Artwork

Content provided by Wendy Battles/James Tucciarone. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Wendy Battles/James Tucciarone or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.
Player FM - Aplicație Podcast
Treceți offline cu aplicația Player FM !

Cybersecurity Awareness: Leadership Impersonation & Business Email Compromise - How It Works and How You Can Avoid Getting Scammed

21:57
 
Distribuie
 

Manage episode 358591545 series 3395476
Content provided by Wendy Battles/James Tucciarone. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Wendy Battles/James Tucciarone or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.

Are you familiar with Business Email Compromise (BEC) and the threat that it poses to the Yale community?
BEC is a form of social engineering designed to trick victims into thinking they have received a legitimate email from an organization or institution.
A simple example is receiving an email that looks like it's coming from your boss, asking you to purchase gift cards. (You should be suspect if that's not part of your typical job responsibilities.)
But with BEC, it's not coming from your boss, it's actually coming from a cybercriminal.
Sometimes thieves are so convincing that they can motivate us to take action - clicking on a link, revealing personal information or even going to Walmart to buy gift cards.
We want to help the Yale community steer clear of these cyber traps.
Listen to this episode and you'll learn:

▶️ Why universities like Yale are vulnerable to Business Email Compromise
▶️ Why it's so important to be good stewards of Yale data
▶️ How BEC works and how you can steer clear of it
▶️ Our Information Security intern's story of impersonation
▶️ How to respond to a suspicious email with the appropriate behavior

*********
Calls to Action:
Ready to build your cyber muscles?
Here are simple things you can do:

Send us a text

Learn more about Yale Cybersecurity Awareness at cybersecurity.yale.edu/awareness
Never miss an episode! Sign up to receive Bee Cyber Fit podcast alerts.

  continue reading

28 episoade

Artwork
iconDistribuie
 
Manage episode 358591545 series 3395476
Content provided by Wendy Battles/James Tucciarone. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Wendy Battles/James Tucciarone or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.

Are you familiar with Business Email Compromise (BEC) and the threat that it poses to the Yale community?
BEC is a form of social engineering designed to trick victims into thinking they have received a legitimate email from an organization or institution.
A simple example is receiving an email that looks like it's coming from your boss, asking you to purchase gift cards. (You should be suspect if that's not part of your typical job responsibilities.)
But with BEC, it's not coming from your boss, it's actually coming from a cybercriminal.
Sometimes thieves are so convincing that they can motivate us to take action - clicking on a link, revealing personal information or even going to Walmart to buy gift cards.
We want to help the Yale community steer clear of these cyber traps.
Listen to this episode and you'll learn:

▶️ Why universities like Yale are vulnerable to Business Email Compromise
▶️ Why it's so important to be good stewards of Yale data
▶️ How BEC works and how you can steer clear of it
▶️ Our Information Security intern's story of impersonation
▶️ How to respond to a suspicious email with the appropriate behavior

*********
Calls to Action:
Ready to build your cyber muscles?
Here are simple things you can do:

Send us a text

Learn more about Yale Cybersecurity Awareness at cybersecurity.yale.edu/awareness
Never miss an episode! Sign up to receive Bee Cyber Fit podcast alerts.

  continue reading

28 episoade

Toate episoadele

×
 
Loading …

Bun venit la Player FM!

Player FM scanează web-ul pentru podcast-uri de înaltă calitate pentru a vă putea bucura acum. Este cea mai bună aplicație pentru podcast și funcționează pe Android, iPhone și pe web. Înscrieți-vă pentru a sincroniza abonamentele pe toate dispozitivele.

 

Ghid rapid de referință