Cybersecurity Made Personal

Follow Cybersecurity Made Personal
Share on
Copy link to clipboard

In a world filled with data breaches and malware, it is easy to wonder if there is any way to keep your personal information safe. We cut through the hype and sensationalism to give you the information you need to know to keep your personal information private and secure.

James Herman


    • Feb 7, 2022 LATEST EPISODE
    • infrequent NEW EPISODES
    • 22m AVG DURATION
    • 90 EPISODES


    Search for episodes from Cybersecurity Made Personal with a specific topic:

    Latest episodes from Cybersecurity Made Personal

    Five Strategies to Protect Your Privacy While Streaming Video (Episode 86)

    Play Episode Listen Later Feb 7, 2022 17:45


    Show notes available at https://www.cybersecuritymadepersonal.com/episode86 You have to sign in to use streaming services, but that means they can connect everything you watch (and practically every program you consider watching) back to your identity. And since most streaming services share data with third-party advertisers, it can feel like you have to sacrifice your privacy in order to use them. This episode will give you five strategies you can employ to reduce the data collected by streaming services.

    Six Creative Ways Companies Track You (Episode 85)

    Play Episode Listen Later Jan 24, 2022 18:21


    Show notes available at https://www.cybersecuritymadepersonal.com/episode85 Tracking happens everywhere, and data has become a currency of the internet age. Meanwhile, companies are searching for more creative ways to track you. Here are six creative ways that companies are gathering data about you.

    Six Steps for Work from Home Safety (Episode 84)

    Play Episode Listen Later Jan 10, 2022 25:36


    Show notes available at https://www.cybersecuritymadepersonal.com/episode84. Working from home comes with many amazing benefits, but if you're not careful, it can also harm your personal security and your employer's security. This episode will give you six steps you can take to keep your home office safe.

    Bonus: Two Episodes of Two Minute Tech

    Play Episode Listen Later Jan 9, 2022 5:52


    Subscribe to Two Minute Tech at https://plnk.to/two-minute-tech?to=page

    Five Questions to Ask About Your Presents (Episode 83)

    Play Episode Listen Later Dec 20, 2021 16:53


    Show notes available at https://www.cybersecuritymadepersonal.com/episode83. Later this week, millions of people will tear open packages and start enjoying their new presents. However, in a world where practically everything is now connected, you need to check whether that new device actually cares about your privacy and security. Learn five questions to ask as you evaluate your new presents.

    Six Steps to Protect Your Printer (Episode 82)

    Play Episode Listen Later Dec 6, 2021 15:13


    Show notes available at https://www.cybersecuritymadepersonal.com/episode82. Printers are probably best known for not doing what you want them to do, but printers can also be compromised to print what someone else sends to them or to provide access to your devices. In this episode, you’ll learn six steps you can take to protect your printer.

    Six Strategies to Protect Your Online Purchases (Episode 81)

    Play Episode Listen Later Nov 22, 2021 18:25


    Show notes available at https://www.cybersecuritymadepersonal.com/episode81 Shopping safely online does you no good if your packages end up stolen off of your front porch. Since millions of packages go missing across America each day, this episode will give you six strategies you can employ to keep your deliveries safe.

    Ten Tips for Safe Online Shopping (Episode 80)

    Play Episode Listen Later Nov 8, 2021 21:41


    Show notes available at https://www.cybersecuritymadepersonal.com/episode80. Over the next two months, most people will go online to purchase at least some of their gifts. While online shopping can be filled with threats and scams, it can also be a great place to find the gifts you want. Come learn ten ways to protect yourself as you shop online this holiday.

    Eight Strategies to Protect Your Privacy on Amazon (Episode 79)

    Play Episode Listen Later Oct 25, 2021 18:37


    Show notes available at https://www.cybersecuritymadepersonal.com/episode79. As a merchant and a big tech company, Amazon has even more incentive to use your data for their own marketing. However, you don’t have to give up your privacy to shop on Amazon or use its other products. This episode will give you eight strategies you can employ to reduce the data Amazon collects.

    Five Ways Your Car Is Tracking You (Episode 78)

    Play Episode Listen Later Oct 18, 2021 16:36


    Show notes available at https://www.cybersecuritymadepersonal.com/episode78. Your car goes practically everywhere you do, and it knows a lot about you. It might even collect data from your phone if you sync it with your car’s entertainment system. But of course, anything that has information about you will be a popular target for advertisers looking to turn that data into a quick dollar. Come learn about five ways your car could be tracking you, and how you can stop it.

    Five Ways to Search the Internet Privately (Episode 77)

    Play Episode Listen Later Oct 11, 2021 21:21


    Show notes available at https://www.cybersecuritymadepersonal.com/episode77. Google may not charge you to search the internet, but you have to pay with your personal information. However, you don’t have to give up your personal data just to find information online. This episode will give you five strategies for keeping big tech’s prying eyes away from every question you ask.

    Six Dangerous Downloads You Should Avoid (Episode 76)

    Play Episode Listen Later Oct 4, 2021 18:15


    Show notes available at https://www.cybersecuritymadepersonal.com/episode76. Free software is wonderful, but not every free program available online is safe.  While any type of download could be dangerous, some types of software are more prone to malware and scams.  This episode will show you the common dangers with six types of software.

    An Update on Cybersecurity Made Personal

    Play Episode Listen Later Oct 3, 2021 2:44


    Some changes coming to the format and schedule of the podcast.

    What to Do If You Fall for a Scam (Episode 75)

    Play Episode Listen Later Sep 6, 2021 26:23


    Show notes available at https://www.cybersecuritymadepersonal.com/episode75.

    Four Methods to Protect Your Privacy on Google Maps (Episode 74)

    Play Episode Listen Later Aug 30, 2021 23:08


    Show notes available at https://www.cybersecuritymadepersonal.com/episode74.

    Ten Password Myths You Might Believe (Episode 73)

    Play Episode Listen Later Aug 26, 2021 21:10


    Show notes available at https://www.cybersecuritymadepersonal.com/episode73.

    How to Check Your Devices for Stalkerware (Episode 72)

    Play Episode Listen Later Aug 23, 2021 26:49


    Show notes available at https://www.cybersecuritymadepersonal.com/episode72. Social media has led to an increase in cyberstalking, tracking someone’s activity with the intent of harassing them. And there are a number of apps that have made this process easier. Learn how to identify the signs that your electronic devices may have been infected with stalkerware.

    Seven Steps to Stay Safe on Campus (Episode 71)

    Play Episode Listen Later Aug 16, 2021 22:36


    Show notes available at https://www.cybersecuritymadepersonal.com/episode71. It’s back-to-school time, and that means many students are packing up heading off for college. While keeping their online information safe may not be the top concern for many of these students, it is something that all college students should think about. Learn seven tips for protecting yourself online while you’re on campus.

    Six Benefits of Using a VPN (Episode 70)

    Play Episode Listen Later Aug 9, 2021 26:46


    Show notes available at https://www.cybersecuritymadepersonal.com/episode70. Most people think of VPNs as business tools that allow you to work from home. However, a VPN is much more than just a business tool. Using one personally can bring a number of privacy and security benefits.

    Eight Ways to Protect Your Child's School Data (Episode 69)

    Play Episode Listen Later Aug 2, 2021 27:07


    Show notes available at https://www.cybersecuritymadepersonal.com/episode69. Your child’s privacy is probably just as important (if not more important) to you than your own privacy. When it comes to protecting the privacy of your child’s educational data, many things may feel out of your control. However, you don’t have to feel helpless. Learn eight ways you can take control of your child’s educational privacy.

    Six Signs a Privacy Policy is a Bad Deal (Episode 68)

    Play Episode Listen Later Jul 26, 2021 27:07


    Show notes available at https://www.cybersecuritymadepersonal.com/episode68. Privacy policies aren’t something that you can ignore. You need to check them out if you want to make sure that the company will actually protect your privacy. But what do you look for? Here are six ways you can tell a privacy policy is a bad deal for you.

    How to Evaluate a Link for Safety (Episode 67)

    Play Episode Listen Later Jul 19, 2021 24:26


    Show notes available at https://www.cybersecuritymadepersonal.com/episode67. You received a link in your email. The message came from someone you know, so you think the link might be safe, but you’re not sure. How can you evaluate it to determine whether or not it is safe? This episode will teach you how to break down a link to determine whether it is safe or not.

    Five Strategies to Stop Spam (Episode 66)

    Play Episode Listen Later Jul 12, 2021 22:28


    Show notes available at https://www.cybersecuritymadepersonal.com/episode66. Spam is usually just annoying marketing emails from unscrupulous sellers. But in some cases, spam can be much more malicious. Whether it’s annoying or malicious, this episode will give you five strategies you can employ to deal with spam emails.

    How to Prepare for a Power Outage (Episode 65)

    Play Episode Listen Later Jul 5, 2021 23:20


    Show notes available at https://www.cybersecuritymadepersonal.com/episode65. Power outages are an inconvenience, but in some extreme cases, they can be serious or even life threatening. This episode will cover how you can prepare to keep power running to your critical systems when the power is off.

    Five Steps to Protect Your Video Doorbell (Episode 64)

    Play Episode Listen Later Jun 28, 2021 21:10


    Show notes available at https://www.cybersecuritymadepersonal.com/episode64. Video doorbells are incredibly useful devices. They let you know when someone comes by your house and they also help keep your packages safe when you’re not home. However, if you’re not careful, your doorbell could be a way for someone to get into your life. This episode will cover five steps you can take to protect your video doorbell.

    How to Deal with Cookies (Episode 63)

    Play Episode Listen Later Jun 21, 2021 25:40


    Show notes available at https;//www.cybersecuritymadepersonal.com/episode63.

    How to Get Away from Big Tech (Episode 62)

    Play Episode Listen Later Jun 14, 2021 28:42


    Show notes available at https://www.cybersecuritymadepersonal.com/episode62. The Big Tech companies have created wonderful (and in many cases, free) products, but they come at a cost: your privacy. Some people are fine with giving up a bit of privacy for the benefits their services provide. However, others may want to reduce their reliance on the big tech companies. If you fall in the latter group, this episode will give you alternatives that will protect your privacy.

    Protecting the Data on your Broken Phone (Episode 61)

    Play Episode Listen Later Jun 7, 2021 22:17


    Show notes available at https://www.cybersecuritymadepersonal.com/episode61. In episode 20, we discussed what to do to protect the data on devices before you get rid of them. However, those steps assume that you have a device that is working. However, don’t worry. If your phone or tablet is broken, there’s still steps you can take to protect your data.

    Six Steps to Stay Safe While Travelling

    Play Episode Listen Later Jun 1, 2021 24:29


    Show notes available at https://www.cybersecuritymadepersonal.com/episode60. This year, many people will spend some of their summer travelling. And given that many people weren’t able to travel last summer due to the pandemic, it seems that we could be set for record summer travel. However, when making your travel plans, don’t forget to plan for safety. This episode will cover six steps you can take to make sure you stay safe when you travel.

    Six Steps to Stay Safe While Travelling (Episode 60)

    Play Episode Listen Later Jun 1, 2021 24:29


    Show notes available at https://www.cybersecuritymadepersonal.com/episode60. This year, many people will spend some of their summer travelling. And given that many people weren’t able to travel last summer due to the pandemic, it seems that we could be set for record summer travel. However, when making your travel plans, don’t forget to plan for safety. This episode will cover six steps you can take to make sure you stay safe when you travel.

    Seven Steps to Spring Clean Your Devices (Episode 59)

    Play Episode Listen Later May 24, 2021 24:25


    Show notes available at https://www.cybersecuritymadepersonal.com/episode59. Spring is a great time to get some cleaning done. And as you’re busy cleaning, don’t forget to clean your tech! This episode will cover seven ways you can give your devices a spring cleaning, both physically and virtually. It’s good for your devices and it’s good for your security.

    What Happened at the Pipeline? (Episode 58)

    Play Episode Listen Later May 17, 2021 16:43


    Show notes available at https://www.cybersecuritymadepersonal.com/episode58. In this episode, we step away from our traditional format to examine what happened with the Colonial Pipeline ransomware attack, how we should respond, and what implications that holds for preventing future attacks against our critical infrastructure.

    Seven Steps to Protect Your Smartwatch (Episode 57)

    Play Episode Listen Later May 10, 2021 24:59


    Show notes available at https://www.cybersecuritymadepersonal.com/episode57. Your smartwatch collects a lot of private data, including information about your health. That means you must make sure you protect the data on it. This episode will show you seven steps you can take to keep the information on your watch safe.

    How to Protect Your Privacy at the Public Library (Episode 56)

    Play Episode Listen Later May 3, 2021 23:30


    Show notes available at https://www.cybersecuritymadepersonal.com/episode56. The library has many amazing resources, but when you take advantage of those resources, you need to also make sure you take the right steps to stay safe. This episode will teach you three different steps you can take to stay safe at your public library.

    Five Mistakes That Could Compromise Your Phone (Episode 55)

    Play Episode Listen Later Apr 26, 2021 24:04


    Show notes available at https://www.cybersecuritymadepersonal.com/episode55. Everyone wants their data to stay private, but there are mistakes that you could be making that could compromise the security and privacy of everything on your phone. This episode covers five of the most common mistakes you could be making that help give your information over to others.

    Six Tricks Used to Steal Your Money (Episode 54)

    Play Episode Listen Later Apr 19, 2021 25:58


    Show notes available at https://www.cybersecuritymadepersonal.com/episode54. It would be nice if every scam phone call or email came with a warning, but unfortunately, that will never happen. However, there are some common signs you can use that will help you detect the majority of scams. This episode will teach you six of the most common signs of a scam.

    Six Steps to Stay Safe on TikTok (Episode 53)

    Play Episode Listen Later Apr 16, 2021 22:30


    Show notes available at https://www.cybersecuritymadepersonal.com/episode53. TikTok is the hottest new social media site, but it’s also been very controversial. If you choose to use TikTok, you need to take steps to remain safe. This episode will cover six steps you should take to stay safe.

    Five Browser Extensions That Can Boost Your Security (Episode 52)

    Play Episode Listen Later Apr 13, 2021 28:11


    Show notes available at https://www.cybersecuritymadepersonal.com/episode52. Browser extensions are one of the best innovations to come to web browsing, but did you know there are extensions you can use to improve your security? This episode will teach you about five types of browser extensions you can use to improve your security.

    Seven Reasons to Back Up Your Computer (Episode 51)

    Play Episode Listen Later Mar 31, 2021 26:15


    Show notes available at https://www.cybersecuritymadepersonal.com/episode51. Backing up your computer is usually one of those things you know you should do, but you just never get around to doing. On World Backup Day, it’s a great time to put some thought into why you should back up your personal information.

    Five Web Browser Privacy Settings to Check (Episode 50)

    Play Episode Listen Later Feb 22, 2021 24:43


    Show notes available at https://www.cybersecuritymadepersonal.com/episode50 The fight for privacy online begins in your browser. If you don’t configure your browser to protect your privacy, other changes you might make may not do much. This episode will cover five privacy settings in your browser you need to check in order to ensure you keep your privacy protected.

    How to Protect Yourself from Tax Scams (Episode 49)

    Play Episode Listen Later Feb 15, 2021 24:33


    Show notes available at https://www.cybersecuritymadepersonal.com/episode49 Tax season officially opened last week, when the IRS began accepting 2020 returns.  However, the IRS is not the only one interested in your tax and financial data.  There are scammers out there that want to steal your money or your private data.  This episode will cover four scams you need to be aware of.

    Five Ways a USB Flash Drive Can Be a Threat (Episode 48)

    Play Episode Listen Later Feb 8, 2021 24:57


    Show notes available at https://www.cybersecuritymadepersonal.com/episode48. USB flash drives are a convenient way to move data, and they’ve become extremely popular. In fact, it’s likely that you probably have one or more flash drives sitting in your home. However, your data could be threatened if you’re not careful with how you handle a flash drive. This episode will show you five ways that a USB flash drive could be a threat to your data’s security.

    How to Hide Your Activity from your ISP (Episode 47)

    Play Episode Listen Later Feb 1, 2021 27:36


    Show notes available at https://www.cybersecuritymadepersonal.com/episode47. Your internet provider gets to handle all of your internet traffic, which means that one company sees everything you do online. Since your ISP is now permitted to collect data about your internet activity and sell it, protecting your privacy demands that you take steps to keep your ISP from seeing your activity. This episode will teach you three strategies to keep your ISP from seeing what you do.

    Three Threats That Can Come Through Text Messages (Episode 46)

    Play Episode Listen Later Jan 25, 2021 26:11


    Show notes available at https://www.cybersecuritymadepersonal.com/episode46. Text messaging was the second capability to come to our mobile phones (coming right after the old-fashioned phone call!), but that doesn’t mean that it’s free from it’s share of security problems. This episode covers three threats that can come to you through text messaging.

    Six Steps to Protect Your Cloud Storage (Episode 45)

    Play Episode Listen Later Jan 18, 2021 23:50


    Show notes available at https://www.cybersecuritymadepersonal.com/episode45. Cloud storage is a convenient way to back up your files or share and collaborate with others. However, you must be careful to set up your cloud storage correctly, and you need to know what you should store in the cloud and what is best left on your own devices.

    Six Methods for Staying Anonymous Online (Episode 44)

    Play Episode Listen Later Jan 11, 2021 22:12


    Show notes available at https://www.cybersecuritymadepersonal.com/episode44. There are many reasons why you might want to stay anonymous online. You could want to hide your location or mask your data from the many data brokers. Regardless of your reason, there are steps you can take to protect what other people and companies can find out about you. This episode will cover six methods you can use to protect your anonymity.

    How to Select the Best Home Security System (Episode 43)

    Play Episode Listen Later Jan 4, 2021 19:05


    Show notes available at https://www.cybersecuritymadepersonal.com/episode43. A security system is a great asset to protect you and your home. However, if you are purchasing it on your own, you must take the time to make sure you are purchasing the right system for your needs. This episode will cover five steps to help you make sure that the system you purchase is actually what you need.

    How to Stop Location Tracking (Episode 42)

    Play Episode Listen Later Dec 21, 2020 19:13


    Show notes available at https://www.cybersecuritymadepersonal.com/episode42. It seems that every app on your phone wants to collect data about you. One of the most sensitive forms of data that is commonly collected is your real-time location. Using this data, advertising networks can get an idea of what stores you frequent and even send you ads for businesses you’re near. You may not be able to completely eliminate location tracking, but If you don’t want data brokers collecting your location data, you can greatly limit the amount of data being collected.

    How to Remove Yourself from People Search Sites (Episode 41)

    Play Episode Listen Later Dec 14, 2020 23:49


    Show notes available at https://www.cybersecuritymadepersonal.com/episode41. People search sites are run by data brokers, companies who aggregate large amounts of data about everyone. However, those companies then make it available for anyone to search. While much of this data is relatively benign, some of the information could be incorrect or misleading. Today's episode shows you how you can remove your information from some of the most common people search sites.

    Seven Steps to Protect Your Email Account (Episode 40)

    Play Episode Listen Later Dec 7, 2020 25:55


    Show notes available at https://www.cybersecuritymadepersonal.com/episode40. Your email account holds the keys to your digital kingdom. If your email account is compromised, an attacker could access almost every other account you own by requesting password reset links. Plus, many of the free email services scan your emails in order to sell you relevant advertising. This episode will give you seven steps to protect the security and privacy of your email account.

    How to Find Devices Using Your Wifi (Episode 39)

    Play Episode Listen Later Nov 30, 2020 23:59


    Show notes available at https://www.cybersecuritymadepersonal.com/episode39. A person using your wifi could show down your network speed or conduct illegal activity that could be traced back to you. If someone was using your internet connection, would you know how to stop that device's connection? Would you even know how to find out if that device was on your network? This episode will discuss how you can figure out if there are any extra devices using your wifi.

    Claim Cybersecurity Made Personal

    In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

    Claim Cancel