Our business has been hacked- what the hell do we do?

Our business has been hacked- what the hell d...

Up next

The psychology of hacking

Another day, another breach. Organisations are still being hacked by malicious counterparts everyday, and the reason they're always a step ahead is not only gender diversity but a skills diversity as well - meanwhile we're still relying on our IT departments to handle cyber breac ...  Show more

What are the rules of hacking

We've spoken about the dark side of hacking and we've shown you that hacking can be used for good. But is there a line? And what happens when you cross it? Ex-Hacker and Brand Ambassador of CTRL Group Bastien Treptel is joined by Skeeve Stevens, the first Australian to go to jail ...  Show more

Recommended Episodes

Cybersecurity
The Bottom Line

In modern business it's impossible not to be worried about a cyber attack of some form. But how do you lower your chances of attack and what do you do if someone manages to get in your system and data? Evan Davis and guests discuss.GUESTSSian John, director, EMEA, cyber security ...  Show more

How Can You Get Paid to Break Into Stuff?
BrainStuff

Crime doesn't pay -- but penetration testing does. Learn why companies pay hackers to break into their networks and offices in this episode of BrainStuff, based on this article: https://computer.howstuffworks.com/hack-networks-security-news.htm Learn more about your ad-choices at ...  Show more

Money Box Live: How to protect your data
Money Box

A prolific cyber crime gang has stolen personal data belonging to more than 100,000 employees. It's a mass hack which has impacted organisations globally.

In the hands of criminals, your personal data can be used to make cloned credit cards, buy phone plans, falsely cla ...

  Show more

Cyber Security
The Bottom Line

Can you keep business safe from hackers? Many companies now feel besieged by constant attacks and few can claim not to have been targeted. In the first of a new series of the award-winning The Bottom Line Evan Davis and guests discuss the anatomy of a cyber attack - where the thr ...  Show more