Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
Techcess: embracing technology and IT support for success in your business - How to Spot a Phishing Attack: Top tips for preventing social engineering - Techcess

How to Spot a Phishing Attack: Top tips for preventing social engineering - Techcess

09/29/21 • 16 min

Techcess: embracing technology and IT support for success in your business

In this episode (episode eight) Mark Riddell from m3 Networks will guide you through the topic of social engineering, and how you can protect yourself against phishing attacks.

We're following on from the previous episode with Robert Hall.

Did you manage to catch it yet?

It's possible you might want to listen to that episode of the Techcess technology podcast first. If so, click here.

We will be discussing ways that someone may try to use technology to socially engineer you through your computer or mobile devices.

As always, we are continuing our series of technology in success themed podcast episodes by helping you to understand the impact and importance of technology and its contribution towards your business success.

The most common social engineering attacks work because they abuse people's trust in authority figures or by appealing to their sense of greed or curiosity.

Mark will be deep diving into some of the red flags associated with social engineering attacks, and the steps you can take to protect yourself against social engineering attempts.

Technology is revolutionising the way we engage customers, suppliers and employees across all parts of our business processes.

Is social engineering enough to trick some people into clicking the links and opening the attachments within?

So, what are the social engineering techniques used for hacking purposes?

And why are they effective, especially in these cases?

These and more are questions are uncovered by this episode.

Social media has given everyone a voice but it comes with its risks.

So if you are looking for ways to ensure that technology becomes an enabler rather than an obstacle in driving your social engagement strategy forward, listen to this podcast episode now.

If you enjoy this episode, make sure you follow the podcast via your favourite app.

Fancy giving us a review and rating? Please do! Click here.

plus icon
bookmark

In this episode (episode eight) Mark Riddell from m3 Networks will guide you through the topic of social engineering, and how you can protect yourself against phishing attacks.

We're following on from the previous episode with Robert Hall.

Did you manage to catch it yet?

It's possible you might want to listen to that episode of the Techcess technology podcast first. If so, click here.

We will be discussing ways that someone may try to use technology to socially engineer you through your computer or mobile devices.

As always, we are continuing our series of technology in success themed podcast episodes by helping you to understand the impact and importance of technology and its contribution towards your business success.

The most common social engineering attacks work because they abuse people's trust in authority figures or by appealing to their sense of greed or curiosity.

Mark will be deep diving into some of the red flags associated with social engineering attacks, and the steps you can take to protect yourself against social engineering attempts.

Technology is revolutionising the way we engage customers, suppliers and employees across all parts of our business processes.

Is social engineering enough to trick some people into clicking the links and opening the attachments within?

So, what are the social engineering techniques used for hacking purposes?

And why are they effective, especially in these cases?

These and more are questions are uncovered by this episode.

Social media has given everyone a voice but it comes with its risks.

So if you are looking for ways to ensure that technology becomes an enabler rather than an obstacle in driving your social engagement strategy forward, listen to this podcast episode now.

If you enjoy this episode, make sure you follow the podcast via your favourite app.

Fancy giving us a review and rating? Please do! Click here.

Previous Episode

undefined - How to improve security using phishing simulation and reduce your chances of suffering phishing attacks: the podcast episode that will absolutely change your security awareness program!

How to improve security using phishing simulation and reduce your chances of suffering phishing attacks: the podcast episode that will absolutely change your security awareness program!

Cyber criminals are targeting small business owners with phishing attacks! Listen to this episode that's all about phishing simulation for tips on how you can protect yourself.

Phishing attacks are a significant security risk for any business.

They can happen to large corporations and small businesses alike, and the consequences of one successful attack could be devastating.

Phishing simulation is an effective way to help reduce your chances of being targeted by cybercriminals.

In this episode, Mark Riddell and his guest Robert Hall discuss how phishing simulations work and how you can use them in your own company to keep it secure from phishing threats.

In case you're reading this and wondering what phishing is, you might want to go back to the previous episode, as that will help you understand the basics of how they work and why they're so dangerous for companies like yours.

Here's the video Robert made reference to, in the episode:

Hacker video

If you enjoy this episode, make sure you follow the podcast via your favourite app.

Fancy giving us a review and rating? Please do! Click here.

Next Episode

undefined - Techcess and 'The Black Knight' - discussing shadow I.T., company values and the 'Managed Service Provider'!

Techcess and 'The Black Knight' - discussing shadow I.T., company values and the 'Managed Service Provider'!

Techcess' Mark Riddell and 'The Black Knight' - discussing shadow I.T., company values and MSPs!

This episode, Mark Riddell of m3 Networks is joined by 'The Black Knight' Craig Allan of Different Mindset.

They discuss managed service providers (MSP) and why they may or may not be a good fit for your business.

They break down all aspects, such as shadow I.T. and how it can affect the relationship between the managed service provider (MSP) and their customers.

A managed service provider is a company which manages IT infrastructure for businesses.

It can include services such as cloud hosting, managed security services, managed IT support etc and enable less technical staff within a business to access help with issues without calling the supplier.

As someone with a wealth of experience working with teams who have used MSP, 'The Black Knight' has a lot to say on the subject!

When it comes to managed services, what the customer wants it to be and what it actually is can be two totally different things.

In this episode, Mark and Craig deep dive into some of the implications of this, and discuss the rather mysterious sounding subject of 'shadow I.T'.

They also touch on what having a managed service provider can do for your business, and how to make it work with the company values.

If you enjoy this episode, make sure you follow the podcast via your favourite app.

Fancy giving us a review and rating?

Please do!

Click here.

Follow us on Podchaser!

Episode Comments

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/techcess-embracing-technology-and-it-support-for-success-in-your-busin-191106/how-to-spot-a-phishing-attack-top-tips-for-preventing-social-engineeri-17743382"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to how to spot a phishing attack: top tips for preventing social engineering - techcess on goodpods" style="width: 225px" /> </a>

Copy