Premium Only Content
How Attackers Are Bypassing Your Security With AUTHORITY
You’re not alone in underestimating how easily authority can be faked! In this episode of the Learn Online Security Podcast, Richard Bankert and Chris Howells expose the hidden world of authority-based social engineering attacks — a psychological tactic hackers use to bypass security by posing as trusted figures.
🔍 What You’ll Learn:
📌What social engineering really is and why authority plays a key role
📌Real-life stories of penetration tests where attackers walked out undetected
📌The psychology behind why employees hesitate to question authority
📌How scammers use urgency and fake credibility ( “Boss Gift Card Scam”) to trick staff
📌Practical security awareness tips to protect your business, team, and yourself from cyber attacks
💡 Key Takeaways:
✔ Always verify authority before granting access
✔ Train employees to recognize urgent manipulation tactics
✔ Reduce attacker “time to operate” by questioning credentials
✔ Build a security-conscious workplace culture
🎯 Perfect for:
Small business owners • IT professionals • Corporate security teams • Anyone wanting to protect themselves from cybercrime & social engineering scams
What are my next steps?
👉 Don’t miss out — join our Skool community and grow with us. https://www.skool.com/learn-online-security-4898/about?ref=afd43f6b9d63430aab8f077e49a05b0f
📖 Start learning for free at https://learnonlinesecurity.com/start-here
🔐 Become a superhero and support the channel https://learnonlinesecurity.com/heroes/superheroes
🏢 Learn more about our social engineering training for employees & business certification courses https://learnonlinesecurity.com/business-training
Follow Learn Online Security:
Facebook: https://www.facebook.com/LearnOnlineSec
Instagram: https://www.instagram.com/learnonlinesecurity
Website: https://www.learnonlinesecurity.com
⌚Time Stamps ⌚
00:00:00 The Shocking Reality of Authority Attacks
00:00:21 Introduction to Authority-Based Social Engineering
00:01:40 Guest Introduction: Chris Howells
00:01:56 Real-World Example: Disguised as a Worker
00:03:23 Penetration Test Story
00:05:02 The Power of Confidence in Attacks
00:07:13 Purpose of Authority Attacks
00:09:03 How to Thwart Authority Attacks
00:11:29 Gift Card Scam Case Study
00:15:01 Where Attackers Get Their Information
00:16:38 Internal Verification Systems
00:17:09 Key Defense Habits
00:17:32 Building a Security-First Culture
00:19:53 Next Week: How AI is Changing Authority-Based Attacks
-
0:33
Learn Online Security
6 days agoChristmas Security: Don’t let your business be an easy target
101 -
LIVE
Lofi Girl
3 years agolofi hip hop radio 📚 - beats to relax/study to
197 watching -
2:14:13
FreshandFit
13 hours agoShe Was Given Extravagant Gifts And STILL Friendzoned Him +EXPOSED
188K33 -
1:16:07
Man in America
11 hours agoOperation Gladio: The CIA, Mossad & City of London’s Plan for a New World Order
25.5K28 -
2:11:41
Badlands Media
12 hours agoDEFCON ZERQ Ep. 016: Shadow Governments, Ancient Tech & the Spiritual War for Humanity
81.9K58 -
2:09:24
Inverted World Live
7 hours agoRats Have Learned to Hunt Bats | Ep. 135
31.2K14 -
2:48:01
TimcastIRL
8 hours agoLIVE Election Coverage: Polling Stations SWATTED, Bomb Threats Called In | Timcast IRL
254K176 -
3:30:07
Barry Cunningham
8 hours agoBREAKING NEWS: COUNTDOWN TO COMMUNISM! ELECTION RESULTS SHOW!
59.5K47 -
2:11:28
DeVory Darkins
7 hours agoLIVE NOW: 2025 Election results and Exit Polls AMA
70K44 -
2:34:04
DLDAfterDark
6 hours ago $0.08 earnedJust Another Tuesday - In Virginia - The Governor's Race & Glock Talk
29.3K6