Bell Kills The Source Brand And Teams Up With Best Buy To Create Best Buy Express Stores

Posted in Commentary with tags , on January 19, 2024 by itnerd

Years ago, Bell bought what was left of the Circuit City retail brand, renamed them The Source and used them as another retail arm to exclusively push Bell products and services among other things. But that changed with this press release where Bell has announced that The Source branding will be no more, and that the telco is teaming up with Best Buy to create Best Buy Express retail stores:

Best Buy Canada and Bell Canada (TSX: BCE) (NYSE: BCE) have entered into a strategic partnership to operate 165 consumer electronics retail stores in Canada. The Source, a wholly owned subsidiary of Bell, will be rebranded as Best Buy Express and offer the latest in consumer electronics from Best Buy along with exclusive telecommunications services from Bell.

This innovative partnership will make the most of the respective strengths of Best Buy and Bell to deliver an exceptional shopping experience for Canadians. Best Buy and Bell will invest in an updated store experience, as well as an expanded product assortment, customer experience and training. Customers will benefit from Best Buy’s expertise in consumer electronics to find the latest products from the world’s leading brands, its global buying power and industry-leading supply chain. In addition, customers will find Bell, Virgin Plus and Lucky Mobile mobility, Internet, TV and home phone services, all backed by knowledgeable sales and support they have come to expect from Best Buy and Bell.

Best Buy will expand its presence in malls and in smaller and mid-sized communities across the country, leveraging 165 The Source locations that will augment Best Buy’s presence throughout Canada. Best Buy Express’ small-store format will give customers an easy-to-navigate, welcoming experience, enabling customers to experience the products in person and talk with a sales associate before purchasing. As today’s customers increasingly want to shop in ways that are convenient for them, whether in store or online, the e-commerce power of bestbuy.ca will offer customers a wider selection of consumer electronics with the option for full delivery or pick up of online orders in Best Buy or Best Buy Express stores.

Best Buy Express is expected to open in locations across Canada starting in the second half of 2024.

So Best Buy get to be in places across the country. And Bell gets another retail channel where they are the only player in the game. I say that because Bell has a strategic partnership with Staples which gets them similar levels of access. I can see how this is a win for Bell and Best Buy. At least on paper. Let’s see how this plays out once these rebranded stores start to appear.

Phishing Emerges As Top Threat for Security Professionals Says Fortra

Posted in Commentary with tags on January 19, 2024 by itnerd

Fortra has published the findings from its inaugural 2024 Fortra State of Cybersecurity Survey. The research uncovers the challenges security professionals have faced over the past year, as well as what they plan to focus on next as they continue to embrace digital transformation, new hybrid infrastructure, and tackle a challenging security landscape. 

Hybrid Environments Lead to Disparate Challenges and Priorities  

The survey found that most organizations anticipate phishing (81%), malware and ransomware (76%), and accidental data loss (63%) will be the top security risks over the next six months, followed by social engineering (55%) and third-party risks (52%).  

To address these threats, security professionals’ top five cybersecurity initiatives for this year are: limiting outsider threats (such as phishing and malware) (74%), finding and closing security gaps (73%), improving security culture (66%), securing the cloud (63%), and compliance (62%). 

64% of respondents in Fortra’s survey reported having a hybrid environment, while 19% were cloud-first, and 12% were cloud-only. The 6% who said they had no plans to move to cloud cited security concerns as the reason to not make the jump (77%). 

Skill Shortages and the Increasing Role of Managed Security Services 

The research also explored the hurdles hindering the execution of security strategies, with budget limitations (54%), the constantly changing nature of threats (45%), and lack of security skills (45%) topping the list. In addition, the survey revealed that while everyone is seeking to implement principles of zero trust, a quarter said they aren’t planning to due to insufficient resources. 

Many organizations are aware that upskilling needs to occur to strengthen their security position, with 67% saying they are focusing on improving the skills of their staff. Organizations are also leaning into managed security services to offload some of the weight. The most popular areas to offload being: email security and anti-phishing (58%), vulnerability management (52%), data protection (51%), and compliance (40%). 

Report Methodology/Respondent Profile 

The 2024 Fortra State of Cybersecurity Survey canvassed opinions from over 400 security professionals within 40 different industries across the U.S., Europe, Canada, Asia, the Middle East, Latin America, the Caribbean, Australia, and New Zealand. It provides an essential industry temperature check at a criticaljuncture in organizations’ digital transformation journeys, whereby leaders are planning security for their new hybrid infrastructure that meets the productivity needs of distributed workforces. 

Find out more about the shifting cybersecurity landscape by reading Fortra’s full report here

UK Builds Public-Private ‘Cyber League’ To Combat Emerging Cyber Threats

Posted in Commentary with tags on January 19, 2024 by itnerd

The UK’s National Cyber Security Centre (NCSC) has announced plans to convene public and private experts in a new Cyber League in an effort to combat cyber threats facing the UK.

Members of Cyber League will be a diverse group of industry experts, working with NCSC analysts and each other. The group will take part in a range of engagements, analytic workshops and discussion groups with the intention to improve visibility and tracking of existing and emerging threats.

“We continue to operate in a world of greater competition, instability, and contention than we have in over 30 years; a time before which cyber was material.

“As such we need to go beyond the excellent work already in place […] and prepare for when the big cyber event hits organizations, the UK, and the globe. Our adversaries, criminal and otherwise, are more aggressive and technically able than ever before, and show no sign of slowing down,” Ollie Whitehouse, new NCSC CTO warned earlier this week.

The initiative will complement the NCSC’s Industry i100 program, where third-party cyber experts are seconded to work at the agency on a part-time basis. 

Jason Keirstead, VP of Collective Threat Defense, Cyware:

   “It is extremely encouraging to see this announcement from the NCSC. As we have seen with the JCDC program in the United States, there are tangible benefits whenever the public and private sectors increase their collective defense efforts. Cybersecurity is a whole-of-nation problem and cannot be solved by industry and government working alone, we must continue to engage as frequently and as widely as practical.”

This almost sounds like UK has pulled a team of superheroes together to fight cybercrime. Jokes aside, this is a good idea. And more countries should do something similar.

HaveIBeenPwned.com Adds 71M Email Addresses From 1 Billion Lines Of Stolen Credentials 

Posted in Commentary with tags on January 19, 2024 by itnerd

Today, Troy Hunt, the creator of Have I Been Pwned, announced he added almost 71 million email addresses associated with stolen accounts in the Naz.API dataset to its data breach notification service.
 
The Naz.API is a dataset allegedly containing over 1 billion lines of stolen credentials compiled from credential stuffing lists and from information-stealing malware logs. Each line of data consists of a login URL, its login name, and an associated password stolen from a person’s device.
 
According to Hunt, the Naz.API dataset consists of:
 

  • 319 files totalling 104GB
  • 70,840,771 unique email addresses
  • 427,308 individual HIBP subscribers impacted
  • 65.03% of addresses already in HIBP (based on a 1k random sample set)

 
“That last number was the real kicker; when a third of the email addresses have never been seen before, that’s statistically significant. This isn’t just the usual collection of repurposed lists wrapped up with a brand-new bow on it and passed off as the next big thing; it’s a significant volume of new data,” Hunt said.

Ted Miracco, CEO, Approov Mobile Security had this to say:

   “While user authentication serves as a critical gatekeeper for accessing sensitive data, the Naz.API dataset containing over a billion lines of stolen credentials highlights that it’s essential to recognize its limitations in the face of these threats.

   “Credential stuffing attacks, where stolen credentials are used to gain unauthorized access to multiple accounts, remain a prevalent threat. Additionally, automated bots leverage stolen credentials to manipulate login processes. To address these vulnerabilities, two advanced security measures stand out as effective solutions: mobile app attestation and token-based API security. Token-based API security provides robust protection for API access by only granting authorized users a unique token and prevents unauthorized access attempts, even if attackers possess stolen credentials. This method has proven to be a formidable defense against automated bots and malicious actors attempting to exploit API vulnerabilities.

   “Mobile app attestation ensures the integrity of mobile applications, making it significantly harder for attackers to utilize bots or brute force ATO attacks. This approach verifies that the mobile app is running in a secure and untampered environment, adding an extra layer of security to user authentication.”

Brad Hong, Customer Success Lead, Horizon3.ai follows with this:

   “Incidents like this continue to verify that from an attacker’s perspective, hackers rarely need to hack in; they simply log in.

   “Why would they want to hack me? The age-old question of the layman. With recent advances in AI/ML driven combinatorics, lists like these serve as more than just loot and is the crown jewel of OSINT. For attackers, it’s always going to be about planting the first flag, regardless of how unimportant that person might seemingly be in the organization. And who knows? They just might share the same affinity for sports, pets or seasons as the CEO.

   “With few giving their companies the courtesy of using a password unique to only their corporate devices, high volumes of statistical password reuse throughout an organization, rampant misconfigurations leading to excessively privileged credentials, and post-exploitation of locally stored credential databases to capture legitimate creds potentially leading to privesc, as the # of breaches go up, attackers are given more and more datasets to avoid having to take on the time intensive work of algorithmic hash cracking, and instead simply stuffing what seems to be an endless list of real-world credentials to get in with.

   “By recycling the processes above, without invoking a single GPU for a hash cracker, attackers can easily be set up to capture hashes from an entire organization and achieve domain admin through legitimate passwords and abuse of built-in capabilities. What’s significant about the percentage of new users added to the master list is that it introduces a whole lot of new entryways to new organizations in the form of humans. And it can all start from one person who used the same password on their AD as they did on Uber.”

I’d recommend everyone pay a visit to https://haveibeenpwned.com and pop in their email address or addresses to see if they are part of this dataset. That way you can take action to protect yourself from whatever the threat actors behind this dataset plan on unleashing on the world.

Microsoft Provides Info On The “Mint Sandstorm” Phishing Campaign

Posted in Commentary with tags on January 19, 2024 by itnerd

Microsoft Research has put out a report on the Mint Sandstorm phishing campaign targeting high profile individuals at universities and research orgs:

Since November 2023, Microsoft has observed a distinct subset of Mint Sandstorm (PHOSPHORUS) targeting high-profile individuals working on Middle Eastern affairs at universities and research organizations in Belgium, France, Gaza, Israel, the United Kingdom, and the United States. In this campaign, Mint Sandstorm used bespoke phishing lures in an attempt to socially engineer targets into downloading malicious files. In a handful of cases, Microsoft observed new post-intrusion tradecraft including the use of a new, custom backdoor called MediaPl.

Operators associated with this subgroup of Mint Sandstorm are patient and highly skilled social engineers whose tradecraft lacks many of the hallmarks that allow users to quickly identify phishing emails. In some instances of this campaign, this subgroup also used legitimate but compromised accounts to send phishing lures. Additionally, Mint Sandstorm continues to improve and modify the tooling used in targets’ environments, activity that might help the group persist in a compromised environment and better evade detection.

Shawn Loveland, COO, Resecurity had this comment:

Bespoke phishing attacks can be highly effective as they are difficult for victims to distinguish as malicious. If the phishing campaign has reasonable operational security (OpSec), it is difficult for security products and services to prevent the delivery of the lure. The next-generation AI-powered phishing campaigns will make bespoke phishing attacks low-cost, automated, and common. After the lure has been delivered and acted upon by the victim, threat actors motivated by geopolitics and money-making endeavors commonly use similar TTPs in their attack, as described by Microsoft.

The motivations behind the actions of threat actors based in Iran can vary between geopolitical and financial gain. The specific motivation behind their actions depends on the group and actors involved. For instance, some threat actors may be driven by geopolitical issues during the day but use the same or similar TTPs at night for personal financial gain. According to a report from Microsoft, this group is only motivated by geopolitics for the specific TTPs described in the report.

Individuals and organizations are vulnerable to various threat actors, with motivations such as personal gain, fame, revenge, challenge, and even geopolitics. It is worth noting that security products and processes can take months to detect and mitigate a new campaign, exposing companies to potential attacks. Therefore, companies must establish a robust CTI practice to detect and mitigate these TTPs before they become targeted.

Microsoft has a lot of advice that you should read and heed if you want to successfully defend against this. Because it’s clearly done by highly skilled threat actors who are willing to go to great lengths to get what they want.

Guest Post: Explore Why These 3 Canadian Hotspots are Obsessed with Cyber Security

Posted in Commentary with tags on January 19, 2024 by itnerd

“What is at stake in the digital world translates extremely quickly into the physical world.” This statement is made by Josh Gordon, a technology expert at Geonode, who believes deeply in the necessity of robust cybersecurity measures. In this atmosphere, three Canadian cities, Toronto, Vancouver, and Ottawa, are developing into significant cybersecurity hubs. They are answering the call to protect the digital frontier, driven by unique factors and attributes.

Toronto: Investing in Cybersecurity

Toronto tops the list for its unwavering focus on cybersecurity, backed up by sizeable investments. Gordon said, “The tech scene in Toronto is bursting at the seams. As the country’s financial hub, it faces unique cybersecurity threats requiring robust defences.

Why is Toronto obsessed with cybersecurity?

  • Tech Leadership

Toronto has a thriving tech scene marked by innovation and growth. With many companies processing large volumes of sensitive data, robust cybersecurity measures become essential.

  • Financial Hub

As Canada’s financial capital, Toronto is a prime target for cyber threats. The need for top-tier cybersecurity is a priority to ensure the safety and stability of the country’s financial systems.

  • Educational Institutions

The presence of world-class universities and colleges in Toronto driving research in cybersecurity contributes to a climate of awareness and innovation in this field.

Vancouver: Growth in Cybersecurity

Vancouver, known for its stunning scenery and excellent quality of life, has also emerged as a hotbed for technology innovation and cybersecurity. “It’s all about growth in Vancouver,” asserts Gordon. “The city has recognized the importance of cybersecurity in facilitating its booming tech industry.”

Why is Vancouver obsessed with cybersecurity?

  • Tech Industries

The city is teeming with diverse tech industries that demand a secure digital environment. This makes cybersecurity more than a necessity; it’s an obsession.

  • Talent Pool

With many universities and tech institutes, Vancouver has a rich talent pool skilled in the latest cybersecurity practices.

  • Government Support

The British Columbia government’s support for tech and innovation has strengthened the cybersecurity sector.

Ottawa: Security Central for Cybersecurity

Ottawa, the nation’s capital, has inherited an obsession with cybersecurity based on its governmental role. “The presence of national security establishments naturally highlights the need for cyber defence,” Gordon notes.

Why is Ottawa obsessed with cybersecurity?

  • National Security

Being the federal capital, Ottawa is responsible for safeguarding national data, underscoring the importance of cybersecurity.

  • Tech Firms

Many of Canada’s tech firms are based in Ottawa, creating greater reliance on secure digital systems.

  • Research & Development

The city boasts strong R&D capabilities, particularly cybersecurity and national defence.

As we draw our focus to a close, we learn that the need for cybersecurity unites these three cities, albeit driven by unique factors. Each municipality must continue its investment and commitment to cybersecurity to stay ahead in safeguarding our digital world. But where do we go from here, and how does this landscape change and evolve? That question is an anthem, a call to arms, for each of us to address, answer and act upon. As we embrace the digital age, it becomes increasingly clear that cybersecurity is not just an obsession for these three Canadian cities but a necessity for us all, wherever we may be.

Is The “Digital Key” Feature Available On Hyundai Canada Cars? Inquiring Minds Want To Know

Posted in Commentary with tags on January 18, 2024 by itnerd

I was directed to this Reddit thread by a reader. In short, it has a guy who started said thread complaining that he bought a 2024 Hyundai Elantra sedan partially because it supposedly came with feature that allows you to unlock your car using your smart phone or smart watch. The feature is called “digital key” and it’s been slowly rolling out to various car brands over the last few years.

The thing is, when he couldn’t get it working, he reached out to Hyundai Canada and this is what they replied with:

Here’s the problem with this statement. If you go to the Elantra section of the Hyundai Canada website, and scroll down about half way, you see this:

So it lists digital key as a feature. That makes Hyundai Canada’s response a bit suspicious as the kids say. But I figured, maybe this only applies to certain trim levels. Thus I paged through the Specs section noting that in his post on Reddit he had said that he had the “Luxury” trim level and found nothing that provided any further clarity.

Here’s the thing, long time readers will remember that Hyundai Canada back in 2015 went through a bit of a PR crisis where people who were mad due to the fact that US buyers were promised Apple CarPlay and Android Auto via future software updates, but Canadians didn’t get the same treatment. Now Hyundai Canada didn’t promise this at all to Canadian customers, but likely because of the blowback from owners and perhaps my coverage of this, Hyundai Canada made good and delivered that update to Canadians for free. In short, they underpromised and over delivered.

Fast forward to this situation, it looks like to me that Hyundai Canada has done the exact opposite here. They clearly have this feature on their website. But they for whatever reason aren’t able to deliver it to Canadian consumers who buy their cars. So unless the person in that screen shot above was seriously misinformed, Hyundai Canada really has some explaining to do. Because besides the fact that any sort of “digital key” in a car is a feature that I along with many consumers would be looking for in a new car, this really has the feel of false advertising at worst. At best this is one hell of a screw up by Hyundai Canada. I’d really like to find out what Hyundai Canada has to say about this and what the actual truth is so that any potential buyer of any Hyundai vehicle knows what the deal is.. So if Hyundai Canada reads this, they can reach out to me via my about page and tell me what their side of the story is, and I will publish it as soon as I get it in my inbox.

Stream+ from TELUS Is Bringing Canadians A Streaming Bundle With Netflix, Disney+ and Prime Video For One Price

Posted in Commentary with tags on January 18, 2024 by itnerd

Today, TELUS introduced a new Stream+ bundle, bringing together three of Canada’s most popular streaming services, Netflix, Disney+ and Prime Video, in one package. Stream+ is available exclusively to TELUS customers nationwide, offering customers access to thousands of content titles at an unbeatable price, with affordable plans starting at $20 per month – a monthly cost savings of 17%. The new Stream+ bundle sets the stage for non-stop winter entertainment where customers can enjoy their favourite TV shows and movies from the comfort of home or on-the-go.

Stream+ offers two new enticing bundles:

  • Stream+ Basic: For content streamers looking for great value, the Stream+ Basic bundle provides Netflix Standard with Ads, Disney+ Standard with Ads, and Prime Video all for just $20 per month.
  • Stream+ Premium: For those seeking the ultimate streaming experience and unbeatable value, the Stream+ Premium bundle offers Netflix Premium, Disney+ Premium, and Prime Video for $38 per month.

Stream+ includes not only Prime Video, but a full membership to Amazon Prime (valued at $9.99 per month or $99 per year), giving customers access to unlimited fast, free delivery on millions of items, including One-Day Delivery to most cities and towns and Same Day Delivery in select cities, ad-free listening of millions of songs on Amazon Music Prime, free gaming benefits with Prime Gaming, thousands of books with Prime Reading, unlimited photo storage with Amazon Photos, among others.

Whether viewers are looking for heartwarming family sitcoms, iconic classic movies or captivating docu-series, Stream+ has everything you need for the perfect streaming marathon. Popular content titles include Emmy-award winning, global hit drama series The Crown on Netflix; Marvel Studios’ Loki on Disney+; and the global success The Lord of the Rings: The Rings of Power on Prime Video.

Streaming enthusiasts can easily add the new Stream+ bundle with eligible TELUS services directly on their My TELUS website or app, and watch from multiple devices simultaneously – including their TV, smartphone, tablet and laptop. This means customers can manage their subscriptions in one convenient place and binge-watch their favourites at home or on-the-go anywhere, any time. Customers who already have a subscription to one or more of the three streaming services can now link their existing accounts to the Stream+ bundle and enjoy these incredible savings – with no change to their preferences, viewing history or profiles.

For more information and to sign-up for Stream+, visit telus.com/streamplus

JPMorgan Chase Gets Attacked By Hackers 45 BILLION Times A Day…. WTF??

Posted in Commentary with tags on January 18, 2024 by itnerd

Here’s a mind blowing stat for you. US finance firm JPMorgan Chase gets attacked by hackers an astonishing 45 million times a day. Here’s the details:

Mary Callahan Erdoes, Chief Executive of JPMorgan’s Asset & Wealth Management line discussed the increasing numbers of hacking attempts during a panel at the World Economic Forum in Davos.

‘The fraudsters get smarter, savvier, quicker, more devious, more mischievous,’ Erdoes said. 

‘It’s so hard and it’s going to become increasingly harder and that’s why staying one step ahead of it is really the job of each and everyone of us.’

JPMorgan isn’t the only bank dealing with a surge in cyberattacks.

Since Russia invaded Ukraine two years ago – rising global geopolitical tensions have caused cyber crime to skyrocket. 

Over 70 per cent of bank leaders in a 2023 KPMG survey reported being concerned about cyber crime and cyber insecurity. 

JPMorgan spends $15 billion each year just on technology to prevent cyber attacks as part of an effort to bolster its cyber defenses. 

This budget is up substantially from the $14.3 billion that the company spent on technology in 2022. 

Edroes also reported that JPMorgan Chase had employed 62,000 technologists to help secure systems and prevent hacking. 

Ken Westin, Field CISO, Panther Labs had this comment:

This type of messaging is not helpful to the industry without providing more specifics. It feels similar to the  “cyber apocalypse” we experienced a few years back to instill fear in consumers and businesses. In this instance, I am pretty sure they’re referring to vulnerability scans, DDoS attempts, bots etc. – most of which are automated and not really attacks, but I guess that depends on how they define an attack – context that I believe is lacking in this statement. Erdoes’ quote also refers to “fraudsters” which can also include credit card fraud, BEC attempts, etc. and not just “hackers.” We need to get beyond the fear, uncertainty and doubt (FUD) narratives in security, and focus on real threats with appropriate context – not push “monsters under the bed” narratives to keep CISOs up at night.

The fact that JPMorgan Chase hasn’t been taken out, at least not that we know of, is likely a good sign that their cyber defences are working. Whatever they are. It also highlights that other companies need to put in their level of effort to stay secure.

Konica Minolta Delivers Layered Security Approach and Solutions for MFP Clients

Posted in Commentary with tags on January 18, 2024 by itnerd

 Konica Minolta Business Solutions (Canada) Ltd. today announced its recommended layered security approach for customers who operate the company’s bizhub MFPs (multifunction printers) and other print devices to help protect organizations of all sizes from today’s increasing cybercrime threats that can halt operations, incur millions of dollars in expenses and ruin business reputations.

Recent studies show the global average data breach cost in 2023 has risen to $4.45M – a 15 percent increase over the last three years. Additionally, the increase in hybrid workforces over the last few years and the associated types of office, laptop, mobile and remote devices connected to business networks and the internet has made it more important than ever to protect users and a company’s customers from malware and other threats at every endpoint.

Because new threats appear constantly, and smaller businesses don’t often have expert IT help on staff, Konica Minolta is strongly advising customers who operate the company’s MFPs and other print devices to protect help protect themselves with additional layers of security solutions, all based on each customer’s and their industry’s needs.

IT departments at many organizations may not have the ability to ensure machine security across all devices, so automated security capabilities can significantly reduce risk – including potential security breaches that can happen inside an organization with unauthorized users at an MFP. Konica Minolta addresses these risks with tools such as hard drive lock passwords, hard drive encryption, automatic deletion of temporary image data, and data overwrite of electronic documents on a timed basis. Konica Minolta’s layered security solutions include:

bizhub SECURE family of entry-level services – Includes enhanced password and data security protection as well as advanced encryption for data in transit and at rest in the MFP. Users are only able to access the MFP with a password that is locked and stored to protect access to documents.

bizhub SECURE Notifier – Allows an organization to receive alerts in real time to protect their bizhub SECURE settings and offers a multitude of password safeguards. Embedded antivirus and malware protection checks for incoming, outgoing and data at rest and sends alerts for security issues.

Antivirus and malware protection powered by BitDefenderTM – Enables the MFP to scan for viruses as data is received and before outbound transmission. Checks for incoming, outgoing and data at rest in the MFP that could contain malware, which can include viruses, Trojan horses, ransomware and spyware. BitDefender is a worldwide leader in cybersecurity, offering real-time device protection, 24/7.

Shield Guard – Takes protection to another level by providing anywhere, anytime access to make monitoring and managing the security of an entire print fleet faster and easier. A single dashboard delivers instant notifications and alerts to enable immediate action if security vulnerabilities are detected, ensuring industry compliance.

Dispatcher Paragon+ – Delivers enhanced security measures plus a consolidated view of an organization’s entire print, copy, fax and scan operations to help boost productivity. This advanced document workflow solution provides secure pull print across an entire fleet of devices and single sign-on (SSO) multifactor authentication.

Dispatcher Phoenix – Securely captures, processes and distributes documents to help increase business productivity and efficiency, drive collaboration and reduce costs. This advanced, intelligent document workflow supports digital workflows with email or fax capture, streamlines print and scan activities and its centralized management interface requires little to no technical expertise.

Learn more about Konica Minolta’s data and device security solutions for every industry here.