{"id":56523,"date":"2024-04-18T13:45:55","date_gmt":"2024-04-18T20:45:55","guid":{"rendered":"https:\/\/mspmastered.com\/?post_type=webinar&p=56523"},"modified":"2024-05-12T11:29:41","modified_gmt":"2024-05-12T18:29:41","slug":"understanding-preventing-token-hijacking","status":"publish","type":"webinar","link":"https:\/\/mspmastered.com\/webinar\/understanding-preventing-token-hijacking\/","title":{"rendered":"Understanding & Preventing Token Hijacking"},"content":{"rendered":"","protected":false},"featured_media":57049,"template":"","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_EventAllDay":false,"_EventTimezone":"","_EventStartDate":"","_EventEndDate":"","_EventStartDateUTC":"","_EventEndDateUTC":"","_EventShowMap":false,"_EventShowMapLink":false,"_EventURL":"","_EventCost":"","_EventCostDescription":"","_EventCurrencySymbol":"","_EventCurrencyCode":"","_EventCurrencyPosition":"","_EventDateTimeSeparator":"","_EventTimeRangeSeparator":"","_EventOrganizerID":[],"_EventVenueID":[],"_OrganizerEmail":"","_OrganizerPhone":"","_OrganizerWebsite":"","_VenueAddress":"","_VenueCity":"","_VenueCountry":"","_VenueProvince":"","_VenueState":"","_VenueZip":"","_VenuePhone":"","_VenueURL":"","_VenueStateProvince":"","_VenueLat":"","_VenueLng":"","_VenueShowMap":false,"_VenueShowMapLink":false,"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false},"categories":[68],"webinar_category":[],"webinar_subscriber_topic":[427,428,430,429],"webinar_month":[390],"yoast_head":"\nUnderstanding & Preventing Token Hijacking – MSP Mastered<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mspmastered.com\/webinar\/understanding-preventing-token-hijacking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding & Preventing Token Hijacking – MSP Mastered\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mspmastered.com\/webinar\/understanding-preventing-token-hijacking\/\" \/>\n<meta property=\"og:site_name\" content=\"MSP Mastered\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/erickdsimpson\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-12T18:29:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Untitled-2.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ErickSimpson\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mspmastered.com\/webinar\/understanding-preventing-token-hijacking\/\",\"url\":\"https:\/\/mspmastered.com\/webinar\/understanding-preventing-token-hijacking\/\",\"name\":\"Understanding & Preventing Token Hijacking – MSP Mastered\",\"isPartOf\":{\"@id\":\"https:\/\/mspmastered.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mspmastered.com\/webinar\/understanding-preventing-token-hijacking\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mspmastered.com\/webinar\/understanding-preventing-token-hijacking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Untitled-2.jpeg\",\"datePublished\":\"2024-04-18T20:45:55+00:00\",\"dateModified\":\"2024-05-12T18:29:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/mspmastered.com\/webinar\/understanding-preventing-token-hijacking\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mspmastered.com\/webinar\/understanding-preventing-token-hijacking\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mspmastered.com\/webinar\/understanding-preventing-token-hijacking\/#primaryimage\",\"url\":\"https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Untitled-2.jpeg\",\"contentUrl\":\"https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Untitled-2.jpeg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mspmastered.com\/webinar\/understanding-preventing-token-hijacking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mspmastered.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webinars\",\"item\":\"https:\/\/mspmastered.com\/webinar\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Understanding & Preventing Token Hijacking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mspmastered.com\/#website\",\"url\":\"https:\/\/mspmastered.com\/\",\"name\":\"MSP Mastered\",\"description\":\"Transform your business into a Best In Class MSP\",\"publisher\":{\"@id\":\"https:\/\/mspmastered.com\/#organization\"},\"alternateName\":\"MSP Mastered\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mspmastered.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mspmastered.com\/#organization\",\"name\":\"Erick Simpson\",\"url\":\"https:\/\/mspmastered.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mspmastered.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mspmastered.com\/wp-content\/uploads\/2019\/07\/ErickSimpson.png\",\"contentUrl\":\"https:\/\/mspmastered.com\/wp-content\/uploads\/2019\/07\/ErickSimpson.png\",\"width\":949,\"height\":600,\"caption\":\"Erick Simpson\"},\"image\":{\"@id\":\"https:\/\/mspmastered.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/erickdsimpson\",\"https:\/\/x.com\/ErickSimpson\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding & Preventing Token Hijacking – MSP Mastered","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mspmastered.com\/webinar\/understanding-preventing-token-hijacking\/","og_locale":"en_US","og_type":"article","og_title":"Understanding & Preventing Token Hijacking – MSP Mastered","og_url":"https:\/\/mspmastered.com\/webinar\/understanding-preventing-token-hijacking\/","og_site_name":"MSP Mastered","article_publisher":"https:\/\/www.facebook.com\/erickdsimpson","article_modified_time":"2024-05-12T18:29:41+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Untitled-2.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@ErickSimpson","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/mspmastered.com\/webinar\/understanding-preventing-token-hijacking\/","url":"https:\/\/mspmastered.com\/webinar\/understanding-preventing-token-hijacking\/","name":"Understanding & Preventing Token Hijacking – MSP Mastered","isPartOf":{"@id":"https:\/\/mspmastered.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mspmastered.com\/webinar\/understanding-preventing-token-hijacking\/#primaryimage"},"image":{"@id":"https:\/\/mspmastered.com\/webinar\/understanding-preventing-token-hijacking\/#primaryimage"},"thumbnailUrl":"https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Untitled-2.jpeg","datePublished":"2024-04-18T20:45:55+00:00","dateModified":"2024-05-12T18:29:41+00:00","breadcrumb":{"@id":"https:\/\/mspmastered.com\/webinar\/understanding-preventing-token-hijacking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mspmastered.com\/webinar\/understanding-preventing-token-hijacking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mspmastered.com\/webinar\/understanding-preventing-token-hijacking\/#primaryimage","url":"https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Untitled-2.jpeg","contentUrl":"https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Untitled-2.jpeg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/mspmastered.com\/webinar\/understanding-preventing-token-hijacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mspmastered.com\/"},{"@type":"ListItem","position":2,"name":"Webinars","item":"https:\/\/mspmastered.com\/webinar\/"},{"@type":"ListItem","position":3,"name":"Understanding & Preventing Token Hijacking"}]},{"@type":"WebSite","@id":"https:\/\/mspmastered.com\/#website","url":"https:\/\/mspmastered.com\/","name":"MSP Mastered","description":"Transform your business into a Best In Class MSP","publisher":{"@id":"https:\/\/mspmastered.com\/#organization"},"alternateName":"MSP Mastered","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mspmastered.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mspmastered.com\/#organization","name":"Erick Simpson","url":"https:\/\/mspmastered.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mspmastered.com\/#\/schema\/logo\/image\/","url":"https:\/\/mspmastered.com\/wp-content\/uploads\/2019\/07\/ErickSimpson.png","contentUrl":"https:\/\/mspmastered.com\/wp-content\/uploads\/2019\/07\/ErickSimpson.png","width":949,"height":600,"caption":"Erick Simpson"},"image":{"@id":"https:\/\/mspmastered.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/erickdsimpson","https:\/\/x.com\/ErickSimpson"]}]}},"taxonomy_info":{"category":[{"value":68,"label":"Webinar"}],"webinar_subscriber_topic":[{"value":427,"label":"Business"},{"value":428,"label":"Sales"},{"value":430,"label":"Service"},{"value":429,"label":"Solutions"}],"webinar_month":[{"value":390,"label":"May"}]},"featured_image_src_large":["https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Untitled-2-1024x576.jpeg",1024,576,true],"author_info":[],"comment_info":"","meta_box":{"webinar-date":"May 9th, 2024","start_time":"11:00am Pacific","what_you_will_learn":"<p>As an MSP today, you're faced with the ever-increasing challenge of staying ahead of cybercriminals. Despite educating customers on the risks of phishing, weak passwords, and promoting MFA, <strong>there\u2019s always another threat on the horizon: <span style=\"text-decoration: underline\">Enter session token hijacking<\/span><\/strong>.<\/p>\n<p><strong>Join me on Thursday, May 9th<\/strong>, along with Ben Jones, sales engineer for SaaS Alert<strong>s, and SaaS Alerts partner Buddy Pitt, vCSO at Logically, to walk you through this rapidly emerging threat that<\/strong> takes Business Email Compromise (BEC) to a new level. This timely webinar will educate you not only on the new threat of token hijacking but also<strong> how it works, how to identify and protect against it, and how to make more MRR by doing so<\/strong>.<\/p>\n<p><strong>We'll cover:<\/strong><\/p>\n<ul>\n<li>The complexities of session token hijacking<\/li>\n<li>A live demo of a session token hijacking attack<\/li>\n<li>How to identify potential signs of an attack<\/li>\n<li>Ways to protect your own business<\/li>\n<li>Effective strategies to keep your clients safe and generate more MRR<\/li>\n<\/ul>\n<p>Today\u2019s environment requires a robust counterattack plan against BEC. Register now to make sure you\u2019re properly equipped.<\/p>\n","registration_url":"","registration_form_shortcode":"[fluentform id=\"48\"]","guest_name":"Ben Jones","guest_title":"Sales Engineer, SaaS Alerts","guest_headshot":{"width":150,"height":150,"file":"2024\/04\/Ben-Jones.jpeg","filesize":38178,"sizes":{"medium":{"file":"Ben-Jones-300x300.jpeg","width":300,"height":300,"mime-type":"image\/jpeg","filesize":15863,"url":"https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Ben-Jones-300x300.jpeg"},"thumbnail":{"file":"Ben-Jones-150x150.jpeg","width":150,"height":150,"mime-type":"image\/jpeg","filesize":3917,"url":"https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Ben-Jones-150x150.jpeg"},"woocommerce_thumbnail":{"file":"Ben-Jones-300x300.jpeg","width":300,"height":300,"mime-type":"image\/jpeg","filesize":16297,"uncropped":true,"url":"https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Ben-Jones-300x300.jpeg"},"woocommerce_single":{"file":"Ben-Jones-400x400.jpeg","width":400,"height":400,"mime-type":"image\/jpeg","filesize":17169,"url":"https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Ben-Jones-400x400.jpeg"},"woocommerce_gallery_thumbnail":{"file":"Ben-Jones-100x100.jpeg","width":100,"height":100,"mime-type":"image\/jpeg","filesize":2418,"url":"https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Ben-Jones-100x100.jpeg"}},"image_meta":{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"0","keywords":[]},"ID":"57051","name":"Ben-Jones.jpeg","path":"\/home\/852623.cloudwaysapps.com\/bmdqyxvtjw\/public_html\/wp-content\/uploads\/2024\/04\/Ben-Jones.jpeg","url":"https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Ben-Jones-150x150.jpeg","full_url":"https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Ben-Jones.jpeg","title":"Ben Jones","caption":"","description":"","alt":"","srcset":"https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Ben-Jones-150x150.jpeg 150w, https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Ben-Jones-300x300.jpeg 300w, https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Ben-Jones-400x400.jpeg 400w, https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Ben-Jones-100x100.jpeg 100w, https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Ben-Jones.jpeg 480w"},"company":"SaaS Alerts","guest_name_-_2":"Buddy Pitt","guest_title_-_2":"vCSO, Logically","guest_headshot_-_2":{"width":150,"height":150,"file":"2024\/04\/Buddy-Pitt.jpeg","filesize":11239,"sizes":{"thumbnail":{"file":"Buddy-Pitt-150x150.jpeg","width":150,"height":150,"mime-type":"image\/jpeg","filesize":2861,"url":"https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Buddy-Pitt-150x150.jpeg"},"woocommerce_gallery_thumbnail":{"file":"Buddy-Pitt-100x100.jpeg","width":100,"height":100,"mime-type":"image\/jpeg","filesize":1628,"url":"https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Buddy-Pitt-100x100.jpeg"}},"image_meta":{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"0","keywords":[]},"ID":"57052","name":"Buddy-Pitt.jpeg","path":"\/home\/852623.cloudwaysapps.com\/bmdqyxvtjw\/public_html\/wp-content\/uploads\/2024\/04\/Buddy-Pitt.jpeg","url":"https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Buddy-Pitt-150x150.jpeg","full_url":"https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Buddy-Pitt.jpeg","title":"Buddy Pitt","caption":"","description":"","alt":"","srcset":"https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Buddy-Pitt-150x150.jpeg 150w, https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Buddy-Pitt-100x100.jpeg 100w, https:\/\/mspmastered.com\/wp-content\/uploads\/2024\/04\/Buddy-Pitt.jpeg 261w"},"guest_name_-_3":"","guest_title_-_3":"","guest_headshot_-_3":false},"_links":{"self":[{"href":"https:\/\/mspmastered.com\/wp-json\/wp\/v2\/webinar\/56523"}],"collection":[{"href":"https:\/\/mspmastered.com\/wp-json\/wp\/v2\/webinar"}],"about":[{"href":"https:\/\/mspmastered.com\/wp-json\/wp\/v2\/types\/webinar"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mspmastered.com\/wp-json\/wp\/v2\/media\/57049"}],"wp:attachment":[{"href":"https:\/\/mspmastered.com\/wp-json\/wp\/v2\/media?parent=56523"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mspmastered.com\/wp-json\/wp\/v2\/categories?post=56523"},{"taxonomy":"webinar_category","embeddable":true,"href":"https:\/\/mspmastered.com\/wp-json\/wp\/v2\/webinar_category?post=56523"},{"taxonomy":"webinar_subscriber_topic","embeddable":true,"href":"https:\/\/mspmastered.com\/wp-json\/wp\/v2\/webinar_subscriber_topic?post=56523"},{"taxonomy":"webinar_month","embeddable":true,"href":"https:\/\/mspmastered.com\/wp-json\/wp\/v2\/webinar_month?post=56523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}