back to indexATHLLC3608357084
00:00:01.700 |
I love helping you answer all the toughest questions about life, money, and so much 00:00:08.060 |
more, but sometimes it's helpful to talk to other people in your situation, which 00:00:12.880 |
actually gets harder as you build your wealth. 00:00:14.940 |
So I want to introduce you to today's sponsor, Longangle. 00:00:18.200 |
Longangle is a community of high net worth individuals with backgrounds in 00:00:22.240 |
everything from technology, finance, medicine, to real estate, law, 00:00:29.480 |
I've loved being a part of the community, and I've even had one of the founders, 00:00:33.040 |
Tad Fallows, join me on all the hacks in episode 87 to talk about alternative 00:00:37.940 |
Now, the majority of Longangle members are first generation wealth, young, highly 00:00:42.660 |
successful individuals who join the community to share knowledge and learn 00:00:46.400 |
from each other in a confidential, unbiased setting. 00:00:49.600 |
On top of that, members also get access to some unique private market investment 00:00:55.200 |
Like I said, I'm a member and I've gotten so much value from the community 00:00:59.120 |
because you're getting advice and feedback from people in a similar 00:01:02.300 |
situation to you on everything from your investment portfolio, to your 00:01:06.280 |
children's education, to finding a concierge doctor. 00:01:09.240 |
So many of these conversations aren't happening anywhere else online. 00:01:13.160 |
So if you have more than 2.2 million in investable assets, which is their 00:01:17.440 |
minimum for membership, I encourage you to check out Longangle and it's totally 00:01:26.400 |
And if you choose to apply, be sure to let them know you heard about it here. 00:01:34.640 |
Hello, and welcome to another episode of All The Hacks, a show about upgrading 00:01:41.760 |
your life, money, and travel all while spending less and saving more. 00:01:45.280 |
If you're new here, I'm your host, Chris Hutchins, and I'm excited to have you on 00:01:48.760 |
my journey to optimize my own life by sitting down each week with the world's 00:01:52.520 |
best experts to learn the strategies, tactics, and frameworks they use for 00:01:58.080 |
Today, I'm talking with Adam Levin, who's an absolute expert on cybersecurity, 00:02:04.840 |
At 27, he became the youngest director in the history of the New Jersey 00:02:10.440 |
He later went on to found at least two companies, Credit.com, which focused on 00:02:15.160 |
consumer credit building and was acquired in 2015, and CyberScout, a global 00:02:19.360 |
identity and data protection company that helped pioneer the cyber insurance 00:02:25.320 |
On top of all that, he's the author of the critically acclaimed book, Swiped, 00:02:29.040 |
How to Protect Yourself in a World Full of Scammers, Fishers, and Identity Thieves. 00:02:33.000 |
And he hosts the weekly cybersecurity podcast, What the Hack. 00:02:36.040 |
For many months, I've been wanting to do an episode on everything you need to 00:02:41.640 |
So I'm really excited that I got connected with Adam. 00:02:43.920 |
We're going to talk about how to protect yourself from all these threats, what 00:02:47.200 |
kind of tools and services like VPNs, or security keys, or credit 00:02:52.440 |
Basically, I want to leave you with everything you need to 00:02:57.200 |
That is a lot to cover, so let's get started. 00:03:04.640 |
So just to kick us off, I want to know, what do you think is the most 00:03:08.560 |
common thing you see most people doing wrong when it comes to 00:03:13.480 |
Well, I mean, password protocol is terrible with most people. 00:03:18.000 |
Most people pick a easily decipherable, simple password because that's what 00:03:23.520 |
they can remember, and they use it everywhere. 00:03:26.320 |
And unfortunately, what you have to understand is that even assuming that 00:03:31.640 |
you had the most indecipherable, sophisticated password possible, if 00:03:38.080 |
it's been exposed as a result of a leak or a breach, then it's discovered. 00:03:43.920 |
And a discovered password is no good to you anymore. 00:03:47.040 |
And if it's through your entire universe of websites, it's going to 00:03:52.720 |
So you really have to think hard about the kinds of passwords you're going to use. 00:03:57.520 |
In fact, that's why most people use password managers that want to simplify 00:04:01.920 |
their lives, but you need to do that because one ubiquitous password in your 00:04:06.520 |
life is guaranteed to create a problem for you. 00:04:09.960 |
Password managers often will tell you this password's been in a breach. 00:04:13.600 |
There was a site that was like, "Have I been pawned?" 00:04:15.560 |
Is that still like the gold standard of finding out what passwords of 00:04:26.480 |
And you can also now track your phone number too, because the issue is that 00:04:32.200 |
for years we've been told that the ultimate skeleton key to your life 00:04:40.960 |
But if you think about it now, everybody gives their cell phone 00:04:46.960 |
And on top of which it's not something, because they're now portable, nobody's 00:04:53.960 |
So this is a number that's going to stick with you most of your 00:05:03.720 |
What's the risk of your phone number being out there? 00:05:06.320 |
Obviously people can call you, but is it that they could know your number and 00:05:10.560 |
spoof your number, calling customer service and pretend to be you with 00:05:14.200 |
automated systems or why is having your number out there as bad or dangerous as 00:05:19.440 |
maybe your email password, which makes more sense to me why that would be a bad 00:05:23.120 |
Well, the reason why having your number out there is a problem is because if you 00:05:26.840 |
think about it, most people who use multi-factor authentication, the second 00:05:31.360 |
factor tends to be a code sent to their phone number. 00:05:34.760 |
If your phone number is stolen as a result of a SIM swap, which is not as 00:05:39.400 |
difficult as one would think is for a few bucks. 00:05:43.240 |
Unfortunately, people call people at mobile providers and get them to switch 00:05:50.000 |
things based on the fact that they go, I'm sorry that I forgot my password. 00:05:54.960 |
And this is my phone number and I just got a new device by the way. 00:06:01.720 |
And then all of a sudden you don't get the code. 00:06:04.560 |
We've had cases where people have lost millions in cryptocurrency because the 00:06:10.720 |
code was sent to the phone number that had been stolen by a hacker. 00:06:14.440 |
Now, I know five, 10 years ago, SIM swapping hit all the news, it was a big 00:06:20.200 |
thing, is it still happening as much as it was or have the carriers gotten better 00:06:24.480 |
about requiring more information to switch a phone number or is it still a 00:06:28.960 |
Well, again, if you pay somebody off, it doesn't matter what kind of protocols 00:06:35.280 |
And of course, now you have the opportunity to use a PIN number as an 00:06:40.200 |
additional layer of security for someone calling to find out more about your 00:06:44.960 |
The only problem is that a lot of people, just like we tend to use simple 00:06:48.360 |
passwords, people use codes like 0 0 0 0 1 2 3 4 9 8 7 6. 00:06:55.360 |
So it's not that difficult to guess for some of the bad guys. 00:07:00.280 |
So it sounds like a quick thing everyone needs to do. 00:07:03.080 |
If you're not already using a password manager, go back to basics. 00:07:07.040 |
I think most people here have probably heard me talk about password managers 00:07:10.440 |
enough to hopefully have gotten on the board with that train, but calling your 00:07:15.160 |
cell phone carrier and making sure you have that PIN set up. 00:07:18.240 |
I know I called Verizon once and just said, Hey, can you put me in some sort of 00:07:22.520 |
more secure version of an account that can work with some banks, financial 00:07:28.960 |
I also like to change my mother's maiden name and give them a different word or 00:07:33.720 |
number or any string of characters than an actual mother's maiden name, because 00:07:38.680 |
that like your phone number is not too difficult to find online. 00:07:41.600 |
Are there any other fundamental basics to protect yourself from SIM swapping 00:07:49.480 |
And if all of a sudden you're not getting phone calls or you're not getting texts 00:07:55.600 |
or something just doesn't feel right, immediately contact your mobile provider. 00:07:59.840 |
But you also brought up an interesting thing too, when you talk about changing 00:08:04.080 |
I always say to people, listen, when you set up security questions and 00:08:08.720 |
Clark Kent is not going to tell people he's Superman. 00:08:11.000 |
Bruce Wayne doesn't run around saying, Hey, I'm Batman. 00:08:13.760 |
So if your mother's maiden name is Smith, tell people it's Jones. 00:08:19.120 |
If you went to Ridgefield High School, tell them you went to Southwick. 00:08:25.920 |
It's not as if you were doing an interview to get a security 00:08:32.080 |
All you're trying to do is create something that will be a benchmark. 00:08:43.000 |
I use one password and I generate a random string of characters. 00:08:50.080 |
Like it's just a bunch of numbers and symbols and letters, but it certainly 00:08:54.320 |
And the same goes for the high school I went to or my dog's name 00:08:57.400 |
or things that you might actually be able to find out online. 00:09:03.680 |
So so there's a lot of places we could take this, right? 00:09:15.160 |
You mentioned Social Security number is this protected thing 00:09:24.440 |
I feel like for, I don't know, one in three Americans now, 00:09:29.720 |
Is that still as easily accessible such that if someone wants 00:09:33.440 |
your Social Security number and they try hard enough, they can probably get it? 00:09:40.920 |
We're talking about over the past several years, billions. 00:09:46.160 |
Evil Pinky to the lip be billions, billions of files 00:09:51.280 |
have been exposed through data leaks, breaches, 00:09:55.480 |
people hitting the wrong key and information getting out there. 00:10:00.000 |
People just giving out their Social Security number. 00:10:02.480 |
I mean, think about every time you go to the doctor's office, the dentist's office. 00:10:07.560 |
Your Social Security number, which, by the way, you can say, no, 00:10:10.520 |
I'm not giving you my Social Security number. 00:10:12.960 |
They're not going to throw you out because they're either operating 00:10:18.800 |
or they're going to get a credit card before you ever get out the door. 00:10:22.680 |
So you don't need to give them your Social Security number. 00:10:26.320 |
We need to say, no, we have to have it for insurance purposes. 00:10:31.440 |
There have been stories about people at their children's Little League games. 00:10:35.760 |
They were passing around these sheets and people were filling him out. 00:10:39.680 |
It's like, yeah, let me have your Social Security numbers. 00:10:45.200 |
They kind of toss it out like you were tossing out rose petals. 00:10:48.880 |
I think you have to assume your Social Security number is out there. 00:10:51.880 |
You have to assume most of your information is out there. 00:10:54.680 |
So it's really about something that I developed with my collaborator, 00:10:59.800 |
Beau Friedlander, who's also my co-host on What the Hack with Adam Levin. 00:11:05.320 |
How to Protect Yourself in a World Filled with Scammers, 00:11:13.480 |
How do you minimize your risk of exposure, reduce your attackable surface? 00:11:17.320 |
How do you monitor it so you effectively know that there's a problem 00:11:26.120 |
So what you're raising right now with the fact that our information is out there 00:11:30.040 |
is how do you effectively monitor so you know as quickly as possible 00:11:36.120 |
Well, one of the things you do is, as we mentioned earlier, 00:11:38.840 |
you go to the site Have I Been Pawned and see whether or not your user ID 00:11:45.240 |
And then looking at the particular breach where it was exposed, 00:11:49.560 |
you're going to know, based on the information that has been provided 00:12:12.560 |
If something doesn't look right, contact the credit reporting agency. 00:12:16.720 |
You need to be looking for things you didn't do, 00:12:20.320 |
as well as things that you might have done that you forgot you did. 00:12:24.680 |
But review it and make sure that it says what you think it should say. 00:12:29.400 |
And if it has additional dates of birth out there for you 00:12:34.320 |
or different places where you've never worked or different home addresses, 00:12:40.080 |
So get your credit report, monitor your credit scores, 00:12:43.400 |
because if your credit scores take a sudden precipitous drop 00:12:47.320 |
that you can't explain, then it's either one of three reasons. 00:12:53.360 |
Not good. You need to know that you're using too much of your available credit. 00:13:05.760 |
Also sign up for what's called transactional monitoring alerts. 00:13:10.000 |
This is from your financial institutions, your credit card companies. 00:13:14.760 |
It's free and it notifies you any time there's any activity in your account. 00:13:19.960 |
And if you see activities going on that do not look familiar, 00:13:24.640 |
then you have to notify your financial institution or the credit card 00:13:28.600 |
company immediately. But that's one of those red flags. 00:13:31.680 |
Also, believe it or not, look at your explanation of benefits 00:13:36.160 |
statements that you receive from your health insurance company, 00:13:39.040 |
because a lot of people have discovered that they were victims 00:13:42.960 |
of medical identity theft because there was a treatment on there 00:13:46.880 |
or an appointment on there that they never had with a doctor 00:13:57.000 |
And then finally, there are much more sophisticated forms of monitoring 00:14:00.400 |
that come from the three credit reporting agencies, 00:14:03.520 |
as well as third party providers where they have a number of different things 00:14:09.720 |
You need them to be monitoring your Social Security number 00:14:15.640 |
And then you need to get things like what's called instant alerts, 00:14:22.640 |
somebody using your information to open an account. 00:14:25.640 |
But it's, hey, Chris, somebody is attempting to open an account right now. 00:14:33.120 |
And then you need to have monitoring that monitors the dark web, 00:14:37.840 |
because if it shows up, that your information is out there 00:14:41.280 |
and it will tell you what information has been discovered on the dark web, 00:14:56.360 |
So just to recap, so I know getting your credit report, 00:14:59.160 |
free annual credit report dot com, you can get it for free. 00:15:03.080 |
I believe even right now, as a result of maybe the pandemic, 00:15:06.680 |
you can get it more regularly than once a year. 00:15:09.080 |
You were getting it in some cases either once a month or once a week, 00:15:14.800 |
And then a lot of the alerts you talked about are free. 00:15:18.520 |
I have an account with Experian, Equifax and TransUnion. 00:15:21.160 |
I get alerts. I don't pay for any of those premium services. 00:15:26.720 |
Gosh, I probably have five different ways to get it for free, 00:15:29.840 |
whether it's Credit Karma, which isn't necessarily your FICO score, 00:15:32.800 |
but it is a score or different credit card companies. 00:15:38.000 |
I think Capital One gives you a free credit score. 00:15:40.480 |
Are there any of the credit monitoring and reporting services 00:15:44.320 |
that you actually should pay for, or are they a little bit 00:15:48.160 |
fluffy products that people create for people who are worried? 00:15:52.960 |
I know you can freeze and lock your credit, which I do for free also. 00:15:58.360 |
That's as a result of an amendment to a banking law 00:16:06.760 |
because you really need them to take in-depth dives. 00:16:11.200 |
Whereas with free credit reports, you can get them 00:16:15.160 |
frequently, although a little less frequently now. 00:16:18.200 |
The important thing is you really need to keep up to date. 00:16:21.680 |
And with that payment, you're not just paying for the monitoring, 00:16:26.680 |
but you're also getting access to a professional 00:16:29.920 |
that can help you through identity incidents. 00:16:33.040 |
And that's really the third M is that how do you manage the damage? 00:16:37.040 |
Now, a lot of people don't realize that through their insurance companies, 00:16:41.800 |
some financial institutions, and now more and more through their employers, 00:16:46.400 |
there are programs available to help you through identity incidents. 00:16:50.280 |
In some cases, it's free as a perk of your relationship with the institution. 00:16:58.880 |
But you have to really think about how important it is to know 00:17:03.600 |
whether or not you've got a problem and have somebody 00:17:09.200 |
I get that if you are involved in an incident, it can be helpful 00:17:12.360 |
to have an expert kind of manage the entire process. 00:17:14.960 |
But for just monitoring, would you say everyone needs to be using 00:17:19.560 |
a premium service or how do you kind of set the threshold for someone thinking, 00:17:24.080 |
I get my alerts, I get my transaction alerts. 00:17:26.240 |
I check my credit every so often when my score changes, I get an alert. 00:17:30.080 |
Does the average person in that circumstance who hasn't yet been a victim 00:17:33.880 |
of any fraud or theft need the premium services? 00:17:40.760 |
And you have opportunities to select amongst those premium services. 00:17:46.040 |
And even then, the level of premium service you wish to get. 00:17:50.720 |
And it really has to do with your comfort level 00:17:59.000 |
you think you are based on the alerts you're seeing. 00:18:09.760 |
And if you talk to a lot of the folks who have been on both sides 00:18:13.600 |
of the cyber world, they will all tell you that so much information 00:18:18.920 |
is out there about us right now, that the fact that each and every one of us 00:18:23.680 |
hasn't become a victim of some form of identity theft 00:18:26.600 |
is simply because they haven't gotten around to us yet. 00:18:32.600 |
But I can tell you, having owned a company, well, first a company 00:18:35.640 |
that was involved in monitoring and then a company that was involved 00:18:39.960 |
in managing damage and taking care of people. 00:18:42.200 |
It really depends on what you want to get out of it, 00:18:49.880 |
if you get the more moderately priced monitoring programs. 00:18:53.400 |
And you really need to know and you need to know as quickly as possible. 00:19:00.600 |
I imagine if I Google credit monitoring services, there's thousands. 00:19:05.760 |
and probably just repackaging what you can get for free for a fee. Right. 00:19:09.040 |
Are there particular companies or services that you think 00:19:12.640 |
are actually providing that added value for their fees? 00:19:15.480 |
There are. I generally don't single out anybody specifically. 00:19:19.440 |
And it's not because I'm being paid by anybody in particular. 00:19:22.760 |
It's just I really feel like it's a function of 00:19:27.520 |
Now, the Consumer Federation of America has a website. 00:19:34.640 |
I could be wrong, but it's just like a Consumer Federation of America. 00:19:39.000 |
They actually have the majority of the major players 00:19:49.960 |
And what they do at that website is they give you a list of questions 00:19:56.200 |
and answers to think about when you're searching for someone 00:20:00.080 |
to monitor your credit or to actually help you through a credit incident. 00:20:04.120 |
And it's really worth it to go to that website. 00:20:07.440 |
But there are a number of very good companies that have very good 00:20:14.000 |
But as with anything, take time and do your research. 00:20:17.960 |
I was hoping I could skip a little of the research and get the answers from you. 00:20:22.160 |
Are there any companies, you know, in the space that's like 00:20:24.680 |
definitely avoid like companies that are on your blacklist 00:20:28.200 |
of credit monitoring and identity theft protection? 00:20:30.440 |
Are there services where you're like, no, I just skip over lifelock? 00:20:36.040 |
Well, no, see, now you're getting me to actually recommend certain companies. 00:20:40.920 |
I don't. First of all, OK, I'll give you some. 00:20:47.440 |
I can tell you for years I've used the Experian 00:20:50.200 |
and Protect My ID, their program, that's very good. 00:20:53.600 |
My old company, Credit.com, we had a number of products and services 00:20:57.560 |
that we matched people with that were very good. 00:21:00.320 |
And I'm sure the folks at Credit Karma and other places 00:21:05.200 |
Another place to go just for just great advice 00:21:08.800 |
in general is the Identity Theft Resource Center. 00:21:18.720 |
And and for those people who who don't use paying services 00:21:22.680 |
and are in trouble and need help and are victims of identity incidents, 00:21:26.280 |
they actually work with some of the bigger companies 00:21:29.800 |
and have a deal going on where these companies will help them 00:21:36.320 |
So the Identity Theft Resource Center, ITRC, OK, is is very good. 00:21:41.120 |
Thanks for giving some information that I know you didn't want to. 00:21:44.720 |
Yeah, science has shown that being charitable 00:21:48.760 |
can actually have a huge impact on your happiness, 00:21:51.760 |
which is why I'm excited to be partnering with Daffy today. 00:21:54.600 |
They're a not for profit community built around a new modern way to give, 00:21:58.680 |
and they have a mission I think we can all get behind, 00:22:04.280 |
Amy and I use Daffy for all of our giving because they offer an account 00:22:08.440 |
that makes it easy to put money aside for charity. 00:22:11.080 |
You can make a one time contribution or you can set a little aside 00:22:14.720 |
each week or month, and all your contributions are tax deductible, 00:22:19.160 |
except you don't actually have to know exactly 00:22:23.880 |
In fact, you can make your tax deductible contribution now 00:22:27.160 |
and invest that money into stocks or even crypto 00:22:30.360 |
so it can grow tax free and let you have more impact in the future. 00:22:34.360 |
Then whenever you're ready, you can give to any of more than 00:22:38.320 |
one and a half million charities, schools or faith based organizations 00:22:44.240 |
So head on over to all the hacks dot com slash Daffy 00:22:47.760 |
if you want to start giving today and for a limited time. 00:22:51.040 |
If you visit that link, you can get a free twenty five dollars 00:22:56.760 |
Again, that's all the hacks dot com slash Daffy. 00:23:02.280 |
In today's Internet age, people's personal information 00:23:07.200 |
is being shared online with the click of a button without their consent, 00:23:13.240 |
But you can tackle this problem thanks to Delete Me from Abine, 00:23:18.640 |
And I am excited to be partnering with them for this episode. 00:23:21.400 |
When I used to Google myself, I would find hundreds of detailed profiles 00:23:25.800 |
sharing my cell phone number, address, email, family members and a lot more. 00:23:30.240 |
At first, I actually tried to remove it all myself, which you can do. 00:23:34.080 |
But after at least 10 hours, I signed up for Delete Me. 00:23:39.080 |
Their software and team of experts will not just find and remove 00:23:42.640 |
your personal information from hundreds of data broker websites, 00:23:46.280 |
but they'll continuously scan for new data that shows up 00:23:52.080 |
On average, Delete Me finds and removes over 2000 pieces of data 00:23:58.400 |
So if you want to get your personal information removed from search results 00:24:02.160 |
on the Web, go to all the hacks dot com slash Delete Me 00:24:06.240 |
and get 20 percent off a plan for you or your entire family. 00:24:10.040 |
Again, that's all the hacks dot com slash Delete Me with credit cards. 00:24:15.640 |
I think a lot of the reason people are not too worried 00:24:18.240 |
about just putting their credit card number online is that most, 00:24:21.200 |
if not all credit card companies nowadays take the burden 00:24:24.360 |
of the risk of something happening and fraudulent charges. 00:24:27.920 |
But one thing I don't think I know, so I'm assuming most people don't. 00:24:31.040 |
If someone uses your Social Security number to open a bank account 00:24:34.840 |
or take out a mortgage or a loan or buy a car, 00:24:37.440 |
how much of the liability ends up falling on you? 00:24:41.560 |
Is the risk all the hassle of cleaning it up? 00:24:44.520 |
Or is there actually risk that you could be liable for what happens 00:24:47.480 |
and someone else won't pick up the tab like they might with credit card fraud? 00:24:50.760 |
Well, we've seen, for instance, situations where people have had 00:24:54.920 |
their Social Security numbers used to take mortgages out on their homes. 00:24:59.080 |
That becomes problematic because you really need attorneys for that. 00:25:08.080 |
a mortgage removed from your home when the money was actually taken 00:25:13.720 |
Now, your insurance company can be very helpful there. 00:25:16.800 |
Check with your insurance company and find out if they have identity 00:25:20.000 |
protection programs, if it's automatic or you need to bring it on 00:25:26.520 |
Oftentimes your homeowner's policy, your renter's policy. 00:25:30.160 |
Now even they're offering identity theft services through auto owner policies. 00:25:35.520 |
But you may need that insurance coverage for that that you may pay for. 00:25:42.200 |
It's just generally a fee for an endorsement. 00:25:49.160 |
Now, the Consumer Financial Protection Bureau just came out and kind of dropped 00:25:53.040 |
the hammer on a number of those peer to peer payment apps 00:25:57.240 |
because so many people have had their information stolen, the app used 00:26:01.800 |
or they in good faith used it because they thought they were dealing 00:26:05.640 |
with somebody real and not an identity thief or a hacker or a scammer. 00:26:10.760 |
And of course, they do tell you before you hit that button, 00:26:19.080 |
Let me take you back to sort of the beginning of identity theft. 00:26:22.280 |
And in the early days of dealing with identity theft issues 00:26:33.560 |
And in fact, the consumer was considered collateral damage. 00:26:49.000 |
It's now down in most cases to zero debit cards. 00:26:57.640 |
But in some cases, the financial institution will say that 00:27:01.600 |
before we return your money to you, we have to do an investigation 00:27:06.000 |
and we have to feel comfortable that you didn't just do something dumb 00:27:11.200 |
and you're trying to get us to cover your loss. 00:27:13.840 |
Fortunately, most people listening here are a big fan 00:27:17.520 |
of earning credit card points and aren't using their debit card much. 00:27:20.480 |
But the identity theft, I'd love to go back to the beginning. 00:27:26.160 |
Well, it's evolved now that there is a greater understanding of the fact 00:27:30.080 |
that millions upon millions of people have become victims of identity theft. 00:27:33.880 |
And in many cases, through no fault of their own, simply 00:27:37.120 |
their information was on the wrong database at the wrong moment 00:27:42.800 |
And now suddenly they're victims of identity theft. 00:27:45.280 |
And you have so many different levels of identity theft. 00:27:49.920 |
You have the low hanging fruit, which is account takeover, 00:27:53.040 |
which has to do with credit cards and debit cards. 00:28:00.320 |
That's where someone using your information has gone about the countryside, 00:28:04.040 |
happily opening accounts in your name with your information, 00:28:07.640 |
running up the balances and then disappearing into the sunset. 00:28:11.400 |
And then you get other forms of identity theft, like medical identity theft, 00:28:16.640 |
where someone using your information gets medical treatment in your name, 00:28:20.160 |
has a procedure in your name, has appointments in your name. 00:28:23.960 |
In most cases, it's a fraud against the insurance company, 00:28:27.040 |
but it could come back to haunt you depending upon your lifetime allowances. 00:28:30.880 |
But in cases where insurance wasn't involved, 00:28:34.560 |
you've had many situations where people get a bill 00:28:38.120 |
that comes out of nowhere from a medical provider. 00:28:42.480 |
And they end up having problems with their credit reports 00:28:45.760 |
and fighting with the medical provider and being sued. 00:28:49.000 |
And there is a greater understanding of that now. 00:28:55.120 |
Kids have no idea because they don't check their credit. 00:28:58.320 |
They don't even think they have a credit report. 00:29:00.560 |
Most parents don't check their kid's credit reports, although that's changing. 00:29:04.760 |
But in that case, we had one guest on What the Hack. 00:29:08.720 |
Axon Betts Hamilton has become a very famous expert on identity theft 00:29:13.360 |
where she was a victim and her mother was the thief. 00:29:17.640 |
Her mother stole her identity, her father's identity. 00:29:20.720 |
Her grandfather's identity had a second life. 00:29:24.680 |
And as Axton said, I spent Thanksgiving sitting across the table 00:29:37.160 |
of identity theft victims where it occurs within the family. 00:29:42.080 |
Foster children, for example, 10% are victims of identity theft, 00:29:46.800 |
because as they go through the foster system, they have a card 00:29:50.320 |
with their information that's passed from family to family to family. 00:29:54.200 |
And in many cases, that information is used to steal their identity. 00:30:00.720 |
And now the government's gotten involved and try to be more helpful 00:30:05.160 |
The reporting agencies are much more understanding when it comes to this. 00:30:19.400 |
You could end up with no life and no job and no family 00:30:23.720 |
because you're spending so much time focusing on resolving 00:30:28.520 |
For instance, if you become a victim of criminal identity theft, 00:30:34.200 |
That's where someone using your information commits a crime. 00:30:37.640 |
There was a movie Identity Thief that you may have seen, 00:30:42.160 |
We had a case once a fellow was driving through the Midwest. 00:30:47.800 |
All of a sudden, his car is surrounded by guys with guns. 00:30:55.600 |
They take him to jail and he gets out in a couple of days. 00:31:02.520 |
And sometimes it takes a not insignificant amount of time 00:31:05.960 |
to clear your name if you're a victim of criminal identity theft. 00:31:09.760 |
Is there a way that he could have prevented that? 00:31:11.640 |
Obviously, committing a crime isn't something 00:31:13.800 |
that's necessarily going to show up on your credit report. 00:31:16.840 |
I know every time you apply for a job, they run a background check. 00:31:21.440 |
monitoring service to see if things like that are happening? 00:31:24.080 |
There are some of the services now that will monitor 00:31:30.360 |
whether you've had incidents of a criminal nature 00:31:34.520 |
or at least there are warrants out there for you and you might not know about. 00:31:39.240 |
But criminal identity theft is something that you can almost do 00:31:43.440 |
It's just someone did it, used your information, committed the crime. 00:31:47.040 |
How do you prove you didn't commit a crime, right? 00:31:50.000 |
That's a little more difficult than someone nailing you for committing a crime. 00:31:55.680 |
That's why it's so important for people to be alert. 00:31:57.960 |
If you get a notification about something, don't assume 00:32:02.160 |
if you know nothing about it, that it's a mistake. 00:32:08.880 |
and try to do something about it, because it could be somebody committing 00:32:12.480 |
a fraudulent act and getting you to click on the wrong link 00:32:18.280 |
I want to come back to a few things, but when you get that link, 00:32:22.000 |
when you get that email, I think it's wild to me how many different examples 00:32:26.880 |
I've seen recently of successfully convincing people that this is the right 00:32:31.640 |
link, whether it's using some weird font that isn't actually the right font. 00:32:34.920 |
I've seen one where someone had the domain registered 00:32:41.280 |
So it looks in a small window like it's correct, but then it's mail.google.com 00:32:45.520 |
dot some other address, dot some other address. 00:32:48.280 |
And so it actually looks like the right prefix, but it's not. 00:32:51.680 |
I always say, of course, look at the full URL, look at the full sender. 00:32:55.720 |
Are there other things in those moments that people could quickly do 00:32:58.840 |
just to make sure or validate that it's correct? 00:33:01.520 |
Well, if you get a notification from what appears to be 00:33:06.440 |
an organization of authority, first, you have to think about it. 00:33:11.960 |
Police departments wouldn't normally send you an email and go, Hey, by the way, 00:33:16.360 |
we think you've committed a crime to notify us here. 00:33:18.640 |
What you should do, even if you get one that looks really, really official, 00:33:25.880 |
and independently confirm the contact information 00:33:29.600 |
and then reach out to them and say, I got the strangest thing. 00:33:35.320 |
Now, most people don't like to red flag themselves with the IRS. 00:33:38.920 |
But at the same point, you need to make sure that you're dealing with the IRS. 00:33:44.440 |
And of course, generally, the only way they deal with you 00:33:47.000 |
initially is you get a letter, maybe not a letter you want to receive, 00:33:52.880 |
They don't call you unless you owe them money. 00:33:58.880 |
They've sent you notice after notice, after notice. 00:34:03.360 |
And then you might might get a call from a legitimate debt collector. 00:34:08.040 |
There are about three or four that have been designated by the IRS. 00:34:19.160 |
You never get something in the eyes of saying, unless you pass right now, 00:34:24.360 |
we're sending someone to arrest you or even a phone call. 00:34:29.560 |
You're always offered an opportunity to have a conversation with an agent 00:34:34.440 |
and reach a settlement agreement with the IRS, for example. 00:34:43.480 |
Think of it as the music is the same, but the lyrics change 00:34:49.520 |
or what the scammer or the hacker is trying to achieve. 00:34:52.560 |
So you really need to set a list of protocols for yourself 00:35:06.600 |
Think about what it's saying and think about whether or not it's logical 00:35:11.040 |
that you would have received this communication by way of an email 00:35:14.640 |
and whether or not what they're asking you to do seems logical 00:35:18.760 |
within the time frame they're giving you to respond. 00:35:25.880 |
I know SIM swapping made all the news years ago. 00:35:28.960 |
Is there anything happening right now that you know about 00:35:32.560 |
because you're in the industry that maybe other people will hear about 00:35:35.920 |
over the next few years, but would be good to know now? 00:35:38.560 |
Well, let's go through some of the scams that exist and sort of match them 00:35:45.120 |
First of all, their health care scams that have been going on for forever. 00:35:48.880 |
But in particular, COVID was a petri dish for them. 00:35:52.880 |
And now monkeypox is becoming a problem as well. 00:36:06.880 |
Here's where your schedule, your test, these kinds of things. 00:36:12.760 |
Again, as you said, run your cursor over the email address 00:36:17.160 |
to make sure that where it's coming from looks legitimate. 00:36:23.600 |
even if it's a phone calls from someone saying they're from the health department, 00:36:28.160 |
thank them, hang up, independently confirm the right number 00:36:31.880 |
for your county health department or your state health department or even the CDC. 00:36:36.760 |
If you think you're getting a call from the CDC, 00:36:39.400 |
which I really haven't heard of too many calls coming from the CDC, 00:36:42.760 |
then then call the real number and speak to somebody 00:36:46.720 |
and confirm whatever that information that they're providing you. 00:36:51.960 |
And remember, in most of these cases, they are never supposed to ask you 00:36:57.200 |
what your social security number is or getting credit card information from you. 00:37:02.040 |
You can't pay to get to the head of the line with these. 00:37:05.440 |
If it's a legitimate government situation and it's involving health care, 00:37:09.560 |
there is a protocol to use and in no protocol that I know of 00:37:13.560 |
and have ever known of, are you paying something in advance 00:37:17.320 |
in order to advance your prospects with that? 00:37:20.720 |
So you have job scams all the time, especially during the Great Resignation. 00:37:26.240 |
And now with inflation and now with the concerns about whether or not 00:37:30.840 |
there's going to be a recession, people may be looking for additional jobs. 00:37:39.760 |
and make sure that you're communicating with the right organization. 00:37:43.520 |
If someone asks you to provide your social security number right off the bat, 00:37:56.040 |
You're like, oh, this company is interesting. 00:37:59.160 |
It could just be a totally a fake company that's leading you down a path 00:38:02.400 |
of interviewing for a job with the purpose of just collecting information about you. 00:38:06.440 |
Is that absolutely or getting financial information 00:38:10.000 |
by way of you giving them your credit card information? 00:38:15.600 |
And they say, well, you know, to get you started, 00:38:18.120 |
we're going to be laying out some money, but we'd like you to reimburse us for this. 00:38:22.080 |
You don't want to get involved in anything like that 00:38:28.960 |
Also confirm that particular company is actually looking to hire people 00:38:33.600 |
by going to the real website of the organization 00:38:37.000 |
and then calling the HR department of the company 00:38:39.760 |
and asking them if they're conducting interviews. 00:38:42.080 |
But you have to be very careful about job scams. 00:38:44.680 |
There was a scam that was going around for a while, disappeared, 00:38:51.280 |
Someone represents themselves to be from the jury commission. 00:38:54.520 |
They're polling, quote, eligible jurors in the district. 00:38:59.440 |
And if you would be so kind as to provide them with your social security number, 00:39:03.800 |
they will be able to let you know whether or not you're eligible 00:39:08.080 |
There have been scams where police departments were supposedly calling people 00:39:15.480 |
Generally, police departments just don't call people out of the blue. 00:39:22.600 |
but they're not going to be asking for your social security number, 00:39:27.840 |
Unemployment scams, of course, have been a disaster during covid. 00:39:31.680 |
Billions upon billions of dollars have been stolen. 00:39:34.400 |
My own sister in law, who was on one of our episodes, 00:39:37.280 |
was talking about the fact that she was legitimately notified 00:39:40.960 |
by her home state of Colorado and by the state of Ohio 00:39:44.840 |
that somebody using her information had applied for unemployment benefits. 00:39:49.280 |
In one case, she found out simply because she received 00:39:52.360 |
a debit card in the mail from the unemployment agency, 00:40:02.440 |
We've had cases where people found out because someone in their company 00:40:06.440 |
walked up to their desk in the days when people were actually at their desk 00:40:10.680 |
and said, by the way, why did you apply for unemployment? 00:40:20.520 |
That's what you get a phone call from someone representing themselves 00:40:23.640 |
to be from Apple or Microsoft, saying that they've noticed 00:40:29.680 |
They are going to direct you to a site where you can download certain software, 00:40:34.720 |
which will enable them to then come into your computer and check it out 00:40:48.560 |
Then, of course, in the line of work that you've been talking about, too, 00:40:51.520 |
which is vacations and points and all of that. 00:40:54.640 |
There have been theft of frequent fire miles. 00:40:58.440 |
There have been all kinds of vacations, all kinds of rental scams 00:41:02.120 |
that people have to be on the lookout for, which we can go into further depth 00:41:10.360 |
Whatever the theme may be, it's still a catfish. 00:41:14.920 |
And what people are trying to do is they're trying to tug on your heartstrings 00:41:19.760 |
and get you to believe that they care about you. 00:41:22.520 |
And the whole goal is to get into your life as quickly as possible 00:41:34.400 |
You may just be communicating with them by text or by email. 00:41:38.080 |
And then at some point, relatively quickly into this relationship, 00:41:43.080 |
you're suddenly asked for a lot of personal information 00:41:47.240 |
or they send you a compromising picture and ask you to reciprocate. 00:41:53.080 |
And what you don't realize, that's not their picture, 00:41:56.680 |
but unfortunately, that's your picture you just sent to them. 00:42:00.640 |
And suddenly you can become a victim of extortion and blackmail. 00:42:05.760 |
Or they ask you to provide credit card information so that you can help them 00:42:13.920 |
We had a woman on our show talking about the fact that she met someone online 00:42:18.400 |
who even had a terrific LinkedIn profile as a very successful 00:42:23.480 |
medical professional who had decided to dedicate part of his life 00:42:27.760 |
to go to the Mideast and open a clinic there. 00:42:29.920 |
And somewhere in the first couple of weeks that they were getting to know 00:42:34.640 |
each other, he said, our equipment has come in. 00:42:39.160 |
If there's any way that you could help me by sending me 30,000 00:42:43.440 |
so I can get the equipment out, that would be great. 00:42:50.520 |
I mean, we've seen cases where someone was taken to the tune of two million 00:42:56.040 |
dollars by someone who convinced them that he loved him. 00:43:01.040 |
And the only way that they found out there was something wrong, 00:43:05.200 |
which they should have known from the beginning, was that a financial advisor 00:43:09.920 |
notified members of their family and said, something's going on with your mom. 00:43:13.560 |
She's taking a lot of money out and sending it overseas. 00:43:19.080 |
And even after confronted with the reality of her situation, she said, OK, 00:43:25.240 |
I understand it's a fraud, but in my heart, I still love it. Wow. 00:43:29.000 |
I mean, this is how deeply they ingrain themselves into your life. 00:43:37.400 |
And this is where they'll take the issue of the day, 00:43:39.600 |
whether it's the Ukraine, it's a natural disaster. 00:43:46.240 |
Any one of those topics, whatever is in the news, they will use it. 00:43:50.400 |
They will convince you that they are the newest, best, most successful, 00:43:58.640 |
And could you please give them credit card information or send money to this? 00:44:06.920 |
So I've been a little familiar with some, not all the others. 00:44:09.840 |
When it comes to the frequent flyer miles thing, if you Google my name, 00:44:13.960 |
there's some articles about having a lot of points in miles. 00:44:16.240 |
And so I have been a victim of theft of points, I guess, 00:44:20.520 |
which we talked about maybe coming on your show. 00:44:22.840 |
And if that happens, definitely go check it out. 00:44:26.280 |
But in short, that's what sent me down a path of really locking down 00:44:30.720 |
all these accounts, because someone was able to call Chase 00:44:35.400 |
and get Chase to let them order things with points on the Internet. 00:44:40.880 |
The craziest thing, and I'm still today don't understand it, 00:44:44.840 |
was they ordered an Apple laptop using my points, but they shipped it to my house. 00:44:48.920 |
Now, maybe the plan was to come to my house and pick it up, but they never did. 00:44:54.840 |
So it was like the strangest fraud because Chase refunded the points. 00:45:00.080 |
I asked Chase what they wanted me to do with it. 00:45:01.600 |
And they said, try to take it to the Apple store. 00:45:04.880 |
So eventually Chase said, the best thing we can tell you is to keep it or donate it. 00:45:11.840 |
but it was probably payback for the hours of time to mitigate it. 00:45:15.160 |
I want to go back to your first M, which is about minimizing the risk. 00:45:19.600 |
And talk about some of the things people can be doing 00:45:22.520 |
to prepare and kind of plan in advance of any of this happening. 00:45:32.120 |
So I remember back when I was a venture capitalist, this company, Fortalis, 00:45:36.120 |
which I know you're familiar with, was raising money 00:45:38.440 |
and they offered to run some reports on people in the investing group 00:45:45.000 |
And I was like, wow, it's not that I didn't know 00:45:47.480 |
there was information about me online, right? 00:45:53.800 |
When someone pulls all of that information together into one place 00:45:57.080 |
and you see a list of every address you've ever lived at, every job 00:46:00.360 |
you've had, all of your phone numbers, all of your email addresses. 00:46:03.240 |
And then the exact same set of information for your spouse, 00:46:06.560 |
your siblings, your parents, and they put it all together. 00:46:11.400 |
And it made me think, gosh, should I be getting rid of this? 00:46:14.680 |
Is there a way that consumers can get a lot of this information off the Internet 00:46:19.760 |
or what goes into trying to mitigate this risk and minimize the risk 00:46:26.000 |
Well, I could give you my favorite George Carlin line, which it's a mystery. 00:46:30.400 |
But the truth is that there are things that can be done. 00:46:33.720 |
That is a long and arduous and time consuming process 00:46:38.840 |
because you literally have to go from data broker to data broker. 00:46:47.520 |
And of course, the CFPB, Consumer Financial Protection Bureau, 00:46:54.960 |
But just like when LifeLock started and someone said, 00:46:59.440 |
wasn't it true that a lot of this stuff people can do themselves? 00:47:04.160 |
And the answer, which I thought was a very interesting answer, 00:47:07.640 |
and I've been a fan of LifeLock, is they said, well, sure, 00:47:13.040 |
And if you want, you could maybe even change your own muffler. 00:47:17.200 |
So it really has to do with how much time you're willing to dedicate to it. 00:47:21.640 |
Some people, it's a crusade and they will do it 00:47:24.960 |
because they don't want to pay anyone else to do it and they will do it. 00:47:28.520 |
Others will find companies like Reputation.com, 00:47:32.200 |
which is where they will work to get negative information about you offline, 00:47:36.360 |
or companies like ABINE, where they will work with you 00:47:40.600 |
to actually delete information from the online world. 00:47:45.240 |
And now that there is a right to forget in the GDPR, 00:47:50.040 |
which is the General Data Protection Regulation in Europe, 00:48:04.120 |
incorporated in the American Data Protection Act, 00:48:07.760 |
which is kind of wending its way through Congress, 00:48:10.200 |
assuming it can actually find its way through Congress, 00:48:15.040 |
As we've seen in the past, it's very difficult for stuff 00:48:17.560 |
to get through Congress, all the interests involved. 00:48:26.160 |
and ask them to remove certain information about you, 00:48:33.160 |
when people would go to credit repair companies 00:48:36.040 |
and some of them are good and some of them are really, really not good. 00:48:39.440 |
And they would say, OK, we will get this information off. 00:48:44.920 |
But unfortunately, it was legitimate information. 00:48:49.080 |
And as a result, when the particular subscribing retailer 00:48:54.360 |
does an update, the information finds itself back 00:49:00.680 |
Think of all of the millions of websites that are out there 00:49:07.640 |
there's been this wholesale sharing of information 00:49:11.720 |
or selling information or lending information, 00:49:16.160 |
depending upon what the relationship was between these organizations. 00:49:28.360 |
It may take you forever to find out where everywhere is. 00:49:31.920 |
And there's a new part of everywhere that shows up every day. 00:49:35.680 |
So that's why you have to say to yourself, look, the world I live in, 00:49:44.920 |
We are surrounded by billions of Internet of Things devices, 00:49:48.960 |
tracking, listening, sending data back to manufacturers, 00:49:52.600 |
data then being shared, that information also being hacked by hackers. 00:49:56.480 |
So that's why you need to really consider the three M's. 00:50:01.520 |
And among the things you should be doing, assuming that your data is out there, 00:50:07.040 |
even despite your best efforts to get it off the online world, 00:50:15.000 |
not shared among websites or password managers using two factor 00:50:19.800 |
authentication, which makes it, again, more difficult for someone to represent 00:50:26.120 |
that they are you because they do have to go through that extra layer 00:50:30.360 |
of whether a code is sent to a cell phone or you use thumbprints, 00:50:35.880 |
eye scans, depending upon the particular device you're using. 00:50:41.720 |
They also multi-factor authentication can involve voice prints. 00:50:45.640 |
Of course, the issue is what if, God forbid, someone steals a database 00:50:49.120 |
of a company where they have your voice prints? 00:50:52.920 |
But again, any layer of additional authentication you can add is important. 00:50:57.880 |
It also means you don't click on every link you see. 00:51:02.040 |
You don't open every attachment, even if you think it's coming from someone, 00:51:09.800 |
But any time I get an e-card from someone, the first thing I do is I call that person 00:51:14.360 |
and say, I know this is a buzzkill, but did you just send 00:51:19.720 |
I'll go do it, provided you confirm you really did it. 00:51:27.480 |
and the ransomware attacks that are going on, you always run the risk 00:51:31.760 |
that someone receives something that they opened that they thought 00:51:36.320 |
was hysterically funny and terrific, and they're sending it to you. 00:51:40.040 |
But they didn't realize that it had malware on it. 00:51:43.560 |
And all they've done is they've shared the love and the hack with you. 00:51:49.520 |
That's why it's really important to be very careful where you click, what you open. 00:51:53.600 |
That means, as we talked about earlier, you lie like a superhero 00:51:57.680 |
when you're sending up questions and answers. 00:52:00.200 |
That means that you freeze your credit, which is, as we talked about, is free. 00:52:06.360 |
That means that even the humble shredder, and I don't mean a ribbon cut shredder, 00:52:12.200 |
because for those of us who saw Argo as an example, 00:52:15.720 |
what happens is you can get kids or people hopped up on drugs 00:52:20.920 |
who will sit there and meticulously tape back up 00:52:24.680 |
things that have been cut by a ribbon cut shredder. 00:52:28.440 |
That's why you need a confetti cut shredder or a cross cut shredder, 00:52:32.720 |
which turns this into little useless pieces of confetti 00:52:40.000 |
These are some of the things that you need to think about doing. 00:52:46.720 |
that's where the third M comes in, and it's so important. 00:52:50.240 |
And that is to contact your insurance agent, your financial services rep 00:52:55.520 |
or the H.R. department where you work and say, 00:52:58.320 |
if I become a victim of an identity incident or if I'm worried about it 00:53:02.400 |
or I find out that an organization that I've had a relationship with has been hacked, 00:53:07.280 |
are you going to help me through the incident? 00:53:09.200 |
Yeah. And that's where it's really important. 00:53:14.080 |
deeply discounted and worth you signing up for. 00:53:17.320 |
Getting the crew together isn't as easy as it used to be. 00:53:24.240 |
But trust me, your friends are probably desperate for a good hang. 00:53:28.000 |
So kick 2024 off right by finally hosting that event. 00:53:32.080 |
Just make sure you do it the easy way and let our sponsor Drizzly, 00:53:36.040 |
the go to app for drink delivery, take care of the supplies. 00:53:39.920 |
All you need to come up with is the excuse to get together. 00:53:44.640 |
It could be your dog's birthday that the sun finally came out. 00:53:47.800 |
Or maybe you just want to celebrate that you got through another week. 00:53:51.280 |
With Drizzly, you can make hosting easy by taking the drink run off your to do list, 00:53:55.960 |
which means you can entice your friends to leave their houses 00:54:01.040 |
And since I know you like a good deal, Drizzly compares prices 00:54:04.080 |
on their massive selection of beer, wine and spirits across multiple stores. 00:54:08.280 |
So when I really wanted to make a few cocktails while we were hosting family 00:54:11.400 |
last week, not only could I get an Italian Amaro delivered in less than an hour, 00:54:15.680 |
but I found it for $15 less than my local liquor store. 00:54:19.040 |
So whatever the occasion, download the Drizzly app or go to Drizzly.com. 00:54:27.960 |
Must be 21 plus, not available in all locations. 00:54:31.320 |
I just want to thank you quick for listening to and supporting the show. 00:54:39.440 |
To get all of the URLs, codes, deals and discounts from our partners, 00:54:47.400 |
So please consider supporting those who support us. 00:54:50.840 |
I'll share a couple others that I've learned in the past. 00:54:59.000 |
So I have an email address that I just use for financial institutions. 00:55:08.360 |
I haven't, to use a separate one for social media profiles. 00:55:11.600 |
Just yes, that was another recommendation is to just have different email addresses. 00:55:15.800 |
Look, if you don't have a password manager, I can only imagine how hard that is. 00:55:19.200 |
So we're going to go back to your original recommendation, 00:55:23.520 |
Everyone should be using two factor authentication everywhere they can. 00:55:31.400 |
as much as possible to be a one time password. 00:55:35.440 |
Well, yeah, and you can use Google Authenticator. 00:55:37.800 |
You can use some of the more the hardware oriented. 00:55:41.720 |
You know, when we talked earlier, you had mentioned one of them when we talked prior. 00:55:45.920 |
I'm a fan of all of my two factor being one time passwords 00:55:49.800 |
that you can put in Google Authenticator or Authy or even one password, 00:55:52.920 |
though I had historically been putting all of my one time passwords in one password. 00:55:58.880 |
I am now realizing as convenient as it is for them to copy and paste them. 00:56:04.040 |
The fact that I'm storing my password in the exact same place 00:56:06.960 |
I'm storing my two factor off inherently makes it no longer two factor 00:56:14.000 |
It's like one a factor, you know, two types of single factor. 00:56:21.800 |
Yubico plug in security keys versus Google Authenticator and Authy app? 00:56:26.120 |
You know, there are some people that like using security keys, 00:56:29.000 |
but they're generally one account related keys, as I believe. 00:56:32.920 |
Yubico may be more than that, but I think it is one. 00:56:39.920 |
and with Google and with different services, so I can sign into different services. 00:56:43.840 |
It's a lot more hassle to have to carry this thing around and plug it in. 00:56:47.280 |
Obviously, that comes with security, but it's just one where I'm like, 00:56:50.560 |
I haven't quite determined that it's worth it. 00:56:52.560 |
Yeah, because that's the issue is that you may carry it with you. 00:56:55.880 |
But then if one day it disappears, it's not helpful to you. 00:57:00.360 |
Just keep in mind, if you're using Google Authenticator, you lose your phone, 00:57:05.440 |
Obviously, you can usually recover them with backup codes. 00:57:07.960 |
I definitely recommend writing down those backup codes or using something like Authy, 00:57:13.160 |
But I know they actually store those so you can transfer them between devices. 00:57:18.000 |
By the way, if anyone listening here has any recommendations 00:57:20.440 |
that we didn't cover or anything, please send them to me, 00:57:23.840 |
because hopefully between now and the time this airs, 00:57:27.080 |
I'm going to try to put a lot of these into place, 00:57:29.040 |
test a lot of these services out and maybe release another little bonus episode 00:57:32.840 |
with my feedback from trying to do all of this. 00:57:36.960 |
Just remember, whenever you write down something, put it in some place secure. 00:57:41.000 |
You always run the risk if you use a Post-it on your computer 00:57:44.960 |
and someone breaks in your house, you've just given away another key to the kingdom. 00:57:49.240 |
So another tip someone gave me is actually not just 00:57:52.080 |
emailing these white pages directories online. 00:57:55.520 |
If you just Google your name or your last name and your address in quotes, 00:57:59.160 |
you'll see the websites that are sharing your address. 00:58:01.640 |
You can reach out to them and get them to remove things. 00:58:04.040 |
A friend of mine recently told me another suggestion, which is to reach to the MLS 00:58:08.280 |
or have your real estate agent do it and have the photos of the house 00:58:12.400 |
that you purchased whenever it was removed from the MLS. 00:58:18.120 |
They can also then just go look inside your house, understand the entire floor plan. 00:58:22.600 |
I'm not saying you're a target of someone understanding the layout of your house, 00:58:26.000 |
but it seems like information that provides very little value to the world 00:58:30.720 |
for people to be able to look inside every room of your house. 00:58:34.680 |
It's not your cameras, but it's something I'm going to be doing. 00:58:38.200 |
The other thing is you can actually contact like Google and Apple and say, 00:58:41.200 |
could you blur my house so that if someone's using maps or whatever, 00:58:54.080 |
So these are little tricks of the trade that you can do as well. 00:58:58.840 |
That is another step toward helping you get your stuff 00:59:05.480 |
I'm trying to think of any other ones that I've done or have thought about. 00:59:08.800 |
I have a second phone number on Google Voice that I don't know why, 00:59:14.160 |
but it seems like every financial institution supports only text message 00:59:19.840 |
All of the tech companies seem to support using authenticator 00:59:24.360 |
Yeah, but all of my financial institutions, Chase Vanguard, 00:59:30.400 |
So I've got my Google Voice number that I can use. 00:59:34.160 |
that I've given out to so many people, as you mentioned earlier. 00:59:39.360 |
Google Voice for calls, because as we talked about the ubiquity 00:59:42.840 |
of your cell phone number, it's always good to have another phone number. 00:59:46.200 |
Another scam that was going on is the Google Voice scam. 00:59:49.880 |
And that's where you're supposedly doing business with someone online. 00:59:53.960 |
They go, well, I don't really know if I can trust you. 00:59:56.640 |
So I want to know that you're the real you, that this is really your phone number. 01:00:01.720 |
So I'm going to send you a code and then I want you to read me back the code. 01:00:06.320 |
And what they've actually done is they've applied for a Google Voice number 01:00:10.280 |
using your phone as the point of authentication. 01:00:19.320 |
And then they will ask you to read them the code. 01:00:22.200 |
And that then enables them to contact Google Voice 01:00:27.880 |
I've seen the same thing happen with sending an iCloud two factor code. 01:00:35.080 |
They say, oh, I want to confirm it's your identity. 01:00:38.720 |
And they go to Apple and they go in and say, recover my password, send a code. 01:00:43.400 |
And they just hope that you don't notice that code actually is from Apple 01:00:47.200 |
or that code is from your bank or something like that. 01:00:50.000 |
So I'd say if you're not dealing with a service where you're 100% sure 01:00:53.440 |
it's the service, which means you called them, you know, if Verizon calls you 01:00:57.240 |
and says, hey, we'd love to talk to you about your account, 01:00:59.120 |
we're going to send you a code right now and then we can get in. 01:01:03.240 |
But let me call 611 back and get a Verizon rep before proceeding. 01:01:07.480 |
That goes into the category of no, no, no, no, no, no. 01:01:14.720 |
If you don't already know to look for the secure lock, 01:01:17.480 |
most browsers will throw off errors if they're not there. 01:01:25.040 |
But I wonder if now that almost everything we do online is HTTPS, 01:01:29.160 |
if having a VPN really provides a lot of value other than maybe 01:01:32.960 |
like your browsing activity, what types of things you're doing, 01:01:36.040 |
whether you're streaming from different services. 01:01:37.840 |
Well, a VPN also is very helpful when let's say you're connecting 01:01:43.400 |
It's always good to use it if your company has a VPN to access things. 01:01:46.920 |
Yes. But the idea of, oh, if you're at a public Wi-Fi spot, 01:01:50.920 |
you need a VPN to make sure people aren't stealing your information. 01:01:54.720 |
My understanding is that with HTTPS being so prolific 01:01:58.440 |
and secure certificates being free, that's not really a thing 01:02:03.520 |
Well, the only issue is that there have been cases 01:02:08.360 |
OK, so as a result, a VPN is still a good way to go. 01:02:12.400 |
And I like DuckDuckGo, but there were people that will say to you 01:02:15.400 |
that if you're going to get a VPN, use one you pay for. 01:02:18.320 |
Because they're less likely to sell your information than ones 01:02:23.480 |
that one day might share your information that are free. Yeah. 01:02:28.360 |
That goes back to another thing, too, which is read privacy policies 01:02:33.320 |
and understand what the privacy policy is, terms and conditions. 01:02:37.880 |
I realize privacy policies in many cases are written in 27th grade English 01:02:45.000 |
And there are translators where you can actually go 01:02:47.920 |
and it'll translate what a privacy policy is. 01:02:50.920 |
The name of some of them escapes me right now. 01:02:53.040 |
But this is something we could talk to Travis about, for example, 01:02:56.680 |
that he might be able to give information on that. 01:02:58.920 |
But anything that you can do to mask your identity is a good thing. 01:03:03.880 |
Even something as simple as location services on your mobile device. 01:03:08.960 |
Many websites now scramble the things that would be identified 01:03:13.360 |
by location services, but many of them don't. 01:03:16.760 |
And the last thing you want is you're publishing pictures 01:03:20.520 |
and it shows when and where the picture was taken, 01:03:23.880 |
especially if it involves people doing things they shouldn't do, 01:03:33.480 |
Here we are at Sustance Hutcher Park and it's little Susie's second birthday. 01:03:38.120 |
And if the location services are on and it's not a site that scrambles them, 01:03:44.200 |
the issue you have is that somebody could show up one day at that park, 01:03:49.400 |
find little Susie and say, I feel so terrible that I missed your birthday. 01:03:55.560 |
And I told mommy that I'd be over the park today to see you 01:04:00.280 |
because I have a present for you if you just come with me over there. 01:04:04.760 |
And then all of a sudden you have a missing child. 01:04:09.120 |
So, you know, location services, you should be discreet 01:04:19.000 |
Of course, I realize that your GPS system won't work and a few other things. 01:04:25.400 |
But be careful, know that they can come back to haunt you. 01:04:29.200 |
When I got that Fortalice report, they looked at all the photos 01:04:32.480 |
that had been published on social media by me, by others around my home address. 01:04:37.720 |
And all of a sudden there are photos that you didn't know of your friends 01:04:40.960 |
and your family inside your house and all that kind of stuff. 01:04:43.280 |
So one of their recommendations was to go back and remove the geo 01:04:47.520 |
tags from your photos, from everything you've posted online. 01:04:50.600 |
The only other thing we didn't discuss from tips that I have 01:04:54.200 |
are going in and doing an audit of things you've offed to your Google account 01:04:59.400 |
or your Twitter account or your Facebook account. 01:05:01.240 |
Yeah, there are so many websites that say, oh, just off your Gmail 01:05:10.120 |
I've offed my Gmail to Calendly so I can schedule meetings. 01:05:13.120 |
But doing an audit every so often of are there services 01:05:17.360 |
that you've given access to your email or to your social media 01:05:23.560 |
Or even I noticed that recently I can't remember what service it was, 01:05:31.760 |
Some of them now say, what do you want to give information? 01:05:34.000 |
Do you want to give your name or do you want to give your email 01:05:36.960 |
or do you want to give full control to post, delete and see everything? 01:05:40.000 |
And if you authenticated something five years ago, 01:05:42.880 |
you might not have had the fine grain detail to be able to choose 01:05:48.040 |
So it could even be worth deleting all of them and redoing them 01:05:51.280 |
to make sure that you're only authenticating the kinds of information 01:05:56.080 |
So that's another kind of audit that I plan on doing. 01:06:00.960 |
And you absolutely should do an audit because it's very important 01:06:04.480 |
to figure out when you're on a particular site where your information is going. 01:06:08.600 |
I have a good friend who has a new company that he started, 01:06:16.720 |
and then show you all of the different places 01:06:21.120 |
that your data is going, all the different companies 01:06:24.000 |
that are sucking up your data that you had no idea. 01:06:26.560 |
And by data, just to be clear, it's usually IP address and activity, 01:06:31.320 |
not stealing information off your computer and your files and that kind of stuff. 01:06:39.400 |
And many years ago, they did a someone they were able to identify 01:06:45.000 |
specifically who they were through analyzing their AOL searches. 01:06:50.400 |
And they were able to actually zero in on the individual. 01:06:54.360 |
And today, people will tell you, give me two or three social media entries 01:07:04.520 |
I worked at a company that was dealing with location data, 01:07:10.240 |
And you might not know that just from the towers you're on on your cell phone, 01:07:14.880 |
the cell phone carriers are logging all of this data. 01:07:17.520 |
And unfortunately, at the time, maybe not now, they're willing to sell this data. 01:07:26.560 |
But I remember we did some analysis and it was something like 01:07:29.720 |
with a reasonable degree of accuracy, you could figure out 01:07:33.560 |
where any given phone would be at any given time 01:07:36.720 |
because you had the history of where it had been. 01:07:38.960 |
Now, thankfully, that information was anonymous to the person. 01:07:42.720 |
But you could say this phone that's often at this address is likely to be here. 01:07:48.480 |
I don't want to get people too scared, though, right? 01:07:50.240 |
You could listen to this and say, oh, my gosh, my kids are going to get abducted. 01:07:56.240 |
What message do you have to people that will help them get out of that feeling 01:07:59.240 |
of leaving this thinking everything's coming to an end? 01:08:01.880 |
I should turn off all my technology and never leave the home. 01:08:04.840 |
Well, interestingly enough, I've had someone say, well, thank you, Adam. 01:08:07.880 |
Now that I've listened to you speak, I'm going home. 01:08:13.320 |
I'm going to burn off my fingerprints and I'm going to hide under my mattress. 01:08:16.960 |
I said, but you can't do that unless you're living under a bottle cap 01:08:21.080 |
at the bottom of Loon Lake and you're completely off the grid, which nobody is. 01:08:34.800 |
And then practice, for example, the three M's. 01:08:38.560 |
Do everything you can to minimize your risk of exposure. 01:08:42.880 |
Like, for example, when you get a new Internet of Things device, 01:08:47.120 |
which most things are these days, change the password. 01:08:51.000 |
Most of them come with manufactured default passwords, 01:08:55.000 |
and probably 98% of those passwords are for sale on the dark web. 01:09:00.080 |
So change the password to something long and strong. 01:09:06.520 |
Just like when you get your router in, make sure that the password 01:09:10.400 |
is what you want it to be, not what someone else wants it to be. 01:09:16.280 |
Or use a password manager to help you with the whole thing. 01:09:18.840 |
It's really all about two things that people have to understand. 01:09:28.520 |
We're involved in educational activities, philanthropic activities. 01:09:33.640 |
That keeps us excited, interested, but also diverted. 01:09:38.560 |
And to a hacker who's not diverted, we are their day job. 01:09:46.840 |
And in some countries, they come in at eight. 01:09:51.080 |
They go home at 430 or five o'clock in the afternoon. 01:09:54.080 |
And it's a job and they're working for the government. 01:10:00.760 |
Others work around the clock and do what they do. 01:10:05.760 |
And the second thing to understand is when you look in the mirror, you see you. 01:10:09.640 |
And you go, why would anyone in the world want to steal my identity? 01:10:21.120 |
But when they see you, a hacker, a scammer, an identity thief, 01:10:28.600 |
They see somebody who's got something they want that can enrich their lives or. 01:10:38.200 |
It's not you thereafter, but it's your spouse, your child, 01:10:42.960 |
your parent, an organization that you're involved with, 01:10:46.240 |
a company that you work for, and you are simply the conduit 01:10:50.600 |
to get them to whoever or wherever they want to get to. 01:10:54.480 |
So this is why it's extremely important that you really focus on cyber hygiene, 01:10:59.400 |
just like you go to doctors, you go to dentists, 01:11:04.960 |
You have to maintain a healthy cyber environment 01:11:08.400 |
because you're protecting yourself, your family, 01:11:12.680 |
possibly your company, your co-workers and millions of innocent consumers 01:11:17.880 |
that may be doing business with your company. 01:11:20.520 |
There was a concept that was raised a couple of years ago 01:11:23.640 |
by the CEO of Microsoft, and I think he was dead right. 01:11:28.440 |
It's that we know that business hasn't done enough. 01:11:32.920 |
And we know consumers haven't done enough to protect each and every one of us 01:11:37.720 |
from the ravages of cyber issues or identity theft or ransomware. 01:11:53.640 |
But it's a reality of where we are, what we do, who we are in the world we live in. 01:11:59.720 |
And therefore, it's incumbent upon each and every one of us to do our part 01:12:05.080 |
because we could be protecting a whole lot more people than just ourselves 01:12:09.320 |
by doing the right thing when it comes to cybersecurity. 01:12:12.880 |
But it's not something that you need to be terrified of because it's reality. 01:12:19.760 |
So as a result, it's a question of just like they say with Covid, 01:12:24.560 |
So when it comes to cybersecurity, we have to live with it. 01:12:31.600 |
And in addition to which you can't take a victory lap for cybersecurity 01:12:36.520 |
because you could be completely secure at nine o'clock in the morning 01:12:43.360 |
because somebody clicked the wrong link, opened the wrong attachment, 01:12:49.120 |
So if we kind of stick together, work with each other, collaborate, 01:12:52.760 |
communicate, cooperate, we're going to be better off for it. 01:12:55.720 |
And I think there's a much more collegial attitude now 01:12:59.160 |
that it comes to cybersecurity than ever before. 01:13:01.520 |
And like you said earlier, with all the information out there, 01:13:05.240 |
it's only a matter of time before someone decides to pick you as a target. 01:13:08.880 |
That's right. You win the lottery, the one you didn't even enter. 01:13:12.160 |
But I'd say if you can make yourself a harder target 01:13:15.600 |
by doing a lot of the stuff we talked about today, 01:13:18.080 |
then you just move yourself further and further down that list 01:13:20.800 |
where someone says, ah, this person's information isn't very easy to find online. 01:13:24.320 |
Let's just skip to the next person where their address takes me a second to find. 01:13:28.960 |
If you're a burglar, do you break into the house where there's no dog 01:13:32.240 |
or one where there is a dog where you might not be sure 01:13:36.120 |
that you're going to come out with both legs? 01:13:42.560 |
Any time that anybody contacts you about anything 01:13:47.440 |
and asks you to authenticate yourself for any reason, 01:13:59.840 |
and they're an organization trying to do the right thing 01:14:03.640 |
and they're asking you to authenticate yourself. 01:14:12.600 |
Where can people stay on top of everything you're learning? 01:14:15.720 |
All of the latest conversations you're having. 01:14:20.280 |
which is where we put a lot of information about the newest, 01:14:25.480 |
scariest, maybe not so scary, but things you need to know. 01:14:32.840 |
You can get it to anywhere you get your podcast. 01:14:42.920 |
We bring people on who have either been victimized 01:14:55.360 |
this is where scaring is caring and sharing is caring 01:14:59.160 |
is that the more people that are willing to tell their stories 01:15:03.040 |
about what they went through and what the red flags were 01:15:11.480 |
Well, I'm looking forward to joining you and talking about the fact 01:15:14.600 |
that people always overlook their frequent flyer accounts. 01:15:19.800 |
But especially for this audience, you build up credit card points. 01:15:22.800 |
You build up miles to have someone go in and take a flight 01:15:25.440 |
or drain them to buy a computer is the worst. 01:15:31.160 |
Why should somebody get the benefit of your effort? 01:15:49.240 |
If you haven't already left a rating and a review for the show 01:15:52.080 |
in Apple Podcasts or Spotify, I would really appreciate it. 01:15:55.520 |
And if you have any feedback on the show, questions for me or just want to say 01:15:59.120 |
hi, I'm Chris at all the hacks dot com or at Hutchins on Twitter. 01:16:03.960 |
That's it for this week. I'll see you next week.