Entries by Scott Gombar

I’m Tired -MFA Fatigue

https://thehumanelementpod.s3.amazonaws.com/ep25.mp3Podcast: Play in new window | DownloadSubscribe: RSSEpisode 25 I’m Tired -MFA Fatigue Introduction (3 mins): The host introduces MFA (Multi-Factor Authentication) and the case of three individuals pleading guilty to cybercrimes using MFA fatigue attacks. The focus is on how attackers exploited human behavior rather than technology. Segment 1: The Recent Guilty Pleas – […]

Now Hiring

https://thehumanelementpod.s3.amazonaws.com/ep24.mp3Podcast: Play in new window | DownloadSubscribe: RSSEpisode 24 Now Hiring Welcome to the Human Element Podcast, where we dive into the stories and experiences that shape us in our everyday lives. Today, we’re talking about something we’ve all been through at some point—job seeking. Whether it’s your first gig out of college, a mid-career […]

Episode 23: The Rising Tide of Insider Threats: Are Companies Prepared?

https://thehumanelementpod.s3.amazonaws.com/ep23.mp3Podcast: Play in new window | DownloadSubscribe: RSSThe Rising Tide of Insider Threats: Are Companies Prepared? ep23 The Human Element Podcast episode 23, hosted by Scott Gombar, focuses on the rising tide of insider threats. Gombar discusses a report by Secura Nix revealing that 76% of organizations have seen increased insider threat activity over the […]

The Unexpected Email

https://thehumanelementpod.s3.amazonaws.com/ep22.mp3Podcast: Play in new window | DownloadSubscribe: RSSEpisode 22: The Unexpected Email Imagine receiving an email unexpectedly from yourself. You’d probably think that was pretty weird but you open it anyway and what you read next is even more shocking. Someone else has access to your email and they want a ransom in bitcoin to […]

Lost and Found: The Dark Side of Facebook Scams

https://thehumanelementpod.s3.amazonaws.com/ep21.mp3Podcast: Play in new window | DownloadSubscribe: RSSEpisode 21: Lost and Found – The Dark Side of Facebook Scams 3 Common Facebook Scams and How to Recognize Them Facebook scams are not new but they seem to be increasing, and becoming a little more sophisticated in some cases. We review 3 of the more popular […]

10 Things You Need to Do to Avoid a Ransomware Attack/Data Breach – Ransomware Awareness Month 2023

https://thehumanelementpod.s3.amazonaws.com/ep20.mp3Podcast: Play in new window | DownloadSubscribe: RSSJuly is Ransomware Awareness Month 10 Things You Need to Do to Avoid a Ransomware Attack/Data Breach Ransomware is the scourge of the internet, and one of the biggest threats to small businesses all over the world, but what can we do? Well, it starts with awareness and […]

Navigating the Career Minefield: Unmasking Fake Job Postings on LinkedIn

Navigating the Career Minefield: Unmasking Fake Job Postings on LinkedIn LinkedIn is a renowned professional networking platform and a vital tool in modern job search. Unfortunately, it has not been exempt from the clutches of cybercriminals. Fake job postings have become increasingly prevalent, leading unsuspecting job seekers down a path of disappointment and potential identity […]

Fake LinkedIn Account Spotted

https://thehumanelementpod.s3.amazonaws.com/ep19.mp3Podcast: Play in new window | DownloadSubscribe: RSSEpisode 19: Fake LinkedIn Account Spotted As the owner of a LinkedIn group of almost 10,000 members, one of the tasks I have is to ensure the members are going to be good citizens. It is a geographically based group and as such I only allow members from […]

No, They Are Not Going to Pay Your Bill

https://thehumanelementpod.s3.amazonaws.com/ep18.mp3Podcast: Play in new window | DownloadSubscribe: RSSEpisode 18: No, They Are Not Going to Pay Your Bill On the day of this recording, I received a phone call claiming to be from “TMobile/Sprint”. They wanted to advise of an overpayment on my account and that I was owed a credit. As I fumbled in […]

A Hack is Imminent

https://thehumanelementpod.s3.amazonaws.com/ep17.mp3Podcast: Play in new window | DownloadSubscribe: RSSEpisode 17: A Hack Is Imminent I was made aware of a cybercriminal that has access to the network and computers of at least two businesses in the same industry as one of my clients. Some of the details were eerily similar but not all of the information […]