
Recommended
In order for an attacker to be successful at an attack, it requires a vulnerability in the network. Whether in the form of technology or people, poor implementation of technologies only just adds to the likelihood of threats being realised. Business Email Compromise surprisingly is one of the the easiest and most successful ways for an attacker to execute. We speak to Goh Chee Hoh of Trend Micro Malaysia on how to stay protected from BEC attacks and to stay ahead in the cybercrime game.
Producer: Jeff Sandhu
tech talktrend microgoh chee hohcybercrimethreatmalwarebusiness email compromiseBECphishingspamemail
Share:
Recommended

May 9
·
45 minsHow Obesity Makes Pregnancy Dangerous

May 9
·
23 minsSymphonic Image

May 9
·
20 minsThe Nutcracker
Recent episodes
0
Latest stories

Podcasts · May 9 · 8:00AM
How Obesity Makes Pregnancy Dangerous
45 mins

Podcasts · May 9 · 45 mins
How Obesity Makes Pregnancy Dangerous

Podcasts · May 9 · 7:30AM
Symphonic Image
23 mins

Podcasts · May 9 · 23 mins
Symphonic Image

Podcasts · May 9 · 7:00AM
The Nutcracker
20 mins

Podcasts · May 9 · 20 mins
The Nutcracker
BFM 89.9
The Business Station