18 min

Phishing you say? Like with a pole? Cybersecurity Terms with Trava Security CTO, Rob Beeler The Tea on Cybersecurity

    • Technology

If you ignore cybersecurity threats, it’s only worse in the end since hackers are smart, and it’s a never-ending web of attacks and breaches. Understanding what those threats are is the first step.

In this episode of The Tea on Cybersecurity, host Jara Rowe dives into the complicated world of cybersecurity terminology with Trava’s CTO and Co-Founder, Rob Beeler. They discuss common terms like phishing, spam, endpoint protection, vulnerabilities, and risks associated with cyber attacks. Rob also stresses the importance of educating yourself and others on these terms to help prevent future attacks.

What You’ll Learn:
What are Phishing Cyber attacks, and how Trava’s Phishing SimulatorWhat endpoint protection is and tools used to look for security vulnerabilitiesThe difference between threats, vulnerabilities, and risk
Things to listen for:
[00:20 - 01:21] Introduction[01:35 - 02:22] Rob Beeler's introduction and background in cybersecurity[02:32 - 03:03] Explanation of endpoint protection[03:12 - 05:24] The importance of understanding terminology[05:54 - 06:49] Examples of cyberattacks[07:07 - 08:51] The definition of phishing[10:52 - 11:25] The difference between phishing and spam[11:33 - 12:39] Definition of vulnerabilities vs. threats and risks[13:13 - 15:50] Statistics of phishing attacks and their impact on companies[16:04 - 18:11] Jara’s receipts
Connect with the Guest:
Linkedin - https://www.linkedin.com/in/rob-beeler-945ab33/

Connect with Trava:
Website - https://www.travasecurity.com/
LinkedIn - https://www.linkedin.com/company/travasecurity/
Instagram - https://www.instagram.com/travasecurity/
Twitter - https://twitter.com/travasecurity
Facebook - https://www.facebook.com/travaHQ
YouTube - https://www.youtube.com/@travasecurity
Blog - https://www.travasecurity.com/blog

If you ignore cybersecurity threats, it’s only worse in the end since hackers are smart, and it’s a never-ending web of attacks and breaches. Understanding what those threats are is the first step.

In this episode of The Tea on Cybersecurity, host Jara Rowe dives into the complicated world of cybersecurity terminology with Trava’s CTO and Co-Founder, Rob Beeler. They discuss common terms like phishing, spam, endpoint protection, vulnerabilities, and risks associated with cyber attacks. Rob also stresses the importance of educating yourself and others on these terms to help prevent future attacks.

What You’ll Learn:
What are Phishing Cyber attacks, and how Trava’s Phishing SimulatorWhat endpoint protection is and tools used to look for security vulnerabilitiesThe difference between threats, vulnerabilities, and risk
Things to listen for:
[00:20 - 01:21] Introduction[01:35 - 02:22] Rob Beeler's introduction and background in cybersecurity[02:32 - 03:03] Explanation of endpoint protection[03:12 - 05:24] The importance of understanding terminology[05:54 - 06:49] Examples of cyberattacks[07:07 - 08:51] The definition of phishing[10:52 - 11:25] The difference between phishing and spam[11:33 - 12:39] Definition of vulnerabilities vs. threats and risks[13:13 - 15:50] Statistics of phishing attacks and their impact on companies[16:04 - 18:11] Jara’s receipts
Connect with the Guest:
Linkedin - https://www.linkedin.com/in/rob-beeler-945ab33/

Connect with Trava:
Website - https://www.travasecurity.com/
LinkedIn - https://www.linkedin.com/company/travasecurity/
Instagram - https://www.instagram.com/travasecurity/
Twitter - https://twitter.com/travasecurity
Facebook - https://www.facebook.com/travaHQ
YouTube - https://www.youtube.com/@travasecurity
Blog - https://www.travasecurity.com/blog

18 min

Top Podcasts In Technology

No Priors: Artificial Intelligence | Technology | Startups
Conviction | Pod People
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Lex Fridman Podcast
Lex Fridman
Acquired
Ben Gilbert and David Rosenthal
TED Radio Hour
NPR
Hard Fork
The New York Times