Latest Shows

Listen and Read

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

The Latest!

The Latest on Business Email Compromise – A Quick Way Hosers Destroy Your Business – and Live High on the Hog

The Latest on Business Email Compromise – A Quick Way Hosers Destroy Your Business – and Live High on the Hog

🌴🔓 "Scamming in flip-flops!😎  A US hoser, grooving in Brazil, just pleaded guilty to a $3 Million #BEC scheme! 😱 Playing the doppelgänger game, he had businesses wire payments to his 'Viva Las Vegas' account 💰💃 and even hoodwinked an oil company for a cool $651K sent to Portugal. 🇵🇹 Caught & extradited, he's in for a ‘Brazilian Wax’ of justice – up to 20 years in the slammer plus fines. 🚔 Nothing says 'No beach fun in the sun' like a sentence!! 👀#ScamFiestaFiasco #DontBeTheNextCatch #GPT4SecurityGags" What does that have to do with you? It’s called “Business Email Compromise” (BEC). 📧💥 BEC is a sneaky scam that mainly targets companies that frequently work with foreign suppliers or make money wire transfers. These scammers are real pros when it comes to faking emails and manipulating unsuspecting victims into doing their bidding. One of the most common tactics used by these cyber hooligans involves spear phishing. They'll send out seemingly innocent emails crafted to look like...

How I Keep My Social Media Accounts Locked Down: My Insider Tips for Online Safety

How I Keep My Social Media Accounts Locked Down: My Insider Tips for Online Safety

Safety Strategy # 1: Only friend people you have met in real life. Think about it this way: If you haven't met someone face-to-face, can you call them your friend? It's an important question to consider when it comes to online connections.  Safety Strategy # 2:Do you feel comfortable with Facebook knowing more about you than your mother? Probably not, right? It’s time to take control and tweak your privacy settings. Set your Profile to FRIENDS ONLY. Let’s ensure this social media giant can’t track your every move in 2023. Safety Strategy #3: Don't Check-In to Locations (prevents stalking). In comparison, checking in at your favorite bar or coffee shop on Facebook, Instagram, or Yelp might be a great idea. Unfortunately, these activities can incorporate precise GPS coordinates, which creates many reasons why it's a bad idea to do this. Or at least why significant risks come with such social media activity and why careful management of them is critical. Safety Strategy # 4: Don't post...

Have Any Assets? You’re a Whale! 🐳 Stay One Step Ahead with These Tips!

Have Any Assets? You’re a Whale! 🐳 Stay One Step Ahead with These Tips!

Hey there, folks! Today, I want to talk about an important topic called whaling. Don't worry—we're not talking about hurting any whales here. Whaling is actually a type of phishing attack that specifically targets people with savings and high-level or senior executives within companies. 🐳 So, how does it work? Well, the bad guys behind whaling are trying to gain access to these valuable credentials and bank information. They craft sneaky emails that can look like legal subpoenas, customer complaints, or other executive-related matters. Imagine you're a CEO getting an email stating that you need to appear in court for a legal matter—it's definitely going to grab your attention! These criminals know how busy you folks are, so they use these tactics to trick you into clicking on malicious links or sharing sensitive information. But why do they do this? Once they've tricked their way into an executive's inbox or gained sensitive info through deceptive means (like fake login pages), it...

Craig Peterson – Insider Show Prep – September 4 to September 10, 2023

Craig Peterson – Insider Show Prep – September 4 to September 10, 2023

Craig Peterson Insider Show Prep September 4 to September 10, 2023 Craig’s Featured… Don't Become a Victim! Shielding Your Smartphone from Stealthy Cyber Attacks https://craigpeterson.com/mobile/dont-become-a-vi…hy-cyber-attacks/38996/ Prepare to bid farewell to your cyber innocence! 🤯 Craig Peterson shared a mind-blowing list of scary sneaky monsters, aka mobile malware, waiting to pounce on your smartphone. Remember the boogeyman hiding under your bed as a kid? Well, this is WAY scarier! We're talking spyware, drive-by downloads, viruses, Trojans, and so much more. 📵💻👾 Keep this survival guide handy: install updates promptly (set reminders if you're the forgetful type), download apps only from trusted sources (yeah, you might want to rethink that Fish Feeding Simulator 2029 download 🐠🎮), implement multi-factor authentication and use a mobile security app. Heads up! Your prized smartphone might seem pocket-sized, but can give you supersized problems. Always remember, the door to...

Beware the Hidden Dangers: How Hosers Use Phishing Emails to Deliver More Than Just Dodgy Requests

Beware the Hidden Dangers: How Hosers Use Phishing Emails to Deliver More Than Just Dodgy Requests

Today we will talk about a sneaky trick that those pesky hackers use: phishing emails that deliver other threats. You may have heard of phishing before—it's when scammers send out emails pretending to be someone or something they're not to steal your personal information, like passwords and credit card details. But did you know these same phishing emails can also deliver other dangerous stuff? Yep, it's true. Cybercrime just got an upgrade! SapphireStealer, the open-source 💎#infostealer, is continuously evolving, thanks to cybercriminal teamwork 😱. As more hackers join the party 🎉, they improve this "gift that keeps on giving" 🎁. With each update, stealing credentials and who-knows-what-else becomes increasingly easy, even for non-techies 🤓. Don't overlook SapphireStealer–it's like an appetizer for ransomware-espionage entrées 🍽️🕵️. Keep an eye on this gem, folks! One of the most common threats delivered via phishing emails is ransomware. 🦹‍♀️ What happens is this: you unsuspectingly...

Don’t Become a Victim! Shielding Your Smartphone from Stealthy Cyber Attacks

Don’t Become a Victim! Shielding Your Smartphone from Stealthy Cyber Attacks

What is Mobile Malware? Mobile malware is a real and growing threat that you need to be aware of. 🚨📲💻 Especially if you're running a business or allowing employees to use their own devices. Why are hackers setting their sights on mobiles? With the rise of smartphones and tablets, more and more people are relying on these devices for work and personal use. And where there's valuable data, you can bet that the hoser brigade will try to exploit it! Now, while the volume of threats targeting mobiles may currently be smaller than those faced by desktops, we all know that it's just a matter of time before those crafty cyber criminals start getting even sneakier. They want access to your high-value data, whether it's customer information or sensitive company secrets. That's why it's crucial for businesses to take proactive steps to protect against mobile malware. And one simple solution is investing in mobile security software. With multiple types of malicious software out there constantly...

Hosers “Payment Delivery” Hijinks: This Week’s Scam!

Hosers “Payment Delivery” Hijinks: This Week’s Scam!

Hey there, folks! Today, I want to talk to you about a sneaky little scam that's been making the rounds lately. It's called a Payment Delivery Scam and can catch even the most vigilant of us off guard. Here's how it goes down: You get an email or phone call from someone who claims to be a vendor or supplier you've done business with. They say they need your credit card or personal information updated so that they can deliver some goods you supposedly ordered. 📦 Now, at first glance, this might not seem too fishy. After all, you may have purchased items from this company before, right? But here's the kicker – you haven't actually bought anything recently! 🤔 So why on earth would they need your payment details now? Here's what's happening: The scammers are trying to trick you into handing over sensitive information, like credit card details or personal identification, for their own malicious purposes. Once they get their hands on your info, they can use it for identity theft or charge...

The Simplified Steps to Secure Your Data and Keep Your Business Safe

The Simplified Steps to Secure Your Data and Keep Your Business Safe

Protect Your Small Business from Cyber Threats Small businesses face increasing cyber threats in today's digital age, and whether they are doing enough to combat these threats is complex. I’ve found small businesses are often at a higher risk for cyberattacks than big companies because of a lack of resources. While some small businesses may have robust security measures, others may not have the resources or expertise to protect themselves effectively.  The threat level varies depending on the specific industry and type of business. It is important to recognize that there is no one-size-fits-all solution for protecting small businesses from cyber attacks and that each business must assess its own unique risks and vulnerabilities to develop an effective defense strategy. Despite these challenges, small businesses can protect their sensitive information and implement basic security measures, such as: Conduct a security audit to identify potential network and data storage systems...

Safeguard Your Small Business Today: The Ultimate Guide to Cloud Protection for Data Loss Liability

Safeguard Your Small Business Today: The Ultimate Guide to Cloud Protection for Data Loss Liability

Listen up, folks! As a small business owner, it's crucial to understand your liability if your cloud provider loses your data. But don't worry, I've got some straightforward steps you can take to protect yourself: Know Your Data: You must deeply understand the types of data your business collects and stores. This knowledge allows you to take necessary measures to protect it effectively. First, sit down and make a comprehensive list of all the information your business handles regularly. Consider customer details like names, addresses, and contact information. Think about financial data such as credit card numbers or banking details. And don't forget employee records with social security numbers or performance evaluations. Now that you've got this list in front of you, it's time to figure out which pieces are particularly sensitive or legally protected. Are there any industry regulations or compliance standards specific to your work? You need to ensure that your management systems...