Tony came up with some good names here. So we have bits of support, click and connect, reboot and relate, tech and tell, chat circuit, and then you got the control all chat.

SPEAKER_01

Oh, I like the last one. That was a good one.

SPEAKER_05

So I'm trying to come up with something very similar to casual conversations, but with a tech focus. Yeah, I like it. So I was tossing out some randomizing.

SPEAKER_00

And that's kind of our efforts to be more like uh you just don't hear from us when you have a problem, but we're here to listen.

SPEAKER_01

Especially in the IU world where we're all over the place. Like we get to see you guys on a fairly regular basis because we're in, you know, this building, but so many of our teachers are not.

SPEAKER_03

Oh, yeah.

Human Factors, Communication, And Trust

SPEAKER_01

Like they just don't know who you guys are. And they might know Shane from his picture on the wall, but I don't like they just don't know who you are. And I don't know. The struggle is you're getting an email from Tony. Do I even know who Tony is to click it open and do all that? So I think it's really good that you have a more forward-facing. I think you guys are doing great stuff.

SPEAKER_00

Yeah, so we're trying to get out there and do a little bit more. Um the forward-facing, like you're saying, piece of just you know, I want people to like.

SPEAKER_05

We're thinking about doing a podcast, too.

SPEAKER_01

Are you?

SPEAKER_05

Yeah.

SPEAKER_01

Yeah.

SPEAKER_05

We we Andrew's looking.

SPEAKER_01

I wouldn't write.

SPEAKER_05

No, I mean it's a disaster. Going on a podcast.

SPEAKER_01

Oh, doing a podcast. Oh, you're doing it. You should you should find a real one to do to invite you on.

SPEAKER_06

Just because just because people sit in a studio doesn't mean they know what they're doing. Don't let anybody give a high one of these things. I really like that. Do you have anything, Patrice?

SPEAKER_01

Sure don't.

SPEAKER_06

That's hard, no. All right. Well, I would say for Cybersecurity Awareness Month that I will take use the words of Benjamin Franklin and say an ounce of prevention is worth a pound of cure.

SPEAKER_00

Good way. I like that. Is that the second or last word or the last word? Oh no, we're done.

SPEAKER_01

This is like the 95th time I've heard that statement.

SPEAKER_06

So Which one?

SPEAKER_01

An ounce of prevention is worth a pound of cure.

SPEAKER_00

Wait, Tony should have the last word because he has really good.

SPEAKER_02

All right.

SPEAKER_05

Andrew was talking about rain.

SPEAKER_02

Yeah.

SPEAKER_05

And rain is a cloud-based service.

SPEAKER_02

Oh, I like that. All right. It gets better the longer it sits. Oh man, that's a good one.

SPEAKER_06

Be sure to like and subscribe.

SPEAKER_02

It's a clear one.

SPEAKER_00

So now we're ending on such a low note.

SPEAKER_02

No, I like it. That one made me chuckle.

SPEAKER_06

All right. Thanks for all your work. Thank you for making us aware and for sharing your knowledge with our listeners.

SPEAKER_03

Uh-huh.

SPEAKER_06

Cybersecurity. All right. Hey, good luck getting on a podcast. I hope it works out for you.

SPEAKER_03

Thank you. Thank you.