Search
Close this search box.
Search
Close this search box.

Written by: Pindrop

Contact Center Fraud & Authentication Expert

Last week, Sales Engineers Jay Hart & Dave Dalebroux facilitated an engaging discussion concerning the rise of social engineering, the how and why social engineers are targeting contact centers, and what you can do to address it.

In last week’s Pindrop Pulse webinar, Jay Hart & Dave Dalebroux discussed social engineering and presented recommendations on how you can address social engineering and protect your call center. While the notion of phishing arises from email, chat, and other messages where fraudsters would try to extract information from consumers, this tactic has been adapted to attacking the phone channel. Vishing is the process of phishing through the voice channel and helps facilitates $4 Billion in fraud each year. Considering the current rapid changes call centers have experienced in infrastructure, fraud professionals should find out how they are being targeted and if they are protected, as their workforce takes and reviews calls from home.

Call center fraud prevention professionals will find this Pulse installment, particularly of interest as Jay and Dave Dalebroux, discuss:

  • 5 most common types of fraud tactics used by fraudsters
    • Voice Phishing 
    • Early reconnaissance
    • Man In The Middle Attacks
    • Travel Notifications
    • I need to update 
  • How social engineers are using vishing, your tools, and your internal processes against your company
  • How social engineers are using the information they gather online to attack you 
  • The thought process of social engineers as they attack your IVR

 

You can save your seat in this and other webinar broadcasts here. Love our webinars? Sign up for curated communications from Pindrop Pulse to keep you connected, ahead, and informed.

About Pindrop Pulse     
Pindrop Pulse is the new source for the information you need to please your customers, reduce fraud, and optimize spend. Pindrop Pulse gathers industry experts to discuss and address the latest topics in voice fraud and authentication, providing insight, analyses, and tools to bridge the gap between market trends and your business.

More
Blogs