
Sign up to save your podcasts
Or
Send us a text
Discover how these cyber criminals impersonate bosses and coworkers, manipulating emotions to trick victims into transferring money or revealing sensitive information. Learn how to spot the red flags: from urgent requests that cloud judgment, to lookalike email domains designed to deceive. We'll guide you through practical steps to safeguard your organization, emphasizing the importance of communication and verifying requests through trusted channels.
Join me, Cameron Ivey, as I break down these sophisticated scams and explore why adherence to company protocols is crucial in defending against them.
Support the show
4.6
2828 ratings
Send us a text
Discover how these cyber criminals impersonate bosses and coworkers, manipulating emotions to trick victims into transferring money or revealing sensitive information. Learn how to spot the red flags: from urgent requests that cloud judgment, to lookalike email domains designed to deceive. We'll guide you through practical steps to safeguard your organization, emphasizing the importance of communication and verifying requests through trusted channels.
Join me, Cameron Ivey, as I break down these sophisticated scams and explore why adherence to company protocols is crucial in defending against them.
Support the show
1,985 Listeners
360 Listeners
1,017 Listeners
65 Listeners
110,870 Listeners
174 Listeners
316 Listeners
23 Listeners
128 Listeners
12 Listeners
6 Listeners
16 Listeners
169 Listeners
3 Listeners
313 Listeners