logo_lightAlogo_lightlogo_light
  • About
  • Products
  • Pricing
  • Knowledge Base
  • Login
  • Products
  • Solutions
  • Search
Can I be phished? - Nora Cox

Can I Be Phished? Ep. 5 - Vexatious Voicemail

[et_pb_section fb_built=”1″ _builder_version=”4.4.6″ custom_padding=”0px|||||” da_disable_devices=”off|off|off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.4.6″ custom_padding=”||8px|||”][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.8.2″]

This episode features my guest Nora Cox, a veteran information security and risk management consultant. Nora and I worked together as Product Managers at security software company Entrust many years ago. Her experience in Chief Risk Officer and Chief Compliance Officer roles makes her a great source of wisdom for businesses looking to develop a security culture.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.8.2″ _module_preset=”default”][et_pb_column type=”4_4″ _builder_version=”4.8.2″ _module_preset=”default”][et_pb_text _builder_version=”4.8.2″ _module_preset=”default” text_font_size=”19px”]

Try the “CAN I BE PHISHED?” online self-assessment game to get a taste of how fun and effective gamified learning and assessment can be.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.4.6″ custom_padding=”5px||8px|||”][et_pb_column type=”1_2″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.8.2″]

The Click Armor Phishing Checklist

In each episode, we’ll use our basic phishing checklist to analyze a different phishing message, so you can learn the clues about what to look for, to avoid becoming a victim. Here’s the basic Checklist:

1) Gut Feel Garbage

2) Sender Sanity

3) Link Elusiveness

4) Body Believability

The best way to use the checklist is to try to disqualify a message with each check. If you haven’t thrown out the message by the time you’re finished step 4, it’s not a guarantee that the message is safe. So, if you still aren’t sure, you should ask for help from an IT support person.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.4.6″][et_pb_video src=”https://youtu.be/U3hmoPGWKyU” _builder_version=”4.7.7″][/et_pb_video][et_pb_text _builder_version=”4.8.2″ _module_preset=”default”]

Audio Only Podcast Version Below

[/et_pb_text][et_pb_text _builder_version=”4.8.2″ background_color=”#0b5394″ hover_enabled=”0″ locked=”off” sticky_enabled=”0″]https://traffic.libsyn.com/secure/clickarmor/CIBP_EP5.mp3[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.4.6″ custom_padding=”8px|||||”][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.8.2″]

Special Guest for Episode #5: Nora Cox

After analyzing our phishing message for this episode, Nora helps me unbox a phishing message that pretends to be a voicemail notification with a link to download an audio file. What could go wrong?

Nora can be found at:

https://www.linkedin.com/in/noracox-leading-security-as-a-culture/

If you’d like to provide us with comments, or make suggestions on specific phishing attacks or scams that you think would be valuable to our audience, please submit a comment on our Contact page (HERE).

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.4.6″][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_post_nav prev_text=”Previous Post” next_text=”Next Post” _builder_version=”4.4.6″ title_text_color=”#ffffff” background_color=”rgba(14,79,136,0.68)” custom_padding=”5px|10px|5px|10px|true|true” border_radii=”on|4px|4px|4px|4px” border_width_all=”1px”][/et_pb_post_nav][/et_pb_column][/et_pb_row][/et_pb_section]
Share
0
[vc_empty_space height="40px"] [vc_row][vc_column width="1/2"][vc_column_text css=""]

Subscribe to our newsletter

Stay up-to-date with the latest news, promotions, and offers from Click Armor.
Follow us on Linkedin

You can unsubscribe at any time

[/vc_column_text][/vc_column][vc_column width="1/2"][vc_column_text css=""][vc_empty_space height="10px"]Subscribe [/vc_column_text][/vc_column][/vc_row]

Click Armor helps business managers battling cyber and compliance risks by using gamified simulations and challenges to engage end-users to avoid breaches and build a strong security culture.

[vc_empty_space height=”0px”]

[elfsight_social_icons id=”4″]

Recent Articles

  • Role-Based Targeted Threats: The Phishing Problem Traditional Training Can’t Solve June 16, 2025
  • Addressing AI opportunities and risks in your cyber security program March 13, 2025

Resources


[vc_row][vc_column width=”1/2″][vc_column_text css=””]
News & Insights
Partner and MSP Program
Gamified Learning
About Click Armor
Our Team
Careers
Pricing
[/vc_column_text][/vc_column][vc_column width=”1/2″][vc_column_text css=””]

Take Assessment
Can I be phished?
Community Forum
Contact


Student Login

[/vc_column_text][/vc_column][/vc_row]

© Copyright All Rights Reserved • Click Armor Corp. | Privacy policy • Terms of use