How Hackers Target Students and What Schools Are Missing
Cyber Crime JunkiesApril 01, 202400:55:49

How Hackers Target Students and What Schools Are Missing

🔥Special Offer: Try Optery Privacy Risk Free and No Cost! 🔥
Get Your Private Data Off the internet! Data Removal of Personal Information Online & Protect Yourself Today. https://get.optery.com/DMauro-CyberCrimeJunkies John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how it sparked his interest. We discuss topics including how is higher education targeted for cyber crime, top tactics used in social engineering, cost effective practices to limit cyber liability, how intelligence gathering is critical to security, Importance of visibility into operational risk, most common hacking tactics and a new approach to build a security culture.

Takeaways

*Cybersecurity in higher education faces unique challenges
*Social engineering, particularly through job scams and impersonation, is a significant threat in higher education.
*Cyber resiliency and preparedness are crucial in mitigating cyber risks
Education and awareness are key
*Collaboration and information sharing between organizations are essential
*Creating a student-run SOC can be a valuable initiative
*Breaking into cybersecurity requires passion, interest, and a willingness to continuously learn and adapt.

Chapters

00:00 Introduction and Background
01:30 First Experience with Ethical Hacker
06:32 Transition to Cybersecurity at Clemson University
07:00 Cyber Risks in Higher Education
09:04 Cyber Resiliency and Preparedness
11:18 Cyber Risks Faced by College Students
15:06 Social Engineering and Cyber Education
19:48 Collaboration and Information Sharing in Cybersecurity
22:12 Challenges of Cybercrime and Law Enforcement
28:15 Top Cyber Threats in Higher Education
30:11 Threats and Vulnerabilities
34:25 Creating a Student-Run SOC
38:02 Breaking into Cybersecurity
46:03 The Broad Scope of Cybersecurity
50:47 Generative AI and its Impact
51:32 Upcoming Events and Podcast


Watch Video Episodes! And Please...Subscribe to our YouTube Channel.(http://www.youtube.com/@cybercrimejunkiespodcast)** http://www.youtube.com/@cybercrimejunkies

Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.(https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941)** https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941

Find out more or Submit Direct Questions [www.CyberCrimeJunkies.com https://cybercrimejunkies.com](https://cybercrimejunkies.com/)

Stay up-to-date on Cybersecurity with [VIGILANCE Newsletter.](https://www.linkedin.com/newsletters/6941459114879311872) [linkedin.com/newsletters/6941459114879311872](http://linkedin.com/newsletters/6941459114879311872)

Want Gear? We love our Small Business Sponsor, [BlushingIntrovert.com](http://blushingintrovert.com/). has it all. Women’s clothing, cool accessories supporting Mental Health Research. [https://blushingintrovert.com](https://blushingintrovert.com/)
ai, agentic ai, ai for beginners, ai tools, artificial intelligence,