All Episodes

March 17, 2025 38 mins

Send us a text

Knowing what mitigations to have ahead of a cyberattack is one step in many as cybercriminals exploit vulnerabilities on mobile devices, computers and entire operations. Learn about the cyberattacks individuals and organizations face today from Kit Professionals' Hunter Geerts. 

Listen for: 

1:20 Attack methods

12:18 Ransomware and phishing, with a side of mitigation

25:27 VIP impersonation, payroll and vendor fraud, and credential phishing

33:22 Finale - Three quick questions

Connect with Hunter Geerts
LinkedIn | Website | Facebook | Instagram

Connect with Tim Conrad
LinkedIn | Website | Facebook | Instagram 

Mark as Played

Advertise With Us

Popular Podcasts

Crime Junkie

Crime Junkie

Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're a seasoned true crime enthusiast or new to the genre, you'll find yourself on the edge of your seat awaiting a new episode every Monday. If you can never get enough true crime... Congratulations, you’ve found your people. Follow to join a community of Crime Junkies! Crime Junkie is presented by audiochuck Media Company.

24/7 News: The Latest

24/7 News: The Latest

The latest news in 4 minutes updated every hour, every day.

Stuff You Should Know

Stuff You Should Know

If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.