Unitedhealth's Perilous Waters of Data Leakage and Extortion
Listen now
Description
In this episode, the hosts discuss the ongoing fallout from the Change Healthcare ransomware attack. They explore the leaked data, the potential for double extortion, and the long-term consequences for the company. They also touch on the need for better cybersecurity measures, including the implementation of a Zero Trust Model. The hosts speculate on the future of ransomware attacks and the potential for individual targeting of high-profile individuals. They emphasize the importance of investing in cybersecurity to protect personal and corporate data. Please LISTEN 🎧 LIKE 👍🏿 and SHARE ❤️ Thanks! Socials: Website - https://www.heroesmediagroup.com/shows/the-other-side-of-the-firewall/ Audio - https://podcasts.apple.com/us/podcast/the-other-side-of-the-firewall/id1542479181 YouTube - https://www.youtube.com/channel/UCXZgdDvlcQ8bP_V4dEF02Yw Facebook - https://www.facebook.com/profile.php?id=61556539026086 Instagram - https://www.instagram.com/theothersideofthefw X (Twitter) - https://twitter.com/Ask_a_CISSP TikTok - https://www.tiktok.com/@ryanwilliams683 Medium - https://medium.com/@ryanwilliamssenior Subscribe to LinkedIn Newsletter - https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7172626552545865728 Ryan on Twitter, LinkedIn, Clubhouse, and Threads - @ryrysecurityguy Chris on LinkedIn - https://www.linkedin.com/in/chrisabacon/ Chapters 00:00 Introduction and Recap 05:26 Double Extortion and the Cost of Ransomware Attacks 09:13 The Long-Term Consequences of Ransomware Attacks 13:21 The Need for Robust Cybersecurity Measures #cybersecurity #ransomware #unitedhealth
More Episodes
What's up, everyone?! In this episode, Ryan and Shannon discuss whether ChatGPT will be God's gift to cybersecurity or our undoing. Please LISTEN 🎧 LIKE 👍🏿 and SHARE ❤️ Thanks! Article: ChatGPT may hinder the cybersecurity...
Published 05/23/24
Published 05/23/24
In this episode, the hosts discuss a social media scam that preys on compassion. Scammers create posts about children in need and embed nefarious links, tricking people into sharing the posts and potentially stealing their data. The hosts emphasize the importance of being cautious and not...
Published 05/22/24