Artwork

Content provided by Extra Something Media, LLC and David W. Schropfer. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Extra Something Media, LLC and David W. Schropfer or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

#23 - Why You are Vulnerable to the Hack That Exposed the DNC

23:03
 
Share
 

Manage episode 214968255 series 2306623
Content provided by Extra Something Media, LLC and David W. Schropfer. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Extra Something Media, LLC and David W. Schropfer or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Spear phishing. It's when a hacker crafts an email or social media post designed to get you to click a link or open an attachment. And it is the most prevalent threat to both business and personal computers today. According to the FBI, it is also the method that hackers used to create the infamous hack of the Democratic National Committee (DNC) during the 2016 Presidential election. Find out what you can do about this and other threats with my guest, John Czupak- President and CEO of ThreatQuotient,

  continue reading

66 episodes

Artwork
iconShare
 
Manage episode 214968255 series 2306623
Content provided by Extra Something Media, LLC and David W. Schropfer. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Extra Something Media, LLC and David W. Schropfer or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Spear phishing. It's when a hacker crafts an email or social media post designed to get you to click a link or open an attachment. And it is the most prevalent threat to both business and personal computers today. According to the FBI, it is also the method that hackers used to create the infamous hack of the Democratic National Committee (DNC) during the 2016 Presidential election. Find out what you can do about this and other threats with my guest, John Czupak- President and CEO of ThreatQuotient,

  continue reading

66 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide