Anti-Phishing, DMARC , Events , Fraud Management & Cybercrime

The Evolution of Phishing From Email to SMS and Voice Hacks

KnowBe4's Roger Grimes on Why MFA Alone Isn't a Successful Hack Prevention Strategy
Roger Grimes, data-driven defense evangelist, KnowBe4

Phishing is no longer restricted to just emails. As attackers broaden their arsenal, businesses today also need to be on the lookout for impersonation attempts via SMS text messages or voice calls, says Roger Grimes, a data-driven defense evangelist at KnowBe4.

See Also: The Expert Guide to Mitigating Ransomware & Extortion Attacks

In a video interview with Information Security Media Group at RSA Conference 2022, Grimes also discusses:

  • Why phishing-resistant MFA is superior to conventional MFA;
  • The role that culture plays in driving good cybersecurity behaviors;
  • How users and companies can detect smishing and vishing hacks.

Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He has worked at some of the world's largest computer security companies, including Foundstone, and has served as a weekly security columnist for InfoWorld and CSO magazines since 2005.


About the Author

Michael Novinson

Michael Novinson

Managing Editor, Business, ISMG

Novinson is responsible for covering the vendor and technology landscape. Prior to joining ISMG, he spent four and a half years covering all the major cybersecurity vendors at CRN, with a focus on their programs and offerings for IT service providers. He was recognized for his breaking news coverage of the August 2019 coordinated ransomware attack against local governments in Texas as well as for his continued reporting around the SolarWinds hack in late 2020 and early 2021.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.