Podchaser Logo
Home
How to Identify a Phish and How to Protect Against Phishing

How to Identify a Phish and How to Protect Against Phishing

Released Monday, 3rd December 2018
Good episode? Give it some love!
How to Identify a Phish and How to Protect Against Phishing

How to Identify a Phish and How to Protect Against Phishing

How to Identify a Phish and How to Protect Against Phishing

How to Identify a Phish and How to Protect Against Phishing

Monday, 3rd December 2018
Good episode? Give it some love!
Rate Episode

Phishing is one of the most common cybersecurity attacks and in this episode of Converge TechTalk, Mison Riggins, tech security expert from Inspired eLearning downloads everything we need to know about phishing, and how to keep your employees, and your company, safe from phishing attacks.

 

Phishing attacks are designed to trick people into giving up private information and/or to trick people into clicking on a malware or ransomware link that can spell big trouble for companies and their data. This kind of cyberattack is one of the most common tactics cyber criminals use and can happen in a number of different ways: Phishing, SMiShing, and Vishing.

 

These names relate to the different channels that cyber criminals use to reach prospective targets. Phishing relies on email as a channel, Smishing relies on SMS messaging, and Vishing relies on voice as a channel to reach victims.

 

Mison and I cover a myriad of details related to phishing, and how companies can help employees learn what they need to know about phishing, wise up to attackers’ ploys aimed at getting private information and/or breaching corporate security systems, and protect both themselves and their companies from this type of security breach. We also cover what to do if you suspect or discover you’re been the victim of phishing attack and the immediate steps you should take.

 

Mison is speaking at the Data Connectors’ Cybersecurity Strategies Conference in Dallas on Wednesday, December 5th.  As part of her presentation, Mison will demonstrate to the audience how to create a phish, which is designed as a training exercise. She’s pretty confident that once you know how to create a phish, chances are good that you’ll be able to quickly identify phishing attacks in the future, and know how to more effectively protect against them.

Show More

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features