211 episodes

Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss.

Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.

Easy Prey Chris Parker

    • True Crime
    • 4.6 • 26 Ratings

Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss.

Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.

    Top 5 Supply Chain Risks with Kevin Kumpf

    Top 5 Supply Chain Risks with Kevin Kumpf

    As businesses embrace digital transformation and rely on interconnected networks for their operations, the vulnerabilities within the digital supply chain become increasingly apparent. From data breaches to third party vulnerabilities, the threats are multi-faceted and ever-evolving.
    Today’s guest is Kevin Kumpf. Kevin has more than 20 years of IT Security and Compliance experience including over 10 years of cybersecurity, governance, and critical infrastructure experience working in the energy, medical manufacturing, transportation, and fedramp realms. 
    Show Notes:
    [0:54] - Kevin shares what he does in his current role and his background in the industry.
    [3:38] - He began his career in cybersecurity at a time when cybersecurity was not a priority.
    [4:30] - Scammers target anyone and everyone. Even Kevin has been a victim.
    [6:53] - It comes down to ownership.
    [8:19] - Know your baseline and who is responsible.
    [10:07] - Kevin makes an analogy to help us better understand the supply chain.
    [12:30] - Most of the time, people don’t know where and how their data is being transferred back and forth.
    [14:12] - You trust a process and then when something breaks, how do you find out about it?
    [17:01] - Kevin describes an example of observing an organization’s work and discovering crypto mining.
    [19:51] - What should be asked about the organization’s environment?
    [21:34] - Think about all the things you use regularly that are connected to something. Now expand that thinking to companies and businesses.
    [23:27] - Where do all of these components come from?
    [26:47] - Kevin points out the challenges in the cybersecurity legislature.
    [28:46] - Ask questions and accept the answers. Determine what is acceptable risk.
    [31:22] - The trickle down of data is really what the supply chain is.
    [33:17] - Kevin shares some information about articles for further reading on this topic as well as some interesting numbers about recent breaches.
    [35:48] - If you don’t know what is normal, you won’t know what is abnormal. This is why knowing the baseline is so important.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. 
    Links and Resources: Podcast Web Page
    Facebook Page
    whatismyipaddress.com
    Easy Prey on Instagram
    Easy Prey on Twitter
    Easy Prey on LinkedIn
    Easy Prey on YouTube
    Easy Prey on Pinterest
    Cyolo Website
    Kevin Kumpf on LinkedIn

    • 37 min
    The Risks and Rewards of Cryptocurrencies with Natalie Brunell

    The Risks and Rewards of Cryptocurrencies with Natalie Brunell

    There are significant risks to be aware of when using crypto and over the past two years, many tokens have imploded. As you choose to invest digitally, do your research and understand the commodity that you use. Today’s guest is Natalie Burnell. Natalie is the host of the #1 woman-led show in the bitcoin space, Coin Stories. She is a bitcoin educator, a frequent media commentator, and an award-winning journalist. 
    Show Notes:
    [0:50] - Natalie shares her background and the mission behind the Coin Stories Podcast.
    [2:19] - Learning about bitcoin gave Natalie a little more hope as she came from having no background in financial literacy.
    [3:48] - Anyone can issue a token and it is hard to tell what cryptocurrency is legitimate.
    [6:42] - There are some that are regulated and unregulated. Natalie shares some red flags.
    [8:09] - Choosing to work with companies that are Bitcoin only is one way to stay safe because of regulatory clarity.
    [10:01] - A major red flag is overpromising and guaranteeing unrealistic returns.
    [11:59] - Longevity should stand out.
    [14:08] - Natalie explains how Bitcoin custodians work and how you can take your own custody of Bitcoin.
    [16:29] - Self-custody could be intimidating, but it just takes a few steps to learn.
    [19:15] - Natalie shares a clever analogy to make the concept easier to learn.
    [20:47] - Bitcoin offers more privacy than other monetary technology.
    [22:38] - There are a lot of frictions in banks and the system is ultimately very fragile.
    [26:07] - If exchanges receive Bitcoin and they don’t know where it came from, they are contacted by agencies like the IRS.
    [28:56] - The knee-jerk reaction to people wanting privacy is to assume that they want to do something bad.
    [31:17] - Look for verified accounts to interact with. Be careful if someone says they’ll send you money.
    [33:39] - Some companies are trying to help people recover their funds. But most of the time, it is impossible.
    [34:50] - If you send your money somewhere, you are likely not getting it back.
    [36:40] - Natalie has several tutorials on her YouTube channel that can help you protect yourself and your money.
    [38:52] - Bitcoin the block chain was built beautifully for security, but that means it can only fit so much. Bitcoin is “slow” for a reason.
    [41:20] - Consider Bitcoin built in layers.
    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. 
    Links and Resources: Podcast Web Page
    Facebook Page
    whatismyipaddress.com
    Easy Prey on Instagram
    Easy Prey on Twitter
    Easy Prey on LinkedIn
    Easy Prey on YouTube
    Easy Prey on Pinterest
    Coin Stories Podcast
    Natalie Brunell on YouTube

    • 43 min
    Tax Scams with Richard Gilbert

    Tax Scams with Richard Gilbert

    In this episode, we uncover the intricate web of tax-related scams that prey on unsuspecting individuals every year. From phishing emails promising tax refunds to elaborate identity theft schemes, join us as we expose tactics used by scammers to exploit fear and ignorance during tax season.
    Today’s guest is Richard Gilbert. Richard is the Director of the Examination Division with the North Carolina Department of Revenue. He has been with the department for over 25 years. He is a licensed CPA and has received his Bachelor’s of Business Administration from North Carolina Central University.
    Show Notes:
    [1:10] - Richard shares his background and what he does in the Examination Division at the North Carolina Department of Revenue.
    [2:38] - Taxes can get very complicated for a lot of people.
    [5:17] - The vast majority of tax professionals do their job well and serve their clients honestly. But there are some people who don’t focus on the right thing.
    [8:09] - Tax preparers who say they can get you the largest return, ask questions.
    [9:36] - Like any other business you employ, you should ask for references.
    [11:43] - If you can afford a CPA, hire one.
    [12:39] - Be wary of YouTube tutorials and advice. You are responsible for your taxes and if you are audited, it is all on you.
    [13:52] - Richard shares some of the things that a good tax preparer will ask for.
    [15:11] - There are scammers that will try to file someone else’s tax return before they do and direct their refund somewhere else. 
    [17:49] - There are things in place that slow down the process that can be frustrating, but are there to protect you.
    [19:29] - It is highly recommended to file your tax return as early as possible.
    [20:10] - You will never be contacted over the phone, via text, social media, or email by a legitimate tax collector. It will always begin through the mail.
    [21:28] - If someone is telling you there is only one way to make a payment, be suspicious.
    [24:33] - The biggest problem in mail correspondence is when people do not respond. Open your mail especially during tax season.
    [26:31] - There is a form of identity theft in which people use another person’s Social Security number to gain employment.
    [28:06] - Be sure that you have everything available to validate your identity when verification is asked for.
    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. 
    Links and Resources: Podcast Web Page
    Facebook Page
    whatismyipaddress.com
    Easy Prey on Instagram
    Easy Prey on Twitter
    Easy Prey on LinkedIn
    Easy Prey on YouTube
    Easy Prey on Pinterest
    North Carolina Department of Revenue

    • 31 min
    Virtual Kidnapping with Titania Jordan

    Virtual Kidnapping with Titania Jordan

    In this episode, we shine a light on the sinister phenomenon of virtual kidnapping. From deceptive phone calls to the psychological manipulation tactics, join us as we delve into the dark world where fears are exploited for profit, leaving victims shaken and families torn apart. 
    Today’s guest is Titania Jordan. Titania is a nationally renowned tech, social media, and family expert who has appeared on programs such as the Today Show, Good Morning America, Fox News, CNN, and more. She is the author and founder of Parenting in a Tech World and serves as Chief Parent Officer of the online safety company Bark Technologies.
    Show Notes:
    [1:06] - Titania Jordan shares her background and what she does at Bark Technologies.
    [3:04] - Virtual and cyber kidnapping are the same thing. Anything that involves kidnapping without actually moving a person’s physical location against their will.
    [4:26] - Titania explains a recent event in which an exchange student was targeted.
    [6:18] - Children and adults alike are targeted everyday, but Titania explains that older teenage boys are heavily targeted and impacted.
    [9:20] - Another type of scam is actually targeting the family and loved ones of someone to require a ransom for a kidnapping that hasn’t happened.
    [11:17] - Built-in location services are very helpful. Parental controls and alerts are also something important to have in place.
    [13:53] - Be careful answering the phone from a number you don’t know.
    [16:20] - Contact law enforcement immediately if this is something that happens to you.
    [19:51] - It is never a bad idea to be prepared.
    [22:17] - These events are opportunities to have really important conversations with your children.
    [24:41] - Flip the script and ask your children to help you do a safety audit.
    [27:52] - If it feels off, it probably is. Don’t hesitate to report it and talk about it.
    [30:26] - Bark Technologies offers a lot of programs and even a family smartphone that can help keep kids safe.
    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. 
    Links and Resources: Podcast Web Page
    Facebook Page
    whatismyipaddress.com
    Easy Prey on Instagram
    Easy Prey on Twitter
    Easy Prey on LinkedIn
    Easy Prey on YouTube
    Easy Prey on Pinterest
    Bark Technologies

    • 31 min
    Balancing Privacy, Security, and Accountability with Kurt Long

    Balancing Privacy, Security, and Accountability with Kurt Long

    In this episode, we navigate the ever evolving landscape of messaging app dynamics, examining the challenges and opportunities in striking the right balance between preserving user privacy, ensuring robust security measures, and maintaining accountability in an ever changing digital landscape. 
    Today’s guest is Kurt Long. Kurt is an entrepreneur with over 25 years of experience in starting, growing, and building Information Security and Privacy businesses. Kurt is the Executive Director of The Long Family Force for Good Foundation which focuses on supporting not-for-profits dedicated to improving the mental health of families and children. Kurt is also the Co-Founder and CEO of BUNKR.
    Show Notes:
    [1:09] - Kurt shares his background and what he does through The Long Family Force for Good Foundation and BUNKR.
    [5:01] - He found himself interested in technology and the idea of doing something bigger than himself with a team.
    [9:26] - Currently, Kurt’s work is directed to messaging apps.
    [13:22] - In the early days of messaging, there was an inherent trust. We didn’t think about the bad guys yet.
    [15:57] - Communication platforms were never intended to secure communication.
    [17:31] - Most communication apps now do begin with good intent. Kurt describes WhatsApp as an example until it was purchased by Facebook.
    [19:50] - We want information and access, but we want safety, too.
    [21:38] - We have to put trust in someone to strike a balance.
    [23:41] - The Federal Trade Commission has announced apps that don’t support legal due process and implemented a fine for use of them.
    [25:56] - Kurt shares a true story that is a great example of inside trade problems in messaging apps.
    [28:28] - Using secret messaging apps or apps that feature disappearing messages are hard to track. You could be affiliated with someone doing something illegal.
    [30:29] - Privacy and security do help us retain rights we have.
    [32:35] - Messaging issues also impact the medical industry.
    [34:07] - Some countries have legislation that ban secret messaging apps, but they aren’t really being enforced.
    [36:25] - BUNKR has consumers and public usage in 32 countries worldwide and is popular with families.
    [37:52] - When companies have more control over their app, there is less criminality involved.
    [40:02] - This service is invitation based. You cannot receive random messages from anyone you do not invite.
    [41:55] - “The entire planet deserves to conduct their affairs with dignity at bank level security.”
    [44:29] - Kurt leans towards following United States laws and legal action, but also has a large legal team to help guide through unusual situations.
    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. 
    Links and Resources: Podcast Web Page
    Facebook Page
    whatismyipaddress.com
    Easy Prey on Instagram
    Easy Prey on Twitter
    Easy Prey on LinkedIn
    Easy Prey on YouTube
    Easy Prey on Pinterest
    BUNKR

    • 50 min
    5 Alerts to Prevent Identity Theft with Paige Hanson

    5 Alerts to Prevent Identity Theft with Paige Hanson

    The fundamentals of scams are the same. However the technology used is increasingly more clever. It is important to know how to spot identity theft and credit card fraud and where to report it if and when it happens. Today’s guest is Paige Hanson. Paige is an authority in consumer and digital safety with nearly 20 years of experience in identity management. As co-founder and Head of Communications and Partnerships at Secure Labs, Paige has dedicated her career to protecting consumers and businesses from identity theft and cyber threats. She is a certified Identity Theft Risk Management Specialist and holds a certificate in Identity Leadership from the University of Texas. Paige also serves as an advisory board member to R.O.S.E. (Resources/Outreach to Safeguard the Elderly).
    Show Notes:
    [1:16] - Paige shares her background and what she does in her current roles.
    [3:02] - She worked with LifeLock in the early days of her career, but the experience led to her expertise in identity theft now.
    [6:08] - Chris shares what happened to a friend and their experience with identity theft.
    [7:40] - The Federal Trade Commission has an Identity Theft Affidavit.
    [9:25] - If you pay a bill that was made by a fraudster, it will be considered that you made the charge. Paige explains what best practice is.
    [12:06] - Always watch your credit card bills and take note of things that look unusual. Pay attention, even to the small charges.
    [13:47] - Notifications from your credit card company are a must have.
    [16:07] - Sometimes the notifications can seem annoying, but when something is out of the norm, these tools are critical.
    [17:48] - When you get an email that includes a link to login to an account, even if you recognize the sender, don’t click it. Develop the habit of using your browser.
    [20:22] - It can happen to anybody! Chris and Paige are security-minded, but it could happen to them as well.
    [22:48] - Paige shares an experience of noticing charges that she did not make and how noticing it early, she could cancel the order.
    [24:29] - Always use multi-factor authentication. Paige also recommends using an app in addition to what is included with your credit card company.
    [26:37] - Check links and make sure they are correct.
    [29:02] - At one time, Chris owned a business and shut it down because of the number of people making a fraudulent order.
    [30:45] - Online shopping and online payments are so common and a credit card doesn’t even need to be present to make a purchase.
    [32:35] - Paige explains how skimmers work and how they store card numbers.
    [35:19] - The likelihood of this happening is slimmer than other scams, but there are low-inconvenience and low-cost preventative measures you can take.
    [36:07] - The safest way to make in person payments is through mobile pay. If a location is breached, it doesn’t have your card info.
    [37:18] - If you use mobile pay, it is crucial that you keep your operating system up to date.
    [41:23] - When it comes to ATMs, it is best to go inside your bank’s branch and use the one inside. The worst ATMs to use are stand alone that are not attached to a bank.
    [44:33] - Identity theft could be accomplished by fraudsters by just taking advantage of low hanging fruit.
    [46:29] - Paige recommends using a credit card rather than a debit card.
    [49:11] - When traveling, Chris has a specific card that limits the amount of loss in the event of an issue.
    [52:47] - Using a service like PayPal helps with keeping things updated on accounts.
    [54:33] - When we make a convenient choice, we need to consider all the parts of risk management.
    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. 
    Links and Resources: Podcast Web Page
    Facebook Page
    whatismyipaddress.com
    Easy Prey on Instagram
    Easy Prey on Twitter
    Easy Prey on LinkedIn
    Easy Prey on YouTube
    Easy Prey on

    • 55 min

Customer Reviews

4.6 out of 5
26 Ratings

26 Ratings

monicaTwitch ,

Great podcast!

What a great podcast!! Love hearing more about the cyber field

Gary unsung cyber hero. ,

Chris Parker and Easy Prey

As a victim of an unbelievable, 23 year series of cyber and physical stalking, I am SO grateful for Easy Prey and the real life stories and associated lessons. Chris, I would be honored to have you on The Cyber Hero Adventures Show and if you would find it valuable, to be in your Show. Gratefully, Gary Berman.

☝️👌👌🤏🦾👣☝️💄 ,

AMWAY and BWW is a huge scam

I was in Amway and BWW for 3 year since March 2017 and left 2020. I was brainwash by EX mentors who isn’t certified to help anyone but only with there experience.

I learned Alots but once I left I finally learned how to live my own life without worrying about bonus point or money or things that does not add value toward my happiness.

Top Podcasts In True Crime

Three
Wavland
Crime Junkie
audiochuck
Dateline NBC
NBC News
Morbid
Morbid Network | Wondery
20/20
ABC News
SERIALously
10 to LIFE

You Might Also Like

The Perfect Scam
AARP
The Jordan Harbinger Show
Jordan Harbinger
This Is Actually Happening
Wondery
Criminal
Vox Media Podcast Network
American Greed Podcast
CNBC
Dateline NBC
NBC News