Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


1 #52: Navigating the effect of AI on marketing jobs and the job market with Sue Keith, Landrum Talent Solutions 19:09
Phishing Emails with 100% Click Rate
Manage episode 202977651 series 1526526
In a recent report from Wombat Security Technologies based on data from millions of simulated phishing attacks, it was found that 76% of organizations said they experienced phishing attacks in 2017, and nearly half of information security professionals said that the rate of attacks increased from 2016 to 2017. F-Secure also recently released research data indicating that over one-third of security incidents start with phishing emails or malicious attachments sent to company employees.
In this podcast, LBMC Information Security’s Bill Dean digs into these research findings and shares some reasons why training employees to spot phishing emails, messages, and pre-texting calls can’t be done just once or once a year.
Listen, and discover these key takeaways:
- Fascinating new research findings about phishing attacks
- Reasons for training employees about phishing attacks on an ongoing basis
- Why it only takes one user to follow the link in a phishing email for your network to be compromised
- New approaches that may be implemented into our menu of phishing schemes
69 episodes
Manage episode 202977651 series 1526526
In a recent report from Wombat Security Technologies based on data from millions of simulated phishing attacks, it was found that 76% of organizations said they experienced phishing attacks in 2017, and nearly half of information security professionals said that the rate of attacks increased from 2016 to 2017. F-Secure also recently released research data indicating that over one-third of security incidents start with phishing emails or malicious attachments sent to company employees.
In this podcast, LBMC Information Security’s Bill Dean digs into these research findings and shares some reasons why training employees to spot phishing emails, messages, and pre-texting calls can’t be done just once or once a year.
Listen, and discover these key takeaways:
- Fascinating new research findings about phishing attacks
- Reasons for training employees about phishing attacks on an ongoing basis
- Why it only takes one user to follow the link in a phishing email for your network to be compromised
- New approaches that may be implemented into our menu of phishing schemes
69 episodes
All episodes
×
1 Can You Trust Your Eyes? Deepfakes, Self-Healing Systems, and AI Risks You’re Not Seeing 28:13

1 The Future of AI Security: Legacy AI, Emerging Risks & Business Impact 39:02

1 PCI Monthly Update: Latest News and Updates to Requirement 12 39:37

1 PCI Monthly Update: Latest PCI News, Requirement 11 Overview, and QSA Insights 33:43

1 PCI Monthly Update: Version 4.0 Countdown, Requirement 10, and QSA Insights 27:45

1 PCI Monthly Update: Gearing Up for Version 4.0, Mastering Requirement 9, and QSA Insights 29:44

1 PCI Monthly Update: December News, Deep Dive into Requirement 8, and QSA Q&A 35:56

1 PCI Monthly Update: October - New SAQ Review, Focused Look at Requirement 7, and Expert QSA Insights 29:07

1 PCI Monthly Update: September Highlights & Requirement 6 Deep Dive 31:27

1 PCI Monthly Update: August Highlights & Requirement 5 Breakdown 24:57

1 PCI Monthly Update: July Insights & Innovations 24:05



1 PCI Monthly Update: March News & Requirement 3 35:56



1 PCI Monthly Update: January News & Requirement 1 34:55



1 Keeping Your Digital Identity Secure with Mark Burnette 47:43




1 What is the Cybersecurity Maturity Model Certification (CMMC)? 28:42








1 2018 Was Second-Most Active Year for Data Breaches 10:30

1 Targeted Attacks Compared to Opportunistic Attacks 8:28







1 Business Email Compromise: When The Threat is Internal 12:00

1 The Value of Incident Response Table Top Exercises 9:38



1 IIA Knoxville—Implementing Cloud-Managed Security 7:42


1 IIA Knoxville—Dear President Trump: How to Secure the United States & Demonstrate That Your Company Is 7:36


1 5 Reasons Why Organizations Don’t Detect a Cyber Breach 9:33




1 Cloud Storage and User Authentication Compromises: Managing the Integrity of Your Data 15:46

1 Manufacturing and Industrial Sectors Are Cybersecurity Targets 7:21

Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.