Artwork

Contenido proporcionado por NCBI. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente NCBI o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.
Player FM : aplicación de podcast
¡Desconecta con la aplicación Player FM !

From Phishing to AI: Unmasking Modern Cyber Threats

40:19
 
Compartir
 

Manage episode 453606903 series 3609881
Contenido proporcionado por NCBI. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente NCBI o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.

Welcome to Struggles: Navigating Challenges, Together, the podcast where we delve into the compelling stories behind the common challenges that entrepreneurs face across all industries. Whether you're just starting out or looking to scale your existing business, our show is packed with real-world stories, expert insights, and practical solutions to help you overcome obstacles and thrive.

In this episode of Struggles we are sharing our discussion at our cybersecurities event hosted by Richard Henry and Kent Iler, who discussed the multifaceted landscape of cybersecurity, underscored by evolving threats and the urgent need for comprehensive protective measures. They explore real-world incidents, including a company's hefty $25 million ransomware payment and the rampant recurrence of such attacks, emphasizing the importance of recognizing and addressing phishing and social engineering tactics. They discuss AI's role in cybercrime through deepfake schemes, the vulnerabilities inherent in widespread cloud reliance, and the perils of credential theft.
The episode highlights the growing risks associated with lax security in supply chains and third-party vendors, stressing the importance of thorough compliance and proactive security practices. They further detail the essentials of robust data protection strategies, the pitfalls of inadequate password practices, and the critical need for continuous employee training. Through insights into advanced security infrastructures and emerging models like Zero Trust, Richard and Kent make a compelling case for adopting a multi-layered cybersecurity approach essential for safeguarding businesses today.

Keywords: Entrepreneurship, Business Struggles, Leadership Tips, Scaling Challenges, Financial Management, Real-World Stories, Expert Insights, Practical Solutions.

Episode Highlights: Cyber Security Event Podcast

In this episode, we address the pressing and often daunting topic of cybersecurity for businesses. Our seasoned hosts dive deep into the real-world implications of cyber threats and provide actionable strategies to safeguard your enterprise. Below, find time stamps for key topics discussed in this episode to help you easily navigate to the sections that interest you most:

  • Introduction to the Cybersecurity Landscape [0:00]
    • Overview of the evolving landscape heavily influenced by AI
    • Cybersecurity costs and their predicted rise
  • Ransomware and Repeat Attacks [3:15]
    • Real-world examples of companies that paid ransoms
    • The statistic showing 80% experience repeat attacks
  • Phishing and Social Engineering [7:30]
    • How attackers use personal info for network compromise
    • The critical role of employees in recognizing cyber threats
  • AI in Cybercrime [12:45]
    • Deepfake audio and video used for fraudulent activities
    • Importance of verifying identities for large transactions
  • Cloud Vulnerabilities [17:20]
    • Risks including misconfigurations and insecure APIs
    • Statistics showing the lack of adequate cloud security measures
  • Supply Chain and Third-Party Risks [22:55]
    • Assessing and understanding third-party security measures
    • The overlooked importance of reading terms and conditions
  • Credential Theft [27:45]
    • The prevalence of compromised credentials in data breaches
    • Risks associated with reusing passwords across different sites
  • Employee Vulnerabilities [33:10]
    • Increased risks due to unsecured public Wi

Let us know what you are struggling with as a business owner

Support the show

  continue reading

17 episodios

Artwork
iconCompartir
 
Manage episode 453606903 series 3609881
Contenido proporcionado por NCBI. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente NCBI o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.

Welcome to Struggles: Navigating Challenges, Together, the podcast where we delve into the compelling stories behind the common challenges that entrepreneurs face across all industries. Whether you're just starting out or looking to scale your existing business, our show is packed with real-world stories, expert insights, and practical solutions to help you overcome obstacles and thrive.

In this episode of Struggles we are sharing our discussion at our cybersecurities event hosted by Richard Henry and Kent Iler, who discussed the multifaceted landscape of cybersecurity, underscored by evolving threats and the urgent need for comprehensive protective measures. They explore real-world incidents, including a company's hefty $25 million ransomware payment and the rampant recurrence of such attacks, emphasizing the importance of recognizing and addressing phishing and social engineering tactics. They discuss AI's role in cybercrime through deepfake schemes, the vulnerabilities inherent in widespread cloud reliance, and the perils of credential theft.
The episode highlights the growing risks associated with lax security in supply chains and third-party vendors, stressing the importance of thorough compliance and proactive security practices. They further detail the essentials of robust data protection strategies, the pitfalls of inadequate password practices, and the critical need for continuous employee training. Through insights into advanced security infrastructures and emerging models like Zero Trust, Richard and Kent make a compelling case for adopting a multi-layered cybersecurity approach essential for safeguarding businesses today.

Keywords: Entrepreneurship, Business Struggles, Leadership Tips, Scaling Challenges, Financial Management, Real-World Stories, Expert Insights, Practical Solutions.

Episode Highlights: Cyber Security Event Podcast

In this episode, we address the pressing and often daunting topic of cybersecurity for businesses. Our seasoned hosts dive deep into the real-world implications of cyber threats and provide actionable strategies to safeguard your enterprise. Below, find time stamps for key topics discussed in this episode to help you easily navigate to the sections that interest you most:

  • Introduction to the Cybersecurity Landscape [0:00]
    • Overview of the evolving landscape heavily influenced by AI
    • Cybersecurity costs and their predicted rise
  • Ransomware and Repeat Attacks [3:15]
    • Real-world examples of companies that paid ransoms
    • The statistic showing 80% experience repeat attacks
  • Phishing and Social Engineering [7:30]
    • How attackers use personal info for network compromise
    • The critical role of employees in recognizing cyber threats
  • AI in Cybercrime [12:45]
    • Deepfake audio and video used for fraudulent activities
    • Importance of verifying identities for large transactions
  • Cloud Vulnerabilities [17:20]
    • Risks including misconfigurations and insecure APIs
    • Statistics showing the lack of adequate cloud security measures
  • Supply Chain and Third-Party Risks [22:55]
    • Assessing and understanding third-party security measures
    • The overlooked importance of reading terms and conditions
  • Credential Theft [27:45]
    • The prevalence of compromised credentials in data breaches
    • Risks associated with reusing passwords across different sites
  • Employee Vulnerabilities [33:10]
    • Increased risks due to unsecured public Wi

Let us know what you are struggling with as a business owner

Support the show

  continue reading

17 episodios

Todos los episodios

×
 
Loading …

Bienvenido a Player FM!

Player FM está escaneando la web en busca de podcasts de alta calidad para que los disfrutes en este momento. Es la mejor aplicación de podcast y funciona en Android, iPhone y la web. Regístrate para sincronizar suscripciones a través de dispositivos.

 

Guia de referencia rapida

Escucha este programa mientras exploras
Reproducir