Despite advancements in technology and pace of innovation in the market, Ebrahim says many individuals and businesses continue to fall prey to old techniques. Email compromise and fake online enrichment scams still catch people out in 2022.
He advocates for making sure that businesses keep a record of all devices and people registered on a network to ensure that these elements can be monitored effectively.
“We can’t protect what we cannot see,” Ebrahim says.
Topics of discussion include: Trend Micro’s business model; trends and advancements in cybersecurity; practical cases and scenarios detailing how criminal actors tend to infiltrate businesses and the techniques used; and thoughts about how best protect a company’s systems from attack.
Ebrahim spends some time explaining the merits for getting rid of passwords. Globally, there is a move by Microsoft, Apple and Google to get rid of this authentication method.
Engage on Twitter at #BDSpotlight
Subscribe: iono.fm | Spotify | Apple Podcasts | Pocket Casts | Player.fm
Business Day Spotlight is a MultimediaLIVE production.
Business Day Spotlight
PODCAST | Securing your business against old digital security vulnerabilities
Mudiwa Gavaza is joined by Zaheer Ebrahim, a senior sales engineer at Trend Micro
Image: 123rf.com
Old digital security vulnerabilities that business still succumb to are the focus of this edition of the Business Day Spotlight.
Our host Mudiwa Gavaza is joined by Zaheer Ebrahim, a senior sales engineer at Trend Micro.
Trend Micro operates as a cyber security software company. It has headquarters in Japan and the US, and is ranked as one of the world’s top cyber security firms by IDC and research outfit Gartner.
Join the discussion:
Despite advancements in technology and pace of innovation in the market, Ebrahim says many individuals and businesses continue to fall prey to old techniques. Email compromise and fake online enrichment scams still catch people out in 2022.
He advocates for making sure that businesses keep a record of all devices and people registered on a network to ensure that these elements can be monitored effectively.
“We can’t protect what we cannot see,” Ebrahim says.
Topics of discussion include: Trend Micro’s business model; trends and advancements in cybersecurity; practical cases and scenarios detailing how criminal actors tend to infiltrate businesses and the techniques used; and thoughts about how best protect a company’s systems from attack.
Ebrahim spends some time explaining the merits for getting rid of passwords. Globally, there is a move by Microsoft, Apple and Google to get rid of this authentication method.
Engage on Twitter at #BDSpotlight
Subscribe: iono.fm | Spotify | Apple Podcasts | Pocket Casts | Player.fm
Business Day Spotlight is a MultimediaLIVE production.
MORE:
PODCAST | Life sentences & long-awaited trials: progress in several high-profile cases
PODCAST | Contestation for the Zulu throne set to intensify
PODCAST | The profiler diaries 2: From crime scene to courtroom
Would you like to comment on this article?
Sign up (it's quick and free) or sign in now.
Please read our Comment Policy before commenting.
Most read
Latest Videos