Authentic-Achievements-Logo-removebg-preview

Authentic Achievements with Special Guest Dr Feliks Kravets

Authentic Achievements with Special Guest Dr Feliks Kravets

Authentic Achievements with Special Guest Dr Feliks Kravets

Navigating the Complexities of Cybersecurity: Insights from Dr Feliks Kravets

In the latest episode of “Authentic Achievements,” the host engages in a compelling conversation with Dr Feliks Kravets, a renowned cybersecurity expert and the founder of Cybersecurity Easycom LLC. This episode delves into the critical aspects of cybersecurity, focusing on social engineering and the human factors contributing to cyber threats. Dr Kravets brings a wealth of knowledge and experience, emphasising the importance of understanding the psychological tactics employed by cybercriminals and the necessity of education in fostering a safer digital environment.

The Importance of Cyber Hygiene

Dr. Kravets begins by highlighting the significance of maintaining good cyber hygiene, akin to physical health practices like handwashing and taking vitamins. Here are some actionable tips to enhance your cyber hygiene:

Stay Informed: Prioritise your time by engaging with credible cyber news rather than spending excessive hours on social media platforms. Staying informed about current events and potential threats can help you recognise and respond to situations that may arise in your digital life.

Privacy Awareness: Be mindful of your conversations around smart devices like Amazon’s Alexa, which can trigger targeted advertisements and suggestions. This awareness can help you protect your privacy in the digital age.

Regular Audits: Conduct regular audits of your online presence. A simple Google search of your name or phone number can reveal a wealth of information, including addresses, tax records, and even criminal backgrounds. Knowing what information is available about you can help you take steps to protect it.

Understanding the Landscape of Cyber Threats

Dr. Kravets elaborates on the various ways in which personal information can be exploited. Here are some key insights:

Data Accessibility: Individuals often underestimate the amount of data available about them online. This accessibility poses significant risks, especially when it comes to targeted attacks.

Phishing Tactics: Cybercriminals often employ broad tactics, such as phishing emails sent to thousands of recipients. These emails create a sense of urgency, prompting individuals to act quickly without fully considering the implications. Be vigilant and recognise red flags in communications that may indicate a scam.

Psychological Triggers: Cybercriminals exploit psychological triggers, making it difficult for individuals to think critically. Understanding these tactics can help you stay alert and avoid scams.

The Role of Education and Communication

Education is paramount in combating cyber threats. Dr. Kravets advocates for proactive measures and open family communication about online safety. Here are some practical steps:

Monitor Financial Accounts: Set up alerts for unusual activity in your financial accounts. This proactive measure can help you detect and respond to potential threats quickly.

Strong Passwords: Teach individuals how to create strong, complex passwords. Weak passwords remain a common vulnerability, so it’s essential to use unique and robust passwords for different accounts.

Ongoing Training: Engage in ongoing training and awareness programs. Dr Kravets’ organisation, Cybersecurity Easycom LLC, offers training sessions on various topics, including email phishing, voice phishing, and the creation of secure passwords.

The Zero Trust Approach

A key concept introduced by Dr. Kravets is the “zero trust” approach to cybersecurity. This philosophy posits that no one should be trusted by default, regardless of location or organisational relationship. Here’s how you can adopt this approach:

Verify Access Requests: Every access request should be thoroughly verified. This mindset is crucial in an era of increasingly sophisticated and pervasive cyber threats.

Assess Digital Habits: Regularly assess your digital habits and be mindful of the information you share. Fostering a culture of skepticism and vigilance can help you better protect yourself from potential threats.

Conclusion and Call to Action

As the episode draws close, the host expresses gratitude for Dr. Kravets’ insights and emphasises the importance of understanding social engineering and its implications for personal safety. Dr. Kravets reiterates the need for continuous education and awareness in cybersecurity. He invites listeners to reach out to him for further guidance and training, emphasising that his organisation is dedicated to helping individuals and groups navigate the complexities of cyber safety.

Key Takeaways:

Stay Informed: Engage with credible cyber news to stay updated on potential threats.

Privacy Awareness: Be mindful of the information you share and your conversations around smart devices.

Vigilance: Recognise red flags in communications and be aware of psychological triggers used by cybercriminals.

Education: Foster open communication within families about online safety and engage in ongoing training.

Zero Trust: Adopt a zero-trust approach by verifying every access request and assessing your digital habits.

By following these actionable tips and fostering a culture of awareness and vigilance, you can better protect yourself and your loved ones from the ever-evolving landscape of cyber threats. Dr. Kravets’ expertise and practical advice provide valuable tools for anyone looking to enhance their cybersecurity and social engineering understanding.

Call to Action

If you enjoyed this episode, please like, share, rate, and review Authentic Achievements on your favourite platform, Apple, Spotify, or YouTube. Your support helps us reach more listeners and continue bringing you inspiring conversations with incredible guests like Dr Feliks Kravets. Don’t miss out on our future episodes—subscribe now!

With our inspiring content, you can start your journey towards authentic achievement today. Tune in and get inspired!

If you enjoyed this, you might like to subscribe to our newsletter, visit our YouTube Channel or Podcast or read our latest work.

Transcript:

0:00[Music] [Applause]

0:07hello and welcome to today’s episode of authentic achievements where it’s my absolute Delight to be joined by The

0:14Fabulous Dr Felix creest Felix welcome H thank you for introduction

0:20great to um have you and thank you for an opportunity to talk to and to

0:25listeners oh it’s my pleasure and I know it’s going to be fascinating because we’ve already had a number of chats and

0:31I learned so much in all of them but before I get carried away and stuck getting stuck into that conversation let

0:37me share a little bit more about you with the wider audience who might not have had the privilege of getting to

0:42know you yet so Dr Felix Katz is the founder and head coach of cybercity

0:47easy.com LLC it’s dedicated to enhancing Community cyber safety and social

0:54engineering awareness recognizing the urgent need for improved understanding in this field Dr Kat aims to simplify

1:01cyber security Concepts covering essential topics like emails SMS phone

1:06calls passwords Ai and more with a diverse background as a senior executive startup advisor and educator he brings

1:14in valuable experience roles at AT&T the University of poac and numerous

1:19educational institutions holding a doctorate in business administration and a project management degree Dr Katz is

1:26committed to making cyber security accessible for all and I mean that’s quite a quite a journey that you’ve been

1:32on but I mean what a huge thing as as a m are you’re trying to navigate cyber

1:39security and all the all the nuances of that are you always always Forefront of

1:45my mind and I know we’ve ched about those before but before we get stuck into those can you tell us a little bit about your journey so far and What’s led

1:51you here yeah thank you thank you it’s a great question um before we continue I

1:57just want to say that thank you for all the C and I probably deserve very small portion of it because we only covers Cy

2:05not the whole cyber security but very very part small part of it which is social engineering I don’t want to take

2:11credits for being computer programmer which I’m not and we’re not helping with coding with application um we only do

2:20human factor okay so that is a very very small part of it but in the same time I

2:26truly believe it’s highly important because over 90% of all cyber attacks

2:31utilizing human factor you can make best programs in the world but people

2:38always um I don’t want to say mess it up but they will they will do something

2:44which will cause um the whole system not to properly work so we specifically deal

2:50with training people and uh companies and how to be safe in terms of social

2:57engineering it’s a human to human interaction it’s a attempt to lie or to

3:04provide wrongful information to pretend to be someone else in order to get your

3:10personal data um I believe it’s a big deal I was in education for many years and I noticed it’s issue not only with

3:18students with professors with administrators of major colleges it’s a

3:23um situation where criminals are getting smarter and smarter and none of us can

3:29really predict what they will come up with next so we’re all kind of um um

3:36following their steps in order to learn more and the only way to be ahead of it

3:43is to know what they’re doing and how they do it so we can recognize those threats moving forward I think it’s a

3:49huge deal and I try to make my little

3:55steps to help to this big movement of helping others which invol multiple

4:01organizations uh from government agencies to private um organizations and

4:07educational institutions to help all of us understand how to be safer when we

4:14turn on computer or pick up the pH it’s it’s such a big thing isn’t it and I think we get so scared of

4:21technology and computers and and what they’re going to do and and you where they could go but but you make an

4:27interesting point actually very often it’s not the computer but it’s the individual that’s interacting with the

4:34computer somewhere else so not the NG user but somewhere else that’s um

4:40altering how it’s supposed to work that causes the bigger problem would that have I understood that correctly sure

4:47sure that is exactly so human factor it’s us you know who pick up the phone and it’s our choice to trust when we

4:55talk into someone who saying I’m calling from the bank or not to trust and uh in

5:01today’s technology your cell phone will show color ID will show you bank and you

5:08know they have so many more technological tricks that we you know in

5:14many cases fall you know into their ways to get us no matter how educated we are

5:22is that I mean they can be so clever can’t they and then can look so subtle and um you know I feel I always feel

5:28very oldfashioned in the fact that I don’t respond to anybody I go back on

5:34check on the main web website and phone the number that’s on there which I appreciate probably makes me not FY

5:41doing um but having worked in financial services for 25 years it was the only

5:46way that you could guarantee you were getting where you were supposed to go because they got you know scams have

5:52have been clever for for you decades um even before technology got so clever

5:58people were always think thinking of ways round ways to outsmart ways to um

6:04you to commit fraud or to get information that they weren’t supposed to and I think Technology’s made that

6:10easier um for them but the the issue remains and it’s the human desire to do

6:18that that’s the biggest problem isn’t it rather than the computer’s desire to do

6:25that so so how do how how is it best for people to get started to even understand

6:31you because we’re starting to hear a lot about um cyber security but but less about the nuances of it as as evidenced

6:38by the by the stop um and it’s easy to kind of get it all limped into that one

6:44big bucket isn’t it it all sits in there it’s all cyber security but as you’ve clearly pointed out that there’s nuances

6:51of it and that that’s U as with most things the devil I guess is always in the detail so if we don’t understand

6:58that we can leave ourselves exposed would that be fair sure sure and it’s a very good

7:04point and um as I mentioned we cannot really understand 100% what another side

7:10is doing because they comic up with a new and more clever rcks no matter how

7:16smart we are no matter how much we read no matter if we work for the police or for federal agencies and spending 24

7:24hours a day to learn about all other tricks that criminals doing they will

7:31come up with new tricks as we speak it’s like a antivirus you know you can make the best antivirus in the world but

7:37while you’re doing this criminals will come up with new viruses and it’s a so

7:43it’s a it will always behind um of what

7:49criminals doing so the only way to kind of think of um the only way to be safer

7:58would be to change our own psychology to look at it with a through the prism of

8:05not trusting so zero trust approach zero trust is the the only way to be safe now

8:13in nowadays unfortunately like we’re telling to our children when they walk on the street if the car stops and

8:20somebody’s saying you know come here you know the child should not trust it

8:25should you know run the same way you know it’s a are we on the Internet or we receiving

8:32phone calls as adults and somebody telling us I’m calling from government

8:37agency from X agency from police from federal agency and you will be arrested

8:43or you have to pay money now you know what is a credit card number or you know somebody from your family members you

8:50captured by you know mob or Mafia and you have to pay you know so they coming

8:56up with all type of different tricks utilizing our um personal you know feelings and uh

9:04it’s it’s a psychological game of you know making us believe that family

9:10member in trouble or making us feel that we would like to donate money because it’s a good cause and uh or would like

9:18to switch and save money from one insurance company to the different insurance company and it’s last minute

9:24offer so um there’s multiple ways to make us believe you know it to uh to

9:33respond and to share our personal and financial information so and again we

9:39don’t know what next phone call can come up with and in with voice cloning a

9:46voice cloning you know people might hear the screams on the back which matching to family members voice to children and

9:53to you know spouses and you know so they com up all type of different rcks that

10:00really make all of us sensitive nice people to believe into that you know

10:07with no matter how um you know and again psychologically trying to make it very

10:13strong and very time senstive so the only way to do it to kind of get out of

10:20this line of communication is to take notes and to hang up no matter how hard

10:25it is uh not to believe and to to hang up and then make other phone calls to

10:32the bank or to the police or to whoever they claim to present to verify this

10:38information so um but zero trust is the major component of the

10:45industry professionals who work in this field as a main recommendation to stay

10:51away from um you know from those games and unfortunately those games now

10:57touching our children with a extortion they touching our erand um you know teic

11:05to be financial institutions and insurance companies so all our family members are targeted from children to

11:13parents and grandparents from businesses to random people on the street so it’s a

11:20we have all have to be in it’s a big business and people might be calling from other countries from countries

11:26where it would be difficult for local uh law enfor enforcement enforcement

11:32people to go there and to try to find somebody in middle of that specific country because it’s different law it’s

11:38different uh country there’s no way to really you know get there in 30 minutes

11:45somebody so there’s big calling centers operating in multiple countries

11:50specializing in targeting you know professionals and people in uh in many

11:56developed countries and they work in 247 they providing training they have hundreds of employees you know so it’s

12:02it’s a big business unfortunately it’s it’s amazing and I

12:07think you know you you talk about that zero trust piece and it is true you know I have this conversation with my little

12:13girl and and her little friends all the time um when they’re like oh if you tell them not to do something it’s like do

12:18you not trust us it’s it’s not you I don’t trust it’s everybody else that I don’t trust um because if you just

12:25understood how complex and uh and integrated and heavily layered it is and

12:31I remember um you they play on they play on fear of some kind that they fear of

12:36missing out or fear of somebody being harmed or fear of getting into trouble particularly if they phone up and say

12:43that they’re you know from a government agency or the police like you say you know immediately on the heightened fear

12:49that you’re going to get something wrong and get a fine or something that you know that that you should have done

12:54differently and that seems to switch off a part of your brain that listens to the logical what’s going on and how

13:00realistic is this situation into the oh my goodness what if that happens and then and then they’re driving into that

13:07fear is that what drives so many of us to

13:12um not be on our guard perhaps as tightly as we

13:17should sure sure yes it’s it’s a a great point and like I said no matter what we

13:23tell our children or our parents or grandparents you know when they receive the phone call or email email or text

13:29message in many cases it’s that’s not always situation where we tell them

13:35don’t believe don’t give your credit card information don’t talk to strangers it might be child who or somebody who

13:42put a child to talk to another child um and start from conversation like how are

13:49you you look cute where you from how old are you you know you at home alone and

13:54little by little get into relationships you know and then go through um you know all type of uh ways to you

14:03know to collect video data which later will be used you know against the child

14:10and um you know in United States one of those um top crimes that you know FBI is

14:17uh currently targeting called extortion where you know children get into you know claes or in team relationships

14:24through you know video channel oneon-one and then one of them is actually recording all of this and after uh a

14:31recording has been completed targeting another child asking for money or this

14:37video will be exposed in a social media in school so prior they have a little

14:43conversation a little relationships um a little kind of leading to say oh it’s

14:48safe to do it because we in different countries maybe nobody will know you know why not nobody parents not will not

14:56see us so they basically there is unfor for criminals Have No Boundaries

15:01nowadays they Crossing all red lines you know of anything human that we can think

15:07of in order to try to get this money and uh over 25 hits you know suicide kill himself

15:15last year in United States based on FBI data just because of that and um you know the this agency was trying to stop

15:22and I think over 1500 you know cases who were you know the monitoring to didn’t

15:27go that you know to that point but um it’s a big deal and unfortunately you

15:33know it’s a developed countries we work parents Working Day and Night children utilizing technology since they three my

15:40child one of my kids were three and a half years old he was still not party trained he was in diapers going to you

15:47know education institutions they gave him iPad so they give children technology

15:53prior to being party trains nowadays and um we you know we have to train them

16:01explaining them you know all the all those dangerous tricks and I believe

16:06that Educational Systems are far behind with doing this unfortunately not only with kid children but with adults and

16:14with seniors as well it’s true and children pick it up so quickly don’t they I mean I remember um my little girl

16:21when she was probably about 18 months and we were on the phone to my mom and dad and she she reached over and and

16:29expanded the picture so she could see them better it was at the time it wasn’t FaceTime or anything it was literally

16:34just their contact picture and I was like who shows that clearly she’s just watched she’s watched um other people on

16:42devices but but you’re like wower um so how do you what are some steps we can

16:48take to um to help keep our families safe to keep our children our parents in

16:54a in a more secure environment

16:59yeah it’s a very good question and um in addition to schooling system which we

17:05cannot change and schools have to you know get to the point where they should

17:10be told children from day one that uh you know not turning on the camera not

17:17turning on the mic not believe that you know the screen name is necessary the

17:23name of the actual person who maybe they know or you know previous neighbor or

17:28somebody’s child so to explain that there’s bad people who you know who are

17:34trying to get do bad stuff um so and um

17:40another thing is in addition to making kids aware that you know there is a bad

17:45people and they doing bad stuff and nobody can stop them to try to do it

17:50against them also to build try to build relationships to ask kids you know what

17:57how was a day you know not to tell them go do your homework you know and scream

18:02on them how come you didn’t do it yet you know get me your phone not to um reinforce this discipline which they

18:10really need but also be a friend and uh try to talk to them TR to tell them your

18:17own story maybe even make up make up some stories you to kind of lead them or

18:23explain them about this type of situation I wrote a few books on Amazon to or younger children you know of age

18:32under 10 on how to create your spw word and how not to turn on the camera and

18:38not to turn on the mic but um you know it’s much bigger and unfortunately Just Books would not you know help it should

18:45be communication it should be trust for children to listen and to um to

18:52understand and to um you to get a point and last I mentioned bad thing is

18:58everybody’s working so many hours and many children on their own and in if they have a cell phone in hands there’s

19:05no way especially many kids in the household there’s no way to for parents to know what each one of them doing on

19:11the cell phone uh and there all this m messaging systems and um video messaging

19:18it’s very difficult to control so building up this communication Channel

19:24with children um is a main way to to

19:29kind of um at least to have more chances to be

19:34told or to be aware of what is going on and to explain them you know what not to

19:40do yeah that makes total sense because I think like with most things when we’re educating ourselves or our children is

19:48it’s it’s in the consistency isn’t it of of the information it’s in keep

19:53repeating it so that we can get I’m not supposed to do that and here why and I I love that you shared about putting the

20:00stories in because that really resonates with with us whatever our age um because once we hear a story we can start to see

20:07ourselves within the story can’t we so we can it makes very complex things like

20:12um cyber security like social engineering um suddenly feel when I say

20:17less scary I don’t mean less scary I mean they start off they’re scary because they seem to be something you

20:24could never understand once you understand them in the way that You’ explained it they become scary because they’re scary that what could actually

20:31what could actually happen but actually you now feel a bit more in control and a bit more able to navigate some of those

20:40challenges yeah very very good point s and I just wanted to mention that it’s not only specifically related to

20:45children adults I also Target all type of extortion and sex tortion type of um

20:53approaches where people receive emails saying I saw you on a camera I monitoring a camera your microphone um

21:00you know there’s multiple spyware um there’s applications that we’re downloading on our cell phones assuming

21:08oh it’s free why not to use it and it comes with access you to your um mic

21:15access to your camera and uh we’re looking at the big people who own billion dollar companies in the United

21:21States when uh they making photo pictures sitting at home you can see the laptop with a little tape on a on a

21:29camera or say have a cell phone with a little tape on a mic and you will think like oh wow if you know if this people

21:36doing this you know they probably know what they’re doing um because you know not talking about government agencies

21:43but um hackers can easily get into our phone and our camera and our mic you

21:50know and a very highly easy nowadays and there’s no way to really you know

21:56control it or to know what happening yeah when we talk about ourself that is

22:02issue for big corporations it’s much more issues because it’s not I always

22:07saying attackers on cyber security is not that you you walk on a street and

22:14you realize you have no wallet in your purse or in your pocket you know because somebody stole it it’s not data is there

22:22when you log in everything is working so but attackers made a copy of this so

22:28it’s it takes time to for corporations to even realize that they is stolen you

22:35know because the made copy and they left so takes month and month of work of

22:41professionals to determine it in many cases it’s not happening for month and month until it happens so uh and

22:49everybody is targeted you know in United States the government agencies the federal agencies working on the top of

22:56the country data was hard the full data was you know was taken out

23:02as a as a part of the you know attack and you know what you know if we’re

23:08talking about a single user or family or small business you know we not we not

23:14we’re vulnerable and there’s no way to be 100% secure and safe but it’s still

23:20better to understand what is going on it’s like Health we cannot 100% guarantee we will never get a flu we

23:27will never you know get sick but you know if you wash your hands if you you

23:32know eat vitamins or whatever you do it makes you better so the point is of all

23:38of this conversation to make you up to speed and to spend some time instead of

23:43Facebook and Instagrams all my respect to social media spend some time and read

23:49cyber news of what is going on just so if something happened it might click in

23:54the head oh I read something similar so maybe that is similar case and that is a

24:00way to go yeah well it is isn’t it I mean educating oursel is is always King

24:05and I think you’re right you know often makes me smile that you know I’m I think

24:11I’m in a you having normal conversation with friends and things you might mention something and then all of a

24:17sudden everything that goes into your mailbox everything goes on all your social media is that thing you were

24:22talking about you’re like hello did you go um or you know I own up I’ve got a

24:28couple of alexas in the house because they work brilliantly um but the amount of time she pipes up in a conversation

24:34and goes I don’t know i’ help you with that and I was like I didn’t ask you to I didn’t say Alexa you’re supposed to wait for the command aren you um that

24:42just makes you think you know used to think years ago that that to your point earlier that Post-It note over your

24:49camera or the your Post-It note over your microphone were your paranoid

24:54conspiracy theorists but actually maybe they maybe they little more than um than we gave them credit

25:02for yeah yeah and um I believe I mean I believe it’s back to

25:081999 the CEO of some Microsystems um at that time I think his

25:14name is Scott McNelly he said you have no privacy anywhere get over this at

25:20that time you know people were really upset that he said it because you know that time United States everybody was

25:25talking about privacy and you know this and that but if you think about it we

25:30don’t have any privacy nowadays and uh you know your cell phone with your mic is you know Target for attackers to you

25:39know to access it video camera and our GPS where we see ourself on a GPS anybody who hug the system can see

25:46ourself too you know my intern maybe our children location with GPS that they have everybody can do the same you know

25:53we have phone conversations people can listen if they ho it in email systems log in so um but my point is just to

26:03monitor what is going to with your financial parts and with your family members to sign up for you know system

26:10to be alarmed if somebody take money or you know pay bill or balance the changes

26:17on your checking card or on a credit card you know to have ability to communicate to Children see where they

26:24are and you know tell them let let us talk to your friends and see how you WR

26:29it you know let me help you you know or you know try to kind of monitor things

26:35around and um that’s probably the best way to to do it but assumption that

26:41people don’t know something about us is completely uh fa you know it’s if you

26:47leave in United States you Google your first last name I mean I’m telling my students have have Google your first

26:53last name where Google your phone number or your email address even without pay

26:58think you know5 $10 you can just find almost anything about you where you live

27:04how much you taxes you pay for your house your family where you work your email your age you know and if you pay a

27:13few dollars you can get background check you know marriages divorces criminal

27:18background check it’s a you know all information is available for sale just

27:23for a few dollars just um so if if somebody’s targeting someone else own

27:29purpose specifically it’s almost impossible to really uh catch you know

27:35this but majority of attackers don’t do don’t do Targets on a specific person

27:41except if as a CEO or major company normally they just send multiple emails

27:46through hundred of thousand emails with saying hello without your name on it and

27:52saying oh you will be arrested or your balance on a check account or you know your bill was not you know crit card was

27:59bounced so they so look for those um when you get this typ communication look

28:05for those red Flex maybe you know stressing you to make decision

28:10immediately you know offering different phone number from One on a website and

28:16uh not to follow those stressful pushes to make decisions

28:21ASAP that is such great advice Dr Felix and I’ve I always do learn so very much when I chat with you I question running

28:29running out of time so how do people um get in touch with you and work with you and and who is it you

28:36help oh thank you thank you for this question so we basically coach um

28:41individuals and groups on the Cyber safety so we have different topics for

28:47each U training session um one can be email fishing through email and can be

28:55fishing through phone calls and uh voice fishing um voice cloning links and fake

29:02websites uh passwords which is biggest thing you know [Music]

29:09um thousands of people have password which is what password or one to three

29:14four five six or so um we train people to make passwords you know more complex

29:21and secure so um we do it remotely and locally in person as well um so the best

29:27way to um get us doing this is to email me at info cybercity easy.com it’s on

29:37our website cybercity c.com or to call using number there as

29:42well um and uh we will be happy to work with senior facilities with businesses

29:49with individuals uh with education institutions training teachers how to

29:55teach those courses to students uh um anybody who is interested will be happy

30:01to to copyright and to work together amazing thank you so much and

30:07obviously we will make sure that all those details are available in the show notes below so that people can easily um

30:14get in touch with you and and um work through how do they find their way through the maze that is um social

30:22engineering and find their way back to safety um Dr Felix it’s been a pleasure

30:28as always I look forward to next time and thank you for coming on and sharing your Insight and giving us more more

30:35understanding and more education into into what is social engineering why it’s

30:41important and why we should learn more about it so thank you thank you very much for inviting me and stay safe

30:48always check and utilize your trust approach thank you absolutely until next

30:54time everybody thank you so much

31:00ah

English (auto-generated)

Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.