IP and Telephony Crime Has Converged – Wake Up, Wise Up & Get Protected!
Telephones are increasingly used for secondary verification. Cybercriminals know this and are taking over phones alongside PCs to defeat the authentication. What do they do and how do you stop them? This eye opening session uses real world examples to understand how the crime is committed and by who. It then addresses practical solutions to prevent you, or your customers, becoming victims.