Skip to content
The Mel Robbins PodcastThe Mel Robbins Podcast

#1 Cybersecurity Expert Reveals: 5 Ways to Protect Yourself Online (Starting Tonight)

Order your copy of The Let Them Theory 👉 https://melrob.co/let-them-theory 👈 The #1 Best Selling Book of 2025 🔥 Discover how much power you truly have. It all begins with two simple words. Let Them. — If you’ve ever clicked “Accept All Cookies,” ignored software updates, saved your passwords, or logged into free Wi-Fi, you have to hear this. The little “harmless” things you do online are exactly what scammers count on. In today’s conversation, Mel sits down with award-winning cybersecurity expert Caitlin Sarian (aka “Cybersecurity Girl”) to give you the short and simple checklist of things that protect your money, your identity, and your privacy online. You don’t need to understand cybersecurity. You just need to stop treating online habits like they’re harmless, because they can leave you open for a scam. This isn’t about being paranoid, it’s about realizing that a few tiny changes can shut down most online threats. This conversation will educate and inform you. In this episode, you’ll learn: -The biggest cybersecurity mistake almost everyone makes (and how to fix it fast) -The #1 Venmo scam happening right now, and exactly what to do if it happens to you -What to do immediately if your phone is lost or stolen -The 5 essential moves that protect you from most online threats -The fastest way to spot scam links, fake emails, and panic-based phone calls -How to protect your parents, your kids, and your entire family from getting scammed -Simple settings to check tonight: camera, microphone, location, and account access Bookmark this episode and share it with your partner, your parents, and your friends. This is the kind of information that can prevent a mistake you can’t undo. For more resources related to today’s episode, click here for the podcast episode page: https://www.melrobbins.com/episode/episode-371/ Follow The Mel Robbins Podcast on Instagram: https://www.instagram.com/themelrobbinspodcast I’m just your friend. I am not a licensed therapist, and this podcast is NOT intended as a substitute for the advice of a physician, professional coach, psychotherapist, or other qualified professional. Got it? Good. I’ll see you in the next episode. In this episode: 00:00 Meet The Guest 6:11 What Cybersecurity Means & Why It Matters 7:54 Privacy Tips: How to Protect Your Information Online 13:59 Public Wi‑Fi Risks: What to Know and What to Avoid 18:55 Password Security: Password Managers, Security Questions, & Notes App Risks 24:07 Common Cybersecurity Mistakes That Get You Hacked 30:52 Common Payment App Scams & How to Avoid Them 37:08 What to Do After a Data Breach: Step-by-Step Damage Control 38:04 The Fastest Way to Stop Identity Theft 39:27 How to Protect Seniors From Online Scams 41:00 Kids Online Safety Tools: How to Protect Your Children Online 42:53 Sextortion Help: What to Do + Where to Report Online Crimes 44:48 What to Do Immediately If Your Phone Is Stolen 46:32 The Risk of Wearable Technology 51:22 3 Privacy Settings to Check in Your Apps (Do This Now) 54:21 Facial Recognition Explained: How It Works & Privacy Risks 58:31 Can Home Security Systems & Cameras Be Hacked? 1:04:47 5 Essential Online Safety Tips to Prevent Hacking & Scams — Follow Mel: Instagram: https://www.instagram.com/melrobbins/ TikTok: http://tiktok.com/@melrobbins Facebook: https://www.facebook.com/melrobbins LinkedIn: https://www.linkedin.com/in/melrobbins Website: http://melrobbins.com​ — Sign up for Mel’s newsletter: https://melrob.co/sign-up-newsletter A note from Mel to you, twice a week, sharing simple, practical ways to build the life you want. — Subscribe to Mel’s channel here: https://www.youtube.com/melrobbins​?sub_confirmation=1 — Listen to The Mel Robbins Podcast 🎧 New episodes drop every Monday & Thursday! https://melrob.co/spotify https://melrob.co/applepodcasts https://melrob.co/amazonmusic — Looking for Mel’s books on Amazon? Find them here: The Let Them Theory: https://amzn.to/3IQ21Oe The Let Them Theory Audiobook: https://amzn.to/413SObp The High 5 Habit: https://amzn.to/3fMvfPQ The 5 Second Rule: https://amzn.to/4l54fah

Mel RobbinshostCaitlin Sarianguest
Feb 19, 20261h 13mWatch on YouTube ↗

EVERY SPOKEN WORD

  1. 0:006:11

    Meet The Guest

    1. MR

      Today, you and I are going to learn to protect yourself online from award-winning cybersecurity expert, Caitlin Sarian. She has been recognized with multiple awards, including Cybersecurity Woman of the World, Cybersecurity Educator of the Year, Top CyberNews Magazine 40 Under 40 in 2024. Caitlin has been on a mission to make cybersecurity easy.

    2. CS

      [upbeat music] Cybersecurity is not for experts, it's literally for everyone. We use it every day, and it's not supposed to be a scary word. It's not a matter of if it happens to people, it's a matter of when. Everyone is gonna be an easy target because we were never taught how to protect ourselves. Password is the number one most popular password. That is still used to this day.

    3. MR

      Password?

    4. CS

      Yeah.

    5. MR

      And so as an expert in cybersecurity, you never hand out your real birthday or name or phone number online? Why?

    6. CS

      Correct. My question back to you is, why do they need it?

    7. MR

      Uh-

    8. CS

      Why do they need your phone number? Have they ever called you?

    9. MR

      You also never post vacation photos while you're still away. Why? You also warn people about free Wi-Fi. Why?

    10. CS

      Uh, I always say, if there's any free product or app, you are the product. Yeah, any of the apps that you use, the games that you play on your phone, the websites you go to, the, uh, accounts that you make online, like, every single thing that you're doing is... builds a larger and larger digital footprint.

    11. MR

      Everything?

    12. CS

      Everything.

    13. MR

      If we just focus on these five things, even though you may feel overwhelmed right now, these are the five things that really will protect you online. What are those five things?

    14. CS

      Passwords, software updates. The third thing you are gonna do is freeze your credit. The fourth thing you are doing is taking nine seconds before you click on any link.

    15. MR

      What's the final thing that we're gonna do to protect ourselves?

    16. CS

      Limit the-

    17. MR

      [upbeat music] Hey, it's Mel, and before we get into this episode with an award-winning cybersecurity expert, you're gonna love this. Holy cow, my jaw was on the floor about the Venmo scam she's about to tell you about. My team was showing me 57% of you who watch the Mel Robbins Podcast here on YouTube are not subscribed yet. Could you do me a quick favor? Just hit Subscribe so that you don't miss any of the episodes that we post here on YouTube. It lets me know you're enjoying the guests and the content that we're bringing you, because I wanna make sure you don't miss a thing, and I'm so glad you're here for this episode 'cause this is a really good one. All right, let's dive in. [upbeat music] Caitlin Sarian, welcome to the Mel Robbins Podcast.

    18. CS

      Thank you so much for having me. I'm honored to be here.

    19. MR

      This is one of these conversations that I am equal parts so excited for, and I'm also feeling a little nervous because I know I'm going to learn that I'm doing a lot of things wrong. [chuckles] So do you get that a lot with people?

    20. CS

      Yeah, but the thing is, you're not supposed to know all this. Like, we were never taught this, so you shouldn't feel, like, embarrassed or ashamed by it.

    21. MR

      Okay.

    22. CS

      We're gonna, like, empower you with the right things to do.

    23. MR

      Okay, I love that, and here's where I wanna start. What could change about my life if I take everything to heart that you are about to teach us about cybersecurity, protecting ourselves, making smart decisions, especially online? What could change about my life if I apply everything you're about to teach us?

    24. CS

      Yeah. So cyber scams are massive right now, and actually, that economy is the third-largest economy in the world. That's how much money they're making from these cyber scams.

    25. MR

      Wait a minute, the third-

    26. CS

      Third largest. US, China, cybersecurity scams.

    27. MR

      What?

    28. CS

      Yeah. It's more than, I think, Germany and Japan's economy combined. So it's not a matter of if it happens to people, it's a matter of when, and no one's talking about it, and a lot of times, when people are getting scammed, they're ashamed of it.

    29. MR

      Mm.

    30. CS

      So the point of this podcast is to empower you and give you cybersecurity routines that you can do, simple, easy, actionable tips that you can take back and start incorporating into your life so you feel safer and more protected online.

  2. 6:117:54

    What Cybersecurity Means & Why It Matters

    1. CS

      is protecting your digital footprint, and your digital footprint is pretty much every single thing you do online.

    2. MR

      So give me an example of what is part of your digital footprint-

    3. CS

      Right

    4. MR

      ... that might surprise you, that, "Oh, that's part of my digital footprint?"

    5. CS

      Yeah. Any of the apps that you use, the games that you play on your phone, the websites you go to, the, uh, accounts that you make online. Like, every single thing that you're doing is wh- builds a larger and larger digital footprint.

    6. MR

      Everything?

    7. CS

      Everything.

    8. MR

      So basically-

    9. CS

      It's all being recorded in some way, shape, or form.

    10. MR

      All of it?

    11. CS

      Yeah.

    12. MR

      Even when I think it's not?

    13. CS

      Yeah, and then the incognito is actually not incognito. That is incognito for your browser. So people are like, "Oh, if I go on, you know, private mode, that's gonna help protect..." No, that is private mode for you. So you go in incognito mode when you're- you might wanna buy your husband a gift, and your husband will go on your computer, that he won't see that you went on that website.

    14. MR

      Okay.

    15. CS

      But that website is still able to see that you went on that website.

    16. MR

      Okay, so hold on a second. See, already I'm like-

    17. CS

      [chuckles]

    18. MR

      ... "Wait a minute."

    19. CS

      We'll go- we'll get into this. We'll get into this.

    20. MR

      Uh, and so you were talking about incognito mode-

    21. CS

      Yeah

    22. MR

      ... meaning where you're like, "Okay, I think I'm gonna be sneaky"-

    23. CS

      Yeah

    24. MR

      ... "and I'm gonna put onto my browser," whatever browser you use, "the incognito mode, where I think if I go to a website-

    25. CS

      Right

    26. MR

      ... the website doesn't know that it's Mel Robbins there." But that's not what's happening.

    27. CS

      No.

    28. MR

      What's happening?

    29. CS

      What's happening is that your computer is not saving the cookies, and tags, and pixels that are, are automatically loaded. So cookies, tags, and pis- pixels, you accept cookies pretty much every time you go online.

    30. MR

      I do. It's really annoying, and then I w- well, we're gonna get into this.

  3. 7:5413:59

    Privacy Tips: How to Protect Your Information Online

    1. MR

      many specific lessons and specific things that you want us to do, starting now, and so I wanna start with some quick-fire questions.

    2. CS

      Yep.

    3. MR

      And so as an expert in cybersecurity, you never hand out your real birthday, or name, or phone number online? Why?

    4. CS

      Correct. Before we even get into that, I wanna say one thing, because I think we're gonna go through this list, and people are gonna be like, "Oh, my gosh, I do all this, all these things." At the end of this podcast, I'm gonna give you the five things that are, like, absolutely essential.

    5. MR

      Okay.

    6. CS

      These ones are, like, a little bit more for, like, people that want more privacy, like myself. So I don't want people to get worried, like, s- you know, a couple questions in, like, "Oh, my gosh, I, I do this all the time." I'm gonna explain why, and I'm also gonna go through the pros and cons, right? So back to your question with, like, why I don't give, like, my real identity out online. My question back to you is, why do they need it?

    7. MR

      Uh, so they can ship me all the stuff I'm buying that I don't need?

    8. CS

      But why do they need your name?

    9. MR

      Uh-

    10. CS

      Why do they need your phone number? Have they ever called you?

    11. MR

      No, but it's required.

    12. CS

      If you have a Google Voice number-

    13. MR

      Uh-huh

    14. CS

      ... Google has, allows you to, like, generate a, a number that gets forwarded to your real number.

    15. MR

      Okay.

    16. CS

      So I kind of usually give that if I absolutely need to give a phone number. I don't ever give, like, my real information.

    17. MR

      Okay.

    18. CS

      And that's because there's constantly profiles being made about you, and the more information you have online, the more it's sold to more and more people. My manager, for example, got a letter, like, a handwritten letter in her, her mail with a picture of her house saying, "We're in. We know exactly where you live. We've been tracking and monitoring you."

    19. MR

      What?

    20. CS

      "We will take- don't worry, we'll be nice. We'll take it out if you pay us this much money in crypto." That's because her address was online. These scams are getting more and more intense, and so if I don't have to give, like, my real information, especially to, like, places that aren't shipping to you, right? If you're just, like, signing up for an account, like, why, why have we thought we need to be so truthful about who we are online? So I always tell people, "Make up an, like, a alternate persona," different name, different date of birth, you know. Technically, not a different address, unless it's a, you know, shipping to you, like Amazon. You obviously have to give your right address. But, like, if it's for a movie theater, why do they need to know your address?

    21. MR

      It's so true. I, I hadn't even thought about this.

    22. CS

      Yeah.

    23. MR

      And I guess it's because I have such a hard time keeping track of the actual information. [chuckles]

    24. CS

      Right.

    25. MR

      But if you have a alias, so you have a name that you use whenever you sign up for a newsletter.

    26. CS

      Mm-hmm.

    27. MR

      You have a phone number, and you just mentioned that you could get a free Google phone number.

    28. CS

      Yeah.

    29. MR

      It can be forwarded to your phone, or not.

    30. CS

      Yeah.

  4. 13:5918:55

    Public Wi‑Fi Risks: What to Know and What to Avoid

    1. CS

      especially... There's different types of free Wi-Fi, right? There's, like, free Wi-Fi in, you know, airports where, you know, you have connect to the free Starbucks Wi-Fi, or there's free Wi-Fi in airplanes. So we're gonna go through a few different ones.

    2. MR

      Okay, please, 'cause now I'm thinking about, "Okay-

    3. CS

      Yeah

    4. MR

      ... well, blah, blah, blah, what's happening here?" [chuckles]

    5. CS

      So I wanna just let you kind of visualize how Wi-Fi works, right?

    6. MR

      Okay.

    7. CS

      You're connected, and let's say you go on Facebook, and you send a message to your friend. That message is literally, like, flying through cyberspace. Just imagine your own little tunnel. It's flying through the tunnel to your friend, right? The issue is when, when you're on open free w- Wi-Fi-

    8. MR

      Yes

    9. CS

      ... it's usually unencrypted, which means that anyone can go in and out of that tunnel and see what you're doing if they want to, if they know how to.

    10. MR

      Okay.

    11. CS

      So-

    12. MR

      So hold on. Let me just make sure I'm tracking.

    13. CS

      Yeah, yeah.

    14. MR

      So if you're sitting at a airport-

    15. CS

      Mm-hmm

    16. MR

      ... and you've logged on to the free Wi-Fi.

    17. CS

      Right.

    18. MR

      Okay? And I'm texting my husband, who's back at our house, and I'm texting him something related to a bill that came in, and banking information, and, "Hey, I forgot my credit card."

    19. CS

      Yeah.

    20. MR

      "Could you send me a photo of the back of the card?" kind of thing. You're saying that since it's not encrypted, it's just floating through the Wi-Fi-

    21. CS

      Right

    22. MR

      ... if there's somebody that's really smart and knows how to get into those pipes, they can see the stuff?

    23. CS

      Yes, so-

    24. MR

      What?

    25. CS

      So every time you do any data, like you do anything online-

    26. MR

      I'm an idiot.

    27. CS

      Well, the good thing is- [laughs]

    28. MR

      [laughs] Like, I'm not-

    29. CS

      You're not an idiot.

    30. MR

      Okay.

  5. 18:5524:07

    Password Security: Password Managers, Security Questions, & Notes App Risks

    1. MR

      Um, one other thing as a cybersecurity expert that you never do, is you never save your logins in your notes or in your browser. Why?

    2. CS

      Well, so for iPhone specifically, in your notes, it gets up- updated to iCloud, right? And if your iCloud gets hacked, which a lot of people have, like, hacked accounts, especially iClouds, if you're reusing your password, that means they have your passwords to every single thing. However, if you have a, a password for your notes, like, there's a new way now you can lock down your notes on your actual phone.

    3. MR

      Oh!

    4. CS

      You can... Yeah, you can set a password or you can use your face ID, and it will, it will double lock it. So I would definitely do that.

    5. MR

      Okay, I'm making a note right now-

    6. CS

      Yeah

    7. MR

      ... that I just want [chuckles] a password on my notes.

    8. CS

      I would- again, see these little things, like, once you turn that on, you don't have to worry about it, right? Like, it's like little things where you're like, "Okay, I don't want people to have access to it, but I also want it easily accessible." I personally use a password manager. It, like, creates-

    9. MR

      Like, what's a password manager?

    10. CS

      So there's, like, softwares that, like, help you create and store, like-

    11. MR

      You mean like LastPass?

    12. CS

      Yeah.

    13. MR

      Okay.

    14. CS

      Yeah, LastPass, uh, 1Password, Keeper Security. There- and then even iPhone has a password manager on the new phone.

    15. MR

      Oh.

    16. CS

      Yeah, for free.

    17. MR

      But that one's safe?

    18. CS

      That one, that one, that one is safe. As a cyber professional, I try to not have all my eggs in one basket-

    19. MR

      Okay

    20. CS

      ... and since I use iPhone all the time, I'm like, "Well, if they get into my iPhone somehow, I don't want them to also have my passwords." But it's still secure. I'd rather have you do that.

    21. MR

      So is the password safe on your iPhone unlocked by your iPhone password?

    22. CS

      No. I think you can set a sep- separate account.

    23. MR

      Okay, so that's how you would protect yourself?

    24. CS

      Yeah, yeah.

    25. MR

      Okay, got it.

    26. CS

      I think it's a biometric thing on your phone, and unless they, like, obviously, if they steal your phone or they get into you, they are not gonna have your biometrics.

    27. MR

      Why not use your browser?

    28. CS

      Well-

    29. MR

      Tell me about the danger of this, because I'm so lazy, and-

    30. CS

      The browser's not as bad

  6. 24:0730:52

    Common Cybersecurity Mistakes That Get You Hacked

    1. MR

      expert, you always do the automatic software updates. Why?

    2. CS

      Yes, without a doubt. And the way that software updates work is usually the software has a hole in it, like a flaw, a vulnerability-

    3. MR

      Okay

    4. CS

      ... that hackers have been able to find, and the reason why a lot of software updates happen is to patch that hole. Say, like, "Hey, we just found out that someone got in doing this, so we're gonna patch that, and so they can't do that anymore."

    5. MR

      Really?

    6. CS

      Yeah.

    7. MR

      I thought that they were updates 'cause the software is getting better.

    8. CS

      ... it could be both. But you can now find out what the software update's about. So I just think-

    9. MR

      When they say, "fix bugs," they mean holes that hackers can-

    10. CS

      That's exactly what it is.

    11. MR

      I'll be damned.

    12. CS

      And most of them, I would [chuckles] ... I don't know, I don't have the statistic, but I would- I honestly think that, like, 90% of software updates are to, to fix some type of bug or vulnerability. Because hackers are getting so much better, and, like, you're only as strong as your weakest link. There are always so many holes when you're building softwares, and so it's just better to... I mean, what's the-

    13. MR

      Caitlin

    14. CS

      ... what's the harm in having it auto-update? It- again, another thing, takes two seconds. Every time you download an app, just have it on auto-update. Not, not a big deal. Once you have that on, then you're good to go.

    15. MR

      I'm the weakest link. That's what I'm realizing [laughing] in this conversation.

    16. CS

      Everyone, everyone is the weakest link.

    17. MR

      Oh, my God. Um-

    18. CS

      People are the problem, but they're also the solution.

    19. MR

      Okay, and you're... I, I know we're gonna get to the solution.

    20. CS

      Yeah.

    21. MR

      And as you're listening, if you're not panicking as much as I am-

    22. CS

      [chuckles]

    23. MR

      ... don't worry, I'm panicking for both of us, 'cause I've made every single mistake.

    24. CS

      But we all have.

    25. MR

      It's true, and I-

    26. CS

      And we're all alive right now, so it's good, and now we learn from it.

    27. MR

      That's true. And I consider myself to be somebody who is pretty savvy around tech, but I am not savvy around cyber c- security, is what I'm understanding. Here's one that I found fascinating.

    28. CS

      Yeah.

    29. MR

      As a cybersecurity expert, you never plug your phone into a random charger.

    30. CS

      Yes. So there's this thing called juice jacking. So if you have, like... You know the USB plugs at the hotel where you can plug it in to charge your phone?

  7. 30:5237:08

    Common Payment App Scams & How to Avoid Them

    1. MR

      what about, like, banking? Like, I've heard, like, if you get a weird, like, hit on your account for, like, a dollar or two dollars, that's somebody now penetrating a charge-

    2. CS

      Yeah

    3. MR

      - before they're gonna hit you big.

    4. CS

      So it's harder to do banking, because there's so many banking frauds out there. Like, I don't wanna tell you to do one thing when, like, you know, they do another thing. So for example, I don't wanna say, "Hey, you're never gonna get a text from the bank," 'cause a lot of people get text messages.

    5. MR

      It's true.

    6. CS

      So if you're getting a weird message that you didn't anticipate, every single time I've ever gotten that, which it hasn't happened a lot, it's happened once, I immediately call my bank. I, like, go to my bank card, look at the back on the phone number, and get the phone number for my bank, and I call them immediately and say, "Hey, I don't know what's going on, I just wanna make sure..." 'Cause even the, the fake text messages, right?

    7. MR

      Right, that you think, like-

    8. CS

      They look real

    9. MR

      - threw into something. Look real.

    10. CS

      They look real. So any time... First of all, this is a separate thing. I never answer phone calls from people I don't know, and I- my voicemail has, does not have my name, it does not have a greeting. 'Cause if people are calling me, they know it's me. Hackers use that same thing, and they say, one, "Okay, we- we're confirming that that's her number now."

    11. MR

      Oh.

    12. CS

      And two, they're getting your voice to potentially use for voice scams, or getting your voice to potentially use to authenticate you into banks. So they can record your greeting saying, "Yes" or "No," right? A lot of times if you answer the phone, and you're like... They say, "Hey, is this Caitlin?" And I say, "Yes," that yes can be used to authenticate into a banking phone. So these sound scary, again, but if you don't answer the phone for people that you don't know, and if you don't, like, have a voicemail, you're avoiding it.

    13. MR

      It's so true.

    14. CS

      I don't know.

    15. MR

      You know, there's so many of us, I'll- I'll speak for myself, and I'm sure as you're listening or you're watching this on YouTube right now, that you're doing nothing to protect yourself online, like you think you are.

    16. CS

      Right.

    17. MR

      But as I'm listening to this, I'm just thinking of the huge digital footprint of all the information, and the fact that they can then probably spider it to my son's information, and my daughter's information, and my husband's information, and my parents' information, and just, like, one giant family tree, it's now one giant [chuckles] -

    18. CS

      Yeah

    19. MR

      ... digital footprint. You know, w- what do you say to someone like me and the person who's listening right now, who feels so overwhelmed-

    20. CS

      Yeah

    21. MR

      ... by the idea of needing to protect themselves online?

    22. CS

      I would just say, like, again, if you start implementing these simple routines-

    23. MR

      Uh-huh

    24. CS

      ... you'll feel so much more empowered-

    25. MR

      Okay

    26. CS

      ... in the future. Like, it seems very difficult, but like I said, okay, so don't answer the phone, and don't have a voicemail. That's- that solves your problem right there. Done. Check that out. Do that for the w- the one thing for the week, and then you're move- next week, you can do something else. But it's just simple little things that you now know, that you're empowered with, like, that information, to go out and do it for yourself. Or if you wanna keep your voicemail, that's totally fine. Is it likely that, like, a hacker is really gonna use your name? I don't know, but I'm just trying to tell you what it is, and tell you how you can protect yourself.

    27. MR

      I hear a lot about voice cloning scams, and as a family, we have a password, which I am not gonna say what it is, for the inevitable moment when there is a voice cloning scam that happens, so that you can say, "What's the password?"

    28. CS

      Yeah.

    29. MR

      If you feel like something's weird, and we have this weird, random word.

    30. CS

      Yeah.

  8. 37:0838:04

    What to Do After a Data Breach: Step-by-Step Damage Control

    1. CS

      Yeah.

    2. MR

      So you know how you hear on the news all the time, "Oh, there was a huge cyber breach at this store-

    3. CS

      Oh

    4. MR

      ... that store, the other store-

    5. CS

      Yes

    6. MR

      ... this one-

    7. CS

      Yes

    8. MR

      ... and all this customer data"? I hear that, I think, "Oh, I shop there," and then I do nothing.

    9. CS

      Yeah.

    10. MR

      What should I do if I hear that there's been a big data breach, credit card information, at a massive retailer? It seems to be happening every other day now.

    11. CS

      Yeah.

    12. MR

      What do you do as a customer?

    13. CS

      The first thing I would do is update your password immediately, and if it's a really key account, I would turn on multi-factor authentication, which means that you are signing in, not just with a password, but, like, a code that's sent to your phone or your email or your authenticator app. I'd prefer authenticator app, but we'll get back to that.

    14. MR

      Okay.

    15. CS

      Then, if it's, like, an Experian or type of, like, you know, any type of financial bank situation, they are gonna be sending you something in the mail to teach you what to do, and they also offer free credit monitoring for you. Sign up for that. It's free. Why not? The,

  9. 38:0439:27

    The Fastest Way to Stop Identity Theft

    1. CS

      the main thing I tell people, freeze your credit. Because the issue with those, like, breaches is identity theft. That's what most people are concerned about, is, "Oh, my gosh, I'm gonna have identity theft if my Social Security number and my name and all my information's out there." But they can't c- commit identity theft if they can't open any accounts in your name, and they won't be able to open accounts in your name if you freeze your credit.

    2. MR

      So hold on a second.

    3. CS

      Yeah.

    4. MR

      So if you don't need to take out a loan, and if you don't need to, uh-

    5. CS

      Open a credit card

    6. MR

      ... open a new credit card, then you don't need open credit?

    7. CS

      Correct.

    8. MR

      You can freeze it?

    9. CS

      Yeah, and it's very easy. It takes, like-

    10. MR

      And it-

    11. CS

      There's three credit-

    12. MR

      And the credit card companies don't ding you if you do that?

    13. CS

      No, no.

    14. MR

      Really?

    15. CS

      No.

    16. MR

      Oh, I didn't know-

    17. CS

      Yeah

    18. MR

      ... that was a thing.

    19. CS

      There's three credit bureaus. It's takes maybe 5 to 10 minutes for each bureau. Call them or email them. You can freeze your credit, and then you just open it when you need it, and I tell people to do that with their grandparents or parents all the time-

    20. MR

      Oh, that's a great idea

    21. CS

      ... because then you'll never know if someone is, you know, s- using your parents' information to, to create accounts until it's too late.

    22. MR

      Let's talk about seniors-

    23. CS

      Okay

    24. MR

      ... because there's so many listeners that have elderly parents or concerned about their grandparents, and we recently had a very scary issue with scamming related to my mother-in-law, and they almost got in.

    25. CS

      Mm.

    26. MR

      Almost.

    27. CS

      Yeah.

    28. MR

      And she would've been... All of it gone. All of her savings gone, all of her retirement gone,

  10. 39:2741:00

    How to Protect Seniors From Online Scams

    1. MR

      everything. Um, how can the person listening help protect their parents from online scams?

    2. CS

      Yeah. So I would first start with freezing their credit, and I would also start, again, a similar communicating, right? Like, there are these scams out there. Like, I go to my grandma and I say, "Grandma, these are the rec- most recent scams, right? Like, someone's calling and pretending they're the police-

    3. MR

      Mm

    4. CS

      ... they're gonna try to call you. Someone's calling and pretending to be X, Y, Z. If they ever ask you to send money, immediately hang up, and even if they think- if you think, 'Oh, this could be true,' I want you to hang up and call this fraud helpline number." So there's actually a fraud helpline number that can walk you through... Like, you could technically have two phones if you want to, and you can be on the phone with the fraud helpline number, and they can walk you through what you need to do. You're right.

    5. MR

      But I think we should go to their house and sit on their laptop and their computer and do the settings that you've talked about.

    6. CS

      Yeah, multi-factor authentication, make sure their passwords are updated, like, m- specifically banks, um, you know, 401 [k] , all their, like, retirement savings, all that. Like, make sure that is a very strong and unique password, and then turn on multi-factor authentication, and if you're a caretaker, taker for her, maybe have it go to your phone. Don't have it go to her phone, 'cause if you're getting a, an, a, a authentication code, you can call your mom and say, "Why are you trying to get into your bank?"

    7. MR

      Mm. Mm-hmm. Great, and I know, um, that there's a person listening or watching right now who is thinking, "I gotta protect my kids." So what are the non-negotiable settings?

  11. 41:0042:53

    Kids Online Safety Tools: How to Protect Your Children Online

    1. MR

      Every single parent, every grandparent, everyone who- if you're listening right now and you have friends who have kids, send this episode to them. What are the non-negotiables that every parent needs to check on their phone and their child's phone tonight?

    2. CS

      Yes, so for your child's phone, I would make sure that you're on the child- a child account. Like, Instagram, YouTube, they all have children's accounts, right? So if you're under a certain-

    3. MR

      I don't know. They do?

    4. CS

      Yeah.

    5. MR

      Okay.

    6. CS

      If you're under a certain age, you can turn on that child's account. You can also block messages. I would immediately block messages. It's just-

    7. MR

      Okay, so block messages.

    8. CS

      Yeah, if you're on a ch- a child's account, it doesn't- I don't think you can get messages from most of the accounts.

    9. MR

      Okay.

    10. CS

      But the- to me, the thing is open communication, and it sounds really, really lame, but if your child knows, like, "Hey, there are a lot of scammers out there, and, like, don't worry, but if something feels off, just come to me and talk to me, because this happens to so many people," like, they're not gonna come to you if you make this seem dark and scary and that they think they did something bad. But they will come to you if you have an open line of communication, saying, "I'm- like, wanna protect you. I want you to have fun online, but I also want you to know that these things are happening."

    11. MR

      So when you are the parent, and you're checking the phone, and you're looking at the apps, what are we turning off on the apps?

    12. CS

      Yeah. Make sure their apps are locked down on private mode.

    13. MR

      Okay.

    14. CS

      Like, no kid should have an open Instagram account. You should only be adding your friends, and friends that you have actually physically met in person and that you go to school with or you met at a party or whatever it is. Um, then I would make sure that you can't message. Um, there's a lot of issues with, like, Roblox and, like, kids gaming, too, that, like, people are messaging that are, like, adults that are, like, grooming children. And so I would just make sure that you're- you can't message, you turn on private, uh, private mode, and you turn on kids' settings. I personally wouldn't allow kids to have, like, Snapchat.... because they think that message disappears. Nothing disappears on the internet. Nothing goes away. Even if it disappears, it doesn't go away, and people

  12. 42:5344:48

    Sextortion Help: What to Do + Where to Report Online Crimes

    1. CS

      can screenshot it. Don't ever send anything that you wouldn't want, like, me as your parent to see, or your grandparents, or whoever else. I had a friend who is really into cyber, obviously, and her nephew was, like, going to the Olympics, like, world-class athlete in high school, like, went to the Junior Olympics. Met someone online that s- you know, a cute girl that added him on social media. She said that she went to a town across. She, like, had mutual friends-

    2. MR

      Yeah

    3. CS

      ... 'cause she had added his other friend, so he, she thought it was mutual, and they just started talking. They never had a call with each other, but they were talking for, like, three or four months, and she sent him a photo of herself, and he then shared a photo because they thought she... He really thought he was, was with her.

    4. MR

      Right.

    5. CS

      And it- sextortion scams are on the rise, and s- and it's really, really rampant in, in teenage boys or younger. And they specifically target boys because they know that they're a little bit more willy-nilly when it comes to private photos. But there's two reasons why they do that, right? The first is, they want money. So they were basically extorting him for money, saying, "I'm gonna leak all these photos of you, and you're never gonna have a career-

    6. MR

      Mm

    7. CS

      ... and/or be an Olympian, because I have all these private photos of you, and I want money." Or they say, "Continue to give me more photos," because those photos will then be used for another scam. After a little bit of time, he shared it with his, um, aunt, who is in cyber and was able to fix it, but there is a really good resource out there.

    8. MR

      What did she do, call the police?

    9. CS

      She knew a lot of people in the FBI. But there is an FBI resource that is free for everyone. So it's called the Internet Crimes Complaint Center, so ic3.gov. IC3, the number 3, .gov, and it is help- like, it can help anyone, um, for any internet crime.

    10. MR

      What

  13. 44:4846:32

    What to Do Immediately If Your Phone Is Stolen

    1. MR

      is the first thing you should do the moment your phone is lost or stolen?

    2. CS

      So I would actually preface that you should do this before you lose your phone.

    3. MR

      Okay, what am I doing?

    4. CS

      So I would turn off the ability to turn on airplane mode when you swipe down.

    5. MR

      Wait, what?

    6. CS

      So you know how you can turn on airplane mode, and there's, like, an... You can easily do it if you, like, swipe down.

    7. MR

      Oh, yeah, you swipe down-

    8. CS

      Control Center

    9. MR

      ... and you get airplane? Okay.

    10. CS

      Because the first thing that, um, like, robbers do, is they immediately put on airplane mode so you can't track the phone. But if they can't do that because your phone's locked, then the only way they can do anything is to just turn it off, and they're gonna have to eventually turn it back on. So I don't have the airplane mode so easily available on my phone. I-

    11. MR

      Where do you go to do that?

    12. CS

      You can, um, if you, like, scroll down to the control center, you hold it down, and it, the, like, starts moving, similar to, like, when you move apps.

    13. MR

      Oh, yeah!

    14. CS

      You can do the same thing on your control center.

    15. MR

      You can?

    16. CS

      Yeah.

    17. MR

      And then you just delete it?

    18. CS

      You can access it. Yeah.

    19. MR

      And though, that way you have to go and manually do it.

    20. CS

      Yeah.

    21. MR

      Okay.

    22. CS

      Then you just go to settings. Like, when next time you're on a plane, you just go to settings-

    23. MR

      Oh, my gosh

    24. CS

      ... airplane mode and turn it on.

    25. MR

      Okay. I can do this.

    26. CS

      Yeah.

    27. MR

      And I'm going to do this. I, I personally feel that this is an issue whether somebody has lost their phone-

    28. CS

      That's true

    29. MR

      ... whether somebody has had their phone stolen-

    30. CS

      Yes

  14. 46:3251:22

    The Risk of Wearable Technology

    1. MR

      what do you f- as a s- cybersecurity expert, what do you think about wearable technology?

    2. CS

      So this is definitely, like... [sighs] Everything is a risk, right, online. Everything that you do is a risk, and you have to choose whether you want that risk or not, and I'm gonna give you a little bit of an example of how AI is working out right now with all the data. So we have a ton of data on everyone, right? And by we, I mean, like, the government, any of the apps that you use. Like, I used to use a wearable ring that was tracking, you know, my fertility, my sleep patterns, my stress levels. But can you imagine plugging all that into an AI and how much that would actually know about me? I personally don't feel comfortable giving that information to other people. However, my boyfriend swears by his ring, and he doesn't care. So again, this is a risk-based approach. Every company has a privacy policy, legally, and that privacy policy states what data they're collecting from you, who they're sharing it with, what they're using it for, and why they're collecting it. So what I usually do is I take that privacy policy, I actually throw it into ChatGPT or Gemini or Perplexity or whatever, and I say, "Hey, can you please tell me, like, the high-level issues that, like, might come about? Like, what are they collecting?" 'Cause it's a very legal policy, so it's hard to read.

    3. MR

      Yes.

    4. CS

      It's, like, made by lawyers. It's... And it's meant, honestly, to confuse you. It is meant to confuse you. They don't want you to know all the stuff that they're doing with your data. So I just throw it in, and then I'm like, "Okay, they're only collecting this, this, and this." I feel more comfortable. But with wearables, they're really collecting a lot about you as a human being, and sometimes I just don't want that.

    5. MR

      So if I take a privacy statement-

    6. CS

      Yes

    7. MR

      ... which I think I'm probably, like, 99.9% of people, it's like, accept all, okay, move on-

    8. CS

      Yeah

    9. MR

      ... let me do the thing I was here for.

    10. CS

      Right.

    11. MR

      And I were to throw it into Microsoft Copilot.

    12. CS

      Right.

    13. MR

      And that's the platform I trust, and it gives me a summary-

    14. CS

      Mm-hmm

    15. MR

      ... of what this is, what I'm giving permission for this company to do. What are the things I'm looking for? Because I would imagine there's, there's language, as a former lawyer-

    16. CS

      I know

    17. MR

      ... there's language that's like, "Blah, blah, blah, third party, blah, blah, blah," and then it's just sort of buried in there. What are you looking for that is a red flag as a cybersecurity expert?

    18. CS

      Yeah, so I'm looking at the types of data-... that they're collecting. So if they're taking, like, biometric data or they're taking, like, really specific- if it's just, like, a name and an email, go for it, you know? But if they're taking-

    19. MR

      Well, 'cause it's fake, the one that-

    20. CS

      Right

    21. MR

      ... you gave them, 'cause you're no dummy-

    22. CS

      No, it's not me

    23. MR

      ... like I am. Okay, you're like, "You can have my alias."

    24. CS

      [chuckles]

    25. MR

      "Go for it!"

    26. CS

      Exactly. Um, but if they're taking, like, you know, my, like, menstruation data and my sleep data, or like, for biometrics or anything like that, I'm like, "Okay, why are you taking it?" And it'll- so I ask, "What data are you collecting? Why are you taking it, and who are you sharing it with?" That is a big thing. So I'm very concerned with who they're sharing it with. Why do they need to share it with these people? I don't know. Maybe it's for tr- like, you know, metrics, sta- statistics. I have no idea, but some of the, like, recent, like, wearables have been sharing with companies that I don't want to be shared with. So if it's really sensitive data, like your health history, um, nationalities, I would just prefer not to have it, and then if they're sharing it with interesting companies, like, why are they sharing it with XYZ?

    27. MR

      Well, I'm sitting here thinking about the fact that just about everything that I use is now somehow connected to the internet.

    28. CS

      Yeah.

    29. MR

      Whether it is the pad that I'm sleeping on-

    30. CS

      Mm-hmm

  15. 51:2254:21

    3 Privacy Settings to Check in Your Apps (Do This Now)

    1. MR

      that's sort of like what happened with Instagram.

    2. CS

      Yeah.

    3. MR

      Instagram did that update where all of a sudden, everybody's locations were live-

    4. CS

      Yeah

    5. MR

      ... and there was a flurry of texting all day long. And if you don't know about this, please check your Instagram right now, where it just suddenly opted us all in.

    6. CS

      And it was crazy because it was every time you opened up Instagram, it was re-sharing exactly where you were to the precise location if you had precise location turned on on Instagram, which I would say probably 90% of the people do. Um-

    7. MR

      90% of people have precise location turned on?

    8. CS

      Well, it's automatic. When you download Instagram, it's automatically on.

    9. MR

      Wow!

    10. CS

      Unless you go into the settings, which I made a few videos, like to say, like, "Hey, only, like, limit, limit access or don't allow at all."

    11. MR

      So is one of the things that we should do is to take a day and go through every app that we've downloaded and all the settings and look at the privacy and the data settings on those things?

    12. CS

      Yes, those... There's three things that you wanna look at: Does it have access to your camera? Does it have access to your microphone, and does it have access to your location? All three of those things, if it doesn't need it, turn it off. And I again-

    13. MR

      Well, why would it need it?

    14. CS

      Well-

    15. MR

      If you're using it-

    16. CS

      You'd be surprised

    17. MR

      ... if you're using it-

    18. CS

      Yeah

    19. MR

      ... yes. But if not, no, so what should the setting be? Only while using the app, never, once?

    20. CS

      Um, it just depends on what your preference is, right? So for example, I ordered Uber Eats last night, and they delivered the wrong thing, and my manager got my phone and was like, "Don't worry, I'm gonna return it for you," and she went, "And you have to take a picture of the wrong thing," right? And she's like, "Oh, you don't have... You, you didn't give it access," 'cause I don't need Uber Eats to have access to my camera roll or my pictures or my camera, right, or my microphone. So she allowed- she limited access to the one photo that she took, and she put that photo on, and she took a picture, and we went off. But for me, I'm like, I don't think Uber Eats needs to have access to anything, ever. And if I need to add a picture randomly, you can allow access to one photo.

    21. MR

      Wait, so are you saying that if you have an app on your phone-

    22. CS

      Yeah

    23. MR

      ... and like I have, where I've given Instagram or whatever access to, like, my photo library, that it can be in the background scanning my photos?

    24. CS

      Oh, it's not can be, it is.

    25. MR

      What?

    26. CS

      Instagram, Facebook, and TikTok have new features in the last, like, two months, where they are scanning the camera roll that you have not posted to give you ideas on how to generate fun reel or post ideas. Because they're trying to get you on the platform to post more, right? So they're literally, if you gave them access to your whole camera roll, they're scanning it, and they're putting together their own version of a potential reel that you might wanna post after your trip to Boston.

    27. MR

      Whoa.

    28. CS

      Yeah.

    29. MR

      So we prevent that by saying...

    30. CS

      Limit access?

  16. 54:2158:31

    Facial Recognition Explained: How It Works & Privacy Risks

    1. CS

      app.

    2. MR

      What about facial recognition software? As a cybersecurity expert, what do we need to know about facial recognition software?

    3. CS

      Yes, so unfortunately, a lot of facial recognition software is, um, unavoidable nowadays.

    4. MR

      Uh-huh.

    5. CS

      Like, you're walking through the airport, and they're scanning your face. I mean, you have to go through-

    6. MR

      They are?

    7. CS

      ... TSA PreCheck.

    8. MR

      Oh, that's right, they are.

    9. CS

      Yeah, I mean-

    10. MR

      Okay, you're right. [chuckles]

    11. CS

      And even in-

    12. MR

      Like, [chuckles] like, where are they scan-

    13. CS

      Every camera.

    14. MR

      Well, actually, I wonder because, like, you know, I'm looking up... I don't have them in here, but I'm, I'm looking up, and there's security cameras everywhere-

    15. CS

      Yeah

    16. MR

      ... you go.

    17. CS

      So there's biometric tracking and facial scanning pretty much everywhere, and-... I have a concern, one, because biometric is, like, very unique to you, right? Like, your eyes are, it's like a fingerprint.

    18. MR

      Mm-hmm.

    19. CS

      Your eyes and fingerprint, your face shape is very, very unique to you, and you can't fix it, right? I mean, you might be able to fix face shape with [chuckles] certain things, but you can't change your eyes that much, definitely can't change your fingerprint. And so my concern is TSA has our biometric ID, right? Global Entry has our biometric ID.

    20. MR

      Right.

    21. CS

      Anything is hackable. In my head, anything is hackable. So what happens when people start getting that information? Um, and then the other thing is, our phones, from a marketing perspective, are tr- are gonna start tracking our eye placements. So my concern is, you know how smart AI is, right? Like, if you, if you've been using AI, if anyone here has used AI, if you type in, like, "Hey, what do you know about me?" It gives, like, a whole summary of exactly who you are to a T. Now, I want you to imagine, like, someone on the other side of the screen, when you're, like, doom scrolling and late at night, and you're watching what you preferably like to watch, it's analyzing every single thing about you. It's analyzing where you're looking, who you're looking at, how long you're staying on this video. It's analyzing the psychology behind what you're watching and understanding who you are as an individual. Hopefully, it's gonna start doing better ads, that's what they're saying, right? But who knows what that information can be used for. And so I recently [chuckles] ... You know, it sounds a little scary. I recently partnered with a company that has... It kind of shields you from biometric and, um, surveillance, and it, it's UVA and UVB and blue light blocking. But, um, it really-

    22. MR

      Okay, so wait, these are blue blocker, red, like... Well, well, these kind of have like a pink thing to them.

    23. CS

      Yeah, they're, like, also, like, it's, it's an infrared screen. So the way that, um, surveillance works is usually through infrared technology. So because there's, like, an infrared kind of shielding-

    24. MR

      I even had these made for my prescription.

    25. CS

      Yes.

    26. MR

      This is pretty cool.

    27. CS

      Yeah.

    28. MR

      Okay.

    29. CS

      Because there's, like, a kind of shielding on it-

    30. MR

      Yeah

  17. 58:311:04:47

    Can Home Security Systems & Cameras Be Hacked?

    1. MR

      Amazing. You have some shocking news about cameras. Cameras on your laptop, doorbell cameras, baby cameras.

    2. CS

      Yeah.

    3. MR

      Uh-oh.

    4. CS

      So this is not to scare you, it's to empower you. So there are two ways that people get into these cameras, right? One is, again, if you're reusing passwords, which everyone does, so don't be a bit embarrassed by it, but take this as a sign to be like, "Okay, maybe I shouldn't have the same password for my baby monitor as my Facebook account." Because if you're reusing passwords, they just have to get in, and they just mess with you, and they can, like, talk through the camera, they can watch the camera. So-

    5. MR

      Oh, my God!

    6. CS

      Yeah, they can watch. There's also a site, there's multiple sites, actually, that show every single camera that's on an open network.

    7. MR

      Wait, what does that mean?

    8. CS

      They can literally log into cameras that are, like, on open, unsecure Wi-Fis.

    9. MR

      So-

    10. CS

      So if you have a camera, and you're on an open Wi-Fi, and they, like, somehow decide to connect to the one W- like, the IP address that you're sitting on, they will be able to turn on your camera.

    11. MR

      Whoa.

    12. CS

      Yeah.

    13. MR

      Just trying to, like-

    14. CS

      Process

    15. MR

      ... process this.

    16. CS

      Yeah, yeah.

    17. MR

      Because you're saying that somebody can hack into my laptop if I'm on an open network, and they can-

    18. CS

      Turn on your-

    19. MR

      ... be viewing, turn on my camera on my laptop and be watching me?

    20. CS

      I had an old boss that literally had... He didn't have a, a camera cover on his camera, this was, like, five years ago, and someone had taken pictures. Like, he would change in front of his computer, and someone had taken pictures of him and, like, sent him an email being like, "We kn- like, we have some really vulgar pictures of you that we're gonna release," and he was, like, pretty high up in the company that I was working for, and he didn't care. He was like, "Whatever, release them." But, like, people can turn it on and off, your camera, if they want to. I just would be... I- Just put on a camera cover.

    21. MR

      What is a camera cover?

    22. CS

      There's, like, little covers that you can buy, literally for $3 on Amazon, and you just, like, s- cover it when you're not using it. That prevents it. Obviously, they won't be able to see anything. And also, just be mindful of where you're connecting.

    23. MR

      And-

    24. CS

      He traveled a lot for work, too, so he-

    25. MR

      And so this can, this can happen to your doorbell, it can happen to your baby monitor, it can happen to any camera you have?

    26. CS

      Yeah. Yeah, there was someone that follows me that someone hacked into their baby monitor, but it was because they reused an old password that was leaked. They heard voices in the baby monitor of some random guy talking to the baby.

    27. MR

      That's terrifying.

    28. CS

      Yeah, it's... It was awful.... but again, passwords.

    29. MR

      Passwords.

    30. CS

      [chuckles] Passwords are so important.

  18. 1:04:471:13:42

    5 Essential Online Safety Tips to Prevent Hacking & Scams

    1. MR

      are the five things that really will protect you online. What are those five things?

    2. CS

      Passwords. We've talked about that a lot. Tonight, go and write down, "These are the accounts that I don't want anyone getting access to. These are my key accounts," and you'll start thinking about more and more as you move on throughout your day, what apps do you not want people a- uh, have access to, what banks, social media, all of that. So identify your key accounts and make sure that you have strong and unique passwords for all of them.

    3. MR

      Okay.

    4. CS

      No reusing of the same passwords, no reusing of the same base password. Have strong passwords.

    5. MR

      Okay.

    6. CS

      So for those of you guys that aren't, like, m- myself or Mel, 'cause you're traveling all the time probably, too, I would... If you're at home using a desktop for, like, my parents, right? I'm like, "Please, Mom, I'm gonna get you a book. We'll, we'll put it in the locked cabinet right next to your computer, and you just pull it out when you're on your computer, and you can use it." That way, you can actually remember and write down your strong passwords. For the people that are always on the go, yeah, like, have a, a unique passphrase or whatever you think you need to remember that, like, longer password. When it says, "Oh, remember this," usually it's on a phone, and that's just remember- it's a password manager on the iPhone.

    7. MR

      Mm, okay.

    8. CS

      So you can do that. That's still a password manager. I use a password manager myself. I love it. I swear by it. Or on your Notes, and just lock it.

    9. MR

      So that's number one.

    10. CS

      Yes.

    11. MR

      So once we got the password set, what's the second thing we're doing?

    12. CS

      Software updates. Automatically, right when you download the app, just turn it on.

    13. MR

      Okay, because software updates, as a cybersecurity expert, you're saying when it says, "Ooh, fixed bugs, make more optimized," they're actually solving and fixing where the hackers broke in.

    14. CS

      Yes.

    15. MR

      So automatic software updates on all apps, I got that. What's the third thing I'm doing?

    16. CS

      The third thing you are gonna do is freeze your credit.

    17. MR

      Freeze your credit.

    18. CS

      Super simple. That's, like, that's, like, a one-and-done thing. You can do that tonight.

    19. MR

      Okay.

    20. CS

      Yeah.

    21. MR

      Because then if you've frozen your credit, 'cause you're not taking out any loans, you're not opening up new credits, that means nobody else can either.

    22. CS

      Right.

    23. MR

      Oh, I love that. Okay.

    24. CS

      Can't have identity theft, unless you give them, like, extra passwords and stuff with this type of thing.

    25. MR

      Okay, so fourth thing I'm doing?

    26. CS

      The fourth thing you are doing is taking nine seconds before you click on any link.

    27. MR

      Ooh, nine seconds.

    28. CS

      Yeah. There's psy- psychology, um, about the nine seconds, so give- it's just enough time for you to, like, take a deep breath, think, and realize, like, where you are.... so I didn't do the psychology aspect of it, but that's [chuckles] the nonprofit did. So take nine seconds, and I, I always just say, "Just don't click on links." I know that that is not, like, as easy for most people, but take nine seconds before you click on any link, and if there's an option for you to just call, I would call.

    29. MR

      Well, and also in those nine seconds, you can look at the email address.

    30. CS

      Exactly. You can look at a lot of things.

Episode duration: 1:13:42

Install uListen for AI-powered chat & search across the full episode — Get Full Transcript

Transcript of episode Jk6sD1TEJ4A

Get more out of YouTube videos.

High quality summaries for YouTube videos. Accurate transcripts to search & find moments. Powered by ChatGPT & Claude AI.

Add to Chrome