
Sign up to save your podcasts
Or


You don't need to break a system if someone will open it for you. You don't need malware if a message feels urgent enough. Most modern breaches don't start with code. They start with a conversation.
This episode breaks down phishing and social engineering by explaining why these attacks keep working: they don't fight logic, they sidestep it. It covers how modern phishing has evolved beyond email to include text messages, voice calls, MFA fatigue attacks, QR code phishing, and AI-assisted impersonation. The episode walks through the emotional triggers attackers rely on (urgency, authority, fear, curiosity, helpfulness), why "I'd never fall for that" is often the opening, and what to do if you've already clicked. The starter kit covers the ten-second pause, second-channel verification, treating "unexpected plus urgent" as suspicious, inspecting senders and destinations, never typing passwords from links, using password managers for detection, strong MFA methods, two-person approval for money movement, and reporting phishing to help stop it for others.
Whether you're responsible for protecting a team or you just want to stop second-guessing every email, Plaintext with Rich explains what actually works.
Is there a topic/term you want me to discuss next? Text me!!
YouTube more your speed? → https://links.sith2.com/YouTube
Apple Podcasts your usual stop? → https://links.sith2.com/Apple
Neither of those? Spotify’s over here → https://links.sith2.com/Spotify
Prefer reading quietly at your own pace? → https://links.sith2.com/Blog
Join us in The Cyber Sanctuary (no robes required) → https://links.sith2.com/Discord
Follow the human behind the microphone → https://links.sith2.com/linkedin
Need another way to reach me? That’s here → https://linktr.ee/rich.greene
By Rich GreeneYou don't need to break a system if someone will open it for you. You don't need malware if a message feels urgent enough. Most modern breaches don't start with code. They start with a conversation.
This episode breaks down phishing and social engineering by explaining why these attacks keep working: they don't fight logic, they sidestep it. It covers how modern phishing has evolved beyond email to include text messages, voice calls, MFA fatigue attacks, QR code phishing, and AI-assisted impersonation. The episode walks through the emotional triggers attackers rely on (urgency, authority, fear, curiosity, helpfulness), why "I'd never fall for that" is often the opening, and what to do if you've already clicked. The starter kit covers the ten-second pause, second-channel verification, treating "unexpected plus urgent" as suspicious, inspecting senders and destinations, never typing passwords from links, using password managers for detection, strong MFA methods, two-person approval for money movement, and reporting phishing to help stop it for others.
Whether you're responsible for protecting a team or you just want to stop second-guessing every email, Plaintext with Rich explains what actually works.
Is there a topic/term you want me to discuss next? Text me!!
YouTube more your speed? → https://links.sith2.com/YouTube
Apple Podcasts your usual stop? → https://links.sith2.com/Apple
Neither of those? Spotify’s over here → https://links.sith2.com/Spotify
Prefer reading quietly at your own pace? → https://links.sith2.com/Blog
Join us in The Cyber Sanctuary (no robes required) → https://links.sith2.com/Discord
Follow the human behind the microphone → https://links.sith2.com/linkedin
Need another way to reach me? That’s here → https://linktr.ee/rich.greene