
Sign up to save your podcasts
Or
Skimming is one of the largest hidden cyber threats to businesses and individuals. It can lurk in the background of any digital transaction, stealing money and personal information in the process. According to a recent threat landscape report, credit card skimming accounts for 30% of all data breaches that target retailers. With the COVID-19 pandemic, threat actors have been eager to take advantage of the rise in digital purchases. In March 2020 alone, online credit card skimming jumped by 26%. But what exactly does skimming look like and how does it work? We’re joined by Matt Watchinski, VP at Cisco Talos and a recurring guest on C Suite, and Detective Nathan Rettig to learn more about skimming and how individuals and businesses can protect themselves.
5
88 ratings
Skimming is one of the largest hidden cyber threats to businesses and individuals. It can lurk in the background of any digital transaction, stealing money and personal information in the process. According to a recent threat landscape report, credit card skimming accounts for 30% of all data breaches that target retailers. With the COVID-19 pandemic, threat actors have been eager to take advantage of the rise in digital purchases. In March 2020 alone, online credit card skimming jumped by 26%. But what exactly does skimming look like and how does it work? We’re joined by Matt Watchinski, VP at Cisco Talos and a recurring guest on C Suite, and Detective Nathan Rettig to learn more about skimming and how individuals and businesses can protect themselves.