On episode 41, we learn that there are two types of companies – those that have been hacked and those about to be hacked. Joe “Captain Data” Welker, CISA, Rea & Associates’ IT Audit Manager, joins us once again to give us some valuable insight into current cyber hacking and internet threats and what we can do to keep ourselves, and our businesses, safe.
Lack of cybersecurity training has left companies nationwide vulnerable to the ever-growing and constantly changing threat of cybercrime. In particular, malware and ransomware are especially vicious threats. On this episode of unsuitable on Rea Radio, “The Hacked & Hacked Nots,” we learn why many companies are now incorporating third-party software to monitor and protect their firewalls to determine which sites are safe and which ones should be avoided and help quarantine black listed sites and ensure high-risk sites are always avoided.
Listeners will hear how professional hackers are now carefully researching individuals’ and companies’ digital pathways; and are paying attention to how frequently users visit particular sites and what they do while they are there. Then, the cybercriminal will fabricate imposter emails that are designed to entice the user to open an email or click on a link – compromising their entire network. It only takes one click of the mouse to effectively give hackers full access to user data and, if connected to a company’s network, so much more.
This is one episode you don’t want to miss.
Joe provides critical, real-world advice to help companies train and change the mindset and behavior of their employees in an effort to keep their data secure. Awareness, he argues, is the first critical step to curbing cyberattacks among your employees.
Additionally, on this episode of unsuitable, you will learn more about:
- What some tech companies are doing to protect users against cyberattacks.
- Why some countries – particularly those in Eastern Europe – are not in a hurry to crack down on cybercrime.
- And what you can do to promote a behavioral change within your organization.
Click here to download the free whitepaper, Cybercrime: The Invisible Threat That Haunts Your Business.
If you liked this episode of unsuitable on rea radio, check out episode 12: the great data saver.
articles & insight
Could Your Entity Survive A Ransomware Attack? – I’ve worked with clients whose businesses were leveled by tornadoes, demolished by explosions, and whose server hardware failure literally sparked catastrophe. You can’t become complacent. Keep reading to find out how you can protect yourself.
Who Is That Email Really From? – We hear it a lot and often – be careful when clicking on the links in your email (especially if you do not know the sender.) But what if the email is from someone you know, like your boss? And what if the email appears to come from their work account? Keep reading to learn what to do.
Can A Cybercriminal Crack Your Company’s Network? – Small and midsize businesses are not immune to becoming the target of a crippling cyberattack and without the proper procedures in place business owners risk the very real threat of a large-scale assault on their company’s data. Would you be able to recover if your organization was attacked? Find out, read more.
Passwords Are Like Underwear … – How many sites do you log in to with a username and password each day? How about apps on your smartphone or tablet? If you were to count how many accounts you have online – between personal and business logins for email, online banking, loyalty programs and social media sites – is it 10? 50? 100? Read on to learn more.
8 Tips For Crafting A Strong Password – Cyberattacks have been in the news almost daily, and unfortunately they seem to be increasing in number. While companies are busy trying to stave off any attacks, there are ways you can protect yourself. Keep reading for tips to help you craft strong passwords.
Read the full transcript of episode 41: “the hacked & the hacked nots.”