Compliance Perspectives

Jenny Radcliffe on People Hacking [Podcast]


Listen Later

Post By: Adam Turteltaub

Liverpool-based Jenny Radcliffe, who leads Human Factor Security, is not your typical hacker, clad in a black hoodie and working out of basement. Rather than spending her time hunched over a keyboard, she seeks to hack people.

What does that mean? As she explains in this podcast, she uses persuasion, psychology and influence methods to make her way into systems, and even into physical premises. She is often hired to break alarms and see if she can talk her way into a building.

She does it by capitalizing on the all-too-human aspects of our personalities, and from her experiences she has learned how phishing emails and other techniques also capitalize on human weaknesses to enable hackers to breach computer systems.

What’s both terrifying and fascinating, is how hackers take advantage of our weaknesses, tailoring their attacks, knowing that different scams work for different people and cultures. In fact, she explains that the organization culture you have, is the hack you invite. In a hierarchical organization the hacker will likely use authority principles. In a younger, less rules-driven culture attackers may use registration for a social activity as a way to steal passwords and IDs.

Hackers also take advantage of human emotions and stress. As she memorably says, “Emotion kicks logic off the cliff.” That’s why techniques such as promising a prize or threatening the release of embarrassing information can be so successful in getting people to click where they shouldn’t.

She advises companies create “cognitive firewalls” within their organization, helping employees to watch for red flags such as:

* Any approach via email, call or social media that makes the recipient emotional
* The mentioning of money
* The request to act, especially if asked to act quickly

How else can you protect your organization? By making it safe for people to come forward when they make a digital mistake. The more comfortable they are coming forward, the faster they will and the sooner the breach is remediated.

And how do you find the internal bad actor? That, she says, falls on the shoulders of line managers, who need to be on the lookout for changes of behavior that may indicate stress.

Listen in to learn more, including the risks that can come as employees return to the workplace.
...more
View all episodesView all episodes
Download on the App Store

Compliance PerspectivesBy SCCE

  • 4.8
  • 4.8
  • 4.8
  • 4.8
  • 4.8

4.8

34 ratings


More shows like Compliance Perspectives

View all
The Joe Rogan Experience by Joe Rogan

The Joe Rogan Experience

229,674 Listeners

Hidden Brain by Hidden Brain, Shankar Vedantam

Hidden Brain

43,687 Listeners

Wait Wait... Don't Tell Me! by NPR

Wait Wait... Don't Tell Me!

38,950 Listeners

Making Sense with Sam Harris by Sam Harris

Making Sense with Sam Harris

26,380 Listeners

Pivot by New York Magazine

Pivot

9,724 Listeners

FCPA Compliance Report by Thomas Fox

FCPA Compliance Report

20 Listeners

Up First from NPR by NPR

Up First from NPR

56,944 Listeners

Stay Tuned with Preet by Preet Bharara

Stay Tuned with Preet

32,354 Listeners

Corruption Crime & Compliance by Michael Volkov

Corruption Crime & Compliance

43 Listeners

GZERO World with Ian Bremmer by GZERO Media

GZERO World with Ian Bremmer

837 Listeners

Compliance into the Weeds by Tom Fox

Compliance into the Weeds

12 Listeners

Daily Compliance News by Tom Fox

Daily Compliance News

7 Listeners

The Ezra Klein Show by New York Times Opinion

The Ezra Klein Show

16,525 Listeners

On with Kara Swisher by Vox Media

On with Kara Swisher

3,538 Listeners

The Mel Robbins Podcast by Mel Robbins

The Mel Robbins Podcast

20,222 Listeners