Skip to content
The Mel Robbins PodcastThe Mel Robbins Podcast

#1 Cybersecurity Expert Reveals: 5 Ways to Protect Yourself Online (Starting Tonight)

Order your copy of The Let Them Theory 👉 https://melrob.co/let-them-theory 👈 The #1 Best Selling Book of 2025 🔥 Discover how much power you truly have. It all begins with two simple words. Let Them. — If you’ve ever clicked “Accept All Cookies,” ignored software updates, saved your passwords, or logged into free Wi-Fi, you have to hear this. The little “harmless” things you do online are exactly what scammers count on. In today’s conversation, Mel sits down with award-winning cybersecurity expert Caitlin Sarian (aka “Cybersecurity Girl”) to give you the short and simple checklist of things that protect your money, your identity, and your privacy online. You don’t need to understand cybersecurity. You just need to stop treating online habits like they’re harmless, because they can leave you open for a scam. This isn’t about being paranoid, it’s about realizing that a few tiny changes can shut down most online threats. This conversation will educate and inform you. In this episode, you’ll learn: -The biggest cybersecurity mistake almost everyone makes (and how to fix it fast) -The #1 Venmo scam happening right now, and exactly what to do if it happens to you -What to do immediately if your phone is lost or stolen -The 5 essential moves that protect you from most online threats -The fastest way to spot scam links, fake emails, and panic-based phone calls -How to protect your parents, your kids, and your entire family from getting scammed -Simple settings to check tonight: camera, microphone, location, and account access Bookmark this episode and share it with your partner, your parents, and your friends. This is the kind of information that can prevent a mistake you can’t undo. For more resources related to today’s episode, click here for the podcast episode page: https://www.melrobbins.com/episode/episode-371/ Follow The Mel Robbins Podcast on Instagram: https://www.instagram.com/themelrobbinspodcast I’m just your friend. I am not a licensed therapist, and this podcast is NOT intended as a substitute for the advice of a physician, professional coach, psychotherapist, or other qualified professional. Got it? Good. I’ll see you in the next episode. In this episode: 00:00 Meet The Guest 6:11 What Cybersecurity Means & Why It Matters 7:54 Privacy Tips: How to Protect Your Information Online 13:59 Public Wi‑Fi Risks: What to Know and What to Avoid 18:55 Password Security: Password Managers, Security Questions, & Notes App Risks 24:07 Common Cybersecurity Mistakes That Get You Hacked 30:52 Common Payment App Scams & How to Avoid Them 37:08 What to Do After a Data Breach: Step-by-Step Damage Control 38:04 The Fastest Way to Stop Identity Theft 39:27 How to Protect Seniors From Online Scams 41:00 Kids Online Safety Tools: How to Protect Your Children Online 42:53 Sextortion Help: What to Do + Where to Report Online Crimes 44:48 What to Do Immediately If Your Phone Is Stolen 46:32 The Risk of Wearable Technology 51:22 3 Privacy Settings to Check in Your Apps (Do This Now) 54:21 Facial Recognition Explained: How It Works & Privacy Risks 58:31 Can Home Security Systems & Cameras Be Hacked? 1:04:47 5 Essential Online Safety Tips to Prevent Hacking & Scams — Follow Mel: Instagram: https://www.instagram.com/melrobbins/ TikTok: http://tiktok.com/@melrobbins Facebook: https://www.facebook.com/melrobbins LinkedIn: https://www.linkedin.com/in/melrobbins Website: http://melrobbins.com​ — Sign up for Mel’s newsletter: https://melrob.co/sign-up-newsletter A note from Mel to you, twice a week, sharing simple, practical ways to build the life you want. — Subscribe to Mel’s channel here: https://www.youtube.com/melrobbins​?sub_confirmation=1 — Listen to The Mel Robbins Podcast 🎧 New episodes drop every Monday & Thursday! https://melrob.co/spotify https://melrob.co/applepodcasts https://melrob.co/amazonmusic — Looking for Mel’s books on Amazon? Find them here: The Let Them Theory: https://amzn.to/3IQ21Oe The Let Them Theory Audiobook: https://amzn.to/413SObp The High 5 Habit: https://amzn.to/3fMvfPQ The 5 Second Rule: https://amzn.to/4l54fah

Mel RobbinshostCaitlin Sarianguest
Feb 19, 20261h 13mWatch on YouTube ↗

At a glance

WHAT IT’S REALLY ABOUT

Cybersecurity expert shares five nightly habits to prevent scams and hacks

  1. Mel Robbins interviews award-winning cybersecurity educator Caitlin Sarian to demystify personal cybersecurity and explain why “it’s not if, it’s when” for scams and account takeovers.
  2. They walk through how everyday behaviors—reused passwords, over-sharing personal data, clicking links quickly, using public Wi‑Fi, and lax app permissions—create a large digital footprint that criminals exploit with social engineering and AI.
  3. Caitlin emphasizes small, repeatable “cyber hygiene” routines (like brushing teeth) and offers concrete actions for adults, seniors, and kids, including safe words for voice-clone scams and steps after breaches.
  4. The episode culminates in five essential protections: strong unique passwords, automatic updates, freezing credit, pausing before clicking links, and limiting data exposure (including using deletion/opt-out services).

IDEAS WORTH REMEMBERING

5 ideas

Assume you’re a target; criminals want money, not “important people.”

Caitlin rejects “hackers aren’t interested in me.” Scammers scale attacks and pick easy targets—especially people reusing passwords or reacting quickly under pressure.

Your digital footprint is essentially everything you do online—and it’s searchable.

Apps, accounts, posts, registries, and browsing behavior add up. OSINT plus AI can assemble detailed profiles (including security-question answers) in seconds, enabling impersonation and account recovery abuse.

Incognito/private browsing doesn’t hide you from websites or tracking ecosystems.

It primarily prevents your device/browser from saving local history/cookies. The destination site and other parties can still detect visits and activity.

Use strong, unique passwords (avoid “base password” variations) and store them safely.

Attackers can take one leaked password and algorithmically try thousands of variants (e.g., adding numbers/symbols). Use a password manager (or locked notes / written log stored securely for non-mobile users) to avoid reuse.

Turn on automatic software updates to patch vulnerabilities attackers already know about.

Many “bug fixes” are security patches for newly discovered holes. Delaying updates keeps you exposed to known exploits.

WORDS WORTH SAVING

5 quotes

Cybersecurity is not for experts, it's literally for everyone.

Caitlin Sarian

It's not a matter of if it happens to people, it's a matter of when.

Caitlin Sarian

If there's any free product or app, you are the product.

Caitlin Sarian

The incognito is actually not incognito.

Caitlin Sarian

Password is the number one most popular password. That is still used to this day.

Caitlin Sarian

Digital footprint and OSINT (open-source intelligence)Incognito mode misconceptionsPublic Wi‑Fi and HTTPS/VPN basicsPasswords, password managers, and security questionsPhishing, impersonation calls, and link-trap scheduling scamsPayment app scams (Venmo/Zelle) and credit vs debitData breach response and credit freezesProtecting seniors and kids (privacy settings, messaging limits)Sextortion and reporting via IC3.govDevice theft hardening (airplane mode control)App permissions: camera, microphone, location; photo library scanningFacial recognition and biometrics risk tradeoffsHacking risks for cameras/IoT (laptop, doorbells, baby monitors)

High quality AI-generated summary created from speaker-labeled transcript.

Get more out of YouTube videos.

High quality summaries for YouTube videos. Accurate transcripts to search & find moments. Powered by ChatGPT & Claude AI.

Add to Chrome