ChangED
ChangED is an educator based podcast for Pennsylvania teachers to learn more about the PA STEELS Standards and science in general. It is hosted by Andrew Kuhn and Patrice Semicek.
ChangED
October Is For Cybersecurity, Not Just Pumpkins
Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.
What did you think of the episode? Send us a text!
Think banks have the toughest cyber problems? Our conversation with Shane and Tony from the MCIU tech team flips that assumption fast. K–12 is the most targeted sector in the U.S., and the reasons are both simple and sobering: sprawling device fleets, legacy systems, budget constraints, and a mission that demands access over friction.
The path forward is thoughtful defaults, clear exceptions, and honest communication about why a block exists or a change is required. When people understand the reason, they adopt the rule—and stop turning to risky workarounds. Along the way, we share taglines, a few laughs, and a reminder that October’s Cybersecurity Awareness Month is a kickoff, not a finish line.
If you care about keeping learning safe and systems resilient, don’t miss this one. Subscribe, share it with a colleague who clicks too fast, and leave a review with your best tip for spotting a phish—we’ll feature our favorites next week.
Want to send us a show idea or just say hi? Email us at: thechangedpodcast@gmail.com!
Chaotic Intro And Hosts Banter
SPEAKER_06Welcome back to Change Ed. Change Ed. The number one educational podcast in the entire Keystone Commonwealth. Because it's not a state. I am one of your hosts, Andrew Kuhn Education.
SPEAKER_01For dropping that social studies knowledge today's episode. We are a training. Now we're crossing the borders into social studies.
SPEAKER_06Yeah, we're about education in general. I I was in the middle of saying my name.
SPEAKER_01I think everyone knows who you are by now.
SPEAKER_06I'm one of the hosts of the show.
SPEAKER_01We've changed it again because I had a shit last week.
SPEAKER_06Yes, it was very public and very loud.
SPEAKER_01And here with me is Patrice Semitek, apparently a host now. I've been promoted from co-host. Also out of the Montgomery County Intermediate Unit. And I'm still an educational consultant. Did I say that, Everton?
SPEAKER_06Yeah, just so we're clear up, we're not getting you new business cards. It's still gonna say co-host on your business cards. You need to like scratch it out.
SPEAKER_01It's because I'm a female.
SPEAKER_06With us here today.
SPEAKER_01Every time. Every time. You open the door and I just walk around.
SPEAKER_06I'm like, I don't know how to get out of this. It makes me feel so uncomfortable. I can't imagine what our how our listeners are three daughters. Yeah.
SPEAKER_01They come back for it because they're like, keep giving them crap.
SPEAKER_06Well, here with us today, something we've never had on the show before. People who have never ever listened to our podcast.
SPEAKER_01That's every episode. Oh, this is a good one. We've only had one episode with a listener.
SPEAKER_06And we have two individuals that work with us here at Montgomery County Intervention Unit and have been very important in allowing us to be able to do this because their work makes our work work. Wow, that is some smoke.
SPEAKER_01So we want to welcome to the show two people who apparently make everything possible. What is happening?
SPEAKER_06I don't know. Go ahead. You know your other host. Go ahead and introduce them.
SPEAKER_01No, I'm gonna let them introduce themselves. Like Shane and Tony.
Meet Shane And Tony From IT
SPEAKER_06Welcome to the show, Shane and Tony.
SPEAKER_00Thanks for having us. Yes, thank you.
SPEAKER_02It's quite the show.
SPEAKER_00Quite the intro. I like this. So yeah, I'm Shane. I'm the tech director here at the IU. And then Tony.
SPEAKER_05Tony Bickard. I'm the assistant director.
SPEAKER_00And I have listened to an episode of your podcast.
SPEAKER_05Have you?
SPEAKER_01Which one? And I'm sorry.
SPEAKER_00I'm trying to remember. It's one of the very first ones.
SPEAKER_01Oh, I'm very sorry. Was I on it? Was I allowed to be on it? You were actually. I wasn't. I had to prove myself.
SPEAKER_06This is not gonna work. You two together on this podcast.
SPEAKER_01No, it's definitely it's gonna be the highest rated episode ever.
SPEAKER_05Tony, you got my back. I am first time listener, first time guest.
SPEAKER_01Tony, Tony is like Switzerland.
SPEAKER_05Yeah.
SPEAKER_01He's not gonna support either one of us.
SPEAKER_06Yeah, Tony's like, I'm just I'm a first-time caller.
SPEAKER_01He's just gonna watch the dumpster fire.
Taking Over October With Cybersecurity
SPEAKER_06Now, gentlemen, when we talked about you coming on the show, you were telling me that you in your work are actually competing with trying to take over a cause for October. October can be fire prevention month. It's also breast cancer awareness month. And now Well, we're trying to steal from those two. You're trying to take over and make it a new month. Is that right?
SPEAKER_00I wouldn't say we're trying. We are taking it over. Oh Cybersecurity Awareness Month.
SPEAKER_06Time let drop.
SPEAKER_00Yeah, exactly. Everyone already knows we're taking this over. Tony has kicked it off. Actually, Tony did send the Tony sent an email this morning. Uh, we have a whole campaign running for the month of October with some fun stuff coming down the pipeline. So it is going to be a fun month of nothing but cybersecurity initiatives.
SPEAKER_01Wow. Sounds riveting.
SPEAKER_06I want to be clear. I mark that email as spam because I I've done the training. Anything from Tony is usually spamming me. I don't even trust him. So what is what does that mean by with Cybersecurity Month? Because this is something that is important. It actually impacts everything we do. So when I say that your work allows us to do our work, it's very true. It's it's happening all the time behind the scenes. But why does cybersecurity matter in the month of October? Because the other the other 11 months I don't care about it. But this month I care about it.
SPEAKER_00Yeah, this is the month, the only month that matters. Halloween and cybersecurity.
SPEAKER_06Oh, that's okay. It's Halloween. You don't want to be scared.
SPEAKER_05Yeah. Okay, yeah. You know, shameless self-plug. My birthday is in October as well.
SPEAKER_01So that's it. That's a really good thing.
SPEAKER_05That's why we had it on the show. Thank you. Surprise. Okay. So October is the month for cybersecurity awareness. And what we're doing is kind of just letting everybody know that cybersecurity is everybody's responsibility. There's only so much we can do from a tech side. You can have, you know, all the bells and whistles. But what truly matters is making sure that our end users and the folks that are at their computers every day know, you know, what it takes to make sure that the bad guys stay out.
SPEAKER_04Yeah.
Why End Users Matter More Than Tools
SPEAKER_05And that's what we're doing. We're reminding everybody of little tips here and there. We're doing some training. We're doing some phishing campaigns that help everybody learn what to look for and what to look out for.
SPEAKER_01So I did like your short and sweet one about cell phones. Was it yesterday or this morning I read it? And I was like, yes, I have an apple. I'm not the green in the chat, but I tended to think for a very long time that my Apple was impervious and I'm learning that it's not necessarily the case anymore.
SPEAKER_05That is true. That is true.
SPEAKER_01So that was a good one to start with. I liked it.
SPEAKER_05We try to do a uh first Sunday of the month. Each Sunday night at the first of the month, we do a tech tip.
SPEAKER_04Yeah.
SPEAKER_05And like you said, we like to keep it short and sweet. And we also do provide some links that go to, you know, detail.
SPEAKER_01I don't click scary.
SPEAKER_05Yeah. The the irony of the line. The irony of putting a link in the I don't want to be put on I don't want to be put on the watch list.
SPEAKER_01Like I've gotten uh like oopsie poopsie, you touched a link you shouldn't have.
SPEAKER_05It happens. It happens. And that just lets us know that we have our work cut out for us and we need to do some more training. Tracy needs more training. Yeah. Yeah. We don't really do it by name. That you don't? No.
SPEAKER_01Oh. We don't look at it by the way. Well then how come I'm getting targeted emails?
SPEAKER_06They definitely have a leaderboard that like it ticks up and this fool is always clicking the link. You know what you could also do is in the instill March Madness, make it October Madness, and you can have like your final four. Of who is the worst?
SPEAKER_00Oh wow, really make a feel back.
unknownYeah.
SPEAKER_01Publicize it.
SPEAKER_05By office or by person?
SPEAKER_06Still. Oh, by office might be a little more safe, but but Patricia would win no matter what, whichever way you go with it. So it's fine.
SPEAKER_00But the good news is you would at least learn through the process. Yes.
SPEAKER_01Yeah.
SPEAKER_00So that would be a good idea.
SPEAKER_01I got two congratulations emails last week.
SPEAKER_06So what a really good educational look on that, right? Like you're learning no matter what.
SPEAKER_01Yeah. I I like the confetti that comes with the congratulations email. Feels good. I I, for one, also actually like I've never gotten a congratulations email.
Training, Phishing Sims, And Mobile Myths
SPEAKER_06You've never had you. Oh me? Yeah, I like watching your congratulations email. No, I like the videos, the training videos, because I I any kind of video like that is not easy to make. And you're gonna watch it and you're like, oh my gosh. But the humor they put in there was subtle, but it very intentional. And there's some in there, it's almost like a Disney movie where like there's extra humor that's layered in. Like if you're not watching for it, you won't see it. So I really appreciate the way that it was written, which is I can't believe no offense. I can't believe I'm saying that about a tech video. I've never seen one where I'm like, oh, this is actually pretty funny.
SPEAKER_00Yeah, about a tech video and cybersecurity. Yeah, we're trying our best to make them more engaging because we know it's a it's a dry subject. It really is.
SPEAKER_04Yeah, yeah.
SPEAKER_00But we're we've engaged with um new platform. We do think the trainings, that was one of our big things, was to get a training platform that was a lot more engaging. Yeah, still got the point across, but not as dry and just tough to really, you know, you guys are busy. We understand that. So they're they're also short, what about two minutes? I think.
SPEAKER_05Yeah, anywhere from two to like six. So I think six is the longest one. I wish everybody could watch all the videos because I watched a lot of them already. And there are recurring characters who play role.
SPEAKER_01Oh, it's like a sitcom.
SPEAKER_05Yeah, it is. And so you'll see the same folks throughout just doing different topics and different So Tony.
SPEAKER_06If you watch them all in one sitting, we call that binging. So you binge watched these.
SPEAKER_05I won't, you know, I had to go through and I had to kind of curate a list that I wanted to send out. And, you know, if we're only doing one a month and there's way more videos than that, I had to narrow it down. And you know, I wouldn't call it the best of because there's a lot of really good ones, but stay tuned for ones I may slip in here and there. That you know, Tony's favorites, things like that.
SPEAKER_06These are like Tony's top hits. That's right. Yeah. So it's almost like Delilah. We could call in and maybe make a request and maybe I'll throw one out there for the end of the day.
SPEAKER_01Delilah, holy throwback.
SPEAKER_06Yes, pre-prodcasting.
SPEAKER_01Is she even on anymore?
SPEAKER_06I don't know, but I could definitely know?
SPEAKER_01Shane's kind of young. Shane, do you know who Delilah is?
SPEAKER_00Delilah from I'm trying to Oh no.
SPEAKER_01From the radio.
SPEAKER_00From what?
SPEAKER_01From the radio.
unknownOh man.
SPEAKER_00Sleepless.
SPEAKER_01Did you ever watch Sleepless in Seattle?
SPEAKER_00I didn't.
SPEAKER_01So you know how they met on the phone where you would call in? Delilah was the one that you're too young. I can't believe I'm saying that. You would call in and like you would basically like sob story with Delilah, and she would answer it with a song, right?
SPEAKER_06Yeah, yeah. And your whole life was fixed. You're like, I feel great about myself now that's a good one.
SPEAKER_01Tina Turner played, I'm great. Yeah. Tina Turner played fixes everything.
SPEAKER_06Oh he was a girlfriend. Today, too.
SPEAKER_00This is great. Yeah.
SPEAKER_01Wow. Sleepless in Seattle is a movie by Tom Hanks and Meg Ryan.
SPEAKER_00I've I swear I've seen that. I'm trying to wow.
SPEAKER_01I never I never usually I never usually feel old.
SPEAKER_00We'll wrap it up here and be done.
SPEAKER_01So yeah.
SPEAKER_00Come on, your podcast. Yeah. We're being insulted left and right. No, no, insulting.
Making Dry Topics Engaging
SPEAKER_01I was saying you're young. Take it as a compliment. Oh my lord. Wow. You're right. Shane and I are not a good combo.
SPEAKER_06Yeah, I actually really like this now. I'm glad we're doing this. This is like a pink, there's a roller coaster of emotions in this podcast. Yes, it's the full gamut.
SPEAKER_00Well, I I was gonna say back to like movies, but well, Tony and I can talk movies all day if you need to. Not a problem. I can even give you recommendations for shows and movies on cybersecurity, which are pretty cool.
SPEAKER_01Oh, yeah. So that sounds great.
SPEAKER_00Yeah, I think you would love it. We'll put those in our show notes.
SPEAKER_01Wow, these are like long, full-fledged movies.
SPEAKER_06Are they are they? The question is, are they like legit movies that the cybersecurity themes of cybersecurity?
SPEAKER_00Yeah, yeah. The the latest one I told you about with Robert De Niro. Uh Zero Day, wasn't it?
SPEAKER_05Zero Day.
SPEAKER_00Zero Day, yeah. That was actually really good. That was good.
SPEAKER_01Can you assign that to us as homework? Can we can we have that as part of our emails? Like next week.
SPEAKER_00We'd have to pay for a streaming service. And then we get in trouble for paying for a streaming service. Yeah.
SPEAKER_06But then we get bonus points. So if we click on something, oh, he watched the movie, we're good.
SPEAKER_01You watched the movie, can I watch whatever else is on Netflix?
SPEAKER_05You might get a congratulations email.
SPEAKER_01Oh, with the confetti. Yeah.
SPEAKER_05Yes.
SPEAKER_00But see how we loop that to Cybersecurity Awareness Month. One thing that I do want to push, and I always like to say this when we do trainings, is that when you look at the research on the different industries that are targeted with cyber attacks, education is the number one industry in the United States, and it's K-12. Higher ed still does get targeted, but it's K-12 for many reasons.
SPEAKER_01It's very lucrative.
SPEAKER_00Yeah, it's a lucrative, unfortunately, operation because districts, you know, we we tend to not have as much funding or resources available, and we tend to be a little bit behind. I hate to say that, where we're trying to catch up and stay ahead of these standards, but it's so expensive to, you know, and you have keep ahead, some kids who uh are smarter than we are who like to circumvent systems. They sure do. It's kind of like whack-a-mole sometimes.
SPEAKER_01So you just leave yourself open to a lot. And then you have like a lot of like I even think about the high school or middle school my kids go to. There's so many devices that are potentially on your network, and you can't, there's no way you can manage all the phones and all the iPads and all the laptops. Like it's a lot.
SPEAKER_00And we're seeing like attacks that are happening where it's not maybe traditionally what you would think, where it's like we do have that like classic, you know, phishing attempt and staff members entering stuff they shouldn't have, clicking a link they shouldn't have. But we're also seeing districts where their, say, a maintenance system is has they have their own server that hasn't been updated. And that was the the way to essentially tunnel in through a network where no one's really even paying attention to something like that. Right. And all of a sudden that was connected to the network, and that was a and now they have all that student data with it.
SPEAKER_01Right, right.
Why K–12 Is The Top Target
SPEAKER_00So just unique ways that people don't realize, like how bell systems are tied into everything. Like, yeah, and you were talking about phones, how there's more than just traditional laptop, yeah, yeah, phone or you know, tablet that people can use too, you know. There's dishwashers that are on the internet these days. It's crazy, yeah. Yeah, yeah. Point of sale systems for lunch. Like it's everything has an internet connection.
SPEAKER_06That's why I don't wash my diggers. Just uh keep everybody safe. You know, thank you. We appreciate that.
SPEAKER_05Yeah, we appreciate that. Yeah, yeah, for your cyber help.
SPEAKER_01You could use like soap in your hands.
SPEAKER_06Manual wash my hands, you mean with soap?
SPEAKER_01Well, I hope you do that too.
SPEAKER_00Well, I hope you're just collecting rainwater off your roof at home.
SPEAKER_06Yeah. Non-digital rainwater.
SPEAKER_00Yeah, non-digital rainwater. No.
SPEAKER_06One of the things I think is so fascinating that I've been I've been thinking about during this whole conversation is that there are so many points of exposure that your obvious has to be concerned with for across the board. And and now you're throwing in this, like you know, this maintenance, you know, or like these other things are you're like, you would not think about that. So you need to have some level of awareness for everything. And then the second thing that I'm thinking about is how innately as human beings, we can rationalize why we don't have to worry about something. The point that you just made about like schools are actually the most at risk. That would not have been at all what I thought, where I was like, Burst, school. What would you have to do? We're we're nothing, right? Compared to you know, I'd be more concerned about a larger bank when in reality that bank probably has it on lockdown in a way that we don't. So it's I guess it's false assumptions that we make, and then and then we're like, I'm just I'm just I'm just a teacher. Like, why would my computer, if I click here, what would that have? But it sounds like it could create a huge ripple effect just from that one one incident. Is that correct?
Hidden Entry Points And IoT Risks
SPEAKER_00Yeah, and that's definitely correct. And that's what we've seen working with the districts a few times, you know, and seeing even here times at the IU. I mean, stuff happens, and I do think to your point, people think you have measures in place. We have our firewalls, we have all these security measures in place. So if I do accidentally click something, I should be okay. Maybe I'll get a slap on the wrist, but you know, I I'll be fine. What we're trying to push is that yes, in theory, our stuff should be in place. It should be, I would say, you know, it's up to, I mean, we stay on top of everything and keep all the tech directors updated when anything needs patched instantly. You know, we're sending out messages and whatnot to help the districts, but all it takes is that one little mistake and that one little click that no matter what we put into place, it still finds its way through. And we always at our tech council meetings always say it's not a matter of if it happens, it's a matter of when and are you ready to take it.
SPEAKER_01And I can't imagine just how exponentially rapidly that's not a right way of saying it, but like how things are changing so, so quickly. Like you can put all these things in place, but it still takes time, even if you were like a major tech conglomerate, like people are still finding all these new ways of absolutely getting in and doing stuff. So even us 10 years behind where we should be most of the time, like I can't even imagine how quickly all of that's changing, even with the addition of AI. I'm sure there's like bots that are out there creating this stuff that are coming in and attacking, and I'm sure they know what all the firmware and all that stuff is already capable of.
SPEAKER_05And I think it's funny too that you mentioned um banks, Andrew, because in our industry, there's a level of convenience that's needed too. At a bank, you you know you're gonna be inconvenienced because of the security that's in place. Whereas in education, we try to balance security and convenience. And that's you know, that's uh a gamble sometimes because the more secure it is, the less easy to use. So we we find ourselves in that position a lot.
SPEAKER_01So how do you make those decisions by telling us we can't have Google? Well, obviously, I look right at Shane. I give him a hard time. I'm like Jane, like just from my Google Drive.
SPEAKER_05We make the best decisions we can giving the information that we have at the time. And um, a lot of times feedback helps, you know, guide us because if we're being too restrictive, yeah, obviously we want to open it up a little bit, but we we don't want to compromise security to do that. Right. And it's it's challenging. It really is.
SPEAKER_00It is.
SPEAKER_01I can't imagine being in your positions because not only are you trying to do what you know is best, but now you're trying to navigate the humans that are involved in it. I'm sure it comes with a lot of not so nice emails and not so nice conversations that come in because they're people just don't understand.
SPEAKER_05Well, we're working really hard to bridge that gap between I've noticed a major change in like the communication that's coming up.
SPEAKER_01And I think it it's really good.
SPEAKER_05That's really important to us. The customer service side of it, the it's okay, it's okay to say no, but you want to say no, and here's why, and try to give it a lot of.
SPEAKER_01I think knowing why makes a huge difference. Yeah, absolutely. Absolutely.
SPEAKER_00I always joke and I'm like, people only come talk to us when they have a problem. Yeah, I want people to come talk to us when they have an idea or like, yeah, you know, let's work with you guys on finding these solutions rather than just super unapproachable, Shane.
SPEAKER_01Tony, I could go to Tony for anything, but you, I'm like, Well, you see me ride my bike around town and like the wicked witch.
Balancing Security With Convenience
SPEAKER_06I mean, let's be honest, you didn't even you didn't even know about Delilah, so I'm gonna go back to it. All of our listeners know about Delilah. That's because they're 95. Yeah, they're well.
SPEAKER_00You targeted the really great audience. 95-year-old podcast listeners, yeah. That's fantastic.
SPEAKER_01Yeah, 95-year-olds who want to hear about security, you know, science education.
SPEAKER_00Yeah, so you've captured like a market of about four people.
SPEAKER_01Yeah, that's fantastic.
SPEAKER_00They may have just lost all four. They may have lost all four with us. I'm so sorry. Yeah, yeah.
SPEAKER_02Well, maybe we'll reach a younger crowd now that you've got to be.
SPEAKER_06My grandmother still writes checks. That's how she says cybersecurity on top.
SPEAKER_02I still write checks.
SPEAKER_00I still laugh at checks. Here's all of my banking information. Here you go.
SPEAKER_01Seriously, but the Boy Scouts only take checks. That's one of those things we're like, here's literally everything you need to identify me. Why don't you copy my driver's license while you're at it?
SPEAKER_06We're almost given the illusion of like this is more secure, but we're handing over literally everything. Everything very similar to what we're talking about with in education. We're like, we're good. We're like, actually, we're not good, right? And here's what we have to do, we have to work together.
SPEAKER_01That's a really good analogy.
SPEAKER_06Thank you. I wrote it like that.
SPEAKER_01Chain made.
SPEAKER_06Oh they started that over.
SPEAKER_00Yeah, one word into the thought, and it's like we gotta scratch this, start it over. That was garbage. Delete, done, delete.
SPEAKER_02We're so professional here.
SPEAKER_00This is exactly how I imagined this going. I'm so glad. When are we starting?
SPEAKER_06Yeah. Do you hit record? What happened?
SPEAKER_02Yeah, that's my favorite. This is how I imagined it going.
SPEAKER_06Yeah, when people say, How is this gonna go? We're like, you just wait.
SPEAKER_02You just talk to us for five minutes.
SPEAKER_06Imagine a train wreck going over the side of a cliff and you've you're on fire. Just getting there. You're just getting started.
SPEAKER_00Oh, this will be great. Then when I ride my bike in the neighborhood tonight, the tree sees me. You'll be embarrassed. I won't be.
SPEAKER_06No, he'll be like, I know Deliles, I heard it. I watched.
SPEAKER_01I got on a cassette tape. On a cassette tape. If I feel like I've either done something or I'm being attacked or whatever, like how do I know what to do?
SPEAKER_05Well, the first thing you would do is report it to us and to you guys, yeah. Yeah, we would take over from there and put the folks, you know, the right folks in the right place to, you know, remediate.
unknownYeah.
Reporting Incidents The Right Way
SPEAKER_00And that's actually a good point because we're trying to get people to use like the the built-in tools that we have where if you feel like via email something came through suspicious or maybe you did click on something you weren't sure of to still report it to us. If you email me or Tony or call us and we're busy, yeah, and it really was something where the clock is ticking, we have it set up on the back end so where when you report it, our team picks it up immediately and starts looking at it rather than I think people think, oh, if they contact someone directly or forward it, it'll it'll get resolved quicker. It actually kind of slows it down a lot of the time. So we prefer you to actually use those tools.
SPEAKER_04Yeah, yeah.
SPEAKER_00Because we have it all set up where it's it's like it's triggering a whole something, yeah. Tricking of event, so to speak.
SPEAKER_05Or forward it to support rather than to an individual. That way the full team gets to look at it.
SPEAKER_06Yeah. Uh Tony, I know that that this is your first time on the show and probably listening to the show. Last time too. We're thrilled to have you.
SPEAKER_03Last time.
SPEAKER_06One time one time caller, one time listener. Yeah. And Shane, since you've been listening before, you know that we typically end the show with a second to last final word. Because Andrew always has to have the final thing. As the host host, you know, capital H host. I have to have the last word. But we're not going to do that today. Oh. Because there's something that's missing from your Cybersecurity Awareness Month, and that is a tagline. So I'd love to hear from everybody what a tagline would be if you came up with a tagline for Cybersecurity Awareness Month.
SPEAKER_00Well, no, Tony came up with some good names here. So we have bits of support, click and connect, reboot and relate, tech and tell, chat circuit, and then you got the control all chat.
SPEAKER_01Oh, I like the last one. That was a good one.
SPEAKER_05So I'm trying to come up with something very similar to casual conversations, but with a tech focus. Yeah, I like it. So I was tossing out some randomizing.
SPEAKER_00And that's kind of our efforts to be more like uh you just don't hear from us when you have a problem, but we're here to listen.
SPEAKER_01Especially in the IU world where we're all over the place. Like we get to see you guys on a fairly regular basis because we're in, you know, this building, but so many of our teachers are not.
SPEAKER_03Oh, yeah.
Human Factors, Communication, And Trust
SPEAKER_01Like they just don't know who you guys are. And they might know Shane from his picture on the wall, but I don't like they just don't know who you are. And I don't know. The struggle is you're getting an email from Tony. Do I even know who Tony is to click it open and do all that? So I think it's really good that you have a more forward-facing. I think you guys are doing great stuff.
SPEAKER_00Yeah, so we're trying to get out there and do a little bit more. Um the forward-facing, like you're saying, piece of just you know, I want people to like.
SPEAKER_05We're thinking about doing a podcast, too.
SPEAKER_01Are you?
SPEAKER_05Yeah.
SPEAKER_01Yeah.
SPEAKER_05We we Andrew's looking.
SPEAKER_01I wouldn't write.
SPEAKER_05No, I mean it's a disaster. Going on a podcast.
SPEAKER_01Oh, doing a podcast. Oh, you're doing it. You should you should find a real one to do to invite you on.
SPEAKER_06Just because just because people sit in a studio doesn't mean they know what they're doing. Don't let anybody give a high one of these things. I really like that. Do you have anything, Patrice?
SPEAKER_01Sure don't.
SPEAKER_06That's hard, no. All right. Well, I would say for Cybersecurity Awareness Month that I will take use the words of Benjamin Franklin and say an ounce of prevention is worth a pound of cure.
SPEAKER_00Good way. I like that. Is that the second or last word or the last word? Oh no, we're done.
SPEAKER_01This is like the 95th time I've heard that statement.
SPEAKER_06So Which one?
SPEAKER_01An ounce of prevention is worth a pound of cure.
SPEAKER_00Wait, Tony should have the last word because he has really good.
SPEAKER_02All right.
SPEAKER_05Andrew was talking about rain.
SPEAKER_02Yeah.
SPEAKER_05And rain is a cloud-based service.
SPEAKER_02Oh, I like that. All right. It gets better the longer it sits. Oh man, that's a good one.
SPEAKER_06Be sure to like and subscribe.
SPEAKER_02It's a clear one.
SPEAKER_00So now we're ending on such a low note.
SPEAKER_02No, I like it. That one made me chuckle.
SPEAKER_06All right. Thanks for all your work. Thank you for making us aware and for sharing your knowledge with our listeners.
SPEAKER_03Uh-huh.
SPEAKER_06Cybersecurity. All right. Hey, good luck getting on a podcast. I hope it works out for you.
SPEAKER_03Thank you. Thank you.