Some of the Rotary gang at Polliwog Park.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
USC Interim President Wanda Austin 
-- by Jim Hallett
 
It was Monday, August 13, 2018, and President Ken Deemer led off our weekly breakfast meeting with Loli Ramezani reminding us, “You are the captain of your soul.”…..Our guests included Russ Samuels’ sons, Ed Kushins’ wife Terry, and a Rotarian from Johannesburg…..Kathleen Terry announced the formation of the 3-member (so far) electric bike club…..President Ken treated us to readings from multiple thank-you notes from our El Camino scholarship recipients…..And then came what we’d all been waiting for all week:  acknowledgement that Wade Austin (always covered in Trojan logos) is now the husband of the (interim) President of USC, his beloved (and friend to many club members) Wanda Austin.
 
Sports
 
Ian Jackson revisited his occasional sports report, after Tiger Woods turned a normally ho-hum August sports weekend into high drama.  There was a touch of college football and major league baseball, a reminder that Mira Costa kicks off its football season August 24, and a pep talk from Bruce Greenspon about our City’s Little League team hopefully playing its way into the Little League World Series.
 
Cybersecurity and the FBI
 
Ron Sokol introduced our speaker, FBI Special Agent Ron Manuel, accompanied by Special Agent Bill Cone, speaking about Cybersecurity.  They came with a valuable invitation—feel free to contact them at manuel@fbi.gov and whcone@fbi.gov.  Agent Manuel broke Cyber issues into five categories:  Criminal, Hacktivism, Espionage, Terrorism, and State Sponsored Attacks (like North Korea attacking Sony).  In our daily lives, the first two are the problem.  As a prime example of criminal hacking, we watched a video of criminals hacking into a local realtor’s office, adopting its client list and format, and then emailing clients emails advising them of new wiring instructions.  The bottom line:  Never trust emails requesting funding.  This is called “business email compromise” or “email account compromise.”
 
Cyber Attacks:  How, Who and What?
 
How is this criminal hacking done?  91% starts with spear phishing emails.  Who does it?  Mostly laymen with minimal cyber skills, not sophisticated techies.  What to do about it?  Treat every email like crossing the street—look right and left before you move.  Create strong passwords and secret questions.  Employ multi-factor, at least two-factor, authentication (for example, no one can get into your cell phone software without having your actual cell phone in hand).  Keep systems updated.  Back up data.  And check yourself—look at your activity logs.  If you are nonetheless hacked, contact iC3.gov, which has an 85% success rate of recovering funds if contacted within 24-48 hours. 
 
Vocational Service
 
We talk a lot about community service, youth service, and international service, as those tend to feel like the heart of our mission and give us much to be proud of.  Club service is what makes us operational and is also where a lot of fun happens.  But on a day like today’s meeting, we are also reminded of our commitment to vocational service.  This club helps us to promote integrity in our working lives and to keep our businesses safe.  Today the FBI told us that every one of us will get hacked.  After today, we can better protect our businesses from those hacks.  That’s vocational service at work.
 
For a copy of the Cyber Security Basics, please see the following webpage <https://portal.clubrunner.ca/2530/SitePage/cyber-security-basics>