Phishing
Manage episode 371128030 series 3480294
In recent decades we have seen the number of computers and mobile devices multiply greatly making phishing scams incredibly lucrative. Phishing attempts are often the first step to more invasive and damaging attacks in which individual and corporate data is compromised. Join Andrew, Mike, and special guest Scott Leister, Director of Technology from DTC, as they discuss the many clever ways cybercriminals may disguise correspondence as coming from familiar and reputable entities in the attempt to access private information.
Scott Leister has more than two decades of experience in the MSP space, serving as a senior technician at DTC. Much of Scott’s career has been dedicated to enhancing security measures, driving automation, and safeguarding data for both DTC and valued clients. Scott is fully committed to constantly strengthening DTC’s systems and proactively addressing emerging threats within the dynamic landscape of cybersecurity.
Andrew Rose began a cybersecurity awareness program in 2016 while at a major agricultural bank after recognizing that the ag sector wasn’t getting the attention it needed about the risks posed by cybercriminals and other adversaries. He helped coordinate several symposiums and events focusing on the topic. He is now an independent contractor and volunteers his time to bringing cybersecurity awareness, education, mitigation, and response to the ag and food supply chain (and other special projects). His focus is on mitigating emerging threats. In addition to his experience in cybersecurity, he has a deep understanding of banking/finance, risk management, and other professional service sectors related to food, agriculture, and climate.
Michael Urbanik is an Account Executive with R.K Tongue Co., Inc. and is licensed in both Life & Health and Property & Casualty Insurance. He has experience working with both large and middle market commercial clients. He enjoys helping his clients understand the risks they face and develop cost effective plans to successfully mitigate and transfer these risks.
Did you enjoy today’s episode? Personal experience to share? We here at DTC, Inc. would love to hear from you! Please email us your comments and questions at AskUs@DTCtoday.com.
What will cybercriminals do with the stolen data they obtain from phishing scams? On our next episode Andrew and Mike will be discussing one of the possibilities, Cyber Extortion.
Looking for more cybersecurity related content? Check out DTC’s blogspace to read more!
Want to hear more? Past episodes are all posted, including on YouTube! Follow and subscribe on your favorite podcast app to ensure you don’t miss out on the conversation!
अध्यायों
1. Phishing (00:00:00)
2. Welcome to Cyber Savvy (00:00:06)
3. Scott Leister (00:00:57)
4. Mike Urbanik (00:02:07)
5. What is Phishing? (00:03:07)
6. Email Deception (00:04:25)
7. Link Manipulation (00:11:28)
8. Spray & Pray (00:13:52)
9. Infinitely Crafty (00:17:16)
10. Organized Cybercrime? (00:19:09)
11. Defense Against Phishing (00:20:16)
12. The Human Element & Cybersecurity Awareness (00:22:19)
13. Why Is It So Pervasive? (00:26:41)
14. Reporting Spam (00:27:56)
15. Big Phish (00:29:23)
16. Little Phish (00:33:19)
17. A Healthy Level of Skepticism (00:35:00)
18. Email Traffic (00:36:03)
19. CEO Fraud Phishing (00:36:51)
20. Protecting Yourself Against Phishing (00:41:11)
21. Conclusion (00:43:10)
15 एपिसोडस