In this episode of The Mel Robbins Podcast, cybersecurity expert Caitlin Sarian explains how everyday digital activities create an information trail that cybercriminals can exploit. She describes how cybercrime has grown to become the world's third-largest economy and discusses the psychological tactics scammers use to manipulate their victims.
Sarian outlines practical steps people can take to protect themselves online, comparing essential cybersecurity measures to daily hygiene routines. The discussion covers specific vulnerabilities in technology and apps, from password security to wearable devices that collect health data. Sarian also addresses common misconceptions about online privacy features and provides guidance for protecting children in digital spaces.

Sign up for Shortform to access the whole episode summary along with additional materials like counterarguments and context.
Caitlin Sarian emphasizes the critical importance of cybersecurity education in today's digital landscape. She explains that a person's digital footprint encompasses all online activities, from app usage to website visits, creating an extensive trail of personal information. This information, as Mel Robbins notes, can connect with family members' data to create comprehensive digital profiles that cybercriminals can exploit.
According to Sarian, cybercrime has become the world's third-largest economy, surpassing major nations like Germany and Japan. Scammers employ sophisticated psychological tactics, often posing as authority figures and using fear to extract cryptocurrencies or other payments from their victims.
Mel Robbins acknowledges a common problem: many people thoughtlessly share locations, grant app permissions, and accept cookies without understanding the risks. Sarian compares essential cybersecurity measures to daily hygiene routines, emphasizing the need for proactive protection.
To guard against over 95% of online threats, Sarian recommends several key practices: using unique passwords, enabling auto-updates, freezing credit, and carefully reviewing links before clicking. She also advises using password managers, enabling multi-factor authentication, and employing aliases and separate phone numbers for online signups to minimize personal information exposure.
Sarian identifies two primary ways hackers can access internet-connected devices: through reused passwords and unsecured Wi-Fi networks. She expresses particular concern about wearable technology that collects intimate health data, warning about the potential exploitation of such information when pooled into AI systems.
For social media and online account security, Sarian cautions against common vulnerabilities like password reuse and oversaving logins. She clarifies misconceptions about incognito mode, explaining that while it prevents local history recording, it doesn't stop website tracking. For children's online safety, she recommends private accounts and careful monitoring of messaging platforms like Roblox, emphasizing the importance of maintaining open dialogue about online safety.
1-Page Summary
Caitlin Sarian stresses the need for public education on cybersecurity in today's digital age, where cyber scams constitute a global economic threat. Understanding one's digital footprint is the crux of defending against cybercriminals.
Cybersecurity is crucial in safeguarding the myriad facets of one’s digital presence, highlighting that everything one does online contributes to their digital footprint.
Caitlin Sarian defines a digital footprint as encompassing every single thing you do online — from using apps and playing games to visiting websites and creating accounts. Mel Robbins echoes this by discussing how individual digital footprints can connect with family members' online information, creating a more extensive digital profile.
Sarian points out the alarming amount of public information available online, including personal and family details. Open source intelligence (OSINT) enables the easy collection of this data, which is often used to answer common security questions, thereby giving hackers a way in. She gives an example of a company that can compile detailed profiles of individuals in seconds using AI, drawing on various public sources like wedding registries and social media.
Cyber scams pose a severe economic threat, with cybercrime ranked as the third-largest economy in the world, trumping some of the largest national economies.
Sarian highlights that the revenue generated from cyber scams currently surpasses major economies, such as Germany and Japan. This staggering comparison underscores the pervasive and lucrative nature of cybercr ...
Cybersecurity Threats and Common Online Scams
Online security is a critical concern for individuals in our digitally connected world. Cybersecurity expert Caitlin Sarian, along with Mel Robbins, shares practical advice on how to safeguard one's personal information from cybercriminals.
Mel Robbins acknowledges that she, like many others, blithely shares her location for services, grants app permissions, and accepts all cookies without considering the risks. Caitlin Sarian adds that most people are unaware of what accepting cookies mean and what risks this could involve.
The discussion highlights that cybersecurity necessitates proactive steps, much like regular hygiene routines such as teeth brushing. Caitlin remarks on the casual manner in which people give apps like Uber Eats access to more permissions than needed, suggesting that users should limit such access.
Caitlin likens essential cybersecurity measures to daily hygiene routines; they're crucial for future protection. She plans to explain why companies collect data and its potential misuse, helping people to take informed decisions about their online security.
Caitlin Sarian intends to describe simple steps to protect against over 95% of online threats. These steps include unique passwords, turning on auto updates, freezing credit, and pausing before clicking on any links.
Robbins confesses to neglecting to update software, an example of an overlooked basic security practice. Sarian warns against such oversights and emphasizes multi-factor authentication, especially for key accounts like banks or social media.
Instances where real working phone numbers and emails can be generated for signups are mentioned, avoiding the need for sharing personal contact details. Sarian also recommends using secure (HTTPS) websites and a VPN, particularly when using public Wi-Fi.
Sarian advises using password managers for creating and storing passwords securely and suggests being vigilant about bank fraud alerts and avoiding giving out easily accessible personal information online. T ...
Practical Steps to Protect Oneself Online
Caitlin Sarian raises awareness about various risks associated with technology and apps, emphasizing the need for increased privacy and security measures by users.
Caitlin Sarian delves into the security risks of internet-connected devices, explaining that there are two main ways people can gain unauthorized access to cameras: by reusing passwords or through unsecured Wi-Fi networks. She highlights that hacked passwords can lead to tampering with devices, and unsecured Wi-Fi networks can allow hackers to access and control cameras without the owner's knowledge.
Sarian also discusses risks associated with data collected by wearable technology like rings that track personal health metrics. She expresses discomfort with pooling such intimate data into AI systems, given the potential for detailed profiles that could be exploited. She is cautious about sensitive health data and emphasizes the increasing collection of highly personal data such as menstruation, sleep, and even eye placements for marketing purposes, which poses significant privacy concerns.
Sarian warns against the dangers of reusing passwords and oversaving logins, especially in browsers like Google Chrome. This could lead to unauthorized access and potential exploitation across multiple services. She advises users to avoid posting live vacation photos to prevent giving scammers information for identity theft and fraud. Sarian also stresses the importance of using unique passwords and locking apps down on private mode to ensure accounts are secured.
Sarian covers the misconception about incognito mode, clarifying that while it prevents the local device from recording history, it does not stop websites from tracking a user's activity. She suggests that services like Venmo an ...
Specific Vulnerabilities in Technology and Apps
Download the Shortform Chrome extension for your browser
