Episodes
-
You may be shocked to know that master manipulators utilize special tactics to impact human behavior and emotions by more than just instilling a sense of urgency. The art of persuasion can be used for both good and evil. Todayâs guest is Chris Hadnagy. Chris is the author of five books on the topic of social engineering. He is a professor of social engineering at the University of Arizona as well as the CEO of Social Engineer LLC, the Innocent Lives Foundation, and the Institute for Social Engineering.
Show Notes:[0:57] - Chris shares his background and how he found himself in the field of social engineering and understanding human decision making.
[2:38] - It is not the case that only stupid people fall for scams and phishing emails.
[4:04] - There is good social engineering and Chris gives some examples.
[5:47] - The release of oxytocin is researched to show that it is linked to trust.
[7:58] - You can have oxytocin and dopamine separately but together they build a bond.
[9:17] - Marketing and advertising land in the gray middle area of social engineering. Is it being used for good or bad?
[11:14] - It is important to look at things through the lens of purpose. What is the intent behind it?
[12:35] - All social engineering, good and bad, use the same principles. But malicious social engineering triggers different emotions, namely fear.
[14:37] - Preying on fear is one way people are socially engineered, but Chris gives an example of how a company as large as Toyota was impacted by the sense of urgency.
[17:12] - There are so many stories of social engineering that are extremely plausible and believable.
[21:04] - The trend now is to use social media data and information to target people for spear phishing.
[22:30] - If you feel any strong emotion after a request, it is a great time to pause and consider if you are being manipulated.
[24:21] - If you ever fall for something, donât let embarrassment make you sweep it under the rug.
[27:31] - The idea of an authority figure is a principle to remember, but it doesnât always work.
[30:10] - In some countries, fear of authority isnât present. But social engineers will look for the weaknesses to exploit in different environments.
[31:16] - Voice phishing is currently on the rise.
[33:21] - Chris shares about the uptick on LinkedIn requests that even targeted the US military.
[35:28] - Although we will see some good from AI, Chris has many concerns.
[37:33] - Chris describes some of the classes he teaches at the University of Arizona specifically about Social Engineering.
[39:17] - You can take classes online from Chris on Social-Engineer.com.
[40:21] - We need to understand social engineering to keep our children safe. Start having conversations early.
Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources:Podcast Web Page
Facebook Page
whatismyipaddress.com
Easy Prey on Instagram
Easy Prey on Twitter
Easy Prey on LinkedIn
Easy Prey on YouTube
Easy Prey on Pinterest
Chris Hadnagy on LinkedIn
Social-Engineer LLC
Innocent Lives Foundation
-
Phishing emails are constantly evolving to take advantage of current trends, news, and holidays. Typically poor grammar or the time an email was sent could help you identify if it is authentic. But with AI, these obvious signs may soon disappear.
Todayâs guest is Kiri Addison. Kiri is the Detection and Efficacy Product Manager at Mimecast, working on security products to defend against new and evolving threats. Previously she was head of data science for threat intelligence and has worked in the public sector creating systems to detect and prevent cyber attacks and fraud.
Show Notes:[0:59] - Kiri shares her background and what her role is at Mimecast.
[3:03] - Email scams are still the number one attack method and they tend to follow trends, news, and holidays.
[5:17] - Technology is improving and there is better protection of basic attacks, but with how fast threats evolve, there are still areas of improvement.
[7:34] - Kiri shares some statistics on the improvement made after implementing phishing email training.
[8:26] - With the use of ChatGPT, our usual red flags to look for will change.
[10:12] - In the advice and training by Mimecast, they explain the impact on the end user.
[12:08] - Kiri explains some of the different types of security measures available.
[13:47] - A lot of companies only implement the training with their employees to check off the compliance.
[16:50] - Be suspicious and take some time. Donât feel pressured.
[20:05] - Look for anything abnormal, even if it is something unusual from a sender you know.
[21:44] - If you receive word from someone you know but it seems odd, contact the person directly to find out whatâs going on.
[23:10] - Mimecast works primarily with corporations and businesses, but there are some personal phishing email attempts.
[24:44] - Some attacks combine safe sights with malicious links.
[26:00] - Kiri describes some of the recent trends they are seeing.
[28:58] - As AI evolves, it is going to become harder to protect. However, it all comes down to end user awareness.
Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources:Podcast Web Page
Facebook Page
whatismyipaddress.com
Easy Prey on Instagram
Easy Prey on Twitter
Easy Prey on LinkedIn
Easy Prey on YouTube
Easy Prey on Pinterest
Dr. Kiri Addison on LinkedIn
Mimecast Website
-
Episodes manquant?
-
Age appropriate conversations need to be taking place with children on how technology is being used to groom them. Unfortunately, many are already addicted to the dopamine fix and their relationships with a device can numb them to being preyed upon. Todayâs guest is John Pizzuro. John serves as CEO of Raven, a lobbying and advocacy group that focuses on protecting children from exploitation. John was a former commander of the New Jersey Internet Crimes Against Children task force and has created a framework for other countries to use to investigate child exploitation.
Show Notes:[0:57] - John shares his background in ICAC and current role as CEO of Raven.
[3:08] - With the changes of technology and the availability of it in every household, behavior has changed along with it.
[5:01] - Using the internet at home makes the internet feel like a safe place.
[6:16] - People manipulate others through language.
[7:21] - It is simple to get hooked because of the dopamine fix met with social media.
[8:49] - Do social media companies do enough? John says they donât do anything and they donât have the ability to moderate.
[11:01] - AI is not yet fully understood. How can it be used for good or bad?
[13:13] - There has to be a balance between privacy and protection. This is true for everything.
[14:15] - Today, we are so polarized and the result is that a solution will not be found.
[15:45] - Parents need to have real conversations with their children and the earlier the better. Open communication is important.
[17:54] - Itâs not talked about openly enough because it is scary to talk about child exploitation.
[21:30] - Device addiction is a real problem and generally speaking, thereâs a need for instant gratification that distracts us from real relationships.
[23:10] - There are communities where people share techniques for grooming and they are extremely popular on the dark web.
[24:53] - John shares some terrifying statistics.
[26:25] - There are task forces working together to protect children from child exploitation.
[28:30] - The task to go through digital evidence is time and resource consuming.
[29:28] - What is needed in the US is age appropriate child protection legislation.
[31:03] - John explains some of the challenges in current legislation.
[32:17] - Do we hold all these tech companies liable?
[33:40] - The larger the bill, the more things that people will have a problem with.
[36:02] - If we can articulate things the right way, this legislation can make a huge difference.
[38:06] - Child advocacy centers are impactful but their funding gets cut.
[39:16] - The challenge with research is that researchers move from project to project. And action must be a result of theories.
[40:25] - John shares ways you can impact this cause and who to talk to.
Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources:Podcast Web Page
Facebook Page
whatismyipaddress.com
Easy Prey on Instagram
Easy Prey on Twitter
Easy Prey on LinkedIn
Easy Prey on YouTube
Easy Prey on Pinterest
John Pizzuro on LinkedIn
Raven Website
-
AI creates opportunities as well as challenges. We may need to become more skeptical about what we see and hear knowing that images and words can be generated without transparency of its creation. Todayâs guest is Paul Valente. Paul is the CEO and co-founder of VISO Trust, a former CISO of Restoration Hardware, Lending Club, and ASAPP with over 20 years of technology, financial services, ecommerce, and information security innovation. Paul holds several industry designations, including Certified Information Systems Security Professional (CISSP), Certified Information Systems Manager (CISM) and ISO 27001 Lead Implementer.
Show Notes:[1:02] - Paul shares his background and what he does now in his career.
[3:23] - One of the key learning opportunities for Paul was being a victim and being involved in scams and cyberattacks.
[5:28] - Itâs getting harder and harder now to tell somethingâs legitimacy with the ability to use AI to generate content for scamming.
[7:54] - As a consumer, when you work with a company and share your data, you are sharing it with the whole ecosystem.
[10:16] - It is very hard for security to be managed when there is so much data.
[11:58] - Surveys sometimes give a false sense of security.
[14:21] - At VISO, they remove the friction in order to make the process scale. There are so many third parties and vendors. Focus on real information.
[17:02] - Security is not a solved problem. There are always imperfections.
[19:07] - Thereâs a variety of different responses to cybersecurity breaches.
[20:46] - Companies who are transparent about breaches tend to be seen as good companies. Itâs how you handle it and take steps to communicate.
[23:27] - Weâve been trained to look for errors but today, with the use of generative AI, it is easier for scammers to create perfect messages.
[25:30] - We need to learn ways to improve our ability to discern real content from fake content.
[26:46] - AI also creates unique opportunities.
[29:47] - We still tend to have the idea of AI being a sentient being based on science fiction. So what is AI?
[31:12] - Itâs all about shrinking the problem space.
[33:17] - AI growth and what is called the Cyber Kill Chain will happen incrementally.
[34:55] - Be aware of where you are communicating. You will need to look hard when it comes to social engineering.
Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources:Podcast Web Page
Facebook Page
whatismyipaddress.com
Easy Prey on Instagram
Easy Prey on Twitter
Easy Prey on LinkedIn
Easy Prey on YouTube
Easy Prey on Pinterest
VISO Trust Website
Paul Valente on LinkedIn
-
If you experience any high pressure tactics or urgency that someone needs you to make a financial decision fast, take a pause and realize that you might be talking to a scammer. Todayâs guest is Professor Marti DeLiema. Marti is an Assistant Professor and Gerontologist at the University of Minnesota. Her work focuses on identifying the extent and cost of financial fraud in the US as well as factors related to financial victimization of the aging.
Show Notes:[0:48] - Marti shares her background and as a gerontologist, her focus on the aging.
[3:02] - When doing her research, Marti discovered that fraud is not limited to the elderly.
[4:16] - Why are older adults more likely to be targeted?
[5:50] - Executive functioning skills decline earlier than other abilities.
[7:30] - Social isolation can take form in a few different ways.
[9:47] - People who are grieving a loss are even more susceptible to scams.
[11:38] - Underreporting is a really big problem in the research and it is common among older adults and older victims.
[14:26] - Marti recommends reporting scams to the Federal Trade Commission.
[15:38] - To help prevent potential issues, start to think about who in your family or close circle can help make financial decisions.
[17:08] - Bringing people in actually makes you more in control.
[19:02] - There is a societal stigma about being a victim of a scam and it prevents older adults from sharing the situation for help.
[20:20] - There is a huge shift in our population in our demographics and the largest wealth transfer coming.
[22:09] - The world is very complex right now, especially when it comes to communication, technology, and finances.
[24:10] - Financial institutions can help prevent scams through strong customer service and education.
[26:36] - Marti shares an experience overhearing a retail manager explaining why he wouldnât let an elderly customer purchase any more gift cards.
[28:50] - Scammers will warn victims that they will be asked specific questions about their gift card purchase.
Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources: Podcast Web PageFacebook Page
whatismyipaddress.com
Easy Prey on Instagram
Easy Prey on Twitter
Easy Prey on LinkedIn
Easy Prey on YouTube
Easy Prey on Pinterest
Marti DeLiema on LinkedIn
-
Identities are under attack and with few ways to either validate or authenticate, itâs difficult to know whether a company or person you are communicating with is fake or not. Todayâs guest is Mike Kiser. Mike Kiser is currently the Director of Strategy and Standards at SailPoint. He speaks regularly at events such as The European Identity Conference and The RSA Conference. He is a member of several standards groups and has presented identity related research at Black Hat and DevCon.
Show Notes:[0:46] - Mike shares his current role at SailPoint and what he does to help people protect themselves online.
[1:48] - As identity has risen in importance, so have job scams.
[2:44] - The rise is not surprising, as more people look for remote work.
[3:50] - Generally, employment scams are targeting remote and online applicants.
[6:10] - Mike describes some of the ways these scams work including receiving fake checks and wording to target those who are looking for side work.
[8:04] - Fake LinkedIn accounts are on the rise and it is very easy to target specific types of people and build off of common connections.
[10:01] - In 2019, Mike created a fake profile and he describes the easy infiltration to any organizationâs LinkedIn connection.
[11:47] - There has been an obvious uptick in generic LinkedIn contact in the last few months.
[15:13] - Business people need to connect, so it can be tricky. Mike explains how to take a close look at new connections.
[17:13] - With generative AI, communications are even more convincing.
[18:41] - Falsified job applications are also on the rise.
[20:33] - Fake identities are more and more in play for different malicious use cases, not just for jobs.
[22:58] - Mike shares the experience of a family member realizing that they were talking to a scammer.
[25:08] - We all customize a resume to match a job, but AI is making things much more challenging.
[27:05] - Applicants and potential new hires will be able to easily outsource and it will become more common.
[31:22] - The pandemic accelerated the importance of validating identity.
[33:31] - There is also a unique opportunity for privacy to be changed right now and there is some good potential.
[36:40] - Multi-factor authentication fatigue is a real problem.
[39:27] - Eventually, Mike believes all things will shift to QR codes.
[41:17] - What are the pros and cons of QR codes and how can they change the user experience?
[42:24] - The job market is going to continually change and we have to learn how to interact with people differently.
Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources:Podcast Web Page
Facebook Page
whatismyipaddress.com
Easy Prey on Instagram
Easy Prey on Twitter
Easy Prey on LinkedIn
Easy Prey on YouTube
Easy Prey on Pinterest
SailPoint Website
Mike Kiser on LinkedIn
MikeKiser.org
-
With all of the AI advances and the metaverse, people will face the decision on how to embrace the technology because it will become unavoidable. Todayâs guest is Dr. Mark van Rijmenam. Mark is The Digital Speaker. He is a leading strategic futurist who thinks about how technology changes organizations, society, and the metaverse. Mark is an international keynote speaker, five time author, and entrepreneur. He is the founder of Datafloq and the author of the book Step Into the Metaverse. His mission is to help organizations and governments benefit from the innovative emerging technology while ensuring that it is done ethically and responsibly. Recently he founded the Digital Futures Institute which focuses on ensuring a fair digital future for everyone.
Show Notes:[1:03] - Mark shares his background and current endeavors in the field.
[2:40] - Using ChatGPT, Mark wrote a book and you canât really tell until the end.
[5:02] - After a while, the patterns are noticeable.
[6:49] - Start understanding the metaverse but understanding what it is not.
[7:40] - âWhat the metaverse is is when the physical and the digital world converge. Itâs nothing more than the next iteration of the internet. We move from a 2D internet to a 3D internet.â
[8:49] - When the digital comes into the physical, we get augmented reality and it has very interesting uses.
[10:37] - The problem with the next iteration of the internet is how to behave in this new world.
[12:32] - Right now, the newer generation has less distinction between the digital and physical world.
[15:03] - Some peopleâs behavior is unacceptable online and some donât realize how public their actions are.
[16:14] - We already see a problem with people not recognizing the distinction between digital and physical. Some are already addicted to social media.
[19:11] - With the heavy use of digital content with children, it will become harder for the next generation to separate the two.
[21:33] - The transition is so fast that we donât know what the implications are.
[23:18] - Education is crucial but no one is teaching us how to use this emerging technology.
[25:18] - Children and adolescents are particularly impacted by this transition.
[27:23] - When earning his doctorate, Mark had to have permission to do his research for ethical reasons.
[28:57] - We donât have to use social media and emerging technology as it becomes available.
[31:20] - How can education keep up with the speed of change?
[32:30] - ChatGPT shouldnât be banned. You have to embrace and adopt new technology so we can teach students how to use it.
[34:48] - We are moving into a voice-world. What does that mean and how is it different from how we interact with the internet now?
[37:20] - Mark describes what is necessary for this to be successful. Itâs possible but it requires a lot of work. We should act now.
[38:49] - There are things that need to change, specifically in education, verification, and regulation.
Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources:Podcast Web Page
Facebook Page
whatismyipaddress.com
Easy Prey on Instagram
Easy Prey on Twitter
Easy Prey on LinkedIn
Easy Prey on YouTube
Easy Prey on Pinterest
Datafloq
Step Into the Metaverse by Mark van Rijmenam
-
Business opportunities can entice you to believe that you can make large amounts of money in a short period of time. Itâs important to verify proof of their claims before joining and knowing how to research this can save you time and money.
Todayâs guest is Jeff Lerner. Jeff is a five time Inc. 5000 CEO with over $100 million in sales. In 2019, he founded Entre Institute, the worldâs first institute of higher learning for entrepreneurs which is now one of the fastest growing education and technology companies in the world.
Show Notes:[1:12] - Jeff shares his background as an entrepreneur and the creation of Entre Institute.
[3:26] - When you do the entrepreneurship work legitimately, it can be very lucrative.
[6:18] - The way people work in their chosen industry works a lot differently in this generation than it did in the past, with people changing companies often.
[9:25] - There are four ways to earn money in the entrepreneurial industry.
[11:25] - Jeff thinks about the current economy as wilderness. The key is to have a guide and a map.
[12:57] - The number one thing when vetting opportunities is to verify social proof.
[15:10] - The responsibility is on the provider of the opportunity, but vetting them is on you.
[17:29] - If you understand the mechanics of business, you'll see through the smoke screen. If not, youâll be enticed by the smoke screen.
[21:49] - There are a lot of people who are coming from a place of desperation who will say whatever needs to be said to bring in an income.
[24:00] - How do you know the right questions to ask?
[26:44] - There are job scams and business opportunity scams.
[27:39] - If you are offered a commission but itâs not a sales job, question what you are being asked to do.
[29:12] - You should never have to spend money to make money in a legitimate business opportunity.
[31:42] - Itâs okay to have a level of attractive compensation as long as it is coupled with skills needed to realistically bring in that amount.
[35:10] - A lot of people feel very discouraged and frustrated with the management of the economy and entrepreneurship sounds appealing.
[38:20] - There are a lot of amazing stories of people making tons of money with few skills, but they are few and far between.
[41:14] - Nothing worthwhile is easy. If you embrace getting better rather than things being easier, you will be scam proof.
Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources:Podcast Web Page
Facebook Page
whatismyipaddress.com
Easy Prey on Instagram
Easy Prey on Twitter
Easy Prey on LinkedIn
Easy Prey on YouTube
Easy Prey on Pinterest
Jeff Lerner on YouTube
ENTRE Institute Website
-
If AI knows your data patterns, it can help keep families safe online by preventing cyber security incidents from happening rather than just reacting once they do. Todayâs guest is Hari Ravichandran. As an engineer by trade and entrepreneur by nature, Hari has a track record of founding successful businesses in technology and security. After a painful personal experience with identity theft, Hari founded Aura, a way to simplify digital security for consumers. He has since grown Aura into a business worth over 2.5 billions dollars dedicated to creating a safer internet for everyone through an intelligent, proactive platform.
Show Notes:[0:57] - Hari shares his role as founder and CEO of Aura as well as his experiences that created the drive to launch the organization.
[2:47] - Thereâs no real way for Hari to know how his identity was stolen, but he has a theory.
[4:08] - The ones responsible for this had several months of impacting Hariâs credit.
[6:09] - This situation was a lengthy ordeal.
[7:38] - Aura began as reactive as are many security programs. But now they have morphed into being proactive.
[10:48] - Based on patterns they see, Aura predicts what could happen to the consumer and gives a direction on where to focus protection.
[12:08] - AI can even determine the intent of a conversation as it's happening on the phone.
[13:40] - Chris shares an example of a time when a credit card of his was cloned and how it was used.
[16:08] - Alerts are really helpful but too many could become an annoyance and then ignored.
[18:09] - It is advised to contact your banks and credit card companies when you travel to notify them that the alerts wonât shut things off.
[20:50] - Hari continues to be amazed by how many scams there are and how ingenious and clever they are.
[22:32] - Without AI and learning systems, it would be impossible due to how many variants of scams there are.
[25:09] - Do not use the same password across devices and services.
[26:22] - When it comes to two-factor authorization, it has to be usable.
[28:31] - Some security is better than no security.
[30:17] - Hari describes the book he has available that acts as a guide for consumers.
[32:24] - Take a look at things that need firmware updates and how long they have gone without one.
[34:03] - Do you have enough sentries in place that can help protect?
[35:39] - Aura takes into consideration everyoneâs unique needs based on how they use the internet.
[37:18] - Ease of use is a compromise to security.
Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources:Podcast Web Page
Facebook Page
whatismyipaddress.com
Easy Prey on Instagram
Easy Prey on Twitter
Easy Prey on LinkedIn
Easy Prey on YouTube
Easy Prey on Pinterest
Hari Ravichandran on LinkedIn
Aura Website
Intelligent Safety: How to Protect Your Connected Family from Big Cybercrime
-
Cyberattacks can happen to an individual computer or an entire network. Itâs vital to have well-tested plans in place before ransomware rears its ugly head. Todayâs guest is Steve Orrin. Steve is Intelâs Federal CTO and Senior Principal Engineer. He leads public sector solutions architecture, strategy, and engagement and has held technology leadership positions at Intel. Steve was previously CTO, CSO, and co-founder of several successful security startups and is a recognized expert and frequent lecturer on enterprise security.
Show Notes:[1:01] - Steve shares what his current role is at Intel Corporation and how he became drawn to the field.
[2:52] - There are risks everywhere. Where do we start when it comes to cybersecurity for a business?
[3:54] - Steve describes risk profiles and what you need to understand what youâre trying to protect.
[5:21] - Once you know your environment and risk profile, itâs time to look at the key things above security âhygieneâ and the processes to raise the bar.
[7:48] - There are benefits to microsegmentation, including smaller network enclaves.
[9:44] - Steve makes a suggestion for network segmentation when it comes to state of the art equipment.
[12:07] - Ideally, you want sensors in every network enclave but that isnât always realistic.
[13:57] - Having network segmentation will also give you the information needed to find which part of your business receives an attack.
[15:39] - How do we protect data in the cloud?
[17:04] - It all goes back to understanding the data you need to protect.
[21:01] - Just like in your business, you need to know how your IT resources are being used and which ones are not right.
[23:20] - These building blocks help you see how you are utilizing security and it needs to be built in from the beginning.
[24:55] - Changing approaches in large organizations can seem challenging, but Steve says they are constantly modernizing and itâs all about perception.
[26:24] - Literally any type of company can be attacked because of every industryâs reliance on digital tools and infrastructure.
[28:16] - There are different types of attackers - those who target someone specific, those who are opportunistic, and those who are purely automated.
[29:44] - Everyone is a potential target even if you arenât being targeted.
[31:33] - Planning will also help answer the question of how to continue running the business while ransomware is active.
[33:21] - Companies need to adopt a gamified system to train everyone in the organization on how to respond to an attack.
[35:13] - Supply chain issues exist in cybersecurity, but itâs not the same as other industries. They are problems that they are actively searching for a solution for.
[38:26] - When it becomes a requirement and in a contract, it will be adhered to.
[40:26] - There are a lot of programs out there looking for the anomaly, but Steve says we arenât looking in the right place.
[42:33] - Take all reports of suspicious activity seriously.
Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources:Podcast Web Page
Facebook Page
whatismyipaddress.com
Easy Prey on Instagram
Easy Prey on Twitter
Easy Prey on LinkedIn
Easy Prey on YouTube
Easy Prey on Pinterest
Steve Orrin on LinkedIn
Public Sector on Intelâs Website
-
We are all being targeted by imposters on social media, websites, and dating sites. Once a person has been scammed, your information can be added to a database where criminals can purchase your data and then offer you ârecovery assistanceâ from that scam. Todayâs guest is Nick Smart. Nick has 18 years experience as a professional Intelligence and Security Analyst working for government agencies and private companies as well as experience as a compliance officer.
Show Notes:[0:57] - Nick describes his current role and his background in security.
[1:41] - Nick admits that he is generally very pessimistic and initially wasnât drawn to the crypto industry.
[2:55] - Why does crypto have a high reputation for fraud?
[4:15] - Once you are scammed, your information can be sold to more criminals and then you will be targeted again.
[6:52] - It is very easy to believe that you would get the money back if you act fast which is falling victim to a sense of urgency.
[8:01] - For some people, losing out on a few hundred dollars doesnât impact them much, but for others it could be the money they need to feed their family.
[10:18] - When something goes wrong, people look to those in authority for help, but law enforcement is catching up to how they can deal with the problem.
[12:29] - The laws surrounding crypto currency are very new and we donât know the future of recovery scams.
[13:43] - Nick explains âhackers for hireâ.
[15:13] - These scams arenât much different than others, but the way they find targets is unique.
[18:23] - Some people think crypto currency is completely anonymous. But thatâs not entirely correct.
[21:05] - The area of conversion is where we can try to find someone responsible for money laundering.
[22:29] - The block chains are useful in following and piecing together to find someone.
[24:35] - Crypto currency is hyper transparent which is not necessarily a bad thing.
[26:30] - KYC stands for Know Your Customer and Nick explains what that means to a financial institution.
[28:37] - If youâve lost money through a crash or a scam and someone approaches you claiming they can help you get your money back, be skeptical.
[31:39] - Real asset recovery is not a fast process.
[35:13] - Individual cases and the experiences vary, but for the most part, block chains want to help.
[37:42] - It happens to the best of us. No one is immune.
[39:22] - There are more costs than just monetary.
[42:24] - It doesnât help the victim to stigmatize being scammed.
[44:01] - Nick shares ways to report crypto fraud.
Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources:Podcast Web Page
Facebook Page
whatismyipaddress.com
Easy Prey on Instagram
Easy Prey on Twitter
Easy Prey on LinkedIn
Easy Prey on YouTube
Easy Prey on Pinterest
Crystal Blockchain Website
-
Thereâs one common desire that allows you to be taken advantage of or to be manipulated that leaves you wanting to kick yourself for not doing one simple thing to prevent it. Todayâs guest is Mark Edward. Mark is a professional mentalist who has specialized in magic of the mind for over 35 years. He travels internationally as a skeptical activist using his skills as a mentalist to teach and promote critical thinking.
Show Notes:[1:01] - Mark shares his interesting background in magic and as a mentalist.
[4:03] - As a starving artist, Mark formed a group with other magicians and began street performing.
[6:33] - If people want to believe in it, itâs mentalism.
[8:09] - When working as a medium, Mark learned about peopleâs desire for things to be true.
[11:41] - Mark describes the 900 years where people could call psychics on the phone.
[15:27] - After his years in the field, Mark wrote a book.
[17:42] - Mark shares his experience moving over into the skeptic community.
[20:20] - Scams are like magicians because itâs all manipulation and performance.
[24:35] - In some cases, Mark investigated people who claimed to be able to do something that genuinely believed they could.
[28:14] - Donât be fooled by those who know things about you. A lot of things can be determined through observation.
[29:13] - These days there are Zoom calls for sessions with psychics and they have the internet at their fingertips to search for information.
[31:08] - Mark explains what a pre-show is and some of the ways to manipulate getting information ahead of time.
[33:19] - What is the difference between a mentalist and a psychic?
[37:28] - No matter what you know, you can still fall for things if you really want to believe them.
[40:40] - Generally speaking, most Americans donât want to be told the truth, but rather be told what they want to hear.
[42:44] - Manipulation is the lowest form of humanity.
Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources:Podcast Web Page
Facebook Page
whatismyipaddress.com
Easy Prey on Instagram
Easy Prey on Twitter
Easy Prey on LinkedIn
Easy Prey on YouTube
Easy Prey on Pinterest
Mark Edwardâs Website
Psychic Blues by Mark Edward
-
After being scammed, embarrassment can prevent people from getting the help they need, but in order to destigmatize the painful mistake, more people need to report incidents and understand that it happens to even the most technically savvy.
Todayâs guest is Rory Innes. Rory has spent his entire career in cybersecurity and has worked for leading global cybersecurity companies in a range of senior management positions. Rory spotted the huge gap in support for victims of cybercrime and online harm and created the Cyber Helpline to mobilize the cybersecurity community to step in and fill the gap. As CEO, Rory is responsible for the strategic, direction, performance, and operational effectiveness of the Cyber Helpline. Rory often provides comment and opinion for the press and has appeared on live TV and documentaries providing his expert opinion on cybercrime.
Show Notes:[1:10] - Rory shares what Cyber Helpline is and his motivation to start it up.
[3:26] - There are different types of cybersecurity such as commercial issues and personal concerns.
[4:31] - Now, Cyber Helpline sees an average of 2,000 reports a month.
[5:53] - Cyber Helpline began as a UK only organization, but they are now looking to help globally.
[7:11] - Rory shares the types of things reported and the things that have been surprising over the last five years.
[8:35] - In many places across the world, Covid-19 had a huge impact on the economy and the rise of scams.
[10:46] - Hacked social media accounts are really common and can be really detrimental to the people in your network.
[12:00] - Investment scams are also very commonly seen and you may not see the problem for a while.
[14:43] - Hypervigilance from the threat of cyberstalking makes things mentally draining, scary, and creates difficulty for them to be believed.
[16:36] - Rory describes the process of investigating and helping a victim through a cyberstalking case.
[19:50] - Misconceptions are created and then spread wide through crime stories, social media, and crime shows or movies.
[22:46] - Does changing your password and wiping your devices really help?
[24:24] - When it comes to cyberstalking, it is important to remember that stalkers are obsessed. If you remove the access, you donât remove the obsession.
[26:51] - The Cyber Helpline also helps educate the victim in how to spot signs of scams.
[28:00] - The Cyber Helpline uses the Assistance Self-Help model.
[31:30] - Service users are asked how this experience is impacting them.
[32:59] - Mental health is the highest reported impact on victims, even more so than money.
[35:31] - Mental health support is getting better, but is still not effective for many people who experience this.
[37:32] - The demographics of the victims can tell a lot about the likelihood of them reporting something.
[40:27] - Rory himself has been a victim of cybercrime and admits that he was very embarrassed by it at the time it happened.
[43:41] - The hardest thing is when targeted children and teens donât feel comfortable talking about it with their parents.
Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources:Podcast Web Page
Facebook Page
whatismyipaddress.com
Easy Prey on Instagram
Easy Prey on Twitter
Easy Prey on LinkedIn
Easy Prey on YouTube
Easy Prey on Pinterest
The Cyber Helpline
-
Scamming is a multi-billion dollar industry that is creative and evolving. The National Consumer Protection Week is geared toward education and the National Slam the Scam Day focuses specifically on government imposter scams. Todayâs guest is Anthony âAJâ Monaco. AJ currently serves as a special agent in charge of the major case unit at the Social Security Administration Office of Inspector General. His unit investigates complex fraud cases with a particular emphasis on Social Security Administration imposter scams and organized fraud rings. AJ has over 30 years of combined federal law enforcement, Marine officer, and legal experience.
Show Notes:[1:00] - AJ shares his current role and what he manages at the Social Security Administration.
[2:59] - The Secret Service is also a leader in financial fraud.
[4:01] - Government imposter fraud is when a scammer presents themselves as a government official, specifically from the Social Security Administration.
[6:04] - Scams evolve the way business evolves. Scammers take notice of human nature.
[7:56] - Scammers pay great attention to everything including social media and the news.
[9:09] - Sometimes these government imposter scammers will present fake credentials but real officials wonât send credentials through text or email.
[11:02] - Scammers have shifted back to physical mail because that is generally the way the government contacts you.
[13:21] - You can report calls from phone numbers that you suspect are fraudulent.
[14:26] - For any phone call or text you get, do a search online to see if thereâs anything that the phone number comes back as.
[16:50] - If you get physical mail, there will be some minor things that could stand out as suspicious.
[19:39] - Once scammers get past your initial barriers, they are easier to believe.
[20:40] - The 4 Pâs are the âPhony Phundamentalsâ and they are Pretend, Problem, Pressure, and Pay.
[22:01] - When it comes to the Pay step, scammers will ask for money in a way that is not standard for sending money to a real government official.
[25:37] - Gift card scams seem like they wouldnât be easy to fall for, but once a scammer gets past the barrier, it is easier to convince targets.
[28:01] - Purchasing and sending gift cards are almost impossible to trace.
[30:09] - AJ describes a recent organized crime ring that they were successful in shutting down.
[32:58] - How likely will a victim of fraud get their money back when investigated by the Social Security Administration?
[36:02] - Be suspicious if someone reaches out to tell you that they will be able to get your money back.
[39:40] - AJ explains what Slam the Scam Day is.
[41:09] - National Consumer Protection Week is this week and Slam the Scam Day is soon!
Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources:Podcast Web Page
Facebook Page
whatismyipaddress.com
Easy Prey on Instagram
Easy Prey on Twitter
Easy Prey on LinkedIn
Easy Prey on YouTube
Easy Prey on Pinterest
National Consumer Protection Week: Slam the Scam Day
-
Have you ever Googled yourself to see what information is available about you? Knowing how to remove some of your private information or negate the impact of a negative review can make a big difference to your personal or professional reputation.
Todayâs guest is Darren Dunner. Darren is a digital marketing and SEO guru with a track record of results-driven leadership. As Net Reputationâs VP of Reputation Management Operations, he provides expert insight and mentorship needed to consistently prove and optimize deliverables. He helps people and companies protect and correct their online reputation.
Show Notes:[1:04] - Darren shares his background and what his current role is in Reputation Management.
[3:44] - If you follow their guidelines, Google can follow and understand what you are trying to accomplish.
[4:53] - Online reputation for a company could be reviews, information in articles, blog posts, or videos.
[6:04] - Posts without consequences in mind can be detrimental.
[8:28] - Darren and Chris describe a scenario of someone needing to do damage control.
[10:19] - Negative sentiments are click bait and move through Google faster.
[12:09] - Thereâs a lot more impact for public figures due to notoriety.
[13:06] - Digital marketing and reputation management is surprisingly complicated.
[13:58] - Reputation management takes a long time, usually at least more than a year.
[15:52] - Darren lists some of the things he does to help manage reputation and how much work it really is.
[17:46] - Life online means that other people find out about what is going on in your life and that could have both good and bad consequences.
[19:07] - Darrenâs advice is to only focus on putting out positive things online.
[20:01] - Searches are geo targeted so your search results will be different than someone searching the same thing in a different location.
[21:44] - For a company, it is important to have enough things out there that are connected properly to Google so your page is top in searches.
[24:01] - Location is important to keep in mind for potential customers or clients to search.
[25:18] - Darren explains a situation with a negative piece used in email marketing that brought up a huge uproar.
[27:29] - You can catch things ahead of time as long as you prepare for it.
[29:14] - You canât always prepare for a bad review, but train employees and team members that things they do can be used against them and the company.
[32:44] - Two factor authorization is crucial to keep your assets protected.
[34:00] - No one you know will ever ask you for any authentication code.
[35:07] - If you have a social media account, use it. Donât let it sit unused.
Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources:Podcast Web Page
Facebook Page
whatismyipaddress.com
Easy Prey on Instagram
Easy Prey on Twitter
Easy Prey on LinkedIn
Easy Prey on YouTube
Easy Prey on Pinterest
NetReputation.com
-
Taking a proactive approach versus a reactive approach to cybersecurity makes a big difference for the stress levels of employees and customers. The daily conversations that take place with management can change the impact of a ransomware attack remarkably.
Todayâs guest is Robert Anderson Jr. Robert is a national security expert, author, and business leader dedicated to helping companies improve cybersecurity and reduce business risk. As Chairman and CEO of Cyber Defense Labs, he brings decades of executive leadership and operational experience in cybersecurity, counterintelligence, economy espionage, and critical incident response.
Show Notes: [0:57] - Robert describes his current role as CEO of Cyber Defense Labs and his background in the FBI. [2:14] - The plan for Robert going into cybersecurity evolved over the decades of his career as a direct result of the evolution of how crime is committed. [3:52] - Anything you can do before something bad happens is the best thing for your company. [4:42] - Once a breach happens, it goes beyond inconvenience and risk for clients. It could mean the end of a business. [7:01] - In Robertâs experience, most companies have a plan but the plan hasnât been tested and doesnât hold up to an actual data breach. [9:01] - Robert describes scenarios while working in the FBI in companies choosing to pay ransoms after being hit with ransomware. [11:10] - The larger the company, the more complicated this becomes. [12:50] - Breaches have changed in recent years and now ask for millions of dollars. [14:45] - Chris and Robert recommend approaching practicing for possible breaches like fire drills. [17:03] - Robert advocates for being informed and understanding all laws when getting involved with ransomware. [18:57] - The reason why ransomware is so prevalent is it's a trillion dollar industry. Bad guys are making a lot of money. [21:26] - Hacking ability or high level hacking is not necessary to perform a breach anymore. [23:10] - Skilled hackers make even more money because they are often contracted for jobs. [24:36] - Robert believes there should be a global set of norms similar to the UN when it comes to what the world will tolerate when it comes to cybersecurity. [27:30] - The first call a company makes is not for help. Itâs for mitigation. [29:18] - In Robertâs organization, cybersecurity is a daily conversation. [32:03] - Robert will not open a single email if he does not know who it is from. [34:10] - Logging onto public wifi can be dangerous. [35:55] - Your frontline of your company is made up of your employees. Educate them. [37:58] - You must have an internal and external communication plan. [39:31] - What are three things you can do after a breach? [42:31] - Chris gives an example of proper communication from a company that included their proactive approach and a timeline. [45:32] - Communicating with customers is important but it is equally as important to communicate with your team. [46:36] - When it comes to class action lawsuits, nowadays, even employees can sue the company.Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Cyber Defense Labs Website -
Scammers are creatively trying to deceive and manipulate Amazon customers by getting them to do activities outside the Amazon ecosystem through texts, emails, and phone calls. Hopefully by looking at how the top scams are implemented, we can create more awareness and prevent loss.
Today's guest is Abigail Bishop. Abigail is the Head of External Relations for Scam Prevention at Amazon, where she leads the organizationâs outreach work to protect customers from falling victim to scams globally.
Show Notes: [0:56] - Abigail shares her background and what she does at Amazon as the Head of External Relations for Scam Prevention. [2:46] - Her background was originally in Public Affairs so her path to her current role in scam prevention is non-traditional. [3:50] - There are over 12,000 employees behind the scenes at Amazon that work on scam prevention. [5:32] - Working across borders to find perpetrators is extremely difficult and sometimes impossible. [6:32] - Over 50% of the scams reported to Abigailâs team are order confirmation scams. [7:41] - Gift card scams continue to be common. Amazon will never ask you for payment in gift cards. [9:04] - Amazon will never ask you to install an app or allow them to access your computer. [10:30] - Verify any purchases on your Amazon account and report any malicious communication to Amazonâs message center. [12:46] - If you are ever contacted about Amazon for any reason, they will be able to verify all information and you can cross verify it on your account. [14:20] - You can always reach out to Amazonâs report a scam to verify any interaction youâve had. [15:45] - Amazon is driven to protecting all Amazon users. [16:48] - Amazon Scam Prevention also sends out emails and information to help educate consumers on best practices. [18:01] - Abigail describes some of the steps that they have taken at Amazon to offer customers validation that any contact from them is legitimate. [19:05] - In 2022, over 20,000 phishing sites were found and shut down as well as over 10,000 phishing phone numbers. [24:01] - Current events play a role in when and how scammers approach their attacks. [25:21] - Because of the size and popularity of Amazon, they have the opportunity to act swiftly and cooperatively with other entities. [28:13] - Abigail shares what Amazon has been able to develop in cooperation with BBB and other corporations publicly. [30:30] - Amazon does have processes in place to help mitigate damage or prevent entirely data breaches. [32:41] - The scam reporting feature on Amazon is new within the last year. They rely heavily on consumers reporting for them to be able to track scams. [35:10] - Because of the volume of scam attempts, especially through text and email, many consumers donât have time or desire to report every single one and would rather delete and ignore. [37:17] - What scams should be reported or prioritized to report? [39:14] - Always check your account directly on Amazon.Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Report a Scam to Amazon BBB Scam Tracker Help Identifying a Scam -
We like to think that weâre too smart to be taken advantage of by a scammer, but some are willing to invest a tremendous amount of time and effort for a payout. Many do not come forward because of the fear, shame, and victim-blaming, but thatâs not true with todayâs guest.
Todayâs guest is Ayleen Charlotte. Ayleen was one of the women featured in the Netflix documentary The Tinder Swindler. She made a radical choice between victimhood or becoming a beacon of female empowerment. After what became five years of misery, she decided not only to tell her story, but to make a lifelong entrepreneurial dream come true.
Show Notes: [1:20] - When Ayleen contacted, there were already other women victimized, but Ayleen was a big part of the Tinder Swindlerâs arrest. [2:49] - She had three goals that participating in the documentary helped achieve. [4:27] - Ayleen met this scammer five years ago and started a relationship with him. [5:19] - Because he claimed to have many enemies, he moved in with Ayleen and used her money and credit cards to âstay under the radar.â [6:58] - The lavish lifestyle he lived made sense with the story he provided to the women he victimized. [8:15] - One indicator that something was wrong was that money given back to her in the form of a check would never go through. [9:40] - He always had an operation to start and Ayleen took several personal loans to help with these endeavors. [11:27] - He laid a foundation of trust with the small things. [13:15] - Ayleen says that in the beginning, he really made her feel special. The development of the relationship was going well and very believable. [14:18] - There is a big difference between this situation and other types of fraud, as there was a real relationship built. [16:15] - The Tinder Swindler used the same stories over and over again with every victim. [17:08] - Even when he had âinteractionsâ with enemies, he would show up with real injuries. [18:15] - Some of the people on his team did not know they were part of this, although Ayleen says his bodyguard and his right-hand were aware. [19:51] - An article was released about him and Ayleen saw it and immediately knew. [21:18] - Ayleen lists some of the reasons he gave for the article being released. In this instance, Ayleen trusted the article over him. [22:43] - When he continued to ask for money, Ayleen was in contact with the police. She wound up tricking him and, in a way, taking some of her money back. [25:58] - If Ayleen didnât give him money, he made it clear that she would be in danger from his enemies. [27:18] - If someone is asking you for money and trying to push you, take a step back, shut down your phone, and think about it for a few days. [28:38] - Over time, Ayleen saw a change in character, especially when she stopped sending him money. [30:44] - The Tinder Swindler started his fraud schemes at the age of 15 and did not only target women. He swindled men as well as organizations and charities. [32:26] - He is not able to get a real job or career at this point. This is the only thing he can do and he will continue. He is still out there, living in Israel. [33:50] - The documentary has helped in slowing his scam. [35:39] - Ayleenâs trust of other people has not been impacted. She knows that she has experienced the worst already. [37:29] - Ayleen says the best thing you can do in a situation like this is to talk about it.Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest -
Pending legislation mandating cybersecurity representation at the top levels of an organization in a relatively young field and understanding that field are testing the bounds of practical cybersecurity leadership.
Todayâs guests are Richard Brinson and Rachel Briggs. Richard is an experienced executive, board advisor, and global top 100 Chief Informations Security Officer. He has been providing strategic guidance to many of the worldâs largest global organizations for over 20 years with core expertise in cybersecurity, technology infrastructure, and enterprise architecture. Richard leads Savantiâs cybersecurity practice, helping large organizations to transform and modernize their security functions for the digital age.
Rachel is a leading expert on security and has advised governments and multinational corporations on security, resilience, terrorism, and responses to extremism. She is an Executive Advisor with Savanti and founder and CEO of The Clarity Factory, which provides and arranges services to its clients including research, consultancy, and thought leadership.
Show Notes: [1:35] - Richard shares his background and what Savanti is known for. [2:30] - Rachel works with Richard and his team on thought leadership products. [4:01] - Organizations reach out to Savanti and donât know if what they are doing is right or wrong. SISOs seemed to be coming and going. [5:35] - There were 6 key factors that were causing this churn in the industry. [6:50] - The supply in demand problem for cybersecurity leaders is one issue in retaining professionals as SISOs. [8:45] - For every three years, a company is really only moving forward one. [10:05] - Rachel shares data that shows the importance of strong cybersecurity and leadership that does it right. [12:37] - Itâs not just about security. Itâs actually part of a good business model now. [14:03] - When cybersecurity isnât a part of leadership, the board's understanding creates a problem with delegating and solving problems. [15:20] - Richard is a board advisor on many organizational boards to help with this lack of understanding. [16:48] - There are fewer than 100 SISOs with effective boardroom expertise. [18:02] - When speaking with SISOs and others in leadership, things are lost in translation. [20:28] - We tend to just expect people to be good communicators but it is a skill that needs to be trained. [21:43] - There are leadership training companies that organizations can work with to coach a leadership team. [23:30] - SISOs can and should be taught to communicate effectively in the boardroom and that should be something the organization provides. [25:20] - There is pending legislation that will mandate the requirement of cybersecurity in leadership, but Richard shares some possible problems. [27:04] - Savanti helps demystify this problem with communication. [28:42] - For smaller companies who cannot afford a full time SISO, fractional SISO roles that are usually virtual are offered by Savanti. [31:18] - If an incoming SISO does not have the support of the board, they cannot be effective or successful. [32:50] - The turnover rate for this role is quite high. [34:02] - Companies who arenât willing to implement recommendations or bring in a qualified SISO leads to a number of costs and risks. [36:02] - Changing SISOs so often is destabilizing. [37:35] - With solid security, a company can take more business risks safely. [40:03] - Regulations can be helpful but not helpful in many ways. [41:52] - If you are considering a role as a SISO in leadership, round yourself off as a business leader with effective communication skills. [43:53] - You can read the recent report that Richard describes by clicking here.Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest The Future of Cyber Security Leadership Series Savanti Website Richard Brinson on LinkedIn Rachel Briggs on LinkedIn -
Millions have been impacted by data breaches. Many of us know how fraudsters work and how they utilize this information. But our parents and children become victims because of their fear or urgency inflicted by the scammers. Todayâs guest is Mike Cook. Mike is an entrepreneur with over 30 years of experience working and serving in the financial services, wireless, cable/satellite, and auto financial industries. He has built several data breach applications in compliance, manual verification, and account management solutions.
Show Notes: [0:56] - Mike shares his background and what he currently does. [2:10] - When Mike talked to a fraudster who stole cars, he immediately became interested in fraud and scams. [3:47] - Mikeâs daughter was a victim of a scam and lost a lot of money, but the biggest impact was how fearful she was. [6:20] - In years past, fraud was easier to stop, but now everyoneâs data is available somewhere online. [8:04] - Once data is breached, that information can be copied and sold over and over again. [9:30] - What is a citizen fraudster? [11:01] - Lenders and consumers are both heavily impacted by data breaches. [12:31] - As a consumer, you need to listen to every word. If it sounds too good to be true or too scary and urgent, itâs a scam. [14:08] - It is so easy to click on things without thinking about it. [15:19] - Donât ever feel bad about choosing not to give someone information. [16:57] - When the economy goes down, fraud goes up. [18:55] - Fraud has never been harder to stop, has never been smarter, never been swifter to change patterns. It is on fire right now. [20:04] - Covid resulted in everyone moving to remote working, learning, and everything being online. It expedited the growth in fraud. [21:22] - Fraud is easier to commit online in a faceless environment. [23:46] - Mike is optimistic about upcoming policy changes. [25:18] - What is synthetic fraud and what are the impacts for consumers? [26:44] - There are ways to create a false identity to get through defenses and commit fraud. [28:21] - Synthetic fraud can get through but isnât as hard to stop. [29:42] - Stopping fraud for consumers is a huge balancing act for organizations. [31:47] - Chris shares a story that shows the work that banks are doing to help mitigate fraud. [34:06] - We are going to see a lot more confirmation from organizations, especially financial institutions, to be sure you are not being scammed. [37:19] - There are several things we can do to make sure our kids donât experience credit fraud by way of someone using randomly generated numbers. [40:21] - There are definitely other legislation needed to protect people from theft and fraud. [42:08] - Things that are being done in credit repair need to change in order to protect people. [43:58] - The government and the industry work together. [45:21] - Over time, fraud trends change. They follow whatever the fastest way to take money is. [46:19] - Synthetic fraud is unique in that all of it is completely fake.Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Mike Cook on LinkedIn Socure Website - Montre plus