Obtenez 3 mois à 0,99 $/mois + 20 $ de crédit Audible

OFFRE D'UNE DURÉE LIMITÉE
Page de couverture de SipCyber - Presented by IT Audit Labs

SipCyber - Presented by IT Audit Labs

SipCyber - Presented by IT Audit Labs

Auteur(s): IT Audit Labs
Écouter gratuitement

À propos de cet audio

SipCyber: Where Great Coffee Meets Essential Cybersecurity


What happens when a former special education teacher turned Minnesota State Cybersecurity Coordinator sits down with a perfect cup of coffee? You get cybersecurity advice that's actually approachable.


Jen Lotze from IT Audit Labs brings you SipCyber — the podcast that pairs cozy coffee shop discoveries with decaffeinated cybersecurity tips. No jargon. No fear-mongering. Just practical ways to protect yourself, your family, and your organization from digital criminals who want to ruin your perfectly good day.


What You'll Get:

  • Real-world cybersecurity advice anyone can follow
  • Coffee shop reviews and community spotlights
  • Stories from someone who's been in classrooms, boardrooms, and government coordination centers
  • A mission to make security everyone's job, not just the IT team's

From teaching special needs students to coordinating statewide cyber defense, Jen proves that cybersecurity expertise comes from the most unexpected places. And the best conversations happen over great coffee.


Perfect for: Coffee lovers, small business owners, educators, parents, and anyone who wants to stay safe online without the technical overwhelm. Let's get brewing.

© 2025 SipCyber - Presented by IT Audit Labs
Épisodes
  • Scams Exploiting Trust: Quishing & Pig Butchering
    Nov 19 2025

    Trust is essential in our daily lives—but it's also what scammers exploit most. In this episode of SipCyber, Jen Lotze visits Central Park Coffee in Owatonna, MN, to discuss two evolving scams that prey on human trust: quishing (QR code fraud) and pig butchering (romance investment scams). From fake QR codes on restaurant tables to elaborate romance frauds that drain life savings, these threats are becoming more sophisticated and harder to detect.

    Jen breaks down how these scams work, shares real-world examples, and delivers practical defense strategies you can implement immediately. Whether you're scanning a menu or chatting with someone online, this episode equips you with the knowledge to recognize manipulation tactics before it's too late.

    What You'll Learn:

    • How "quishing" works and why QR codes are the new phishing vector
    • The disturbing mechanics of pig butchering romance scams
    • Specific red flags to watch for in both physical and digital spaces
    • Practical verification steps before clicking, calling, or sending money
    • Why urgency + money requests = major warning signs

    Don't become the next victim. Subscribe for weekly cybersecurity tips delivered from coffee shops across the country, and share this with someone who needs to hear it.

    #Cybersecurity #QRCodeScams #RomanceFraud #Quishing #PigButchering #ScamAwareness #InfoSec #CyberSafety #SipCyber

    Voir plus Voir moins
    4 min
  • Smishing & Vishing: The Scams Hiding in Your Messages
    Nov 12 2025

    That urgent text about a package delivery? That call from "your bank"? They might be scams designed to steal your personal information. In this episode of SipCyber, Jen Lotze breaks down smishing (SMS phishing) and vishing (voice phishing)—two increasingly common tactics scammers use to bypass your email filters and catch you off guard.

    ☕ Featured Coffee Shop: The Whistle Punk in Stone Lake, WI—known for incredible breakfast burritos, rustic lake vibes, and being the favorite stop for families visiting the Northwoods.

    🔐 What You'll Learn:

    • What smishing and vishing are and how they work
    • Real-world examples of text and phone scams
    • Why caller ID can't be trusted (spoofing explained)
    • Simple verification steps to protect yourself and your family
    • How to spot fake technical support calls

    Whether you're protecting yourself, your parents, or your business, this episode gives you practical, no-nonsense tips to stay one step ahead of scammers. Don't let a convincing text or call become your worst cybersecurity mistake.

    👉 Subscribe for weekly cybersecurity tips that actually make sense—no technical jargon required.

    #cybersecurity #smishing #vishing #scamawareness #phishing #infosec #digitaldefense #familysafety #sipcyber

    Voir plus Voir moins
    4 min
  • SIM Swap Attacks: How Criminals Steal Your Phone Number
    Nov 5 2025

    What if a criminal could steal your phone number and use it to break into every account you own? That's exactly what happens in a SIM swap attack—and it's more common than you think.

    In this episode of SipCyber, host Jen Lotze explains how attackers trick mobile carriers into transferring your phone number to their device, bypassing multi-factor authentication and gaining access to your banking, email, and social media accounts. The good news? There's a simple, powerful defense that takes less than five minutes to set up.

    🔐 What You'll Learn:

    • How SIM swap attacks work and why they're so dangerous
    • Why your phone number is the key to your digital identity
    • The one simple step that stops SIM swaps cold
    • How to add a secure PIN to your mobile carrier account

    Don't let hackers hijack your phone number. Protect yourself in minutes with this essential security tip. Like, share, and subscribe for more cybersecurity advice that actually makes sense!

    #SIMSwap #Cybersecurity #PhoneSecurity #MFA #DigitalSafety #CyberTips #InfoSec

    Voir plus Voir moins
    2 min
Pas encore de commentaire