Podcasts > The Mel Robbins Podcast > #1 Cybersecurity Expert Reveals: 5 Ways to Protect Yourself Online (Starting Tonight)

#1 Cybersecurity Expert Reveals: 5 Ways to Protect Yourself Online (Starting Tonight)

By Stitcher

In this episode of The Mel Robbins Podcast, cybersecurity expert Caitlin Sarian explains how everyday digital activities create an information trail that cybercriminals can exploit. She describes how cybercrime has grown to become the world's third-largest economy and discusses the psychological tactics scammers use to manipulate their victims.

Sarian outlines practical steps people can take to protect themselves online, comparing essential cybersecurity measures to daily hygiene routines. The discussion covers specific vulnerabilities in technology and apps, from password security to wearable devices that collect health data. Sarian also addresses common misconceptions about online privacy features and provides guidance for protecting children in digital spaces.

Listen to the original

#1 Cybersecurity Expert Reveals: 5 Ways to Protect Yourself Online (Starting Tonight)

This is a preview of the Shortform summary of the Feb 19, 2026 episode of the The Mel Robbins Podcast

Sign up for Shortform to access the whole episode summary along with additional materials like counterarguments and context.

#1 Cybersecurity Expert Reveals: 5 Ways to Protect Yourself Online (Starting Tonight)

1-Page Summary

Cybersecurity Threats and Common Online Scams

Caitlin Sarian emphasizes the critical importance of cybersecurity education in today's digital landscape. She explains that a person's digital footprint encompasses all online activities, from app usage to website visits, creating an extensive trail of personal information. This information, as Mel Robbins notes, can connect with family members' data to create comprehensive digital profiles that cybercriminals can exploit.

According to Sarian, cybercrime has become the world's third-largest economy, surpassing major nations like Germany and Japan. Scammers employ sophisticated psychological tactics, often posing as authority figures and using fear to extract cryptocurrencies or other payments from their victims.

Practical Steps to Protect Oneself Online

Mel Robbins acknowledges a common problem: many people thoughtlessly share locations, grant app permissions, and accept cookies without understanding the risks. Sarian compares essential cybersecurity measures to daily hygiene routines, emphasizing the need for proactive protection.

To guard against over 95% of online threats, Sarian recommends several key practices: using unique passwords, enabling auto-updates, freezing credit, and carefully reviewing links before clicking. She also advises using password managers, enabling multi-factor authentication, and employing aliases and separate phone numbers for online signups to minimize personal information exposure.

Specific Vulnerabilities in Technology and Apps

Sarian identifies two primary ways hackers can access internet-connected devices: through reused passwords and unsecured Wi-Fi networks. She expresses particular concern about wearable technology that collects intimate health data, warning about the potential exploitation of such information when pooled into AI systems.

For social media and online account security, Sarian cautions against common vulnerabilities like password reuse and oversaving logins. She clarifies misconceptions about incognito mode, explaining that while it prevents local history recording, it doesn't stop website tracking. For children's online safety, she recommends private accounts and careful monitoring of messaging platforms like Roblox, emphasizing the importance of maintaining open dialogue about online safety.

1-Page Summary

Additional Materials

Clarifications

  • A digital footprint is the record of all the information you leave behind when you use the internet. It includes data from social media posts, online purchases, search history, and even metadata like location and device details. This footprint can be passive (collected without your direct input) or active (information you intentionally share). Over time, these pieces combine to form a detailed profile of your online behavior and preferences.
  • Cybercriminals use data aggregation techniques to link information from multiple sources, including social media, public records, and data breaches. Family members often share overlapping details like addresses, phone numbers, and relatives' names, which helps connect their profiles. This combined data creates a more detailed and accurate digital identity for each person. Such profiles enable targeted scams or identity theft by exploiting relationships and shared information.
  • Calling cybercrime the "world's third-largest economy" highlights its massive scale and profitability, rivaling the GDP of major countries. This comparison underscores how cybercriminal activities generate enormous illegal revenue globally. It implies significant resources and organization behind cybercrime, making it a major threat to economies and security. The phrase stresses the urgent need for robust cybersecurity measures and international cooperation.
  • Scammers often impersonate trusted figures like police officers or company representatives to gain credibility. They create a sense of urgency or fear, such as threatening legal action or account suspension, to pressure victims into quick decisions. This emotional manipulation reduces victims' ability to think critically and verify the scam. The goal is to make victims pay money or share sensitive information before doubting the scammer’s claims.
  • Freezing credit is a security measure that restricts access to your credit report, preventing new credit accounts from being opened in your name without your permission. It involves contacting credit bureaus to place a freeze, which blocks lenders from viewing your credit file. This helps stop identity thieves from using your personal information to commit fraud. You can lift the freeze temporarily when you need to apply for credit.
  • Multi-factor authentication (MFA) requires users to provide two or more verification factors to access an account, such as a password plus a code sent to a phone. This adds layers of security beyond just a password, making unauthorized access much harder. Even if a password is stolen, the attacker still needs the second factor to log in. Common MFA methods include text messages, authentication apps, or biometric data like fingerprints.
  • Wearable technology collects detailed health data like heart rate, sleep patterns, and activity levels. When this data is aggregated and analyzed by AI systems, it can reveal sensitive personal health insights. If hacked or misused, such information could lead to privacy breaches or discrimination by employers or insurers. Protecting this data requires strong security measures and user awareness.
  • Incognito mode only stops your browser from saving your browsing history, cookies, and site data locally on your device. It does not hide your activity from websites, internet service providers, or network administrators. Websites can still track you using your IP address and other browser fingerprinting techniques. To prevent online tracking, additional tools like VPNs or privacy-focused browsers are needed.
  • Monitoring children's online activities on platforms like Roblox helps protect them from inappropriate content, cyberbullying, and online predators. Parents can use built-in parental controls to restrict chat features, limit friend requests, and set spending limits. Regularly reviewing the child’s friend list and game history provides insight into their interactions and activities. Open communication encourages children to share concerns and learn safe online habits.
  • Using aliases means providing a fake or alternate name instead of your real one when signing up for online services. Separate phone numbers, such as those from virtual phone apps or prepaid SIM cards, prevent your main number from being linked to your online activities. This reduces the risk of identity theft and limits targeted advertising or spam. It also helps keep your real identity and contact details private from potential hackers or data breaches.

Counterarguments

  • While cybersecurity education is important, it's also crucial to ensure that it is accessible and understandable for all users, regardless of their technical background.
  • A digital footprint is indeed extensive, but not all online activities are equally risky or revealing; some data may be inconsequential.
  • Cybercriminals can exploit digital profiles, but it's also worth noting that not all data aggregation leads to criminal activity; some is used for legitimate business purposes.
  • Cybercrime's economic impact is significant, but comparing it to the economy of entire nations may oversimplify the complexities of both economies and cybercrime.
  • Psychological tactics are used by scammers, but not all authority figure communications are scams; discernment is key.
  • Thoughtless sharing of information is a problem, but user interfaces and default settings often encourage or even require such behavior.
  • Comparing cybersecurity measures to daily hygiene is a useful analogy, but it may not fully capture the complexity and technical nature of cybersecurity practices.
  • While the recommended practices can guard against many threats, no set of practices can guarantee 100% safety; new threats constantly emerge.
  • Password managers and multi-factor authentication greatly enhance security, but they also introduce new dependencies and potential points of failure.
  • Reused passwords and unsecured Wi-Fi are common issues, but focusing on them might overlook other vulnerabilities like zero-day exploits or social engineering attacks.
  • Wearable technology does collect sensitive data, but there are also benefits to health monitoring, and not all data collection leads to exploitation.
  • Incognito mode has limitations, but it can still be a useful tool for privacy in certain contexts.
  • Private accounts and monitoring are important for children's safety, but over-monitoring can infringe on privacy and trust; finding a balance is key.
  • Open dialogue about online safety is essential, but it should be age-appropriate and evolve as children grow and their online activities change.

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free
#1 Cybersecurity Expert Reveals: 5 Ways to Protect Yourself Online (Starting Tonight)

Cybersecurity Threats and Common Online Scams

Caitlin Sarian stresses the need for public education on cybersecurity in today's digital age, where cyber scams constitute a global economic threat. Understanding one's digital footprint is the crux of defending against cybercriminals.

Cybersecurity Protects One's Digital Footprint, Covering all Online Activities and Accounts

Cybersecurity is crucial in safeguarding the myriad facets of one’s digital presence, highlighting that everything one does online contributes to their digital footprint.

Everything Online Contributes To a Person's Digital Footprint

Caitlin Sarian defines a digital footprint as encompassing every single thing you do online — from using apps and playing games to visiting websites and creating accounts. Mel Robbins echoes this by discussing how individual digital footprints can connect with family members' online information, creating a more extensive digital profile.

Cybercriminals Exploit Public Personal Information For Scams

Sarian points out the alarming amount of public information available online, including personal and family details. Open source intelligence (OSINT) enables the easy collection of this data, which is often used to answer common security questions, thereby giving hackers a way in. She gives an example of a company that can compile detailed profiles of individuals in seconds using AI, drawing on various public sources like wedding registries and social media.

Cyber Scams: A Global Economic Threat

Cyber scams pose a severe economic threat, with cybercrime ranked as the third-largest economy in the world, trumping some of the largest national economies.

Cybercrime Is the Third-Largest Economy, Surpassing Major Nations

Sarian highlights that the revenue generated from cyber scams currently surpasses major economies, such as Germany and Japan. This staggering comparison underscores the pervasive and lucrative nature of cybercr ...

Here’s what you’ll find in our full summary

Registered users get access to the Full Podcast Summary and Additional Materials. It’s easy and free!
Start your free trial today

Cybersecurity Threats and Common Online Scams

Additional Materials

Clarifications

  • A digital footprint is the trail of data you leave behind from all your online activities, including posts, searches, and interactions. It can be passive (collected without your direct input, like IP addresses) or active (information you intentionally share). This footprint can reveal personal habits, preferences, and locations, which can be used to build detailed profiles. Managing your digital footprint is essential to protect privacy and reduce vulnerability to cyber threats.
  • Open Source Intelligence (OSINT) refers to the process of collecting information from publicly available sources like websites, social media, and public records. It is used by individuals and organizations to gather data without hacking or illegal methods. Cybercriminals use OSINT to find personal details that help them bypass security measures. Law enforcement and security experts also use OSINT to track threats and prevent attacks.
  • AI uses algorithms to scan and collect data from various public sources like social media, websites, and registries. It then analyzes patterns and links between data points to build comprehensive profiles. Machine learning helps the AI improve accuracy by recognizing relevant information and filtering out noise. This process enables quick, automated aggregation of detailed personal information.
  • Cybercrime revenue refers to the total money criminals earn from illegal online activities like scams, hacking, and fraud. Comparing it to national economies shows how financially massive and impactful cybercrime has become globally. This comparison highlights the scale of the threat and the urgent need for stronger cybersecurity measures. It also implies that cybercrime can destabilize economies and affect millions of people worldwide.
  • Scammers often pose as trusted figures like bank representatives or government officials to gain victims' trust. They create a sense of urgency or fear to pressure individuals into making hasty decisions. By instilling panic or a false sense of authority, scammers aim to manipulate victims into sharing sensitive information or sending money. Understanding these tactics can help individuals recognize and avoid falling victim to such scams.
  • Extortion scams involving private photos often start when scammers gain access to intimate images through hacking, phishing, or social engineering. They then threaten to share these photos publicly or with the victim’s contacts unless a ransom is paid. Fake online relationships, also called romance sca ...

Counterarguments

  • While public education on cybersecurity is important, it is not the only solution; there must also be a concerted effort from tech companies to design more secure systems and from governments to enforce stricter cybersecurity regulations.
  • Managing one's digital footprint is important, but it can be extremely difficult to control all aspects of it due to the pervasive tracking and data collection practices of many online services.
  • The assertion that cybersecurity protects all aspects of a person's digital footprint might be overly optimistic, as no security measures are foolproof, and there are always new vulnerabilities being discovered.
  • The idea that AI can compile detailed profiles in seconds may be true, but it also raises privacy concerns and questions about the ethics of such practices, as well as the accuracy and potential misuse of the compiled data.
  • While cybercrime is a significant economic threat, comparing it to the economy of entire nations might not accurately reflect the complexity of national economies or the multifaceted nature of cybercrime's impact.
  • Psychological tactics are indeed used by scammers, but not all scams are sophi ...

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free
#1 Cybersecurity Expert Reveals: 5 Ways to Protect Yourself Online (Starting Tonight)

Practical Steps to Protect Oneself Online

Online security is a critical concern for individuals in our digitally connected world. Cybersecurity expert Caitlin Sarian, along with Mel Robbins, shares practical advice on how to safeguard one's personal information from cybercriminals.

Many Are Unaware of Essential Online Security Measures

Mel Robbins acknowledges that she, like many others, blithely shares her location for services, grants app permissions, and accepts all cookies without considering the risks. Caitlin Sarian adds that most people are unaware of what accepting cookies mean and what risks this could involve.

Most Accept Cookies, Share Locations, and Grant Permissions Without Understanding Risks

The discussion highlights that cybersecurity necessitates proactive steps, much like regular hygiene routines such as teeth brushing. Caitlin remarks on the casual manner in which people give apps like Uber Eats access to more permissions than needed, suggesting that users should limit such access.

Cybersecurity Requires Proactive Steps, Like Brushing Teeth

Caitlin likens essential cybersecurity measures to daily hygiene routines; they're crucial for future protection. She plans to explain why companies collect data and its potential misuse, helping people to take informed decisions about their online security.

Simple Cybersecurity Routines Reduce Online Vulnerability

Caitlin Sarian intends to describe simple steps to protect against over 95% of online threats. These steps include unique passwords, turning on auto updates, freezing credit, and pausing before clicking on any links.

Protective Measures: Unique Passwords, Auto Updates, Freeze Credit, Pause Before Clicking

Robbins confesses to neglecting to update software, an example of an overlooked basic security practice. Sarian warns against such oversights and emphasizes multi-factor authentication, especially for key accounts like banks or social media.

Instances where real working phone numbers and emails can be generated for signups are mentioned, avoiding the need for sharing personal contact details. Sarian also recommends using secure (HTTPS) websites and a VPN, particularly when using public Wi-Fi.

Minimizing Shared Personal Data Online Reduces Cybercriminal Exposure

Sarian advises using password managers for creating and storing passwords securely and suggests being vigilant about bank fraud alerts and avoiding giving out easily accessible personal information online. T ...

Here’s what you’ll find in our full summary

Registered users get access to the Full Podcast Summary and Additional Materials. It’s easy and free!
Start your free trial today

Practical Steps to Protect Oneself Online

Additional Materials

Counterarguments

  • While unique passwords are important, they can be difficult to remember, and password managers themselves can be a point of vulnerability if compromised.
  • Automatic software updates are generally beneficial, but they can sometimes introduce new bugs or remove features that users rely on, which can be frustrating and counterproductive.
  • Freezing credit is a strong protective measure, but it can also be inconvenient when one needs to legitimately apply for credit or services that require a credit check.
  • Multi-factor authentication adds security but can also add complexity to the login process and can be a barrier for less tech-savvy individuals.
  • Using aliases and separate email addresses can help protect privacy, but it can also lead to confusion and difficulty managing multiple identities and accounts.
  • VPNs enhance security on public Wi-Fi, but they can also slow down internet speeds and some free or untrustworthy VPN services may log user activity.
  • Relying on deletion services or tools like Incogni assumes that these services are effective and trustworthy, which may not always be the case.
  • The advice to pause before clicking on links is sound, but it may not be sufficient to protect against sophisticated phishing attacks that mimic legitimate websites.
  • The recommendation to regularly update passwords can lead to "security fatigue" and may not be as effective as using a strong, unique password and changing it only in response to a suspected or confirmed breach.
  • The comparison of cybersecurity routines to daily hygien ...

Actionables

  • You can create a personal cybersecurity checklist to perform at the start of each month, ensuring you cover all the basics like checking for software updates, reviewing app permissions, and changing passwords if necessary. Think of it as a monthly "cybersecurity audit" for your personal devices, similar to how you might check your car's oil or tire pressure regularly to prevent issues down the line.
  • Develop a habit of using a different browser or a browser extension dedicated to online shopping and social media, separate from the one you use for more sensitive tasks like banking or work. This can help compartmentalize your online activities and limit the spread of tracking cookies and potential security breaches from one aspect of your digital life to another.
  • Organize a "security swap" with a friend w ...

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free
#1 Cybersecurity Expert Reveals: 5 Ways to Protect Yourself Online (Starting Tonight)

Specific Vulnerabilities in Technology and Apps

Caitlin Sarian raises awareness about various risks associated with technology and apps, emphasizing the need for increased privacy and security measures by users.

Smart and Wearable Tech Pose Privacy and Security Risks

Internet-Connected Devices Can Be Hacked, Granting Access to Cameras, Microphones, and Data

Caitlin Sarian delves into the security risks of internet-connected devices, explaining that there are two main ways people can gain unauthorized access to cameras: by reusing passwords or through unsecured Wi-Fi networks. She highlights that hacked passwords can lead to tampering with devices, and unsecured Wi-Fi networks can allow hackers to access and control cameras without the owner's knowledge.

Wearable Tech Data Exploitation Risks

Sarian also discusses risks associated with data collected by wearable technology like rings that track personal health metrics. She expresses discomfort with pooling such intimate data into AI systems, given the potential for detailed profiles that could be exploited. She is cautious about sensitive health data and emphasizes the increasing collection of highly personal data such as menstruation, sleep, and even eye placements for marketing purposes, which poses significant privacy concerns.

Secure Social Media and Online Accounts Against Compromise

Reusing Passwords and Oversharing Personal Information Make Accounts Vulnerable

Sarian warns against the dangers of reusing passwords and oversaving logins, especially in browsers like Google Chrome. This could lead to unauthorized access and potential exploitation across multiple services. She advises users to avoid posting live vacation photos to prevent giving scammers information for identity theft and fraud. Sarian also stresses the importance of using unique passwords and locking apps down on private mode to ensure accounts are secured.

Incognito Mode and Venmo: A False Sense of Security Leading To Scams

Sarian covers the misconception about incognito mode, clarifying that while it prevents the local device from recording history, it does not stop websites from tracking a user's activity. She suggests that services like Venmo an ...

Here’s what you’ll find in our full summary

Registered users get access to the Full Podcast Summary and Additional Materials. It’s easy and free!
Start your free trial today

Specific Vulnerabilities in Technology and Apps

Additional Materials

Counterarguments

  • While internet-connected devices can be hacked, many have robust security measures in place, and responsible user behavior can significantly mitigate risks.
  • Not all wearable technology companies exploit user data, and some prioritize user privacy and data security.
  • Users can benefit from sharing health data with wearable tech for medical research and personal health insights, provided there is transparency and consent.
  • Unique passwords and private mode settings are helpful, but they are not foolproof; multi-factor authentication and regular security audits are also important.
  • Posting vacation photos or personal information online can be safe if proper privacy controls are in place and the audience is trusted.
  • Incognito mode is not intended to be a security feature but a privacy tool; users should be educated on its actual purpose and limitations.
  • Payment services like Venmo and Zelle offer convenience and instant transactions, which can be secure with proper use and understanding of their security features.
  • Not all children's use of platforms like Roblox or Snapchat is dangerous; with proper guidance and oversight, these can be safe and educational.
  • Scrutinizing app privacy settings is important, but it is also essential to advocate for clearer privacy policie ...

Actionables

  • You can enhance your digital security by organizing a monthly "security check-up" day where you update passwords, review app permissions, and check privacy settings on all your devices. Set a recurring reminder on your calendar to spend an hour going through each device and account, ensuring that you're using strong, unique passwords, and that your privacy settings are up to date. This habit will help you stay on top of any potential vulnerabilities that could be exploited.
  • Create a personal "no-share" list of sensitive information that you commit to never posting online, such as live location updates, travel plans, or personal health data. Keep this list in a visible place near your computer or on your phone to remind you of the types of information that should stay private. This will help you cultivate a mindset of cautious sharing, reducing the risk of identity theft and personal data exploitation.
  • Engage in a "privacy audit" of your family's ...

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free

Create Summaries for anything on the web

Download the Shortform Chrome extension for your browser

Shortform Extension CTA