
Hacker Attractor
07/22/21 • 16 min
Ethical hackers are IT professionals who simulate hacking situations within an organization in order to identify blind spots and potential threats, to ultimately protect against cyber attacks. Many large organizations and financial institutions regularly engage in ethical hacking practices to gain insight into vulnerabilities and avoid potential data breaches. On this episode of C Suite, Zane leads us through a step-by-step simulated hack of one of our show producers, Steph. The demonstration reveals some of the cybersecurity blind spots many of us may be missing, and what a hacker can do once they gain access to your network. Zane shares the inner workings of a malware attack or email phishing scheme, what can make you an easy target, and tips for how we can all protect our devices from a similar breach.
Ethical hackers are IT professionals who simulate hacking situations within an organization in order to identify blind spots and potential threats, to ultimately protect against cyber attacks. Many large organizations and financial institutions regularly engage in ethical hacking practices to gain insight into vulnerabilities and avoid potential data breaches. On this episode of C Suite, Zane leads us through a step-by-step simulated hack of one of our show producers, Steph. The demonstration reveals some of the cybersecurity blind spots many of us may be missing, and what a hacker can do once they gain access to your network. Zane shares the inner workings of a malware attack or email phishing scheme, what can make you an easy target, and tips for how we can all protect our devices from a similar breach.
Previous Episode

Hacked: IoT, The Network and Me
As IT systems everywhere become increasingly complex, cyber hacks are on the rise. In addition to protecting our networks, it’s important to be just as mindful about all connected devices. In 2019, the number of data breaches on IoT devices tripled, and it’s only increased since the pandemic and the spread of 5G technology. Although IoT has the potential to create lasting changes and impact our lives in many positive ways, devices are generally more vulnerable to cybersecurity breaches than traditional IT systems. In this episode of C Suite, we discuss the risks and benefits of IoT, and the steps people and organizations can take to protect against potential cyberattacks. We’re joined by Dr. Rick Huijbregts, previously the Vice-President of Digital Transformation and Innovation at Cisco Canada, and now the Vice-President of Strategy and Innovation at George Brown College. We also hear a real-world example of a network attack from expert Mo, who shares his advice about ways to protect devices like smartwatches, intelligent speakers, and thermostats in addition to traditional devices like laptops and servers.
Next Episode

Cyber Pandemic
In the cybersecurity world, the pandemic brought on a brand new set of challenges that demanded quick thinking, rapid action and a whole lot of innovation. In the first episode of C Suite season two, Claudette and her guests will be discussing how the remote work revolution has changed cybersecurity needs for most companies, and how they can maintain a secure IT ecosystem even as their employees work from multiple locations around the world. This episode’s guests include Amy, a business owner who was hacked while gearing up to launch a healthcare app, and Robert Herjavec, the Founder and CEO of Herjavec Group, a cybersecurity firm that helps minimize global cyber attacks and threats for businesses of all sizes.
If you like this episode you’ll love
Episode Comments
Generate a badge
Get a badge for your website that links back to this episode
<a href="https://goodpods.com/podcasts/c-suite-320595/hacker-attractor-46932260"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to hacker attractor on goodpods" style="width: 225px" /> </a>
Copy