Artwork

Content provided by The Sociable. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by The Sociable or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

How Not To Become A Prize Catch From Phishing Attacks

27:50
 
Share
 

Manage episode 314991166 series 3174661
Content provided by The Sociable. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by The Sociable or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Every day hackers send out emails cleverly disguised, posing as legitimate institutions or individuals to lure recipients into providing sensitive data such as personally identifiable information, banking, and credit card details, and passwords.

You might be thinking you are too smart to fall for this, but the truth is, these attacks are often so sophisticated they can cause even the most tech-savvy individuals to fall for them, hook, line, and sinker.

In this episode, we explore how to identify phishing attacks, how they evolve with current affairs and trends, and what to do if you become the victim of an attack.

To do this we are joined by Dan Merino, CEO of Green Dot Security, a cybersecurity company offering services to small and mid-sized businesses.

Today, you will learn how hackers use themes based on larger events such as COVID-19 or tax season to add a legitimate edge to their phishing attacks, why 2-factor authentication is so important to protect yourself, and why the information you post online could be a goldmine for phishing attacks.

We discuss how humans are often the weakest point for a cyberattack, but can also stand to be the strongest defense when trained well.

We also explore how call centers become the target of hacks, in order to access the information of their clientele, so the attackers can pose as a member of the call center to conduct phishing attacks over the phone using this information.

  continue reading

186 episodes

Artwork
iconShare
 
Manage episode 314991166 series 3174661
Content provided by The Sociable. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by The Sociable or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Every day hackers send out emails cleverly disguised, posing as legitimate institutions or individuals to lure recipients into providing sensitive data such as personally identifiable information, banking, and credit card details, and passwords.

You might be thinking you are too smart to fall for this, but the truth is, these attacks are often so sophisticated they can cause even the most tech-savvy individuals to fall for them, hook, line, and sinker.

In this episode, we explore how to identify phishing attacks, how they evolve with current affairs and trends, and what to do if you become the victim of an attack.

To do this we are joined by Dan Merino, CEO of Green Dot Security, a cybersecurity company offering services to small and mid-sized businesses.

Today, you will learn how hackers use themes based on larger events such as COVID-19 or tax season to add a legitimate edge to their phishing attacks, why 2-factor authentication is so important to protect yourself, and why the information you post online could be a goldmine for phishing attacks.

We discuss how humans are often the weakest point for a cyberattack, but can also stand to be the strongest defense when trained well.

We also explore how call centers become the target of hacks, in order to access the information of their clientele, so the attackers can pose as a member of the call center to conduct phishing attacks over the phone using this information.

  continue reading

186 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play