Knowing what mitigations to have ahead of a cyberattack is one step in many as cybercriminals exploit vulnerabilities on mobile devices, computers and entire operations. Learn about the cyberattacks individuals and organizations face today from Kit Professionals' Hunter Geerts.
Listen for:
1:20 Attack methods
12:18 Ransomware and phishing, with a side of mitigation
25:27 VIP impersonation, payroll and vendor fraud, and credential phishing
33:22 Finale - Three quick questions
Connect with Hunter Geerts
LinkedIn | Website | Facebook | Instagram
Connect with Tim Conrad
LinkedIn | Website | Facebook | Instagram
Podchaser is the ultimate destination for podcast data, search, and discovery. Learn More