Artwork

Conteúdo fornecido por DTC, Inc. and DTC. Todo o conteúdo do podcast, incluindo episódios, gráficos e descrições de podcast, é carregado e fornecido diretamente por DTC, Inc. and DTC ou por seu parceiro de plataforma de podcast. Se você acredita que alguém está usando seu trabalho protegido por direitos autorais sem sua permissão, siga o processo descrito aqui https://pt.player.fm/legal.
Player FM - Aplicativo de podcast
Fique off-line com o app Player FM !

Phishing

45:04
 
Compartilhar
 

Manage episode 371128030 series 3480294
Conteúdo fornecido por DTC, Inc. and DTC. Todo o conteúdo do podcast, incluindo episódios, gráficos e descrições de podcast, é carregado e fornecido diretamente por DTC, Inc. and DTC ou por seu parceiro de plataforma de podcast. Se você acredita que alguém está usando seu trabalho protegido por direitos autorais sem sua permissão, siga o processo descrito aqui https://pt.player.fm/legal.

In recent decades we have seen the number of computers and mobile devices multiply greatly making phishing scams incredibly lucrative. Phishing attempts are often the first step to more invasive and damaging attacks in which individual and corporate data is compromised. Join Andrew, Mike, and special guest Scott Leister, Director of Technology from DTC, as they discuss the many clever ways cybercriminals may disguise correspondence as coming from familiar and reputable entities in the attempt to access private information.
Scott Leister has more than two decades of experience in the MSP space, serving as a senior technician at DTC. Much of Scott’s career has been dedicated to enhancing security measures, driving automation, and safeguarding data for both DTC and valued clients. Scott is fully committed to constantly strengthening DTC’s systems and proactively addressing emerging threats within the dynamic landscape of cybersecurity.
Andrew Rose began a cybersecurity awareness program in 2016 while at a major agricultural bank after recognizing that the ag sector wasn’t getting the attention it needed about the risks posed by cybercriminals and other adversaries. He helped coordinate several symposiums and events focusing on the topic. He is now an independent contractor and volunteers his time to bringing cybersecurity awareness, education, mitigation, and response to the ag and food supply chain (and other special projects). His focus is on mitigating emerging threats. In addition to his experience in cybersecurity, he has a deep understanding of banking/finance, risk management, and other professional service sectors related to food, agriculture, and climate.
Michael Urbanik is an Account Executive with R.K Tongue Co., Inc. and is licensed in both Life & Health and Property & Casualty Insurance. He has experience working with both large and middle market commercial clients. He enjoys helping his clients understand the risks they face and develop cost effective plans to successfully mitigate and transfer these risks.
Did you enjoy today’s episode? Personal experience to share? We here at DTC, Inc. would love to hear from you! Please email us your comments and questions at AskUs@DTCtoday.com.
What will cybercriminals do with the stolen data they obtain from phishing scams? On our next episode Andrew and Mike will be discussing one of the possibilities, Cyber Extortion.
Looking for more cybersecurity related content? Check out DTC’s blogspace to read more!

Want to hear more? Past episodes are all posted, including on YouTube! Follow and subscribe on your favorite podcast app to ensure you don’t miss out on the conversation!

  continue reading

Capítulos

1. Phishing (00:00:00)

2. Welcome to Cyber Savvy (00:00:06)

3. Scott Leister (00:00:57)

4. Mike Urbanik (00:02:07)

5. What is Phishing? (00:03:07)

6. Email Deception (00:04:25)

7. Link Manipulation (00:11:28)

8. Spray & Pray (00:13:52)

9. Infinitely Crafty (00:17:16)

10. Organized Cybercrime? (00:19:09)

11. Defense Against Phishing (00:20:16)

12. The Human Element & Cybersecurity Awareness (00:22:19)

13. Why Is It So Pervasive? (00:26:41)

14. Reporting Spam (00:27:56)

15. Big Phish (00:29:23)

16. Little Phish (00:33:19)

17. A Healthy Level of Skepticism (00:35:00)

18. Email Traffic (00:36:03)

19. CEO Fraud Phishing (00:36:51)

20. Protecting Yourself Against Phishing (00:41:11)

21. Conclusion (00:43:10)

13 episódios

Artwork

Phishing

Cyber Savvy

published

iconCompartilhar
 
Manage episode 371128030 series 3480294
Conteúdo fornecido por DTC, Inc. and DTC. Todo o conteúdo do podcast, incluindo episódios, gráficos e descrições de podcast, é carregado e fornecido diretamente por DTC, Inc. and DTC ou por seu parceiro de plataforma de podcast. Se você acredita que alguém está usando seu trabalho protegido por direitos autorais sem sua permissão, siga o processo descrito aqui https://pt.player.fm/legal.

In recent decades we have seen the number of computers and mobile devices multiply greatly making phishing scams incredibly lucrative. Phishing attempts are often the first step to more invasive and damaging attacks in which individual and corporate data is compromised. Join Andrew, Mike, and special guest Scott Leister, Director of Technology from DTC, as they discuss the many clever ways cybercriminals may disguise correspondence as coming from familiar and reputable entities in the attempt to access private information.
Scott Leister has more than two decades of experience in the MSP space, serving as a senior technician at DTC. Much of Scott’s career has been dedicated to enhancing security measures, driving automation, and safeguarding data for both DTC and valued clients. Scott is fully committed to constantly strengthening DTC’s systems and proactively addressing emerging threats within the dynamic landscape of cybersecurity.
Andrew Rose began a cybersecurity awareness program in 2016 while at a major agricultural bank after recognizing that the ag sector wasn’t getting the attention it needed about the risks posed by cybercriminals and other adversaries. He helped coordinate several symposiums and events focusing on the topic. He is now an independent contractor and volunteers his time to bringing cybersecurity awareness, education, mitigation, and response to the ag and food supply chain (and other special projects). His focus is on mitigating emerging threats. In addition to his experience in cybersecurity, he has a deep understanding of banking/finance, risk management, and other professional service sectors related to food, agriculture, and climate.
Michael Urbanik is an Account Executive with R.K Tongue Co., Inc. and is licensed in both Life & Health and Property & Casualty Insurance. He has experience working with both large and middle market commercial clients. He enjoys helping his clients understand the risks they face and develop cost effective plans to successfully mitigate and transfer these risks.
Did you enjoy today’s episode? Personal experience to share? We here at DTC, Inc. would love to hear from you! Please email us your comments and questions at AskUs@DTCtoday.com.
What will cybercriminals do with the stolen data they obtain from phishing scams? On our next episode Andrew and Mike will be discussing one of the possibilities, Cyber Extortion.
Looking for more cybersecurity related content? Check out DTC’s blogspace to read more!

Want to hear more? Past episodes are all posted, including on YouTube! Follow and subscribe on your favorite podcast app to ensure you don’t miss out on the conversation!

  continue reading

Capítulos

1. Phishing (00:00:00)

2. Welcome to Cyber Savvy (00:00:06)

3. Scott Leister (00:00:57)

4. Mike Urbanik (00:02:07)

5. What is Phishing? (00:03:07)

6. Email Deception (00:04:25)

7. Link Manipulation (00:11:28)

8. Spray & Pray (00:13:52)

9. Infinitely Crafty (00:17:16)

10. Organized Cybercrime? (00:19:09)

11. Defense Against Phishing (00:20:16)

12. The Human Element & Cybersecurity Awareness (00:22:19)

13. Why Is It So Pervasive? (00:26:41)

14. Reporting Spam (00:27:56)

15. Big Phish (00:29:23)

16. Little Phish (00:33:19)

17. A Healthy Level of Skepticism (00:35:00)

18. Email Traffic (00:36:03)

19. CEO Fraud Phishing (00:36:51)

20. Protecting Yourself Against Phishing (00:41:11)

21. Conclusion (00:43:10)

13 episódios

Todos os episódios

×
 
Loading …

Bem vindo ao Player FM!

O Player FM procura na web por podcasts de alta qualidade para você curtir agora mesmo. É o melhor app de podcast e funciona no Android, iPhone e web. Inscreva-se para sincronizar as assinaturas entre os dispositivos.

 

Guia rápido de referências