s there any place, truly safe from hackerser joining us, considered one of the best in the business when it comes to ethical hacking. he is the founder of a is h embedded device security company. an information security analyst, and c.e. of psychotic software, which provides i.t. security to companies worldwide. so glad you are with us, we know this is being considered one of the most destructive cyber attacks in america. do you expect this something of this scale required inside help. >> you know, i am sad to say that methods that they probably used to getting recess, and to escalate, and get access to personal data are pretty standard when we look at a cyber security assetsment or anything like that. you can probably a hire a uhm in beof firms that are available for a reasonable price. so one thing we do have to consider is the speed at which this was accomplished, so an insider can help especially if they are pointed to the right areas and the right data bases and the right servers to take the information from, and then there's on interesting piece, which we don't usually do, is the d