
Sign up to save your podcasts
Or


Send us a text
Knowing what mitigations to have ahead of a cyberattack is one step in many as cybercriminals exploit vulnerabilities on mobile devices, computers and entire operations. Learn about the cyberattacks individuals and organizations face today from Kit Professionals' Hunter Geerts.
Listen for:
1:20 Attack methods
12:18 Ransomware and phishing, with a side of mitigation
25:27 VIP impersonation, payroll and vendor fraud, and credential phishing
33:22 Finale - Three quick questions
Connect with Hunter Geerts
LinkedIn | Website | Facebook | Instagram
Connect with Tim Conrad
LinkedIn | Website | Facebook | Instagram
By Butterfly Effect Communications, Stories and StrategiesSend us a text
Knowing what mitigations to have ahead of a cyberattack is one step in many as cybercriminals exploit vulnerabilities on mobile devices, computers and entire operations. Learn about the cyberattacks individuals and organizations face today from Kit Professionals' Hunter Geerts.
Listen for:
1:20 Attack methods
12:18 Ransomware and phishing, with a side of mitigation
25:27 VIP impersonation, payroll and vendor fraud, and credential phishing
33:22 Finale - Three quick questions
Connect with Hunter Geerts
LinkedIn | Website | Facebook | Instagram
Connect with Tim Conrad
LinkedIn | Website | Facebook | Instagram