April 13, 2026

The Real Cost of a Ransomware Attack: The Ransom Is the Least of Your Problems

The Real Cost of a Ransomware Attack: The Ransom Is the Least of Your Problems
Apple Podcasts podcast player badge
Spotify podcast player badge
Castro podcast player badge
RSS Feed podcast player badge
Apple Podcasts podcast player iconSpotify podcast player iconCastro podcast player iconRSS Feed podcast player icon

The cost of a ransomware attack goes way beyond the ransom itself — and most organizations don't find that out until it's too late. In this episode of The Backup Wrap-up, W. Curtis Preston (Mr. Backup) and co-host Prasanna Malaiyandi sit down with Dr. Mike Saylor of Black Swan Cybersecurity to walk through every category of cost that hits when ransomware strikes.

The case that kicks everything off: UVM Health Network, October 2020. Over 1,300 servers encrypted, staff forced back to paper records, patient care disrupted for weeks. Total tab? Over $63 million — and they never paid the ransom.

From there, we go category by category: people costs (overtime, third-party IR firms, emergency hardware), lost business revenue, regulatory fines, reputational damage that doesn't wash off, staff burnout and resignations, supply chain chaos, payment processor shutdowns, and cyber insurance fine print that can leave you holding the bag even when you think you're covered.

We also cover what you should be doing right now — before any of this happens to you. Starting with a Business Impact Analysis, which Mike argues most small-to-medium businesses can knock out in one to three weeks. Knowing what a downed system costs you per hour is exactly the information that gets you budget from leadership and a plan that actually works when the feces hits the rotary oscillator.

Chapters:

00:01:44 - Intro & Welcome

00:03:45 - Case Study: UVM Health Network ($63M, 1,300 Servers Down)

00:07:12 - People Costs: Overtime, Staffing & Third-Party IR Firms

00:10:01 - The Odds Are Damn Near 100% — Set Up Your IR Relationship Now

00:13:00 - Hardware Costs & Emergency Spending

00:14:05 - Lost Business Revenue (Current and Future)

00:15:14 - The Stat That Should Scare You: Over 50% Don't Survive

00:16:38 - Regulatory Fines (GDPR, California & More)

00:19:32 - Reputational Damage: Your Customers Never Forget

00:21:28 - Staff Burnout, Exhaustion & Resignations

00:22:40 - Supply Chain Disruption & Credit Rating Impact

00:24:07 - Payment Processor Shutdown (Real Case: Dental Practice)

00:26:00 - Cyber Insurance: Fine Print, Claim Denials & Premium Spikes

00:27:52 - Post-Attack Process Remediation Costs

00:29:36 - Business Impact Analysis: Why You Need One Before It Happens

00:35:00 - Action Items

00:39:41 - Recovery Prioritization & Recovery Point Objectives

00:44:43 - Wrap

Speaker:

You found the backup wrap up your go-to podcast for all things

Speaker:

backup recovery and cyber recovery.

Speaker:

In this episode, we look at something that most people completely miss

Speaker:

when they think about ransomware, and that's the cost of a ransomware attack.

Speaker:

Is way beyond the cost of the ransom itself.

Speaker:

Join me and my co-host persona as we talk to Dr.

Speaker:

Mike Saylor, who's the co-author on my latest book Learning

Speaker:

Ransomware Response and Recovery.

Speaker:

We walked through real cases like the UVM Health Network attack that ran up a $63

Speaker:

million tab without paying the ransom lost revenue, regulatory fines, staff burnout,

Speaker:

reputational damage, supply chain chaos.

Speaker:

And cyber insurance fine print that I think might surprise you if you think the

Speaker:

ransom is the biggest part of the bill.

Speaker:

Stick around.

Speaker:

I think you ear in for shock.

Speaker:

Just a quick note about me.

Speaker:

I'm w Curtis Preston, AKA Mr. Backup, and I've been obsessing over backup

Speaker:

recovery and now cyber recovery.

Speaker:

For over 30 years.

Speaker:

If that's your bag, then I'm your guy.

Speaker:

You're not gonna find anybody that cares about it more than me.

Speaker:

Ever since 1993 when I had to tell my boss that there were no backups

Speaker:

of that database that we just lost.

Speaker:

Now I've written five books, a blog and a podcast.

Speaker:

Here we turn unappreciated admins into Cyber Recovery Heroes.

Speaker:

This is the backup wrap up.

Speaker:

Hi, and welcome to the backup wrap up.

Speaker:

I'm your host, w Curtis Preston, AKA, Mr. Backup, and I have with me a guy

Speaker:

who just confessed his love for me.

Speaker:

Prasanna, Molly.

Speaker:

Andy, how's it going?

Speaker:

Prasanna.

Speaker:

Why do you sound so shocked?

Speaker:

That's what I wanna know.

Speaker:

The, the mutual, it's a mutual admiration society.

Speaker:

You doing all right over there

Speaker:

with your branded shirt, which I still can't find.

Speaker:

I, swear I've looked everywhere.

Speaker:

if you're doing swag

Speaker:

or doing things, you need to buy four for yourself.

Speaker:

Well, clearly more than one.

Speaker:

Yes.

Speaker:

looked all over this house.

Speaker:

I've

Speaker:

And honest.

Speaker:

to clean.

Speaker:

Yeah.

Speaker:

And two is not enough for you Curtis, I

Speaker:

have to say.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

Well, you know, what are we gonna do?

Speaker:

Uh, and then also with us, we have somebody who I swear I'm,

Speaker:

I'm sure would not lose a branded piece of swag if I send it to him.

Speaker:

Doctor Mike Sailor, how's it going, Mike?

Speaker:

It is going great guys, and just to be, uh, upfront, I will probably ask for four.

Speaker:

So you, you got CRS as well, can't remember stuff.

Speaker:

Um,

Speaker:

I would, I would probably wear one each day and,

Speaker:

uh, you know, uh, it,

Speaker:

it's, uh,

Speaker:

the Einstein, the Einstein, uh, approach.

Speaker:

Right.

Speaker:

yep.

Speaker:

It simplify my wardrobe.

Speaker:

That's right.

Speaker:

Right.

Speaker:

Right.

Speaker:

but if you are wearing the same thing every day, do you technically need

Speaker:

for, can you just wear one and wear it four days and no one will ever notice?

Speaker:

As

Speaker:

long as it doesn't smell.

Speaker:

well, and there there's more to it.

Speaker:

In my, in my thinking, I, it's, it's, it's about efficiency and economy.

Speaker:

And so if I, if I only had one, then I would have to wash it the next day.

Speaker:

Well, I'm not just gonna wash one shirt, so

Speaker:

after four days, I've probably got a decent amount of laundry to do,

Speaker:

Hmm.

Speaker:

days,

Speaker:

smart man.

Speaker:

Smart man.

Speaker:

Yeah.

Speaker:

All right.

Speaker:

Well, we are not gonna be talking about wardrobes anymore

Speaker:

Can

Speaker:

we talk about laundry?

Speaker:

Uh, we're gonna talk about the hidden cost of a breach and, uh, I, you know,

Speaker:

I was looking around for some stories.

Speaker:

terms of, you know, ones that talk about that show how much more cost of

Speaker:

a breach, how much more of it has to do with things that aren't the ransom.

Speaker:

We, we, when we talk about ransomware, we talk about how

Speaker:

expensive that ransom can be.

Speaker:

But this episode we want you to think about what else might, uh,

Speaker:

a ransomware attack cost you.

Speaker:

And I'm gonna start with this attack from the UVM Health Network in October of 2020.

Speaker:

It crippled their IT systems for nearly a month, costing over $63 million.

Speaker:

Started from, uh, initially via a phishing email.

Speaker:

And, uh, they had to use, if you can get this, I, by the way, I, I'm a fan.

Speaker:

Um, what, shoot, I did it again.

Speaker:

Alright.

Speaker:

The, so it forced the staff to use paper records.

Speaker:

Uh, obviously delayed patient care, uh, shutting down over 1300 servers.

Speaker:

I'm a fan of this TV show called The Pit.

Speaker:

And In the Pit they are currently experiencing this exact, uh, outage

Speaker:

and they are, uh, switching to.

Speaker:

Paper records and, uh, you know, it, it, if you're not a fan of the

Speaker:

show, it's a huge, huge, uh, uh, hit.

Speaker:

And, um, if, if you're arf fan, make sure that you watch it and you look at this

Speaker:

because it really gives you an idea of the impact to the rest of the business.

Speaker:

You're, we're so.

Speaker:

Tied to, uh, technology that we don't know.

Speaker:

And imagine when you think about the degree to which technology

Speaker:

has impacted healthcare, right?

Speaker:

So they talked about how it impacted radiology, uh, laboratory services,

Speaker:

and they used something called the MyChart portal, with, uh, imagine if

Speaker:

My, my, my, my healthcare provider uses that.

Speaker:

Do they MyChart?

Speaker:

Um, imagine if that's how everybody finds out about their

Speaker:

healthcare then suddenly it's gone.

Speaker:

Right?

Speaker:

Um, and, um, um, so they're

Speaker:

Wait,

Speaker:

computers and 1300 servers were encrypted.

Speaker:

Uh, you have any other, uh, details on this story, Mike?

Speaker:

Uh, just a few.

Speaker:

I mean, I think it was, uh, it's interesting how it actually happened.

Speaker:

Uh, the, uh, an employee took their work laptop with 'em on vacation,

Speaker:

opened a phishing email, laptop, got compromised, brought it back into the

Speaker:

environment, and then, uh, the, the malware spread once, uh, it reconnected

Speaker:

to the, the company's network.

Speaker:

So that was interesting.

Speaker:

Um, and then the, the other part about that is it's not very

Speaker:

often that we catch the bad guys.

Speaker:

Um, not that it, it, it offered any, um, any latitude here other than, you know,

Speaker:

you've got, uh, from a, from a victim perspective, you've got some damages you

Speaker:

could probably collect from this guy.

Speaker:

Pounding rocks in jail.

Speaker:

Uh, but they did catch him.

Speaker:

Uh, it was a Ukrainian, uh, hacker.

Speaker:

Um.

Speaker:

But, you know, we'll, we'll jump into some of the, the other things to think

Speaker:

about from a damages perspective.

Speaker:

It's not just financial, uh, you know, directly related to

Speaker:

ransom or directly even related to, uh, your recovery efforts.

Speaker:

There's a lot of other things to think about.

Speaker:

Yeah.

Speaker:

Um.

Speaker:

Uh, Prasanna, you think about like, what would be, like, what would be

Speaker:

like the first thing that you would think to, obviously the ransom, right?

Speaker:

What would you think would be like the first thing that we would talk about when

Speaker:

Well,

Speaker:

we lost revenue or, uh,

Speaker:

yeah.

Speaker:

Well, well, even with the, the,

Speaker:

the question, but,

Speaker:

no, I'm not, I'm, I'm not even thinking about that stuff.

Speaker:

Right.

Speaker:

What I, what went to my mind, right.

Speaker:

You pay a ransom.

Speaker:

Great.

Speaker:

There's a cost of sort of like recovering your environment.

Speaker:

Mm-hmm.

Speaker:

Mm-hmm.

Speaker:

Be it people going around re-imaging systems, trying to recover data,

Speaker:

getting things back up and running in.

Speaker:

Probably, it's all the stuff that Mike, we've talked about

Speaker:

on the podcast before, right?

Speaker:

It's like that process of just recovering your environment,

Speaker:

Right.

Speaker:

right?

Speaker:

Which might take weeks or months, and there is a cost associated

Speaker:

with that beyond just sort of the, Hey, I paid the ransom.

Speaker:

Let's talk about that.

Speaker:

Like what type of costs are we talking about?

Speaker:

Like, um, are we talking about like, we talking about overtime?

Speaker:

Um,

Speaker:

Well, it's like people,

Speaker:

well yeah.

Speaker:

People, right?

Speaker:

yeah.

Speaker:

Mike, I, I, uh, I was just thinking about whether or not

Speaker:

overtime would, would happen.

Speaker:

That's probably not, not a lot of it.

Speaker:

People, they're, they're, they're generally staffed, right?

Speaker:

They're generally sorry, exempt IT people.

Speaker:

Um, it, it depends on their role.

Speaker:

Uh,

Speaker:

so to, in order to be exempt, you have to be in a leadership,

Speaker:

you know, independent role.

Speaker:

A

Speaker:

lot of lower level IT and cyber people are not.

Speaker:

So they

Speaker:

would be eligible for, for overtime.

Speaker:

So that'd be, that'd be a big cost.

Speaker:

Right?

Speaker:

So,

Speaker:

or hiring people like Mike to come in to help them.

Speaker:

Well, yeah, that's, that was definitely the next, right?

Speaker:

So, so.

Speaker:

So hopefully you are going, you know, one of the things that we make in, uh,

Speaker:

one of the points that I know we make in this lovely book here, uh, learning

Speaker:

Ransomware Response and Recovery.

Speaker:

Yeah.

Speaker:

For people who don't know, we have video you can watch us describe things.

Speaker:

You can see Curtis Point at the book right behind him.

Speaker:

If you go to YouTube and search for this channel, we are there.

Speaker:

By the way, none of us have the actual book Do.

Speaker:

Have you ever received your books yet, Mike?

Speaker:

I have

Speaker:

not.

Speaker:

Yep.

Speaker:

it's gonna happen.

Speaker:

Just at some point then you'd be able to like hold it up.

Speaker:

You know, I was looking at some of my, my other books up there on the shelf.

Speaker:

It's very, it's very cool once you finally have it in your hot little hands.

Speaker:

But yeah.

Speaker:

So one of the things that we recommend is that before all of this happens,

Speaker:

because Mike, what, what, what position did we take in the book

Speaker:

as to whether or not the odds that this would eventually happen to you?

Speaker:

It is pretty high.

Speaker:

Pretty high.

Speaker:

Pretty

Speaker:

An understatement.

Speaker:

Damn near a hundred percent right?

Speaker:

Uh, so before this happens to you, one of the things we talk about is to establish

Speaker:

a relationship with a company like Mike's.

Speaker:

Uh, Mike, you wanna talk about, like, when we say a company like

Speaker:

yours, what, what do we mean?

Speaker:

A company like Black Swan Cybersecurity, uh, you know, we're not just a security

Speaker:

managed security services firm from a protection, monitoring perspective.

Speaker:

We're also an incident response and litigation support firm.

Speaker:

So, uh, kind of that trusted advisor that you can call for, you

Speaker:

know, the entire spectrum of it.

Speaker:

Cyber issues or, or questions or, or services.

Speaker:

Um, and, and that perspective that we bring to the table

Speaker:

regarding, regardless of where we.

Speaker:

Or how we work with a particular organization, we're able to, to expand

Speaker:

the, the value of that conversation based on all the other things we do.

Speaker:

Uh, so we're not just talking about, uh, keeping you from, uh,

Speaker:

getting attacked or mitigating what that attack might look like.

Speaker:

We can also talk about, well, if you do get attacked, uh, depending on what

Speaker:

controls or services or capabilities you have, this is what you can expect.

Speaker:

Uh, on the back end of, of an attack and, and how that's gonna go.

Speaker:

Um, and so even if you have all the great, you know, greatest tools and, and brand

Speaker:

names, uh, deployed in your environment, uh, odds are it's gonna happen.

Speaker:

Uh, and we saw that with CrowdStrike, right?

Speaker:

It, it wasn't a cyber attack on you, it was an outage on CrowdStrike.

Speaker:

With that left your environment vulnerable and then you get attacked.

Speaker:

'cause bad guys watch the news also.

Speaker:

Um, alright, so now what, uh, I had CrowdStrike, but I got attacked.

Speaker:

Who do I call now?

Speaker:

I'm probably not gonna call CrowdStrike 'cause they're busy putting out their own

Speaker:

fire and I'm a little upset at them now.

Speaker:

Uh, so, so who am I gonna call instead?

Speaker:

Um, and so having those, uh, those resources in your pocket and,

Speaker:

and having gotten to know them.

Speaker:

Before an incident, you know, call 'em today, uh, when things are nice

Speaker:

and calm and you can have a good conversation or cup of coffee, um,

Speaker:

and not when the house is on fire and you're emotional and you're not sure

Speaker:

what to say or, or what to do next.

Speaker:

Yeah, so I like that idea of having basically, you know, you, the thing is

Speaker:

that the good news is that most people.

Speaker:

Uh, don't have a lot of experience in cyber recovery.

Speaker:

And, and by that I mean, if they did, then that would really suck, because that

Speaker:

means that they're doing it all the time.

Speaker:

And so this is definitely one of those things where I think a professional

Speaker:

can come in, uh, you know, uh, come in handy, uh, quite a bit, right?

Speaker:

Um, I, I did, while you were talking, I, I, I got this image

Speaker:

of you standing between, uh, the fan and the feces, um, uh,

Speaker:

and fighting it off.

Speaker:

Um, so, we talked about lost revenue, or we didn't talk about we, so

Speaker:

the first thing we talked about lost wages, and we talked about

Speaker:

bringing in third party services.

Speaker:

What were you about to say?

Speaker:

Prasanna?

Speaker:

But also along the recovery aspect before we get to the

Speaker:

revenue piece, right?

Speaker:

It's, you might need hardware.

Speaker:

Right.

Speaker:

Maybe you need to buy more servers or maybe you need to spin up services

Speaker:

in AWS or pick your cloud service in order to recover or start to recover

Speaker:

while you're still remediating other systems in the environment.

Speaker:

Maybe you're gonna need all of those things, right?

Speaker:

Yeah.

Speaker:

you know, and it's gonna be in this category of spare no expense, right?

Speaker:

Um, you know, you're not gonna be able to, uh.

Speaker:

You know, order your servers on Amazon Prime away for free two day delivery.

Speaker:

Uh, you know, you're, you're gonna be, you're gonna be calling your

Speaker:

server company of choice and going, I need 1300 new, you know, Dell, 9,500.

Speaker:

I don't know, I don't, I don't know any server volume numbers or uh,

Speaker:

And, and really I'll, I'll tell you, even even the US government

Speaker:

would have trouble getting a one day turnaround on 1300 servers.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

Um.

Speaker:

The, uh, and, and then the, I think the, perhaps the thing that we're getting to

Speaker:

Atlas in terms of some of these costs is the lost business revenue, right?

Speaker:

So we live in a very connected world, and when, uh, you go to do business

Speaker:

with some sort of entity, right?

Speaker:

Obviously this is.

Speaker:

speaks more to commercial businesses rather than governmental entities.

Speaker:

it's not like we can go, oh well the city of San Diego is down.

Speaker:

I will go give my money to Irvine.

Speaker:

Uh, it doesn't quite work like that.

Speaker:

But, um, but with a business, when you go to interact with that

Speaker:

business and you see that it is down.

Speaker:

It's not like your need goes away, so you as a consumer goes and spends

Speaker:

your money elsewhere, and that's money that you're never gonna get back.

Speaker:

And your reputation.

Speaker:

So it, it's not just that direct client that you lost, it's everybody

Speaker:

they know also, uh, that might have potentially, either, either

Speaker:

they were or could potentially be a client of yours in the future.

Speaker:

It.

Speaker:

Do you know Mike?

Speaker:

Just, sorry.

Speaker:

I like to ask stats questions 'cause you seem to have so many of them.

Speaker:

Do you know what percentage of businesses that get hit with ransomware go under?

Speaker:

Oh, it's over half.

Speaker:

So if,

Speaker:

if you don't have, if you don't have a solid, well, it's over half.

Speaker:

For those that don't have a solid response plan.

Speaker:

Hmm.

Speaker:

So more than 50% of the companies that get hit with ransomware or any significant

Speaker:

cyber incident and they don't have an incident response plan can't survive.

Speaker:

But incident, uh, ransomware, especially the double extortion one, very hard

Speaker:

on on businesses that, that aren't prepared for that for two reasons.

Speaker:

One, they've gotta pay for the, the recovery, uh, from the event itself.

Speaker:

And then because it's double extortion, a lot of those, uh, organizations

Speaker:

can't afford the regulatory fines.

Speaker:

Uh, for the, uh, PII or consumer related data that they're gonna get

Speaker:

fined, especially if it's California with, what is it, $25 a record?

Speaker:

Uh, yeah.

Speaker:

It's, it's, it's crazy.

Speaker:

I think we should get that money, don't you think?

Speaker:

Prasanna, you and I live in California, why don't we get this money when our

Speaker:

records, why do they get more money?

Speaker:

Because our data was, was hurt.

Speaker:

That's all I'm saying.

Speaker:

Um, $25

Speaker:

Yeah.

Speaker:

$25 is not gonna be, um,

Speaker:

I.

Speaker:

not gonna be much.

Speaker:

But um,

Speaker:

And I guess that's a third category, right?

Speaker:

We talked about revenue, but then there are the fines.

Speaker:

Yeah, the re the Reg regulatory fines.

Speaker:

It is true.

Speaker:

Uh, GDPR is huge, right?

Speaker:

If you're, if you're in that world, because that's, they start talking about

Speaker:

a percentage of annual turnover, right?

Speaker:

Which is, and that semi analogous to revenue, it's a different term, but

Speaker:

I've never quite fully understood the difference between annual.

Speaker:

Do you know, Mike?

Speaker:

Are you a revenue annual turnover person?

Speaker:

Yeah, just stick with US terms,

Speaker:

Yeah.

Speaker:

Okay.

Speaker:

Okay.

Speaker:

It is like 4% though, I believe right

Speaker:

up to 4%

Speaker:

of the annual turnover.

Speaker:

Yeah.

Speaker:

Um, the, um, so yeah, so we talked about lost revenue.

Speaker:

And Mike, you talked about the reputation effect because it's.

Speaker:

I can, I can think back companies that have lost my data, a company that have

Speaker:

had in, you know, incidents with my data and I haven't forgotten that.

Speaker:

Right.

Speaker:

Uh, you know, I can think literally, um.

Speaker:

Of like the first cyber incident that I remember that had that involved my data.

Speaker:

Um, it goes, you know, all the way back to 2005 and I remember that incident

Speaker:

and I know exactly which company that was and I will never forget it.

Speaker:

Right now in, now in that particular company, I don't get a

Speaker:

choice of not working with them.

Speaker:

Right.

Speaker:

It's, uh, it's, um, the, um, regulatory, I'm not regulatory,

Speaker:

um, credit reporting agency.

Speaker:

Right.

Speaker:

Um, but the, I, I wish we had the choice of not working with, with

Speaker:

But,

Speaker:

but here's a question though, Curtis, do you remember that first one

Speaker:

clearly?

Speaker:

Do you remember the next 25 or 50 that have come up?

Speaker:

Just given how many of those notices that you get every

Speaker:

month?

Speaker:

I mean there, there is a, that is a good point, right?

Speaker:

That, that we are starting to get, um, somewhat, it's sort of like, um, Mike, you

Speaker:

don't live in California, but you know, in California, we, um, um, of, uh, over

Speaker:

here we have this like thing about, um, this thing has been shown to cause cancer.

Speaker:

Literally everywhere

Speaker:

I see them on all the labels, but I tear.

Speaker:

I'm able to tear that one off.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

Um, but, uh, with every, every business that you go in there, it's

Speaker:

like, uh, so it's like, there is, there's certainly, uh, alert fatigue.

Speaker:

That's a good point, Prasanna.

Speaker:

Um, but I will say that I definitely remember the ones that

Speaker:

definitely inconvenienced me.

Speaker:

Definitely.

Speaker:

I definitely do.

Speaker:

Um, you know, where if, if, if I was significantly inconvenienced,

Speaker:

I definitely remember that.

Speaker:

And my point, my point is that I, I will never forgive that.

Speaker:

I will never forget that.

Speaker:

I can also remember, and again, I'm not gonna throw their name out because

Speaker:

I don't want to get sued, but I also know the, the one backup company that

Speaker:

I know lost people's data, right.

Speaker:

and I, I won't ever forget that, right?

Speaker:

So the, the, the damage to your reputation, I don't

Speaker:

think you can ever get back.

Speaker:

And another thing that you're never gonna get back, we talked about lost revenue.

Speaker:

There's lost revenue of what happens during the outage.

Speaker:

But what happens if during the outage your, your customer goes to your

Speaker:

competitor and they go, oh, this company's not as bad as I thought it was.

Speaker:

You know, I, I guess we could, we could continue doing

Speaker:

business with them over here.

Speaker:

Now, not only did you lose.

Speaker:

Revenue during that outage.

Speaker:

You have lost the future revenue from that customer.

Speaker:

Um, and the, you know, the reputational damage that you talked about

Speaker:

Mike, that does damage to future revenue from future customers.

Speaker:

They're going around, Googling whether or not they should do business with

Speaker:

you, and this is the story that pops up.

Speaker:

Yeah.

Speaker:

And,

Speaker:

and Curtis, I know we've done podcast episodes last

Speaker:

year, right?

Speaker:

If I look at Rackspace

Speaker:

and their exchange outage,

Speaker:

which caused them to shut down a huge business for them, right?

Speaker:

Hosted exchange, we also talked about LastPass.

Speaker:

Yep.

Speaker:

And their breach.

Speaker:

And you could just imagine like all those fines and penalties.

Speaker:

I think they even started getting sued like years later, right

Speaker:

after the incident happened.

Speaker:

Because sometimes it takes that long before activities, criminal

Speaker:

activities start to show up based on, uh, the data that was stolen.

Speaker:

Yeah, you know, I actually know somebody, by the way, that went to go do marketing

Speaker:

at LastPass, and I was like, Good

Speaker:

Hmm.

Speaker:

with that.

Speaker:

Well, there's a couple other things to consider too.

Speaker:

Uh, we talked about overtime and, and the staff, internal staff that

Speaker:

are addressing a particular incident.

Speaker:

You may actually lose that staff.

Speaker:

You know, they, they, they're used to their eight to five or shift job,

Speaker:

and now you've got 'em working three hour, you know, three days straight

Speaker:

with, with, you know, sleeping on the floor at their desk and eating.

Speaker:

You know, carry out food or pizza, which, you know, I wouldn't mind for three days.

Speaker:

But, uh, at the end of that, you know, they're exhausted and that's,

Speaker:

that's not what they signed up for.

Speaker:

Or maybe even they were getting, you know, a little bit of attitude

Speaker:

from, from other employees or executives and they, they quit.

Speaker:

Uh, and, and it's probably the ones that quit are probably the ones that have been

Speaker:

telling you that there's this problem that hasn't been addressed for some period of

Speaker:

time.

Speaker:

And that's what led to this breach.

Speaker:

And

Speaker:

they're like, I told you so, and you know, I'll help you get through this, but

Speaker:

I'm gonna, uh, I'll be out after that.

Speaker:

The other thing, uh, so the, the human impact, um, and whether

Speaker:

they quit or not, they, they're not gonna be the same person.

Speaker:

It's like going into war, like you, you come out the other side

Speaker:

and, and, and you're just, you don't see things the same way.

Speaker:

You're, you're not the same person.

Speaker:

Uh, so people that have been through a significant incident are, are,

Speaker:

uh, they're changed in a way.

Speaker:

Alright?

Speaker:

So there's the human person, uh, the human perspective or the impact supply

Speaker:

chain and, um, supply chain's one.

Speaker:

So now you're going to, you're probably gonna burn some bridges trying to get,

Speaker:

you know, equipment or, or, or support.

Speaker:

Uh, and by that I mean you're, you're gonna approach this, uh, this

Speaker:

incident with a little bit of, uh.

Speaker:

Um, uh, emotion and, and, um, aggressiveness that some

Speaker:

people may not appreciate.

Speaker:

Uh, and then the other part of that is, uh, if, if you are heavily

Speaker:

involved in financing stuff, right?

Speaker:

Like maybe you're building a new facility or you need, you need, you need credit

Speaker:

to buy equipment that you then resell.

Speaker:

Uh, this incident could, could impact your credit rating as a company, uh, your

Speaker:

bond rating, uh, things like that, that may, so maybe you're a

Speaker:

construction company and you build hospitals and military bases, and

Speaker:

now all of a sudden you've got this cyber attack that puts you down.

Speaker:

Uh, those, those, uh, financial funding vehicles may, may have

Speaker:

a different perspective of working with you in the future.

Speaker:

Also.

Speaker:

Yeah, no.

Speaker:

When you were talking about that, Mike, I was thinking about the reputation comment

Speaker:

you made earlier where you've now impacted not only the reputation of your customers,

Speaker:

but even your vendors and suppliers too, who are like, Nope, we don't quite trust

Speaker:

what you're doing, or maybe you don't get preferred rates or other things like

Speaker:

that

Speaker:

Mm-hmm.

Speaker:

potentially as well.

Speaker:

And, and, and it's weird.

Speaker:

Uh, it's not just the inputs, it's also the outputs, uh, from a, from a vendor

Speaker:

or relationship or system perspective.

Speaker:

Um.

Speaker:

We worked with a company.

Speaker:

It was a, it was a dental, a dental practice.

Speaker:

Their payment processor shut off when, when they had an incident,

Speaker:

they notified everybody, uh, very diligent and responsible.

Speaker:

The payment processor shut off access, and even after they said we fixed

Speaker:

all the problems, uh, the payment processor required a third party

Speaker:

objective review of that environment before they turned that access back on.

Speaker:

So this, it wasn't just.

Speaker:

You know, paper records and, and operating the way we used to, they were, they

Speaker:

were literally also taking, having to take, uh, credit card, you know, the

Speaker:

carbon copy swipes of credit cards to, to, uh, to take payment so that

Speaker:

they could process it later when their payment processor came back online.

Speaker:

That's crazy.

Speaker:

I don't even remember the last time I had to do that,

Speaker:

Well, and, and to that point, I mean, these are, these are all things

Speaker:

you've gotta think about today.

Speaker:

All right?

Speaker:

So if our payment, whatever, all our critical things, well payment

Speaker:

processing's a critical thing.

Speaker:

Well, what happens if that goes away?

Speaker:

How are we gonna process

Speaker:

our.

Speaker:

yeah, that's interesting that you mention that because I just, just, uh, I don't

Speaker:

know, a week or two, a week or two ago, I set up a new, um, you know, a new minute,

Speaker:

my new, uh, LLCI set it up in, uh, Stripe to be able to accept, you know, to be

Speaker:

able to send a, a payment leak that took.

Speaker:

A few days, Because there's, there's an authentication process.

Speaker:

And, um, so e even if you let, let's say if you're able to quickly go over to

Speaker:

another payment processor, it, it's not like that's gonna just start processing

Speaker:

payments, uh, immediately for you.

Speaker:

They,

Speaker:

they did not pay the ransom.

Speaker:

So even, even with $30 million in, in insurance coverage,

Speaker:

not even paying the ransom.

Speaker:

Their, Their, recovery cost was almost 65

Speaker:

million.

Speaker:

right.

Speaker:

Um, and then of course they're gonna end up with, uh, probably increased,

Speaker:

um, insurance rates after this and possible cancellation of the policy.

Speaker:

Right.

Speaker:

I wonder, Mike, have you ever seen that?

Speaker:

Where that, where people file a claim and then they get their

Speaker:

cyber insurance policy canceled?

Speaker:

It.

Speaker:

Yes.

Speaker:

Uh, but it's, it's less common than the insurance company giving

Speaker:

them a very long list of things.

Speaker:

They've gotta remediate and prove that they've remediated that, uh, to keep

Speaker:

their policy, their premium will go up.

Speaker:

'cause their risk went up.

Speaker:

Uh, but that's usually just in the following year.

Speaker:

So let's say, you know, every year there's a 3% increase

Speaker:

after an incident, having, having satisfied the insurance company's

Speaker:

remediation list, if you do all that, you may get a five and a

Speaker:

half percent or 6% increase in your premium for the next year.

Speaker:

Well then subsequent years, uh, you know, that may go back down to just

Speaker:

the, the standard 3% or whatever it is.

Speaker:

Uh, if you maintain your.

Speaker:

Your, uh, hygiene and, and, and control effectiveness according to,

Speaker:

and, and that insurance company may ask for, you know, multiple years

Speaker:

of, of, of third party assessments

Speaker:

to, to keep your policy.

Speaker:

And, and we're gonna cover this on a later episode, but that's definitely something

Speaker:

you should be doing upfront, again, where you can talk to your insurance company,

Speaker:

uh, you know, what are the things that we should be doing already, right?

Speaker:

Again, talk to a company like yours, right?

Speaker:

A blue team company, uh, that, that will help you defend yourself.

Speaker:

So let's talk about, um,

Speaker:

I have one.

Speaker:

Yep.

Speaker:

So as Mike was talking about that, uh, one thing popped to my mind, which was,

Speaker:

so you get hit with ransomware.

Speaker:

You're like, okay, X, Y, and Z all needs to change.

Speaker:

There's the cost of updating and changing processes

Speaker:

that may be significant depending on how you are operating today.

Speaker:

I think, and I don't know how to quantify that.

Speaker:

I'm sure it depends on what the risk is, or like Mike, what you were saying.

Speaker:

If your insurance company tells you to remediate a bunch of issues that

Speaker:

might involve significant restructuring of your organization processes in

Speaker:

order to be able to handle this.

Speaker:

Here's a good example.

Speaker:

Let's say, let's say you're a, a, a, a medium sized company.

Speaker:

You probably have some things documented like, how do I restore a computer?

Speaker:

How do we revert to a, a manual process in the absence of

Speaker:

our systems being available?

Speaker:

You probably have some of that documented.

Speaker:

It's probably old.

Speaker:

Uh, it maybe some of it's tribal knowledge, uh, but at, as a result

Speaker:

of an incident, the insurance company may come and do an audit and they

Speaker:

may say, you've, you've got some or nothing, but this is what we expect.

Speaker:

And

Speaker:

so in a lot of cases, you can't just update something that's been

Speaker:

in place for a long time because it's obviously not effective.

Speaker:

And in order for a control to be effective, it has to be designed well.

Speaker:

In order to design well, you've gotta.

Speaker:

Get good information, current information from all the stakeholders.

Speaker:

Uh, and so a control is this thing that operates, and most controls

Speaker:

have inputs and outputs and so those are other stakeholders and controls.

Speaker:

So you've got this kind of enterprise exercise that you have to go through.

Speaker:

Um, and if you haven't gone through a business impact analysis, this

Speaker:

exercise would be very similar.

Speaker:

So you essentially go and look for all the critical things in our company that,

Speaker:

that keep the lights on and pay the bills, and, you know, sustain our, our

Speaker:

revenue and our reputation and our client base and whatever those things are.

Speaker:

And in that assessment, you then determine what are the, the

Speaker:

critical people, processes, and technologies required to function,

Speaker:

and then what are the alternatives?

Speaker:

So if that thing goes away, I can do it, I can do it this

Speaker:

other way for a period of time.

Speaker:

But what is that?

Speaker:

What's that pain point?

Speaker:

Is it an hour?

Speaker:

Is it a day?

Speaker:

And, and what's, how do I quantify that?

Speaker:

Is that a million dollars an hour?

Speaker:

Is it a million dollars a day?

Speaker:

Is it a million dollars a week?

Speaker:

Uh, and so now we we're, we've got all of this stuff laid out and current

Speaker:

so that I know if that department or that process breaks, this is how much

Speaker:

time and what is required to recover.

Speaker:

And in that time, this is my financial impact or these other impacts.

Speaker:

It could be, you know, if it's a hospital and the intensive care

Speaker:

unit goes down, that could be human life, it could be regulatory,

Speaker:

you know, whatever the case is.

Speaker:

But I have all this stuff lined out now and then from this body of knowledge

Speaker:

that I've, I've just created, that translates directly into business

Speaker:

continuity, disaster recovery, incident response, and how I categorize all

Speaker:

my, you know, the criticality of all these things that could happen.

Speaker:

You know, ransomware on a print server, probably not really high unless

Speaker:

that print server is what's creating checks, uh, or, or shipping orders.

Speaker:

And I, you know, and I'm, I'm, I'm shipping million dollar things.

Speaker:

Uh, and so that's, that's a perspective a lot of people think, well, ransomware

Speaker:

on a print server, that's nothing.

Speaker:

Well, it is if that's how you make money.

Speaker:

Uh, and so going through an exercise like that really puts some

Speaker:

gravity, uh, and awareness in your environment that you can share with.

Speaker:

Leadership.

Speaker:

Executive leadership.

Speaker:

And that's very important because when we go to leadership and say, I need

Speaker:

budget to keep the lights on to make sure this stuff doesn't happen, and they're

Speaker:

like, yeah, we're not gonna pay that.

Speaker:

'cause we we're, we've got this new marketing advertising campaign

Speaker:

to, you know, for whatever.

Speaker:

And, and they don't, they don't always realize that where they're focused, um.

Speaker:

Oftentimes leaves a huge gap in, in risk.

Speaker:

Uh, and, and maybe there's some kind of middle ground that we can come

Speaker:

to, uh, or roadmap we can build.

Speaker:

Maybe we don't have to do it all at the same time, uh, but you know, this month

Speaker:

we need to do something and six months we need to do something and so on.

Speaker:

Um, but that business impact analysis and that that huge analysis of all

Speaker:

those different criticalities and risks will help you have that conversation.

Speaker:

Um, and by the way, leadership, uh, executive leadership is often

Speaker:

included in those, those workshops, in that process, that exercise.

Speaker:

Uh, so they get to, uh, they get to participate in and have some, some

Speaker:

introspection, uh, of their, of their business and their, and their

Speaker:

responsibility during that exercise, so that sometimes that, that helps

Speaker:

facilitate a better discussion.

Speaker:

Well, that, that whole thing that you just described, it's one of those things where.

Speaker:

It's the, you know, the phrase, you know, uh, never time to do it, right.

Speaker:

Always time to do it over, right.

Speaker:

It falls into that category of like, it's, it's activities that you need

Speaker:

to do that are best done upfront, and they're kind of a pain, like everything

Speaker:

you just described sounds really, really important, but it's a pain right?

Speaker:

To,

Speaker:

But you know what?

Speaker:

I think there's, there's some misconception there.

Speaker:

Yeah, there's, it's gonna take time away from your, your job.

Speaker:

But to your point, you know, if, if I'm, if I'm busy doing something and,

Speaker:

and my daughter calls me, I'm gonna stop what I'm doing and I may have

Speaker:

an hour phone call with my daughter,

Speaker:

30 minutes, whatever the case is, because I can prioritize that

Speaker:

over this spreadsheet I'm created.

Speaker:

Yeah.

Speaker:

If, if you can.

Speaker:

Set aside an hour to talk to an advisor or a consultant about

Speaker:

this business impact analysis.

Speaker:

You, you, sometimes you just have to have it on your calendar

Speaker:

and you're just gonna do it.

Speaker:

And I think the mis, there's a misconception that this business impact

Speaker:

analysis is this huge, cumbersome, you know, 90 day, 120 day thing.

Speaker:

And yeah, I'm sure there's some large enterprises where it, it would take

Speaker:

that long, but for the most part, small to medium sized businesses can

Speaker:

get a BIA done in one to three weeks.

Speaker:

And

Speaker:

that's like one person talking with, you know, one-on-one with

Speaker:

different, we did a city government, um, 14, 15 different departments.

Speaker:

We did it in two weeks.

Speaker:

Yeah.

Speaker:

Uh, well, I, I think that that's a really good point, Mike.

Speaker:

I, I like, I, I, the point, I, you made a different point, which is a great point.

Speaker:

The point I was making was whatever level of pain it is, whether

Speaker:

it's a day, weeks, or months.

Speaker:

The point is that by doing this work upfront, it gives you the power

Speaker:

that you need to make, the changes that you need to your environment

Speaker:

from a recovery perspective, from a cybersecurity perspective.

Speaker:

And also when the feces sits, the rotary oscillator, you know where you need to be.

Speaker:

Right.

Speaker:

You know, like you said, you, you, you know that your daughter

Speaker:

calling is, is important.

Speaker:

Right.

Speaker:

You will know.

Speaker:

Well, I know that this thing, like, you know, you, you

Speaker:

talked about the print server.

Speaker:

know, we're, let, let's say I immediately thought of, uh,

Speaker:

what we used to call Kinko's.

Speaker:

You remember Kinko's?

Speaker:

Uh, now it's called the FedEx Print Center, uh, which I was, I was in a

Speaker:

FedEx Print Center just a few days ago.

Speaker:

In

Speaker:

the middle there, it was called FedEx Kinkos.

Speaker:

Yes, it wa There was, there was, that was a FedEx Kinko's.

Speaker:

Yeah.

Speaker:

Uh, but in the, their print server going down, that is a direct, um,

Speaker:

you know, revenue generator, right?

Speaker:

So if you know that, you know the different parts of your business and you

Speaker:

know the, the cost that your business is going to experience when a ransomware

Speaker:

attack hits, it just empowers you with the ability to make the right decisions.

Speaker:

To minimize the impact on your, on your business.

Speaker:

So

Speaker:

Knowledge is power.

Speaker:

And my other favorite saying from GI Joe is knowing is half the battle.

Speaker:

Love it.

Speaker:

is that from GI Joe?

Speaker:

The movie?

Speaker:

It's GI Joe.

Speaker:

Well, it

Speaker:

the TV

Speaker:

cartoons.

Speaker:

It's like the, at the, very end it's uh, you know,

Speaker:

knowing is

Speaker:

half the battle.

Speaker:

would always say that at the end.

Speaker:

Uh, I, for the record, not familiar with GI I, Joe, beyond the

Speaker:

Oh, it's amazing.

Speaker:

Cobra and.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

Um, so the, the next thing, another, uh, action.

Speaker:

I, so we talked about doing a BIA, right?

Speaker:

The next thing that we have is action items, is to review again,

Speaker:

now review your insurance coverage.

Speaker:

You, you want to talk about that, Mike?

Speaker:

Like what kind of, what kind of stuff?

Speaker:

Well, it's, it's critical because a lot there, I think there's a lot of companies

Speaker:

that, that just Google cyber insurance and they get quotes and they go with the

Speaker:

lowest quote and they figure they're, you know, they're the lowest premium

Speaker:

and they, they figure they're covered.

Speaker:

Well, you're covered based on all that fine print, and I've got

Speaker:

a, a pretty interesting example.

Speaker:

Uh, so in addition to, to helping companies, uh, on the defensive side.

Speaker:

Uh, we also do litigation support.

Speaker:

And, and in one case we were, we were working for the insurance company,

Speaker:

uh, who didn't wanna pay a claim.

Speaker:

And so they sent us all this data and our, our objective was to determine if,

Speaker:

where, where did the attack originate?

Speaker:

Was it a domestic attack?

Speaker:

Was it, was it international?

Speaker:

It turned out to be international.

Speaker:

And they declined the, they, they declined the claim because the

Speaker:

policy only covered domestic attacks.

Speaker:

Wow.

Speaker:

So

Speaker:

it is important, uh, you know, go with a reputable insurance carrier,

Speaker:

make sure you read the fine print, get an advisor or a broker to help you.

Speaker:

Um, and then, you know, a lot of those, uh, a lot of that process

Speaker:

stems from a questionnaire that the insurance company is gonna send you.

Speaker:

And a lot of organizations, especially the small ones, don't know how to.

Speaker:

Fill out that questionnaire.

Speaker:

A lot of times

Speaker:

it's yes, no, they don't give you the opportunity to add context.

Speaker:

Uh, like there's no maybe, uh, it's either yes or no.

Speaker:

Uh, and so I think a lot of organizations on in the maybe category

Speaker:

will still say yes, even though they're not sure, or maybe it's not

Speaker:

fully implemented.

Speaker:

Well, the insurance company's gonna hold you to those answers if

Speaker:

there's an incident or a breach.

Speaker:

And they're gonna go, well, you said yes and you, it's actually no.

Speaker:

So we're not gonna cover your claim 'cause you lied to us.

Speaker:

Uh, when,

Speaker:

when we establish this, this policy.

Speaker:

The other thing to think about too is you can have more than one policy, uh,

Speaker:

just make sure that you maintain and are fully aware of, of both of them and, you

Speaker:

know, any, any attributes or requirements or stipulations in either one.

Speaker:

Um.

Speaker:

You know, that brings up a story.

Speaker:

Do you remember Tony Curtis from Spectral Logic when he

Speaker:

came on the podcast?

Speaker:

Yeah.

Speaker:

And so this was a company Mike that got hit with, uh, ransomware, shut down

Speaker:

their entire environment.

Speaker:

be in the backup industry.

Speaker:

By the way,

Speaker:

Yeah.

Speaker:

tape library manufacturer, right?

Speaker:

And he was, I think he was like head of it or something, some position like that.

Speaker:

And he found out that just a week before they had signed up

Speaker:

for a cyber insurance policy.

Speaker:

Yeah,

Speaker:

Yeah.

Speaker:

was like a week or two before he was like, oh my gosh, thank God.

Speaker:

well.

Speaker:

they brought in all the experts and all the rest.

Speaker:

I am glad it worked out for him because a lot of those, uh, a

Speaker:

lot of a, a lot of policies will have a, a cooling off period.

Speaker:

So you sign up today, but it's really not effective for 30 days.

Speaker:

Yeah.

Speaker:

So I guess the last action item is you've sort of gone

Speaker:

through, you've created a BIA.

Speaker:

You've done all these things and making sure that you understand

Speaker:

what needs to be recovered first.

Speaker:

It's kinda like Mike was talking about the prioritization.

Speaker:

Right.

Speaker:

So making sure you understand what is critical to your

Speaker:

business, have that listed down.

Speaker:

So those are the things that you focus on first, rather than say,

Speaker:

Curtis's home directory, which isn't the highest priority to recover from

Speaker:

a ransomware attack.

Speaker:

it is to me,

Speaker:

Well, it's not the first thing.

Speaker:

I know it's important to you, Curtis, all the cat videos that you have, but.

Speaker:

cat fitting.

Speaker:

I think that those are great points.

Speaker:

And so in your BIA one of the, one of the outputs of your BIA as far as

Speaker:

prioritization goes, it's not just the criticality of a particular system.

Speaker:

But it's also the recovery point objective.

Speaker:

So is is the, does that system have a lot of journaling that

Speaker:

would allow us to do manual input or manual uh, uh, transactions?

Speaker:

Uh, and so

Speaker:

just as an example, we had a, a, a ransomware incident with a client who got

Speaker:

hit on a Thursday night, uh, 10 o'clock.

Speaker:

And we knew exactly what servers they hit and how it happened.

Speaker:

Um.

Speaker:

We were comf, we were comfortable thinking that Thursday night

Speaker:

is when the attack happened.

Speaker:

It wasn't some time in the past.

Speaker:

Well, we still needed to have that conversation with the client.

Speaker:

Well, how far back, how many days or weeks back should we target to recover from?

Speaker:

Because we don't wanna just do earlier today or yesterday.

Speaker:

'cause that may also have.

Speaker:

The, you know, the attack, uh, artifacts in it, malware, whatever it was.

Speaker:

And so having a good understanding of, of their backup strategy and

Speaker:

their capabilities, we were able to say, all right, well, let's,

Speaker:

because of, and in this case, it was a heavily virtualized environment.

Speaker:

Well, let's go with Tuesday.

Speaker:

And let's, let's run all our, all, all of our analysis against

Speaker:

Tuesday's, uh, restored systems before they, we put 'em back online.

Speaker:

If they're clean, then we'll go with Tuesday.

Speaker:

If not, then we can go with Monday or whatever.

Speaker:

Uh, a lot of organizations, uh, still have this full incremental,

Speaker:

you know, weekly that kind of, uh, backup schedule because they're, they,

Speaker:

they haven't adopted virtualization or whatever the case might be.

Speaker:

Uh, and so if, if a, a system was compromised between those fulls.

Speaker:

Then you've gotta do fulls plus the incrementals to get you

Speaker:

back to some restore point.

Speaker:

Well, your BIA is going to help you determine how far back can I go before it

Speaker:

hurts, and if I have to go back further, do I have transaction, you know, logs,

Speaker:

journaling to help me fill in the gaps?

Speaker:

Uh, and if not, then, you know, here's the impact, uh, that I can expect.

Speaker:

Um, one of the other things I was gonna add, uh, and I, I

Speaker:

lost my train of thought a bit.

Speaker:

Um.

Speaker:

And what was it?

Speaker:

Let's see.

Speaker:

You were,

Speaker:

Uh, it was a good point.

Speaker:

It's a good point.

Speaker:

Oh, here's a, here's another funny example.

Speaker:

Funny for now that it's, it's years later, but, uh,

Speaker:

plus time equals comedy.

Speaker:

it was a telecom, $5 billion telecom.

Speaker:

Uh, and they had an outage, and the outage, uh, sat on top of a legacy server.

Speaker:

That legacy server continued to be backed up every day, but it was backed up, uh,

Speaker:

initially to nine track backup tape.

Speaker:

Give,

Speaker:

The backup, the backup technology was, was in, in current day was the, um, DLT tapes.

Speaker:

Yep.

Speaker:

But they didn't create a base system backup, a bare metal backup on DLT tape.

Speaker:

It was the, the only bare metal backup was on nine track.

Speaker:

So when they had to recover this server, they couldn't, because

Speaker:

they couldn't find a nine track tape to recover the tape from.

Speaker:

So yeah, they were down hard for over a month until we

Speaker:

know what?

Speaker:

on eBay.

Speaker:

Yep.

Speaker:

Not uncommon.

Speaker:

yeah.

Speaker:

You know what, uh, when you were talking about, um.

Speaker:

Just like, you know, switching to alternative methods.

Speaker:

Remind me there, I think it was a, a Xerox commercial.

Speaker:

When they go, if your printers go down, do your people go, it's okay.

Speaker:

We'll just use carbon paper.

Speaker:

It's like, no, no, they're not gonna do.

Speaker:

Well, yeah, I think, I think we've given, uh, people enough to think

Speaker:

about and to, um, you know, some action items where they can go work.

Speaker:

Uh, it sounds like, uh, they'll do their BIA in a day or two,

Speaker:

and then, uh, they'll be good.

Speaker:

So, uh,

Speaker:

the way.

Speaker:

knock it out.

Speaker:

Just, you know, it's like a lot of things.

Speaker:

Just, uh, do it sooner than later.

Speaker:

Doesn't matter when.

Speaker:

The only thing that I know is it doesn't matter when you invent a time machine.

Speaker:

All right.

Speaker:

And with that, uh, that is a wrap.