Plugging up the newest leaks in your personal data and digital security. Think of your digital life being a boat and any loose privacy settings and security lapses being like a hole that needs to be plugged before you sink. I talk with a pro from Norton who I call a digital wonder woman. She holds a number of incredible titles including one that gets my attention, “certified identity risk management specialist”. See why the FBI turns to her for training.

Podcast: Listen to the entire Episode 8 podcast here:

Subscribe: Apple Podcasts | Google Play | SoundCloud | Stitcher

Podcast Timecodes:
00:20 143 Million victims in the U.S.

  • 19.4 Billion lost to cyber criminals
  • 19.8 hours is average time needed to recover from security/privacy incident

00:43 The group of people most prone to cyber criminals

04:40 What scares this digital wonder woman who is certified identify theft risk management specialist

05:38 Why WiFi is one of the latest threats facing anyone

06:00 What information is vulnerable on public wifi networks

06:27 Who wants our personal data

07:57 Looks like a coupon, acts like trouble maker

09:00 What to do if you click on maliciously suspicious email

10:35 What’s in malware

11:30 When malware becomes ransomware

12:15 Should you pay ransom if your data is held hostage?

13:!5 The one thing to do to fend off a ransomware attack

13:56 Why should I care about my personal data being shared when I have nothing to hide?

15:00 How to rethink keeping your digital footprint secure

15:35 Top online safety tips to know now

16:44 What do you need to know about the Dark Web

17:35 When your Social Security Number gets compromised

18:00 Avoid a hacker getting into “full account takeover mode”

19:20 Why to use a password manager

19:56 How to pick a strong password

20:40 What could go wrong with using a hotel’s unprotected WiFi network

21:33 How fraudsters break into home connected devices like thermostats, cameras

22:34 Unsolicited messages are more trouble on a smartphone

23:22 Use multi-platform protection software and services

24:00 What if one device in your network lets a hacker into the rest of your digital life

24:32 The next biggest threats

Listen to more of my podcasts here