back to index

433-Simple_Free_Ways_to_Protect_Your_Financial_Security_and_Privacy


Whisper Transcript | Transcript Only Page

00:00:00.000 | Hey Cricket customers, Max with Ads is included with your Cricket $60 unlimited plan at no additional cost.
00:00:06.000 | "Sikes!"
00:00:07.000 | Max is the streaming platform where you can watch Scoob, Meg 2 The Trench, The Nightmare on Elm Street Collection, and so much more.
00:00:13.000 | "Remember me."
00:00:14.000 | Just log in with your Cricket username and password to experience Max on all your favorite devices.
00:00:19.000 | "We never say this before."
00:00:20.000 | Max, the one to watch for a good scream with Cricket.
00:00:23.000 | "Yeah!"
00:00:24.000 | Phone plan, streams, and standard definition. Programming subject to change. Fees, terms, and restrictions apply.
00:00:28.000 | See cricketwireless.com for details.
00:00:30.000 | Today on Radical Personal Finance I have a list of 18 tips, all of which are either free or very cheap.
00:00:39.000 | Which, when put together, will dramatically improve the privacy and security that you will enjoy in your financial transactions.
00:00:49.000 | [Music]
00:01:05.000 | Welcome to Radical Personal Finance, the show dedicated to providing you with the knowledge, skills, insight, and encouragement you need to live a rich and meaningful life now while building a plan for financial freedom in 10 years or less.
00:01:17.000 | My name is Joshua Sheets and today I'm going to save you some money.
00:01:20.000 | I woke up Saturday morning and noticed President Trump's tweets alleging wiretapping.
00:01:26.000 | That made me think all weekend about security.
00:01:29.000 | I said, "How can I help my listeners be more secure in their financial transactions?"
00:01:34.000 | [Music]
00:01:37.000 | So today we kick it off with financial transactions.
00:01:40.000 | Don't worry, I'm not going to talk about President Trump or his tweets.
00:01:44.000 | I just, that was what sparked the idea over the weekend.
00:01:46.000 | So I sat down and made this list for you.
00:01:48.000 | 18 tips and ideas that I think will be very, very useful for you.
00:01:52.000 | Before I start, number one, sponsor of today's show, number one, is Paladin Registry.
00:01:56.000 | Paladin Registry is the go-to registry service that I recommend my listeners use if you're searching for a financial advisor.
00:02:04.000 | There are many great financial advisors and there are many great financial advisors that aren't part of Paladin Registry.
00:02:09.000 | But there are lots of advisors outside of Paladin Registry that aren't all that great.
00:02:15.000 | And so if you were searching for a financial advisor, I recommend that you start your search at RadicalPersonalFinance.com/Paladin.
00:02:22.000 | That is a carefully vetted, researched list of advisors who have been proven to be ethical, proven to be conscientious, to be educated and qualified.
00:02:33.000 | Start your search at RadicalPersonalFinance.com/Paladin.
00:02:36.000 | That's the same advice that I give to my friends and family in person as I give on the show.
00:02:40.000 | RadicalPersonalFinance.com/Paladin and link in the show notes for today's show.
00:02:45.000 | Tip number one, let's get into it.
00:02:47.000 | Simple but I see very few people do it.
00:02:51.000 | Cover the keypad with your hand when you are entering your pin code or zip code into a card reading device.
00:03:01.000 | The secret to the use of a credit card or a debit card is having a pin code and a zip code depending on in what context you're doing, whether you're writing as a credit card or a debit card.
00:03:14.000 | Very simple thing you can do is just simply seek to conceal that information from anybody who's watching.
00:03:20.000 | Either somebody who's watching across the thing, counter, across the counter or somebody standing behind you who is watching over your shoulder or somebody off in the bushes looking through a spotting scope and collecting your data.
00:03:36.000 | Just simply conceal the information from them.
00:03:38.000 | It takes no effort to do.
00:03:40.000 | If you punch your numbers in with your right hand, take your left hand, cover it over the right hand and conceal yourself when you're putting those pin code numbers into the machine.
00:03:51.000 | Or if they're being displayed on the screen such as when you put your zip code in, cover it up with your hand but then also use your body to obscure the screen best you can if you have an opportunity to do that to take care of the zip code.
00:04:03.000 | Very simple.
00:04:04.000 | It's a good habit to have.
00:04:06.000 | Number two, if you are banking and using your mobile device, choose to use the actual application that you install on your phone from your bank rather than doing your banking through their mobile web browser system.
00:04:22.000 | Much better, much safer, and more secure for you to protect your information.
00:04:27.000 | It's better now than it was in the past in terms of security for the mobile web browsers.
00:04:31.000 | But in the early days, there would be lots of fake URL addresses, fake security certificates, et cetera.
00:04:37.000 | And those things were a problem.
00:04:40.000 | But that's better now.
00:04:42.000 | But it's still best to just simply use your bank's phone application when you're doing mobile banking.
00:04:48.000 | In addition, so if you do that, you'll be secure because the connection that's there with all the major banks, the connection that's there is secure and you will have a situation where you're using the bank's app and you're not going to be liable for any problems, any theft of the data.
00:05:06.000 | So use the bank's app.
00:05:08.000 | If your bank doesn't offer a mobile banking app, then here are a couple of important things for you to do.
00:05:14.000 | Number one is make sure you're always using the actual banking app – banking website from your bank.
00:05:20.000 | That's important.
00:05:21.000 | Don't do banking on your phone using public Wi-Fi networks and turn off your Bluetooth connection when you're also using that because it is very possible for somebody to use the Wi-Fi network and to collect your information that's passing through that or to connect to your phone via Bluetooth.
00:05:39.000 | Of course, this is uncommon and infrequent but just takes a moment just to think about.
00:05:43.000 | If you're using that, make sure that you always have all of your operating systems updates installed.
00:05:49.000 | You want to make sure that whatever version of phone software that you're using, whether it's iOS or whether it's Android, that you keep it updated consistently.
00:05:59.000 | That's the safest way for you to make sure that any holes that have been discovered in the security systems of your phone have been controlled and have been corrected by keeping your operating system up to date.
00:06:13.000 | You should also consider using a mobile antivirus software on your phone.
00:06:17.000 | Sometimes that's also worth doing and we'll leave it there.
00:06:23.000 | Number three, use strong passwords for all of your banking information.
00:06:27.000 | By the way, if you're saying, "Joshua, these are basic.
00:06:29.000 | I know this."
00:06:30.000 | Stay with me.
00:06:31.000 | I'm going to have a few more that are not so obvious and we're also going to talk about the debit card versus credit card controversy in some length.
00:06:40.000 | So number three, use strong passwords that are different and that are randomized for all of your banking transactions.
00:06:47.000 | In fact, you should do this for every one of your accounts.
00:06:50.000 | The vast majority of people have one password that they use for everything.
00:06:54.000 | It's usually something like Fluffycat123.
00:06:57.000 | Now, here's the deal.
00:06:59.000 | Anybody, any hacker worth his salt can break that – can force break that password very quickly just by putting in words and using a computer program that will just throw passwords at that.
00:07:11.000 | So simplest thing you can do is use a strong password that is randomized.
00:07:17.000 | So better than Fluffycat123 would be capital A lowercase c ampersand 46/moneysignd427.
00:07:29.000 | That password is essentially unbreakable even by a computer system and it's especially unbreakable if each and every one of your passwords is different at each and every site.
00:07:40.000 | You might be surprised at how many of these strong passwords you can remember on the top of your head if you focus on it and actually input it.
00:07:50.000 | I use complex passwords for all of my accounts and I have many of them committed to memory.
00:07:55.000 | And your fingers will develop a memory system when you're putting them in on a keyboard that will enable you to memorize them relatively easily.
00:08:04.000 | So you can actually memorize these.
00:08:06.000 | But of course the simplest option is to use some sort of password manager system.
00:08:13.000 | There are a variety of these online.
00:08:15.000 | Just search for something like password keeper or password manager.
00:08:19.000 | I'm not going to – I use one called Gorilla Pass which is old school.
00:08:25.000 | It's not – there are some current ones, LastPass and there are other competitors as well.
00:08:29.000 | Do a search.
00:08:30.000 | Find out whenever you're listening to this what the current latest greatest password manager is and make sure that you use a strong password for every account that you have a password for and that it's different for every account by using a password manager.
00:08:46.000 | One of the great things about the password managers is they will automatically generate passwords for you.
00:08:51.000 | That's the functionality that I use.
00:08:53.000 | I just click Generate Password and it will generate a password using whatever criteria I've put in, lowercase, uppercase, symbols, no symbols, digits, no digits, etc.
00:09:03.000 | Then what I do is I just change a few things there.
00:09:06.000 | So even if the – so it's truly random.
00:09:08.000 | Even if the computer were somehow not randomized which it is, I change it myself with just some other random numbers that I change.
00:09:16.000 | Then I know that I have a password that's very random and I use long passwords as well.
00:09:20.000 | So all of these things help to make sure that your password is secure.
00:09:26.000 | Number four, activate two-factor authentication on all of your accounts whenever it's available such as banking.
00:09:34.000 | Activate the two-factor authentication.
00:09:36.000 | Now let me explain what this means.
00:09:37.000 | You probably experienced it where when you go to log in to an account, they say, "We need to send you a code," and they will text it to you or they will email it to you or they will call it to you.
00:09:46.000 | It's a one-time code, usually three, four, five, six numbers, something like that, and you enter that in to authenticate yourself.
00:09:53.000 | This is called a two-factor authentication.
00:09:55.000 | Your first factor was the password.
00:09:57.000 | The second factor is the code.
00:09:59.000 | This is useful and helpful because if your banking information were stolen by a thief who was able to crack your password and was able to get in,
00:10:08.000 | they would also have to be in control of your mobile device in order to be able to access the account as well.
00:10:13.000 | Well, if you have the mobile device, it's not going to happen.
00:10:16.000 | And so there's much less of a chance of them being able to access your accounts.
00:10:20.000 | This is helpful for not only banking but you should do the same thing with email accounts, social media accounts, your websites, et cetera.
00:10:28.000 | Use and activate two-factor authentication whenever possible.
00:10:32.000 | Number five, if you want to stay on top of problems, make sure that you check your account information and your account balances very frequently.
00:10:42.000 | I recommend daily.
00:10:44.000 | That's what I do.
00:10:45.000 | I check it – I would say five to six days out of a week.
00:10:47.000 | I balance my checkbook as in digital virtual checkbook.
00:10:50.000 | I use YNAB, which you should too.
00:10:52.000 | Sign up for a 34-day trial at RadicalPersonalFinance.com/YNAB.
00:10:57.000 | How's that for a pretty sweet ad?
00:10:59.000 | RadicalPersonalFinance.com/YNAB.
00:11:02.000 | That's what I use and I use it and reconcile it just about every day.
00:11:08.000 | I would estimate five to six days a week.
00:11:10.000 | This means that transactions, if there's a transaction that's coming past and I don't recognize it, I'm going to know it immediately.
00:11:18.000 | It's not trying to go through last month's statement with hundreds of transactions across it trying to figure out what passed muster and what didn't,
00:11:26.000 | especially some of you who have multiple family members.
00:11:30.000 | You have spouses.
00:11:31.000 | You have children who are using cards, et cetera, for some of their expenses.
00:11:36.000 | You need to be on this just about every day.
00:11:38.000 | It doesn't take a long time.
00:11:40.000 | It just takes just a minute, a couple minutes.
00:11:42.000 | It doesn't take long to pull up the app on your phone for your bank and look through the bank app and make sure you recognize everything.
00:11:48.000 | But it can be very valuable to help stop problems at an early basis.
00:11:53.000 | It can also be very valuable in helping you to pursue your long-term goals with passion.
00:11:59.000 | Check your goals and make a daily goal.
00:12:02.000 | If you're paying down debt, I've done this.
00:12:05.000 | If you're paying down debt, pull open and I've made a payment every single day.
00:12:09.000 | It helps me to stay focused.
00:12:11.000 | You write it down in your goals in the morning.
00:12:12.000 | I'm paying down debt and you go and make that payment.
00:12:15.000 | I've done this where I'm saving for a certain – if it's a certain purchase or saving for a certain income.
00:12:21.000 | Yes, it's great to have savings automated, but if your goal is to increase your net worth by X number of dollars per year every single day,
00:12:29.000 | you need to do that by every single day.
00:12:31.000 | So you can pop open your bank app and make a transfer over.
00:12:36.000 | Again, writing it down in the goals every day.
00:12:38.000 | My goal is to become a millionaire by X date.
00:12:41.000 | Check that number.
00:12:43.000 | Use a dashboard system where you can know your net worth on a daily basis.
00:12:49.000 | Have things updated.
00:12:50.000 | Check your performance, et cetera.
00:12:52.000 | I don't want to get down too far down that.
00:12:55.000 | But there's benefits to checking your account balances daily or very frequently that go beyond simply controlling in case of security or in case of compromise.
00:13:10.000 | So it will help you to stay focused on your goals and you'll make much more substantial progress if you're focusing on something daily.
00:13:17.000 | Tip number six, buy and use an RFID blocking wallet.
00:13:23.000 | RFID stands for radio frequency identification.
00:13:27.000 | And this is those -- in many of your modern credit cards, you have that little chip that allows you to wave the credit card near the card reader and not to actually swipe it or insert it with the chip.
00:13:41.000 | You just wave it near it.
00:13:42.000 | That's called an RFID card.
00:13:44.000 | And what that card does is it conveys a very low power signal to the device reader.
00:13:51.000 | This is the same technology that your cell phone uses if you're using your cell phone to using Apple Pay or what's Google Pay, whatever their version of it is.
00:14:00.000 | So one thing you want to do is take a little bit of security with that data.
00:14:06.000 | Now, this is probably not going to happen to you.
00:14:10.000 | But it's very simple to protect yourself.
00:14:15.000 | If somebody wants to get access to your information, they just need to bump into you, pass you on the street, and they can -- with technology that's easily purchased in the consumer marketplace without any restrictions or controls, they can just simply use a cell phone and they can use it to read all of your personal information from your card.
00:14:35.000 | So if you want to take security about that, you need to use an RFID blocking wallet.
00:14:41.000 | There are men's versions and women's versions available.
00:14:45.000 | I use an Access Denied wallet.
00:14:48.000 | Access Denied is a company that specializes in a lot of these.
00:14:52.000 | I'll put a link to the one that I have.
00:14:54.000 | Just a very simple bifold wallet, men's wallet.
00:14:58.000 | But the thing I like about Access Denied is they actually check their stuff.
00:15:04.000 | Their wallets are rated to -- here's some jargon.
00:15:08.000 | They're rated to what are called the FIPS 201 security standards.
00:15:12.000 | FIPS stands for Federal Information Processing Standard.
00:15:15.000 | And that's a U.S. federal government standard that specifies how the federal identification badges are going to work.
00:15:26.000 | And so if you are actually using one of their wallets, they're guaranteed and rated to do the job and block effectively the RFID.
00:15:36.000 | You can buy one for cheap online.
00:15:38.000 | I mean the one that I have is pretty cheap.
00:15:40.000 | You can also make your own.
00:15:42.000 | I've never done it and tested it.
00:15:44.000 | But if you go on YouTube, you'll find many people who will teach you how to buy and use an RFID blocking wallet.
00:15:50.000 | Or you can just simply make RFID blocking sleeves for your cards.
00:15:55.000 | They sell sleeves in bulk online.
00:15:57.000 | Or you can make them, I think, according to the YouTube things I've seen,
00:16:02.000 | you can make them effectively yourself with some tinfoil, et cetera.
00:16:07.000 | You won't be wearing a tinfoil hat but you'll have tinfoil wrapped credit card in your wallet.
00:16:13.000 | So that's something that you should do.
00:16:15.000 | It's very simple, very inexpensive to do, and it could potentially help protect you from the theft of your information, your personal data.
00:16:25.000 | Incidentally, you should do the same thing with your passports.
00:16:28.000 | When you travel, all of your passports now have an RFID chip in them where they emit this low-power radio signal.
00:16:36.000 | This is very, very low power.
00:16:38.000 | It's designed that it has to be about one to five inches from the actual receiver.
00:16:43.000 | So it has to be based upon contact.
00:16:45.000 | You're not going to be hacked into from across town.
00:16:48.000 | A card reader, a skimmer has to be passed near your card or your cell phones.
00:16:53.000 | But you should buy – and when you're traveling, you should buy and use a bag that has an RFID protection in it to protect your passport because your passport has all of your personal information.
00:17:05.000 | You can do that with special travel ones that are like the things that go around your neck or the things that you stick in a waist belt.
00:17:13.000 | You can also do – I have one that works for your cell phone.
00:17:19.000 | This is one where you start to get into tinfoil hat stuff in terms of how do you protect your cell phone security.
00:17:27.000 | Your cell phone – I posted a little bit about this on Facebook last night talking about some of the data that's out there and some of the ways that things are done.
00:17:36.000 | Your cell phone – you should always assume that your cell phone can be accessed by either a skilled hacker or by a government agent in whatever government that you're in.
00:17:47.000 | Your microphone can be activated without your knowledge.
00:17:52.000 | Your cameras can be activated without your knowledge and the information and data that is coming from and through your phone including GPS location, et cetera.
00:18:02.000 | Even if you don't have the ability to – your phone isn't – the GPS doesn't have access to the GPS satellites.
00:18:08.000 | The phone can be geolocated based upon tower proximity within about a three-foot radius by somebody who has access to that data stream.
00:18:17.000 | There are various – there are very skilled hackers who are able to do that or of course, many of the most skilled hackers are employed by the government which has authority over you.
00:18:29.000 | So if you want to protect yourself, there are really only a few things that you can do.
00:18:33.000 | You could of course not have a phone.
00:18:35.000 | You could choose a phone which is – I wouldn't blame you for it.
00:18:39.000 | You could choose a phone that doesn't have – that has the ability to remove the battery.
00:18:46.000 | That's where iPhones always stand down because the phone can be powered off and it is – it can be activated remotely even if it's powered off.
00:18:55.000 | But if you remove the battery, that can be very helpful.
00:18:59.000 | If you remove the battery, you can do – by the way, if you've not researched these things, I recommend Vice News.
00:19:04.000 | Vice News has done specials on this.
00:19:06.000 | CBS 2020 has done specials on this.
00:19:09.000 | There are many mainstream news organizations that have done specials on this type of thing and the information has been well-known for the last decade and a half.
00:19:20.000 | It's only now starting to proliferate more and come out of where people think that you're crazy if you are aware of the capabilities that are there.
00:19:28.000 | So, one other option is you can use a bag, a radio frequency identification – or a radio frequency blocking bag.
00:19:36.000 | I'll link to one that I think is probably the best one.
00:19:39.000 | The website is Mobile Security Solutions spelled M-O-B-I-L-E-C-E-C Solutions.
00:19:45.000 | They sell a cell phone bag and a laptop protection bag, which have the benefit of blocking all radio signals effectively coming in or out of the device while also it can protect from – the laptop bag is marketed as protecting your sensitive electronic devices from the impact of electromagnetic pulse.
00:20:07.000 | So, that's one useful thing for you.
00:20:09.000 | You can purchase that kind of bag and use it.
00:20:11.000 | It's overkill for your passports or you can just simply buy a simple passport travel.
00:20:17.000 | Incidentally, on all these things, the thing you should keep in mind is very simple.
00:20:22.000 | You're almost never – the data is freely available for those with the skill to access it, but you're almost never going to be targeted unless you've done something.
00:20:32.000 | You've committed a crime or you're engaged in some high-level business dealings or you're engaged in some – high-level business dealings would be the best things or sensitive – area of sensitive technology, something that would be of interest to somebody who either wants to steal your trade secrets, a business competitor, an unethical business competitor, or a foreign government who wants to steal your trade secrets.
00:20:57.000 | So – but there's – your data is almost – no one is ever going to be – pay attention to it unless it's important.
00:21:04.000 | The problem is you're not going to change in the sense that you're not going to all of a sudden start to be aware when you're doing something important if you're not aware when you're doing something that's less important.
00:21:14.000 | And the time that you're most going to want to have or understand your security options is when you don't have anything to hide.
00:21:22.000 | So, that's why I try to proliferate this type of information.
00:21:26.000 | Put in place good privacy standards when you don't have anything to hide and you will be well-served when you advance to a higher level of business craft where your information is more valuable or if you're engaged in politics, et cetera.
00:21:43.000 | So, forgive me for getting sidetracked there, but I think it will – I think that will be interesting to you.
00:21:51.000 | So buy and use an RFID blocking wallet is number six.
00:21:55.000 | Number seven, to protect your privacy and security – this one, you knew it was coming somewhere.
00:22:01.000 | Use cash.
00:22:02.000 | Use physical currency.
00:22:04.000 | Don't ever overestimate how valuable using currency is.
00:22:08.000 | Currency will protect your security because you're not going to be charged more.
00:22:14.000 | I was struck by how – when I've been working in the restaurant business, I worked in a Papa John's pizza restaurant for one week and I was struck by how vulnerable all of the credit card data for all of the customers was.
00:22:31.000 | And it's the same in every single restaurant.
00:22:34.000 | Just simple things like adjusting the amounts, adjusting the tip, or even access to the devices.
00:22:40.000 | There are lots of shows where if you go on YouTube, you'll find where they talk about scammers and scam artists.
00:22:45.000 | You can – a restaurant worker, a waiter, a waitress could very easily – while they're taking your card, they can very easily skim the data right off your card.
00:22:55.000 | Now, most aren't going to do that.
00:22:57.000 | But it's a risk.
00:22:59.000 | So if you just simply use cash, as an example, in a restaurant, if your bill is $86 instead of handing over your card, if you just put down $100 bills or $520 bills, you're done.
00:23:09.000 | You know how much the cost was and you're not going to be overcharged.
00:23:15.000 | That's a very simple and easy thing to do to protect your security.
00:23:19.000 | It also of course has the benefit of protecting your privacy.
00:23:24.000 | Next tip, number eight, is don't enroll in store loyalty programs.
00:23:29.000 | So simple example, when you go to your grocery store, et cetera, and you swipe the store loyalty card, you're creating a database for your purchases.
00:23:39.000 | That database is owned by the company.
00:23:42.000 | That database at some point in time, that company will – if they're big and they're well-known, that database will show up on the front page of a newspaper of the business section that they were breached and all that data, purchasing data, will be out there.
00:23:55.000 | Purchasing data is also sometimes fed into that company's systems where it's used to tailor the marketing and targeting that's done by that company towards you or that data is available more broadly and it's part of your large profile.
00:24:10.000 | Not a big deal for the vast, vast majority of us.
00:24:14.000 | After all, we have nothing to hide.
00:24:16.000 | The things that we bought at the grocery store or the department store or whatever, OK.
00:24:21.000 | That's fine.
00:24:22.000 | We have nothing to hide about it.
00:24:24.000 | It doesn't matter.
00:24:25.000 | But it creates a profile and if you're ever in a situation where you're targeted, that could be a problem for you.
00:24:32.000 | So if you'd like to protect your privacy, use cash for your transactions.
00:24:37.000 | You will be able to maintain some of your privacy and you minimize the footprint that you are leaving.
00:24:45.000 | You'll minimize the profile that's established of everything that is known about you.
00:24:50.000 | Next, protect your cash from theft, obviously.
00:24:53.000 | Now, people traditionally have said, "I don't like to use cash because it's going to – it puts more likely for being stolen."
00:25:01.000 | In the worlds that most of us live in, especially in a western society, we're not generally in places where there's a great danger of our cash being stolen.
00:25:12.000 | And in many of our societies, I don't think people even carry cash all that much and so I really don't buy the theft danger.
00:25:19.000 | However, it is something you should pay attention to.
00:25:22.000 | If you are – and depending on the situation you're in, pay attention on different levels.
00:25:29.000 | Simply, I like to use wallets with two currency pockets.
00:25:32.000 | The one that I have, again, the access denied one has two currency pockets.
00:25:36.000 | That allows you to keep maybe your larger bills in one currency pocket and smaller bills in another and you can cover your cash so it doesn't look like you have a lot of money with you.
00:25:45.000 | You can also use two different wallets.
00:25:48.000 | When traveling, you should consider always having a wallet that you use for your daily purchases and then with just enough money to allow you to make purchases at the market or stores that you're visiting.
00:26:02.000 | And then you keep your serious reserves hidden away where you never access them publicly.
00:26:07.000 | In large cities or places where pickpocketing is more common, that's a very common sense scenario.
00:26:15.000 | Now, you of course are driving.
00:26:18.000 | You're getting in your car, driving to work in your luxury car with your doors locked and you're pulling into your office building.
00:26:26.000 | You're going in.
00:26:27.000 | You're not riding an elevator.
00:26:28.000 | You're just walking in.
00:26:29.000 | You're sitting at your desk.
00:26:30.000 | What's the risk of theft of cash?
00:26:32.000 | It doesn't exist for you.
00:26:34.000 | So, there's very little danger of theft.
00:26:38.000 | But you should consider and protect yourself as well.
00:26:42.000 | If you're going to go to a store, you should just simply have the cash that you're going to need to spend in the store.
00:26:46.000 | If not, if you need to move with more, consider locking your reserves in a glove box or you can have a small lock box in your car.
00:26:54.000 | If you go to a sporting goods store, they sell these small little metal, primarily intended for guns, these small little lock boxes that attach to a piece of hardware in your car with a cable and you can hide that under your seat.
00:27:09.000 | That gives you a useful place that's more secure than perhaps your glove box which can sometimes be forced open to protect your cell phone or your cash or your wallet if you're at the beach.
00:27:19.000 | So, consider that.
00:27:20.000 | Very simple and easy to do.
00:27:22.000 | Now, number 10 is going to take a few minutes because we're going to tackle this question of what type of card should I use for my purchases?
00:27:32.000 | And I'm going to give you – this is much debated but I'm going to give you my understanding of it.
00:27:37.000 | So, my suggestion number 10 for you, consider using a credit card for all of your electronic purchases.
00:27:46.000 | Anything that you want to buy with a card, use a credit card.
00:27:49.000 | This question is hotly debated in personal finance topics and it should be.
00:27:55.000 | The debate is simply that many people see the problems of using a credit card, a charge card due to overspending.
00:28:04.000 | If you're using a credit card, you can easily overspend, easily put yourself in a situation where you have – where you're going to debt.
00:28:14.000 | To protect against this, many people recommend using a debit card because a debit card doesn't allow you to spend money that you don't have.
00:28:20.000 | And this is absolutely a compelling and valid argument.
00:28:25.000 | If you're in credit card debt or if you are prone to credit card debt in the past, I think you're better served using a debit card than a credit card.
00:28:33.000 | Because the chances of the disaster scenario that I'm about to go through happening to you I think are pretty low.
00:28:40.000 | And yet you've demonstrated in your behavior that the chances of your winding up in credit card debt are pretty high.
00:28:47.000 | And so that's a bigger concern.
00:28:49.000 | And you can protect yourself in your debit card transactions as well, which I'll talk to you in just a moment.
00:28:56.000 | But the debate is what's safer, a debit card or a credit card?
00:29:00.000 | So assume that you are – you spend the same amount of money, whether you're spending on a credit card or a debit card.
00:29:06.000 | That's a dangerous assumption, but we're going to assume it for now.
00:29:09.000 | And assume that you're not going to go into credit card debt, also a dangerous assumption, but let's assume it for now.
00:29:15.000 | Question, should you use a debit card or credit card?
00:29:19.000 | Answer, credit card every time, hands down.
00:29:24.000 | A couple reasons for this.
00:29:26.000 | With regard to these cards, there's a difference in how they are – there's a difference in how a credit card and a debit card are subject to the law.
00:29:37.000 | For credit cards, the law that governs the use of credit cards is primarily the Fair Credit Billing Act or FCBA.
00:29:47.000 | For debit card transactions, however, the primary law that governs them is the Electronic Funds Transfer Act.
00:29:56.000 | Now, these laws in some ways offer similar protections.
00:30:01.000 | But there are significant differences between these laws in the case of fraud.
00:30:09.000 | In case of debit card fraud, under the Electronic Funds Transfer Act, your potential liability for fraudulent transactions is basically unlimited.
00:30:25.000 | You have up to 60 days to report a lost or stolen card under this act, and then after that, you simply lose whatever money was taken,
00:30:35.000 | even funds that may have been taken from any linked accounts.
00:30:40.000 | And the impact of that could be significant.
00:30:45.000 | Now, the EFTA states that if the lost or stolen card is reported before any unauthorized transactions, then you have no liability.
00:30:54.000 | If it's reported within two days, then your liability is limited to $50.
00:30:59.000 | Or if it's reported within 60 days, your liability is limited to $500.
00:31:05.000 | But after 60 days, there's no liability protection.
00:31:08.000 | So you do have protection, but you also have a significant amount of potential liability.
00:31:17.000 | Under the Fair Credit Billing Act, which governs credit cards, your maximum liability for fraudulent transactions is $50.
00:31:25.000 | And if you report the card lost or stolen before there are any fraudulent transactions, your liability is zero.
00:31:33.000 | So based upon the actual law, the protection is stronger with credit cards.
00:31:40.000 | Now, what are the exceptions?
00:31:41.000 | Well, first, the obvious one is many of us have heard people say, "Well, listen, if it has the Visa logo or the MasterCard logo,
00:31:49.000 | Visa and MasterCard affirm that the protection is the same."
00:31:54.000 | That is true.
00:31:56.000 | Based upon this difference in rules, many of the large companies – again, the large Visa and MasterCard usually who are sponsoring debit cards –
00:32:06.000 | said, "We're going to honor the fraud transaction the same regardless of whether it's a debit card or a credit card."
00:32:14.000 | That's good. There's good consumer protection for you.
00:32:17.000 | The other practical thing is that many banks have also stepped up and said, "We're going to take care of things consistently as well."
00:32:26.000 | This has happened several times in my banking lifetime.
00:32:30.000 | I've had my checking account compromised through whatever way, my debit card compromised through whatever way, and I've had various fraudulent transactions.
00:32:39.000 | With all the times this has happened, and I would say probably I would guess four – I could probably go back and find maybe four times in my banking lifetime.
00:32:50.000 | In all four times, I've been treated extremely well by the bank.
00:32:54.000 | They've refunded the money to my account immediately and they have immediately taken care of things and it was simple and it was no problem at all.
00:33:05.000 | So, most of us have this experience of knowing that, yes, if you have an official Visa or MasterCard debit card that you're using where it has those logos,
00:33:14.000 | they're guaranteeing that they're going to treat it the same.
00:33:16.000 | They're saying that and also the bank is going to take care of things as well.
00:33:22.000 | Most of us have good experiences, but you don't have the same legal protection and that's important to know.
00:33:29.000 | You also have the potential of having your life significantly disrupted.
00:33:35.000 | Credit cards without question have the strongest protection for you.
00:33:40.000 | You are protected from the liability of any unauthorized use of your credit card.
00:33:45.000 | Any unauthorized use of your credit card.
00:33:50.000 | That's a big deal.
00:33:51.000 | But it's more than that. You also have, with a credit card, additional strength with being able to dispute your bill,
00:34:02.000 | to dispute any billing errors that you have with a merchant, somebody charging you more or less.
00:34:09.000 | If you were in that restaurant situation and the person swiped your card and added an extra $10 to their tip that you didn't notice when it was being re-entered into the computer later,
00:34:18.000 | with a credit card you can dispute that and you can force resolution.
00:34:22.000 | You additionally, with a credit card, have the right to stop payment.
00:34:27.000 | And stopping payment is something that is really powerful and you do not have that ability with a debit card.
00:34:34.000 | You cannot stop payment or use that dispute transaction mechanism that a credit card has.
00:34:42.000 | So your protection under a credit card is much, much more than your protection with a debit card.
00:34:49.000 | But probably the most important reason why a credit card is undoubtedly safer,
00:34:56.000 | if we're assuming that you don't spend more and if we're assuming you're not prone to overspending and winding up in credit card debt,
00:35:03.000 | the reason why a credit card is safer is because it doesn't disrupt all your banking transactions and you're not out the money right up front.
00:35:13.000 | Let's say that you maintain a balance of $3,000 in your checking account.
00:35:18.000 | That gives you a cushion to where you don't have to worry too much about the money that you're spending.
00:35:22.000 | You maintain this cushion in there.
00:35:24.000 | If you're using your debit card and you have fraudulent transactions that are registered,
00:35:31.000 | your bank doesn't have to replace the money in there.
00:35:35.000 | Not right away.
00:35:37.000 | And so if they've taken a couple thousand bucks out, that could be a big deal for you
00:35:43.000 | because you may not have the other money sitting in an easily accessible savings account
00:35:48.000 | and you're out the couple thousand bucks which you might need to pay bills.
00:35:52.000 | This is disastrous for people who live right on the edge financially.
00:35:55.000 | You bounce your mortgage payment.
00:35:57.000 | You bounce your utility payments.
00:35:58.000 | Now all of a sudden you start adding up bounce check fees, bounce bank fees, et cetera, and your late payments.
00:36:05.000 | You might have a whole mess and the money is gone.
00:36:09.000 | It's out of the debit account.
00:36:10.000 | It's out of the – you don't know about it.
00:36:13.000 | Now, a credit card, if the same exact thing happens on a credit card and your credit card is stolen, $2,000 is gone,
00:36:21.000 | you know about it when your statement comes in.
00:36:24.000 | You might have a few weeks.
00:36:27.000 | You might see it on your electronic – daily electronic viewing of your accounts and your dashboard.
00:36:33.000 | You say, "What are these transactions here?"
00:36:35.000 | You cancel the card and you – yes, most people don't have that many auto payments set up to the credit card.
00:36:42.000 | If you do, you can still pay them from a debit card.
00:36:44.000 | So you cancel the card and you have several weeks until the statement is issued
00:36:48.000 | and then you have weeks and weeks from there before the payment is due
00:36:51.000 | and you can get the thing resolved in time without suffering the loss of the money out of your checking account.
00:36:58.000 | So a credit card is definitely a safer way to go with regard to protecting yourself.
00:37:05.000 | If you can handle not spending more with a credit card and if you can handle not going into debt,
00:37:10.000 | you will be safer using a credit card for any card-type purchases.
00:37:16.000 | That will be extremely valuable.
00:37:18.000 | Should you still have a debit card?
00:37:20.000 | Probably not.
00:37:22.000 | One of the most important things that most people aren't aware of is that you can have access to your bank account
00:37:28.000 | without actually having a debit card.
00:37:30.000 | Many banks will issue you an ATM card.
00:37:33.000 | An ATM card has the benefit of only working with a PIN to withdraw currency from an ATM.
00:37:41.000 | So an ATM card is something that usually – it's not going to have the Visa or MasterCard logo on it.
00:37:46.000 | It can't be swiped.
00:37:47.000 | They call that – I think they call it a secondary transaction.
00:37:52.000 | You can only use an ATM card to get money out of your bank.
00:37:58.000 | That is well worth considering.
00:38:01.000 | Sorry. It's called an online transaction and an offline transaction.
00:38:05.000 | An online transaction using a debit card is when the money is deducted from your account basically immediately
00:38:13.000 | and that's a transaction that requires you to enter a PIN.
00:38:19.000 | It takes the money out with an electronic funds transfer.
00:38:22.000 | An offline transaction usually doesn't involve the transfer of funds for a few days.
00:38:28.000 | There you're usually signing a receipt, not putting a PIN.
00:38:32.000 | So it's much – there's a much lower proof of purchase when you're simply signing a receipt, swipe and sign the receipt.
00:38:38.000 | So that's the difference.
00:38:40.000 | So you can get an ATM card that only allows you to make the withdrawal from the ATM
00:38:47.000 | and doesn't put you in a situation where you can have that card swiped or used for more fraudulent transactions.
00:38:57.000 | So consider the use of an ATM card.
00:39:00.000 | If you are also committed to being a debit card only user either for convenience
00:39:04.000 | or for a system of financial controls over yourself and over your spending,
00:39:09.000 | nothing wrong with that.
00:39:10.000 | You might consider setting up separate accounts and using one account that has most of your main banking transactions
00:39:18.000 | such as your car insurance payments, your bill payments, your mortgage payments
00:39:22.000 | and the other account that is connected to the use of a debit card
00:39:26.000 | and then just simply fund that account with the amount of money that you need in order to make the expenses from time to time.
00:39:35.000 | That way, if your account is compromised and you wind up in a situation where you have fraud,
00:39:45.000 | your major banking setup is not being compromised.
00:39:50.000 | I don't think you should worry too much about this.
00:39:54.000 | I needed to be clear with the fact that a credit card is definitely the right solution from the perspective of consumer protection.
00:40:02.000 | That is without – based upon my research, I can't see any way that that's not the right answer.
00:40:09.000 | However, most people overspend with credit cards and I've seen this so many times where people say, "Oh, we never carry a balance."
00:40:18.000 | At some point in time, they do and the data seems to indicate that people do as well.
00:40:22.000 | Not – it's not immoral to carry a credit card balance, but it's very easy for people to wind up in credit card debt.
00:40:30.000 | So it is worth being very, very careful.
00:40:33.000 | If your bank protects you, then I think you can – this is a reasonable risk.
00:40:40.000 | I've always had – I bank with USAA every time and I've been banking with them since I was like 16 years old.
00:40:48.000 | Every single time I've ever had fraud on my debit card account, they've overnighted me a card.
00:40:53.000 | They've immediately restored all the money in the account and everything was taken care of quickly even though I had a debit card account compromised.
00:41:05.000 | So that is a very appropriate – I think it's an appropriate risk management.
00:41:13.000 | I hope that helps you to have some insight into it.
00:41:16.000 | But number 10 is consider using a credit card for any card purchases.
00:41:21.000 | Number 11, tip number 11, these will be faster.
00:41:23.000 | Minimize the number of credit cards that you carry in order to minimize the hassle of loss or compromise.
00:41:29.000 | You shouldn't have 15 cards in your wallet.
00:41:32.000 | If you have 15 cards, you're hacking – doing travel hacking, et cetera, you should only have one or two cards in your wallet, the card that you're spending.
00:41:39.000 | You might have your ATM card, a credit card and maybe a backup one on a different network.
00:41:45.000 | You're used to using an American Express but American Express is not accepted.
00:41:48.000 | So you simply switch to using Visa or MasterCard.
00:41:51.000 | So just simply carry fewer cards.
00:41:53.000 | That way if your wallet is lost, your wallet is stolen, you have less of a hassle.
00:41:57.000 | I feel like I shouldn't even need to say this but I've often seen many people's wallets that are just huge and filled with all kinds of stuff.
00:42:05.000 | It's totally unnecessary.
00:42:07.000 | Minimize the number of cards that you carry.
00:42:10.000 | Number 12, I'm going to phrase this one as a question versus as a statement.
00:42:15.000 | Should you write CheckID on the back instead of signing it?
00:42:20.000 | Interesting question.
00:42:22.000 | Many people you have seen that will put – write CheckID or CID on the back of their card as a hope of minimizing the fraud.
00:42:32.000 | Basically, I think the answer to this based upon my research, I think the answer to this is it doesn't really matter if you do
00:42:39.000 | and it doesn't really matter if you don't.
00:42:41.000 | It's not going to save any real fraudulent transactions from happening.
00:42:45.000 | It has some possibility of helping maybe.
00:42:49.000 | It actually invalidates the card agreement.
00:42:53.000 | That should be noted first and foremost.
00:42:55.000 | If you were to research this officially from all of the card manufacturers, they say that the card is not valid unless it's signed.
00:43:04.000 | So if you write CheckID instead of signing Joshua Sheets, it invalidates it.
00:43:10.000 | Now, will it still be accepted?
00:43:13.000 | We all know that the cards are accepted everywhere and I'm sure that somebody has probably been turned down because their card wasn't signed.
00:43:18.000 | But if they are, I've never heard of them.
00:43:20.000 | So it does cause some people to check the ID and that can be helpful to check the picture ID.
00:43:27.000 | You've got to be careful because, of course, now you're exposing another piece of data to somebody who in theory could be stealing it.
00:43:35.000 | If your restaurant server – sorry, if you're a restaurant server.
00:43:40.000 | You guys are getting thrown under the bus.
00:43:42.000 | If you're a restaurant server and they're wearing Google Glass and they click their lips and take a picture of your credit card and take a picture of your driver's license, you've now exposed to them all your personal information.
00:43:53.000 | You've got a problem.
00:43:55.000 | Obviously, practically, that's no big deal.
00:43:57.000 | The good thing about writing CheckID is sometimes in those situations where people would just swipe, they will actually request picture ID.
00:44:05.000 | In theory, it could help.
00:44:07.000 | In practice, I don't think it makes any difference.
00:44:10.000 | I actually have in the past tested my theories on this.
00:44:14.000 | For a long time, I would engage in a practice of never signing my name with an actual signature that's mine but actually signing it without – in manuscript, not cursive, in manuscript.
00:44:28.000 | I would always sign with the name of the store's competitor.
00:44:31.000 | So if I'm at Home Depot and I'm swiping a card and I'm signing on the screen, I will write "Mr. Lowe's" or if I'm at Publix, I'll write on there "Mr. Winn-Dixie."
00:44:41.000 | I've done that without exaggeration dozens and dozens of times, perhaps 60, 70 times, never had anybody blink an eye.
00:44:51.000 | What's so funny is I've watched that there.
00:44:54.000 | I've watched it in some point-of-service payment systems where as I'm signing, the signature pops up on the screen of the clerk, never been questioned on it.
00:45:05.000 | So I don't think this really is a big deal.
00:45:08.000 | I don't think it's a big deal if you do. I don't think it's a big deal if you don't.
00:45:11.000 | I just looked at the cards in my wallet and interestingly, I've never even bothered to sign them.
00:45:16.000 | So they're completely blank and I've used these things without any problem.
00:45:20.000 | I don't even bother to sign them.
00:45:22.000 | I probably will go ahead and write "Check ID" on here.
00:45:26.000 | I don't see any reason not to but I don't expect it to actually do anything.
00:45:31.000 | Tip number 13, buy and use a shredder for all of your financial documents.
00:45:37.000 | You can get a shredder for extremely cheap.
00:45:40.000 | I have one that I bought from the Amazon Basics.
00:45:42.000 | I got a crosscut shredder and I put everything through that thing.
00:45:45.000 | And this is so, so important and so, so valuable to do.
00:45:49.000 | You would be shocked at how much information you have on your paperwork that comes into your house and how much information is easily available if somebody wants to come and just simply go through your documents.
00:46:01.000 | I was always fascinated by the idea of working as a private investigator.
00:46:05.000 | This kind of skullduggery has always appealed to me and I thought it would be fun to be a detective or to be a private investigator or something like that.
00:46:14.000 | And so I used to read books about it.
00:46:18.000 | And one of the most simple things you can do is go and read your competitor's mail.
00:46:21.000 | Go and read somebody that you're investigating.
00:46:24.000 | Read their mail.
00:46:25.000 | And picking up the trash from your competitor's office, your business competitor's office, or picking up the trash from your neighbor's trash can is a time-honored way to gain valuable intelligence on their arrangements and on their business practices and on their personal financial practices.
00:46:41.000 | Even if you don't have, say, a social security number or a checking account number, etc., you can gain a huge amount of data from all those receipts, from all of the companies that the person is doing business with.
00:46:54.000 | So make a practice to buy and use a shredder for all of your financial documents.
00:46:59.000 | I'll link to one, the one that I have.
00:47:01.000 | I've used it for a few years, Amazon Basics, just a simple one.
00:47:06.000 | Or go down to Costco, your office supply store, and just get yourself a good cross-cut shredder.
00:47:12.000 | That makes it so, so helpful.
00:47:14.000 | Number 14, get your financial documents emailed to you and/or if you are concerned about it, consider getting a PO box for financial mail or for personal mail.
00:47:29.000 | The simplest thing, of course, and the freest thing to do is to get your financial documents emailed to your online banking statements instead of to have physical statements.
00:47:37.000 | I still think there's a place for physical statements and I think a lot of people like to get them.
00:47:41.000 | So you should consider getting a PO box for that, especially if you're involved in business or if you live in certain neighborhoods where you are concerned about your mail.
00:47:52.000 | But the mail may have a tremendous amount of information and it's very simple for people to lift the information right out of your mailbox.
00:47:58.000 | Don't – I mean you got to always run the balance here between paranoia and practicality.
00:48:05.000 | I look at it and say, "What's the cost?"
00:48:08.000 | If you're just a normal person living in a normal neighborhood, is there a big cost if somebody grabs your credit card statement out of your mailbox?
00:48:14.000 | It's hard to see it. I don't think so.
00:48:18.000 | But if you're wealthy, if somebody grabs your credit card statement out of your mailbox, that could be very important.
00:48:25.000 | Or if you are politically prominent, that could be important.
00:48:29.000 | Or if you are involved in – you're an activist of some kind, you're involved in a business or a lifestyle that is politically volatile.
00:48:43.000 | Well, now all of a sudden things can change.
00:48:47.000 | So once again, you need to take steps to protect yourself and you got to do it in advance when you have nothing to hide.
00:48:53.000 | Otherwise, you're not going to know how to do it. It's going to sneak up on you.
00:48:56.000 | You don't recognize that being the chief of the school board or being the chief of the local community service organization puts you in a place of exposure until one day when all the news crews are sitting on your sidewalk and there's something out there that you weren't expecting.
00:49:13.000 | So get your financial documents emailed to you using electronic documents or get a P.O. box.
00:49:20.000 | It's a lockable P.O. box and have all of your personal information there, especially if you own a business.
00:49:25.000 | Or especially if you are in a sensitive position of some kind.
00:49:30.000 | Also consider mailing your financial documents from an external mailbox.
00:49:34.000 | It's safer for you to drop your bill payments and your checks into a locked US Postal Service mailbox at a separate location than it is to just put them out in your box with the flag up.
00:49:44.000 | Number 15, encrypt your financial records and your files.
00:49:49.000 | Encrypt your financial records and your files.
00:49:54.000 | Got to ask the question, "Who are we trying to protect things from?"
00:49:57.000 | And you got to be practical about this and not paranoid.
00:50:00.000 | If you are the subject of a global manhunt, your privacy is shot.
00:50:06.000 | You're not getting away.
00:50:08.000 | But if you're just simply worried about a competitor, a business competitor who's searching you out, just simply take some basic steps to use some simple encryption programs.
00:50:17.000 | There are a number of encryption programs that are simple and that are available online.
00:50:21.000 | And make sure that your financial records and files are encrypted and password protected with strong passwords.
00:50:26.000 | Ironically, I think if you really want privacy and security, sometimes physical privacy brings a higher degree of safety.
00:50:35.000 | Everything on the computer is available, especially if the computer is ever connected to the internet.
00:50:40.000 | And so the computer is – I look at computers and I say just about everything is available to anybody.
00:50:47.000 | That's different than maybe you keep a notebook at home or you keep personal ledgers at home, et cetera.
00:50:55.000 | Think of how easily and available and public your information is.
00:51:00.000 | Think before you make political contributions.
00:51:02.000 | The head of Mozilla was – the CEO of Mozilla was forced out of his job because he had made a political contribution primarily because he had made a political contribution to the – I think it was called Proposition 8 in California, which was the state amendment which sought to limit marriage to a man and a woman instead of seeking for homosexual marriage.
00:51:21.000 | So he was forced out of his job because he made a political contribution.
00:51:26.000 | Consider your own actions and consider how your enemies can use those against you.
00:51:31.000 | Consider what they can find and how they'll use those things against you if your financial records are public.
00:51:39.000 | You might consider keeping things physically safe.
00:51:42.000 | Now, the problem with physically safe is that you now have information that's subject to a warrant.
00:51:47.000 | So if you keep a notebook or a ledger with your personal financial transactions in it and you keep that in your safe at home, well, the warrant is going to have that thing cracked open in no time.
00:51:58.000 | And as soon as it's open, there's no limitation on the information.
00:52:04.000 | There are powerful encryption programs that are out there that are freely available online that you can use and you can use it to encrypt your sensitive information.
00:52:11.000 | Easy to use, easy to do.
00:52:13.000 | Most people won't do it simply because they're lazy.
00:52:17.000 | They don't think of it.
00:52:18.000 | If you are concerned at this, if you have things in your life that you need to protect or you are a high-profile person, you should consider taking steps such as making sure that you're using a separate computer that's never connected to the internet, disabling or removing the wireless cards, disabling or removing the Bluetooth information, using something like the signal data security bags from – I'll link it – Mobile Sex Solutions.
00:52:45.000 | That's for laptop-sized bags.
00:52:48.000 | You've got to decide how hardcore you're going to be.
00:52:51.000 | But everybody should have simple good encryption and good – yeah, everybody should have simple powerful encryption protecting their personal information and have it backed up safely and encrypted in a separate location in case of fire, things like that as well.
00:53:08.000 | Number 16, don't give out your social security number freely.
00:53:12.000 | Many of us are guilty of just simply giving our social security number to anybody who asks.
00:53:17.000 | You would be surprised at how few people you actually have to give your social security number to and it will dramatically increase your safety if you give it to very few people.
00:53:28.000 | Years ago, I was working in life insurance and I remember one time, only one time out of hundreds of clients where I was taking an insurance application for a client of mine and I asked him for his social security number and he refused to give it to me.
00:53:42.000 | I was so shocked and he said, "Do I have to give it to you?"
00:53:44.000 | I had no idea if he had to give it to me or not.
00:53:46.000 | It was just written on the form that I was supposed to write down the social security number.
00:53:50.000 | Now, I went later and I called the company and I said, "Does he have to give us his social security number?"
00:53:54.000 | And they said, "No."
00:53:55.000 | He never had to give his social security number.
00:53:57.000 | You don't actually have to give your social security number for a life insurance application.
00:54:02.000 | Now, I think I'm not paranoid.
00:54:06.000 | I think that I want my social security number on my life insurance applications, but I learned a valuable lesson.
00:54:14.000 | I learned that he knew more than I knew and I respected him for that because guess what?
00:54:20.000 | His application is in my desk drawer.
00:54:24.000 | I did my best to care for his personal information and to lock it, but I know lots of insurance agents whose files are stacked all over the place and there's information all over the place.
00:54:34.000 | I tried really hard.
00:54:36.000 | Our company, we had good standards.
00:54:38.000 | I tried to go above and beyond.
00:54:40.000 | I tried to encrypt all the – I tried to upload, keep the records digitally, have good protection, and they did a lot from the corporate end as well to help secure those records.
00:54:51.000 | But the reality is that little pieces of paper with your information float around all over the place and it's up to you to control that flow of the information.
00:54:59.000 | So don't give out your social security number freely.
00:55:01.000 | Most places will accept or create some other type of identification that's not your social security number and that's not your problem.
00:55:10.000 | That's their problem.
00:55:12.000 | This social security number has – just use of it has gotten extreme.
00:55:17.000 | Number 17, keep your personal information physically secure.
00:55:22.000 | Much of identity theft, and I want to say most, but I don't know the data on this, so I can't prove it, and I didn't research it.
00:55:31.000 | So I'll just say much.
00:55:32.000 | Much identity theft is actually committed by a relative, perhaps a close relative, or a friend who gains access to your physical information.
00:55:43.000 | They come over to your house.
00:55:45.000 | They slip into your office, pull open the desk drawer, and grab the information.
00:55:49.000 | They're a loved one or a family member and they're over for the holidays and they need the money, and so they use your information to inflict identity theft.
00:55:59.000 | So what can you do?
00:56:01.000 | Well, keep your personal information secure.
00:56:04.000 | If I came to your house right now and I had about 20 minutes in your house unmolested, how much of your personal information could I be able to access?
00:56:19.000 | Go and change it.
00:56:21.000 | Get locking desk drawers.
00:56:23.000 | You can buy a locking file cabinet.
00:56:25.000 | You can get a locking security cabinet.
00:56:27.000 | Buy a gun safe.
00:56:29.000 | Do something to protect your information.
00:56:31.000 | Digitize it so you can encrypt it and hide it on an encrypted password-protected thumb drive, and then shred it, but keep your personal financial information physically secure.
00:56:45.000 | Number 18, set up a circle of payment transactions to protect yourself and to protect your credit, your banking, etc.
00:56:52.000 | In my personal financial management, I have every credit card set up to where there's always an automatic minimum payment that gets made.
00:57:02.000 | The minimum payment automatically gets drafted from one of my checking accounts.
00:57:08.000 | My checking accounts are automatically backed up in case of overdraft to a backup account and/or to a credit card account.
00:57:16.000 | So there's a circle of protection in place so that if something happens, my whole financial life doesn't fall apart.
00:57:23.000 | Now, will I pay money for the cash advances on a credit card to just backing up a checking account, etc.?
00:57:30.000 | Yes, I will.
00:57:31.000 | I'll pay interest fees.
00:57:33.000 | But compared to the problems of having the whole system fall apart, that cost would be very small.
00:57:39.000 | So set up your personal accounts so that you never neglect a payment.
00:57:44.000 | If you are late on a payment with a utility, whatever.
00:57:48.000 | Just send them the payment, pay the fee.
00:57:50.000 | It's no big deal.
00:57:51.000 | That doesn't affect your credit in the short term until they actually take out a judgment and go for the information.
00:57:57.000 | However, on the other hand, if you balance a payment or you miss a payment with your credit card company, that's a much bigger deal because your credit card company is going to report that information to the agencies.
00:58:11.000 | And that information will be passed along.
00:58:14.000 | So set up a system of automatic transactions to protect yourself.
00:58:18.000 | Make sure that all your credit cards are automatically paid.
00:58:21.000 | Make sure that your checking accounts have overdraft protections that are linked to your credit cards.
00:58:26.000 | Make sure that everything is set up so that if your information is compromised, that you are going to be squared away.
00:58:34.000 | Remember, you've got to do the stuff now to make good habits and protect yourself.
00:58:39.000 | Now's the time.
00:58:40.000 | Don't wait until later.
00:58:41.000 | Don't wait until you have something to hide because it's a whole lot harder when you have something to hide.
00:58:45.000 | You're not going to know what to do.
00:58:46.000 | Protect yourself now.
00:58:47.000 | You have nothing to hide.
00:58:49.000 | That doesn't mean that your information should be publicly available.
00:58:53.000 | And when you know that tomorrow your email company is going to send you an email and say, "I'm sorry, but 1.7 million of our customers' transactions were exposed in a data breach."
00:59:04.000 | And when you know that your credit card company is going to be on the news next week, it's your job to step up and protect yourself.
00:59:12.000 | Protect your security and protect your privacy.
00:59:15.000 | I hope these tips have been useful to you.
00:59:18.000 | I tried to keep these interesting but practical.
00:59:22.000 | Again, all of these are either free or very cheap.
00:59:25.000 | So these are practical.
00:59:26.000 | You should go back through and do all 18 of these within the next couple of weeks if you're missing anything.
00:59:33.000 | If you want more on this topic, I'd be happy to do more shows on protecting your security and your privacy.
00:59:40.000 | If you're interested in the real tinfoil hat stuff, let me know.
00:59:43.000 | I'd be happy to talk about that.
00:59:44.000 | You've got to always be careful with this stuff because there's a balance between paranoia and practicality.
00:59:49.000 | And you can get super, super private, but it comes with a cost.
00:59:54.000 | And for most of us, it's just not worth the cost.
00:59:56.000 | But if you have suggestions, if there's anything I missed, please come by the show page at RadicalPersonalFinance.com and let me know.
01:00:03.000 | And as the music winds down, I ask you to do just a couple things here real quick.
01:00:06.000 | Number one, if you haven't rated or reviewed my show on iTunes yet, please do that.
01:00:12.000 | Just pull up iTunes right on your phone.
01:00:14.000 | Leave a quick rating or review.
01:00:15.000 | Tell me it's great.
01:00:16.000 | Tell me it's terrible.
01:00:17.000 | But please, please, please, it's totally free.
01:00:20.000 | It doesn't cost you anything.
01:00:21.000 | And it's super, super helpful to me.
01:00:22.000 | It makes a big, big difference.
01:00:24.000 | And finally, also, number two, if you've enjoyed and appreciated this content, please come by and consider becoming a supporter of the show, a financial supporter.
01:00:32.000 | You can do that at RadicalPersonalFinance.com/patron.
01:00:35.000 | You figure out how much money I saved you today and come and give me some of it at RadicalPersonalFinance.com/patron.
01:00:43.000 | Hey, Cricket customers.
01:00:44.000 | Max with Ads is included with your Cricket $60 unlimited plan at no additional cost.
01:00:49.000 | Nice!
01:00:50.000 | Max is the streaming platform where you can watch Scoob, Meg 2 The Trench, The Nightmare on Elm Street Collection, and so much more.
01:00:56.000 | Remember me.
01:00:57.000 | Just log in with your Cricket username and password to experience Max on all your favorite devices.
01:01:02.000 | We never say this before.
01:01:03.000 | Max, the one to watch for a good scream with Cricket.
01:01:06.000 | Yeah!
01:01:08.000 | Phone plan, streams, and standard definition.
01:01:09.000 | Programming subject to change.
01:01:10.000 | Fees, terms, and restrictions apply.
01:01:11.000 | and restrictions apply. See Cricut Wireless.com for details.