logo_lightAlogo_lightlogo_light
  • About
  • Products
  • Pricing
  • Knowledge Base
  • Login
  • Products
  • Solutions
  • Search
Can I Be Phished? Zoom Zinger with Jeff Ton

Can I Be Phished? Ep. 8 - Zoom Zinger with Jeff Ton

[et_pb_section fb_built=”1″ _builder_version=”4.4.6″ custom_padding=”0px|||||” da_disable_devices=”off|off|off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.4.6″ custom_padding=”||8px|||”][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.9.10″]

This episode features Jeff Ton, speaker, explorer and author of “Amplify Your Value” and “Amplify Your Job Search”. Jeff has some great tips and stories for MSPs and IT professionals who want to up their game.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.8.2″ _module_preset=”default”][et_pb_column type=”4_4″ _builder_version=”4.8.2″ _module_preset=”default”][et_pb_text _builder_version=”4.8.2″ _module_preset=”default” text_font_size=”19px”]

Try the “CAN I BE PHISHED?” online self-assessment game to get a taste of how fun and effective gamified learning and assessment can be.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”2_5,3_5″ _builder_version=”4.4.6″ custom_padding=”5px||8px|||”][et_pb_column type=”2_5″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.4.8″]

The Click Armor Phishing Checklist

In each episode, we’ll use our basic phishing checklist to analyze a different phishing message, so you can learn the clues about what to look for, to avoid becoming a victim. Here’s the basic Checklist:

1) Gut Feel Garbage

2) Sender Sanity

3) Link Elusiveness

4) Body Believability

The best way to use the checklist is to try to disqualify a message with each check. If you haven’t thrown out the message by the time you’re finished step 4, it’s not a guarantee that the message is safe. So, if you still aren’t sure, you should ask for help from an IT support person.

[/et_pb_text][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.4.6″][et_pb_video src=”https://www.youtube.com/watch?v=XQN9PmWP6Fc” _builder_version=”4.9.10″][/et_pb_video][et_pb_text _builder_version=”4.8.2″ _module_preset=”default” text_font_size=”19px” locked=”off”]
Audio Only Podcast Version Below
[/et_pb_text][et_pb_text _builder_version=”4.9.10″ background_color=”#0b5394″ locked=”off”]https://traffic.libsyn.com/secure/clickarmor/CIBP_EP8_-_Jeff_Ton_-_Audio.mp3[/et_pb_text][et_pb_text _builder_version=”4.8.2″ _module_preset=”default”]
Subscribe on Apple Podcasts
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.4.6″ custom_padding=”8px|||||”][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.9.10″]

Special Guest for Episode #8: Jeff Ton

In this episode, I explore a fake Zoom meeting invitation with Jeff Ton, author of Amplify Your Job Search, and Amplify Your Value.

We all encounter so many online meetings these days, that a Zoom invitation is a great phishing pretext. Join us as we analyze one that illustrates how this works.

Jeff is a former executive who now coaches others to maximize their potential in the IT industry. He shares insights into his experiences and lessons learned that make him a great speaker and author.

Jeff can be reached at:

http://jeffreyston.com

https://www.linkedin.com/in/jtonindy/

https://twitter.com/jtonindy

If you’d like to provide us with comments, or make suggestions on specific phishing attacks or scams that you think would be valuable to our audience, please submit a comment on our Contact page (HERE).

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.4.6″][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_post_nav prev_text=”Previous Post” next_text=”Next Post” _builder_version=”4.4.6″ title_text_color=”#ffffff” background_color=”rgba(14,79,136,0.68)” custom_padding=”5px|10px|5px|10px|true|true” border_radii=”on|4px|4px|4px|4px” border_width_all=”1px”][/et_pb_post_nav][/et_pb_column][/et_pb_row][/et_pb_section]
Share
0
[vc_empty_space height="40px"] [vc_row][vc_column width="1/2"][vc_column_text css=""]

Subscribe to our newsletter

Stay up-to-date with the latest news, promotions, and offers from Click Armor.
Follow us on Linkedin

You can unsubscribe at any time

[/vc_column_text][/vc_column][vc_column width="1/2"][vc_column_text css=""][vc_empty_space height="10px"]Subscribe [/vc_column_text][/vc_column][/vc_row]

Click Armor helps business managers battling cyber and compliance risks by using gamified simulations and challenges to engage end-users to avoid breaches and build a strong security culture.

[vc_empty_space height=”0px”]

[elfsight_social_icons id=”4″]

Recent Articles

  • Role-Based Targeted Threats: The Phishing Problem Traditional Training Can’t Solve June 16, 2025
  • Addressing AI opportunities and risks in your cyber security program March 13, 2025

Resources


[vc_row][vc_column width=”1/2″][vc_column_text css=””]
News & Insights
Partner and MSP Program
Gamified Learning
About Click Armor
Our Team
Careers
Pricing
[/vc_column_text][/vc_column][vc_column width=”1/2″][vc_column_text css=””]

Take Assessment
Can I be phished?
Community Forum
Contact


Student Login

[/vc_column_text][/vc_column][/vc_row]

© Copyright All Rights Reserved • Click Armor Corp. | Privacy policy • Terms of use