Artwork

Data Privacy Detective Podcast and Joe Dehner - Global Data Privacy Lawyer द्वारा प्रदान की गई सामग्री. एपिसोड, ग्राफिक्स और पॉडकास्ट विवरण सहित सभी पॉडकास्ट सामग्री Data Privacy Detective Podcast and Joe Dehner - Global Data Privacy Lawyer या उनके पॉडकास्ट प्लेटफ़ॉर्म पार्टनर द्वारा सीधे अपलोड और प्रदान की जाती है। यदि आपको लगता है कि कोई आपकी अनुमति के बिना आपके कॉपीराइट किए गए कार्य का उपयोग कर रहा है, तो आप यहां बताई गई प्रक्रिया का पालन कर सकते हैं https://hi.player.fm/legal
Player FM - पॉडकास्ट ऐप
Player FM ऐप के साथ ऑफ़लाइन जाएं!

Episode 113 - Business Email Compromise Attacks: What Can Be Done?

20:28
 
साझा करें
 

Manage episode 355587059 series 2966669
Data Privacy Detective Podcast and Joe Dehner - Global Data Privacy Lawyer द्वारा प्रदान की गई सामग्री. एपिसोड, ग्राफिक्स और पॉडकास्ट विवरण सहित सभी पॉडकास्ट सामग्री Data Privacy Detective Podcast and Joe Dehner - Global Data Privacy Lawyer या उनके पॉडकास्ट प्लेटफ़ॉर्म पार्टनर द्वारा सीधे अपलोड और प्रदान की जाती है। यदि आपको लगता है कि कोई आपकी अनुमति के बिना आपके कॉपीराइट किए गए कार्य का उपयोग कर रहा है, तो आप यहां बताई गई प्रक्रिया का पालन कर सकते हैं https://hi.player.fm/legal

Business Email Compromise – it’s a major way that global thieves steal trillions of dollars. Bill Repasky, an attorney at Frost Brown Todd LLP, with years of experience in electronic payments and cyber-fraud defense, explains how attacks of this type occur, why they are growing, what can be done to prevent them, and what a business can do if attacked this way.

Common types of Business Email Compromise attacks are what appear to be incoming customer payments, outgoing payments to suppliers of goods and services, and internal attacks (where a mal-actor takes over an employee’s email account at the business). While anti-phishing training is important, it is not enough. Businesses can minimize risk of loss by upgrading institutional defenses this podcast discusses. Tune in for a tune up on how businesses can deal with the rising global crime wave of Business Email Compromise.

Time stamps:

00:46 - What is Business Email Compromise?

03:28 - What businesses are being targeted?

05:35 - What are the common threads we see in business email attacks?

08:24 - How do internal business email attacks occur?

11:00 - How is public information on social media used as part of email attacks?

11:38 - Key things businesses can do to prevent attacks?

14:20 - What is “out-of-band” verification and how can it help prevent attacks?

17:15 - What should a business do once it knows it has been attacked?

  continue reading

150 एपिसोडस

Artwork
iconसाझा करें
 
Manage episode 355587059 series 2966669
Data Privacy Detective Podcast and Joe Dehner - Global Data Privacy Lawyer द्वारा प्रदान की गई सामग्री. एपिसोड, ग्राफिक्स और पॉडकास्ट विवरण सहित सभी पॉडकास्ट सामग्री Data Privacy Detective Podcast and Joe Dehner - Global Data Privacy Lawyer या उनके पॉडकास्ट प्लेटफ़ॉर्म पार्टनर द्वारा सीधे अपलोड और प्रदान की जाती है। यदि आपको लगता है कि कोई आपकी अनुमति के बिना आपके कॉपीराइट किए गए कार्य का उपयोग कर रहा है, तो आप यहां बताई गई प्रक्रिया का पालन कर सकते हैं https://hi.player.fm/legal

Business Email Compromise – it’s a major way that global thieves steal trillions of dollars. Bill Repasky, an attorney at Frost Brown Todd LLP, with years of experience in electronic payments and cyber-fraud defense, explains how attacks of this type occur, why they are growing, what can be done to prevent them, and what a business can do if attacked this way.

Common types of Business Email Compromise attacks are what appear to be incoming customer payments, outgoing payments to suppliers of goods and services, and internal attacks (where a mal-actor takes over an employee’s email account at the business). While anti-phishing training is important, it is not enough. Businesses can minimize risk of loss by upgrading institutional defenses this podcast discusses. Tune in for a tune up on how businesses can deal with the rising global crime wave of Business Email Compromise.

Time stamps:

00:46 - What is Business Email Compromise?

03:28 - What businesses are being targeted?

05:35 - What are the common threads we see in business email attacks?

08:24 - How do internal business email attacks occur?

11:00 - How is public information on social media used as part of email attacks?

11:38 - Key things businesses can do to prevent attacks?

14:20 - What is “out-of-band” verification and how can it help prevent attacks?

17:15 - What should a business do once it knows it has been attacked?

  continue reading

150 एपिसोडस

Усі епізоди

×
 
Loading …

प्लेयर एफएम में आपका स्वागत है!

प्लेयर एफएम वेब को स्कैन कर रहा है उच्च गुणवत्ता वाले पॉडकास्ट आप के आनंद लेंने के लिए अभी। यह सबसे अच्छा पॉडकास्ट एप्प है और यह Android, iPhone और वेब पर काम करता है। उपकरणों में सदस्यता को सिंक करने के लिए साइनअप करें।

 

त्वरित संदर्भ मार्गदर्शिका