Protecting your privacy in the digital age is tough. Identity theft, fraud, and cyber threats are on the rise. You need a Privacy Mentor. Let me be your guide by simplifying complex topics and providing you with tools and resources to stay safe.
Ever noticed how you stay on an app even though you clicked on a link to a different website? This convenient trick is more harmful than you'd think. This week, Carrie talks about the hidden threat that in-app browser's pose to your privacy. In this episode you'll learn: What exactly are in-app browsers? What information are they collecting? How much of a risk are they? What you can do to protect your information Check out the blogpost at https://privacy-mentor.com/ep78
Even though we rely on email for nearly everything we do online, we seem to forget about all the information connected to it. Not to mention all the entities that have access to collect and view this info as well. In this episode, Carrie gets to talk with Brad Deflin of Total Digital Security as they over all of the dangers of using a free email service, and the importance of switching to a more private and secure one. In this episode you'll learn: How limited privacy is when using a free email service What exactly is a private email? Why free email services put you at a greater risk of becoming a target of a cyber-attack Why it's easy to switch over to a private email The importance of starting a private email now rather than later Links: Visit Total Digital Security's website https://www.totaldigitalsecurity.com/ Episode referenced where Carrie talks about scam that changes email rules https://carriekerskie.libsyn.com/sneaky-scam-makes-hidden-changes-to-your-email
Remember when scams used to look like scams? Back when you used to be able to find out if something was real or not based on a handful of things you could check. Those were the good ole days. This week, Carrie talks about a new cyber-attack that's as realistic as it gets when it comes to a scam. Criminals are now setting up official PayPal accounts and sending real PayPal emails. From here, they send out fake invoices to as many individuals as they'd like. Listen to find out the things you can do to detect this fraud, and how you can keep yourself protected. Things you'll learn in this episode: An in-depth explanation of how the scam works What to do if you receive one of these emails or see one of these invoices How to dispute the invoices through PayPal Things to do and consider if you ever receive scams similar to this one when you cant determine if it's real or fake. Link to the PayPal dispute page -https://www.paypal.com/us/smarthelp/topic/DISPUTES_AND_LIMITATIONS_PER Visit Our Website At https://privacy-mentor.com to learn more about how to protect your privacy!
Within the past months there's been a growing concern over the threat known as hermit spyware. Breaking news titles warn of the damage and financial havoc caused by this new type of cyberattack, causing people to go into a panic with the fear that they may become the next victim. But what exactly is this “hermit spyware”? Are you at risk of being a victim? How can you protect yourself if you are attacked? In this episode, Carrie aims to answer these questions and more, while also easing your worries about this new potential threat. What you'll learn in this episode: Who is at risk of being a target of hermit spyware? What are some of the things to look for in the event of a spyware attack? What can criminals do after hacking someone with this malware? General rules of thumb to follow to protect yourself against all cyberthreats Visit Our Website At https://privacy-mentor.com to learn more about how to protect your privacy!
In this Fourth of July episode, Carrie talks about the dangers of relying on banks, credit companies, and other financial institutions. She stresses the importance of knowing what's going on in your accounts, and how waiting for your bank to notify you of fraudulent transactions can cost you big time. Things you'll learn in this week's episode: Why banks aren't as legally obligated to inform you of fraud as you may think they are How long you have to report any fraudulent transactions Things to ask yourself when considering taking back your independence, and what's at risk Visit Our Website At https://privacy-mentor.com to learn more about how to protect your privacy!
Technology has made many aspects of our life a lot easier, but it's also come with its fair share of downsides, some of which you may not be aware of. The convenience that comes in this digital age comes at a price, the cost being your information. In this episode, Carrie goes over the argument of Privacy vs. Convenience. Things you'll learn in this episode What is Privacy vs. Convenience, and what are some examples? What's the price of using convenience-based products What about smart devices? How to switch to a privacy mindset Want to take our privacy quiz? Click here Visit Our Website At https://privacy-mentor.com to learn more about how to protect your privacy!
A new change makes it easier to access your Experian freeze, listen to find out as Carrie explains this new feature to manage your account online. Resources: Link to Experian https://www.experian.com/freeze/center.html Privacy-Mentor Website https://privacy-mentor.com Link to Protect Your Identity in 14 Days https://kerskie.podia.com/protect_your_identity_14days
Want to find out how much your smart devices know about you? Well now you can… This week, Carrie interviews the creator and lead of Mozilla's Privacy Not Included Guide, Jen Caltrider. This guide reviews things like smart speakers, toys, games, wearables, and other devices that are connected to the internet. However, some of these items come with a pretty “creepy” downside. Watch the episode to find out more! Links and Resources: Privacy Not Included - https://foundation.mozilla.org/en/pri... Mental health apps guide - https://foundation.mozilla.org/privac... Visit Our Website At https://privacy-mentor.com to learn more about how to protect your privacy!
2FA was created to protect your online accounts against cyber criminals. In this episode Carrie shares with you a new scam that uses 2FA codes to gain access to your financial accounts. What you'll learn: What is 2FA or MFA How this scam works Two tools to avoid becoming a victim Want more great tips? Join the Privacy-Mentor email list. No span, just useful tips, tricks, and tools to help you protect your privacy from identity theft, fraud, and cyber threats. If you value your privacy, check out our site at https://privacy-mentor.com/. Your privacy depends on it.
Email plays a big part of communicating in this digital age, but did you know that many of the free email services are scraping your emails to collect information? That's right. The reason so many of these email services are free, is due to the fact that they are profiting off of data collected via emails you send and receive. This data is then used and sold for marketing or other purposes. Following up one of our previous episodes with Startpage's Director of Brand and Strategic Partnerships, Kelly Finnerty, I sit down with Robert E.G. Beens, the Co-Founder and CEO of Startpage and StartMail, and a recognized privacy expert and advocate. Here are a few key takeaways you'll learn in this episode: What is StartMail and why was it created Why it's important to protect email privacy What are the risks of not using encrypted email? What to know about encryption Do all parties need to use StartMail to maintain encryption? What shouldn't be sent in an email How to migrate your email to StartMail Are custom domains available? Do they offer email plans for businesses or only consumers? How StartMail proved they value privacy when censored by Russia? If you are currently using a free email service, you owe it to your privacy to listen to the episode and explore StartMail. Your privacy will thank you. Also, don't forget to check out episode 66, where we talked to Kelly Finnerty from StartPage. Robert E.G. Beens is the Co-Founder and CEO of Startpage and StartMail, and a recognized privacy expert and advocate. At Startpage, Beens oversees operations, product development, technology, and finance. He is also a commercial airline pilot with Netherlands-based airline KLM. He earned his Master's degree in Corporate, Social & Economic Dutch Law from the University of Utrecht in the Netherlands. Resources: Check out StartMail - https://www.startmail.com/ Make Startpage your default search engine - https://add.startpage.com/protection/?campaign=11&source=aff Episode 66 - StartPage, The Ethical Search Engine - https://privacy-mentor.com/ep66/ Visit our website privacy-mentor.com
By now you've probably heard of some form of credit protection service, whether it be a freeze, a lock, or a fraud alert; however, you'd be surprised to know the differences between these services, and how one form may protect you more than another. In this episode, Carrie and Kyle discuss these three forms of credit protections, what they really do, and which one can actually help protect your personal credit. Things you'll learn in this episode What are these services, and what they provide Why one of these services is better than the others Where to activate these services Are these free? Will having these in place prevent me from doing anything with my credit? Resources: Steps to place a freeze and show notes www.privacy-mentor.com/ep68
Remote access software is a topic we've brought up several times in previous podcast and blog post, and in this episode Carrie and Kyle go over exactly what it is, and how bad guys are using it to their advantage. In this episode you'll learn: What is remote access software? What are some common example of it? How are criminals using it? How to detect and remove it What to know to minimize your risk of falling victims to these scams Previous episode we reference where we talk about victims of remote access software https://privacy-mentor.com/ep47/ Visit our site for more episodes and post https://privacy-mentor.com/ Check out true cybercrime podcast - Modem Mischief https://www.modemmischief.com/episodes
Here's a brief overview of what you learn in this episode: Why StartPage was created What makes StartPage different from other search engines What is a search bubble? Typically, if a product is free, you are the product. How does StartPage generate revenue? How to get started with StartPage?
Following up last week's episode about 1099 fraud and staying on the topic of tax scams this season, Carrie interviews Ron Loecker, Special Agent in Charge of IRS Criminal Investigations. Ron answers some of Carrie's questions and gives some tips to help you avoid any problems this tax year. Things you'll learn in this episode: What to look for when selecting a tax preparer Are you, or your return preparer responsible for your taxes? How to check if your preparer is legit Will the IRS ever call you threatening to take legal action? Resources: IRS Website https://www.irs.gov/ IRS Press Released 10 Tips file:///C:/Users/kkers/Downloads/Filing%20Season%20_10_Tips_To_Avoid_Fraud.pdf Watch a video of the interview here: https://youtu.be/Y6FMJT0lzc8
This week, Carrie talks about another popular issue we see this time of year around tax season. In this situation, a woman received a 1099 form regarding taxable miscellaneous income she's made off an investment account; The problem is, she's never opened or had any such account. Find out why criminals are taking advantage of investing platforms, and how victims are being held responsible for paying taxes on money they've never made simply because criminals used their identity. Things you'll learn in this episode: Why criminals are setting up crypto/investing platforms using your Identity How the IRS counts on you to file these accounts you've never set up Steps to take to remove these fraudulent tax claims and to restore your information Link to episode 52 that Carrie references in the show: https://carriekerskie.libsyn.com/be-on-the-lookout-for-this-welcome-letter-in-the-mail In that episode we go over how the FBI and IRS reach out to you over bank accounts that you've never set up.
Recently, Carrie received a call from someone worried that their mobile phone number was hacked. Out of fear, and some bad advice, they made some drastic changes on their own to protect their information. What they did not only gave the bad guys more control but locked the victim out of being able to access their own accounts. Listen to find out how you can avoid a situation like this, and what the right steps to take are to protect against phone number theft. Things you'll learn in this episode: Popular types of phone number fraud The worst thing to do when you find out your number is potentially stolen What the right to do is Tips to protect your number in the future
Love is in the air in this episode, as Carrie talks about the notorious sweetheart scammers. This Valentine's Day inspired topic covers a type of criminal that takes advantage of individuals in search of relationships online; but it's not just those looking for love that are at risk. Carrie will share with you how non-romantic relationships found online could also pose a threat. Learn about sweetheart scammer's intentions, and the dangers they present to their victims. What you'll learn from listening to this episode: Who are sweetheart scammers? Why these scams aren't restricted to only romantic relationships Some extreme case examples demonstrating the severity of these scams Red flags that can indicate someone is a potential sweetheart scammer Link to article Carrie References in the episode: https://www.ftc.gov/news-events/blogs/data-spotlight/2022/02/reports-romance-scams-hit-record-highs-2021 TinderSwindler documentary on Netflix https://www.netflix.com/tudum/articles/who-is-tinder-swindler-real-shimon-hayut
Recently, when replying to a client's email, we received an email undeliverable response saying that their mailbox was full. However, upon closer review, the email address mentioned didn't belong to my client. We called the client to see if he received my reply. He said “yes.” We then asked him if he was familiar with the email address listed on the undeliverable response, to which he said “no.” Find out what happened when hidden malicious email rules hijacked our client's emails and what we did to resolve the issue.
After listening to last week's podcast, Carrie's interview with Kris Coleman (Red5Security) about how to minimize your online exposure, Kyle was curious about his own online exposure. In this episode Kyle shares with you what he found, and the difficulty of removing the information. Things you'll learn in this episode: How personal data can be found online Tips for navigating data collection sites How difficult or easy is it to remove the information A simple trick that will help reduce information collected on you
Carrie is joined by Red5Security CEO Kris Coleman this week as they go over how easy it is for someone to find your personal information online. They discuss topics such as how this information gets out there, and who's collecting it. They also talk about if you can remove what's already out there, and things you can do to limit how much data is collected on you. Things you'll learn in this episode: How your information is collected, even if you're not the one putting it out there Where it's collected and why If removing the information out there is possible Tips for limiting your own exposure Link to Red5Security's website https://red5security.com/ BIO: Mr. Kris Coleman Mr. Kris Coleman founded Red Five Security in 2004 to provide world class, state of the art security and protective intelligence services. Mr. Coleman continues to use his knowledge, experience, and integrity to grow Red Five into a multi-faceted company focused on bespoke security solutions for unique clientele. Working in both the private and public sectors throughout his 20+ year career, he has served with the Central Intelligence Agency, the Federal Bureau of Investigation, and as a former Principal with Good Harbor Consulting. Mr. Coleman's depth and range of experiences allows the Red Five team to specialize in high quality, proactive, and discreet security services. He has built a unique capability in Red Five to support clients with tailored low-profile security operations, analysis, training, and program and system design. A distinctive portion of Mr. Coleman's work in the private sector includes the complete assessment, design development, and installation of cutting-edge security programs for high-net-worth clients. Projects have included large residences in Florida, California and the Washington DC, area (some in excess of 45,000 square feet), commercial facilities with challenging security requirements, as well as unique sites overseas. Be sure to check out episode 56, where Carrie interviews another employee of Red5, Special Agent Tom Whalen, as he breaks down FBI Operation Trojan Shield, which resulted in the infiltration of criminal organizations around the world.
In this episode, Carrie discusses a case she's worked on involving a private family foundation. A seemingly innocent call responding to a fake job offer posted online turns into a full blown criminal operation impacting job seekers and foundations alike. Things you'll learn in this episode: The importance of registering your foundation or company's domain name What steps to take in reporting website fraud How this type of scam can be harmful to both foundations and people applying for jobs online Website Domain Name Lookup https://www.whois.com/
Ever recieved some well intended advice that turned out to do more harm then good? In this episode Carrie talks about some things aren't always as they seem. She goes over how harmful remote access software can hide on your device, and explains how it got there in the first place. Things you'll learn in this episode: Why remote access software isn't detected as malware How you can find out if this software is on your device How to uninstall it Find out how bad guys are able to put it on your computer with your permission
Taking down an international criminal ring isn't easy. They often rely on sophisticated technology to thwart investigators. That same technology was used to take down hundreds of thousands of criminals. In this episode I speak with Tom Whalen, a former Special Agent with the FBI. For the first time, he is discussing Operation Trojan Shield and how the FBI, and other international agencies, used the criminal's technology against them. It should be noted that Tom received permission to discuss this case. In this episode you'll discover: Who and what are transnational criminal organizations (TCOs) What technology were the criminals using How the FBI ended up in possession of the technology How it was used against the criminals Why it's important to question the technology we use – who has access to what information Additional information on this episode is on our website kerskie.com
In this episode Carrie and Kyle go over the true value of your location tracking data. Carrie talks about the high price it's worth and why it's in such a high demand. They also go over the importance of choosing the correct settings and only allowing certain apps to have access to this information. Things you'll learn in this episode: How much our location data is being sold for What apps should have access Why is this information so valuable?
In this episode Carrie and Kyle go over the top worst passwords of 2021. They talk about the general rules to follow when creating a password, and what mistakes to avoid. Carrie also mentions how often you need to change your password, and what do to if your password was involved in a data breach. They also bring up a previous podcast episode where Carrie and Kyle went over the worst and best locations to store passwords. Things you'll learn from this episode Examples of the worst and most common passwords How long should a password be? How often do you need to change a password? Tips for creating new passwords Link to a previous episode discussing the best and worst places to store your passwords https://carriekerskie.libsyn.com/three-places-to-never-store-your-passwords Link to NordPass's list of top 200 Worst Passwords https://nordpass.com/most-common-passwords-list/
In this episode, Carrie shares a story about a woman who found out just how much the smart devices in her house were listening to. Carrie cautions the idea of using these devices for privacy reasons and explains why she doesn't own one herself. She also goes over why some smart devices are becoming more common and less expensive than normal products, then tells the listener how they can request their own Amazon data. Things you'll learn in this episode: What information is being saved by smart devices How to request your own smart device data Is your privacy worth the convenience these devices provide? To request your Amazon Smart Device data visit: https://www.amazon.com/gp/help/customer/display.html?nodeId=GHXNJNLTRWCTBBGW Alexa Privacy Settings > Manage Your Alexa Data > Under Smart Home Device History > Email Complete History To request your Amazon Personal Info Data visit https://www.amazon.com/gp/help/customer/display.html?nodeId=GXPU3YPMBZQRWZK2 Go to Request my Data
In this episode Carrie warns about receiving letters for bank accounts that you didn't open. She emphasizes the importance of not ignoring these letters and talks about the repercussions of what could happen if you do. Carrie also explains what to do if you realize that your identity is being used to launder money within a fraudulent bank account and list some helpful websites that will make monitoring for these accounts more accessible. In this episode you will learn: What to do if you receive a welcome letter for a bank account you didn't open What money laundering fraud is Steps to take if you have a fraudulent account Why credit monitoring alone won't detect this type of identity theft How to get your report that will show your banking history Resources: EWS (Early Warning Systems) https://www.earlywarning.com/consumer-information Chex Systems (Click Request Your Report) https://www.chexsystems.com
In this episode Carrie and Kyle talk about the different types of security methods on your Apple device. Carrie answers Kyle's question about which methods are “safer” to use, as well as explaining their potential weaknesses. She also shares stories of why the biometrical side of security isn't always the most reliable. In this episode you will learn: Is Face ID more secure than your Passcode? What about using your fingerprint? The importance of privacy over convenience
In this episode Carrie answers some of Kyle's question about what exactly an anti-virus- what it can and cannot do. Carrie also mentions how an office's systems were compromised due to the installation of a fake anti-virus and provides the name of a website to help you select the best anti-virus program for your devices. In this episode you will learn: An understanding of how anti-viruses work Do anti-viruses protect against all viruses? Do I need an anti-virus on my iPhone? How to find a trustworthy anti-virus Link to AV-Test's website https://www.av-test.org/de/
In this episode Carrie and Kyle bring up scam text messages that they've being seeing recently. They discuss the different types they've received as well as the reasoning behind why they are being sent out. Carrie also shares tips to protect yourself from these messages and mentions ways to report these scam numbers. In this episode you will learn: A few examples of different text message scams Why these scams are being sent out Simple tricks to determine which messages are real or fake How to report these fraudulent/scam numbers
In this episode Carrie and Kyle discuss password saftey. They go over the three places to never save your password and provide you with better alternatives that will help you protect your online accounts.
In this episode of privacy mentor, Carrie talks about a couple that fell for an elaborate pop-up scam that resulted in them losing nearly half a million dollars. She goes in depth about how convincing these criminals can be, by telling the story from the victim's perspective, then explaining what they could have done to protect themselves. Things you will learn in this episode: Not all scams have obvious warning signs How to validate or eliminate potential threats Is money sent via wire-transfer recoverable/reportable? What steps to take if you find yourself a victim How criminals take advantage of commonly accepted software Why you should never save your login information in your web browser The risk of remote access software
Phone carriers are working to minimize scam and robocalls from reaching you. But, what about the calls that make it through? If only there was a tool that would tell you if a call is a scam. There is - Elefend.com. In this episode I speak with Omri Gattegno, CEO/Co-Founder, of Elefend.com. Resources mentioned: Elefend.com/offer join for only $2.99 per month. Limited time offer.
Your SSN is no longer your most value identifying information. So what is? Listen to find out. Resources: Episode 20 Why I changed my mind about password managers
Phone scams are becoming more sophisticated resulting in more people losing hundreds or thousands of dollars. How can you protect yourself from being manipulated by a scammer? Listen to this episode to find out. Things you will learn in this episode: Why phone scams? Why are they so successful How do they work? How to protect yourself What to do if you were tricked by a phone scam Resources: Join my Protect Your Identity in 14-days online program
Scammers, hackers, and other types of bad guys often demand their victims pay with a gift card, but why? In this episode take a deep dive into gift cards and what makes them so attractive to scammers. Things you will learn in this episode: Why gift cards over other forms of payment The benefits of using gift cards How bad guys use them after the scam Red flags of a gift card scam How to protect yourself
Does receiving a notice your information was exposed in a breach cause panic? Should it? Maybe not. Find out in this episode. Plus, learn steps to take after your information was exposed in a breach. Resources: Episode 30 Public Records https://carriekerskie.libsyn.com/how-public-records-put-you-at-risk Episode 33 Facebook Contest and Polls http://traffic.libsyn.com/forcedn/carriekerskie/EP_33_Contest_Podcast_mixdown.mp3 Video How To Freeze Your Credit https://youtu.be/zFesak63N8g Episode 14 The RIGHT Way to Create Security Questions Answers https://carriekerskie.libsyn.com/do-this-to-create-strong-security-question-answers
In this episode, Carrie interviews TK Kitts, President and Chief Investigator of private intelligence firm Redbeard Intelligence & Investigations. TK is involved in undercover investigations and needs to protect his identity. He'll share how he uses AI technology to alter his true identity. Watch it live as it happens. Will he impersonate Carrie during this episode? To watch the video, visit https://youtu.be/ZXdiMOoYZ-Q Things you will learn in this episode: What is a deepfake Where and how deepfakes started Who has access to the technology Why it's needed The risks associated with deepfakes Resources mentioned in this episode: Redbeard Intelligence & Investigations - https://redbeardpi.com/tips
Don't get tricked into becoming a money mule. Learn what a money mule is, how bad guys can trick you into becoming one, and steps to take if you think you or someone you know might be a money mule. Interview with TK Kitts, Redbeard Intelligence & Investigations Where to report money mules/suspicious activity: Publicly: FBI’s Internet Crime Complaint Center (IC3) at https://ic3.gov , and directly contact your local FBI field office https://www.fbi.gov/contact-us/field-offices . Federal Trade Commission – Report Fraud: https://reportfraud.ftc.gov/ U.S. Postal Inspection Service www.uspis.gov/money-mule ,or call 1-877-876-2455. Privately: Redbeard Intelligence & Investigations - https://redbeardpi.com/tips or email tips@redbeardpi.com - Reports are shared with their law enforcement partners.
Think you know identity theft? In this episode you'll learn about the top 10 identity theft myths. These are based on the 10 most common questions I am asked.
Signing-on to other apps using Google or Facebook is convenient. But, that convenience could greatly increase your risk of exposure. Resources: Protect Your Identity in 14-Days by joining my online program.
Going to Experian.com to activate your credit freeze could result in paying unnecessary fees or getting you something other than a credit freeze. In this episode you'll find out the RIGHT way to activate a credit freeze. Resources: https://www.experian.com/freeze/center.html How to Freeze Your Credit video Protect Your Identity in 14-days online program
In this episode you'll learn about the 4th credit bureau and the new feature to help you protect yourself from new account fraud. Resources mentioned in this episode: Innovis.com How to dispute a credit inquiry video
In this episode we explore an money making phone scam voicemail message that I received. While some might say it’s not a true scam, it definitely is in the gray area. The call was regarding an opportunity to make “$10,000 per month.” The scam is that some people hear these and pay the fee to attend the webinar or training only to discover they wasted their money. Similar scams convince you to give your information so the organizer can set up the business for you – all you have to do is sit back and watch the money roll in. HINT: it doesn’t work. Take a minute and listen to the voicemail message. I’ll breakdown simple steps you can use to help you determine if the call is legitimate or a scam. Things you will learn in this episode: How to break down these types of calls to determine legitimacy. One free tool you can use to determine when a website launched. What not to do if you get this type of call. One red flag to watch out for on any “business opportunity” or “money making opportunity” websites.
When it comes to protecting your credit from identity theft you have three options available from the credit bureaus: Fraud alert Credit freeze Credit lock Do you know the difference between them? If not, this episode is for you. One provides the strongest protection and one could reduce your rights. Topics covered: What is a fraud alert What is a credit freeze What is a credit lock How to set each one up Which is the best to use and why Now you know which is the best - it is time to set it up. I'll show you how and more in my Protect Your Identity in 14 Days program. In as little as ten minutes a day for 14 days, you too can protect your identity. Identity theft protection services alone will not protect you. But, my proven protection process will. Jump start protecting your identity today - click here to learn more.
People complain how Facebook is an invasion of privacy. Then why are they the same ones participating in the polls, contests, and such? In this episode you’ll learn about the clever tools used to harvest details about your personality and how that information is used. Topics covered: The risk of participating in polls, contests, surveys, liking and more. How your information is harvested How it is used One trick to protect your privacy Like what you hear? Leave me a review on Apple podcast, I would be most grateful.
Do you shop on Facebook? I’m not talking about Marketplace. I’m talking about the ads in your feed. Do you click on something you see and buy it? If so, this episode is for you.
A big change is coming to this podcast? What is it? Tune in to find out. Plus, there is a new vaccine phone scam making the rounds. Learn more about it so you are prepared when you get this scam call. I have a favor to ask, if you listen using Apple Podcast, please take a moment and leave me a review. I would be most grateful.
Googling yourself is a great way to find out what information about you is available online. But, did you know there are other sources of information that often do not show up in an internet search? What are they? Public records, records posted to the public online by your local state and county. Join me to find out where to find these public records and how they could be use against you. Topics: What are public records What information is contained in public records Where to find public records Tips to protect yourself Like what you hear? Leave me a review on Apple podcast, I would be most grateful.
Let’s face it, spam sucks. No one likes it, but everyone has it. I found a few tricks to minimize email spam and I’m sharing them with you in this episode. Topics: What is spam How do you get spam Three tricks to minimize spam Read the full blog post https://carriekerskie.com/free-your-inbox-from-spam-by-doing-this/ Like what you hear? Leave me a review on Apple podcast, I would be most grateful.
The pandemic brought about many changes in 2020. One change was the increase in identity theft. Yet, reported data breaches declined. Why? Find out the answer to this question and more in this episode. Special guest: Eva Velasquez, CEO of the Identity Theft Resource Center. Topics: Who is the Identity Theft Resource Center and what do they do The 2020 Data breach report results – why the decline in data breaches What led to the increase in fraudulent unemployment claims using the ID of another What to do if someone used your identity to file a PPP or EIDL disaster loan 2020 Aftermath Study – why the increase in suicidal thoughts by ID theft victims Concern for cutbacks in government funding for victim assistance programs Two important tips to protect yourself The most important thing to do if you are tricked by a scam If you are a victim and need help, Kerskie Group’s ID Rescue is here to help. https://kerskie.com Resources: https://www.idtheftcenter.org/