
Sign up to save your podcasts
Or
Send us a text
Discover how these cyber criminals impersonate bosses and coworkers, manipulating emotions to trick victims into transferring money or revealing sensitive information. Learn how to spot the red flags: from urgent requests that cloud judgment, to lookalike email domains designed to deceive. We'll guide you through practical steps to safeguard your organization, emphasizing the importance of communication and verifying requests through trusted channels.
Join me, Cameron Ivey, as I break down these sophisticated scams and explore why adherence to company protocols is crucial in defending against them.
Support the show
4.7
2929 ratings
Send us a text
Discover how these cyber criminals impersonate bosses and coworkers, manipulating emotions to trick victims into transferring money or revealing sensitive information. Learn how to spot the red flags: from urgent requests that cloud judgment, to lookalike email domains designed to deceive. We'll guide you through practical steps to safeguard your organization, emphasizing the importance of communication and verifying requests through trusted channels.
Join me, Cameron Ivey, as I break down these sophisticated scams and explore why adherence to company protocols is crucial in defending against them.
Support the show
370 Listeners
1,016 Listeners
65 Listeners
175 Listeners
188 Listeners
315 Listeners
73 Listeners
1,556 Listeners
22 Listeners
472 Listeners
471 Listeners
133 Listeners
12 Listeners
6 Listeners
43 Listeners