
Sign up to save your podcasts
Or


In Episode two l discuss a Social Engineering attack called Vishing and four (4) internal controls that can be used to protect the Vendor Master File from this type of scam.
Links mentioned in the podcast:
Music Credit: www.purple-planet.com
By Debra R Richardson5
66 ratings
In Episode two l discuss a Social Engineering attack called Vishing and four (4) internal controls that can be used to protect the Vendor Master File from this type of scam.
Links mentioned in the podcast:
Music Credit: www.purple-planet.com