Protect Your Organization from Social Engineering Attacks [ThreatLocker Webinar]

Описание к видео Protect Your Organization from Social Engineering Attacks [ThreatLocker Webinar]

Are you confident in your employees’ ability to withstand social engineering attempts?

The human element is a critical piece of your cybersecurity strategy because it is your employees and staff who could fall victim to a phishing attack and give threat actors full admin-level access to your systems! This is why cybercriminals use social engineering as a first step to enacting their malicious schemes most of the time.

About:
ThreatLocker® is a Zero Trust Endpoint Protection Platform that provides enterprise-level cybersecurity to organizations globally. With ThreatLocker, you can allow only what you need and block everything else, including ransomware!

Tune in to learn about:
- Strategies to mitigate the most common and uncommon social engineering attacks.
- Proven processes to identify and neutralize phishing attacks.
- The impact of Artificial Intelligence (AI) on the escalating threat of social engineering.
- How ThreatLocker can protect your organization from the outcome of social engineering attacks.And some of the most commonly asked questions about phishing.

For More on ThreatLocker®:

Website:
https://threatlocker.com/?utm_source=...

Get $200 off your Zero Trust World when you register with code WEBHACK (Offer valid through January 31, 2024):
https://zerotrustworld.threatlocker.c...

Book a FREE Demo:
https://www.threatlocker.com/book-a-t...

Facebook:   / thethreatlocker  
LinkedIn:   / threatlockerinc  
Twitter:   / threatlocker  
Instagram:   / threatlocker  
YouTube:    / threatlocker  

00:00 - Introduction
06:41 - Email phishing
07:15 - Concerns about password security
08:58 - Identifying phishing with the S.L.A.M. Method
09:10 - S.L.A.M. - Sender
11:46 - Q) "Are password manager apps a good way to deal with reusing passwords?"
14:27 - Apple Device Keychain security
16:14 - S.L.A.M. - Links
17:27 - S.L.A.M. - Attachment
17:40 - S.L.A.M. - Message
18:54 - Audience suggestions
19:43 - How ThreatLocker rotates local admin passwords everyday
20:24 - Audience suggestions (RLO - Right to Left Override)
20:38 - Are password-less passkeys the future?
21:25 - Vishing and using AI for Vishing
25:03 - Dual-Factor Authentication to prevent credential theft attacks
30:04 - Spear Phishing
33:12 - RLO (Right to Left Override) Elaboration
34:03 - Quishing
34:32 - Angler Phishing
35:05 - Pop-ups
36:21 - Shoulder Surfing
37:04 - Audience input
37:53 - Tailgating
38:50 - Escalation in Social Engineering
41:43 - Authenticator Apps
42:37 - What you SHOULD be doing to mitigate Social Engineering
44:56 - Rubber Duckies (Malicious Keystroke injecting USBs)
45:48 - Password-less Authentication
46:49 - Office365 Branding
47:34 - ThreatLocker Zero Trust World
49:47 - How to do a FREE ThreatLocker demo
50:20 - Outro

©2024 ThreatLocker Inc., All Rights Reserved.

Комментарии

Информация по комментариям в разработке