220 avsnitt

Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss.

Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.

Easy Prey Chris Parker

    • Verkliga brott

Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss.

Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.

    Challenges of Employee Onboarding and Offboarding with Craig Davies

    Challenges of Employee Onboarding and Offboarding with Craig Davies

    Many years ago, people chose to stay with the same employer for decades. Today, employees are changing jobs more regularly. Each company needs to have processes in place allowing access to systems needed to do their jobs, but there’s also a risk of when they leave that they may still have access to certain programs. 
    Today’s guest is Craig Davies. Craig started in banking, holding many roles including CSO. As the CISO and the Executive Director of Gathid Ltd., he is passionate about helping organizations strengthen access management without completely overhauling their people, processes, physical infrastructure, and technology. Craig has spent more than 25 years in cybersecurity working with infrastructure operations, security architecture and software, web development and operations. He was the first CEO of Ost Cyber and at Atlassian he helped develop the security program for all aspects of their business, including security, cloud operations and protection.
    Show Notes: [1:32] - Craig shares his background and what his roles are at Gathid. [4:52] - When bringing on new employees, there are several front-end issues that a company and employee can face. [6:22] - It can be really frustrating for a new employee when there are so many different programs to learn and manage. [8:18] - We have to think about the employee’s journey. [10:59] - In many cases, new employees receive a ton of access without learning the process during onboarding. [11:49] - Offboarding can be a nightmare because we don’t always think about all the things that are connected. [15:26] - We need to protect the person who is leaving. [18:06] - One of the challenges is knowing who should be responsible. [19:12] - There needs to be a list of all the programs and systems that an employee may have access to. [21:17] - Offboarding is not typically a priority but not focusing on it can be a huge risk. [24:43] - Smart use of control is important especially in onboarding and offboarding. [27:26] - Working remotely makes systems and access even trickier. [29:39] - There is a reason the large companies have large systems. [31:50] - Every company has the same problems. The ones that have a process in place have likely experienced a crisis. [34:57] - What are the challenges to the new ways of working post-pandemic? [36:26] - You can’t get rid of risk, but you can manage it. [44:50] - These processes all start with a conversation. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. 
    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Craig Davies on LinkedIn Gathid Website

    • 46 min
    5 Common Uses of Synthetic IDs with Stuart Wells

    5 Common Uses of Synthetic IDs with Stuart Wells

    There are entire communities set up to fight fraud that use synthetic IDs as well as scammer gangs that are advancing their creative ways to use these documents. This is changing regularly as biometric authentication advances continue. 
    Today’s guest is Stuart Wells. Stuart is the CTO of Jumio and is responsible for all aspects of Jumio’s innovation, machine learning, and engineering. He is an industry veteran with more than 30 years of tech experience. He was previously the Chief Product and Technology Officer at FICO, and held executive positions at Avaya and Sun Microsystems.
    Show Notes: [1:18] - Stuart shares his background and what he does at Jumio as the Chief Technology Officer. [3:20] - The science behind document protection is literally decades old. [5:06] - Stuart describes the process of verifying a document at Jumio. [5:57] - What are the practical uses of synthetic IDs? [7:39] - There are large volumes of both fraudulent and honest individuals creating and using synthetic IDs. [9:25] - A lot of businesses are seeking verification from places like Jumio to protect themselves and their reputation. [11:49] - Biometrics as a tool to use against fraudsters has grown globally. [13:54] - Biometrics are very useful, but there are challenges. [15:31] - Stuart shares a recent story about a fake video interaction that cost the victim millions of dollars. [17:37] - At this point in the technology’s development, there are some signs of deep fakes that we can spot. [19:03] - How can this negatively impact an individual? [20:18] - Listen to your inner voice and check with another source before sending money. [22:52] - You don’t have to be a programmer to use these tools. The creators have made them easy to use and people are using them to do harm. [25:46] - The early versions of deep fake technology had a lot of easy-to-see abnormalities, but they are getting tougher to spot. [27:26] - Although these negative impacts are concerning, there is some excitement about the positive uses of these advances. [32:07] - What direction is verification headed when it comes to biometrics? [33:54] - Documents have anatomy and security measures in place. [36:43] - Most security systems are layered. [40:00] - This landscape is continuously changing. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. 
    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Jumio Website

    • 42 min
    Vantage Travel Bankruptcy with Michelle Couch Friedman

    Vantage Travel Bankruptcy with Michelle Couch Friedman

    Imagine booking a vacation only to find out that the company files for bankruptcy a week later. As a consumer, would you know what your rights are? There’s a big difference between travel insurance and travel protection. One can leave you with no way to get your money back.
    Today’s guest is Michelle Couch Friedman. Michelle is the founder and CEO of Consumer Rescue. She is an experienced consumer reporter, advocate, mediator, author, and licensed psychotherapist. Michelle has also been a columnist, contributing editor, and former executive director for Elliott Advocacy, a non-profit organization dedicated to consumer advocacy.
    Show Notes: [1:02] - Michelle shares her background and what she does through Consumer Rescue. [5:00] - The only way to get money back from a bankrupt company is through your credit card company if you paid with one, or if you have travel insurance. [6:36] - Right before announcing their bankruptcy, Vantage did a “sales blitz” and offered great deals to loyal customers, knowing that they wouldn’t deliver. [9:49] - Vantage was unique in that it had been a successful business for 40 years and had a loyal customer base. [12:44] - Looking back at the way Vantage behaved after the pandemic, there were some red flags. [15:43] - Michelle explains the difference between travel insurance and travel protection. [17:36] - Travel insurance should be purchased away from the company taking you on the trip. [19:47] - Make sure you can find a clause somewhere that says you are protected against the insolvency of the tour operator with or without bankruptcy. [22:10] - If the tour operator is not able to deliver, you could file a credit card dispute. But there are some limitations. [26:04] - You should always pay with credit cards. Don’t be tempted by discounts offered with bank transfers. [31:21] - The average age of Vantage Travel clientele was older and scammers took advantage of their vulnerability. [33:10] - When filing claims and filling out forms, personal information makes its way to scammers on a “victim list.” [36:09] - Cryptocurrency is a red flag in cases like this as well. [38:41] - There is some information you can find by contacting the court in the jurisdiction of the bankrupt company. [41:53] - A company bought Vantage Travel’s customer list and had all of their contact information. [43:57] - In order to protect yourself, even if you have full trust in the company, do research and find red flags and reports. [46:26] - Never pay with a bank transfer, even if they offer a discount. [50:40] - Make sure the travel insurance policy protects against insolvency, not just bankruptcy. [53:34] - Michelle shares how to reach Consumer Rescue and what services they provide for free. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. 
    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Michelle Couch-Friedman LinkedIn Consumer Rescue Website

    • 53 min
    Cybersecurity for Everyday People with Greg Tomchick

    Cybersecurity for Everyday People with Greg Tomchick

    Learning how to keep your business safe and protect your online data can be advantageous for your home and personal life as well. Your children and family can create awareness at school and with friends. Today’s guest is Greg Tomchick. Greg is a former professional baseball player turned award-winning cybersecurity coach. He has worked with more than 250 world-renowned companies, including American Airlines, Caterpillar, and Trinity Rail. He is regularly featured live on ABC, Fox, and is an expert contributor to Inc. Magazine. He is now the CEO of Valor Cybersecurity and host of The Connected Mindset.
    Show Notes: [1:10] - Greg shares his background coming from a military family and then as a professional baseball player before learning cybersecurity’s impact. [2:42] - As an entrepreneur, Greg’s business experienced a cybersecurity attack. [5:45] - The Connected Mindset is helping people become more consciously aware of how they navigate life both physically and digitally. [7:26] - Greg explains why they set up budgets of companies and individuals for cybersecurity at Valor. [9:25] - The focus should be on the mindset first. [10:27] - An unexpected positive is that cybersecurity gives a company or business a competitive advantage. [12:58] - Most people don’t think about security until after something has gone wrong. [14:43] - What is the difference between culture and mindset? [15:50] - Greg shares some of the mindsets and cultures that are unhelpful. [18:09] - As connected as we constantly are through technology, we have never been more disconnected. [20:50] - When Greg’s business had been attacked, there was no place to report the incident. Things have improved in recent years. [24:48] - No matter the size of the business or amount of money an individual has, everyone can be a target. [27:08] - Some companies are risking things by going remote without any plan, structure, or security in place. [28:45] - Every new device or software that is introduced needs to be considered. [30:16] - Greg discusses AI, including the costs and benefits. [34:03] - What is the minimum cybersecurity mindset that the everyday person needs to have? Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. 
    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest The Connected Mindset Greg Tomchick’s Website Greg Tomchick on LinkedIn Valor Cybersecurity Website  

    • 38 min
    Misunderstanding Victims of Romance Fraud

    Misunderstanding Victims of Romance Fraud

    The media loves sensationalized romance scams, but we need to understand that anyone can be emotionally seduced and it's not just the lonely. No one is off limits to being targeted, no matter the age, status, or career. And the impact is far greater than just financial.
    Today’s guest is Becky Holmes. Becky is the creator and voice behind the popular Twitter account Death to Spinach. Becky’s book Keanu Reeves is Not in Love With You looks at all aspects of romance fraud, from the heartbreaking to the hilarious, the academic to the anecdotal, and discusses where we’ve gone wrong in dealing with those affected.
    Show Notes:
    [1:08] - Becky runs a Twitter account where she spends a lot of time wasting the time of romance fraudsters.
    [2:38] - An unintended consequence of messing with fraudsters, Becky became a sounding board to victims of romance fraud.
    [4:56] - Once you engage with a fraudster, your name is put on a “sucker list.”
    [6:13] - Becky explains what romance fraud is.
    [7:22] - Victims of romance fraud are generally assumed to be lonely, middle-aged women, which is a stereotype.
    [8:27] - The media sensationalizes victim stories, but this could happen to anyone.
    [9:53] - There’s not a lot of services and support for victims of romance fraud.
    [11:40] - The damage extends farther than the financial loss.
    [13:43] - When it comes to scams, we focus so much on a victim “falling for it” which implies that they are somehow complicit.
    [16:31] - Becky describes an experience she had as a victim of fraud.
    [18:19] - Coercive control is at the center of all types of romance fraud.
    [19:56] - Becky explains confirmation bias and its prevalence in all types of scams.
    [21:25] - Romance fraud is really hard to deal with because it involves the heart.
    [22:43] - Becky shares how scammers usually start conversation and how they navigate getting you on a different app.
    [26:44] - In addition to social media and dating apps, fraudsters also send messages on online games.
    [28:07] - Another common technique is for scammers to pretend to be a celebrity.
    [31:24] - A very successful tactic is when fraudsters pretend to be a part of a charity.
    [34:18] - Becky explains the inspiration behind the title of her recent book.
    [35:56] - We should be looking out for our friends and family.
    [37:21] - If we see something happen, how can we help someone?

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. 
    Links and Resources: Podcast Web Page
    Facebook Page
    whatismyipaddress.com
    Easy Prey on Instagram
    Easy Prey on Twitter
    Easy Prey on LinkedIn
    Easy Prey on YouTube
    Easy Prey on Pinterest
    Death to Spinach on Twitter

    • 41 min
    Scams Exploiting Emotions with Alan Castel

    Scams Exploiting Emotions with Alan Castel

    We can easily stereotype those we believe are susceptible to a scam. But the scammers are keeping up with current events and are prepared to take advantage of our basic human emotions. The impact of these frauds is underreported due to the shame and embarrassment. 
    Today’s guest is Alan Castel. Alan is a Psychology professor at The University of California Los Angeles. He studies learning, memory, fraud, and aging. His work has been featured in The New York Times, Wall Street Journal, and Time Magazine. He recently published a book entitled Better With Age: The Psychology of Successful Aging.
    Show Notes:
    [1:08] - Alan shares his background and what he focuses on as a psychologist.
    [3:33] - We are all susceptible to scams, regardless of the stereotypes.
    [5:50] - Scams focus on our human nature of trying to make sense of the world and our emotional brain. Scams prey on our basic emotions.
    [7:34] - Scams are tailor made to expose our vulnerabilities.
    [8:50] - Some scams are situational and can be completely believable.
    [10:05] - There are people who are much more vulnerable to scams, but it’s not based on stereotypes.
    [12:48] - Education and awareness can come from podcasts like this, but it also needs to come from people who have experienced a scam.
    [15:33] - Although scams don’t only target older adults, the elderly tend to be more susceptible to scams that target their need to help others.
    [18:19] - There are some phrases that aren’t always recognized as false because they sound scientific.
    [20:48] - There are websites and organizations that support scam victims, and it is highly recommended that you report anything that happens.
    [22:32] - Alan admits that he has fallen victim to a scam on a website, entering his credit card information to purchase something.
    [26:37] - Alan describes a reinforcement schedule, which is a psychological tactic to build relationships.
    [28:10] - Scams are clever and Alan sees their potential to use psychological principles to part people from their money.
    [32:30] - How does memory play a role in scam vulnerability?
    [35:05] - Alan describes the “foot in the door” technique.
    [37:02] - It comes down to curiosity as human nature.
    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. 
    Links and Resources: Podcast Web Page
    Facebook Page
    whatismyipaddress.com
    Easy Prey on Instagram
    Easy Prey on Twitter
    Easy Prey on LinkedIn
    Easy Prey on YouTube
    Easy Prey on Pinterest
    Alan Castel at UCLA
    Alan Castel on LinkedIn

    • 41 min

Mest populära poddar inom Verkliga brott

Krimstad
Bonnier News
Fallen jag aldrig glömmer
Podplay | Hasse Aro
P3 Krim
Sveriges Radio
Krimrummet
Expressen
Svenska brott
Tall Tale | Acast
Förhörsrummet
Novel Studios

Du kanske också gillar

What the Hack with Adam Levin
Loud Tree Media
Click Here
Recorded Future News
The Perfect Scam
AARP
Malicious Life
Malicious Life
Hacking Humans
N2K Networks
Hidden Brain
Hidden Brain, Shankar Vedantam