Understanding Business Email Compromise (BEC)
Goh Chee Hoh, Managing Director, Trend Micro Malaysia
26-Jul-18 11:00
Embed Podcast
You can share this podcast by copying this HTML to your clipboard and pasting into your blog or web page.
Close
In order for an attacker to be successful at an attack, it requires a vulnerability in the network. Whether in the form of technology or people, poor implementation of technologies only just adds to the likelihood of threats being realised. Business Email Compromise surprisingly is one of the the easiest and most successful ways for an attacker to execute. We speak to Goh Chee Hoh of Trend Micro Malaysia on how to stay protected from BEC attacks and to stay ahead in the cybercrime game.
Produced by: Jeff Sandhu
This and more than 60,000 other podcasts in your hand. Download the all new BFM mobile app.
Categories: Technology, Medical Innovation and Technology, Tech, Entrepreneurship, Personal Development
Tags: tech talk, trend micro, goh chee hoh, cybercrime, threat, malware, business email compromise, BEC, phishing, spam, email,