53 min

Business Email Compromise Attacks - What They Are and How They Target Your Business Data Privacy Law Talk

    • Technology

Host Jim Paulick is joined by Chris Teodorski, Managing Security Consultant at Guidepoint Security, to discuss Business Email Compromise (BEC) Attacks.
In these attacks, a hacker gains access to an email account and impersonates your coworker, client, or other trusted advisor, often sending an email request for (fraudulent) payment, which appears to be a legitimate email. BEC's accounted for $1.8 Billion worth of losses to businesses in 2021, according to the FBI.
Jim & Chris discuss the methodologies of these attacks, and what you need to know to protect your business.

This podcast episode is for informational purposes only and is not intended to and does not constitute legal advice or a solicitation for the formation of an attorney-client relationship.

Host Jim Paulick is joined by Chris Teodorski, Managing Security Consultant at Guidepoint Security, to discuss Business Email Compromise (BEC) Attacks.
In these attacks, a hacker gains access to an email account and impersonates your coworker, client, or other trusted advisor, often sending an email request for (fraudulent) payment, which appears to be a legitimate email. BEC's accounted for $1.8 Billion worth of losses to businesses in 2021, according to the FBI.
Jim & Chris discuss the methodologies of these attacks, and what you need to know to protect your business.

This podcast episode is for informational purposes only and is not intended to and does not constitute legal advice or a solicitation for the formation of an attorney-client relationship.

53 min

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
The Neuron: AI Explained
The Neuron
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
No Priors: Artificial Intelligence | Technology | Startups
Conviction | Pod People
Acquired
Ben Gilbert and David Rosenthal
BG2Pod with Brad Gerstner and Bill Gurley
BG2Pod