{"id":6643,"date":"2022-05-20T14:19:25","date_gmt":"2022-05-20T18:19:25","guid":{"rendered":"https:\/\/joindeleteme.com\/blog\/?p=6643"},"modified":"2024-06-13T09:03:06","modified_gmt":"2024-06-13T13:03:06","slug":"webinar-new-strategies-for-mitigating-phishing-risk","status":"publish","type":"b2b-post","link":"https:\/\/joindeleteme.com\/business\/blog\/webinar-new-strategies-for-mitigating-phishing-risk\/","title":{"rendered":"Webinar Recap: New Strategies for Mitigating Phishing Risk"},"content":{"rendered":"\n<div class=\"wp-block-rank-math-toc-block uk-card-default uk-padding\" style=\"font-size:16px\" id=\"rank-math-toc\"><h4>Table of Contents<\/h4><nav><ul><li><a href=\"#on-may-19-2022-we-had-the-privilege-of-hosting-a-webinar-discussing-how-personal-information-especially-that-which-is-found-on-the-open-web-feeds-into-the-ever-growing-corporate-risk-of-phishing-attacks\">On May 19, 2022, we had the privilege of hosting a webinar discussing how personal information, especially that which is found on the open web, feeds into the ever-growing corporate risk of phishing attacks.<\/a><\/li><li><a href=\"#if-youre-interested-in-listening-to-the-full-webinar-on-mitigating-phishing-risk-with-rob-and-roger-the-recording-is-available-on-demand-now\">If you&#8217;re interested in listening to the full webinar on mitigating phishing risk with Rob and Roger, the recording is available on demand now.  <\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n<p>Security professionals are working hard to defend their organizations from cyberattacks through a combination of training, policies, and technology. But, despite all that work, phishing attacks still account for 70-90% of all malicious data breaches.<\/p>\n\n\n\n<p>Why? In short, threat actors are innovators&#8230;but not in a good way. They spend considerable time and effort gathering detailed personally identifiable information (PII) on their intended targets and they are constantly innovating on ways to leverage it. They need to know all the personal details about the executives and employees they\u2019re targeting. Details about the targets\u2019 background, relationships, and family, their shopping habits and interests, their frequent business contacts and partners, all feed into the social engineering strategy.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"on-may-19-2022-we-had-the-privilege-of-hosting-a-webinar-discussing-how-personal-information-especially-that-which-is-found-on-the-open-web-feeds-into-the-ever-growing-corporate-risk-of-phishing-attacks\">On May 19, 2022, we had the privilege of hosting a webinar discussing how personal information, especially that which is found on the open web, feeds into the ever-growing corporate risk of phishing attacks.<\/h4>\n\n\n\n<p>Our speakers <a href=\"https:\/\/www.linkedin.com\/in\/rogeragrimes\/\" data-type=\"URL\" data-id=\"https:\/\/www.linkedin.com\/in\/rogeragrimes\/\" target=\"_blank\" rel=\"noreferrer noopener\">Roger Grimes<\/a>, Data-Driven Defense Evangelist at&nbsp;<a href=\"https:\/\/www.knowbe4.com\/about-us\/\" data-type=\"URL\" data-id=\"https:\/\/www.knowbe4.com\/about-us\/\" target=\"_blank\" rel=\"noreferrer noopener\">KnowBe4<\/a> [the world\u2019s first and largest New-school security awareness training and simulated phishing platform that helps you manage the ongoing problem of&nbsp;<a href=\"https:\/\/www.knowbe4.com\/what-is-social-engineering\/?hsLang=en\" target=\"_blank\" rel=\"noreferrer noopener\">social engineering<\/a>], and&nbsp;<a href=\"https:\/\/www.linkedin.com\/in\/rob-shavell-494749\/\" data-type=\"URL\" data-id=\"https:\/\/www.linkedin.com\/in\/rob-shavell-494749\/\" target=\"_blank\" rel=\"noreferrer noopener\">Rob Shavell<\/a><strong><a href=\"https:\/\/www.linkedin.com\/in\/rob-shavell-494749\/\" data-type=\"URL\" data-id=\"https:\/\/www.linkedin.com\/in\/rob-shavell-494749\/\" target=\"_blank\" rel=\"noreferrer noopener\">&nbsp;<\/a><\/strong>, CEO of&nbsp;<a href=\"https:\/\/business.joindeleteme.com\/\" data-type=\"URL\" data-id=\"https:\/\/business.joindeleteme.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">DeleteMe<\/a>, gave us many important takeaways; including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Publicly available PII Is a growing source of phishing risk for organizations<\/li>\n\n\n\n<li>Passwords and multi-factor authentication&nbsp;(MFA) are easier to hack than most think<\/li>\n\n\n\n<li>The more PII that can be removed off the internet, the better off you\u2019re going to be against all types of social engineering attacks<\/li>\n\n\n\n<li>Risk-mitigation should be a mix of workforce training &amp; active PII-protection<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"if-youre-interested-in-listening-to-the-full-webinar-on-mitigating-phishing-risk-with-rob-and-roger-the-recording-is-available-on-demand-now\">If you&#8217;re interested in listening to the full webinar on mitigating phishing risk with Rob and Roger, the recording is available on demand now.  <\/h4>\n\n\n\n<p>If you&#8217;d like a copy of the slides from the webinar, <strong><a href=\"https:\/\/business.joindeleteme.com\/protect-your-employees-today\" target=\"_blank\" data-type=\"URL\" data-id=\"https:\/\/business.joindeleteme.com\/protect-your-employees-today\" rel=\"noreferrer noopener\">contact us<\/a><\/strong> and let us know!<\/p>\n\n\n\n<div id=\"bigmarker-conference-widget-container770a33ce0c8a\"><\/div><script src=\"https:\/\/www.bigmarker.com\/widget\/register_widget.js?club=deleteme1&amp;conference=770a33ce0c8a&amp;widget_type=image_register&amp;series_register=&amp;upcoming_sub_title=&amp;live_sub_title=&amp;rec_sub_title=Webinar%20Recording&amp;upcoming_button_text=&amp;live_button_text=&amp;rec_button_text=View%20Recording&amp;link_to_channel=true&amp;widget_width=&amp;widget_height=&amp;enable_iframe=true&amp;background_color=ffffff&amp;btext_color=2d374d&amp;link_color=1089f5&amp;ltext_color=ffffff&amp;redirect_to_confirmation_page=0&amp;widget_button_registered_content=&amp;widget_webinar_descriptions=&amp;widget_redirect_type=redirect&amp;cid=ac76a1cceb3c\" type=\"text\/javascript\"><\/script>\n","protected":false},"excerpt":{"rendered":"<p>Security professionals are working hard to defend their organizations from cyberattacks through a combination of training, policies, and technology. But, despite all that work, phishing attacks still account for 70-90% of all malicious data breaches. Why? In short, threat actors are innovators&#8230;but not in a good way. They spend considerable time and effort gathering detailed [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":6644,"menu_order":0,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"b2b-category":[45],"class_list":["post-6643","b2b-post","type-b2b-post","status-publish","format-standard","has-post-thumbnail","hentry","b2b-category-resources"],"acf":[],"_links":{"self":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/b2b-post\/6643","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/b2b-post"}],"about":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/types\/b2b-post"}],"author":[{"embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/users\/16"}],"version-history":[{"count":0,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/b2b-post\/6643\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/media\/6644"}],"wp:attachment":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/media?parent=6643"}],"wp:term":[{"taxonomy":"b2b-category","embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/b2b-category?post=6643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}