Artwork

NCBI에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 NCBI 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.
Player FM -팟 캐스트 앱
Player FM 앱으로 오프라인으로 전환하세요!

From Phishing to AI: Unmasking Modern Cyber Threats

40:19
 
공유
 

Manage episode 453606903 series 3609881
NCBI에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 NCBI 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

Welcome to Struggles: Navigating Challenges, Together, the podcast where we delve into the compelling stories behind the common challenges that entrepreneurs face across all industries. Whether you're just starting out or looking to scale your existing business, our show is packed with real-world stories, expert insights, and practical solutions to help you overcome obstacles and thrive.

In this episode of Struggles we are sharing our discussion at our cybersecurities event hosted by Richard Henry and Kent Iler, who discussed the multifaceted landscape of cybersecurity, underscored by evolving threats and the urgent need for comprehensive protective measures. They explore real-world incidents, including a company's hefty $25 million ransomware payment and the rampant recurrence of such attacks, emphasizing the importance of recognizing and addressing phishing and social engineering tactics. They discuss AI's role in cybercrime through deepfake schemes, the vulnerabilities inherent in widespread cloud reliance, and the perils of credential theft.
The episode highlights the growing risks associated with lax security in supply chains and third-party vendors, stressing the importance of thorough compliance and proactive security practices. They further detail the essentials of robust data protection strategies, the pitfalls of inadequate password practices, and the critical need for continuous employee training. Through insights into advanced security infrastructures and emerging models like Zero Trust, Richard and Kent make a compelling case for adopting a multi-layered cybersecurity approach essential for safeguarding businesses today.

Keywords: Entrepreneurship, Business Struggles, Leadership Tips, Scaling Challenges, Financial Management, Real-World Stories, Expert Insights, Practical Solutions.

Episode Highlights: Cyber Security Event Podcast

In this episode, we address the pressing and often daunting topic of cybersecurity for businesses. Our seasoned hosts dive deep into the real-world implications of cyber threats and provide actionable strategies to safeguard your enterprise. Below, find time stamps for key topics discussed in this episode to help you easily navigate to the sections that interest you most:

  • Introduction to the Cybersecurity Landscape [0:00]
    • Overview of the evolving landscape heavily influenced by AI
    • Cybersecurity costs and their predicted rise
  • Ransomware and Repeat Attacks [3:15]
    • Real-world examples of companies that paid ransoms
    • The statistic showing 80% experience repeat attacks
  • Phishing and Social Engineering [7:30]
    • How attackers use personal info for network compromise
    • The critical role of employees in recognizing cyber threats
  • AI in Cybercrime [12:45]
    • Deepfake audio and video used for fraudulent activities
    • Importance of verifying identities for large transactions
  • Cloud Vulnerabilities [17:20]
    • Risks including misconfigurations and insecure APIs
    • Statistics showing the lack of adequate cloud security measures
  • Supply Chain and Third-Party Risks [22:55]
    • Assessing and understanding third-party security measures
    • The overlooked importance of reading terms and conditions
  • Credential Theft [27:45]
    • The prevalence of compromised credentials in data breaches
    • Risks associated with reusing passwords across different sites
  • Employee Vulnerabilities [33:10]
    • Increased risks due to unsecured public Wi

Let us know what you are struggling with as a business owner

Support the show

  continue reading

15 에피소드

Artwork
icon공유
 
Manage episode 453606903 series 3609881
NCBI에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 NCBI 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

Welcome to Struggles: Navigating Challenges, Together, the podcast where we delve into the compelling stories behind the common challenges that entrepreneurs face across all industries. Whether you're just starting out or looking to scale your existing business, our show is packed with real-world stories, expert insights, and practical solutions to help you overcome obstacles and thrive.

In this episode of Struggles we are sharing our discussion at our cybersecurities event hosted by Richard Henry and Kent Iler, who discussed the multifaceted landscape of cybersecurity, underscored by evolving threats and the urgent need for comprehensive protective measures. They explore real-world incidents, including a company's hefty $25 million ransomware payment and the rampant recurrence of such attacks, emphasizing the importance of recognizing and addressing phishing and social engineering tactics. They discuss AI's role in cybercrime through deepfake schemes, the vulnerabilities inherent in widespread cloud reliance, and the perils of credential theft.
The episode highlights the growing risks associated with lax security in supply chains and third-party vendors, stressing the importance of thorough compliance and proactive security practices. They further detail the essentials of robust data protection strategies, the pitfalls of inadequate password practices, and the critical need for continuous employee training. Through insights into advanced security infrastructures and emerging models like Zero Trust, Richard and Kent make a compelling case for adopting a multi-layered cybersecurity approach essential for safeguarding businesses today.

Keywords: Entrepreneurship, Business Struggles, Leadership Tips, Scaling Challenges, Financial Management, Real-World Stories, Expert Insights, Practical Solutions.

Episode Highlights: Cyber Security Event Podcast

In this episode, we address the pressing and often daunting topic of cybersecurity for businesses. Our seasoned hosts dive deep into the real-world implications of cyber threats and provide actionable strategies to safeguard your enterprise. Below, find time stamps for key topics discussed in this episode to help you easily navigate to the sections that interest you most:

  • Introduction to the Cybersecurity Landscape [0:00]
    • Overview of the evolving landscape heavily influenced by AI
    • Cybersecurity costs and their predicted rise
  • Ransomware and Repeat Attacks [3:15]
    • Real-world examples of companies that paid ransoms
    • The statistic showing 80% experience repeat attacks
  • Phishing and Social Engineering [7:30]
    • How attackers use personal info for network compromise
    • The critical role of employees in recognizing cyber threats
  • AI in Cybercrime [12:45]
    • Deepfake audio and video used for fraudulent activities
    • Importance of verifying identities for large transactions
  • Cloud Vulnerabilities [17:20]
    • Risks including misconfigurations and insecure APIs
    • Statistics showing the lack of adequate cloud security measures
  • Supply Chain and Third-Party Risks [22:55]
    • Assessing and understanding third-party security measures
    • The overlooked importance of reading terms and conditions
  • Credential Theft [27:45]
    • The prevalence of compromised credentials in data breaches
    • Risks associated with reusing passwords across different sites
  • Employee Vulnerabilities [33:10]
    • Increased risks due to unsecured public Wi

Let us know what you are struggling with as a business owner

Support the show

  continue reading

15 에피소드

Semua episode

×
 
Loading …

플레이어 FM에 오신것을 환영합니다!

플레이어 FM은 웹에서 고품질 팟캐스트를 검색하여 지금 바로 즐길 수 있도록 합니다. 최고의 팟캐스트 앱이며 Android, iPhone 및 웹에서도 작동합니다. 장치 간 구독 동기화를 위해 가입하세요.

 

빠른 참조 가이드

탐색하는 동안 이 프로그램을 들어보세요.
재생