30 sec

Securely HERS Season 2 Trailer Securely HERS a Cybersecurity Podcast for Women. SecurelyHERS.com

    • How To

https://SecurelyHERS.com
Episode 2: The Rise of Targeted Cyber Attacks on Families• Introduction: The personal threats corporate C-level individuals face.• Elaboration on phishing, spear phishing, vishing, and smishing attacks.• Real-life examples: Recent incidents where families were the initial point of cyber attacks.• The emotional and psychological impact on families.Episode 3: The Art of Deception: Pretexting, Baiting, and Impersonation• What is pretexting and how it's a tailored form of deception.• Baiting: The danger of curiosity - using devices like USB drives.• Impersonation attacks, with a focus on manipulating trust.• Practical anecdotes of each type of attack.Episode 4: Beware of Your Surroundings: Physical Attacks and Shoulder Surfing• The vulnerability of physical security.• Discussion on tailgating and the risks it brings.• The overlooked threat of shoulder surfing.• Steps to prevent these from happening.Episode 5: Treading Safely Online: Watering Hole Attacks and Fake Profiles• Deep dive into watering hole attacks and its effectiveness.• The rising threat of fake social media profiles.• Discussing the danger of romance scams.• Recommendations for identifying and avoiding these threats.Episode 6: The Emotional Manipulation: Sextortion, Ransomware, and Romance Scams• Understanding sextortion and the blackmail methodology.• The mechanics and consequences of ransomware.• How romance scams play on emotions.• Protecting oneself from emotional and digital manipulation.Episode 7: Wi-Fi Eavesdropping and Malicious Mobile Apps• The hidden dangers of public Wi-Fi.• Setting up rogue Wi-Fi hotspots: A hacker's perspective.• Malicious mobile apps: More than meets the eye.• Strategies for safe browsing and app installations.Episode 8: Quizzes, Surveys, and Invoice Scams: The Subtle Attacks• Diving into how fun quizzes can extract personal info.• Recognizing and preventing invoice scams.• The significant financial and informational losses that can result.• Educating oneself and verifying before sharing or paying.Episode 9: Building a Cyber Fortress: Protecting Your Home and Loved Ones• Understanding your digital footprint and its implications.• Importance of secure, unique passwords for every platform.• Steps to bolster security on personal social media profiles.• Regular software updates, VPNs, and multi-factor authentication.Episode 10: Engaging the Next Generation: Educating Kids on Cybersecurity• The vulnerabilities of the younger digital generation.• Incorporating cybersecurity in their daily digital interactions.• Hands-on methods to teach and engage children.• Encouraging open dialogue about online experiences.Episode 10: Roundtable Discussion: Victims Share Their Stories• Inviting individuals who have experienced these attacks.• Sharing, discussing, and learning from their experiences.• Understanding the aftermath and the steps they took.• Creating a community of support and awareness.

https://SecurelyHERS.com
Episode 2: The Rise of Targeted Cyber Attacks on Families• Introduction: The personal threats corporate C-level individuals face.• Elaboration on phishing, spear phishing, vishing, and smishing attacks.• Real-life examples: Recent incidents where families were the initial point of cyber attacks.• The emotional and psychological impact on families.Episode 3: The Art of Deception: Pretexting, Baiting, and Impersonation• What is pretexting and how it's a tailored form of deception.• Baiting: The danger of curiosity - using devices like USB drives.• Impersonation attacks, with a focus on manipulating trust.• Practical anecdotes of each type of attack.Episode 4: Beware of Your Surroundings: Physical Attacks and Shoulder Surfing• The vulnerability of physical security.• Discussion on tailgating and the risks it brings.• The overlooked threat of shoulder surfing.• Steps to prevent these from happening.Episode 5: Treading Safely Online: Watering Hole Attacks and Fake Profiles• Deep dive into watering hole attacks and its effectiveness.• The rising threat of fake social media profiles.• Discussing the danger of romance scams.• Recommendations for identifying and avoiding these threats.Episode 6: The Emotional Manipulation: Sextortion, Ransomware, and Romance Scams• Understanding sextortion and the blackmail methodology.• The mechanics and consequences of ransomware.• How romance scams play on emotions.• Protecting oneself from emotional and digital manipulation.Episode 7: Wi-Fi Eavesdropping and Malicious Mobile Apps• The hidden dangers of public Wi-Fi.• Setting up rogue Wi-Fi hotspots: A hacker's perspective.• Malicious mobile apps: More than meets the eye.• Strategies for safe browsing and app installations.Episode 8: Quizzes, Surveys, and Invoice Scams: The Subtle Attacks• Diving into how fun quizzes can extract personal info.• Recognizing and preventing invoice scams.• The significant financial and informational losses that can result.• Educating oneself and verifying before sharing or paying.Episode 9: Building a Cyber Fortress: Protecting Your Home and Loved Ones• Understanding your digital footprint and its implications.• Importance of secure, unique passwords for every platform.• Steps to bolster security on personal social media profiles.• Regular software updates, VPNs, and multi-factor authentication.Episode 10: Engaging the Next Generation: Educating Kids on Cybersecurity• The vulnerabilities of the younger digital generation.• Incorporating cybersecurity in their daily digital interactions.• Hands-on methods to teach and engage children.• Encouraging open dialogue about online experiences.Episode 10: Roundtable Discussion: Victims Share Their Stories• Inviting individuals who have experienced these attacks.• Sharing, discussing, and learning from their experiences.• Understanding the aftermath and the steps they took.• Creating a community of support and awareness.

30 sec