loader from loading.io

Scams Targeting Website Owners with Liz Eisworth

Easy Prey

Release Date: 12/15/2021

5 Common Uses of Synthetic IDs with Stuart Wells show art 5 Common Uses of Synthetic IDs with Stuart Wells

Easy Prey

There are entire communities set up to fight fraud that use synthetic IDs as well as scammer gangs that are advancing their creative ways to use these documents. This is changing regularly as biometric authentication advances continue.  Today’s guest is Stuart Wells. Stuart is the CTO of Jumio and is responsible for all aspects of Jumio’s innovation, machine learning, and engineering. He is an industry veteran with more than 30 years of tech experience. He was previously the Chief Product and Technology Officer at FICO, and held executive positions at Avaya and Sun Microsystems. Show...

info_outline
Vantage Travel Bankruptcy with Michelle Couch Friedman show art Vantage Travel Bankruptcy with Michelle Couch Friedman

Easy Prey

Imagine booking a vacation only to find out that the company files for bankruptcy a week later. As a consumer, would you know what your rights are? There’s a big difference between travel insurance and travel protection. One can leave you with no way to get your money back. Today’s guest is Michelle Couch Friedman. Michelle is the founder and CEO of Consumer Rescue. She is an experienced consumer reporter, advocate, mediator, author, and licensed psychotherapist. Michelle has also been a columnist, contributing editor, and former executive director for Elliott Advocacy, a non-profit...

info_outline
Cybersecurity for Everyday People with Greg Tomchick show art Cybersecurity for Everyday People with Greg Tomchick

Easy Prey

Learning how to keep your business safe and protect your online data can be advantageous for your home and personal life as well. Your children and family can create awareness at school and with friends. Today’s guest is Greg Tomchick. Greg is a former professional baseball player turned award-winning cybersecurity coach. He has worked with more than 250 world-renowned companies, including American Airlines, Caterpillar, and Trinity Rail. He is regularly featured live on ABC, Fox, and is an expert contributor to Inc. Magazine. He is now the CEO of Valor Cybersecurity and host of The...

info_outline
Misunderstanding Victims of Romance Fraud show art Misunderstanding Victims of Romance Fraud

Easy Prey

The media loves sensationalized romance scams, but we need to understand that anyone can be emotionally seduced and it's not just the lonely. No one is off limits to being targeted, no matter the age, status, or career. And the impact is far greater than just financial. Today’s guest is Becky Holmes. Becky is the creator and voice behind the popular Twitter account Death to Spinach. Becky’s book looks at all aspects of romance fraud, from the heartbreaking to the hilarious, the academic to the anecdotal, and discusses where we’ve gone wrong in dealing with those affected. Show Notes: ...

info_outline
Scams Exploiting Emotions with Alan Castel show art Scams Exploiting Emotions with Alan Castel

Easy Prey

We can easily stereotype those we believe are susceptible to a scam. But the scammers are keeping up with current events and are prepared to take advantage of our basic human emotions. The impact of these frauds is underreported due to the shame and embarrassment.  Today’s guest is Alan Castel. Alan is a Psychology professor at The University of California Los Angeles. He studies learning, memory, fraud, and aging. His work has been featured in The New York Times, Wall Street Journal, and Time Magazine. He recently published a book entitled . Show Notes: [1:08] - Alan shares his...

info_outline
3 Types of Insider Fraud with Claire Maillet show art 3 Types of Insider Fraud with Claire Maillet

Easy Prey

In this episode, we’re shining a light on a pervasive threat that often lurks in the shadows of corporate environments: insider fraud. We’ll explore the insidious nature of insider threats, the various forms they can take, and most importantly, how organizations can arm themselves with knowledge and strategies to mitigate these risks effectively. Today’s guest is Claire Mailet. Claire is an award-winning financial crime prevention expert and has worked in the field for over ten years. In her spare time, Claire assists universities in the UK to support staff and students who stammer and...

info_outline
5 Fraud Vulnerability Factors with Martina Dove show art 5 Fraud Vulnerability Factors with Martina Dove

Easy Prey

Understanding our cognitive biases can help us realize that we sometimes are too trusting of emails, texts, or calls from someone we perceive to be an authority. Today’s guest is Martina Dove. Martina is a researcher with a fervent passion for fraud prevention. Her expertise focuses on persuasion, scam techniques, and individual characteristics that make people susceptible to fraud. She is passionate about fighting fraud by teaching people how to spot scammer techniques and has recently published a book on fraud psychology. Show Notes: [0:50] - Martina shares her background in...

info_outline
Hacker Tactics with John Hammond show art Hacker Tactics with John Hammond

Easy Prey

The tech world is ever-changing and it can be difficult to keep up. As businesses and individuals, it's important to remember to keep your software up to date and apply patches as they are released. Today’s guest is John Hammond. John is a cybersecurity researcher, educator, and content creator. As part of the Adversary Tactics Teams at Huntress, John spends his days analyzing malware and making hackers earn their access. He is an online YouTube personality showcasing program tutorials, malware analysis, dark web threats, and other cybersecurity content. Show Notes: [1:01] - John shares...

info_outline
Top 5 Supply Chain Risks with Kevin Kumpf show art Top 5 Supply Chain Risks with Kevin Kumpf

Easy Prey

As businesses embrace digital transformation and rely on interconnected networks for their operations, the vulnerabilities within the digital supply chain become increasingly apparent. From data breaches to third party vulnerabilities, the threats are multi-faceted and ever-evolving. Today’s guest is Kevin Kumpf. Kevin has more than 20 years of IT Security and Compliance experience including over 10 years of cybersecurity, governance, and critical infrastructure experience working in the energy, medical manufacturing, transportation, and fedramp realms.  Show Notes: [0:54] - Kevin...

info_outline
The Risks and Rewards of Cryptocurrencies with Natalie Brunell show art The Risks and Rewards of Cryptocurrencies with Natalie Brunell

Easy Prey

There are significant risks to be aware of when using crypto and over the past two years, many tokens have imploded. As you choose to invest digitally, do your research and understand the commodity that you use. Today’s guest is Natalie Burnell. Natalie is the host of the #1 woman-led show in the bitcoin space, Coin Stories. She is a bitcoin educator, a frequent media commentator, and an award-winning journalist.  Show Notes: [0:50] - Natalie shares her background and the mission behind the Coin Stories Podcast. [2:19] - Learning about bitcoin gave Natalie a little more hope as she...

info_outline
 
More Episodes

When you own a business, your website represents you. Scammers can prey on your emotions for their gain by sending false claims of copyright infringement or even other lucrative opportunities that are fake. Knowing what to look out for prevents their negative impact on you and your business. 

Today’s guest is Liz Eisworth. Liz is the founder of SangFroid Web Design specializing in web design, custom WordPress themes, SEO, and digital marketing. She works with businesses to understand all aspects of their website.

Show Notes:

  • [0:50] - Welcome to the show, Liz! Liz shares her background and business in web design, online presence, and SEO.
  • [2:21] - Liz describes the common scams that target website owners, starting with domain slamming scams.
  • [4:18] - The reason this happens is because once you register for a domain, your information becomes public.
  • [5:40] - Domain slamming is not an outright crime, but it is certainly unethical.
  • [8:12] - In combination with other things, the length of time a domain name has been owned can be a red flag.
  • [9:30] - Social engineering can also take place with the registrar that your domain name is registered with.
  • [11:20] - It is easy for scammers to set up a fake and flimsy online presence.
  • [12:09] - Phishing scams are often submitted through contact forms on a business’s website.
  • [13:36] - These phishing scams have gotten much more sophisticated in the last year and cause enough panic to have the owner click a dangerous link.
  • [16:07] - There are a lot of royalty free stock photo websites that you can find safe images to use on your website. This will help you avoid copyright infringement.
  • [18:26] - Chris shares an experience with registering a trademark that Liz confirms is very common.
  • [20:20] - Liz describes the third party payout scam.
  • [22:11] - In these scams, a detailed and simultaneously vague email will request a project be done.
  • [24:40] - If someone overpays you for a service, be skeptical.
  • [28:01] - The extra details in the initial email could be a red flag.
  • [29:40] - The use of details is intended to distract you.
  • [31:08] - Liz works primarily with small to medium sized businesses, but large companies are also very susceptible to scams.
  • [32:52] - Social engineering and preying on emotions are the common threads between all scams.
  • [35:41] - False authority in an email can also be a red flag.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. 

Links and Resources: