Discover this podcast and so much more

Podcasts are free to enjoy without a subscription. We also offer ebooks, audiobooks, and so much more for just $11.99/month.

#ExpertInsights 9: Business Email Compromise and Email Fraud Defense - Part 1

#ExpertInsights 9: Business Email Compromise and Email Fraud Defense - Part 1

FromProtecting People


#ExpertInsights 9: Business Email Compromise and Email Fraud Defense - Part 1

FromProtecting People

ratings:
Length:
31 minutes
Released:
Jul 12, 2021
Format:
Podcast episode

Description

Business Email Compromise, or BEC, is a type of scam that utilizes social engineering to trick companies into paying fraudulent invoices or giving up sensitive information that can be used for a future attack.


Malware, phishing, BEC, and thread hijacking. The “baddies,” as one of today’s guests charmingly anoints them, utilize these deep, complicated attacks because the rewards are so very great - in 2019, stats from the Internet Crime Complaint Center showed losses over $1.7 billion.


Join host Sherrod DeGrippo for part one of this in-depth discussion, as she talks through various current threats and how companies can defend against them with email fraud defense experts Robert Holmes, Sr. Director of Threat Research and Detection, and Sam Scholten, CISSP Staff Email Fraud Research, of Proofpoint.


Here's a sneak peek:
- Learn the signs of suspicious emails
- Threat actors are putting a high amount of energy into today’s scams
- BEC is a global problem
- Stricter financial controls can help your company along with EFD

To hear more episodes like this one, subscribe to Protecting People on Apple Podcasts, Spotify, or your preferred podcast platform.
Released:
Jul 12, 2021
Format:
Podcast episode

Titles in the series (100)

Today’s cyber attacks target people, not technology. Protecting People is a podcast focused on the human side of cybersecurity. Each episode, you’ll learn how today’s threats really work, who’s being targeted by them, and what you can do to safeguard your people, data and systems.Get real-world insight and learn about the latest trends in social engineering, malware, threat protection, cloud security and more. Protecting People is cybersecurity for the rest of us.