Pilot Episode – Hacker Accesses Home Cams After Applying for Job

Welcome to the new Workology Go Podcast. In just under five minutes, we get you the HR and workplace news you need before you start your day. Get ready, get set and go with the Workology Go Podcast.

Here are today’s HR and workplace news headlines from Workology Go Podcast. I’m Jessica Miller-Merrell. The Workology Go Podcast is sponsored by HSA Bank.

Is Your HR Technology & Hiring Process At Risk for Hacking and Phishing?

The Wall-Street Journal recently published an article that shines a spotlight on hacking and how easily someone can access one of your many devices and technology. They accomplish this through a process called phishing.

Felix Oldigie is the CEO of Meet Me In the Cloud and shares in a past Workology Podcast interview what phishing is.

“Phishing is a technique used by hackers to trick people to provide them you know personal information. And of course these attacks are usually in the form of emails or Web sites and they often look very legitimate. You have to pay attention to them. Most of the time do their service. This set up to get you to download malicious software onto your machine obvious results that they’re looking for is that you would a pass on you know most likely your password.

Companies have invested heavily 19 structures in secure and the IT environment and they continue to spend a lot of millions doing that. So it’s really much harder to try to crack the firewalls of these companies. So what do you try to do? How you crack the human element and crack the human password so you can see if they can get your password to get your credentials? It’s probably easier to just get into the system and that’s what happens with phishing emails. The malicious software you get some uses a key logger or other technology that would record your keystrokes and you know take some of your credentials with it.”

The article Wall-Street Journal article is titled, “What I Learned From the Hacker Who Spied on Me.”

The journalist, Joanna Stern hired an ethical hacker, Alexander Heid, the hacker tried to access her computer and home. Very quickly he was able to easily access her home network sending a webcam photo of Joanna’s daughter sleeping in her bedroom.

The avg. cost of a phishing attack for a mid-sized company is $1.6 million according to Cofense 2017 report #hrtech #humanresources #hr Click To Tweet

Alexander talks in the article about how he access the network which happened by applying for a job. He created a fake persona applying for a videographer job with a resume attachment, and a video reel.

What is Workology Go Podcast?

And that’s this episode of the Workology Go Podcast. We’re your go-to for HR and workplace news. To learn more about the Workology Go Podcast, subscribe to us on Apple, Google, and Stitcher. Our podcast is also available on Alexa and Google Home. Learn more at workology.com/gopodcast and access this episode’s resources, links, and reports for more information.

Featured Story

What I Learned From the Hacker Who Spied On Me

More Great Resources

Ep 52 – Phishing and Hacking Risk for HR Technology

9 Ways to Use Artificial Intelligence in HR and Recruiting 

Everything You Need to Know About Artificial Intelligence

Ep 111 – Candidate Uses Robot to Apply to Thousands of Jobs

How to Subscribe to the Workology Podcast

Stitcher | PocketCast | iTunes | Podcast RSS | Google Play | YouTube | TuneIn

You can also click here to find out how to be a guest on the Workology Podcast(s).

Posted in

Jessica Miller-Merrell

Learn more about Jessica Miller-Merrell, SPHR, SHRM-SCP, the founder of Workology, a workplace HR resource, and the host of the Workology Podcast. More of her blogs can be found here.


Pin It on Pinterest