Biometrics , Security Operations

OnDemand Webinar | Social Engineering Fraudster Tactics Threatening Contact Centers

Do You Have the Tools to Fight Back?

Social engineering is a hot topic in the news today and fraudster tactics are on the rise. Do you have the tools to fight back? Watch this on demand webinar to find out the 5 ways professional fraudsters are attacking your contact center and stealing data.

In this webinar, Principal Sales Engineers, Jay Hart & Dave Dalebroux discuss social engineering tactics and present recommendations on how you can address it and protect your call center. Considering the current rapid changes call centers have experienced in infrastructure, fraud professionals should find out how they are being targeted and if they are protected, as their workforce takes and reviews calls from home.

Call center fraud prevention professionals will find this Pulse installment particularly of interest as Jay Hart and Dave Dalebroux, discuss:

  • The 5 most common types of fraud tactics used by fraudsters
  • How social engineers are using fishing, your tools, and your internal processes against your company
  • How social engineers are using the information they gather online to attack you
  • The thought process of social engineers as they attack your IVR

About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.