The pandemic has forced all of us online in ways we haven’t been previously, and that applies to hackers and cyber criminals just as much as it does to regular people. Over the past year, threat actors have adjusted their tactics in order to exploit our new patterns of behaviour, which makes defenders’ jobs all the more difficult.
In this week’s IT Pro Podcast, we talk to James Bynoe, head of information security at eBay Classifieds Group, to find out how he’s protecting his organisation’s sizeable network of staff and customers against these evolving threats.
Footnotes
- How to beat ransomware
- The truth about ransomware
- Ransomware payments are declining as more victims refuse to pay
- The IT Pro Podcast: The psychology of security
- Mind-reading hackers are stealing your data
- 10 quick tips for identifying phishing emails
- The IT Pro Podcast: How hackers steal your password
- Hackers have raked in £34.5 million from COVID-related scams
- How do I best support my remote workers?
- Three keys to a long-term remote working strategy
- How to protect your remote workforce
- 12 must-have tools for working from home
- How to build a comprehensive cyber security strategy
Subscribe
- Subscribe to The IT Pro Podcast on Apple Podcasts
- Subscribe to The IT Pro Podcast on Google Podcasts
- Subscribe to The IT Pro Podcast on Spotify
- Subscribe to the IT Pro newsletter
- Subscribe to IT Pro 20/20
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Developers warned to avoid 'early-access' Google Gemini toolsNews Attackers are tempting would-be users into downloading reverse shell malware
-
Researchers warn millions of RDP and VNC servers are wide open to exploitationNews Researchers at Forescout spotted millions of RDP and VNC servers exposed online
-
The race to become quantum-safeITPro Podcast Efforts to run AI in trusted regions can clash with access to frontier model updates, business scalability
-
March rundown: RSAC warnings and Arm's AGI CPUITPro Podcast AI agents are complicating the jobs of cyber professionals, with broken permissions and a lack of oversight posing major risks
-
SPECIAL EDITION: How AI is changing educationSponsored Podcast With the right support and communication, educational organizations can use AI to empower teachers and students alike
-
Tomorrow's fraud techniquesITPro Podcast Leaders need to proactive as attackers launch more consistent, sophisticated attacks
-
Redefining risk managementSponsored Podcast With a Risk Operations Center (ROC), leaders can proactively crack down on cyber risks instead of simply reacting to them
-
Are AI cyber threats overhyped?ITPro Podcast As cyber teams turn to the threats posed by AI, rising attacks by state-sponsored groups and ransomware gangs remain the biggest threat
-
The future of threat detectionITPro Podcast To fight sophisticated threats, cybersecurity teams will need to unify data like never before
-
November rundown: CrowdStrike's insider threatITPro Podcast As CrowdStrike grappled with a malicious employee, Cloudflare suffered a major outage
