Artwork

Content provided by Data Privacy Detective Podcast and Joe Dehner - Global Data Privacy Lawyer. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Data Privacy Detective Podcast and Joe Dehner - Global Data Privacy Lawyer or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Episode 113 - Business Email Compromise Attacks: What Can Be Done?

20:28
 
Share
 

Manage episode 355587059 series 2966669
Content provided by Data Privacy Detective Podcast and Joe Dehner - Global Data Privacy Lawyer. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Data Privacy Detective Podcast and Joe Dehner - Global Data Privacy Lawyer or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Business Email Compromise – it’s a major way that global thieves steal trillions of dollars. Bill Repasky, an attorney at Frost Brown Todd LLP, with years of experience in electronic payments and cyber-fraud defense, explains how attacks of this type occur, why they are growing, what can be done to prevent them, and what a business can do if attacked this way.

Common types of Business Email Compromise attacks are what appear to be incoming customer payments, outgoing payments to suppliers of goods and services, and internal attacks (where a mal-actor takes over an employee’s email account at the business). While anti-phishing training is important, it is not enough. Businesses can minimize risk of loss by upgrading institutional defenses this podcast discusses. Tune in for a tune up on how businesses can deal with the rising global crime wave of Business Email Compromise.

Time stamps:

00:46 - What is Business Email Compromise?

03:28 - What businesses are being targeted?

05:35 - What are the common threads we see in business email attacks?

08:24 - How do internal business email attacks occur?

11:00 - How is public information on social media used as part of email attacks?

11:38 - Key things businesses can do to prevent attacks?

14:20 - What is “out-of-band” verification and how can it help prevent attacks?

17:15 - What should a business do once it knows it has been attacked?

  continue reading

150 episodes

Artwork
iconShare
 
Manage episode 355587059 series 2966669
Content provided by Data Privacy Detective Podcast and Joe Dehner - Global Data Privacy Lawyer. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Data Privacy Detective Podcast and Joe Dehner - Global Data Privacy Lawyer or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Business Email Compromise – it’s a major way that global thieves steal trillions of dollars. Bill Repasky, an attorney at Frost Brown Todd LLP, with years of experience in electronic payments and cyber-fraud defense, explains how attacks of this type occur, why they are growing, what can be done to prevent them, and what a business can do if attacked this way.

Common types of Business Email Compromise attacks are what appear to be incoming customer payments, outgoing payments to suppliers of goods and services, and internal attacks (where a mal-actor takes over an employee’s email account at the business). While anti-phishing training is important, it is not enough. Businesses can minimize risk of loss by upgrading institutional defenses this podcast discusses. Tune in for a tune up on how businesses can deal with the rising global crime wave of Business Email Compromise.

Time stamps:

00:46 - What is Business Email Compromise?

03:28 - What businesses are being targeted?

05:35 - What are the common threads we see in business email attacks?

08:24 - How do internal business email attacks occur?

11:00 - How is public information on social media used as part of email attacks?

11:38 - Key things businesses can do to prevent attacks?

14:20 - What is “out-of-band” verification and how can it help prevent attacks?

17:15 - What should a business do once it knows it has been attacked?

  continue reading

150 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Listen to this show while you explore
Play