Avsnitt

  • Traveling can be a life-giving or a long lasting nightmare. Knowing what to research before you book your trip could have a significant impact on your experience and help you to be incredibly safe. Today’s guest is Asher Fergusson. Asher has been traveling around the world since 2004 when he left Australia to study in the United States where he received his undergraduate and master’s degrees. He has lived all over the globe, including in India, Europe, Hawaii, and the mainland US. He enjoys researching the travel industry and has been featured on CNN, USA Today, The New York Times, National Geographic, and many other publications.

    Show Notes: [0:56] - Asher shares his background and how he got interested in travel. [2:12] - On Asher’s website, he started sharing travel safety tips and the site has grown. [3:44] - You will run into issues regarding cleanliness in hygiene and water. This can affect your body but is avoidable. [4:57] - Asher shares several tips on eating and drinking in other countries. [7:27] - When visiting another country, street food can be dangerous. [9:20] - Every country has different cultural norms regarding food, water, shelter, and safety. [10:31] - One of the major topics of research for Asher is regarding LGBTQ travelers. [12:01] - Research laws in other countries because you could actually be imprisoned. [14:24] - Another thing to consider is the dress code, especially for women in very conservative countries. [15:37] - Some tourists feel that following stricter rules is a violation to their rights, but it is safer to follow the country’s laws and rules. [17:17] - Americans tend to travel thinking that they don’t have to prepare and they are above the law. [19:01] - America is a phenomenon as each state has different laws, a large population, and a lot of diversity. [19:58] - Westerners tend to be targets for theft. Asher shares some things that might make you stand out. [23:17] - There are other scams, but they are all about money. [25:25] - It is always safer to go to the official site or location to buy tickets to something. [26:43] - Asher shares the list of the top 10 worst locations to travel to as a solo female traveler. Do your research about your destination ahead of time. [28:22] - Don’t be too nice. People might back off if you put up your boundaries. [29:46] - When it comes to family traveling, accommodations are important. [32:02] - Another hassle with traveling with kids in carseats and transportation upon your arrival. [33:26] - Asher dug deep into Airbnb and customer horror stories. [35:23] - Asher describes some of the issues found through this research. [38:01] - It is probable that there is a money laundering scam happening in some listings and hacked accounts on Airbnb. [40:56] - Never book a place with no reviews. The more reviews the better and only stay at the ones with a 4.8 or 5.0 rating average. [43:17] - Look at all the properties listed by the same owner. Only stay with super hosts and make sure they have a verified ID. [45:55] - Avoid the professional Airbnb landlords. [46:46] - Only book with a credit card and if anything goes wrong, be sure to have photographic evidence. [48:17] - Research is critical and real people’s experiences are at your fingertips online.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Asher Fergusson Website Asher and Lyric on Facebook Asher Fergusson on Twitter Asher and Lyric on Instagram
  • Very few people fall for the Nigerian prince scam these days because it has been so well exposed. However, devious criminals keep looking for new ways to package their deception so it goes undetected. Today’s guest is Ben Taylor. Ben is the creator of the popular YouTube channel Pleasant Green. His videos exposing various internet scams have been watched tens of millions of times. His goal is to help get scammers out of their current role not only by exposing the scam but by helping some of them find ways of providing for their families without cheating people.

    Show Notes: [0:50] - Welcome to the show, Ben! He shares what he does through YouTube and his work to educate people. [1:50] - Scam baiting is when you seek out scammers to waste their time. [3:32] - Romance scams are extremely common right now. [4:40] - Tech support and Amazon refund scams are also common. [6:12] - The elderly are often targets, but people can also fall victim to a scam when they’re distracted. [7:42] - A lot of time scammers will ask you to verify your name or address. You should ask them to verify it. [9:01] - Scammers typically use a script and if you get them off their game, they will move on. [10:11] - There are countless call centers across the world. [11:09] - Ben has interacted with scammers. Some realize they’re doing something hurtful, but some justify it or think they deserve it more. [13:18] - Through his YouTube channel, Ben explains that if scammers are so clever and smart to scam people, they can use the internet for good work. [14:54] - Ben also looks into product purchasing scams. [15:56] - Facebook doesn’t crack down on product accuracy of ads. [18:02] - When shopping online, especially from sites that are not as popular or credible, use PayPal as they have some security built in. [20:00] - Reviews are important to look at closely. [22:06] - Ben shares some interactions he’s had with scammers and how he has asked them for help. [23:24] - On YouTube, Ben has hired some scammers he’s spoken with to help them realize that there are more honest ways to make money. [26:03] - Using the story of Joel who he helped develop a photography skill, Ben helps people flip the script and help their community.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Pleasant Green YouTube Channel
  • Saknas det avsnitt?

    Klicka här för att uppdatera flödet manuellt.

  • Just because something is in the cloud, doesn’t always mean that it is safe and secure and that you don’t play a role in keeping it that way. Those who move into the cloud need to understand cloud security best practices and how to implement them.

    Today’s guest is Dr. Randall Magiera. Dr. Magiera is a cybersecurity professional with over 15 years of experience in security management, change management, risk analysis, intrusion prevention and detection systems, and vulnerability assessments. He has a doctorate of science in cybersecurity, multiple advanced degrees in cybersecurity and technology, and certifications too numerous to list.

    Show Notes: [1:00] - Randall introduces himself and his background in the field. [3:05] - Things regarding cloud technology have advanced greatly in the last 15 years. [4:09] - These cloud companies do go to great lengths to keep things as secure as possible. [5:16] - The shared responsibility model is important to understand. [6:44] - Large cloud providers do offer some education on best practices to users. [8:01] - Breaches are causing the public to place blame on large companies like Amazon and Google, but it is more related to users not being familiar with how to use the product. [10:47] - A lot of the time, the goal is speed in developing a program, app, or product and security sometimes gets pushed aside. [12:33] - Chris shares a funny story about crypto-mining. [14:48] - Randall explains a recent crypto-mining code placed in a javascript library. [17:50] - Chris and Randall discuss the Colonial Pipeline Attack. [20:00] - A CDN is great for organizations with employees all over the world working in the same program. [23:31] - Ideally, the goal is to have everything stored in the cloud rather than on devices. [25:00] - Malicious actors are motivated by money and they will use the cloud in creative ways as a means to an end. [26:53] - Randall believes that we will be seeing the use of deep fakes more often in coming years. [28:50] - Cloud computing gives users virtually endless capabilities which means that people who are malicious can use them for advanced attacks as well. [31:51] - Per terms and conditions, if you delete data, it is on you. [34:04] - Once something is deleted from the cloud, it is gone forever. [36:21] - Randall describes how AWS works regarding backups. [38:18] - When it comes to disaster recovery, especially for businesses, there is an option for data backup that will create a quick turn around if something happens. [41:51] - Always test your backups and DR.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Dr. Randall Magiera on LinkedIn Tulane University - Randy Magiera
  • As a freelancer or someone who utilizes them, how can you spot an imposter from an actual business or genuine opportunity? Today’s guest is Ricardo Fayet. Ricardo is the co-founder of Reedsy, a community of over 150,000 authors worldwide and a curated network of 1500 handpicked freelance professionals from editors, cover designers, illustrators, book marketers, and publicists. They help bring over 500 books to life every month. Reedsy was named Book Tech Company of 2015 by UK Trade Magazine. Ricardo has been invited to speak at the Frankfurt Book Fair, London Book Fair, and dozens of other writing and publishing conferences.

    Show Notes: [0:57] - Ricardo shares his background and what Reedsy is all about. [3:10] - There are other freelance websites that are very general. This means they are not very curated. But now there are other sites popping up that are more specific. [5:28] - Asking about work experience is really important. [7:14] - You must trust the platform you are looking for a freelancer on. [8:36] - When hiring a freelancer, you need to treat it as a hiring process. [9:48] - Illustrators and graphic designers are usually easy to hire because you can see their work and choose the style you like. Other jobs are harder to hire. [11:02] - One scam is companies hiring freelancers rather than hiring full time employees to avoid paying for benefits. [12:32] - If a platform guarantees a certain amount earned as a freelancer in the first month or two, doubt it and look at the fine print. [13:39] - There’s a tricky email scam that is designed to force you into creating a profile. [16:28] - Create a profile, even if unused, to prevent other artists or freelancers from stealing the identity or your work. Well known platforms can also usually detect when there is a false profile. [18:20] - Large platforms won’t be able to investigate until there are victims who have negative experiences with a freelancer. [20:01] - It is highly recommended to charge for services at the beginning of a project. [22:20] - A lot of freelancers on many platforms do not live in the United States and if there is a problem, the legal process becomes almost impossible. [24:00] - Platforms may charge a freelance fee which actually protects both parties. [27:01] - As a freelancer, you are very much at the mercy of the clients and their banks. [29:45] - You have to strike the right balance between solid contracts and trusting people. [33:05] - Don’t hesitate to say no to a contract if you feel like something is off.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Reedsy Ricardo Fayet on Twitter Ricardo Fayet on LinkedIn
  • People who think they’re too smart or savvy to get scammed are the perfect target for social engineering scammers. Today’s guest is Jordan Harbinger. Jordan is a lawyer, speaker, entrepreneur, and educator. In addition to hosting the amazingly popular Jordan Harbinger Show, he is a consultant for law enforcement, military, and consulting companies, a member of the New York State BAR Association, and the Northern California chapter of The Society of Professional Journalists.

    Show Notes: [0:47] - Jordan introduces himself and describes his popular podcast that has been active for 14 years. [1:35] - In the early 90s, as a middle schooler, Jordan discovered his interest in hacking and social engineering. [3:50] - As time went on, Jordan began messing around with cell phones he found. [6:17] - What really got Jordan interested in social engineering was listening in illegally on other peoples’ phone calls for hours. [8:14] - In these phone calls, he listened to “real drama.” [9:16] - Because of this, 13 year old Jordan realized that people are complex systems but can certainly still be reprogrammed. [10:20] - Jordan shares a story of someone he listened to when tapping into phone calls and what he learned from it as a teen. [14:47] - Manipulating someone who has a big ego or is narcissistic is one of the easiest triggers for social engineering. [17:23] - The easiest people to manipulate are the ones who think they are too smart to get caught up in a scam. [18:50] - As a teen, Jordan was always shocked at some of the things he tried that worked. [21:16] - Imagine what older and more technically savvy adults could do if Jordan as a 13 year old could figure out so much. [24:02] - Jordan and Chris reflect on how unsafe and naive society was in the 90s. [27:40] - Getting scammed is one of the worst feelings ever. [29:14] - Social engineering scams are very sophisticated these days. [31:40] - You can still trust people, but you have to be careful. If you don’t trust anyone at all, you’ll be miserable.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest The Jordan Harbinger Show
  • When you own a business, your website represents you. Scammers can prey on your emotions for their gain by sending false claims of copyright infringement or even other lucrative opportunities that are fake. Knowing what to look out for prevents their negative impact on you and your business.

    Today’s guest is Liz Eisworth. Liz is the founder of SangFroid Web Design specializing in web design, custom WordPress themes, SEO, and digital marketing. She works with businesses to understand all aspects of their website.

    Show Notes: [0:50] - Welcome to the show, Liz! Liz shares her background and business in web design, online presence, and SEO. [2:21] - Liz describes the common scams that target website owners, starting with domain slamming scams. [4:18] - The reason this happens is because once you register for a domain, your information becomes public. [5:40] - Domain slamming is not an outright crime, but it is certainly unethical. [8:12] - In combination with other things, the length of time a domain name has been owned can be a red flag. [9:30] - Social engineering can also take place with the registrar that your domain name is registered with. [11:20] - It is easy for scammers to set up a fake and flimsy online presence. [12:09] - Phishing scams are often submitted through contact forms on a business’s website. [13:36] - These phishing scams have gotten much more sophisticated in the last year and cause enough panic to have the owner click a dangerous link. [16:07] - There are a lot of royalty free stock photo websites that you can find safe images to use on your website. This will help you avoid copyright infringement. [18:26] - Chris shares an experience with registering a trademark that Liz confirms is very common. [20:20] - Liz describes the third party payout scam. [22:11] - In these scams, a detailed and simultaneously vague email will request a project be done. [24:40] - If someone overpays you for a service, be skeptical. [28:01] - The extra details in the initial email could be a red flag. [29:40] - The use of details is intended to distract you. [31:08] - Liz works primarily with small to medium sized businesses, but large companies are also very susceptible to scams. [32:52] - Social engineering and preying on emotions are the common threads between all scams. [35:41] - False authority in an email can also be a red flag.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest SangFroid Web Design Web Page Liz Eisworth on LinkedIn
  • Transparency in a family builds trust, but sharing information while gaming online can set you up for unnecessary risks. Your children may be sharing details that can impact not just them, but you.

    Today’s guest is Eric Jones. Eric is an experienced product manager and developer with over 20 years experience and more than 9 years in Agile Software Development. He is the founder and creator of All Knowing Parent focused on educating people on all avenues of technology and hardware.

    Show Notes: [0:50] - Eric shares what he does as a career and about his startup. [2:27] - As a father of two young girls, Eric is adamant about monitoring technology use. [3:50] - Eric is a big believer in transparency. [5:40] - Gaming is not just a casual hobby anymore. [7:01] - On all gaming consoles there is some sort of communication with other players online available both as text and voice. [9:10] - On some platforms, you have to be “friends” with someone to play together. Some games do a better job than others on safety. [10:15] - Eric talks daily to his children about safety in gaming. These conversations started before they were even playing it. [12:03] - Setting rules ahead of time is important to avoid cleaning up a mess. [13:23] - Kids tend to give out so much information easily. [14:48] - What are the pieces of information that you should make sure are kept private? Eric says everything. [17:01] - Even giving out gamer handles from other consoles shouldn’t be shared. [18:28] - Consoles protect your IP address better but gaming on servers do not. [20:25] - Almost everything these days is connected to the internet. Unfortunately, a lot of pressure is put on the user. [22:18] - When you’re playing online, you don’t see the type of people you play with through a username. Eric explains what swatting is. [23:20] - People can also raid a streamer’s channel with obscenities and can piece together information through social engineering. [25:03] - Don’t assume someone doesn’t want your information. They may hack you simply as a launching off point to something else. [26:41] - Referring to a previous episode, everything connected to the internet can slowly give away pieces of information. [28:16] - Social engineering is not as hard as you might think in online gaming just by watching how you play. [30:57] - Children trust first and as adults, we’ve learned to trust second. [31:54] - A gaming company’s priority is not user safety. [33:16] - If playing with people you don’t know, be extremely kind and avoid topics like politics and religion. [35:21] - DDoS attacks are less common these days but can still happen. [39:11] - Unfortunately, if a kid really wants something, they will be motivated to get around things you have in place to keep them safe. [39:45] - Eric describes how and why he founded All Knowing Parent. [41:14] - Eric’s goal is to educate and be a support for people to better understand the technology in their life. [43:12] - There are no cookie-cutter answers. Eric helps people with each question as they arise and gives an example of a recent customer question. [44:10] - All Knowing Parent is offering discounts for Easy Prey listeners! Check that out at AllKnowingParent.com/EasyPrey

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest All Knowing Parent Website All Knowing Parent - Easy Prey Special Discounts All Knowing Parent on Facebook All Knowing Parent on Twitter All Knowing Parent on Instagram
  • We all have limited resources when it comes to time, money, and energy so in a world where people can create fake personas online, how can you be a part of a community that weeds out imposters?

    Today’s guest is Ken Rutkowski. Ken is a business talk radio personality, innovative strategist, international speaker, and the founder of Metal International. Ken has done government consultation for thirteen different countries and collaborations with Google, Yahoo, Microsoft, Surf Air, Motorola, AT&T, and numerous others. He’s been featured on Good Morning America, Oprah, The New York Times, The Wall Street Journal, Bloomberg, The Chicago Tribune, Miami-Herald, Forbes and many other networks and publications around the world.

    Show Notes: [1:00] - Welcome to the show, Ken! Ken shares his background and why he was led to his career in radio. [2:01] - Ken is one of the early developers of podcasts. [3:17] - When he moved to Los Angeles, he realized that many people he met were imposters. [4:48] - Ken shares that his image has been used to catfish women online. [5:59] - Most people are on Facebook and some sort of photo platform like Instagram. Ken explains why he has a LinkedIn. [6:43] - It’s advised to search an image to find the history of it and Ken shares a useful AI tool. [8:01] - Chris predominantly uses video to chat with people and explains why. [10:03] - Go beyond the conversation of business. [11:31] - Ken demonstrates the pyramid of friendship and how you can determine a stable relationship. [13:05] - When talking to others online, Ken looks for specific types of people. [15:08] - How can you tell the difference between a $30,000 millionaire from a legitimate millionaire? [16:10] - Remove time-sensitivity. [18:12] - The pyramid of friends and relationships is important to keep in mind when determining the legitimacy of someone’s online persona. [20:23] - There are specific types of relationships that determine your circle of trust. [21:14] - Because many people spend so much time on Facebook, people are spending time in the “friend and acquaintance zones.” [23:28] - To keep up with your circle of trust in a digital world, Ken recommends WhatsApp groups. [25:01] - In virtual events, Ken has two banned topics: religion and politics. [26:43] - Genuine community protects you. [29:11] - Everyone should create their own social circle and then fire those who are complicating things. [30:41] - Ken describes a trust token program he is working on. [32:14] - Ken and Chris have a mutual friend and he demonstrates how he used social engineering to vet the legitimacy of Chris’s relationship with him. [34:01] - Ken’s online community began as an in-person community. He curates who his members are. [36:49] - What are the rules of Ken’s community? [38:40] - It is not just your money that is vulnerable to scammers, but your time and energy.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Metal International Web Page Ken Rutkowski on Twitter Ken Rutkowski on Instagram Ken Rutkowski on LinkedIn Ken Rutkowski on Facebook Ken Rutkowski Home Page
  • Some organizations may use misleading language or pressure you as they solicit for a donation and this can cause distrust. Research is needed to make sure your money is going to the charity of choice and not a predator preying on your emotions.

    Today’s guest is Laurie Styron. Laurie was appointed the Executive Director of CharityWatch, American Institute of Philanthropy in 2020. She served as CharityWatch’s Senior Analyst for 16 years and thereafter as a Program Consultant through her nonprofit accounting and consulting practice. Laurie has been quoted in The New York Times, Los Angeles Times, The Wall Street Journal, NBC Nightly News, and by many other media outlets. She has also vetted charities for Good Morning America and has worked with 60 Minutes and many other news organizations on charity related investigations.

    Show Notes: [1:53] - Laurie shares how she started with CharityWatch and why she was drawn to working in a nonprofit. [3:31] - The founder of CharityWatch realized people were not making fact based decisions around donating to charities. [5:04] - There has been some effort to regulate and enforce how donations are used. [6:14] - Niche and very specific causes are harder to raise money for. [8:14] - The funding for regulators is insufficient for them to adequately oversee. [9:40] - Laurie explains how to vet a charity on CharityWatch and gives an example of how organizations are ranked on the site. [11:50] - Sometimes organizations will use donations as their funds to continue marketing for more donations which causes an ineffective cycle. [14:06] - A lot of donors get really focused on the salaries of charity executives. [15:05] - It is actually a red flag if board officers are not paid enough. [18:17] - There are not enough people in the United States with a masters degree that could work for a low salary. [20:46] - Going into the season of giving, avoid high pressure tactics. [22:12] - A lot of fundraisers have expert scripts that are designed to pressure you. Laurie gives tips on how to say no. [25:01] - Laurie gives advice on how to use your emotions to choose a charity for a cause you are passionate about. [26:33] - Laurie tells the story of a crowdfunding scam that was well intentioned but the money raised was not done by someone who could execute the result. [28:41] - She shares another story of fake campaigns on GoFundMe as copycats. [30:22] - You have the ability to check filings, tax information, and registrations for organizations. Crowdfunding sites do not vet their account holders. [32:36] - Cut out the middleman. Donate directly. [34:02] - It is advised to only donate on crowdfunding sites to those you know. [35:04] - It is not logical for a charity to use 100% of all donations on the cause. [37:24] - Laurie describes how charities are rated on a grade scale on CharityWatch’s website. [38:35] - There are other sites that rate and rank charities but not all are reliable. [40:57] - When you are doing your research, ask yourself what the site’s process is. [43:00] - Sometimes, third party platforms will hold on to the money for longer than necessary and Laurie says to donate directly. [45:47] - If you send small donations across multiple charities, your donations will be much smaller due to fees. [49:42] - Make that little bit of research you do before you donate part of your giving.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest CharityWatch.org
  • With the sense of anonymity, people often post false claims, lies, and private information that can impact a person’s livelihood. Illegal content such as copyright infringement, invasion of privacy, and defamation are on the rise on the internet. But there is something to be done about it.

    Today’s guest is Kenton Hutcherson. Kenton is an attorney and owner of Hutcherson Law. He and his team focus on a very specific niche of law: helping people, professionals, and businesses who have been attacked on the internet.

    Show Notes: [1:11] - Kenton explains the three types of cases he works with - internet defamation, copyright infringement, and invasion of privacy. [2:20] - Kenton shares his background and journey as an educator and lawyer. [4:15] - The pandemic in particular caused a lot of interesting problems that Kenton has worked to solve. [5:36] - Defamation encompasses libel and slander. Kenton explains the difference. [7:00] - Written posts on the internet can harm people many years later. [8:27] - When does it make sense to see a lawyer for internet defamation? [9:50] - Is the damage being caused worth the cost of a lawyer? Kenton describes the clients that usually merit hiring a lawyer. [11:57] - Sometimes a bad situation is to cut your losses and move on. [13:20] - You want a better life, not a better lawsuit. Be a kind and respectful person. [14:46] - Extortion by defamation is unfortunately common by consumers. [15:43] - Not all reviews are true and accurate. [16:56] - The Communications Decency Act has created safety for review sites themselves because it is user generated content. [18:53] - Google has stepped in and will remove some sites and reviews from searches when review sites refuse to take down a false review. [20:50] - Kenton has worked with Yelp previously. He shares Yelp’s policy for defamation. [23:01] - Sometimes people will use throw away accounts that they can’t access again in order to change their review or post. [24:01] - You can also hire a reputation manager who can help bury negative false claims. [25:01] - Kenton shares an example of a case and client he has had. [29:03] - The case Kenton shares demonstrates how people can truly destroy a business. [31:12] - In this case, the convict broke out of prison. He did not stop pursuing Kenton’s client. [32:55] - Kenton’s team contacts Google, Yahoo, Bing, and other search engines to take down posts and reviews for their clients. [34:09] - Simply express your opinion. Do not post false assertions of facts. [35:50] - For both sides, a lawsuit can damage their lives. [36:32] - If you are sued, you cannot discharge this with bankruptcy. [39:05] - Defamation is approached a bit differently if it is a competitor. [40:08] - Kenton describes how an internet lawyer unmasks defamation. [41:56] - You need to have enough materials and content to analyze.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Hutcherson Law Website
  • Safety in public spaces can be complex. There are things that you can do to be prepared and alert in all situations. Techniques can be used to distract someone long enough to escape, no matter the size of the attacker.

    Today’s guest is Lieutenant Jessa Russell. Lieutenant Russell serves as the Community Relations Officer for Highland Park Department of Public Safety. In this role, she assists with crime prevention, safety education presentations, crime watch, community welfare concerns, and is the liaison to the Highland Park ISD. Lieutenant Russell began her career with Highland Park DPS in August 2008 and has served as a field training officer, defense tactics instructor, and operations supervisor.

    Show Notes: [1:01] - Welcome to the podcast, Lieutenant Russell! Jessa explains how she got into law enforcement. [3:40] - Every department has different norms. Jessa describes the more common problems her department responds to. [5:10] - What is jugging? Jessa describes this crime and what to do to avoid it. [7:06] - There are more fire stations than police stations and if you are being followed, pulling into a fire station could cause them to stop. [9:01] - Always be skeptical. The world is a good place but there are bad people in it. [11:12] - Restaurants and bars are places to have a heightened situational awareness. [13:14] - If you are on a walk or run, only use one earbud. [14:51] - You have to be assertive. Political correctness will hamper you when safety is a concern. [16:30] - Park close to lights and the closer to the store the better. You can also request security officers or employees to escort you to the car. [17:49] - There are different mindsets regarding an attack. [19:12] - RAD is a program that Jessa educates through. It stands for Rape Aggression Defense. She explains the program and the training involved. [20:58] - Some women are taught to be so submissive that they don’t realize they have power, which can simply be your voice. [21:54] - Training does not mean you are a fighter. The techniques are designed to escape. [24:20] - Most attackers are known to the victims, but random attacks can happen as well. [25:28] - Assertively yelling “stay away” instead of screaming for help will catch someone’s attention more. [26:33] - Chris shares a story to demonstrate how bystanders may not know if the situation is serious. [28:47] - Jessa gives tips on how to help someone in danger. [29:50] - Noticing clothes is great, but noticing shoes is even better. [31:00] - Jessa explains what is important to note in describing an attacker. [34:18] - Remembering the first few characters of a license plate is often enough to help. Remembering all is very challenging. [36:50] - You need to know what to do if you are ever pulled over. [39:43] - If someone is trying to rape you and you are not fighting back, you are not at fault at all. [41:24] - Every department has a victim liaison. [43:18] - Don’t be afraid to report something and work with the police. [44:40] - Always lock doors and keep valuables in the house. [47:41] - Jessa discusses carrying a gun and the importance of knowing how to properly use it if you want to have it.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest RAD Systems Website
  • For most people, figuring out how our credit score is calculated is a black box. Learning what impacts your credit score gives you flexibility to change it. Here are twenty ways you are ruining your credit.

    Today’s guest is Steve Snyder. Steve is an author, speaker, and one of the top personal finance commentators in the country trained by the Fair Isaac Corporation, the firm that created the score that credit reporting agencies use to calculate a consumer’s credit worthiness. FICO Score is widely recognized as the industry standard for lenders. Steve has been quoted in the US News World Report, The Wall Street Journal, Newsweek, The Washington Post, and many others.

    Show Notes: [1:03] - Welcome to the podcast, Steve! Steve describes what he does in his career and what got him interested. [2:43] - Steve recovered from bankruptcy in less than eight months and realized that most people have no idea how to manage their credit. [3:34] - The biggest mistake is not knowing that you have three credit scores. [4:50] - The three scoring companies from Equifax, Experian, and TransUnion. [5:41] - Not all lenders report to your credit reports which is why scores can be different. [8:05] - There’s a system in place to correct things that are wrong with the large scoring companies. [9:01] - Most people purchase the wrong scores. Most of the scores you are bombarded with online are fake. [10:43] - Steve explains why the vantage score was created and why your FICO score is more important. [12:01] - Debts going to collections, late payments, judgments, liens, bankruptcies, high utilization, negatively impact your credit. [13:51] - Steve explains how shopping for cars and mortgages shows up as multiple inquiries on your credit. [15:50] - Most people don’t realize that they have a utilization sweet spot. [17:05] - No utilization can be bad for your credit score as well. You can have too much or too little. [19:01] - Having a credit card is the first step. Using it is the second. [21:45] - Your credit history goes back longer than just recent months and years. [23:35] - You never want to randomly close credit accounts even if it is an unused card that you’ve had for a long time. [24:40] - Never fight about your credit on your credit reports. If you have an issue, take it to small claims court. [27:41] - Most people do not understand how credit works because we are not prepared early in life. [29:21] - Steve is not going to ever risk his perfect credit scores by co-signing anything even with his own children. [32:00] - Co-signing student loans can be detrimental. [34:11] - It is wise to freeze your children’s credit until they are ready to use it. [35:26] - Steve explains the meaning of “thickening a thin credit file.” [37:46] - People think that because they make a lot of money that money will take care of everything else. [39:25] - Allowing collections to show on your credit is a huge mistake but is easily rectified. [40:51] - Steve explains the difference between a charge off and a settlement. [42:00] - Too many credit inquiries lowers your score but will also “spook lenders.” [43:16] - You could be paying off the wrong things. Your credit score is heavily weighted on your personal credit balance. [45:01] - Business and personal finances should be separate. [46:55] - No interest business credit cards are a great way to get started, but you have to be disciplined with a real business idea. [49:25] - The best time to apply for credit is when you don’t need it. Don’t wait for the emergency.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest After Bankruptcy Website Credit After Bankruptcy by Steve Snyder
  • There are methods used to influence us to either buy or do something. We may even be persuaded to participate and only later on wonder how they got us to join. It is beneficial to know these seven principles that compel us to react.

    Today’s guest is Dr. Robert Cialdini. Dr. Cialdini is an author and keynote speaker as a leading expert on influence and persuasion. His books are published in 44 different languages and have sold over 7 million copies. He’s a New York Times, Wall Street Journal, and USA Today best-selling author. He’s also been elected to membership in the National Academy of Sciences.

    Show Notes: [1:10] - Dr. Cialdini got into this field because he was easily persuaded in the past. [3:05] - Incognito, Dr. Cialdini answered as many ads and training programs he could get into to see how advertisers convinced people to buy. [4:40] - In his research, he found that there are seven principles to persuasion. [5:44] - The first principle is the principle of reciprocation. This is present in every culture. [6:57] - First someone gives you something and then you feel obligated to give back. [9:03] - Chris shares an experience at a restaurant to receive something for free that actually required him to do something first. [11:37] - Is something genuinely giving you something or trapping you into compliance? [12:19] - The second principle is the principle of “liking.” You will be influenced more by those who you like. [13:48] - One way to get people to like us is to give them something which ties right into the principle of reciprocity. [16:12] - Step back from the situation and separate the salesperson from what he or she is offering. [17:18] - The next principle is the principle of social proof. If a lot of people are choosing or favoring something, it seems like something you should do, too. [18:28] - We recognize when there are fake reviews. 5 star reviews generally make us skeptical. [21:04] - Dr. Cialdini describes a study done in McDonald’s that boosted sales of one menu item by 40%. [24:48] - The next principle is similar to social proof and decreases someone’s uncertainty. It is the principle of authority. [25:58] - The problem with assuming someone is an expert is the appearance of actors and influencers being paid to promote. [27:34] - Ask yourself, “Is this person an authority on the topic at hand?” [28:32] - Also ask if the person is being unbiased in their testimonial. [30:19] - The next principle is the principle of consistency. [32:01] - Dr. Cialdini shares why he no longer signs petitions. The pressure to be consistent can motivate us to do things we don’t want to do. [35:28] - Sometimes sales sites will list an item or booking that there are only two left at this price and list a number of people also looking at the listing. [37:38] - We don’t know all the time if something is legit. [39:55] - Dr. Cialdini added a seventh principle to his book called the principle of community. [41:17] - Dr. Cialdini demonstrates how this works with a personal example. [43:11] - Be wary of promotions within your “tribe.” [44:12] - Some companies will ask for collaboration to create unity and produce customer loyalty. [47:09] - Dr. Cialdini shares a story about letting people into one’s house. [50:55] - Check out Dr. Cialdini’s website for a Harvard article to help prevent digital attacks on your organization or business.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Influence at Work Website Influence, New and Expanded: The Psychology of Persuasion by Dr. Robert Cialdini
  • Criminals feel safe to hide behind the internet. They hire people and train them to be effective salespeople with the goal of taking your money. Let’s look at a few ways to do our due diligence to be sure that who you are working with online are who they say they are.

    Today’s guest is Ken Gamble. Ken is a professional investigator, corporate security specialist, and cybercrime expert with 33 years of experience working for individuals and multinational corporations. He is the co-founder and executive chairman of IFW Global that conducts fraud investigations, asset tracking, fraud recovery, disruption and prevention of global cybercrime, monitoring enforcement actions to protect and recover assets for worldwide clients. He is the current Australian chairman of the International Association of Cybercrime Prevention, a non-profit association founded in Paris in 2006. Ken is an accomplished surveillance specialist and former surveillance advisor contractor to a commonwealth government agency in Australia and a consultant to numerous law enforcement agencies in the US, Asia, and Europe as well as several foreign governments.

    Show Notes: [1:23] - Ken shares his background and international experience. [2:41] - In his career, Ken has worked in all sectors of investigation. [3:50] - What inspired Ken to get into this field? The internet. [6:00] - International crimes are very complicated to pursue which has made crime on the internet so impactful. [8:01] - Although challenging, it is possible to track people down by following a digital footprint and mistakes. [9:39] - The type of work Ken does is very high-end. [10:47] - Ken has worked for foreign governments and government officials for many high-end cases. [11:37] - Following the money doesn’t lead to the scammer. Ken describes other methods to track the location of criminals. [13:05] - A lot of success comes from informants and whistle-blowers. [13:55] - Sometimes people work in a call center not knowing that they are working for a scam organization. [15:02] - This is a male-dominated industry, specifically young men. [17:06] - Although these criminals are ruthless, they are well spoken, polished speakers and are generally very charming. [18:03] - Craigslist is often used to attract job applicants. [19:37] - Criminal organizations are extremely manipulative to those who come to realize that the operations are wrong. [22:38] - A big red flag is talking to someone and not ever seeing them either in person or on a video chat. [24:25] - Do your due diligence and research who you’re talking to. [26:54] - Criminal organizations train employees through very well rehearsed scripts. [29:23] - The number one red flag is that criminal organizations are not regulated firms. [30:52] - Cryptocurrency is a big trend in scams currently. [33:18] - There are a lot of new challenges with cryptocurrency fraud. [35:22] - Cybercrime organizations are extremely sophisticated. [36:55] - Many organizations have mastered moving funds to other countries that won’t cooperate with law enforcement. [38:29] - Being able to reveal who the criminals are leads to a better chance at asset recovery. [40:02] - If Ken can identify a criminal and freeze accounts, it worries them. Paying back a client is how they can get out of their predicament. [41:18] - Some countries are more favorable to the victim and others are not. [42:37] - Ken now takes the media along to busts to expose criminals and educate the public. [44:09] - Financial crime is devastating to the victim. [46:50] - Criminals sometimes feel extreme guilt but they justify their actions. [51:15] - If you want to invest in something, ask for second opinions and do your due diligence and research.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest IFW Global Website Ken Gamble on LinkedIn
  • Surveillance cameras and other student monitoring tools are becoming more and more common in schools today. Laptops are distributed to the students and software is installed on them for their own protection, but it is important to know what is being done with the data collected outside of classroom use and if your students or your own privacy is being invaded.

    Today’s guest is Jason Kelley. Jason is the Associate Director of Digital Strategy at the Electronic Frontier Foundation, focusing on how privacy and surveillance impact digital liberties. Before joining EFF, Jason managed marketing strategy and content for a software company that helps non-programmers learn to code, and advertising and marketing analytics for a student loan startup.

    Show Notes: [0:53] - Jason describes his current role at Electronic Frontier Foundation. [2:32] - Big tech companies who offer devices to schools collect data from them. [4:17] - Physical surveillance has increased due to the continuous problem of school shootings. [6:01] - Surveillance cameras can be accessed directly by local police. Jason explains how this can be controversial. [8:34] - Jason and Chris discuss the reason for using school-issued devices only for education purposes. [9:53] - Surveillance cameras do have blind spots. Facial recognition also has some issues. [11:03] - When devices are provided, parents, young people, and even administrators don’t always know the capabilities. [12:22] - Jason shares an example of one of the pitfalls of student monitoring apps that are on school issued devices. [14:07] - Schools can take screen captures from issued devices which isn’t done out of malice but does raise questions about privacy. [15:12] - We have to choose which is more important: safety or privacy. [16:37] - Students and parents need to know that school issued devices have features that will impact privacy. [17:32] - Jason describes some of the differences between the types of alerts school administrators receive. [19:12] - Sometimes software blocks things that are safe and doesn’t block things that could potentially be inappropriate. [20:50] - Teachers cannot have their eyes on every student’s computer at all times and often rely on software to help. [22:04] - Teachers shouldn’t be expected to know how surveillance software works. [23:01] - Jason describes a recent problem at Dartmouth with Canvas logs. [26:27] - This issue at Dartmouth was very serious and could have impacted the students’ careers drastically. [28:21] - There is an epidemic of misunderstandings of technology. [29:24] - EFF offers guides for students on what to do and expect with school-issued devices. [30:42] - There have been a lot of successful petitions in recent years about data tracking in universities. Parents have some leverage here as well. [33:00] - Sometimes, there’s not anything you can do about student surveillance. [34:20] - The Covid-19 pandemic made things very challenging as students needed access to education remotely very quickly. [36:50] - Jason describes some of the features of remote proctoring programs. [38:33] - This vastly impacted thousands of students who took the BAR exam. [40:36] - EFF has been pushing back on proctoring and Jason explains a recent win. [42:18] - Jason is hopeful that the pandemic has made it more clear where technology fails us.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Electronic Frontier Foundation Website Jason Kelley on LinkedIn Jason Kelley on Twitter EFF on Twitter EFF on Facebook EFF on Instagram EFF on YouTube
  • The term “gaslighting” is becoming more commonly used as people come to understand the psychological impact. It is important to identify the techniques used by someone to maintain an unhealthy relationship so you can avoid it or change it.

    Today’s guest is Dr. Deborah Vinall. Dr. Vinall is not only a licensed marriage and family therapist, but also a doctor of psychology. She is a certified trauma therapist that uses EMDR and brain spotting. Dr. Vinall is the author of Gaslighting: A Step by Step Recovery Guide to Heal From Emotional Abuse and Building Healthy Relationships.

    Show Notes: [1:18] - Dr. Vinall explains why she wrote her recent book as gaslighting is something a lot of people experience but don’t understand. [2:42] - What is gaslighting? Dr. Vinall gives an example. [3:18] - Gaslighting can happen anywhere and with anyone. [4:06] - There are different types of gaslighting that range from fully calculated to more defensive in nature. [5:01] - Many people exhibit gaslighting at some point in their lives, but patterns are when things get problematic. [6:19] - Insecurity is one reason many people tend to gaslight. [7:29] - What are some signs for pattern gaslighters? [8:22] - Pattern gaslighters are often very charming in public but are much different behind closed doors. [10:00] - What is “normal” and what is problematic? Look inside and see how you feel around this person. [11:03] - Dr. Vinall gives tips on how to manage situations where it is a co-worker that you can’t make a break from. [12:53] - When confronted, pattern gaslighters may dismiss accusations or could “fly off the handle.” [13:49] - In relationships, gaslighters tend to move very fast. [15:22] - In cases where relationships are deeply connected, Dr. Vinall suggests reaching out to a lawyer. She also discusses the impact of violence escalation. [18:02] - There is a distinction between occasional gaslighting and chronic pathological gaslighting. [19:39] - Try some different strategies in the workplace and think of an exit plan in case a change is needed. [21:12] - Journaling is an excellent tool to help you release and sort through your thoughts and can also be used later to confirm to yourself that you are not crazy. [22:58] - A red flag of gaslighting is someone trying to pull you away from your support system and external relationships. [24:11] - It’s important to grieve the loss of a relationship and all the things that go with it. [25:26] - Notice your self-talk. You can start internalizing the negative talk that you hear from someone who gaslights you. [27:19] - Being a gaslighter may be difficult to overcome as there’s something deeper going on and you must want to heal. [28:07] - Take your time in a relationship and listen to your intuition. [29:49] - Figuring out your boundaries for those in your life who you don’t want to cut out.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Gaslighting: A Step by Step Recovery Guide to Heal From Emotional Abuse and Building Healthy Relationships by Dr. Deborah Vinall Counseling Services with Dr. Deborah Vinall Dr. Deborah Vinall on LinkedIn
  • Home technology can be hacked. Anything from a coffee machine or LED light to a TV or a doorbell. We understand the risk of being vulnerable on our tablets and phones, but you’ll be shocked to realize how much data is collected from our other smart devices and how those very same devices can lead to a much wider compromise. Many of us don’t even know how many devices are on our connected networks, so we better listen up.

    Today’s guest is Amanda Fennell. Amanda is the Chief Security Officer and Chief Information Officer at Relativity. In her role, she is responsible for championing and directing their tech and security strategies including risk management and compliance practices. She has a Master’s degree in Forensic Science and over 15 years of experience in Forensics and Cyber Security.

    Show Notes: [1:12] - Amanda explains Relativity, her roles in the company, and how she was drawn to this field. [3:35] - Many people assume Amanda has all the new and greatest technology but knowing the risks of exploitation, she is selective. [4:25] - There are a multitude of devices that people don’t even realize they connect to their network. [5:23] - Because of the sheer volume of devices, hackers can do a sweep and use the information gathered. [6:32] - The number one security problem is keeping things up to date. [8:16] - Amanda walks through the simple steps of hacking smart devices. [9:40] - Amanda demonstrates how hacking something seemingly inconsequential can lead to accessing more. [11:23] - You need to know what’s connected to your network. You have more than you think. [12:41] - Surprisingly, there are connected lightbulbs that people sacrifice security for ease of access. [14:02] - When guests come over and you share your password, did you take their access back? [15:15] - Amanda is a big fan of segregating your network. She describes what this means. [16:29] - How can you segregate your network? [18:08] - Amanda suggests using WireShark. [19:39] - Many people hang on and use old routers because they still function, but most are not supported with updates after just a few years. [21:18] - It is also common practice to use identifying information as passwords and device names. [22:33] - Even Direct TV can be hacked. How can this be used against you? [23:30] - Amanda shares an investigation and how she used a printer spool file. [25:06] - Medical devices, printers, and copiers can be hacked. [27:29] - Amanda describes the differences between two security companies and what she advises doing to stay secure. [31:40] - How can you implement ongoing monitoring and detection in your home network? [33:52] - Implement updating devices into your monthly or weekly routine. [36:03] - You can do a scan on your network and even ask a friend for help. [37:28] - Smart coffee and smart fridges seem simple but can be used for targeting phishing and even when you are leaving the house. [39:33] - Just making yourself a little less accessible could deter a hacker because others will be easier. [41:43] - Amanda shares how false donations were used in fraud. [43:25] - We all deserve to have our information private and secure but it also needs to be personally accessible. That’s the risk.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Relativity Website Security Sandbox Podcast Amanda Fennell on Twitter Relativity on Twitter
  • Fear can cause people to hoard. Blockchain would allow transparency that could alleviate those fears. Understanding the trivergance of AI, IoT, and Blockchain can transform your thinking even for those resistant to change.

    Today’s guest is Don Tapscott. Don is one of the world’s leading authorities on the impact of technology on business and society having authored 16 widely read books, including the global bestseller Blockchain Revolution: How the Technology Behind Bitcoin is Changing Money, Business, and the World, now translated into 20 different languages. He is currently Co-Founder & Executive Chairman of the Blockchain Research Institute, an Adjunct Professor at INSEAD, recently a two-term Chancellor of Trent University in Ontario and Member of The Order of Canada.

    Show Notes: [1:22] - Don shares his professional background, career, and work as an author. [2:55] - The Blockchain Research Institute researches how industries are affected by blockchain technology. [4:41] - Don and Chris think back to the earlier days of the internet. [7:02] - This new generation of technology represents a new paradigm. [8:04] - What is happening in Congress at the moment that could change everything about the industry? [11:35] - New paradigms create a crisis in leadership. Don’s life work has been to find leaders who embrace the shift. [13:12] - We view this current time as the second era of the internet. What is different from the previous era? [14:23] - We are moving from an internet of information to an internet of value. [15:21] - People hoard out of fear and this impacts supply chains. [17:09] - Blockchain can be a solution for health records. Many people consider it a problem due to lack of understanding. [18:25] - Blockchain gives people the control to manage their transparency. [20:29] - It takes time for us as a society to figure things out. What is the future of blockchain? [22:19] - Don is speaking at an event about the vision of how industries will be changed by blockchain. [24:43] - Don references years past when CEOs didn’t type because that was a secretary’s job. It took time to change and it will take time to make these changes as well. [26:06] - There are industries that will be very resistant to change. [26:51] - On the Blockchain Research Institute’s website, there are reports on various industries.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Don Tapscott Web Page Men In Suits Music Web Page Blockchain Research Institute Web Page Don Tapscott on Facebook Don Tapscott on Twitter Don Tapscott on Instagram Don Tapschott on LinkedIn Books by Don Tapscott
  • At some point in our life we will encounter a cyber intrusion, either through somewhere we have done business or because we are targeted as an individual. It is important to know how to prevent identity theft as well as how to respond if you’ve already been compromised.

    Today’s guest is Adam Levin. As a graduate of Stanford University and the University of Michigan School of Law, Adam Levin is a nationally recognized expert on cybersecurity, privacy, identity theft, fraud, and personal finance. He is an author and the former director of the New Jersey Division of Consumer Affairs. Levin is the chairman and founder of Cyber Scout and co-founded Credit.com. He has been featured in the New York TImes, Associated Press, Wall Street Journal, The Los Angeles Times, USA Today, and The Chicago Tribune. In addition to that, he has appeared on The Today Show, Good Morning America, CBS Evening News, CNBC, MSN, and many others.

    Show Notes: [1:14] - Adam shares his background and education in law and politics. [2:29] - In 2003, Adam created an Identity Theft company that later became a global business called Cyber Scout. [4:49] - Adam believes that security breaches are a certainty of life these days. [6:35] - While hacking has been around for a long time, Adam shares how he got into the business of identity theft protection. [8:36] - Over time, insurance companies have come to be support in identity theft. [10:01] - Chris shares a scenario of a friend that had their identity stolen. [12:23] - Many victims feel like they were in the wrong when in reality they may not have done anything wrong at all. [13:56] - In recent years, the IRS has been a lot more proactive. [16:02] - What is Adam’s definition of identity theft? [19:01] - Adam explains why you should be vetting your vendor as well. [21:13] - There are four kinds of threat actors - state sponsored, for-profit, cause-related, and “because I can.” [23:29] - Social engineering is the most successful method of identity theft. [25:42] - Adam wrote the book Swiped and explains that there needs to be a new framework around mitigating the threat of identity theft. [26:32] - How do we minimize your risk of exposure? This is very difficult. [27:46] - Two factor authorization is extremely helpful in protection. [28:41] - Always verify that the person you’re speaking to is who you think they are. [30:12] - How can you monitor everything on your accounts and reports? [31:37] - One of the ways credit card numbers are sold on the dark web is by zip code which causes many banks to miss fraudulent use. [32:51] - The third “M” is to manage the damage. What can you do after an incident? [34:05] - Identity theft protection programs are relatively inexpensive. [37:01] - You can set the threshold for when you are notified. But you should choose to be notified of any purchase, even the really small ones. [38:50] - How do banks know when there’s a fraudulent charge? [40:38] - There are features where you can lock the use of your card before having to change account numbers. [42:33] - The best protector of your portfolios, including your identity, is you the consumer. [44:37] - Adam describes his new podcast called What the Hack. [50:23] - Remember that many people are not who they claim to be.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Adam Levin Web Page What the Hack Podcast with Adam Levin Adam Levin on Twitter Cyber Scout Web Page Cyber Scout on Twitter
  • We can sabotage ourselves by the way we prioritize our day by not differentiating between the urgency of emails and getting distracted or manipulated by the media. Today’s guest is David Kadavy. David is the author of the books Mind Management, Not Time Management, The Heart to Start, Design for Hackers, and multiple short reads. David is a self-published coach and the host of the podcast Love Your Work. David has spoken in multiple countries and has been featured in The Overserver, The Huffington Post, Upworthy, and Life Hacker.

    Show Notes: [1:02] - Welcome to the show, David! David explains what he does in the writing field. [2:50] - Chris admits he is a master procrastinator and tends to spend his time doing tasks that are not as important as others. [3:45] - David explains how he divides things up by mental state. [5:57] - A way to avoid emails that don’t need attention right away, David uses a program called Boomerang. [7:38] - David demonstrates how open loops apply to click-bait. [8:56] - The looming possibility of urgent emails can waste energy. [10:10] - David keeps his phone on do not disturb and uses the favorites feature. [12:22] - The news and media can be a huge distraction. [13:10] - If the media captures your attention, it is not a mistake. We are attracted to negativity. [15:47] - You don’t need to know everything that is going on every single moment of every single day. But it is hard not to get sucked in. [18:10] - The immediate availability to communication creates urgency that hijacks your attention. [19:30] - The first person that should get your attention is yourself. [21:00] - As you start prioritizing different things, people may stop demanding your attention immediately. [22:23] - David lives in Columbia and the cultural values are much different there than in the United States. [25:19] - People in different countries may look at time differently as well. [28:33] - People also tend to change how they think about time. [30:03] - If there is a specific set of steps to complete a task, AI can do it. But human creativity is missing. [32:27] - David describes a typical writing day for him and how he manages his mind. [35:01] - David explains the science behind why morning grogginess is actually a prime state to be in for creativity. [38:29] - While resting, free association gets a chance to manifest. [41:15] - Arguing viewpoints on social media has become a priority for a lot of people. [44:50] - There’s so much fighting for our attention. [45:55] - David shares the titles and brief description of his books linked below. [48:01] - kdv.co is shared as an opportunity to download a free writing toolkit.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest David Kadavy Web Page David Kadavy on Twitter 100-Word Writing Habit Books by Author David Kadavy Love Your Work Podcast David Kadavy’s Writing Tools