logo_lightAlogo_lightlogo_light
  • About
  • Products
  • Pricing
  • Knowledge Base
  • Login
  • Products
  • Solutions
  • Search
Ted Demopoulos

Can I Be Phished? Ep. 4 – Abnormal Administrator with Ted Demopoulos

[et_pb_section fb_built=”1″ _builder_version=”4.4.6″ custom_padding=”0px|||||” da_disable_devices=”off|off|off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.4.6″ custom_padding=”||8px|||”][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.6.5″]

This episode features my guest Ted Demopoulos, a veteran security consultant and author I’ve known for many years. Ted works in all areas of security, and is very active in helping consultants and entrepreneurs build their companies. Ted helps me unbox a phishing message that appears to be from an email administrator saying that my account needs to be updated.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.8.2″ _module_preset=”default”][et_pb_column type=”4_4″ _builder_version=”4.8.2″ _module_preset=”default”][et_pb_text _builder_version=”4.8.2″ _module_preset=”default” text_font_size=”19px”]

Try the “CAN I BE PHISHED?” online self-assessment game to get a taste of how fun and effective gamified learning and assessment can be.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.4.6″ custom_padding=”5px||8px|||”][et_pb_column type=”1_2″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.4.8″]

The Click Armor Phishing Checklist

In each episode, we’ll use our basic phishing checklist to analyze a different phishing message, so you can learn the clues about what to look for, to avoid becoming a victim. Here’s the basic Checklist:

1) Gut Feel Garbage

2) Sender Sanity

3) Link Elusiveness

4) Body Believability

The best way to use the checklist is to try to disqualify a message with each check. If you haven’t thrown out the message by the time you’re finished step 4, it’s not a guarantee that the message is safe. So, if you still aren’t sure, you should ask for help from an IT support person.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.4.6″][et_pb_video src=”https://youtu.be/KgBfjlA_MNE” _builder_version=”4.6.5″][/et_pb_video][et_pb_text _builder_version=”4.8.2″ _module_preset=”default” hover_enabled=”0″ sticky_enabled=”0″]

Audio Only Podcast Version Below

[/et_pb_text][et_pb_text _builder_version=”4.8.2″ background_color=”#0b5394″ locked=”off”]https://traffic.libsyn.com/secure/clickarmor/CIBP_EP4.mp3[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.4.6″ custom_padding=”8px|||||”][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.6.5″]

Special Guest for Episode #4: Ted Demopoulos

After analyzing the phising message, Ted shares his experiences with phishing incidents and his observations on cyber risks.

You can learn more about Ted at:

http://www.teddemop.com

http://twitter.com/teddemop

http://linkedin.com/in/teddemop

If you’d like to provide us with comments, or make suggestions on specific phishing attacks or scams that you think would be valuable to our audience, please submit a comment on our Contact page (HERE).

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.4.6″][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_post_nav prev_text=”Previous Post” next_text=”Next Post” _builder_version=”4.4.6″ title_text_color=”#ffffff” background_color=”rgba(14,79,136,0.68)” custom_padding=”5px|10px|5px|10px|true|true” border_radii=”on|4px|4px|4px|4px” border_width_all=”1px”][/et_pb_post_nav][/et_pb_column][/et_pb_row][/et_pb_section]
Share
0
[vc_empty_space height="40px"] [vc_row][vc_column width="1/2"][vc_column_text css=""]

Subscribe to our newsletter

Stay up-to-date with the latest news, promotions, and offers from Click Armor.
Follow us on Linkedin

You can unsubscribe at any time

[/vc_column_text][/vc_column][vc_column width="1/2"][vc_column_text css=""][vc_empty_space height="10px"]Subscribe [/vc_column_text][/vc_column][/vc_row]

Click Armor helps business managers battling cyber and compliance risks by using gamified simulations and challenges to engage end-users to avoid breaches and build a strong security culture.

[vc_empty_space height=”0px”]

[elfsight_social_icons id=”4″]

Recent Articles

  • Role-Based Targeted Threats: The Phishing Problem Traditional Training Can’t Solve June 16, 2025
  • Addressing AI opportunities and risks in your cyber security program March 13, 2025

Resources


[vc_row][vc_column width=”1/2″][vc_column_text css=””]
News & Insights
Partner and MSP Program
Gamified Learning
About Click Armor
Our Team
Careers
Pricing
[/vc_column_text][/vc_column][vc_column width=”1/2″][vc_column_text css=””]

Take Assessment
Can I be phished?
Community Forum
Contact


Student Login

[/vc_column_text][/vc_column][/vc_row]

© Copyright All Rights Reserved • Click Armor Corp. | Privacy policy • Terms of use