BFM 89.9
The Business Station
BFM 89.9
The Business Station
Recommended
45 mins
43 mins
In order for an attacker to be successful at an attack, it requires a vulnerability in the network. Whether in the form of technology or people, poor implementation of technologies only just adds to the likelihood of threats being realised. Business Email Compromise surprisingly is one of the the easiest and most successful ways for an attacker to execute. We speak to Goh Chee Hoh of Trend Micro Malaysia on how to stay protected from BEC attacks and to stay ahead in the cybercrime game.
Producer: Jeff Sandhu
Share:
Recent episodes
0
Latest stories
Understanding Business Email Compromise (BEC)
In order for an attacker to be successful at an attack, it requires a vulnerability in the network. Whether in the form of technology or people, poor implementation of technologies only just adds to the likelihood of threats being realised. Business Email Compromise surprisingly is one of the the easiest and most successful ways for an attacker to execute. We speak to Goh Chee Hoh of Trend Micro Malaysia on how to stay protected from BEC attacks and to stay ahead in the cybercrime game.
Producer: Jeff Sandhu
Share:
Recommended
Download app
60,000 other podcasts in your hand
Recent episodes
0
Latest Stories