Premium Only Content

How Attackers Are Bypassing Your Security With AUTHORITY
You’re not alone in underestimating how easily authority can be faked! In this episode of the Learn Online Security Podcast, Richard Bankert and Chris Howells expose the hidden world of authority-based social engineering attacks — a psychological tactic hackers use to bypass security by posing as trusted figures.
🔍 What You’ll Learn:
📌What social engineering really is and why authority plays a key role
📌Real-life stories of penetration tests where attackers walked out undetected
📌The psychology behind why employees hesitate to question authority
📌How scammers use urgency and fake credibility ( “Boss Gift Card Scam”) to trick staff
📌Practical security awareness tips to protect your business, team, and yourself from cyber attacks
💡 Key Takeaways:
✔ Always verify authority before granting access
✔ Train employees to recognize urgent manipulation tactics
✔ Reduce attacker “time to operate” by questioning credentials
✔ Build a security-conscious workplace culture
🎯 Perfect for:
Small business owners • IT professionals • Corporate security teams • Anyone wanting to protect themselves from cybercrime & social engineering scams
What are my next steps?
📖 Start learning for free at https://learnonlinesecurity.com/start-here
🔐 Become a superhero and support the channel https://learnonlinesecurity.com/heroes/superheroes
🏢 Learn more about our social engineering training for employees & business certification courses https://learnonlinesecurity.com/business-training
Follow Learn Online Security:
Facebook: https://www.facebook.com/LearnOnlineSec
Instagram: https://www.instagram.com/learnonlinesecurity
Website: https://www.learnonlinesecurity.com
⌚Time Stamps ⌚
0:00 The Shocking Reality of Authority Attacks
0:21 Introduction to Authority-Based Social Engineering
1:40 Guest Introduction: Chris Howells
1:56 Real-World Example: Disguised as a Worker
3:23 Penetration Test Story
5:02 The Power of Confidence in Attacks
7:13 Purpose of Authority Attacks
9:03 How to Thwart Authority Attacks
11:29 Gift Card Scam Case Study
15:01 Where Attackers Get Their Information
16:38 Internal Verification Systems
17:09 Key Defense Habits
17:32 Building a Security-First Culture
19:53 Next Week: How AI is Changing Authority-Based Attacks
-
0:36
Danny Rayes
2 days agoFacebook Needs To Be Stopped...
181 -
LIVE
Total Horse Channel
15 hours agoAMHA World Show 2025 9/21
1,984 watching -
1:29:02
Game On!
1 day ago $5.74 earnedTHEY'RE BACK! NFL Wise Guys Return For Week 3 BEST BETS!
19.5K2 -
6:16
China Uncensored
51 minutes agoHow Trump Plans on Stopping Russia and China—Without Firing a Shot!
2 -
33:13
Ohio State Football and Recruiting at Buckeye Huddle
12 hours agoOhio State Football: 10 Things We Learned Watching Washington's Win over Colorado State
34 -
1:14:04
NAG Entertainment
13 hours agoKickback w/ Leon - Rocket League: Road to GC
21 -
30:13
Degenerate Plays
43 minutes agoBritish Insults Are Hilarious - Call of Duty: Modern Warfare 2 (2009) : Part 2
1 -
6:42
NAG Daily
17 hours agoCharlie Kirk: His Words. His Vision. His Movement.
19.4K25 -
21:42
Jasmin Laine
18 hours ago“Kimmel Isn’t a Victim, Charlie Kirk Was”—Gutfeld OBLITERATES Liberal Media Over FAKE Outrage
22.4K25 -
33:59
ComedyDynamics
23 days agoBest of Jim Breuer: Let's Clear the Air
69.5K20