
In our second episode of Can I Be Phished? we welcome Dave Ockwell-Jenner, the VP of Information Security at Arctic Wolf. Dave helps me unbox another phishing message that is warning me that my online banking service will expire soon.
NOTE: Due to the visual nature of the phishing email analysis, the video version provides the best experience. However, I explain the key details of what I’m seeing for audio listeners.
[/et_pb_text][et_pb_text _builder_version=”4.8.2″ _module_preset=”default” text_font_size=”19px” hover_enabled=”0″ sticky_enabled=”0″]Try the “CAN I BE PHISHED?” online self-assessment game to get a taste of how fun and effective gamified learning and assessment can be.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.4.6″ custom_padding=”5px||8px|||”][et_pb_column type=”1_2″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.4.8″]The Click Armor Phishing Checklist
In each episode, we’ll use our basic phishing checklist to analyze a different phishing message, so you can learn the clues about what to look for, to avoid becoming a victim. Here’s the basic Checklist:
1) Gut Feel Garbage
2) Sender Sanity
3) Link Elusiveness
4) Body Believability
The best way to use the checklist is to try to disqualify a message with each check. If you haven’t thrown out the message by the time you’re finished step 4, it’s not a guarantee that the message is safe. So, if you still aren’t sure, you should ask for help from an IT support person.
[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.4.6″][et_pb_video src=”https://www.youtube.com/watch?v=uZa5BQ4RmuQ” _builder_version=”4.5.1″][/et_pb_video][et_pb_text _builder_version=”4.4.8″]Audio Only Version Below
[/et_pb_text][et_pb_text _builder_version=”4.5.1″ background_color=”#0b5394″][/et_pb_text][et_pb_button button_url=”https://podcasts.apple.com/ca/podcast/can-i-be-phished/id1519222381″ button_text=”Subscribe on Apple Podcasts” button_alignment=”center” _builder_version=”4.5.1″][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.4.6″ custom_padding=”8px|||||”][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.5.1″]Special Guest for Episode #2: Dave Ockwell-Jenner
In this episode, Dave also shares his insights into what he has seen having worked in information security for a number of enterprises over the past 20 years. And he has an interesting story about tracking down a persistent piece of malware that made its way into the network of an organization he worked for.
You can learn more about Arctic Wolf at: www.arcticwolf.com
Dave also tweets at: www.twitter.com/daveoj
If you’d like to provide us with comments, or make suggestions on specific phishing attacks or scams that you think would be valuable to our audience, please submit a comment on our Contact page (HERE).
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.4.6″][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_post_nav prev_text=”Previous Post” next_text=”Next Post” _builder_version=”4.4.6″ title_text_color=”#ffffff” background_color=”rgba(14,79,136,0.68)” custom_padding=”5px|10px|5px|10px|true|true” border_radii=”on|4px|4px|4px|4px” border_width_all=”1px”][/et_pb_post_nav][/et_pb_column][/et_pb_row][/et_pb_section]