Welcome to the latest episode of the Business and Bytes Podcast. Today, we delve into a critical and timely topic: the recent wave of cyberattacks on telecom companies, reportedly orchestrated by Chinese hackers, and what it means for businesses and individuals alike. I'm your host, John Hansman, joined by my co-host, Emelio Mejia, CEO of AM3 Tech and Cybersecurity, and cybersecurity expert Todd Thorson from Tang Cyber Security.
In this episode, we'll explore how these breaches impact the security of your personal and business communications, the vulnerabilities in our digital infrastructure, and the escalating measures needed to protect sensitive data. We'll hear insights on the importance of security and awareness training for employees, the effectiveness of multiple security layers, and why relying on professional technology consultants is crucial for robust cybersecurity.
Our discussion will touch on the rise of phishing attacks, the economic toll of cyber scams, and the subtleties of messaging security—with recommendations for safer communication practices. Join us as we unpack these issues, bringing you up to date on how to fortify your defenses in an increasingly perilous digital landscape.
Security and awareness training, cybersecurity risks, data transmission security, security layers, professional consultation, telecom breaches, Chinese hackers, Emilio Mejia, Todd Thorson, Tang Cyber Security, AM3 Tech and Cybersecurity, AT&T, Verizon, SMS text vulnerability, RCS messaging, encrypted messaging, WhatsApp security, outdated devices, government espionage, IT support, comprehensive security services, proactive cybersecurity, phishing attacks, cyber-attacks, data breaches, responsibility for cybersecurity, small business cybersecurity, phishing attack volume, economic impact of cyber scams, government-sponsored hacking, social engineering risks.
00:00 Business podcast hosts discuss telecom breaches.
03:47 Hackers spying on conversations; SMS insecurity acknowledged.
09:10 Chinese-sponsored hackers pose threat using information.
11:31 Avoid sending sensitive information via text/SMS.
16:36 Espionage reveals telecom vulnerabilities; protection needed.
17:40 Even huge companies struggle with cybersecurity protection.
22:04 Frequent security attacks blocked successfully. Client surprised.
25:32 Focus on security and awareness training education.
29:55 Ensure data transmission security and encryption tools.
32:50 Prioritize security; diversify and plan wisely.
34:16 Prioritize cybersecurity in IT support services.
True Crime Tonight
If you eat, sleep, and breathe true crime, TRUE CRIME TONIGHT is serving up your nightly fix. Five nights a week, KT STUDIOS & iHEART RADIO invite listeners to pull up a seat for an unfiltered look at the biggest cases making headlines, celebrity scandals, and the trials everyone is watching. With a mix of expert analysis, hot takes, and listener call-ins, TRUE CRIME TONIGHT goes beyond the headlines to uncover the twists, turns, and unanswered questions that keep us all obsessed—because, at TRUE CRIME TONIGHT, there’s a seat for everyone. Whether breaking down crime scene forensics, scrutinizing serial killers, or debating the most binge-worthy true crime docs, True Crime Tonight is the fresh, fast-paced, and slightly addictive home for true crime lovers.
Dateline NBC
Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com
Stuff You Should Know
If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.