logo_lightAlogo_lightlogo_light
  • About
  • Products
  • Pricing
  • Knowledge Base
  • Login
  • Products
  • Solutions
  • Search
Can I Be Phished? COVID CON - Shawn Tuma
[et_pb_section fb_built=”1″ _builder_version=”4.4.6″ custom_padding=”0px|||||” da_disable_devices=”off|off|off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.4.6″ custom_padding=”||8px|||”][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.6.5″]

In our third episode of Can I Be Phished? we welcome Shawn Tuma, a data privacy and cyber security lawyer at Spencer Fane law firm in Houston, Texas. Shawn helps me unbox another phishing message that is offering something enticing from the World Health Organization.

NOTE: Due to the visual nature of the phishing email analysis, the video version provides the best experience. However, I explain the key details of what I’m seeing for audio listeners.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.8.2″ _module_preset=”default”][et_pb_column _builder_version=”4.8.2″ _module_preset=”default” type=”4_4″][et_pb_text _builder_version=”4.8.2″ _module_preset=”default” text_font_size=”19px” hover_enabled=”0″ sticky_enabled=”0″]

Try the “CAN I BE PHISHED?” online self-assessment game to get a taste of how fun and effective gamified learning and assessment can be.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.4.6″ custom_padding=”5px||8px|||”][et_pb_column type=”1_2″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.4.8″]

The Click Armor Phishing Checklist

In each episode, we’ll use our basic phishing checklist to analyze a different phishing message, so you can learn the clues about what to look for, to avoid becoming a victim. Here’s the basic Checklist:

1) Gut Feel Garbage

2) Sender Sanity

3) Link Elusiveness

4) Body Believability

The best way to use the checklist is to try to disqualify a message with each check. If you haven’t thrown out the message by the time you’re finished step 4, it’s not a guarantee that the message is safe. So, if you still aren’t sure, you should ask for help from an IT support person.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.4.6″][et_pb_video src=”https://www.youtube.com/watch?v=G83kceGUn98″ _builder_version=”4.6.5″][/et_pb_video][et_pb_text _builder_version=”4.4.8″]

Audio Only Version Below

[/et_pb_text][et_pb_text _builder_version=”4.6.5″ background_color=”#0b5394″]https://traffic.libsyn.com/secure/clickarmor/CIBP_EP3.mp3[/et_pb_text][et_pb_button button_url=”https://podcasts.apple.com/ca/podcast/can-i-be-phished/id1519222381″ button_text=”Subscribe on iTunes” button_alignment=”center” _builder_version=”4.4.8″][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.4.6″ custom_padding=”8px|||||”][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.6.5″]

Special Guest for Episode #2: Shawn Tuma

After analyzing the phising message, Shawn shares his experiences with ransomware cases and has some great insights on cyber insurance.

You can learn more about Shawn at:

http://www.shawnetuma.com

http://twitter.com/shawnetuma

http://linkedin.com/in/shawnetuma

If you’d like to provide us with comments, or make suggestions on specific phishing attacks or scams that you think would be valuable to our audience, please submit a comment on our Contact page (HERE).

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.4.6″][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_post_nav prev_text=”Previous Post” next_text=”Next Post” _builder_version=”4.4.6″ title_text_color=”#ffffff” background_color=”rgba(14,79,136,0.68)” custom_padding=”5px|10px|5px|10px|true|true” border_radii=”on|4px|4px|4px|4px” border_width_all=”1px”][/et_pb_post_nav][/et_pb_column][/et_pb_row][/et_pb_section]
Share
0
[vc_empty_space height="40px"] [vc_row][vc_column width="1/2"][vc_column_text css=""]

Subscribe to our newsletter

Stay up-to-date with the latest news, promotions, and offers from Click Armor.
Follow us on Linkedin

You can unsubscribe at any time

[/vc_column_text][/vc_column][vc_column width="1/2"][vc_column_text css=""][vc_empty_space height="10px"]Subscribe [/vc_column_text][/vc_column][/vc_row]

Click Armor helps business managers battling cyber and compliance risks by using gamified simulations and challenges to engage end-users to avoid breaches and build a strong security culture.

[vc_empty_space height=”0px”]

[elfsight_social_icons id=”4″]

Recent Articles

  • Role-Based Targeted Threats: The Phishing Problem Traditional Training Can’t Solve June 16, 2025
  • Addressing AI opportunities and risks in your cyber security program March 13, 2025

Resources


[vc_row][vc_column width=”1/2″][vc_column_text css=””]
News & Insights
Partner and MSP Program
Gamified Learning
About Click Armor
Our Team
Careers
Pricing
[/vc_column_text][/vc_column][vc_column width=”1/2″][vc_column_text css=””]

Take Assessment
Can I be phished?
Community Forum
Contact


Student Login

[/vc_column_text][/vc_column][/vc_row]

© Copyright All Rights Reserved • Click Armor Corp. | Privacy policy • Terms of use