How to Be a Cyber Criminal: Business Email Compromise Scams

80% of what you need to be a cybercriminal is Internet access.   The other 20% is mostly social engineering. Effective cybercriminals understand how people think.   In this episode, we interview Robert Holmes, VP and General Manager, Email Fraud Defense at Proofpoint, about the easy process for business email compromise (BEC) attacks.   What we talked about:   - Smaller companies are more likely to be victimized than larger companies   - Cybercriminals pretend to be a trusted persona (like your CEO)   - Super easy but insidious tech tips that people fall for all the time   - Phishing, vishing & smishing: What are they?   Find additional content and subscribe to Protecting People on Apple Podcasts, Spotify, or our website.

Om Podcasten

Today’s cyber attacks target people, not technology. Protecting People is a podcast focused on the human side of cybersecurity. Each episode, you’ll learn how today’s threats really work, who’s being targeted by them, and what you can do to safeguard your people, data and systems.Get real-world insight and learn about the latest trends in social engineering, malware, threat protection, cloud security and more. Protecting People is cybersecurity for the rest of us.