Media Thumbnail
00:00
00:00
1x
  • 0.5
  • 1
  • 1.25
  • 1.5
  • 1.75
  • 2

Phishing you say? Like with a pole? Cybersecurity Terms with Trava Security CTO, Rob Beeler

This is a podcast episode titled, Phishing you say? Like with a pole? Cybersecurity Terms with Trava Security CTO, Rob Beeler. The summary for this episode is: <p>If you ignore cybersecurity threats, it’s only worse in the end since hackers are smart, and it’s a never-ending web of attacks and breaches. Understanding what those threats are is the first step.</p><p><br></p><p>In this episode of The Tea on Cybersecurity, host <a href="https://www.linkedin.com/in/jararowe/" rel="noopener noreferrer" target="_blank">Jara Rowe</a> dives into the complicated world of cybersecurity terminology with <a href="https://www.linkedin.com/company/travasecurity/" rel="noopener noreferrer" target="_blank">Trava’s</a> CTO and Co-Founder, <a href="https://www.linkedin.com/in/rob-beeler-945ab33/" rel="noopener noreferrer" target="_blank">Rob Beeler</a>. They discuss common terms like phishing, spam, endpoint protection, vulnerabilities, and risks associated with cyber attacks. Rob also stresses the importance of educating yourself and others on these terms to help prevent future attacks.</p><p><br></p><p><strong>What You’ll Learn:</strong></p><p><br></p><ul><li>What are Phishing Cyber attacks, and how Trava’s Phishing Simulator</li><li>What endpoint protection is and tools used to look for security vulnerabilities</li><li>The difference between threats, vulnerabilities, and risk</li></ul><p><br></p><p><strong>Things to listen for:</strong></p><p><br></p><p>[00:56] Rob Beeler's introduction and background in cybersecurity</p><p>[02:22] Explanation of endpoint protection</p><p>[03:15] The importance of understanding terminology</p><p>[05:45] Examples of cyberattacks</p><p>[06:55] The definition of phishing</p><p>[10:42] The difference between phishing and spam</p><p>[11:31] Definition of vulnerabilities vs. threats and risks</p><p>[13:13] Statistics of phishing attacks and their impact on companies</p><p>[14:13] Solutions to stave off phishing attacks</p><p>[15:58] Jara’s receipts</p><p><br></p><p><strong>Connect with the Guest:</strong></p><p>Linkedin - <a href="https://www.linkedin.com/in/rob-beeler-945ab33/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/rob-beeler-945ab33/</a></p><p><br></p><p><strong>Connect with Trava:</strong></p><p>Website - <a href="https://www.travasecurity.com/" rel="noopener noreferrer" target="_blank">https://www.travasecurity.com/</a></p><p>LinkedIn - <a href="https://www.linkedin.com/company/travasecurity/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/travasecurity/</a></p><p>Instagram - <a href="https://www.instagram.com/travasecurity/" rel="noopener noreferrer" target="_blank">https://www.instagram.com/travasecurity/</a></p><p>Twitter - <a href="https://twitter.com/travasecurity" rel="noopener noreferrer" target="_blank">https://twitter.com/travasecurity</a></p><p>Facebook - <a href="https://www.facebook.com/travaHQ" rel="noopener noreferrer" target="_blank">https://www.facebook.com/travaHQ</a></p><p>YouTube - <a href="https://www.youtube.com/channel/UCBqqNS-TSnj2ClgeYdcTKQgrava" rel="noopener noreferrer" target="_blank">https://www.youtube.com/channel/UCBqqNS-TSnj2ClgeYdcTKQgrava</a></p><p>Blog - <a href="https://www.travasecurity.com/blog" rel="noopener noreferrer" target="_blank">https://www.travasecurity.com/blog</a></p>