270
Downloads
14
Episodes
In today’s digital age, we are more vulnerable than ever to cyber-attacks that can compromise our personal information and security. That’s why it’s crucial to stay informed and proactive when it comes to cybersecurity. Join us on this podcast as we explore the world of cybersecurity and provide practical tips and strategies for protecting yourself online. From strong passwords to safe browsing habits, we’ll cover a range of topics aimed at helping you safeguard your personal information and minimize your risk of becoming a victim of cybercrime. We’ll also discuss the latest trends and threats in the cybersecurity landscape, as well as emerging technologies and best practices for staying ahead of the curve. Whether you’re a tech-savvy individual or just starting to navigate the digital world, this podcast is for you. Tune in to learn how to stay safe and secure online. SecurelyHERS Podcast is a production of I’m Not Crazy Productions LLC.
Episodes
Monday Aug 28, 2023
Securely Hers Podcast Season 2 Episode 3: Deception in the Digital Realm
Monday Aug 28, 2023
Monday Aug 28, 2023
Today, we're diving deeper into the intricate web of deception in the digital realm. It's a world where nothing is as it seems, and the more aware we are, the better equipped we become.
The art of deception is as old as time, but it’s digital manifestations. They’re novel, sophisticated, and ever-evolving. From deep fakes to impersonation scams, we're going to break down the tactics and offer ways to safeguard against them.
The digital age has given rise to new tools for trickery. Consider deep fakes. These are AI-driven manipulations of audio and video content. Imagine seeing a video of a CEO announcing a company’s bankruptcy, causing stocks to plummet, only to find out it was all fabricated.
Terrifying to think about, isn’t it? But it's not just corporate figures at risk. Anyone could be targeted. A malicious actor could create a video or audio clip of a family member saying or doing something compromising and use it for blackmail.
And while deep fakes are still in their early stages, they're becoming increasingly difficult to detect. But there are clues: inconsistencies in lighting, odd blinking patterns, or audio that's slightly out of sync.
Beyond deep fakes, impersonation is another common strategy. This isn’t new, but the methods have evolved. With so much of our personal data available online, attackers can convincingly pose as someone you trust.
This extends to the platforms we use. Take the rise of clone websites, for instance. These are sites that look identical to legitimate ones, often with a URL that's just one character off. Unsuspecting individuals might enter their credentials, handing them straight to cyber-criminals.
And let’s not forget about shimming and skimming, particularly at ATMs and gas pumps. These methods involve devices clandestinely placed to capture your card information.
It's a constant game of cat and mouse. For every security measure we put in place, cyber attackers are working tirelessly to find a way around it.
So, what can we do? In a world where deception is around every digital corner, how can we stay one step ahead?
It boils down to vigilance and education. Use tools to detect deep fakes, double-check URLs, regularly monitor your bank statements, and be cautious of unsolicited communication, no matter how legitimate it appears.
Also, trust but verify. If you receive an unexpected message or call from a friend or family member asking for money or sensitive information, always double-check through another communication channel.
As we wrap up, remember in the digital realm, appearances can be deceiving. But with knowledge, caution, and continuous learning, we can navigate these treacherous waters safely.
Thanks for tuning into this episode of Securely Hers. Next time, we'll explore the subtle world of social media and its potential pitfalls. Until then, keep your guards up, and remember: not everything you see or hear online is the truth.
Thursday Aug 24, 2023
Securely HERS Season 2 Trailer
Thursday Aug 24, 2023
Thursday Aug 24, 2023
Episode 2: The Rise of Targeted Cyber Attacks on Families
• Introduction: The personal threats corporate C-level individuals face.
• Elaboration on phishing, spear phishing, vishing, and smishing attacks.
• Real-life examples: Recent incidents where families were the initial point of cyber attacks.
• The emotional and psychological impact on families.
Episode 3: The Art of Deception: Pretexting, Baiting, and Impersonation
• What is pretexting and how it's a tailored form of deception.
• Baiting: The danger of curiosity - using devices like USB drives.
• Impersonation attacks, with a focus on manipulating trust.
• Practical anecdotes of each type of attack.
Episode 4: Beware of Your Surroundings: Physical Attacks and Shoulder Surfing
• The vulnerability of physical security.
• Discussion on tailgating and the risks it brings.
• The overlooked threat of shoulder surfing.
• Steps to prevent these from happening.
Episode 5: Treading Safely Online: Watering Hole Attacks and Fake Profiles
• Deep dive into watering hole attacks and its effectiveness.
• The rising threat of fake social media profiles.
• Discussing the danger of romance scams.
• Recommendations for identifying and avoiding these threats.
Episode 6: The Emotional Manipulation: Sextortion, Ransomware, and Romance Scams
• Understanding sextortion and the blackmail methodology.
• The mechanics and consequences of ransomware.
• How romance scams play on emotions.
• Protecting oneself from emotional and digital manipulation.
Episode 7: Wi-Fi Eavesdropping and Malicious Mobile Apps
• The hidden dangers of public Wi-Fi.
• Setting up rogue Wi-Fi hotspots: A hacker's perspective.
• Malicious mobile apps: More than meets the eye.
• Strategies for safe browsing and app installations.
Episode 8: Quizzes, Surveys, and Invoice Scams: The Subtle Attacks
• Diving into how fun quizzes can extract personal info.
• Recognizing and preventing invoice scams.
• The significant financial and informational losses that can result.
• Educating oneself and verifying before sharing or paying.
Episode 9: Building a Cyber Fortress: Protecting Your Home and Loved Ones
• Understanding your digital footprint and its implications.
• Importance of secure, unique passwords for every platform.
• Steps to bolster security on personal social media profiles.
• Regular software updates, VPNs, and multi-factor authentication.
Episode 10: Engaging the Next Generation: Educating Kids on Cybersecurity
• The vulnerabilities of the younger digital generation.
• Incorporating cybersecurity in their daily digital interactions.
• Hands-on methods to teach and engage children.
• Encouraging open dialogue about online experiences.
Episode 10: Roundtable Discussion: Victims Share Their Stories
• Inviting individuals who have experienced these attacks.
• Sharing, discussing, and learning from their experiences.
• Understanding the aftermath and the steps they took.
• Creating a community of support and awareness.
Monday Aug 21, 2023
The Rise of Targeted Cyber Attacks on Families
Monday Aug 21, 2023
Monday Aug 21, 2023
In today's interconnected world, everyone is a potential target, but those with higher stakes can often become the primary focus of cyber adversaries.
Before we dive in, here's a sobering statistic. In a recent study, over 60% of high-level executives reported that they or their organizations had been the victims of a cyber-attack or data breach. But more alarmingly, a significant portion admitted that their families were also targeted in some form. Today we'll explore why and how.
The classic technique we've all heard about: Phishing. But now, attackers have a more sinister version tailored for their high-profile targets: Spear Phishing. Instead of casting a wide net, they're targeting their 'spear' with pinpoint precision. Let's unravel this. https://SecurelyHERS.com
Wednesday Jul 12, 2023
Cybersecurity While Traveling
Wednesday Jul 12, 2023
Wednesday Jul 12, 2023
So, why is cybersecurity especially important when we're traveling? Well, when we're on vacation, we often use public Wi-Fi networks, charge our devices in public places, and may even lose or misplace our devices in unfamiliar environments. All of these situations can expose us to potential cyber threats. But don't worry - with a little preparation and awareness, you can significantly reduce your risk."
“As a traveler your phone is your connection to your world. Make sure you protect it. It may be a good idea to have a case with a wrist strap. Many of us will use Uber, Lift or taxis for transportation. Leaving your smartphone in a taxi or Uber is a nightmare, so make sure you check for it when you disembark. It’s almost as important as your passport as it may have your airline ticketing information, hotel information and your contact details. It’s also a good idea to have paper documents as well as your electronic documents just in case, especially if you’re traveling alone.”
Thursday Jun 22, 2023
Reducing Your Digital Footprint (Part 2)
Thursday Jun 22, 2023
Thursday Jun 22, 2023
Happy Pride!
Your digital footprint is the trail of data you leave behind while using the Internet.
We'll continue to Part 2 and discuss how you can reduce your own digital footprint.
Tuesday Jun 20, 2023
How Big is Your Digital Footprint?
Tuesday Jun 20, 2023
Tuesday Jun 20, 2023
Happy Pride!
Your digital footprint is the trail of data you leave behind while using the Internet. It includes the websites you visit, the emails you send, the information you submit to online services, and more.
It's like leaving footprints in the sand, but in this case, the sand is the vast landscape of the digital world. And unlike footprints on a beach, digital footprints can last for years and potentially be seen by anyone in the world. Your digital “shadow” is what others write about you.
We'll start by discussing how you can investigate your own digital footprint.
Thursday Jun 08, 2023
Cybersecurity Glossary Part 2 of 2
Thursday Jun 08, 2023
Thursday Jun 08, 2023
This week we will explain cybersecurity terms and how they affect you and your digital assets.
Identity Theft • Account Take Over • Phishing • Spoofing • Pre-texting • Slamming & Cramming • Malware • Robocalls • Smishing • SIM Swapping,
We will go into detail about each attack and what to do if you experience one of them. This is part 2 of a 2 part series. Today we'll expand on the details of each one.
Friday May 26, 2023
Cybersecurity Glossary Part 1 of 2
Friday May 26, 2023
Friday May 26, 2023
This week's Episode will cover Cybersecurity Glossary • Identity Theft • Account Take Over • Phishing • Spoofing • Pre-texting • Slamming & Cramming • Malware • Robocalls • Smishing • SIM Swapping,
We will go into detail about each attack and what to do if you experience one of them. This is a two part series. Part 2 will expand on the details of each one.