bfm-logo

podcast image

Understanding Business Email Compromise (BEC)

28 mins·11:00, 26 Jul 2018
podcast image

Understanding Business Email Compromise (BEC)

28 mins
·
11:00, 26 Jul 2018
·

Recommended

23 mins

20 mins

In order for an attacker to be successful at an attack, it requires a vulnerability in the network. Whether in the form of technology or people, poor implementation of technologies only just adds to the likelihood of threats being realised. Business Email Compromise surprisingly is one of the the easiest and most successful ways for an attacker to execute. We speak to Goh Chee Hoh of Trend Micro Malaysia on how to stay protected from BEC attacks and to stay ahead in the cybercrime game.

Producer: Jeff Sandhu

Share:

Recommended

Recent episodes

0

Latest stories

story image
How Obesity Makes Pregnancy Dangerous
45 mins
story image
Podcasts · May 9 · 45 mins
How Obesity Makes Pregnancy Dangerous
story image
Symphonic Image
23 mins
story image
Podcasts · May 9 · 23 mins
Symphonic Image
story image
The Nutcracker
20 mins
story image
Podcasts · May 9 · 20 mins
The Nutcracker