Cyber Extortion
Manage episode 373756031 series 3480294
What do cybercriminals do with the information they may take after a successful phishing attempt? On this episode of Cyber Savvy Andrew and Mike will discuss Cyber Extortion. Victims of cyber extortion can range from individuals to small businesses, to huge corporate entities. Listen in as Mike details some of the dangers and costs that can be faced once cybercriminals have gotten their hands on sensitive information.
Andrew Rose began a cybersecurity awareness program in 2016 while at a major agricultural bank after recognizing that the ag sector wasn’t getting the attention it needed about the risks posed by cybercriminals and other adversaries. He helped coordinate several symposiums and events focusing on the topic. He is now an independent contractor and volunteers his time to bringing cybersecurity awareness, education, mitigation, and response to the ag and food supply chain (and other special projects). His focus is on mitigating emerging threats. In addition to his experience in cybersecurity, he has a deep understanding of banking/finance, risk management, and other professional service sectors related to food, agriculture, and climate.
Michael Urbanik is an Account Executive with R.K Tongue Co., Inc. and is licensed in both Life & Health and Property & Casualty Insurance. He has experience working with both large and middle market commercial clients. He enjoys helping his clients understand the risks they face and develop cost effective plans to successfully mitigate and transfer these risks.
Did you enjoy today’s episode? Personal experience to share? We here at DTC, Inc. would love to hear from you! Please email us your comments and questions at AskUs@DTCtoday.com.
Some cyber crimes are more relatable than others. Join us next time as we discuss Identity Theft and speak to a member of the DTC team that was recently personally affected, and hear the steps they took to protect their personal data from this and future attacks.
Looking for more cybersecurity related content? Check out DTC’s blogspace to read more!
Want to hear more? Past episodes are all posted, including on YouTube! Follow and subscribe on your favorite podcast app to ensure you don’t miss out on the conversation!
Kapitel
1. Cyber Extortion (00:00:00)
2. Welcome to Cyber Savvy (00:00:06)
3. Cyber Extortion (00:01:42)
4. Let's Break It Down (00:03:10)
5. Ransomware (00:05:34)
6. Cyber Liability Insurance (00:08:42)
7. Infected From Home Computers (00:11:51)
8. Victims of Ransomware (00:14:02)
9. Searching for Vulnerabilities (00:17:51)
10. Sensitive Data Extortion (00:19:13)
11. Nokia 2007 (00:21:13)
12. Sony Pictures 2014 (00:22:41)
13. DDoS Attacks (00:23:54)
14. Amazon Web Services 2020 (00:28:00)
15. The Three Styles of Attack (00:29:47)
16. 11 Days Without Computer Networks (00:31:27)
17. Extortion Isn't Just a Business Problem (00:31:53)
18. Find the Right Experts (00:33:27)
19. Kevin Mitnick (00:34:58)
20. What's Next Up on Cyber Savvy (00:35:33)
15 Episoden