Privacy Mentor with Carrie Kerskie
Protecting your privacy in the digital age is tough. Identity theft, fraud, and cyber threats are on the rise. How about a Privacy Mentor? Let me be your guide by simplifying complex topics and providing you with tools and resources to help you become a difficult target for cyber criminals.
info_outline
EP 78 Are in-app browsers collecting your information?
09/09/2022
EP 78 Are in-app browsers collecting your information?
Ever noticed how you stay on an app even though you clicked on a link to a different website? This convenient trick is more harmful than you'd think. This week, Carrie talks about the hidden threat that in-app browser's pose to your privacy. In this episode you'll learn: What exactly are in-app browsers? What information are they collecting? How much of a risk are they? What you can do to protect your information Check out the blogpost at https://privacy-mentor.com/ep78
/episode/index/show/carriekerskie/id/24315207
info_outline
EP 77 Risks of using a free email service and a safer alternative: Interview with Brad Deflin of Total Digital Security
08/24/2022
EP 77 Risks of using a free email service and a safer alternative: Interview with Brad Deflin of Total Digital Security
Even though we rely on email for nearly everything we do online, we seem to forget about all the information connected to it. Not to mention all the entities that have access to collect and view this info as well. In this episode, Carrie gets to talk with Brad Deflin of Total Digital Security as they over all of the dangers of using a free email service, and the importance of switching to a more private and secure one. In this episode you'll learn: How limited privacy is when using a free email service What exactly is a private email? Why free email services put you at a greater risk of becoming a target of a cyber-attack Why it's easy to switch over to a private email The importance of starting a private email now rather than later Links: Visit Total Digital Security's website Episode referenced where Carrie talks about scam that changes email rules
/episode/index/show/carriekerskie/id/24147543
info_outline
EP 76 How to determine if a PayPal invoice is REAL or a SCAM
08/03/2022
EP 76 How to determine if a PayPal invoice is REAL or a SCAM
Remember when scams used to look like scams? Back when you used to be able to find out if something was real or not based on a handful of things you could check. Those were the good ole days. This week, Carrie talks about a new cyber-attack that’s as realistic as it gets when it comes to a scam. Criminals are now setting up official PayPal accounts and sending real PayPal emails. From here, they send out fake invoices to as many individuals as they’d like. Listen to find out the things you can do to detect this fraud, and how you can keep yourself protected. Things you’ll learn in this episode: An in-depth explanation of how the scam works What to do if you receive one of these emails or see one of these invoices How to dispute the invoices through PayPal Things to do and consider if you ever receive scams similar to this one when you cant determine if it’s real or fake. Link to the PayPal dispute page Visit Our Website At to learn more about how to protect your privacy!
/episode/index/show/carriekerskie/id/23942052
info_outline
EP 75 Hermit Spyware: What you need to know
07/20/2022
EP 75 Hermit Spyware: What you need to know
Within the past months there’s been a growing concern over the threat known as hermit spyware. Breaking news titles warn of the damage and financial havoc caused by this new type of cyberattack, causing people to go into a panic with the fear that they may become the next victim. But what exactly is this “hermit spyware”? Are you at risk of being a victim? How can you protect yourself if you are attacked? In this episode, Carrie aims to answer these questions and more, while also easing your worries about this new potential threat. What you’ll learn in this episode: Who is at risk of being a target of hermit spyware? What are some of the things to look for in the event of a spyware attack? What can criminals do after hacking someone with this malware? General rules of thumb to follow to protect yourself against all cyberthreats Visit Our Website At to learn more about how to protect your privacy!
/episode/index/show/carriekerskie/id/23801051
info_outline
EP 74 This 4th, Take Back Your Independence: Why you can't rely on companies to catch fraudulent transactions for you
07/06/2022
EP 74 This 4th, Take Back Your Independence: Why you can't rely on companies to catch fraudulent transactions for you
In this Fourth of July episode, Carrie talks about the dangers of relying on banks, credit companies, and other financial institutions. She stresses the importance of knowing what’s going on in your accounts, and how waiting for your bank to notify you of fraudulent transactions can cost you big time. Things you’ll learn in this week’s episode: Why banks aren’t as legally obligated to inform you of fraud as you may think they are How long you have to report any fraudulent transactions Things to ask yourself when considering taking back your independence, and what’s at risk Visit Our Website At to learn more about how to protect your privacy!
/episode/index/show/carriekerskie/id/23644472
info_outline
EP 73 Privacy vs. Convenience: How much information are you sacrificing for productivity?
06/22/2022
EP 73 Privacy vs. Convenience: How much information are you sacrificing for productivity?
Technology has made many aspects of our life a lot easier, but it's also come with its fair share of downsides, some of which you may not be aware of. The convenience that comes in this digital age comes at a price, the cost being your information. In this episode, Carrie goes over the argument of Privacy vs. Convenience. Things you’ll learn in this episode What is Privacy vs. Convenience, and what are some examples? What's the price of using convenience-based products What about smart devices? How to switch to a privacy mindset Want to take our privacy quiz? Click Visit Our Website At to learn more about how to protect your privacy!
/episode/index/show/carriekerskie/id/23501903
info_outline
EP 72 Experian Changed How Online Credit Freezes are Managed: What You Need to Know
06/01/2022
EP 72 Experian Changed How Online Credit Freezes are Managed: What You Need to Know
A new change makes it easier to access your Experian freeze, listen to find out as Carrie explains this new feature to manage your account online. Resources: Link to Experian Privacy-Mentor Website Link to Protect Your Identity in 14 Days
/episode/index/show/carriekerskie/id/23284490
info_outline
EP 71 Privacy Not Included: How To Find Out If Your Smart Devices Are Exposing Your Privacy
05/18/2022
EP 71 Privacy Not Included: How To Find Out If Your Smart Devices Are Exposing Your Privacy
Want to find out how much your smart devices know about you? Well now you can… This week, Carrie interviews the creator and lead of Mozilla’s Privacy Not Included Guide, Jen Caltrider. This guide reviews things like smart speakers, toys, games, wearables, and other devices that are connected to the internet. However, some of these items come with a pretty “creepy” downside. Watch the episode to find out more! Links and Resources: Privacy Not Included - Mental health apps guide - Visit Our Website At to learn more about how to protect your privacy!
/episode/index/show/carriekerskie/id/23141495
info_outline
EP 70 Watch Out For New Bank Scam Using 2FA Codes
05/04/2022
EP 70 Watch Out For New Bank Scam Using 2FA Codes
2FA was created to protect your online accounts against cyber criminals. In this episode Carrie shares with you a new scam that uses 2FA codes to gain access to your financial accounts. What you’ll learn: What is 2FA or MFA How this scam works Two tools to avoid becoming a victim Want more great tips? Join the Privacy-Mentor email list. No span, just useful tips, tricks, and tools to help you protect your privacy from identity theft, fraud, and cyber threats. If you value your privacy, check out our site at https://privacy-mentor.com/. Your privacy depends on it.
/episode/index/show/carriekerskie/id/22998293
info_outline
EP 69 Interview with Startpage CEO Robert E.G. Beens
04/20/2022
EP 69 Interview with Startpage CEO Robert E.G. Beens
Email plays a big part of communicating in this digital age, but did you know that many of the free email services are scraping your emails to collect information? That’s right. The reason so many of these email services are free, is due to the fact that they are profiting off of data collected via emails you send and receive. This data is then used and sold for marketing or other purposes. Following up one of our previous episodes with 's Director of Brand and Strategic Partnerships, Kelly Finnerty, I sit down with Robert E.G. Beens, the Co-Founder and CEO of and , and a recognized privacy expert and advocate. Here are a few key takeaways you’ll learn in this episode: What is and why was it created Why it's important to protect email privacy What are the risks of not using encrypted email? What to know about encryption Do all parties need to use to maintain encryption? What shouldn’t be sent in an email How to migrate your email to Are custom domains available? Do they offer email plans for businesses or only consumers? How proved they value privacy when censored by Russia? If you are currently using a free email service, you owe it to your privacy to listen to the episode and explore . Your privacy will thank you. Also, don’t forget to check out where we talked to Kelly Finnerty from Robert E.G. Beens is the Co-Founder and CEO of and , and a recognized privacy expert and advocate. At Startpage, Beens oversees operations, product development, technology, and finance. He is also a commercial airline pilot with Netherlands-based airline KLM. He earned his Master’s degree in Corporate, Social & Economic Dutch Law from the University of Utrecht in the Netherlands. Resources: Check out StartMail - Make Startpage your default search engine - Episode 66 - StartPage, The Ethical Search Engine - Visit our website privacy-mentor.com
/episode/index/show/carriekerskie/id/22840694
info_outline
EP 68 Which is More Secure? Fraud Alert, a Credit Lock, or a Credit Freeze?
04/13/2022
EP 68 Which is More Secure? Fraud Alert, a Credit Lock, or a Credit Freeze?
By now you’ve probably heard of some form of credit protection service, whether it be a freeze, a lock, or a fraud alert; however, you’d be surprised to know the differences between these services, and how one form may protect you more than another. In this episode, Carrie and Kyle discuss these three forms of credit protections, what they really do, and which one can actually help protect your personal credit. Things you’ll learn in this episode What are these services, and what they provide Why one of these services is better than the others Where to activate these services Are these free? Will having these in place prevent me from doing anything with my credit? Resources: Steps to place a freeze and show notes
/episode/index/show/carriekerskie/id/22774631
info_outline
EP 67 How Remote Access Software is Used For Both Good And Evil
04/05/2022
EP 67 How Remote Access Software is Used For Both Good And Evil
Remote access software is a topic we’ve brought up several times in previous podcast and blog post, and in this episode Carrie and Kyle go over exactly what it is, and how bad guys are using it to their advantage. In this episode you’ll learn: What is remote access software? What are some common example of it? How are criminals using it? How to detect and remove it What to know to minimize your risk of falling victims to these scams Previous episode we reference where we talk about victims of remote access software Visit our site for more episodes and post Check out true cybercrime podcast -
/episode/index/show/carriekerskie/id/22693883
info_outline
EP 66 Startpage: The Ethical Search Engine That Values Your Privacy
03/30/2022
EP 66 Startpage: The Ethical Search Engine That Values Your Privacy
Here’s a brief overview of what you learn in this episode: Why was created What makes different from other search engines What is a search bubble? Typically, if a product is free, you are the product. How does generate revenue? How to get started with ?
/episode/index/show/carriekerskie/id/22615235
info_outline
EP 65 Tips to Avoid Fraud This Tax Season with ASAC Ron Loecker
03/16/2022
EP 65 Tips to Avoid Fraud This Tax Season with ASAC Ron Loecker
Following up last week’s episode about 1099 fraud and staying on the topic of tax scams this season, Carrie interviews Ron Loecker, Special Agent in Charge of IRS Criminal Investigations. Ron answers some of Carrie's questions and gives some tips to help you avoid any problems this tax year. Things you’ll learn in this episode: What to look for when selecting a tax preparer Are you, or your return preparer responsible for your taxes? How to check if your preparer is legit Will the IRS ever call you threatening to take legal action? Resources: IRS Website IRS Press Released 10 Tips Watch a video of the interview here:
/episode/index/show/carriekerskie/id/22458326
info_outline
EP 64 1099 Fraud: How You're Responsible for Capital Gains Criminals are Making
03/02/2022
EP 64 1099 Fraud: How You're Responsible for Capital Gains Criminals are Making
This week, Carrie talks about another popular issue we see this time of year around tax season. In this situation, a woman received a 1099 form regarding taxable miscellaneous income she’s made off an investment account; The problem is, she’s never opened or had any such account. Find out why criminals are taking advantage of investing platforms, and how victims are being held responsible for paying taxes on money they’ve never made simply because criminals used their identity. Things you’ll learn in this episode: Why criminals are setting up crypto/investing platforms using your Identity How the IRS counts on you to file these accounts you’ve never set up Steps to take to remove these fraudulent tax claims and to restore your information Link to episode 52 that Carrie references in the show: In that episode we go over how the FBI and IRS reach out to you over bank accounts that you’ve never set up.
/episode/index/show/carriekerskie/id/22303943
info_outline
EP 63 The Worst Thing You Can Do If Your Mobile Phone is Hijacked
02/23/2022
EP 63 The Worst Thing You Can Do If Your Mobile Phone is Hijacked
Recently, Carrie received a call from someone worried that their mobile phone number was hacked. Out of fear, and some bad advice, they made some drastic changes on their own to protect their information. What they did not only gave the bad guys more control but locked the victim out of being able to access their own accounts. Listen to find out how you can avoid a situation like this, and what the right steps to take are to protect against phone number theft. Things you’ll learn in this episode: Popular types of phone number fraud The worst thing to do when you find out your number is potentially stolen What the right to do is Tips to protect your number in the future
/episode/index/show/carriekerskie/id/22222988
info_outline
EP 62 Sweetheart Scammers: The Cost of Finding Love Online
02/16/2022
EP 62 Sweetheart Scammers: The Cost of Finding Love Online
Love is in the air in this episode, as Carrie talks about the notorious sweetheart scammers. This Valentine’s Day inspired topic covers a type of criminal that takes advantage of individuals in search of relationships online; but it’s not just those looking for love that are at risk. Carrie will share with you how non-romantic relationships found online could also pose a threat. Learn about sweetheart scammer’s intentions, and the dangers they present to their victims. What you’ll learn from listening to this episode: Who are sweetheart scammers? Why these scams aren’t restricted to only romantic relationships Some extreme case examples demonstrating the severity of these scams Red flags that can indicate someone is a potential sweetheart scammer Link to article Carrie References in the episode: TinderSwindler documentary on Netflix
/episode/index/show/carriekerskie/id/22143113
info_outline
EP 61 Sneaky Scam Makes Hidden Changes to Your Email
02/09/2022
EP 61 Sneaky Scam Makes Hidden Changes to Your Email
Recently, when replying to a client’s email, we received an email undeliverable response saying that their mailbox was full. However, upon closer review, the email address mentioned didn’t belong to my client. We called the client to see if he received my reply. He said “yes.” We then asked him if he was familiar with the email address listed on the undeliverable response, to which he said “no.” Find out what happened when hidden malicious email rules hijacked our client's emails and what we did to resolve the issue.
/episode/index/show/carriekerskie/id/22071743
info_outline
EP 60 Is your Data Showing?
02/02/2022
EP 60 Is your Data Showing?
After listening to last week’s podcast, Carrie’s interview with Kris Coleman (Red5Security) about how to minimize your online exposure, Kyle was curious about his own online exposure. In this episode Kyle shares with you what he found, and the difficulty of removing the information. Things you’ll learn in this episode: How personal data can be found online Tips for navigating data collection sites How difficult or easy is it to remove the information A simple trick that will help reduce information collected on you
/episode/index/show/carriekerskie/id/21986807
info_outline
EP 59 Minimizing Your Online Exposure with Red 5 Security CEO Kris Coleman
01/25/2022
EP 59 Minimizing Your Online Exposure with Red 5 Security CEO Kris Coleman
Carrie is joined by Red5Security CEO Kris Coleman this week as they go over how easy it is for someone to find your personal information online. They discuss topics such as how this information gets out there, and who’s collecting it. They also talk about if you can remove what’s already out there, and things you can do to limit how much data is collected on you. Things you’ll learn in this episode: How your information is collected, even if you’re not the one putting it out there Where it’s collected and why If removing the information out there is possible Tips for limiting your own exposure Link to Red5Security’s website BIO: Mr. Kris Coleman Mr. Kris Coleman founded Red Five Security in 2004 to provide world class, state of the art security and protective intelligence services. Mr. Coleman continues to use his knowledge, experience, and integrity to grow Red Five into a multi-faceted company focused on bespoke security solutions for unique clientele. Working in both the private and public sectors throughout his 20+ year career, he has served with the Central Intelligence Agency, the Federal Bureau of Investigation, and as a former Principal with Good Harbor Consulting. Mr. Coleman’s depth and range of experiences allows the Red Five team to specialize in high quality, proactive, and discreet security services. He has built a unique capability in Red Five to support clients with tailored low-profile security operations, analysis, training, and program and system design. A distinctive portion of Mr. Coleman’s work in the private sector includes the complete assessment, design development, and installation of cutting-edge security programs for high-net-worth clients. Projects have included large residences in Florida, California and the Washington DC, area (some in excess of 45,000 square feet), commercial facilities with challenging security requirements, as well as unique sites overseas. Be sure to check out episode 56, where Carrie interviews another employee of Red5, Special Agent Tom Whalen, as he breaks down FBI Operation Trojan Shield, which resulted in the infiltration of criminal organizations around the world.
/episode/index/show/carriekerskie/id/21894530
info_outline
EP 58 Is your Private Family Foundation at Risk?
01/19/2022
EP 58 Is your Private Family Foundation at Risk?
In this episode, Carrie discusses a case she’s worked on involving a private family foundation. A seemingly innocent call responding to a fake job offer posted online turns into a full blown criminal operation impacting job seekers and foundations alike. Things you’ll learn in this episode: The importance of registering your foundation or company’s domain name What steps to take in reporting website fraud How this type of scam can be harmful to both foundations and people applying for jobs online Website Domain Name Lookup https://www.whois.com/
/episode/index/show/carriekerskie/id/21823334
info_outline
EP 57 How to Remove Malicious Remote Access Software
01/12/2022
EP 57 How to Remove Malicious Remote Access Software
Ever recieved some well intended advice that turned out to do more harm then good? In this episode Carrie talks about some things aren't always as they seem. She goes over how harmful remote access software can hide on your device, and explains how it got there in the first place. Things you'll learn in this episode: Why remote access software isn't detected as malware How you can find out if this software is on your device How to uninstall it Find out how bad guys are able to put it on your computer with your permission
/episode/index/show/carriekerskie/id/21746642
info_outline
EP 56 Deceiving the Deceptors: Inside Operation Trojan Shield with S.A. Tom Whalen
01/05/2022
EP 56 Deceiving the Deceptors: Inside Operation Trojan Shield with S.A. Tom Whalen
Taking down an international criminal ring isn’t easy. They often rely on sophisticated technology to thwart investigators. That same technology was used to take down hundreds of thousands of criminals. In this episode I speak with Tom Whalen, a former Special Agent with the FBI. For the first time, he is discussing Operation Trojan Shield and how the FBI, and other international agencies, used the criminal’s technology against them. It should be noted that Tom received permission to discuss this case. In this episode you’ll discover: Who and what are transnational criminal organizations (TCOs) What technology were the criminals using How the FBI ended up in possession of the technology How it was used against the criminals Why it’s important to question the technology we use – who has access to what information Additional information on this episode is on our website
/episode/index/show/carriekerskie/id/21675332
info_outline
EP 55 How Much is your Location Data Worth?
12/29/2021
EP 55 How Much is your Location Data Worth?
In this episode Carrie and Kyle go over the true value of your location tracking data. Carrie talks about the high price it’s worth and why it’s in such a high demand. They also go over the importance of choosing the correct settings and only allowing certain apps to have access to this information. Things you’ll learn in this episode: How much our location data is being sold for What apps should have access Why is this information so valuable?
/episode/index/show/carriekerskie/id/21546929
info_outline
EP 54 The Worst Passwords of 2021
12/22/2021
EP 54 The Worst Passwords of 2021
In this episode Carrie and Kyle go over the top worst passwords of 2021. They talk about the general rules to follow when creating a password, and what mistakes to avoid. Carrie also mentions how often you need to change your password, and what do to if your password was involved in a data breach. They also bring up a previous podcast episode where Carrie and Kyle went over the worst and best locations to store passwords. Things you’ll learn from this episode Examples of the worst and most common passwords How long should a password be? How often do you need to change a password? Tips for creating new passwords Link to a previous episode discussing the best and worst places to store your passwords Link to NordPass's list of top 200 Worst Passwords
/episode/index/show/carriekerskie/id/21481628
info_outline
EP 53 How much are your Smart Devices Listening to You?
12/15/2021
EP 53 How much are your Smart Devices Listening to You?
In this episode, Carrie shares a story about a woman who found out just how much the smart devices in her house were listening to. Carrie cautions the idea of using these devices for privacy reasons and explains why she doesn’t own one herself. She also goes over why some smart devices are becoming more common and less expensive than normal products, then tells the listener how they can request their own Amazon data. Things you’ll learn in this episode: What information is being saved by smart devices How to request your own smart device data Is your privacy worth the convenience these devices provide? To request your Amazon Smart Device data visit: > Manage Your Alexa Data > Under Smart Home Device History > Email Complete History To request your Amazon Personal Info Data visit Go to Request my Data
/episode/index/show/carriekerskie/id/21433781
info_outline
EP 52 Be on the Lookout for this Welcome Letter in the Mail
12/08/2021
EP 52 Be on the Lookout for this Welcome Letter in the Mail
In this episode Carrie warns about receiving letters for bank accounts that you didn’t open. She emphasizes the importance of not ignoring these letters and talks about the repercussions of what could happen if you do. Carrie also explains what to do if you realize that your identity is being used to launder money within a fraudulent bank account and list some helpful websites that will make monitoring for these accounts more accessible. In this episode you will learn: What to do if you receive a welcome letter for a bank account you didn’t open What money laundering fraud is Steps to take if you have a fraudulent account Why credit monitoring alone won’t detect this type of identity theft How to get your report that will show your banking history Resources: EWS (Early Warning Systems) Chex Systems (Click Request Your Report)
/episode/index/show/carriekerskie/id/21370055
info_outline
EP 51 Passcode vs. Face ID, Which is More Secure?
12/01/2021
EP 51 Passcode vs. Face ID, Which is More Secure?
In this episode Carrie and Kyle talk about the different types of security methods on your Apple device. Carrie answers Kyle’s question about which methods are “safer” to use, as well as explaining their potential weaknesses. She also shares stories of why the biometrical side of security isn’t always the most reliable. In this episode you will learn: Is Face ID more secure than your Passcode? What about using your fingerprint? The importance of privacy over convenience
/episode/index/show/carriekerskie/id/21327608
info_outline
EP 50 Anti-Virus, is it necessary?
11/24/2021
EP 50 Anti-Virus, is it necessary?
In this episode Carrie answers some of Kyle’s question about what exactly an anti-virus- what it can and cannot do. Carrie also mentions how an office’s systems were compromised due to the installation of a fake anti-virus and provides the name of a website to help you select the best anti-virus program for your devices. In this episode you will learn: An understanding of how anti-viruses work Do anti-viruses protect against all viruses? Do I need an anti-virus on my iPhone? How to find a trustworthy anti-virus Link to AV-Test’s website
/episode/index/show/carriekerskie/id/21225395
info_outline
Be on the Lookout for Text Message Scams
11/17/2021
Be on the Lookout for Text Message Scams
In this episode Carrie and Kyle bring up scam text messages that they’ve being seeing recently. They discuss the different types they’ve received as well as the reasoning behind why they are being sent out. Carrie also shares tips to protect yourself from these messages and mentions ways to report these scam numbers. In this episode you will learn: A few examples of different text message scams Why these scams are being sent out Simple tricks to determine which messages are real or fake How to report these fraudulent/scam numbers
/episode/index/show/carriekerskie/id/21146912