DiscoverBee Cyber Fit: Simplifying Cybersecurity for EveryoneCybersecurity Awareness: Leadership Impersonation & Business Email Compromise - How It Works and How You Can Avoid Getting Scammed
Cybersecurity Awareness: Leadership Impersonation & Business Email Compromise - How It Works and How You Can Avoid Getting Scammed

Cybersecurity Awareness: Leadership Impersonation & Business Email Compromise - How It Works and How You Can Avoid Getting Scammed

Update: 2023-03-21
Share

Description

Are you familiar with Business Email Compromise (BEC) and the threat that it poses to the Yale community? 

BEC is a form of social engineering designed to trick victims into thinking they have received a legitimate email from an organization or institution.

A simple example is receiving an email that looks like it's coming from your boss, asking you to purchase gift cards.  (You should be suspect if that's not part of your typical job responsibilities.)

But with BEC, it's not coming from your boss, it's actually coming from a cybercriminal.

Sometimes thieves are so convincing that they can motivate us to take action - clicking on a link, revealing personal information or even going to Walmart to buy gift cards.

We want to help the Yale community steer clear of these cyber traps.

Listen to this episode and you'll learn:

▶️ Why universities like Yale are vulnerable to Business Email Compromise
▶️ Why it's so important to be good stewards of Yale data
▶️ How BEC works and how you can steer clear of it
▶️ Our Information Security intern's story of impersonation
▶️ How to respond to a suspicious email with the appropriate behavior


*********
Calls to Action:

Ready to build your cyber muscles? 

Here are simple things you can do:

Send us a text

Learn more about Yale Cybersecurity Awareness at cybersecurity.yale.edu/awareness

Never miss an episode! Sign up to receive Bee Cyber Fit podcast alerts.

Comments 
In Channel
loading
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Cybersecurity Awareness: Leadership Impersonation & Business Email Compromise - How It Works and How You Can Avoid Getting Scammed

Cybersecurity Awareness: Leadership Impersonation & Business Email Compromise - How It Works and How You Can Avoid Getting Scammed

Wendy Battles/James Tucciarone