SlideShare a Scribd company logo
Security Minded
Presenter: Greg Wartes, MCP
www.servit.net
• East Carolina University
• Microsoft Certified Business Management Solutions
Professional
• Technology Enthusiast – Published in:
• Wall Street Journal – ‘Cloud Innovator’
• Redmond Channel Magazine : 2011 & 2012
• Huffington Post – SBA National Small Business
Conference Microsoft Cloud Representative
• Microsoft Case Study – Cloud Based PC Manageme
• Former PGA Golf Professional
Presenter: Tony Merendino ServIT - CEO
www.servit.net
• The University of Tennessee at Chattanooga
BA, Business Management
• Over 20 years of experience in Executive level positions in
the arena of technology
• Former owner/CEO of BMC Solution
• Former professional athlete - NFL with the NY Jets
• Recently acquired an all organic farm which is producing
organic hay and organic angus beef
AGENDA
Ransomware Facts
Figures
Network Security
What can you do?
Your Thoughts?
Who? How? Why?
Browsing Security
Security Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
Every 10 seconds, a consumer gets hit
with ransomware.
(up from every 20 seconds in Q1 2016)
Every 40 seconds, a company gets
hit with ransomware.
(up from every 2 minutes in Q1 2016)
The world's biggest cyberattack
has hit at least 150 countries and
infected 300,000 machines since it
started spreading Friday (May 17th,
2017.) ((Virus released May 12th,
Security Minded - Ransomware Awareness
"According to the Wall Street Journal, over 34,000 computer security
incidents occur every day – and 62 percent of those incidents involve
breaches of small and medium-sized businesses.*
*Simon, Ruth. “‘Ransomware’ a Growing Threat to Small
Businesses.” The Wall Street Journal. April 15, 2015."
Security Minded - Ransomware Awareness
SMB is an
organization with
500 users or less
do not have a
dedicated IT person
or I.T. partner/firm
do not have a
dedicated Security
person or firm
81% 86%
Attacks on large enterprises resulted in a confirmed breach
Attacks on SMB resulted in a confirmed breach
83%
0.7%
Cyber Crime Affects All Industries
Financial
Services:
$16.53
Utilities &
Energy:
$14.80
Technology:
$11.04
Services:
$8.99
Industrial:
$8.05
Healthcare:
$7.35
Retail:
$7.12
Transportation:
$6.81
Communications:
$6.13
Media:
$5.75
Pharmaceutical:
$4.92
Hospitality:
$3.68
2016 Cost of Cyber Crime Study & the Risk of Business Innovation: Ponemon Institute : http://www.ponemon.org/library/2016-cost-of-cyber-crime-study-the-risk-of-business-innovation
Average Cost of Breach per Company by Sector in US$ millions (2016)
Average hacking cost
on a small business:
$32,000Average
Security Minded - Ransomware Awareness
4.9 MONTHSis the average time to detect a
data breach in an organization.
Source: infocyte.com
8 months 8 months 8 months
~1 year ~1 year ~1 year
Understanding Why Ransomware is on the Rise
• It is easier for hackers to execute than other campaigns
̶ Social Engineering
̶ Exploit Kits
̶ Broad Audience without customization or localization
• The Money Factors
̶ Time to money is sooner
̶ Bitcoin reduces risk on collection, and eliminates reversals
• Less Technical Obstacles
̶ Simplified Attacks, some without Command & Control
̶ Onus is on the victim to pay, not on hacker to exfiltrate
Security Minded - Ransomware Awareness
Downloading
malicious
documents
Browsing
infected
websites
Malicious
attachments
Malicious
links
Malicious
File from
USB
Server
vulnerability
exploit
Security Minded - Ransomware Awareness
Ransomware Trend #2: Phishing email attachments have
become the #1 delivery vehicle for ransomware
The number of ransomware variants grew by a factor of 30x in 2016.
Criminals know a cash cow when they see one.
Experts estimate ransomware generated $1 billion last year.
FORTUNE Magazine:
“Security experts have been
warning organizations that
failed to apply security
patches to
their MicrosoftWindows-
based computer systems that
it was only a matter of time
before another digital siege
surfaced. It seems their
predictions have borne true.”
Bitcoin is a new currency that was created in 2009 by an
unknown person using the alias Satoshi Nakamoto.
Transactions are made with no middle men – meaning, no
banks! There are no transaction fees and no need to give your
real name. More merchants are beginning to accept them: You
can buy webhosting services, pizza or even manicures.
Security Minded - Ransomware Awareness
Any downtime can be debilitating. For example, each day of an IT outage
costs small and medium-sized companies an estimated $12,500, Symantec
estimates, noting that this figure excludes the impact of a company’s
computers being down on customers.
In assessing the damage done by
hurricanes Katrina and Rita in the
Gulf Coast states in 2005, U.S.
Congress found that 43 percent of
businesses that close after a natural
disaster never reopen. Of those that
stay open, more than 29 percent
close within two years.
Security Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
Group Policy is a hierarchical
infrastructure that allows a network
administrator in charge of Microsoft's
Active Directory to implement specific
configurations for users and
computers. Group Policycan also be used
to define user, security and
networking policies at the machine level.
HAVE PROFESSIONALS APPLY PATCHES AND UPDATES.
Security Minded - Ransomware Awareness
•Install Firewall
•Install Antivirus Software
•Install Anti-Spyware Software
•Use Complex and Secure
Passwords/Phrases
•Check on the Security Settings of the
Browser
Security Minded - Ransomware Awareness
Have up to date
virus scanners
running
Security Minded - Ransomware Awareness
CCleaner is a small, effective utility for computers running Microsoft Windows
that cleans out the 'junk' that accumulates over time: temporary files, broken
shortcuts, and other problems. CCleaner protects your privacy.
Security Minded - Ransomware Awareness
https://managedservicesatlanta.blogspot.com/2017/05/passwords-are-like-flossing.htm l
10 Helpful Hints for Password(s) complexity and protection
Security Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
https://www.symantec.com/connect/blogs
http://blog.checkpoint.com/
https://blog.malwarebytes.com/
https://blogs.technet.microsoft.com/mmpc/
https://managedservicesatlanta.blogspot.com/
Security Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
Ad supported software, often called Adware or Advertising Supported Software, is
used when referencing any type of program that downloads or displays unwanted
banner advertisements in the software being used. Adware is often bundled within
software a computer owner purchases.
However, adware can also contain or be classified as spyware, a type of malware
that is considered by many to be privacy-invasive. Spyware can steal a user’s
information or corrupt the user’s system files.
If you are not expecting the mail – take
the proper precautions to ensure it is a
legit email.
Do NOT open ANY attachments from
people that you do not know!
Keep your browser and your O/S up to date:
Keep your O/S up to date:
Virtualization-based security
Secure booting
Windows Hello is Windows 10’s attempt to
get rid of passwords, which are often
stolen and reused. Hello supports three
methods of biometric authentication (facial,
iris, and fingerprint) in concert with a
simple PIN.
Passport: If your computer has a TPM
chip, the private key of the asymmetric key
pair is securely stored there instead of in
software. You use Hello or your PIN to
authenticate locally, then use Passport to
securely authenticate to other network
locations.
Device Guard is a highly secure tool that
determines which applications and scripts
should be allowed to run on a particular
computer.
Credential Guard
Enterprise Data Protection
Keep your browser up to date:
Security Minded - Ransomware Awareness
Crawl
Firewall
Application Control (Detect)
URL Filtering
Intrusion Detection
Antivirus
Anti-Malware (Endpoint
Walk
Anti-Bot
Anti-Spam
E-mail Security
Application Control (Block)
Intrusion Protection
Media/Port Encryption (Endpoint)
Full Disk Encryption (Endpoint)
Remote Access VPN (Endpoint)
Run
Identity Awareness
Threat Extraction/Emulation (Gateway)
Emulation
Cloud Security
Mobile Security
DDos Protection
Document Protection
Threat Extraction/Emulation (Endpoint)
Security Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
Greg Wartes
gwartes@servit.net
678-995-4735
www.servit.net
https://managedservicesatlanta.blogspot.com/

More Related Content

PPTX
Cyber Hygiene
PDF
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
PPTX
Enterprise Cyber Security 2016
PPTX
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
PPTX
The State Of Information and Cyber Security in 2016
PDF
Top 10 leading fraud detection and prevention solution providers
PDF
Cybersecurity in Banking Sector
PPTX
Cyber Security Threats in the Financial Sector
Cyber Hygiene
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Enterprise Cyber Security 2016
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
The State Of Information and Cyber Security in 2016
Top 10 leading fraud detection and prevention solution providers
Cybersecurity in Banking Sector
Cyber Security Threats in the Financial Sector

What's hot (19)

PPTX
Data breach
PDF
Cyber Risk Management in 2017: Challenges & Recommendations
PDF
What's Hot In IT - Cybersecurity
PDF
Must Know Cyber Security Stats of 2016
PDF
Outlook Briefing 2016: Cyber Security
PPTX
Valuing Data in the Age of Ransomware
PDF
140707_Cyber-Security
PPSX
Board and Cyber Security
PPTX
2016 - Cyber Security for the Public Sector
PPTX
Lessons v on fraud awareness (digital forensics) [autosaved]
DOCX
What you need to know about cyber security
PDF
ICION 2016 - Cyber Security Governance
PPTX
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
PPTX
The Board and Cyber Security
PDF
Cyber-risk Oversight Handbook for Corporate Boards
PDF
Cybersecurity and The Board
PDF
The 2016 Ponemon Cost of a Data Breach Study
PDF
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
PDF
Ten Expert Tips on Internet of Things Security
Data breach
Cyber Risk Management in 2017: Challenges & Recommendations
What's Hot In IT - Cybersecurity
Must Know Cyber Security Stats of 2016
Outlook Briefing 2016: Cyber Security
Valuing Data in the Age of Ransomware
140707_Cyber-Security
Board and Cyber Security
2016 - Cyber Security for the Public Sector
Lessons v on fraud awareness (digital forensics) [autosaved]
What you need to know about cyber security
ICION 2016 - Cyber Security Governance
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
The Board and Cyber Security
Cyber-risk Oversight Handbook for Corporate Boards
Cybersecurity and The Board
The 2016 Ponemon Cost of a Data Breach Study
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Ten Expert Tips on Internet of Things Security
Ad

Similar to Security Minded - Ransomware Awareness (20)

PDF
Forthright Security Lunch and Learn - Ransomware Focus 2
PDF
Data security best practices for risk awareness and mitigation
PPTX
Disruptionware-TRustedCISO103020v0.7.pptx
PPTX
Network Security
PPTX
Cyber security awareness for end users
DOC
Data security
PPTX
Security Threat Presentation
PDF
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
PPTX
Security in the enterprise - Why You Need It
PPTX
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
PPTX
Understanding the Risk & Challenges of Cyber Security
PPTX
Internet safety and you
PDF
5 network-security-threats
PDF
Five Network Security Threats And How To Protect Your Business Wp101112
PDF
fundamentals of Cybersecurity Lesion 1.pdf
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
PPTX
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
PPTX
IT Security for Nonprofits
PPSX
The myth of secure computing; management information system; MIS
PDF
A Guide to Internet Security For Businesses- Business.com
Forthright Security Lunch and Learn - Ransomware Focus 2
Data security best practices for risk awareness and mitigation
Disruptionware-TRustedCISO103020v0.7.pptx
Network Security
Cyber security awareness for end users
Data security
Security Threat Presentation
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Security in the enterprise - Why You Need It
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
Understanding the Risk & Challenges of Cyber Security
Internet safety and you
5 network-security-threats
Five Network Security Threats And How To Protect Your Business Wp101112
fundamentals of Cybersecurity Lesion 1.pdf
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
IT Security for Nonprofits
The myth of secure computing; management information system; MIS
A Guide to Internet Security For Businesses- Business.com
Ad

More from Greg Wartes, MCP (9)

PPTX
Pgatss slide deck june 7, 2018
PPTX
Augusta gen v presentation adapture v2
PPTX
Kba talk track 2018
PPTX
Ga society of cpa's 2018 coastal chapter
PPTX
Removing Reactive Behavior Inside Your Organization
PPTX
Outcome Based Selling July 15th 2014 CPA event
PPTX
Comptia slides managed print vegas
PPTX
June 18th, 2013 gwinnete chapter of cpa's
PDF
Office 365 mid_market_sales_pitch_deck (3)
Pgatss slide deck june 7, 2018
Augusta gen v presentation adapture v2
Kba talk track 2018
Ga society of cpa's 2018 coastal chapter
Removing Reactive Behavior Inside Your Organization
Outcome Based Selling July 15th 2014 CPA event
Comptia slides managed print vegas
June 18th, 2013 gwinnete chapter of cpa's
Office 365 mid_market_sales_pitch_deck (3)

Recently uploaded (20)

PPT
Chapter four Project-Preparation material
PDF
Laughter Yoga Basic Learning Workshop Manual
PDF
Reconciliation AND MEMORANDUM RECONCILATION
PPTX
Business Ethics - An introduction and its overview.pptx
DOCX
Business Management - unit 1 and 2
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PDF
COST SHEET- Tender and Quotation unit 2.pdf
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PDF
MSPs in 10 Words - Created by US MSP Network
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
DOCX
Euro SEO Services 1st 3 General Updates.docx
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
PDF
Chapter 5_Foreign Exchange Market in .pdf
PDF
Business model innovation report 2022.pdf
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PDF
WRN_Investor_Presentation_August 2025.pdf
PPTX
Amazon (Business Studies) management studies
PPT
340036916-American-Literature-Literary-Period-Overview.ppt
PDF
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
Chapter four Project-Preparation material
Laughter Yoga Basic Learning Workshop Manual
Reconciliation AND MEMORANDUM RECONCILATION
Business Ethics - An introduction and its overview.pptx
Business Management - unit 1 and 2
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
COST SHEET- Tender and Quotation unit 2.pdf
Ôn tập tiếng anh trong kinh doanh nâng cao
MSPs in 10 Words - Created by US MSP Network
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
Euro SEO Services 1st 3 General Updates.docx
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
Chapter 5_Foreign Exchange Market in .pdf
Business model innovation report 2022.pdf
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
WRN_Investor_Presentation_August 2025.pdf
Amazon (Business Studies) management studies
340036916-American-Literature-Literary-Period-Overview.ppt
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf

Security Minded - Ransomware Awareness

  • 2. Presenter: Greg Wartes, MCP www.servit.net • East Carolina University • Microsoft Certified Business Management Solutions Professional • Technology Enthusiast – Published in: • Wall Street Journal – ‘Cloud Innovator’ • Redmond Channel Magazine : 2011 & 2012 • Huffington Post – SBA National Small Business Conference Microsoft Cloud Representative • Microsoft Case Study – Cloud Based PC Manageme • Former PGA Golf Professional
  • 3. Presenter: Tony Merendino ServIT - CEO www.servit.net • The University of Tennessee at Chattanooga BA, Business Management • Over 20 years of experience in Executive level positions in the arena of technology • Former owner/CEO of BMC Solution • Former professional athlete - NFL with the NY Jets • Recently acquired an all organic farm which is producing organic hay and organic angus beef
  • 4. AGENDA Ransomware Facts Figures Network Security What can you do? Your Thoughts? Who? How? Why? Browsing Security
  • 7. Every 10 seconds, a consumer gets hit with ransomware. (up from every 20 seconds in Q1 2016) Every 40 seconds, a company gets hit with ransomware. (up from every 2 minutes in Q1 2016)
  • 8. The world's biggest cyberattack has hit at least 150 countries and infected 300,000 machines since it started spreading Friday (May 17th, 2017.) ((Virus released May 12th,
  • 10. "According to the Wall Street Journal, over 34,000 computer security incidents occur every day – and 62 percent of those incidents involve breaches of small and medium-sized businesses.* *Simon, Ruth. “‘Ransomware’ a Growing Threat to Small Businesses.” The Wall Street Journal. April 15, 2015."
  • 12. SMB is an organization with 500 users or less do not have a dedicated IT person or I.T. partner/firm do not have a dedicated Security person or firm 81% 86%
  • 13. Attacks on large enterprises resulted in a confirmed breach Attacks on SMB resulted in a confirmed breach 83% 0.7%
  • 14. Cyber Crime Affects All Industries Financial Services: $16.53 Utilities & Energy: $14.80 Technology: $11.04 Services: $8.99 Industrial: $8.05 Healthcare: $7.35 Retail: $7.12 Transportation: $6.81 Communications: $6.13 Media: $5.75 Pharmaceutical: $4.92 Hospitality: $3.68 2016 Cost of Cyber Crime Study & the Risk of Business Innovation: Ponemon Institute : http://www.ponemon.org/library/2016-cost-of-cyber-crime-study-the-risk-of-business-innovation Average Cost of Breach per Company by Sector in US$ millions (2016)
  • 15. Average hacking cost on a small business: $32,000Average
  • 17. 4.9 MONTHSis the average time to detect a data breach in an organization. Source: infocyte.com 8 months 8 months 8 months ~1 year ~1 year ~1 year
  • 18. Understanding Why Ransomware is on the Rise • It is easier for hackers to execute than other campaigns ̶ Social Engineering ̶ Exploit Kits ̶ Broad Audience without customization or localization • The Money Factors ̶ Time to money is sooner ̶ Bitcoin reduces risk on collection, and eliminates reversals • Less Technical Obstacles ̶ Simplified Attacks, some without Command & Control ̶ Onus is on the victim to pay, not on hacker to exfiltrate
  • 22. Ransomware Trend #2: Phishing email attachments have become the #1 delivery vehicle for ransomware The number of ransomware variants grew by a factor of 30x in 2016. Criminals know a cash cow when they see one. Experts estimate ransomware generated $1 billion last year.
  • 23. FORTUNE Magazine: “Security experts have been warning organizations that failed to apply security patches to their MicrosoftWindows- based computer systems that it was only a matter of time before another digital siege surfaced. It seems their predictions have borne true.”
  • 24. Bitcoin is a new currency that was created in 2009 by an unknown person using the alias Satoshi Nakamoto. Transactions are made with no middle men – meaning, no banks! There are no transaction fees and no need to give your real name. More merchants are beginning to accept them: You can buy webhosting services, pizza or even manicures.
  • 26. Any downtime can be debilitating. For example, each day of an IT outage costs small and medium-sized companies an estimated $12,500, Symantec estimates, noting that this figure excludes the impact of a company’s computers being down on customers. In assessing the damage done by hurricanes Katrina and Rita in the Gulf Coast states in 2005, U.S. Congress found that 43 percent of businesses that close after a natural disaster never reopen. Of those that stay open, more than 29 percent close within two years.
  • 31. Group Policy is a hierarchical infrastructure that allows a network administrator in charge of Microsoft's Active Directory to implement specific configurations for users and computers. Group Policycan also be used to define user, security and networking policies at the machine level.
  • 32. HAVE PROFESSIONALS APPLY PATCHES AND UPDATES.
  • 34. •Install Firewall •Install Antivirus Software •Install Anti-Spyware Software •Use Complex and Secure Passwords/Phrases •Check on the Security Settings of the Browser
  • 36. Have up to date virus scanners running
  • 38. CCleaner is a small, effective utility for computers running Microsoft Windows that cleans out the 'junk' that accumulates over time: temporary files, broken shortcuts, and other problems. CCleaner protects your privacy.
  • 59. Ad supported software, often called Adware or Advertising Supported Software, is used when referencing any type of program that downloads or displays unwanted banner advertisements in the software being used. Adware is often bundled within software a computer owner purchases. However, adware can also contain or be classified as spyware, a type of malware that is considered by many to be privacy-invasive. Spyware can steal a user’s information or corrupt the user’s system files.
  • 60. If you are not expecting the mail – take the proper precautions to ensure it is a legit email. Do NOT open ANY attachments from people that you do not know!
  • 61. Keep your browser and your O/S up to date:
  • 62. Keep your O/S up to date: Virtualization-based security Secure booting Windows Hello is Windows 10’s attempt to get rid of passwords, which are often stolen and reused. Hello supports three methods of biometric authentication (facial, iris, and fingerprint) in concert with a simple PIN. Passport: If your computer has a TPM chip, the private key of the asymmetric key pair is securely stored there instead of in software. You use Hello or your PIN to authenticate locally, then use Passport to securely authenticate to other network locations. Device Guard is a highly secure tool that determines which applications and scripts should be allowed to run on a particular computer. Credential Guard Enterprise Data Protection
  • 63. Keep your browser up to date:
  • 65. Crawl Firewall Application Control (Detect) URL Filtering Intrusion Detection Antivirus Anti-Malware (Endpoint Walk Anti-Bot Anti-Spam E-mail Security Application Control (Block) Intrusion Protection Media/Port Encryption (Endpoint) Full Disk Encryption (Endpoint) Remote Access VPN (Endpoint) Run Identity Awareness Threat Extraction/Emulation (Gateway) Emulation Cloud Security Mobile Security DDos Protection Document Protection Threat Extraction/Emulation (Endpoint)

Editor's Notes

  • #3: ServIT
  • #4: ServIT
  • #5: ServIT
  • #7: Seth's books deal what is defined as the last 50 years of business called “ the factory model”. He emphatically states that this is completely broken!
  • #8: Defining what we mean. We argue over different definitions, and because someone is doing what we want!
  • #13: everybody must be aligned around the same story! A must is everyone must be able to TELL the story. What is your value proposition. Must come from the top. question, can anyone name the 3 methodologies stated by MIT
  • #14: everybody must be aligned around the same story! A must is everyone must be able to TELL the story. What is your value proposition. Must come from the top. question, can anyone name the 3 methodologies stated by MIT
  • #18: https://www.infocyte.com/blog/2016/7/26/how-many-days-does-it-take-to-discover-a-breach-the-answer-may-shock-you OPM= Office of Personnel Management
  • #19: everybody must be aligned around the same story! A must is everyone must be able to TELL the story. What is your value proposition. Must come from the top. question, can anyone name the 3 methodologies stated by MIT
  • #20: Seth's books deal what is defined as the last 50 years of business called “ the factory model”. He emphatically states that this is completely broken!
  • #21: Changing the way we live, work and play.
  • #23: Seth's books deal what is defined as the last 50 years of business called “ the factory model”. He emphatically states that this is completely broken!
  • #24: Seth's books deal what is defined as the last 50 years of business called “ the factory model”. He emphatically states that this is completely broken!
  • #25: Seth's books deal what is defined as the last 50 years of business called “ the factory model”. He emphatically states that this is completely broken!
  • #31: Patterns were discovered
  • #32: Patterns were discovered
  • #33: Patterns were discovered
  • #34: Patterns were discovered
  • #35: Patterns were discovered
  • #36: Multi tasking!!!!! Calling is very difficult. So is email. Linkin, face book. Traditional selling is on trial.
  • #38: A place from which you see. Where a belief system is birthed.
  • #40: Connections and without walls.
  • #41: Connections and without walls.
  • #42: Ecommerce, social media, information SEO, PPC, etc
  • #43: Reptilian brain- define as 95% of our brain spends time on protecting us! Saber tooth tiger then; image and political correctness now!
  • #45: Reptilian brain- define as 95% of our brain spends time on protecting us! Saber tooth tiger then; image and political correctness now!
  • #46: If I have money why change?
  • #47: Surgery/Advice via the internet
  • #48: If I have money why change?
  • #53: Seth's books deal what is defined as the last 50 years of business called “ the factory model”. He emphatically states that this is completely broken!
  • #54: Connections and without walls.
  • #55: Patterns were discovered