Wildfires, Floods, and Chaos Communications: Management of Issues, Crises and Disasters
Butterfly Effect Communications, Stories and Strategies
19 episodes
7 months ago
Send us a text Knowing what mitigations to have ahead of a cyberattack is one step in many as cybercriminals exploit vulnerabilities on mobile devices, computers and entire operations. Learn about the cyberattacks individuals and organizations face today from Kit Professionals' Hunter Geerts. Listen for: 1:20 Attack methods 12:18 Ransomware and phishing, with a side of mitigation 25:27 VIP impersonation, payroll and vendor fraud, and credential phishing 33:22 Finale - Three quick ...
All content for Wildfires, Floods, and Chaos Communications: Management of Issues, Crises and Disasters is the property of Butterfly Effect Communications, Stories and Strategies and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text Knowing what mitigations to have ahead of a cyberattack is one step in many as cybercriminals exploit vulnerabilities on mobile devices, computers and entire operations. Learn about the cyberattacks individuals and organizations face today from Kit Professionals' Hunter Geerts. Listen for: 1:20 Attack methods 12:18 Ransomware and phishing, with a side of mitigation 25:27 VIP impersonation, payroll and vendor fraud, and credential phishing 33:22 Finale - Three quick ...
Cybersecurity MISTAKES That Will Cost You BIG | With information technology expert Hunter Geerts
Wildfires, Floods, and Chaos Communications: Management of Issues, Crises and Disasters
38 minutes
7 months ago
Cybersecurity MISTAKES That Will Cost You BIG | With information technology expert Hunter Geerts
Send us a text Knowing what mitigations to have ahead of a cyberattack is one step in many as cybercriminals exploit vulnerabilities on mobile devices, computers and entire operations. Learn about the cyberattacks individuals and organizations face today from Kit Professionals' Hunter Geerts. Listen for: 1:20 Attack methods 12:18 Ransomware and phishing, with a side of mitigation 25:27 VIP impersonation, payroll and vendor fraud, and credential phishing 33:22 Finale - Three quick ...
Wildfires, Floods, and Chaos Communications: Management of Issues, Crises and Disasters
Send us a text Knowing what mitigations to have ahead of a cyberattack is one step in many as cybercriminals exploit vulnerabilities on mobile devices, computers and entire operations. Learn about the cyberattacks individuals and organizations face today from Kit Professionals' Hunter Geerts. Listen for: 1:20 Attack methods 12:18 Ransomware and phishing, with a side of mitigation 25:27 VIP impersonation, payroll and vendor fraud, and credential phishing 33:22 Finale - Three quick ...