loader from loading.io

Ep. 4 - Abnormal Administrator

Can I Be Phished?

Release Date: 03/22/2021

Ep. 8 - Zoom Zinger show art Ep. 8 - Zoom Zinger

Can I Be Phished?

In this episode, I explore a fake Zoom meeting invitation with Jeff Ton, author of Amplify Your Job Search, and Amplify Your Value. We all encounter so many online meetings these days, that a Zoom invitation is a great phishing pretext. Join us as we analyze one that illustrates how this works. Jeff is a former executive who now coaches others to maximize their potential in the IT industry. He shares insights into his experiences and lessons learned that make him a great speaker and author. Jeff can be reached at:  

info_outline
Ep. 7 - Funny Fedex Phishing Message show art Ep. 7 - Funny Fedex Phishing Message

Can I Be Phished?

We take a look at a pretty obvious - you might even say "funny" - phishing email that tries to convince us that we're in for some great surprises from FedEx. Still, there are some good lessons in spotting phishing attacks, followed by some great tips and advice from Pete on marketing and managing money successfully. Whether you are a compliance manager, a CISO or an IT Service provider, you’ve got a communication and marketing challenge. How do you effectively get your message across to employees and end-users? In this episode of Can I Be Phished?, I speak with Pete Matheson, a leading IT...

info_outline
Ep. 6 - Deceitful Delivery show art Ep. 6 - Deceitful Delivery

Can I Be Phished?

This episode features Stuart Crawford, a fellow Canadian, now living in Florida. Stuart heads up Ulistic MSP Marketing, which helps service providers market their services to customers. Try the online self-assessment game to get a taste of how fun and effective gamified learning and assessment can be. The Click Armor Phishing Checklist In each episode, we’ll use our basic phishing checklist to analyze a different phishing message, so you can learn the clues about what to look for, to avoid becoming a victim. Here’s the basic Checklist: 1) Gut Feel Garbage 2) Sender...

info_outline
Ep. 5 - Vexatious Voicemail show art Ep. 5 - Vexatious Voicemail

Can I Be Phished?

This episode features my guest Nora Cox, a veteran information security and risk management consultant. Nora and I worked together as Product Managers at security software company Entrust many years ago. Her experience in Chief Risk Officer and Chief Compliance Officer roles makes her a great source of wisdom for businesses looking to develop a security culture. Try the online self-assessment game to get a taste of how fun and effective gamified learning and assessment can be. The Click Armor Phishing Checklist In each episode, we’ll use our basic phishing checklist...

info_outline
Ep. 4 - Abnormal Administrator show art Ep. 4 - Abnormal Administrator

Can I Be Phished?

This episode features my guest Ted Demopoulos, a veteran security consultant and author I’ve known for many years. Ted works in all areas of security, and is very active in helping consultants and entrepreneurs build their companies. Ted helps me unbox a phishing message that appears to be from an email administrator saying that my account needs to be updated. Try the online self-assessment game to get a taste of how fun and effective gamified learning and assessment can be. The Click Armor Phishing Checklist In each episode, we’ll use our basic phishing checklist...

info_outline
COVID CON - Unboxing a phishing message from the World Health Organization show art COVID CON - Unboxing a phishing message from the World Health Organization

Can I Be Phished?

Shawn and Scott unbox a message that looks like it is from the WHO, with an offer to provide assistance. So, we get lots of good insights into this kind of cyber attack, and then explore Shawn's experience in ransomware incidents and some great recommendations on cyber insurance.   Shawn is reachable at:   To comment on this episode, you can go to:

info_outline
Ep. 2. Unboxing a phishing message with a service expiry warning show art Ep. 2. Unboxing a phishing message with a service expiry warning

Can I Be Phished?

Each week on Can I Be Phished?, we look at a different threat, to show you how to look for suspicious situations. In this episode: - Scott unboxes a phishing message that looks like a warning notice from a bank, saying his online banking service will soon be expiring. - We are assisted by Dave Ockwell-Jenner, VP of Information Security at Arctic Wolf, a managed security service provider (MSSP) - Dave also provides stories about tracking down advanced persistent threats in a corporate network For more info on Dave and Arctic Wolf: Dave Ockwell-Jenner: http://twitter.com/daveoj Arctic Wolf:...

info_outline
Can I Be Phished? #1 - Unboxing a malicious phishing message that impersonates an amazon email show art Can I Be Phished? #1 - Unboxing a malicious phishing message that impersonates an amazon email

Can I Be Phished?

Unboxing an Artificial Amazonian phishing message. Plus, an interview with Adam Crate of Grade A (MSP in Ottawa). Part 1: Unboxing Scott reviews the steps in the Can I Be Phished? phishing checklist, including: 1) Gut feel garbage check; 2) Sender sanity 3) Link elusiveness and 4) Body believability. A simple phishing message that impersonates an Amazon customer service email is analyzed using the checklist. (Video version is available on Youtube in the Click Armor channel.) Part 2: Interview with Adam Crate, VP Business Services at Grade A, an Ottawa-based Managed Service Provider (Starts at...

info_outline
 
More Episodes

This episode features my guest Ted Demopoulos, a veteran security consultant and author I’ve known for many years. Ted works in all areas of security, and is very active in helping consultants and entrepreneurs build their companies. Ted helps me unbox a phishing message that appears to be from an email administrator saying that my account needs to be updated.

Try the “CAN I BE PHISHED?” online self-assessment game to get a taste of how fun and effective gamified learning and assessment can be.

The Click Armor Phishing Checklist

In each episode, we’ll use our basic phishing checklist to analyze a different phishing message, so you can learn the clues about what to look for, to avoid becoming a victim. Here’s the basic Checklist:

1) Gut Feel Garbage

2) Sender Sanity

3) Link Elusiveness

4) Body Believability

The best way to use the checklist is to try to disqualify a message with each check. If you haven’t thrown out the message by the time you’re finished step 4, it’s not a guarantee that the message is safe. So, if you still aren’t sure, you should ask for help from an IT support person.

Special Guest for Episode #4: Ted Demopoulos

After analyzing the phising message, Ted shares his experiences with phishing incidents and his observations on cyber risks.

You can learn more about Ted at:

http://www.teddemop.com

http://twitter.com/teddemop

http://linkedin.com/in/teddemop

If you’d like to provide us with comments, or make suggestions on specific phishing attacks or scams that you think would be valuable to our audience, please submit a comment on our Contact page.