Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
History
Sports
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/33/71/87/33718735-87cb-4b10-4a8f-4075856dd261/mza_14396921831542162912.jpg/600x600bb.jpg
Crossing The Firewall
MSU Center for Cybercrime Investigation & Training
16 episodes
3 days ago
The Crossing the Firewall podcast is a bi-weekly cybercrime podcast hosted by Dr. Tom Holt, Dr. Rachel McNealey, and Dr. Taylor Fisher and sponsored by the MSU Center for Cybercrime Investigation and Training. Each episode is a deep dive into one of the many facets of cybercrime and features a unique researcher or practitioner in the field.
Show more...
True Crime
RSS
All content for Crossing The Firewall is the property of MSU Center for Cybercrime Investigation & Training and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
The Crossing the Firewall podcast is a bi-weekly cybercrime podcast hosted by Dr. Tom Holt, Dr. Rachel McNealey, and Dr. Taylor Fisher and sponsored by the MSU Center for Cybercrime Investigation and Training. Each episode is a deep dive into one of the many facets of cybercrime and features a unique researcher or practitioner in the field.
Show more...
True Crime
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_nologo/43205180/43205180-1741357288198-f01baefb63c81.jpg
Persuasion, Deception & Data Security - Dr. Kevin Steinmetz
Crossing The Firewall
51 minutes 31 seconds
5 months ago
Persuasion, Deception & Data Security - Dr. Kevin Steinmetz

What does dressing like a janitor, carrying a ladder into a movie theater, and cybercrime all have in common? We can be easily deceived and persuaded into believing just about anything with relative ease.This phenomenon is called Social Engineering. Social Engineering is the use of deception and persuasion to convince individuals to give up information or be used to gain access to areas not generally available to the public.Some instances of Social Engineering may be harmless. You have likely seen the videos on YouTube, Instagram, or TikTok of pranksters carrying a ladder into a movie theater and no one questions them about where they are going or what they are doing. This works because when we see someone with a ladder, we assume they know what they are doing and are going to fix an issue.When we receive an email that we believe is from our boss asking us to move money into a different account or sign certain documents, we may do so without asking any questions. After all, it is our boss. However, some cybercriminals are using Social Engineering to their advantage. Posing as someone of authority and gaining access to private data. In this episode of Crossing the Firewall, Dr. Kevin Steinmetz joins us to discuss Social Engineering and how we can prevent ourselves from falling victim. ---Follow Crossing the Firewall on social media! Find us on BlueSky and Instagram. You can also follow the MSU Center for Cybercrime Investigation and Training on LinkedIn. Crossing the Firewall is hosted by Dr. Tom Holt, Dr. Rachel McNealey, and Dr. Taylor Fisher. Edited by JJ Thomas. All views and opinions expressed are the views of the hosts and guests and do not necessarily reflect the views and opinions of their home institutions or places of work. All information provided in this podcast should not be taken as business, personal, financial, or legal advice.

Crossing The Firewall
The Crossing the Firewall podcast is a bi-weekly cybercrime podcast hosted by Dr. Tom Holt, Dr. Rachel McNealey, and Dr. Taylor Fisher and sponsored by the MSU Center for Cybercrime Investigation and Training. Each episode is a deep dive into one of the many facets of cybercrime and features a unique researcher or practitioner in the field.