Td Canada Trust public
[search 0]
Download the App!
show episodes
 
Artwork

1
C Suite

Claudette McGowan

Unsubscribe
Unsubscribe
Monthly
 
The C Suite podcast is elevating cyber literacy for everyday people. Join Claudette McGowan, TD Bank’s Global Executive Officer for Cyber Security, as she explores how cyber-attacks happen and what we can do to avoid them. From phishing schemes to robocalls and even huge corporate hacks, on this show, Claudette meets with C Suite leaders to discuss cyber challenges and ways to help people become more protected and resilient.
  continue reading
 
Loading …
show series
 
If you’re like 80% of the population, debit or credit cards are your preferred method of payment when you’re out and about at restaurants, the movies, or sporting events. But did you know that paying with a card in public can put you at a greater risk of being the target of cyber scams like electronic pickpocketing? In this episode, Claudette and h…
  continue reading
 
In a zero-day exploit or attack, a hacker will identify a vulnerability within a network and use it to their advantage before developers are even aware of it or have time to fix it—hence the term “zero-day.” With cyber security issues skyrocketing in recent years, 2021 was the worst year for zero-day attacks in history, with almost double the total…
  continue reading
 
Cyber security is a field that’s been experiencing rapid growth in the last 20 years. As we all become more virtually connected, online security has become an increasingly crucial priority for organizations of all sizes. In fact, there were a reported 3.5 million unfulfilled roles in cyber security in 2021, up 350% from 2013. With numbers like thes…
  continue reading
 
Cybercriminals tend to target the most vulnerable people, making newcomers to our country and international students all the more susceptible to scams and frauds. In this episode of C Suite, Claudette explores the cyber and real-world threats to Canadian newcomers. Frauds and scams can begin as early as the immigration process, and they continue af…
  continue reading
 
One of the most notable things about the internet is the double edged sword of anonymity. The internet allows many people the opportunity to explore interests or express their creativity anonymously, without having their actions tied to their true identity, yet it can also mean that bad actors can do serious harm to others without being tied to the…
  continue reading
 
In the last decade, couples of all ages have found their significant other via dating apps and online websites, with over 15% of U.S. adults saying they’ve tried or continue to use online dating. But in an online world where anonymity can be maintained behind the veil of a screen, love doesn’t always turn out the way some hoped. In this episode of …
  continue reading
 
The pandemic accelerated tech adoption by people over the age of 60 so that they could stay connected to their closest loved ones during lockdowns. However, in 2020, the FBI’s Internet Crime Complaint Center reported 28 percent of the total fraud losses were sustained by victims over the age of 60, which equates to roughly $1 billion USD. In this e…
  continue reading
 
Social media influencers are naturally at a higher risk of experiencing a cyber attack. In this episode, Claudette explores the specific cyber security concerns influencers face today, and why having a larger platform can increase your chances of a breach. She speaks with Graham, a talent agent, about some of the cyber security concerns his clients…
  continue reading
 
If young people were living online before the pandemic, it’s hard to deny their lives are even more firmly intertwined with the web now that COVID-19 has changed the world so fundamentally. For many young people in their tweens, teens and twenties, it’s become more difficult to separate their online lives from the real world now that school, work, …
  continue reading
 
Bots are a highly pervasive cybersecurity concern today, and they’re on the rise. In fact, it was recently estimated that over 60% of all web traffic comes from bots, which means most internet users today aren’t even human. In the context of cybersecurity, bots are often used by bad actors to access sensitive information, learn a user’s private cre…
  continue reading
 
Companies big and small are now in the business of collecting a wide variety of data on everything from your favourite colour to your physical location. Data collection can ultimately serve a number of different purposes, not the least of which is improving your personal customer experience. However, having privileged access to a wealth of salient …
  continue reading
 
In theory, being hacked is every internet user’s worst nightmare. Despite this, many average users aren’t aware of the steps they should take to defend themselves and their data against a potential attack. In this episode of C Suite, Claudette speaks with two special guests who will help to shed light on the steps people and companies should take f…
  continue reading
 
In the cybersecurity world, the pandemic brought on a brand new set of challenges that demanded quick thinking, rapid action and a whole lot of innovation. In the first episode of C Suite season two, Claudette and her guests will be discussing how the remote work revolution has changed cybersecurity needs for most companies, and how they can mainta…
  continue reading
 
Ethical hackers are IT professionals who simulate hacking situations within an organization in order to identify blind spots and potential threats, to ultimately protect against cyber attacks. Many large organizations and financial institutions regularly engage in ethical hacking practices to gain insight into vulnerabilities and avoid potential da…
  continue reading
 
As IT systems everywhere become increasingly complex, cyber hacks are on the rise. In addition to protecting our networks, it’s important to be just as mindful about all connected devices. In 2019, the number of data breaches on IoT devices tripled, and it’s only increased since the pandemic and the spread of 5G technology. Although IoT has the pot…
  continue reading
 
On this episode of C Suite, we’re doing things a bit differently. After speaking to several leading experts in cybersecurity, we’ve learned a lot about how we can all stay connected and protected online. That’s why we decided to compile the best cybersecurity tips we’ve received from our brilliant guests into one value-packed episode. No matter you…
  continue reading
 
Skimming is one of the largest hidden cyber threats to businesses and individuals. It can lurk in the background of any digital transaction, stealing money and personal information in the process. According to a recent threat landscape report, credit card skimming accounts for 30% of all data breaches that target retailers. With the COVID-19 pandem…
  continue reading
 
The dark web. A mystery to many and invisible to most. For decades, the public has had preconceived notions about the dark web, mostly rooted in crime dramas and sensational news stories. But in reality, the dark web is much more complex than that. On today’s episode, we’re joined by cybersecurity experts Matt Watchinski, VP at Cisco Talos, and Azi…
  continue reading
 
Today, cybercrime is a global challenge. A recent cybersecurity report estimates that by 2025, cybercrime will cost the world $10.5 trillion per year. It’s no surprise then that cybersecurity has become a major point of interest for organizations and individuals alike. Companies are starting to spend more on threat prevention tools and software, wh…
  continue reading
 
Cyberbullying is a worldwide issue. According to a 2019 survey, 37% of teens ages 12 to 17 have been bullied online. Of them, 30% have experienced it more than once. Cyberbullying can be committed by anyone. In many situations, kids are engaging in online bullying without realizing that what they’re doing is harmful. In other situations, cyberbully…
  continue reading
 
Phishing or “ishing” is one of the most comprehensive cyberattacks out there. In a recent global security survey, 22% of organizations saw phishing as their greatest security threat and 59% of all phishing attacks were found to be related to finances. On this episode, we meet Rekeft: a Canadian man who lost $10,000 after receiving a phone call from…
  continue reading
 
Business email compromise is one of the largest cyber threats facing organizations and individuals today. A recent FBI report revealed that business email compromise scams resulted in over $1.8 billion worth of losses to businesses in 2020 alone. On this episode, we meet Des: a management consultant who experienced a business email compromise scam …
  continue reading
 
Every year, the number of kids online increases. But, as one study found, over 1.5 billion young people are impacted by school closures due to COVID-19. This means there are more kids online today than ever before, and cybercriminals are taking notice. On this episode, we’re asking the two most important questions parents need to know: what are the…
  continue reading
 
In the past few years, robocalls have reached an all-time high. In 2019 alone, there were almost 60 billion robocalls made in the US. From exclusive vacation deals to claims that you owe the government money, almost everyone has experienced a robocall. But as criminals adopt new techniques, robocalls are becoming more difficult to detect and preven…
  continue reading
 
Ransomware is one of the world’s most common cybercrimes. In 2021 alone, it’s estimated that ransomware crime will cost $20 billion in global damages. In our second episode, we meet Patti: a 60-something business owner who was targeted by a ransomware attack. She explains how it happened, how she reacted, and how she almost lost a large sum of mone…
  continue reading
 
Welcome to the first season of C Suite, a brand new podcast focusing on elevating cyber literacy for everyday people. Join Claudette McGowan, TD Bank’s Global Executive Officer for Cyber Security, as she explores how cyber-attacks happen and what we can do to avoid them. From phishing schemes to robocalls and even huge corporate hacks, on this show…
  continue reading
 
Loading …

Quick Reference Guide