Artwork

Content provided by girlstalkcyber. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by girlstalkcyber or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

04. Who are the bad guys and how can they get to you?

20:16
 
Share
 

Manage episode 372223213 series 3491058
Content provided by girlstalkcyber. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by girlstalkcyber or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Today we take you through the rumblings of a cyber attack. How does it start and what does it look like? By the end of the episode you’ll be able to identify and avoid cyber threats quicker than you can say GTC.

We also take a look at who is behind these cyber attacks. The type of people sitting behind a computer, pulling these attacks off, may surprise you.

From phishing to "J-elena" (Justin and Selena) references, this episode has everything you need to understand ransomware headlines and protect yourself from cyber attacks. Let’s redefine how you act online.

Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re digging the show, leave us a review and share it with your family and friends!

Show Resources:

Report a cyber incident: https://www.cyber.gov.au/report-and-recover/report _______________

Socials:

Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU

Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: https://www.facebook.com/groups/828589538834261/

  continue reading

12 episodes

Artwork
iconShare
 
Manage episode 372223213 series 3491058
Content provided by girlstalkcyber. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by girlstalkcyber or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Today we take you through the rumblings of a cyber attack. How does it start and what does it look like? By the end of the episode you’ll be able to identify and avoid cyber threats quicker than you can say GTC.

We also take a look at who is behind these cyber attacks. The type of people sitting behind a computer, pulling these attacks off, may surprise you.

From phishing to "J-elena" (Justin and Selena) references, this episode has everything you need to understand ransomware headlines and protect yourself from cyber attacks. Let’s redefine how you act online.

Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re digging the show, leave us a review and share it with your family and friends!

Show Resources:

Report a cyber incident: https://www.cyber.gov.au/report-and-recover/report _______________

Socials:

Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU

Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: https://www.facebook.com/groups/828589538834261/

  continue reading

12 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide