WEBVTT
1
00:00:01.040 --> 00:00:04.639
This program is designed to provide general information with regards
2
00:00:04.679 --> 00:00:07.639
to the subject matters covered. This information is given with
3
00:00:07.679 --> 00:00:12.039
the understanding that neither the hosts, guests, sponsors, or station
4
00:00:12.279 --> 00:00:17.480
are engaged in rendering any specific and personal medical, financial,
5
00:00:17.800 --> 00:00:22.760
legal counseling, professional service, or any advice. You should seek
6
00:00:22.800 --> 00:00:26.879
the services of competent professionals before applying or trying any
7
00:00:27.000 --> 00:00:32.280
suggested ideas in The information contained in this podcast is
8
00:00:32.320 --> 00:00:35.920
intended for informational purposes only and is not a substitute
9
00:00:35.960 --> 00:00:40.000
for individual professional legal advice. The podcast information was carefully
10
00:00:40.039 --> 00:00:44.439
compiled from vetted sources and references. However, Rose resources outreach
11
00:00:44.560 --> 00:00:47.320
to safeguard the elderly cannot guarantee that you will not
12
00:00:47.439 --> 00:00:52.280
fall victim to a scam. Let's talk about scams. It's
13
00:00:52.600 --> 00:00:56.039
the must listen show for anyone who wants to protect
14
00:00:56.079 --> 00:01:00.679
themselves and their loved ones from scams. Every Tuesday am
15
00:01:00.840 --> 00:01:05.200
Pacific time on K four HD Radio, Joyce Petrowski, founder
16
00:01:05.239 --> 00:01:09.640
of Rose, and her guests will provide valuable insights and
17
00:01:09.760 --> 00:01:14.640
practical tips on how to recognize and protect yourself from scams.
18
00:01:14.920 --> 00:01:18.640
And now here is your host, Joyce Petrowski.
19
00:01:20.680 --> 00:01:24.519
Hi, everyone, welcome back, to let's talk about scams. I'm
20
00:01:24.599 --> 00:01:28.319
Joyce Petrowski, founder and board president of Rose Resources Outreach
21
00:01:28.400 --> 00:01:31.439
to Safeguard the elderly. You can find more information on
22
00:01:31.480 --> 00:01:35.760
our website at Roseadvocacy dot org. On the homepage you'll
23
00:01:35.760 --> 00:01:40.280
find all of our social media channels Facebook, LinkedIn, Instagram, YouTube,
24
00:01:41.200 --> 00:01:45.319
and you're going to want to subscribe to the YouTube
25
00:01:45.400 --> 00:01:49.439
channels so you don't miss an episode of this show.
26
00:01:50.079 --> 00:01:52.599
We have all of our past episodes on there, and
27
00:01:53.000 --> 00:01:56.280
the shorts are on there as well. If you scroll
28
00:01:56.319 --> 00:01:59.719
down to the bottom of that page, you will find
29
00:02:00.079 --> 00:02:03.400
you can sign up for our newsletters. We send one
30
00:02:03.400 --> 00:02:06.319
in the mail at the beginning of every month, and
31
00:02:06.640 --> 00:02:10.479
we do one via email, and the larger email newsletter
32
00:02:10.560 --> 00:02:13.719
goes out at the beginning of every month. December's went
33
00:02:13.719 --> 00:02:17.759
out last Friday, December fifth. But every Tuesday morning at
34
00:02:17.879 --> 00:02:21.000
nine fifteen, you're going to get a Tuesday Tip, and
35
00:02:21.360 --> 00:02:25.719
that Tuesday tip is one to give you information that
36
00:02:25.759 --> 00:02:28.479
you might not have known or even if you did
37
00:02:28.560 --> 00:02:31.879
know the information. The second and more important part of
38
00:02:31.919 --> 00:02:35.159
it is it's a reminder. It's a reminder to keep
39
00:02:35.199 --> 00:02:40.719
scam prevention top of mind so you keep your healthy skepticism,
40
00:02:40.800 --> 00:02:44.000
your healthy scam prevention habits, So the next time you
41
00:02:44.039 --> 00:02:47.439
are contacted by a scammer, you're going to be more
42
00:02:47.479 --> 00:02:50.520
apt to think scam and then know the steps to
43
00:02:50.599 --> 00:02:53.479
go through to determine if it really is a scam,
44
00:02:53.560 --> 00:02:56.719
to verify before you can trust it, talk to your
45
00:02:57.479 --> 00:03:01.680
trusted person about the situation. Different things like that, So
46
00:03:01.719 --> 00:03:03.960
you're going to you can sign up for one or
47
00:03:04.000 --> 00:03:05.639
you can sign up for both of them. It's a
48
00:03:05.680 --> 00:03:08.680
way to get some great information. And another great thing
49
00:03:08.840 --> 00:03:13.280
about the Tuesday Tip or even our mailed newsletter or
50
00:03:13.319 --> 00:03:16.240
the larger emailed newsletter is it's going to give you
51
00:03:16.360 --> 00:03:19.919
information that you can use as a conversation starter. You
52
00:03:19.960 --> 00:03:23.360
can take this information. You can talk to your older
53
00:03:23.400 --> 00:03:27.479
loved ones in regular conversation. You know, it doesn't have
54
00:03:27.560 --> 00:03:31.240
to be a conversation where you're like, don't do this,
55
00:03:31.280 --> 00:03:34.560
don't do that, don't do this. You can use it
56
00:03:34.599 --> 00:03:36.919
to say, hey, you know, I just learned about this
57
00:03:37.039 --> 00:03:41.080
new protection tool. I just learned about this new scam
58
00:03:41.120 --> 00:03:44.280
that's been going around. Did you know about it? You know,
59
00:03:44.919 --> 00:03:47.919
have you received any of these text messages or phone
60
00:03:47.960 --> 00:03:51.360
calls or it's a way to keep that conversation going
61
00:03:51.479 --> 00:03:54.800
and it lets your older loved one also know that, Hey,
62
00:03:55.159 --> 00:03:57.319
you can come talk to me. You know, if you
63
00:03:57.360 --> 00:03:59.919
do happen to click on a link or respond to
64
00:04:00.039 --> 00:04:03.560
a text message, or maybe you've given your credit card
65
00:04:03.639 --> 00:04:06.199
number out and then realized you think it might be
66
00:04:06.240 --> 00:04:08.319
a scam, come talk to me about it, and I
67
00:04:08.360 --> 00:04:11.919
can help you mitigate the damages. And you know I
68
00:04:11.960 --> 00:04:15.680
can help you if it's identity theft, we can work
69
00:04:15.719 --> 00:04:19.360
through the process of getting your identity back. Anyways, lots
70
00:04:19.360 --> 00:04:22.279
of great information and lots of great ways you can
71
00:04:22.439 --> 00:04:26.639
use this information. So today we're going to talk about
72
00:04:26.680 --> 00:04:33.439
securing your cell phones. I think just about everybody has
73
00:04:33.759 --> 00:04:37.680
a cell phone these days, and the majority of the
74
00:04:37.720 --> 00:04:40.120
cell phones are connected to the internet. We do a
75
00:04:40.160 --> 00:04:43.759
lot of stuff on our cell phones. I think we
76
00:04:44.079 --> 00:04:47.720
just automatically go to our cell phones to do things
77
00:04:47.879 --> 00:04:52.160
versus going to our laptop or our desktop or iPad
78
00:04:52.240 --> 00:04:54.839
or anything like that. You know, big reason is your
79
00:04:54.879 --> 00:04:58.120
cell phone's the most portable thing, right instead of carrying
80
00:04:58.160 --> 00:05:02.560
around a bulky laptop or a bigger iPad, your cell
81
00:05:02.600 --> 00:05:04.800
phone's portable. You might have it in your purse, your
82
00:05:04.800 --> 00:05:09.600
back pocket. You know, your your briefcase, you know, whatever
83
00:05:09.639 --> 00:05:14.240
it is that you're carrying, and so you know, we're
84
00:05:14.279 --> 00:05:16.879
on it all the time, you know, whether we're talking
85
00:05:16.920 --> 00:05:19.720
on the phone, or we're texting, or we're checking our emails,
86
00:05:20.199 --> 00:05:23.560
or we're searching for something online. With the holidays coming up,
87
00:05:24.079 --> 00:05:26.279
you know, we might be on it to search for
88
00:05:26.360 --> 00:05:31.399
Christmas gifts, for holiday gifts. You know, you might be
89
00:05:31.439 --> 00:05:34.680
on social media on there. There's a wide variety of
90
00:05:34.720 --> 00:05:38.680
social media apps out there, and a lot of people
91
00:05:38.720 --> 00:05:43.240
do their banking right. A lot of, if not all
92
00:05:43.279 --> 00:05:47.680
of the banks have their app where you can do
93
00:05:47.759 --> 00:05:51.079
your banking on your phone. Right, somebody gives you a check,
94
00:05:52.040 --> 00:05:55.360
because yes, there are still people out there that write checks.
95
00:05:55.639 --> 00:05:57.680
I'm one of them. I'm sure there's a lot of
96
00:05:57.680 --> 00:06:01.439
people out there. Don't necessar sarely write checks for everything,
97
00:06:01.480 --> 00:06:04.680
but we do still write checks for certain things. And
98
00:06:05.720 --> 00:06:08.240
if someone hands you a check, you know a lot
99
00:06:08.279 --> 00:06:10.639
of times people aren't going to take time out to
100
00:06:10.680 --> 00:06:12.680
have to go to the bank and stand in line
101
00:06:12.800 --> 00:06:15.480
and do all that to make that deposit. So they're
102
00:06:15.480 --> 00:06:19.360
going to do a deposit right on their phone. And
103
00:06:19.639 --> 00:06:22.199
maybe they want to check their banking activity or they
104
00:06:22.199 --> 00:06:27.160
want to check their banking balance or you know, their
105
00:06:27.199 --> 00:06:32.040
credit card activity, or transfer money between accounts, you know whatever.
106
00:06:32.480 --> 00:06:34.800
A lot of times we pick up our phones to
107
00:06:34.879 --> 00:06:39.600
do that. And I also think we're good at for
108
00:06:39.639 --> 00:06:43.480
the most part, we're good at securing our desktop computers,
109
00:06:43.519 --> 00:06:46.639
our laptop, our iPads, because I think we think of
110
00:06:46.680 --> 00:06:50.240
those more as computers. But we really need to think
111
00:06:50.360 --> 00:06:55.639
of our cell phones as mobile computers. With everything that
112
00:06:55.800 --> 00:06:59.519
can be done on the cell phones and that that
113
00:06:59.759 --> 00:07:02.759
is done on the cell phones, we have to lock
114
00:07:02.839 --> 00:07:07.519
down and secure our cell phones or our mobile computers.
115
00:07:08.399 --> 00:07:10.639
We have a short video that's going to be coming out,
116
00:07:11.199 --> 00:07:14.000
I believe next week. I believe it might be the
117
00:07:14.040 --> 00:07:16.480
Tip Tuesday for next week. It's a short little video
118
00:07:16.519 --> 00:07:19.759
that I did about you need to secure your cell phones.
119
00:07:19.800 --> 00:07:23.519
You need to treat them as mobile computers. So, and
120
00:07:23.839 --> 00:07:27.480
another thing that I've heard is from people is well,
121
00:07:28.079 --> 00:07:30.480
I have an iPhone and I've been told I don't
122
00:07:30.519 --> 00:07:34.360
need any added security, that it's enough. Well, nothing is
123
00:07:34.439 --> 00:07:39.240
full proof. So iPhones are not full proof. Android phones
124
00:07:39.279 --> 00:07:43.720
are not full proof. They are susceptible to being hacked into.
125
00:07:44.319 --> 00:07:52.279
They are susceptible to not catch you know, every malicious
126
00:07:52.319 --> 00:07:56.279
site that's out there. So having added security measures on
127
00:07:57.040 --> 00:07:59.759
your phone, whether it's an iPhone or an Android, is
128
00:07:59.800 --> 00:08:03.519
the thing that you can do. Now you might ask, well,
129
00:08:03.519 --> 00:08:08.879
what security should I have? Right, Well, that's a that's
130
00:08:08.920 --> 00:08:14.319
a question that looks different to really everybody because we're
131
00:08:14.360 --> 00:08:16.680
all different. What we do on our phones is different,
132
00:08:17.279 --> 00:08:20.519
what risk we like to take, our risk tolerance level
133
00:08:20.639 --> 00:08:24.519
is different as well. Our convenience what we see is
134
00:08:25.000 --> 00:08:29.959
trading convenience for risk is different. So that's why it's
135
00:08:30.000 --> 00:08:32.960
good to do some research. Now. One of the tips
136
00:08:33.000 --> 00:08:36.279
that we give out is, you know, we always talk
137
00:08:36.320 --> 00:08:39.399
about be aware of your emotions, have a trusted person
138
00:08:39.440 --> 00:08:42.360
you can talk to about anything you want to verify
139
00:08:42.480 --> 00:08:45.360
before you can even begin to trust. Be careful of
140
00:08:45.600 --> 00:08:50.720
you know, payment options, and you know, guard your personal information.
141
00:08:50.919 --> 00:08:55.600
But another just as important tip is having that go
142
00:08:55.679 --> 00:08:58.960
to tech support person. And we've talked about this a lot.
143
00:08:59.480 --> 00:09:03.240
There are companies out there that provide this tech support.
144
00:09:03.600 --> 00:09:07.399
Some of them might only do commercial you know, properties,
145
00:09:07.440 --> 00:09:10.799
so they might be if you know, work for might
146
00:09:10.840 --> 00:09:13.600
be contracted with your employer to do all of their
147
00:09:13.639 --> 00:09:17.720
cybersecurity and lock down all of the company's uh computers
148
00:09:17.759 --> 00:09:23.559
and and and software and all of that stuff. But
149
00:09:23.679 --> 00:09:27.960
they might also have a consumer part of it where
150
00:09:28.000 --> 00:09:31.919
they work with individuals and homes and your mobile computers
151
00:09:31.960 --> 00:09:39.480
and your your mobile phones and your personal devices. There's
152
00:09:39.519 --> 00:09:42.480
a lot of you know, individual people out there, whether
153
00:09:42.519 --> 00:09:45.519
they've set up a company or not. They're really good
154
00:09:45.600 --> 00:09:49.000
tech support people and a lot of times they can
155
00:09:49.080 --> 00:09:53.320
help you with your devices by remoting into your device.
156
00:09:53.399 --> 00:09:56.639
Now you have to allow that to happen, which is
157
00:09:56.720 --> 00:10:00.159
why you need to trust this person that they are
158
00:10:00.000 --> 00:10:02.639
are only going to do what you've asked them to do.
159
00:10:03.080 --> 00:10:10.559
And when they say they've disconnected, they've disconnected the line
160
00:10:10.759 --> 00:10:15.159
of them remoting the session that they've actually disconnected it
161
00:10:15.200 --> 00:10:18.840
and they've not left anything in the background right that
162
00:10:18.879 --> 00:10:22.600
they're watching everything you do, like a malicious site might do,
163
00:10:22.919 --> 00:10:26.000
or a virus on your computer or something like that.
164
00:10:26.080 --> 00:10:28.039
So that's why you need to have a trusted one.
165
00:10:28.480 --> 00:10:30.960
But a lot of times these tech support people they
166
00:10:31.000 --> 00:10:35.120
also know cell phones. Some of them might know both
167
00:10:35.200 --> 00:10:38.559
Android and iPhones. Some of them might specialize in Android
168
00:10:38.559 --> 00:10:41.960
where others will specialize in iPhones. But it's a good
169
00:10:42.080 --> 00:10:46.799
question to ask because they know a lot of these
170
00:10:47.679 --> 00:10:51.840
softwares that you can get and what works best for iPhones,
171
00:10:52.000 --> 00:10:56.480
and they've maybe through experience, but they've done a lot
172
00:10:56.480 --> 00:10:58.519
of this research. But if you want to do the
173
00:10:58.559 --> 00:11:01.799
research on your own, I'm going to share my screen
174
00:11:01.840 --> 00:11:04.480
now and kind of walk you through some stuff that
175
00:11:04.559 --> 00:11:11.320
I was looking at. And uh so you can hang
176
00:11:11.360 --> 00:11:13.720
on a second. There we go, so you can kind
177
00:11:13.720 --> 00:11:18.279
of see how we you know, when we say to
178
00:11:18.759 --> 00:11:24.360
do your research. So you know, there's a lot of
179
00:11:24.399 --> 00:11:30.120
great companies out there, tech companies that will evaluate a
180
00:11:30.200 --> 00:11:34.759
bunch of different softwares and apps and stuff like that,
181
00:11:35.279 --> 00:11:41.799
and they continually monitor and evaluate these apps, and then
182
00:11:41.840 --> 00:11:46.480
they update their articles quite frequently with new information. And
183
00:11:46.559 --> 00:11:50.720
so one of the one of the tech companies that
184
00:11:50.759 --> 00:11:56.720
we've used quite frequently for different information is PC Magazine.
185
00:11:56.840 --> 00:11:59.720
And so basically I've just got into this PCMag dot
186
00:11:59.720 --> 00:12:02.759
com and I come over here to the menu, and
187
00:12:02.840 --> 00:12:07.480
I scrolled down and there's how to reviews comparisons best products.
188
00:12:07.799 --> 00:12:10.440
So I just went into best products and you can
189
00:12:10.480 --> 00:12:13.759
go down through here and you can scroll and you
190
00:12:13.799 --> 00:12:16.440
can see all the best products. But if you're looking
191
00:12:16.440 --> 00:12:20.440
for a monitor, a printer, some gaming or graphics, video editing,
192
00:12:20.559 --> 00:12:28.440
web hosting. There's password managers, antivirus software, robot vacuums, headphones, TVs,
193
00:12:28.519 --> 00:12:32.120
all kinds of stuff. Wi Fi's the best phones, external
194
00:12:32.159 --> 00:12:34.080
hard drives, but the one I pulled up was the
195
00:12:34.879 --> 00:12:39.799
best VPN services for twenty twenty five. And so that's
196
00:12:39.799 --> 00:12:43.519
the virtual private network, which is what we recommend in
197
00:12:43.559 --> 00:12:47.759
our resource packet and in our presentations. We recommend that
198
00:12:48.000 --> 00:12:52.720
if your only option is to be on public Wi Fi,
199
00:12:54.120 --> 00:12:58.480
even if it's password protective, public Wi Fi, that's not
200
00:12:58.799 --> 00:13:01.960
as secure as maybe the Wi Fi you have at
201
00:13:02.000 --> 00:13:05.000
your home. And why would even though both of them
202
00:13:05.039 --> 00:13:08.000
are password protected, why would the other one not be
203
00:13:08.039 --> 00:13:13.039
as secure as yours? Well, like a hotel, right, their
204
00:13:13.080 --> 00:13:16.879
wifis password protected, but how many people know that password
205
00:13:17.440 --> 00:13:20.600
and how often do they change it? Right? So, even
206
00:13:20.639 --> 00:13:23.240
if they change it every day, the people that are
207
00:13:23.240 --> 00:13:26.320
staying in there that day know the password. And if
208
00:13:26.360 --> 00:13:28.759
there's a thousand people in there, there's a thousand people
209
00:13:29.120 --> 00:13:33.039
that know that password, and are ten of them or
210
00:13:33.080 --> 00:13:35.480
five of them or one of them, you know a
211
00:13:35.519 --> 00:13:39.360
criminal that's just trying to get in and using that
212
00:13:39.399 --> 00:13:43.279
password protected Wi Fi to get into anybody that's on
213
00:13:43.320 --> 00:13:46.840
that Wi Fi. So and even you know, coffee shops
214
00:13:46.919 --> 00:13:50.360
and different things like that, even if it's their wifi's
215
00:13:50.399 --> 00:13:53.519
password protected, you have to ask yourself the question how
216
00:13:53.600 --> 00:13:56.360
many people know that password? And then you need to
217
00:13:56.360 --> 00:13:59.559
make the decision do you think this is really secure?
218
00:14:00.159 --> 00:14:03.000
Or are you going to protect yourself and use a
219
00:14:03.080 --> 00:14:07.720
virtual private network when you are using the internet while
220
00:14:07.720 --> 00:14:12.080
you're connected to their WiFi. Now, you know, you could say, well,
221
00:14:12.080 --> 00:14:14.840
what harm is it if I'm checking the weather, right,
222
00:14:16.480 --> 00:14:20.080
you know something like that, if I'm using public Wi Fi. Well,
223
00:14:20.440 --> 00:14:23.360
if you're checking the weather, okay, it's you know not,
224
00:14:24.399 --> 00:14:26.519
you wouldn't think that. You would think that's pretty harmless.
225
00:14:26.559 --> 00:14:30.200
But you know what if there's a fake weather site
226
00:14:30.240 --> 00:14:35.600
out there that the criminals have cloned, and by you
227
00:14:35.600 --> 00:14:38.399
getting on that website, they're now installing malware. You know,
228
00:14:38.440 --> 00:14:41.919
I don't know. I'm just, for lack of a better term,
229
00:14:41.960 --> 00:14:44.480
trying to be the devil's advocate here to try to
230
00:14:44.600 --> 00:14:48.480
get people to think more about what they're doing online
231
00:14:48.600 --> 00:14:53.440
and are they really protected. So the virtual private networks
232
00:14:53.440 --> 00:14:55.120
are going to really help with this. They're going to
233
00:14:55.240 --> 00:14:58.840
encrypt your information that you're doing. You can also use
234
00:14:58.879 --> 00:15:03.840
your person sal hotspot on your phones. But this company
235
00:15:03.879 --> 00:15:11.840
here has gone through and they have and evaluated a
236
00:15:11.960 --> 00:15:16.720
bunch of different virtual private networks, and you can look
237
00:15:16.759 --> 00:15:21.240
and like their best overall pick is Proton VPN, and
238
00:15:21.320 --> 00:15:23.120
you can expand it here and look at the pros
239
00:15:23.159 --> 00:15:28.360
and cons. Okay, best free plan we've seen, industry leading