
Sign up to save your podcasts
Or


Send us a text
Discover how these cyber criminals impersonate bosses and coworkers, manipulating emotions to trick victims into transferring money or revealing sensitive information. Learn how to spot the red flags: from urgent requests that cloud judgment, to lookalike email domains designed to deceive. We'll guide you through practical steps to safeguard your organization, emphasizing the importance of communication and verifying requests through trusted channels.
Join me, Cameron Ivey, as I break down these sophisticated scams and explore why adherence to company protocols is crucial in defending against them.
Support the show
By Cameron Ivey4.7
2929 ratings
Send us a text
Discover how these cyber criminals impersonate bosses and coworkers, manipulating emotions to trick victims into transferring money or revealing sensitive information. Learn how to spot the red flags: from urgent requests that cloud judgment, to lookalike email domains designed to deceive. We'll guide you through practical steps to safeguard your organization, emphasizing the importance of communication and verifying requests through trusted channels.
Join me, Cameron Ivey, as I break down these sophisticated scams and explore why adherence to company protocols is crucial in defending against them.
Support the show

32,008 Listeners

3,855 Listeners

4,649 Listeners

4,343 Listeners

2,010 Listeners

1,022 Listeners

68 Listeners

87,290 Listeners

6,433 Listeners

23 Listeners

139 Listeners

13 Listeners

6 Listeners

239 Listeners

5 Listeners