Season

Season 5

Home VPN Security

Lock Before You Walk

Learn corporate device security and WFH best practices after a remote worker’s laptop causes a cyber attack on a hospital’s patient data. Guest: Alex Thomas.

Season 5, Episode 12

Social Media

Home Phished

A Suprema hack exposed millions of users’ biometrics. A PhenoScan employee falls for spear phishing, leading to business infiltration. Learn to stay safe.

Season 5, Episode 11

Man in the Middle Attack

GPS Distress

A ransomware attack on NavTerrain strands a mountaineer on Mt. Everest after a “Man-in-the-middle” hack via Chatbot. Guest stars detail the MITM attack.

Season 5, Episode 10

Phishing, Smishing, & Vishing

Death Smish

The “Blueleaks” hack exposed sensitive police data, blowing the cover of undercover agent Diana. The attack started from a malicious text message.

Season 5, Episode 9

401K Scams

401 Chaos

Fraud-related losses, including 401K fraud, totaled nearly $17B in 2019. Follow Celeste as she is surprised to become a victim and learn how to protect yourself.

Season 5, Episode 8

Phishing, Smishing, & Vishing

House of Fraud

Cybercriminals are using home title fraud. A hacker uses a spoofed website to get personal information, fraudulently transfer ownership, and take out loans.

Season 5, Episode 7

Money Mule Scams

Charity Case

A COVID-19 charity volunteer unknowingly becomes a money mule, transferring illegally acquired funds for a criminal organization and getting arrested for money laundering.

Season 5, Episode 6

Email Attachment Threats

Scams Gone Viral

Hackers exploit crises by using email attachments to steal savings. An unsuspecting user opens a COVID-19 related file, resulting in devastation.

Season 5, Episode 5

Physical Security

Let's Get Physical

Physical security is vital with remote work. Stay vigilant, adhere to policies, and report violations, as threat actors exploit courteous and trusting employees.

Season 5, Episode 4

Business Email Compromise (BEC)

A Compromising Crash

Be wary of patient hackers who lie dormant in compromised accounts, learning about you for an attack. Never let your guard down with sensitive requests, especially urgent ones.

Season 5, Episode 3

Macy’s Breach

Passphrase For Days

Hackers target Lacy’s after a new employee posts about their job. They used an easy to crack, recycled password for access.

Season 5, Episode 2

Social Engineering

Hook, Line and Spoofer

Telephone scams use emotions, urgency, and legitimacy. Lloyd felt something was wrong, but specific details convinced him the call was real.

Season 5, Episode 1

Want Training They’ll
Actually Watch?