4 Ways to Reduce Cybercrime with Roger Grimes
Easy Prey27 Des 2023

4 Ways to Reduce Cybercrime with Roger Grimes

Social engineering has become so creative and clever with the ways scammers are trying to infiltrate your world. AI and deep fakes are only going to make things worse. Over the past 30 years, fighting viruses and malware has only increased with no end in sight. Today's guest is Roger Grimes. Roger is a Data-Driven Defense Evangelist for KnowBe4. He is a 34-year computer security expert and an author of 14 books and over 1,300 articles on computer security.

Show Notes:

  • [1:06] - Roger shares his background and his drive to continue writing in the field of computer security.

  • [3:17] - In his career as an accountant, Roger found himself more interested in the computer side of things.

  • [7:45] - Things have gotten worse every year. Ransomware has attacked hospitals and law enforcement in addition to personal devices.

  • [10:21] - In many cases, older devices are very hard to replace.

  • [11:44] - Most employees of a company don't know how devices work when it comes to security and things go without updates and patches.

  • [15:10] - Some companies are getting better about making sure products are set to auto-patch.

  • [16:20] - Social engineering is involved in about 70-90% of all successful hacks.

  • [17:23] - Compromised credentials is another common way hackers are easily able to gain access to accounts.

  • [19:38] - Social engineering is all about getting you to perform an action that is harmful to yourself or your organization.

  • [19:50] - Three qualities to look for: unexpected, asking you to do something you've never done before, asking you to do something harmful.

  • [21:12] - If something has those qualities, slow down before clicking anything within an email.

  • [23:26] - Really good scammers will prepare you for the scam.

  • [25:06] - It is hard to retrain yourself to think about these things during any communication.

  • [27:14] - People shouldn't get in trouble with their organization for taking precautions.

  • [29:47] - Scammers prey on vulnerable populations, including the elderly.

  • [32:10] - Always remember that no legitimate organization accepts payments in gift cards.

  • [34:10] - The best we can do right now is educate people to help prevent successful scammers. There's no stopping it.

  • [36:04] - Try to use a MFA that is phishing resistant.

  • [38:55] - Roger shares the experience of his fingerprints being stolen.

  • [41:20] - Security questions are surprisingly guessable in a lot of situations. Your password might not be guessable, but the security questions aren't always secure.

  • [44:31] - Roger shares some data about patches and what is important to remember.

  • [48:31] - Roger sets a time every few months where he sits down and changes every single one of his passwords.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:

Episoder(321)

Art Heists

Art Heists

The world of art theft looks glamorous in the movies, but the reality is far more complicated. From multi-million dollar forgery schemes to undercover FBI operations recovering stolen national treasur...

29 Apr 37min

The Power of Prediction

The Power of Prediction

We make predictions all the time including about the weather, about traffic, about what someone is going to say next. It feels natural, even rational. But when algorithms start making predictions abou...

22 Apr 39min

Privacy vs Reality

Privacy vs Reality

Online security advice often sounds simple until you actually try to follow it. Between password managers, privacy settings, and data brokers, protecting yourself can start to feel like a full-time jo...

15 Apr 58min

Wired to Trust

Wired to Trust

It's easy to think scams only work when someone misses something obvious. In reality, most of them don't look obvious at the start. They show up as normal situations with just enough friction to notic...

8 Apr 41min

Intimate Partner Fraud

Intimate Partner Fraud

Most scams leave a digital trail. A fake email, a spoofed number, a fraudulent website. You can trace them, report them, sometimes even reverse them. But what happens when the scam has no digital trai...

1 Apr 45min

Identity without Passwords

Identity without Passwords

Every day, employees at hotels, restaurants, and resorts across the country are doing exactly what they were hired to do: being warm, responsive, and eager to help. It's what makes hospitality work. I...

25 Mar 38min

When Cybercrime Gets Personal

When Cybercrime Gets Personal

Most security breaches don't begin with sophisticated code or elaborate technical exploits. They begin with a phone call, a convincing email, or someone at a help desk who just wanted to be helpful. T...

18 Mar 45min

Stopping Phone Scams

Stopping Phone Scams

Phone scams get dismissed as background noise or just annoying interruptions and unknown numbers with robotic voices we learn to ignore. But behind that noise is an industry built on psychology, autom...

11 Mar 45min

Populært innen Politikk og nyheter

giver-og-gjengen-vg
aftenpodden
aftenpodden-usa
forklart
popradet
stopp-verden
fotballpodden-2
rss-gukild-johaug
lydartikler-fra-aftenposten
nokon-ma-ga
det-store-bildet
hanna-de-heldige
dine-penger-pengeradet
rss-ness
rss-espen-lee-usensurert
aftenbla-bla
e24-podden
rss-dannet-uten-piano
rss-penger-polser-og-politikk
frokostshowet-pa-p5