#1 Cybersecurity Expert Reveals: 5 Ways to Protect Yourself Online (Starting Tonight)
Episode
79 min
Read time
3 min
AI-Generated Summary
Key Takeaways
- ✓Password Security: Hackers run algorithms generating 10,000 variations of a single base password in seconds, exploiting the common habit of using one root word with minor changes like numbers or symbols. Identify your highest-priority accounts — banking, social media, retirement — and assign each a long, unique passphrase. Use iPhone's built-in password manager, or a dedicated app like 1Password or Keeper Security, and lock any password notes with Face ID.
- ✓Credit Freeze: Freezing your credit at all three bureaus takes five to ten minutes per bureau and costs nothing. It prevents identity thieves from opening accounts in your name even when your Social Security number is compromised in a data breach. Unfreeze only when applying for a loan or new card, then refreeze immediately. This single step is especially critical for elderly parents and grandparents who are frequent targets of identity theft schemes.
- ✓Data Minimization Online: People-search sites like WhitePages, TruePeopleSearch, and PeopleFinder publish home addresses, relatives' names, and even IP addresses publicly. Each site has a buried opt-out page accessible through its privacy policy. A deletion service called Incogni automates monthly opt-out requests across hundreds of data brokers internationally, continuously scrubbing personal information that reappears after removal, reducing the raw material scammers use to impersonate or extort individuals.
- ✓App Permission Audit: Instagram, Facebook, and TikTok actively scan camera rolls users have granted full photo access to, generating unsolicited content suggestions from unposted images. For every app, review three settings: camera access, microphone access, and location access. Set each to "while using" or "limit access to selected photos" rather than full permission. Precise location on Instagram defaults to on at installation and should be disabled immediately in settings.
- ✓Venmo Scam Mechanics: Scammers send money from stolen credit cards to random Venmo accounts, then message the recipient claiming it was a mistake and requesting a refund. The victim sends real money back, but the original stolen-card transaction gets reversed by the bank, leaving the victim out of pocket. The safest defense is avoiding Venmo and Zelle for transactions with strangers and using a credit card wherever possible, since credit cards offer stronger charge-reversal protections than debit-linked payment apps.
What It Covers
Cybersecurity expert Caitlin Sarian joins Mel Robbins to explain why every person with a smartphone is a target for online scams — the third largest economy globally — and delivers five concrete steps anyone can take immediately to protect passwords, credit, personal data, and family members from increasingly sophisticated digital threats.
Key Questions Answered
- •Password Security: Hackers run algorithms generating 10,000 variations of a single base password in seconds, exploiting the common habit of using one root word with minor changes like numbers or symbols. Identify your highest-priority accounts — banking, social media, retirement — and assign each a long, unique passphrase. Use iPhone's built-in password manager, or a dedicated app like 1Password or Keeper Security, and lock any password notes with Face ID.
- •Credit Freeze: Freezing your credit at all three bureaus takes five to ten minutes per bureau and costs nothing. It prevents identity thieves from opening accounts in your name even when your Social Security number is compromised in a data breach. Unfreeze only when applying for a loan or new card, then refreeze immediately. This single step is especially critical for elderly parents and grandparents who are frequent targets of identity theft schemes.
- •Data Minimization Online: People-search sites like WhitePages, TruePeopleSearch, and PeopleFinder publish home addresses, relatives' names, and even IP addresses publicly. Each site has a buried opt-out page accessible through its privacy policy. A deletion service called Incogni automates monthly opt-out requests across hundreds of data brokers internationally, continuously scrubbing personal information that reappears after removal, reducing the raw material scammers use to impersonate or extort individuals.
- •App Permission Audit: Instagram, Facebook, and TikTok actively scan camera rolls users have granted full photo access to, generating unsolicited content suggestions from unposted images. For every app, review three settings: camera access, microphone access, and location access. Set each to "while using" or "limit access to selected photos" rather than full permission. Precise location on Instagram defaults to on at installation and should be disabled immediately in settings.
- •Venmo Scam Mechanics: Scammers send money from stolen credit cards to random Venmo accounts, then message the recipient claiming it was a mistake and requesting a refund. The victim sends real money back, but the original stolen-card transaction gets reversed by the bank, leaving the victim out of pocket. The safest defense is avoiding Venmo and Zelle for transactions with strangers and using a credit card wherever possible, since credit cards offer stronger charge-reversal protections than debit-linked payment apps.
- •Nine-Second Rule Before Clicking: Phishing emails now replicate verified sender names, reference real employees, and mirror legitimate website language precisely. Before clicking any link, pause nine seconds — enough time to check whether the sender's actual email domain matches the real organization, hover over the link to preview the destination URL, and consider calling the organization directly instead. Cybersecurity expert Sarian's personal rule is to never click links in emails at all, calling the institution directly to handle any account action.
Notable Moment
Sarian reveals that AI tools can compile a detailed profile of any person within thirty seconds by scraping public data — including a target's dog's name sourced from a wedding registry gift label. This illustrates how seemingly harmless public posts collectively create exploitable intelligence that scammers use to answer security questions and impersonate victims convincingly.
You just read a 3-minute summary of a 76-minute episode.
Get The Mel Robbins Podcast summarized like this every Monday — plus up to 2 more podcasts, free.
Pick Your Podcasts — FreeKeep Reading
More from The Mel Robbins Podcast
My Process For Achieving Goals: How to Change Your Life in 5 Simple Steps
Apr 23 · 69 min
The Model Health Show
The Menopause Gut: Why Metabolism Changes & How to Reclaim Your Body - With Cynthia Thurlow
Apr 27
More from The Mel Robbins Podcast
Stanford Luck Researcher: How to Manifest the Life You Want
Apr 20 · 64 min
The Rest is History
664. Britain in the 70s: Scandal in Downing Street (Part 3)
Apr 26
More from The Mel Robbins Podcast
We summarize every new episode. Want them in your inbox?
My Process For Achieving Goals: How to Change Your Life in 5 Simple Steps
Stanford Luck Researcher: How to Manifest the Life You Want
The 5 Top Health Lies & The Truth You Need to Feel Better Today
The Best Money Advice You Will Ever Receive: 4 Rules From the Top Financial Minds In The World
#1 Neurologists: What You Can Do to Prevent Alzheimer's & Dementia
Similar Episodes
Related episodes from other podcasts
The Model Health Show
Apr 27
The Menopause Gut: Why Metabolism Changes & How to Reclaim Your Body - With Cynthia Thurlow
The Rest is History
Apr 26
664. Britain in the 70s: Scandal in Downing Street (Part 3)
The Learning Leader Show
Apr 26
685: David Epstein - The Freedom Trap, Narrative Values, General Magic, The Nobel Prize Winner Who Simplified Everything, Wearing the Same Thing Everyday, and Why Constraints Are the Secret to Your Best Work
The AI Breakdown
Apr 26
Where the Economy Thrives After AI
Cognitive Revolution
Apr 26
AI in the AM: 99% off search, GPT-5.5 is "clean", model welfare analysis, & efficient analog compute
This podcast is featured in Best Mindset Podcasts (2026) — ranked and reviewed with AI summaries.
You're clearly into The Mel Robbins Podcast.
Every Monday, we deliver AI summaries of the latest episodes from The Mel Robbins Podcast and 192+ other podcasts. Free for up to 3 shows.
Start My Monday DigestNo credit card · Unsubscribe anytime