Artwork

Innehåll tillhandahållet av NCBI. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av NCBI eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.
Player FM - Podcast-app
Gå offline med appen Player FM !

From Phishing to AI: Unmasking Modern Cyber Threats

40:19
 
Dela
 

Manage episode 453606903 series 3609881
Innehåll tillhandahållet av NCBI. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av NCBI eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.

Welcome to Struggles: Navigating Challenges, Together, the podcast where we delve into the compelling stories behind the common challenges that entrepreneurs face across all industries. Whether you're just starting out or looking to scale your existing business, our show is packed with real-world stories, expert insights, and practical solutions to help you overcome obstacles and thrive.

In this episode of Struggles we are sharing our discussion at our cybersecurities event hosted by Richard Henry and Kent Iler, who discussed the multifaceted landscape of cybersecurity, underscored by evolving threats and the urgent need for comprehensive protective measures. They explore real-world incidents, including a company's hefty $25 million ransomware payment and the rampant recurrence of such attacks, emphasizing the importance of recognizing and addressing phishing and social engineering tactics. They discuss AI's role in cybercrime through deepfake schemes, the vulnerabilities inherent in widespread cloud reliance, and the perils of credential theft.
The episode highlights the growing risks associated with lax security in supply chains and third-party vendors, stressing the importance of thorough compliance and proactive security practices. They further detail the essentials of robust data protection strategies, the pitfalls of inadequate password practices, and the critical need for continuous employee training. Through insights into advanced security infrastructures and emerging models like Zero Trust, Richard and Kent make a compelling case for adopting a multi-layered cybersecurity approach essential for safeguarding businesses today.

Keywords: Entrepreneurship, Business Struggles, Leadership Tips, Scaling Challenges, Financial Management, Real-World Stories, Expert Insights, Practical Solutions.

Episode Highlights: Cyber Security Event Podcast

In this episode, we address the pressing and often daunting topic of cybersecurity for businesses. Our seasoned hosts dive deep into the real-world implications of cyber threats and provide actionable strategies to safeguard your enterprise. Below, find time stamps for key topics discussed in this episode to help you easily navigate to the sections that interest you most:

  • Introduction to the Cybersecurity Landscape [0:00]
    • Overview of the evolving landscape heavily influenced by AI
    • Cybersecurity costs and their predicted rise
  • Ransomware and Repeat Attacks [3:15]
    • Real-world examples of companies that paid ransoms
    • The statistic showing 80% experience repeat attacks
  • Phishing and Social Engineering [7:30]
    • How attackers use personal info for network compromise
    • The critical role of employees in recognizing cyber threats
  • AI in Cybercrime [12:45]
    • Deepfake audio and video used for fraudulent activities
    • Importance of verifying identities for large transactions
  • Cloud Vulnerabilities [17:20]
    • Risks including misconfigurations and insecure APIs
    • Statistics showing the lack of adequate cloud security measures
  • Supply Chain and Third-Party Risks [22:55]
    • Assessing and understanding third-party security measures
    • The overlooked importance of reading terms and conditions
  • Credential Theft [27:45]
    • The prevalence of compromised credentials in data breaches
    • Risks associated with reusing passwords across different sites
  • Employee Vulnerabilities [33:10]
    • Increased risks due to unsecured public Wi

Let us know what you are struggling with as a business owner

Support the show

  continue reading

15 episoder

Artwork
iconDela
 
Manage episode 453606903 series 3609881
Innehåll tillhandahållet av NCBI. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av NCBI eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.

Welcome to Struggles: Navigating Challenges, Together, the podcast where we delve into the compelling stories behind the common challenges that entrepreneurs face across all industries. Whether you're just starting out or looking to scale your existing business, our show is packed with real-world stories, expert insights, and practical solutions to help you overcome obstacles and thrive.

In this episode of Struggles we are sharing our discussion at our cybersecurities event hosted by Richard Henry and Kent Iler, who discussed the multifaceted landscape of cybersecurity, underscored by evolving threats and the urgent need for comprehensive protective measures. They explore real-world incidents, including a company's hefty $25 million ransomware payment and the rampant recurrence of such attacks, emphasizing the importance of recognizing and addressing phishing and social engineering tactics. They discuss AI's role in cybercrime through deepfake schemes, the vulnerabilities inherent in widespread cloud reliance, and the perils of credential theft.
The episode highlights the growing risks associated with lax security in supply chains and third-party vendors, stressing the importance of thorough compliance and proactive security practices. They further detail the essentials of robust data protection strategies, the pitfalls of inadequate password practices, and the critical need for continuous employee training. Through insights into advanced security infrastructures and emerging models like Zero Trust, Richard and Kent make a compelling case for adopting a multi-layered cybersecurity approach essential for safeguarding businesses today.

Keywords: Entrepreneurship, Business Struggles, Leadership Tips, Scaling Challenges, Financial Management, Real-World Stories, Expert Insights, Practical Solutions.

Episode Highlights: Cyber Security Event Podcast

In this episode, we address the pressing and often daunting topic of cybersecurity for businesses. Our seasoned hosts dive deep into the real-world implications of cyber threats and provide actionable strategies to safeguard your enterprise. Below, find time stamps for key topics discussed in this episode to help you easily navigate to the sections that interest you most:

  • Introduction to the Cybersecurity Landscape [0:00]
    • Overview of the evolving landscape heavily influenced by AI
    • Cybersecurity costs and their predicted rise
  • Ransomware and Repeat Attacks [3:15]
    • Real-world examples of companies that paid ransoms
    • The statistic showing 80% experience repeat attacks
  • Phishing and Social Engineering [7:30]
    • How attackers use personal info for network compromise
    • The critical role of employees in recognizing cyber threats
  • AI in Cybercrime [12:45]
    • Deepfake audio and video used for fraudulent activities
    • Importance of verifying identities for large transactions
  • Cloud Vulnerabilities [17:20]
    • Risks including misconfigurations and insecure APIs
    • Statistics showing the lack of adequate cloud security measures
  • Supply Chain and Third-Party Risks [22:55]
    • Assessing and understanding third-party security measures
    • The overlooked importance of reading terms and conditions
  • Credential Theft [27:45]
    • The prevalence of compromised credentials in data breaches
    • Risks associated with reusing passwords across different sites
  • Employee Vulnerabilities [33:10]
    • Increased risks due to unsecured public Wi

Let us know what you are struggling with as a business owner

Support the show

  continue reading

15 episoder

Semua episode

×
 
Loading …

Välkommen till Player FM

Player FM scannar webben för högkvalitativa podcasts för dig att njuta av nu direkt. Den är den bästa podcast-appen och den fungerar med Android, Iphone och webben. Bli medlem för att synka prenumerationer mellan enheter.

 

Snabbguide

Lyssna på det här programmet medan du utforskar
Spela