Listen

Description

Episode Summary

HR giant Workday falls victim to ShinyHunters' sophisticated social engineering campaign, exposing how simple phone calls can bypass enterprise-grade security. Host Lucy Harper breaks down the attack methods and provides actionable defence strategies for UK businesses facing this escalating threat.

What You'll Learn

Critical Statistics Mentioned

Key Sources & References

Episode Sponsor

Equate Group - Comprehensive cybersecurity and IT services specialising in social engineering defence training, security operations centre monitoring, and OAuth application security auditing.

Your Next Steps

Implement immediate social engineering verification protocols across your organisation today. Audit all connected applications with administrative access, particularly CRM and cloud platforms. Establish multi-person approval processes for new application integrations. If your business lacks dedicated cybersecurity expertise, professional social engineering defence training becomes essential.

Source Verification Standards

All sources cited in this episode have been fact-checked and verified through multiple authoritative channels. Cybersecurity research firms and threat intelligence groups serve as primary sources for attack methodology and attribution. Financial figures are cross-referenced through industry security publications. UK-specific risk assessment prioritises government and established UK cybersecurity guidance.

Disclaimer

This episode provides general guidance only. Always consult qualified cybersecurity professionals before making critical infrastructure changes. Content is based on independent research and industry best practices.🎧 Subscribe for daily cybersecurity updates

👍 Like this episode if it helped you prepare

Production: Small Business Cyber Security Guy Production

Host: Lucy Harper

Sponsor:

All rights reserved