Episode 3 Recovering from Phishing Attack

Episode 3 Recovering from Phishing Attack

Author: Intex IT May 27, 2020 Duration: 17:54
Welcome to Episode 3 of the Cyber Security Happy Hour.   I will talking about Phishing attacks, how to recognise what an attack looks like.  Furthermore, how to protect your confidential information and recover from a Phishing attack. I would like to to hear  your comments. You can also follow us on instagram @cybersechappy. On Facebook Cyber Security Happy Hour Podcast.  

Grab a drink and settle in for Cyber Security Happy Hour Podcast, where the conversation is as engaging as the topics are critical. Hosted by Christie Ogubere and brought to you by Intex IT, this series takes the intimidating world of digital defense and makes it accessible, relevant, and surprisingly conversational. Think of it as a regular catch-up with knowledgeable friends who work in the trenches of technology, business, and education, breaking down complex threats, strategies, and industry shifts without the jargon. You'll hear genuine discussions that range from practical advice for protecting a small business to analyzing major breaches and exploring the human elements behind the screens. This isn't a dry lecture; it's a lively dialogue designed for professionals who need to stay informed and anyone curious about the forces shaping our digital lives. Tune in for a podcast that feels like a necessary pit-stop in your week, offering clarity and perspective on everything from ransomware to regulatory changes, all while reminding you that cybersecurity is fundamentally about people.
Author: Language: English Episodes: 46

Cyber Security Happy Hour Podcast
Podcast Episodes
Episode 45 Zero Trust in Action – Compliance Meets Strategy [not-audio_url] [/not-audio_url]

Duration: 18:08
In this episode of Cyber Security Happy Hour, Christie breaks down how the Zero Trust security model aligns with major compliance frameworks, including PCI DSS v4.0 and ISO/IEC 27001. Zero Trust is no longer just a buzzw…
Episode 44 The Role of Cyber Insurance [not-audio_url] [/not-audio_url]

Duration: 10:42
In this episode, I speak about: Overview of the rising importance of cyber insurance in managing organizational risks due to cyber threats. The focus of the episode: what cyber insurance covers and how it benefits busine…
Episode 41 Demystifying Vulnerability Scans [not-audio_url] [/not-audio_url]

Duration: 15:16
In this podcast, your host, Christie, explores the critical facet of cyber security vulnerability scanning. Decode the myths, understand what vulnerability scans encompass, and why their role within an organization is of…
Episode 40 The Zero Trust Security Model [not-audio_url] [/not-audio_url]

Duration: 16:13
Welcome to episode 40 of the Cyber Security Happy Hour Podcast. Host: Christie Episode 40: The Zero Trust Security Model Today, I take a deep dive into the Zero Trust Security Model, a Cyber Security approach that contin…
Episode 38 Remote work as a Cyber Security Professional [not-audio_url] [/not-audio_url]

Duration: 18:28
Welcome to the Cyber Security Happy Hour Podcast Host: Christie Episode 38 Remote work as a Cyber Security Professional As a Cyber Security Professional, working remotely has become more and more common in recent years.…
Episode 37 Cyber Security for Small Businesses [not-audio_url] [/not-audio_url]

Duration: 21:06
Welcome to the Cyber Security Happy Hour Podcast Host: Christie Episode 37 Cyber Security for Small businesses Steps to protect your Small Business Risk Assessment: Threat Identification Vulnerability Assessment: Conduct…