In a world filled with data breaches and malware, it is easy to wonder if there is any way to keep your personal information safe. We cut through the hype and sensationalism to give you the information you need to know to keep your personal information private and secure.
Show notes available at https://www.cybersecuritymadepersonal.com/episode86 You have to sign in to use streaming services, but that means they can connect everything you watch (and practically every program you consider watching) back to your identity. And since most streaming services share data with third-party advertisers, it can feel like you have to sacrifice your privacy in order to use them. This episode will give you five strategies you can employ to reduce the data collected by streaming services.
Show notes available at https://www.cybersecuritymadepersonal.com/episode85 Tracking happens everywhere, and data has become a currency of the internet age. Meanwhile, companies are searching for more creative ways to track you. Here are six creative ways that companies are gathering data about you.
Show notes available at https://www.cybersecuritymadepersonal.com/episode84. Working from home comes with many amazing benefits, but if you're not careful, it can also harm your personal security and your employer's security. This episode will give you six steps you can take to keep your home office safe.
Subscribe to Two Minute Tech at https://plnk.to/two-minute-tech?to=page
Show notes available at https://www.cybersecuritymadepersonal.com/episode83. Later this week, millions of people will tear open packages and start enjoying their new presents. However, in a world where practically everything is now connected, you need to check whether that new device actually cares about your privacy and security. Learn five questions to ask as you evaluate your new presents.
Show notes available at https://www.cybersecuritymadepersonal.com/episode82. Printers are probably best known for not doing what you want them to do, but printers can also be compromised to print what someone else sends to them or to provide access to your devices. In this episode, you’ll learn six steps you can take to protect your printer.
Show notes available at https://www.cybersecuritymadepersonal.com/episode81 Shopping safely online does you no good if your packages end up stolen off of your front porch. Since millions of packages go missing across America each day, this episode will give you six strategies you can employ to keep your deliveries safe.
Show notes available at https://www.cybersecuritymadepersonal.com/episode80. Over the next two months, most people will go online to purchase at least some of their gifts. While online shopping can be filled with threats and scams, it can also be a great place to find the gifts you want. Come learn ten ways to protect yourself as you shop online this holiday.
Show notes available at https://www.cybersecuritymadepersonal.com/episode79. As a merchant and a big tech company, Amazon has even more incentive to use your data for their own marketing. However, you don’t have to give up your privacy to shop on Amazon or use its other products. This episode will give you eight strategies you can employ to reduce the data Amazon collects.
Show notes available at https://www.cybersecuritymadepersonal.com/episode78. Your car goes practically everywhere you do, and it knows a lot about you. It might even collect data from your phone if you sync it with your car’s entertainment system. But of course, anything that has information about you will be a popular target for advertisers looking to turn that data into a quick dollar. Come learn about five ways your car could be tracking you, and how you can stop it.
Show notes available at https://www.cybersecuritymadepersonal.com/episode77. Google may not charge you to search the internet, but you have to pay with your personal information. However, you don’t have to give up your personal data just to find information online. This episode will give you five strategies for keeping big tech’s prying eyes away from every question you ask.
Show notes available at https://www.cybersecuritymadepersonal.com/episode76. Free software is wonderful, but not every free program available online is safe. While any type of download could be dangerous, some types of software are more prone to malware and scams. This episode will show you the common dangers with six types of software.
Some changes coming to the format and schedule of the podcast.
Show notes available at https://www.cybersecuritymadepersonal.com/episode75.
Show notes available at https://www.cybersecuritymadepersonal.com/episode74.
Show notes available at https://www.cybersecuritymadepersonal.com/episode73.
Show notes available at https://www.cybersecuritymadepersonal.com/episode72. Social media has led to an increase in cyberstalking, tracking someone’s activity with the intent of harassing them. And there are a number of apps that have made this process easier. Learn how to identify the signs that your electronic devices may have been infected with stalkerware.
Show notes available at https://www.cybersecuritymadepersonal.com/episode71. It’s back-to-school time, and that means many students are packing up heading off for college. While keeping their online information safe may not be the top concern for many of these students, it is something that all college students should think about. Learn seven tips for protecting yourself online while you’re on campus.
Show notes available at https://www.cybersecuritymadepersonal.com/episode70. Most people think of VPNs as business tools that allow you to work from home. However, a VPN is much more than just a business tool. Using one personally can bring a number of privacy and security benefits.
Show notes available at https://www.cybersecuritymadepersonal.com/episode69. Your child’s privacy is probably just as important (if not more important) to you than your own privacy. When it comes to protecting the privacy of your child’s educational data, many things may feel out of your control. However, you don’t have to feel helpless. Learn eight ways you can take control of your child’s educational privacy.
Show notes available at https://www.cybersecuritymadepersonal.com/episode68. Privacy policies aren’t something that you can ignore. You need to check them out if you want to make sure that the company will actually protect your privacy. But what do you look for? Here are six ways you can tell a privacy policy is a bad deal for you.
Show notes available at https://www.cybersecuritymadepersonal.com/episode67. You received a link in your email. The message came from someone you know, so you think the link might be safe, but you’re not sure. How can you evaluate it to determine whether or not it is safe? This episode will teach you how to break down a link to determine whether it is safe or not.
Show notes available at https://www.cybersecuritymadepersonal.com/episode66. Spam is usually just annoying marketing emails from unscrupulous sellers. But in some cases, spam can be much more malicious. Whether it’s annoying or malicious, this episode will give you five strategies you can employ to deal with spam emails.
Show notes available at https://www.cybersecuritymadepersonal.com/episode65. Power outages are an inconvenience, but in some extreme cases, they can be serious or even life threatening. This episode will cover how you can prepare to keep power running to your critical systems when the power is off.
Show notes available at https://www.cybersecuritymadepersonal.com/episode64. Video doorbells are incredibly useful devices. They let you know when someone comes by your house and they also help keep your packages safe when you’re not home. However, if you’re not careful, your doorbell could be a way for someone to get into your life. This episode will cover five steps you can take to protect your video doorbell.
Show notes available at https;//www.cybersecuritymadepersonal.com/episode63.
Show notes available at https://www.cybersecuritymadepersonal.com/episode62. The Big Tech companies have created wonderful (and in many cases, free) products, but they come at a cost: your privacy. Some people are fine with giving up a bit of privacy for the benefits their services provide. However, others may want to reduce their reliance on the big tech companies. If you fall in the latter group, this episode will give you alternatives that will protect your privacy.
Show notes available at https://www.cybersecuritymadepersonal.com/episode61. In episode 20, we discussed what to do to protect the data on devices before you get rid of them. However, those steps assume that you have a device that is working. However, don’t worry. If your phone or tablet is broken, there’s still steps you can take to protect your data.
Show notes available at https://www.cybersecuritymadepersonal.com/episode60. This year, many people will spend some of their summer travelling. And given that many people weren’t able to travel last summer due to the pandemic, it seems that we could be set for record summer travel. However, when making your travel plans, don’t forget to plan for safety. This episode will cover six steps you can take to make sure you stay safe when you travel.
Show notes available at https://www.cybersecuritymadepersonal.com/episode60. This year, many people will spend some of their summer travelling. And given that many people weren’t able to travel last summer due to the pandemic, it seems that we could be set for record summer travel. However, when making your travel plans, don’t forget to plan for safety. This episode will cover six steps you can take to make sure you stay safe when you travel.
Show notes available at https://www.cybersecuritymadepersonal.com/episode59. Spring is a great time to get some cleaning done. And as you’re busy cleaning, don’t forget to clean your tech! This episode will cover seven ways you can give your devices a spring cleaning, both physically and virtually. It’s good for your devices and it’s good for your security.
Show notes available at https://www.cybersecuritymadepersonal.com/episode58. In this episode, we step away from our traditional format to examine what happened with the Colonial Pipeline ransomware attack, how we should respond, and what implications that holds for preventing future attacks against our critical infrastructure.
Show notes available at https://www.cybersecuritymadepersonal.com/episode57. Your smartwatch collects a lot of private data, including information about your health. That means you must make sure you protect the data on it. This episode will show you seven steps you can take to keep the information on your watch safe.
Show notes available at https://www.cybersecuritymadepersonal.com/episode56. The library has many amazing resources, but when you take advantage of those resources, you need to also make sure you take the right steps to stay safe. This episode will teach you three different steps you can take to stay safe at your public library.
Show notes available at https://www.cybersecuritymadepersonal.com/episode55. Everyone wants their data to stay private, but there are mistakes that you could be making that could compromise the security and privacy of everything on your phone. This episode covers five of the most common mistakes you could be making that help give your information over to others.
Show notes available at https://www.cybersecuritymadepersonal.com/episode54. It would be nice if every scam phone call or email came with a warning, but unfortunately, that will never happen. However, there are some common signs you can use that will help you detect the majority of scams. This episode will teach you six of the most common signs of a scam.
Show notes available at https://www.cybersecuritymadepersonal.com/episode53. TikTok is the hottest new social media site, but it’s also been very controversial. If you choose to use TikTok, you need to take steps to remain safe. This episode will cover six steps you should take to stay safe.
Show notes available at https://www.cybersecuritymadepersonal.com/episode52. Browser extensions are one of the best innovations to come to web browsing, but did you know there are extensions you can use to improve your security? This episode will teach you about five types of browser extensions you can use to improve your security.
Show notes available at https://www.cybersecuritymadepersonal.com/episode51. Backing up your computer is usually one of those things you know you should do, but you just never get around to doing. On World Backup Day, it’s a great time to put some thought into why you should back up your personal information.
Show notes available at https://www.cybersecuritymadepersonal.com/episode50 The fight for privacy online begins in your browser. If you don’t configure your browser to protect your privacy, other changes you might make may not do much. This episode will cover five privacy settings in your browser you need to check in order to ensure you keep your privacy protected.
Show notes available at https://www.cybersecuritymadepersonal.com/episode49 Tax season officially opened last week, when the IRS began accepting 2020 returns. However, the IRS is not the only one interested in your tax and financial data. There are scammers out there that want to steal your money or your private data. This episode will cover four scams you need to be aware of.
Show notes available at https://www.cybersecuritymadepersonal.com/episode48. USB flash drives are a convenient way to move data, and they’ve become extremely popular. In fact, it’s likely that you probably have one or more flash drives sitting in your home. However, your data could be threatened if you’re not careful with how you handle a flash drive. This episode will show you five ways that a USB flash drive could be a threat to your data’s security.
Show notes available at https://www.cybersecuritymadepersonal.com/episode47. Your internet provider gets to handle all of your internet traffic, which means that one company sees everything you do online. Since your ISP is now permitted to collect data about your internet activity and sell it, protecting your privacy demands that you take steps to keep your ISP from seeing your activity. This episode will teach you three strategies to keep your ISP from seeing what you do.
Show notes available at https://www.cybersecuritymadepersonal.com/episode46. Text messaging was the second capability to come to our mobile phones (coming right after the old-fashioned phone call!), but that doesn’t mean that it’s free from it’s share of security problems. This episode covers three threats that can come to you through text messaging.
Show notes available at https://www.cybersecuritymadepersonal.com/episode45. Cloud storage is a convenient way to back up your files or share and collaborate with others. However, you must be careful to set up your cloud storage correctly, and you need to know what you should store in the cloud and what is best left on your own devices.
Show notes available at https://www.cybersecuritymadepersonal.com/episode44. There are many reasons why you might want to stay anonymous online. You could want to hide your location or mask your data from the many data brokers. Regardless of your reason, there are steps you can take to protect what other people and companies can find out about you. This episode will cover six methods you can use to protect your anonymity.
Show notes available at https://www.cybersecuritymadepersonal.com/episode43. A security system is a great asset to protect you and your home. However, if you are purchasing it on your own, you must take the time to make sure you are purchasing the right system for your needs. This episode will cover five steps to help you make sure that the system you purchase is actually what you need.
Show notes available at https://www.cybersecuritymadepersonal.com/episode42. It seems that every app on your phone wants to collect data about you. One of the most sensitive forms of data that is commonly collected is your real-time location. Using this data, advertising networks can get an idea of what stores you frequent and even send you ads for businesses you’re near. You may not be able to completely eliminate location tracking, but If you don’t want data brokers collecting your location data, you can greatly limit the amount of data being collected.
Show notes available at https://www.cybersecuritymadepersonal.com/episode41. People search sites are run by data brokers, companies who aggregate large amounts of data about everyone. However, those companies then make it available for anyone to search. While much of this data is relatively benign, some of the information could be incorrect or misleading. Today's episode shows you how you can remove your information from some of the most common people search sites.
Show notes available at https://www.cybersecuritymadepersonal.com/episode40. Your email account holds the keys to your digital kingdom. If your email account is compromised, an attacker could access almost every other account you own by requesting password reset links. Plus, many of the free email services scan your emails in order to sell you relevant advertising. This episode will give you seven steps to protect the security and privacy of your email account.
Show notes available at https://www.cybersecuritymadepersonal.com/episode39. A person using your wifi could show down your network speed or conduct illegal activity that could be traced back to you. If someone was using your internet connection, would you know how to stop that device's connection? Would you even know how to find out if that device was on your network? This episode will discuss how you can figure out if there are any extra devices using your wifi.