Artwork

コンテンツは Wendy Battles/James Tucciarone によって提供されます。エピソード、グラフィック、ポッドキャストの説明を含むすべてのポッドキャスト コンテンツは、Wendy Battles/James Tucciarone またはそのポッドキャスト プラットフォーム パートナーによって直接アップロードされ、提供されます。誰かがあなたの著作物をあなたの許可なく使用していると思われる場合は、ここで概説されているプロセスに従うことができますhttps://ja.player.fm/legal
Player FM -ポッドキャストアプリ
Player FMアプリでオフラインにしPlayer FMう!

Cybersecurity Awareness: Leadership Impersonation & Business Email Compromise - How It Works and How You Can Avoid Getting Scammed

21:57
 
シェア
 

Manage episode 358591545 series 3395476
コンテンツは Wendy Battles/James Tucciarone によって提供されます。エピソード、グラフィック、ポッドキャストの説明を含むすべてのポッドキャスト コンテンツは、Wendy Battles/James Tucciarone またはそのポッドキャスト プラットフォーム パートナーによって直接アップロードされ、提供されます。誰かがあなたの著作物をあなたの許可なく使用していると思われる場合は、ここで概説されているプロセスに従うことができますhttps://ja.player.fm/legal

Are you familiar with Business Email Compromise (BEC) and the threat that it poses to the Yale community?
BEC is a form of social engineering designed to trick victims into thinking they have received a legitimate email from an organization or institution.
A simple example is receiving an email that looks like it's coming from your boss, asking you to purchase gift cards. (You should be suspect if that's not part of your typical job responsibilities.)
But with BEC, it's not coming from your boss, it's actually coming from a cybercriminal.
Sometimes thieves are so convincing that they can motivate us to take action - clicking on a link, revealing personal information or even going to Walmart to buy gift cards.
We want to help the Yale community steer clear of these cyber traps.
Listen to this episode and you'll learn:

▶️ Why universities like Yale are vulnerable to Business Email Compromise
▶️ Why it's so important to be good stewards of Yale data
▶️ How BEC works and how you can steer clear of it
▶️ Our Information Security intern's story of impersonation
▶️ How to respond to a suspicious email with the appropriate behavior

*********
Calls to Action:
Ready to build your cyber muscles?
Here are simple things you can do:

Send us a text

Learn more about Yale Cybersecurity Awareness at cybersecurity.yale.edu/awareness
Never miss an episode! Sign up to receive Bee Cyber Fit podcast alerts.

  continue reading

28 つのエピソード

Artwork
iconシェア
 
Manage episode 358591545 series 3395476
コンテンツは Wendy Battles/James Tucciarone によって提供されます。エピソード、グラフィック、ポッドキャストの説明を含むすべてのポッドキャスト コンテンツは、Wendy Battles/James Tucciarone またはそのポッドキャスト プラットフォーム パートナーによって直接アップロードされ、提供されます。誰かがあなたの著作物をあなたの許可なく使用していると思われる場合は、ここで概説されているプロセスに従うことができますhttps://ja.player.fm/legal

Are you familiar with Business Email Compromise (BEC) and the threat that it poses to the Yale community?
BEC is a form of social engineering designed to trick victims into thinking they have received a legitimate email from an organization or institution.
A simple example is receiving an email that looks like it's coming from your boss, asking you to purchase gift cards. (You should be suspect if that's not part of your typical job responsibilities.)
But with BEC, it's not coming from your boss, it's actually coming from a cybercriminal.
Sometimes thieves are so convincing that they can motivate us to take action - clicking on a link, revealing personal information or even going to Walmart to buy gift cards.
We want to help the Yale community steer clear of these cyber traps.
Listen to this episode and you'll learn:

▶️ Why universities like Yale are vulnerable to Business Email Compromise
▶️ Why it's so important to be good stewards of Yale data
▶️ How BEC works and how you can steer clear of it
▶️ Our Information Security intern's story of impersonation
▶️ How to respond to a suspicious email with the appropriate behavior

*********
Calls to Action:
Ready to build your cyber muscles?
Here are simple things you can do:

Send us a text

Learn more about Yale Cybersecurity Awareness at cybersecurity.yale.edu/awareness
Never miss an episode! Sign up to receive Bee Cyber Fit podcast alerts.

  continue reading

28 つのエピソード

Minden epizód

×
 
Loading …

プレーヤーFMへようこそ!

Player FMは今からすぐに楽しめるために高品質のポッドキャストをウェブでスキャンしています。 これは最高のポッドキャストアプリで、Android、iPhone、そしてWebで動作します。 全ての端末で購読を同期するためにサインアップしてください。

 

クイックリファレンスガイド