8 episodes

The "Can I Be Phished?" podcast helps you learn how to analyze phishing emails by "unboxing" different messages each episode. So you can learn the subtle tricks used by attackers. We also try to have guests on the show to explore different perspectives on phishing and cybersecurity, always with a view to the impacts on businesses and individuals.

Can I Be Phished‪?‬ Click Armor

    • Business
    • 5.0 • 1 Rating

The "Can I Be Phished?" podcast helps you learn how to analyze phishing emails by "unboxing" different messages each episode. So you can learn the subtle tricks used by attackers. We also try to have guests on the show to explore different perspectives on phishing and cybersecurity, always with a view to the impacts on businesses and individuals.

    Ep. 8 - Zoom Zinger

    Ep. 8 - Zoom Zinger

    In this episode, I explore a fake Zoom meeting invitation with Jeff Ton, author of Amplify Your Job Search, and Amplify Your Value.
    We all encounter so many online meetings these days, that a Zoom invitation is a great phishing pretext. Join us as we analyze one that illustrates how this works.
    Jeff is a former executive who now coaches others to maximize their potential in the IT industry. He shares insights into his experiences and lessons learned that make him a great speaker and author.
    Jeff can be reached at:
    http://jeffreyston.com
    https://www.linkedin.com/in/jtonindy/
    https://twitter.com/jtonindy
     

    • 28 min
    Ep. 7 - Funny Fedex Phishing Message

    Ep. 7 - Funny Fedex Phishing Message

    We take a look at a pretty obvious - you might even say "funny" - phishing email that tries to convince us that we're in for some great surprises from FedEx.
    Still, there are some good lessons in spotting phishing attacks, followed by some great tips and advice from Pete on marketing and managing money successfully.
    Whether you are a compliance manager, a CISO or an IT Service provider, you’ve got a communication and marketing challenge.
    How do you effectively get your message across to employees and end-users?
    In this episode of Can I Be Phished?, I speak with Pete Matheson, a leading IT business coach and video content creator who knows how to build messaging programs using video.
    Pete and I also dig into his tips and lessons learned as a Managed Service Provider about using video to do persuasive messaging and to create content that people want to consume.
    Pete can be reached at:
    http://www.petematheson.co.uk
    http://www.youtube.com/petematheson
    http://www.linkedin.com/in/petematheson
    If you'd like to provide us with comments, or make suggestions on specific phishing attacks or scams that you think would be valuable to our audience, please submit a comment on our Contact page (HERE).

    • 21 min
    Ep. 6 - Deceitful Delivery

    Ep. 6 - Deceitful Delivery

    This episode features Stuart Crawford, a fellow Canadian, now living in Florida. Stuart heads up Ulistic MSP Marketing, which helps service providers market their services to customers.






    Try the “CAN I BE PHISHED?” online self-assessment game to get a taste of how fun and effective gamified learning and assessment can be.




    The Click Armor Phishing Checklist
    In each episode, we’ll use our basic phishing checklist to analyze a different phishing message, so you can learn the clues about what to look for, to avoid becoming a victim. Here’s the basic Checklist:
    1) Gut Feel Garbage
    2) Sender Sanity
    3) Link Elusiveness
    4) Body Believability
    The best way to use the checklist is to try to disqualify a message with each check. If you haven’t thrown out the message by the time you’re finished step 4, it’s not a guarantee that the message is safe. So, if you still aren’t sure, you should ask for help from an IT support person.




    Special Guest for Episode #6: Stuart Crawford

    After analyzing the phising message, Stuart shares how the approach I’m using to show people how to analyze phishing messages can be used by MSPs to market to their customers on security tips and other useful information.
    Stuart can be reached at Ulistic MSP Marketing via:
    https://www.linkedin.com/in/itservicesmarketing/
    https://www.ulistic.com/msp-marketing/
    If you’d like to provide us with comments, or make suggestions on specific phishing attacks or scams that you think would be valuable to our audience, please submit a comment on our Contact page (HERE).

    • 30 min
    Ep. 5 - Vexatious Voicemail

    Ep. 5 - Vexatious Voicemail

    This episode features my guest Nora Cox, a veteran information security and risk management consultant. Nora and I worked together as Product Managers at security software company Entrust many years ago. Her experience in Chief Risk Officer and Chief Compliance Officer roles makes her a great source of wisdom for businesses looking to develop a security culture.






    Try the “CAN I BE PHISHED?” online self-assessment game to get a taste of how fun and effective gamified learning and assessment can be.




    The Click Armor Phishing Checklist
    In each episode, we’ll use our basic phishing checklist to analyze a different phishing message, so you can learn the clues about what to look for, to avoid becoming a victim. Here’s the basic Checklist:
    1) Gut Feel Garbage
    2) Sender Sanity
    3) Link Elusiveness
    4) Body Believability
    The best way to use the checklist is to try to disqualify a message with each check. If you haven’t thrown out the message by the time you’re finished step 4, it’s not a guarantee that the message is safe. So, if you still aren’t sure, you should ask for help from an IT support person.




    Special Guest for Episode #5: Nora Cox

    After analyzing our phishing message for this episode, Nora helps me unbox a phishing message that pretends to be a voicemail notification with a link to download an audio file. What could go wrong?
    Nora can be found at:
    https://www.linkedin.com/in/noracox-leading-security-as-a-culture/
    If you’d like to provide us with comments, or make suggestions on specific phishing attacks or scams that you think would be valuable to our audience, please submit a comment on our Contact page (HERE).

    • 27 min
    Can I Be Phished?

    Can I Be Phished?

    This episode features my guest Ted Demopoulos, a veteran security consultant and author I’ve known for many years. Ted works in all areas of security, and is very active in helping consultants and entrepreneurs build their companies. Ted helps me unbox a phishing message that appears to be from an email administrator saying that my account needs to be updated.






    Try the “CAN I BE PHISHED?” online self-assessment game to get a taste of how fun and effective gamified learning and assessment can be.




    The Click Armor Phishing Checklist
    In each episode, we’ll use our basic phishing checklist to analyze a different phishing message, so you can learn the clues about what to look for, to avoid becoming a victim. Here’s the basic Checklist:
    1) Gut Feel Garbage
    2) Sender Sanity
    3) Link Elusiveness
    4) Body Believability
    The best way to use the checklist is to try to disqualify a message with each check. If you haven’t thrown out the message by the time you’re finished step 4, it’s not a guarantee that the message is safe. So, if you still aren’t sure, you should ask for help from an IT support person.




    Special Guest for Episode #4: Ted Demopoulos

    After analyzing the phising message, Ted shares his experiences with phishing incidents and his observations on cyber risks.
    You can learn more about Ted at:
    http://www.teddemop.com
    http://twitter.com/teddemop
    http://linkedin.com/in/teddemop
    If you’d like to provide us with comments, or make suggestions on specific phishing attacks or scams that you think would be valuable to our audience, please submit a comment on our Contact page.

    • 30 min
    COVID CON - Unboxing a phishing message from the World Health Organization

    COVID CON - Unboxing a phishing message from the World Health Organization

    Shawn and Scott unbox a message that looks like it is from the WHO, with an offer to provide assistance. So, we get lots of good insights into this kind of cyber attack, and then explore Shawn's experience in ransomware incidents and some great recommendations on cyber insurance.
     
    Shawn is reachable at:
    http://twitter.com/shawnetuma
    http://linkedin.com/in/shawnetuma
    http://www.shawnetuma.com
     
    To comment on this episode, you can go to: www.clickarmor.ca/contact

    • 42 min

Customer Reviews

5.0 out of 5
1 Rating

1 Rating

Top Podcasts In Business

Prof G Markets
Vox Media Podcast Network
The Diary Of A CEO with Steven Bartlett
DOAC
Private Equity Podcast: Karma School of Business
BluWave
The Prof G Pod with Scott Galloway
Vox Media Podcast Network
The Ramsey Show
Ramsey Network
Dare to Lead with Brené Brown
Vox Media Podcast Network