98% of all cyber attacks include some form of social engineering. We’ll dig into the world of social engineering and I’ll give you some of the best defense against a social engineering attack. We’ll even run through a fictional example of a social engineering attack and pick it apart.

Proper network security and security practices are vital to keeping your company’s data safe. We’ll talk about wireless settings, when and if you should use WiFi at all, how to setup a home-office network, and how to setup a dedicated office network.

References:

The Art of Deception by Kevin D. Mitnick: https://www.mitnicksecurity.com/the-art-of-deception
26 Cyber Security Statistics, Facts, & Trends: https://www.cloudwards.net/cyber-security-statistics/#statistics-about-the-most-targeted-industries

Recommended Courses:

https://www.wondrium.com/introduction-to-psychology
https://www.wondrium.com/psychology-of-human-behavior
https://www.wondrium.com/shocking-psychological-studies-and-the-lessons-they-teach
https://www.wondrium.com/behavioral-economics-when-psychology-and-economics-collide
https://www.wondrium.com/influence-mastering-lifes-most-powerful-skill
https://www.wondrium.com/effective-communication-skills
https://www.wondrium.com/how-ideas-spread

Send in a voice message: https://anchor.fm/science-fueled/message
Support this podcast: https://anchor.fm/science-fueled/support