<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/learn-online-security/" rel="self" type="application/rss+xml"/><title><![CDATA[Learn Online Security Podcast]]></title><podcast:guid>0eabf170-d3d4-5a47-82c6-e640dd89ec4e</podcast:guid><lastBuildDate>Fri, 13 Feb 2026 21:50:06 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[Copyright 2025 Learn Online Security]]></copyright><managingEditor>Learn Online Security</managingEditor><itunes:summary><![CDATA[Introducing you to the world of Social Engineering Security, personal privacy, and the technology of our changing world, such as Artificial Intelligence (AI).  Our goal is to provide you with the armor you need to protect yourself and the knowledge to identify the red flags of both online and offline attackers. ]]></itunes:summary><image><url>https://artwork.captivate.fm/1285e579-164d-4daa-be01-3591e1763d1e/-vblWYASnAR0UDgG1JPrbFqE.jpg</url><title>Learn Online Security Podcast</title><link><![CDATA[https://learnonlinesecurity.com/]]></link></image><itunes:image href="https://artwork.captivate.fm/1285e579-164d-4daa-be01-3591e1763d1e/-vblWYASnAR0UDgG1JPrbFqE.jpg"/><itunes:owner><itunes:name>Learn Online Security</itunes:name></itunes:owner><itunes:author>Learn Online Security</itunes:author><description>Introducing you to the world of Social Engineering Security, personal privacy, and the technology of our changing world, such as Artificial Intelligence (AI).  Our goal is to provide you with the armor you need to protect yourself and the knowledge to identify the red flags of both online and offline attackers. </description><link>https://learnonlinesecurity.com/</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:subtitle><![CDATA[Introducing you to the world of Social Engineering Security, personal privacy, and the technology of our changing world, such as Artificial Intelligence (AI).]]></itunes:subtitle><itunes:explicit>false</itunes:explicit><itunes:type>episodic</itunes:type><itunes:category text="Education"></itunes:category><itunes:category text="Business"></itunes:category><itunes:category text="Kids &amp; Family"><itunes:category text="Parenting"/></itunes:category><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><item><title>Stop Hackers from Exploiting Employee Locations!</title><itunes:title>Stop Hackers from Exploiting Employee Locations!</itunes:title><description><![CDATA[<p><strong>If you don’t control your message—someone else will! </strong> What if your</p><p>company’s private information suddenly became public—and you weren’t the</p><p>one who shared it?</p><p>In today’s episode of the Learn Online Security Podcast, Chris Howells,</p><p>Director of IT and Head Instructor, explains how to take back control of</p><p>your message when communication slips out of your hands.</p><p>When unexpected events hit—like public announcements, travel plans, or</p><p>emergencies—information can spread fast. Chris shows you how to stay</p><p>ahead by creating clear communication policies, educating your team,</p><p>and reducing opportunities for attackers to exploit confusion or chaos.</p><p><strong>You’ll discover how to:</strong></p><p>✅ Build a communication plan that keeps your organization secure and</p><p>professional</p><p>✅ Prevent social engineering attacks by controlling information flow</p><p>✅ Empower your staff and community to respond with consistency and</p><p>confidence</p><p>✅ Develop “away policies” that protect both privacy and productivity</p><p>✅ Strengthen your company’s defense through proactive messaging and</p><p>teamwork</p><p>This video delivers practical cybersecurity strategy mixed with</p><p>real-world communication planning. It's perfect for IT leaders,</p><p>business owners, and security-conscious teams.</p><p><a href="https://www.skool.com/learn-online-security-4898" rel="noopener noreferrer" target="_blank">Join our Learn Online Security community on Skool</a> for deeper training,</p><p>discussions, and tools to help you secure your organization’s</p><p>communications from the inside out.</p><p><br></p><p><strong>What are my next steps?</strong></p><p>📖 Start learning for free at https://learnonlinesecurity.com/start-here</p><p>🔐 Become a superhero and support the channel</p><p>https://learnonlinesecurity.com/heroes/superheroes</p><p>🏢 Learn more about our social engineering training for employees &amp;</p><p>business certification courses</p><p>https://learnonlinesecurity.com/business-training</p><p><br></p><p><strong>Follow Learn Online Security:</strong></p><p>Facebook: https://www.facebook.com/LearnOnlineSec</p><p>Instagram: https://www.instagram.com/learnonlinesecurity</p><p>Rumble: https://www.rumble.com/learnonlinesecurity</p><p>Website: https://www.learnonlinesecurity.com</p><p><br></p><p>⌚<strong>Time Stamps</strong> ⌚</p><p>00:26 Introduction to Learn Online Security</p><p>00:39 When You Can't Control the Message</p><p>01:19 Planning for Emergencies and Worst-Case Scenarios</p><p>02:08 Educating Staff and Preparing in Advance</p><p>03:37 Regaining Control After Losing Information</p><p>04:06 Out-of-Office Messaging and Extended Absences</p><p>05:16 Empowering Surroundings and Preventing Social Engineering</p><p>07:01 Join Skool!</p><p>08:03 Reviewing Company Policies and Communication Procedures</p><p>10:03 Real-World Example: Medical Emergency Response and Lessons Learned</p><p><br></p><p>#CyberSecurity #InformationSecurity #CrisisManagement #SocialEngineering</p>]]></description><content:encoded><![CDATA[<p><strong>If you don’t control your message—someone else will! </strong> What if your</p><p>company’s private information suddenly became public—and you weren’t the</p><p>one who shared it?</p><p>In today’s episode of the Learn Online Security Podcast, Chris Howells,</p><p>Director of IT and Head Instructor, explains how to take back control of</p><p>your message when communication slips out of your hands.</p><p>When unexpected events hit—like public announcements, travel plans, or</p><p>emergencies—information can spread fast. Chris shows you how to stay</p><p>ahead by creating clear communication policies, educating your team,</p><p>and reducing opportunities for attackers to exploit confusion or chaos.</p><p><strong>You’ll discover how to:</strong></p><p>✅ Build a communication plan that keeps your organization secure and</p><p>professional</p><p>✅ Prevent social engineering attacks by controlling information flow</p><p>✅ Empower your staff and community to respond with consistency and</p><p>confidence</p><p>✅ Develop “away policies” that protect both privacy and productivity</p><p>✅ Strengthen your company’s defense through proactive messaging and</p><p>teamwork</p><p>This video delivers practical cybersecurity strategy mixed with</p><p>real-world communication planning. It's perfect for IT leaders,</p><p>business owners, and security-conscious teams.</p><p><a href="https://www.skool.com/learn-online-security-4898" rel="noopener noreferrer" target="_blank">Join our Learn Online Security community on Skool</a> for deeper training,</p><p>discussions, and tools to help you secure your organization’s</p><p>communications from the inside out.</p><p><br></p><p><strong>What are my next steps?</strong></p><p>📖 Start learning for free at https://learnonlinesecurity.com/start-here</p><p>🔐 Become a superhero and support the channel</p><p>https://learnonlinesecurity.com/heroes/superheroes</p><p>🏢 Learn more about our social engineering training for employees &amp;</p><p>business certification courses</p><p>https://learnonlinesecurity.com/business-training</p><p><br></p><p><strong>Follow Learn Online Security:</strong></p><p>Facebook: https://www.facebook.com/LearnOnlineSec</p><p>Instagram: https://www.instagram.com/learnonlinesecurity</p><p>Rumble: https://www.rumble.com/learnonlinesecurity</p><p>Website: https://www.learnonlinesecurity.com</p><p><br></p><p>⌚<strong>Time Stamps</strong> ⌚</p><p>00:26 Introduction to Learn Online Security</p><p>00:39 When You Can't Control the Message</p><p>01:19 Planning for Emergencies and Worst-Case Scenarios</p><p>02:08 Educating Staff and Preparing in Advance</p><p>03:37 Regaining Control After Losing Information</p><p>04:06 Out-of-Office Messaging and Extended Absences</p><p>05:16 Empowering Surroundings and Preventing Social Engineering</p><p>07:01 Join Skool!</p><p>08:03 Reviewing Company Policies and Communication Procedures</p><p>10:03 Real-World Example: Medical Emergency Response and Lessons Learned</p><p><br></p><p>#CyberSecurity #InformationSecurity #CrisisManagement #SocialEngineering</p>]]></content:encoded><link><![CDATA[https://learnonlinesecurity.com/]]></link><guid isPermaLink="false">7d56170d-8281-4252-8a0a-65d0b3699cec</guid><itunes:image href="https://artwork.captivate.fm/1285e579-164d-4daa-be01-3591e1763d1e/-vblWYASnAR0UDgG1JPrbFqE.jpg"/><pubDate>Wed, 12 Nov 2025 13:30:00 -0600</pubDate><enclosure url="https://episodes.captivate.fm/episode/7d56170d-8281-4252-8a0a-65d0b3699cec.mp3" length="24416905" type="audio/mpeg"/><itunes:duration>12:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>20</itunes:episode><podcast:episode>20</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/b3858227-d4fb-48a8-948e-a5dc4cb26ed9/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/b3858227-d4fb-48a8-948e-a5dc4cb26ed9/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/b3858227-d4fb-48a8-948e-a5dc4cb26ed9/index.html" type="text/html"/><podcast:alternateEnclosure type="video/youtube" title="Stop Hackers from Exploiting Employee Locations!"><podcast:source uri="https://youtu.be/T9eof6-rlXw"/></podcast:alternateEnclosure></item><item><title>The Dangers of Donating Your Old Tech</title><itunes:title>The Dangers of Donating Your Old Tech</itunes:title><description><![CDATA[<p><strong>Wondering what happens to your old devices when they’re recycled, </strong></p><p><strong>upgraded, or passed down?</strong> In this video, Chris and Sarah Howells from</p><p>Learn Online Security explain how laptops, phones, printers, gaming</p><p>systems, and even smart home devices can hold sensitive information—and</p><p>why scammers target them.</p><p>Learn practical tips for wiping, factory resetting, and safely disposing</p><p>of your devices to protect your personal and business data.</p><p><strong>Key topics we cover:</strong></p><p>📌 Wipe or destroy end-of-life devices</p><p>📌 Business and home devices hold sensitive data</p><p>📌 Factory reset, remove memory, or physically destroy</p><p>📌 Children’s and seniors’ devices need extra care</p><p>📌 Include how you'd like your devices handled in your will</p><p><strong>What are my next steps? </strong></p><p>📖 Start learning for free at https://learnonlinesecurity.com/start-here</p><p>🔐 Become a superhero and support the channel</p><p>https://learnonlinesecurity.com/heroes/superheroes</p><p>🏢 Learn more about our social engineering training for employees &amp;</p><p>business certification courses</p><p>https://learnonlinesecurity.com/business-training</p><p><strong>Follow Learn Online Security</strong>:</p><p>Facebook: https://www.facebook.com/LearnOnlineSec</p><p>Instagram: https://www.instagram.com/learnonlinesecurity</p><p>Rumble: https://www.rumble.com/learnonlinesecurity</p><p>Website: https://www.learnonlinesecurity.com</p><p><br></p><p>#DigitalSecurity, #LearnOnlineSecurity, #DeviceSafety</p>]]></description><content:encoded><![CDATA[<p><strong>Wondering what happens to your old devices when they’re recycled, </strong></p><p><strong>upgraded, or passed down?</strong> In this video, Chris and Sarah Howells from</p><p>Learn Online Security explain how laptops, phones, printers, gaming</p><p>systems, and even smart home devices can hold sensitive information—and</p><p>why scammers target them.</p><p>Learn practical tips for wiping, factory resetting, and safely disposing</p><p>of your devices to protect your personal and business data.</p><p><strong>Key topics we cover:</strong></p><p>📌 Wipe or destroy end-of-life devices</p><p>📌 Business and home devices hold sensitive data</p><p>📌 Factory reset, remove memory, or physically destroy</p><p>📌 Children’s and seniors’ devices need extra care</p><p>📌 Include how you'd like your devices handled in your will</p><p><strong>What are my next steps? </strong></p><p>📖 Start learning for free at https://learnonlinesecurity.com/start-here</p><p>🔐 Become a superhero and support the channel</p><p>https://learnonlinesecurity.com/heroes/superheroes</p><p>🏢 Learn more about our social engineering training for employees &amp;</p><p>business certification courses</p><p>https://learnonlinesecurity.com/business-training</p><p><strong>Follow Learn Online Security</strong>:</p><p>Facebook: https://www.facebook.com/LearnOnlineSec</p><p>Instagram: https://www.instagram.com/learnonlinesecurity</p><p>Rumble: https://www.rumble.com/learnonlinesecurity</p><p>Website: https://www.learnonlinesecurity.com</p><p><br></p><p>#DigitalSecurity, #LearnOnlineSecurity, #DeviceSafety</p>]]></content:encoded><link><![CDATA[https://learnonlinesecurity.com/]]></link><guid isPermaLink="false">d67888fe-76e8-46cc-86d4-95aa5c11f76a</guid><itunes:image href="https://artwork.captivate.fm/1285e579-164d-4daa-be01-3591e1763d1e/-vblWYASnAR0UDgG1JPrbFqE.jpg"/><pubDate>Thu, 16 Oct 2025 14:30:00 -0600</pubDate><enclosure url="https://episodes.captivate.fm/episode/d67888fe-76e8-46cc-86d4-95aa5c11f76a.mp3" length="50849828" type="audio/mpeg"/><itunes:duration>26:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>19</itunes:episode><podcast:episode>19</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/50582a0f-ffd4-4c82-8bee-1a5aa8942a93/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/50582a0f-ffd4-4c82-8bee-1a5aa8942a93/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/50582a0f-ffd4-4c82-8bee-1a5aa8942a93/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-a39e7a19-4ecc-44ce-893f-bd1e110c46df.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Old Hardware Can Expose Sensitive Business Information"><podcast:source uri="https://youtu.be/vjWV61kAbWs"/></podcast:alternateEnclosure></item><item><title>AI and Auto-Reply: A Social Engineer&apos;s Dream Come True</title><itunes:title>AI and Auto-Reply: A Social Engineer&apos;s Dream Come True</itunes:title><description><![CDATA[<p><strong>Scammers are using your out-of-office replies against you!</strong> In this</p><p>video, Chris Howells from Learn Online Security breaks down the most</p><p>common and preventable attack happening today. Learn how AI and social</p><p>engineering make it easier than ever for attackers to impersonate</p><p>authority and trick YOU or your team into sending money or gift cards.</p><p>Protect yourself and your business by understanding the risks and</p><p>implementing simple defenses.</p><p><strong>Defense tips</strong>: verify by voice, use security words/passphrases, and route</p><p>requests through official channels</p><p><strong>Key Points Covered</strong>:</p><p>📌What an out-of-office attack is and why it’s so easy to prevent</p><p>📌How attackers use AI to identify who’s away and who has authority</p><p>📌The reversed attack: attackers posing as underlings to pressure the</p><p>boss</p><p>📌Real-world example: a staffer almost tricked into buying gift cards</p><p>while on vacation</p><p>📌Why email and text are risky channels for urgent requests</p><p>Stay safe, stay alert, and remember: always verify before you act!</p><p><strong>What are my next steps?</strong></p><p>📖 Start learning for free at https://learnonlinesecurity.com/start-here</p><p>🔐 Become a superhero and support the channel</p><p>https://learnonlinesecurity.com/heroes/superheroes</p><p>🏢 Learn more about our social engineering training for employees &amp;</p><p>business certification courses</p><p>https://learnonlinesecurity.com/business-training</p><p><strong>Follow Learn Online Security:</strong></p><p>Facebook: https://www.facebook.com/LearnOnlineSec</p><p>Instagram: https://www.instagram.com/learnonlinesecurity</p><p>Rumble: https://www.rumble.com/learnonlinesecurity</p><p>Website: https://www.learnonlinesecurity.com</p><p><br></p><p>⌚<strong>Time Stamps </strong>⌚</p><p>00:00 Out-of-Office Attacks: The Most Dangerous Scam</p><p>00:17 How Attackers Exploit Absence to Impersonate Authority</p><p>01:53 How AI Identifies Targets Through Out-of-Office Replies</p><p>03:04 Mapping the Organization: Targeting the Right Employees</p><p>04:45 Why Email and Text Are Risky Channels for Financial Requests</p><p>05:30 Real-World Example: Staffer Tricked While on Vacation</p><p>07:41 Slowing Down Scammers: Building Time to Protect Yourself</p><p>09:43 Unpredictable Responses: Disrupting Attacker Plans</p><p>12:22 Using Security Words and Passphrases to Safeguard Transactions</p><p>13:33 Removing Electronics: Safer Financial Communication</p><p><br></p><p>#CyberSecurity #SocialEngineering #OnlineSafety</p>]]></description><content:encoded><![CDATA[<p><strong>Scammers are using your out-of-office replies against you!</strong> In this</p><p>video, Chris Howells from Learn Online Security breaks down the most</p><p>common and preventable attack happening today. Learn how AI and social</p><p>engineering make it easier than ever for attackers to impersonate</p><p>authority and trick YOU or your team into sending money or gift cards.</p><p>Protect yourself and your business by understanding the risks and</p><p>implementing simple defenses.</p><p><strong>Defense tips</strong>: verify by voice, use security words/passphrases, and route</p><p>requests through official channels</p><p><strong>Key Points Covered</strong>:</p><p>📌What an out-of-office attack is and why it’s so easy to prevent</p><p>📌How attackers use AI to identify who’s away and who has authority</p><p>📌The reversed attack: attackers posing as underlings to pressure the</p><p>boss</p><p>📌Real-world example: a staffer almost tricked into buying gift cards</p><p>while on vacation</p><p>📌Why email and text are risky channels for urgent requests</p><p>Stay safe, stay alert, and remember: always verify before you act!</p><p><strong>What are my next steps?</strong></p><p>📖 Start learning for free at https://learnonlinesecurity.com/start-here</p><p>🔐 Become a superhero and support the channel</p><p>https://learnonlinesecurity.com/heroes/superheroes</p><p>🏢 Learn more about our social engineering training for employees &amp;</p><p>business certification courses</p><p>https://learnonlinesecurity.com/business-training</p><p><strong>Follow Learn Online Security:</strong></p><p>Facebook: https://www.facebook.com/LearnOnlineSec</p><p>Instagram: https://www.instagram.com/learnonlinesecurity</p><p>Rumble: https://www.rumble.com/learnonlinesecurity</p><p>Website: https://www.learnonlinesecurity.com</p><p><br></p><p>⌚<strong>Time Stamps </strong>⌚</p><p>00:00 Out-of-Office Attacks: The Most Dangerous Scam</p><p>00:17 How Attackers Exploit Absence to Impersonate Authority</p><p>01:53 How AI Identifies Targets Through Out-of-Office Replies</p><p>03:04 Mapping the Organization: Targeting the Right Employees</p><p>04:45 Why Email and Text Are Risky Channels for Financial Requests</p><p>05:30 Real-World Example: Staffer Tricked While on Vacation</p><p>07:41 Slowing Down Scammers: Building Time to Protect Yourself</p><p>09:43 Unpredictable Responses: Disrupting Attacker Plans</p><p>12:22 Using Security Words and Passphrases to Safeguard Transactions</p><p>13:33 Removing Electronics: Safer Financial Communication</p><p><br></p><p>#CyberSecurity #SocialEngineering #OnlineSafety</p>]]></content:encoded><link><![CDATA[https://learnonlinesecurity.com/]]></link><guid isPermaLink="false">8d30560d-ec10-4b03-8b73-84d6e355d672</guid><itunes:image href="https://artwork.captivate.fm/1285e579-164d-4daa-be01-3591e1763d1e/-vblWYASnAR0UDgG1JPrbFqE.jpg"/><pubDate>Wed, 01 Oct 2025 13:30:00 -0600</pubDate><enclosure url="https://episodes.captivate.fm/episode/8d30560d-ec10-4b03-8b73-84d6e355d672.mp3" length="26086381" type="audio/mpeg"/><itunes:duration>13:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>18</itunes:episode><podcast:episode>18</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/0b388b60-0727-4151-a263-9e9810436225/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/0b388b60-0727-4151-a263-9e9810436225/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/0b388b60-0727-4151-a263-9e9810436225/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-496c6374-af94-4b2f-8dce-2a862d89635f.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="AI and Auto-Reply: A Social Engineer&apos;s Dream Come True"><podcast:source uri="https://youtu.be/mKqtL8-0UCk"/></podcast:alternateEnclosure></item><item><title>Can You REALLY Trust AI? The Cybersecurity Risks Explained</title><itunes:title>Can You REALLY Trust AI? The Cybersecurity Risks Explained</itunes:title><description><![CDATA[<p>Artificial Intelligence is transforming the world—but can it also put </p><p>you at risk?  In this episode of the Learn Online Security Podcast, </p><p>Richard Bankert (Social Engineering Expert &amp; CEO) and Chris Howells </p><p>(Director of IT &amp; Head Trainer) break down the hidden dangers of AI </p><p>in cybersecurity.</p><p>From data scraping and deepfakes to AI-powered scams and emotional </p><p>manipulation through AI avatars, this conversation explores how </p><p>cybercriminals are already using AI to launch faster, smarter, and more </p><p>convincing attacks.</p><p><strong>You’ll learn</strong>:</p><p>✅ How AI supercharges data collection &amp; online profiling</p><p>✅ Why old accounts (like Myspace or forgotten Facebook posts) are goldmines for attackers</p><p>✅ How cybercriminals use AI for spear-phishing, romance scams, and fake business emails</p><p>✅ The real risks of AI avatars, deepfakes, and misinformation campaigns</p><p>✅ Why human error is still the #1 vulnerability in cybersecurity</p><p>✅ Steps you can take: digital deep dives, stronger policies, and employee training</p><p>💡 <strong>Key Takeaway</strong>: AI itself isn’t evil—but it gives attackers more </p><p>powerful tools than ever before. Protecting your data starts with </p><p>awareness, digital hygiene, and critical thinking.</p><p>🔒 <strong>Stay Protected:</strong></p><p>👉 <strong>Learn more about our Digital Deep Dive Service</strong>.  Our digital </p><p>footprint product is a professional service done by real experts who </p><p>analyze and help you secure your online presence.🔍 </p><p>https://learnonlinesecurity.com/training/digital-footprint</p><p><strong>What are your next steps?</strong></p><p>📖 Start learning for free at https://learnonlinesecurity.com/start-here</p><p>🔐 Become a superhero and support the channel </p><p>https://learnonlinesecurity.com/heroes/superheroes</p><p>🏢 Learn more about Learn Online Security's social engineering training </p><p>for employees &amp; business certification courses </p><p>https://learnonlinesecurity.com/business-training</p><p><br></p><p><strong>Follow Learn Online Security:</strong></p><p>Facebook: https://www.facebook.com/LearnOnlineSec</p><p>Instagram: https://www.instagram.com/learnonlinesecurity</p><p>Rumble: https://www.rumble.com/learnonlinesecurity</p><p>Website: https://www.learnonlinesecurity.com</p><p><br></p><p>Here's a video from <a href="https://studio.youtube.com/channel/UCC9EjyMN_hx5NdctLBx5X7w" rel="noopener noreferrer" target="_blank">&nbsp;@ScammerPayback&nbsp;</a> that we think you should watch!  <a href="https://www.youtube.com/watch?v=xEdZwLRJttQ" rel="noopener noreferrer" target="_blank">Social Engineer: YOU are Easier to Hack than your Computer</a>  (It is a long video and if you don't have time to watch it all at least catch timestamp 31:39)</p><p><br></p><p>⌚<strong>Time Stamps</strong> ⌚</p><p>0:00 – Introduction to AI as a Tool</p><p>1:18 – AI Supercharging Data Scraping</p><p>2:57 – Forgotten Accounts &amp; Digital Footprints</p><p>5:01 – Digital Deep Dives &amp; Data Cleanup</p><p>7:37 – Misinformation &amp; Deepfakes</p><p>10:40 – Smarter AI-Driven Scams</p><p>13:14 – Real-World Case: Corporate Phishing</p><p>15:40 – Internal AI Risks &amp; Employee Training</p><p>17:15 – Emotional Exploitation Risks</p><p>22:55 – Key Takeaways &amp; Closing</p><p><br></p><p>Who this video is for: Small business owners, IT managers, and data-handling professionals: learn how AI, deepfakes, and phishing scams  put your company at risk—and practical steps to protect employees, sensitive data, and digital hygiene.</p><p><br></p><p>#AI #OnlineSafety #DataPrivacy</p>]]></description><content:encoded><![CDATA[<p>Artificial Intelligence is transforming the world—but can it also put </p><p>you at risk?  In this episode of the Learn Online Security Podcast, </p><p>Richard Bankert (Social Engineering Expert &amp; CEO) and Chris Howells </p><p>(Director of IT &amp; Head Trainer) break down the hidden dangers of AI </p><p>in cybersecurity.</p><p>From data scraping and deepfakes to AI-powered scams and emotional </p><p>manipulation through AI avatars, this conversation explores how </p><p>cybercriminals are already using AI to launch faster, smarter, and more </p><p>convincing attacks.</p><p><strong>You’ll learn</strong>:</p><p>✅ How AI supercharges data collection &amp; online profiling</p><p>✅ Why old accounts (like Myspace or forgotten Facebook posts) are goldmines for attackers</p><p>✅ How cybercriminals use AI for spear-phishing, romance scams, and fake business emails</p><p>✅ The real risks of AI avatars, deepfakes, and misinformation campaigns</p><p>✅ Why human error is still the #1 vulnerability in cybersecurity</p><p>✅ Steps you can take: digital deep dives, stronger policies, and employee training</p><p>💡 <strong>Key Takeaway</strong>: AI itself isn’t evil—but it gives attackers more </p><p>powerful tools than ever before. Protecting your data starts with </p><p>awareness, digital hygiene, and critical thinking.</p><p>🔒 <strong>Stay Protected:</strong></p><p>👉 <strong>Learn more about our Digital Deep Dive Service</strong>.  Our digital </p><p>footprint product is a professional service done by real experts who </p><p>analyze and help you secure your online presence.🔍 </p><p>https://learnonlinesecurity.com/training/digital-footprint</p><p><strong>What are your next steps?</strong></p><p>📖 Start learning for free at https://learnonlinesecurity.com/start-here</p><p>🔐 Become a superhero and support the channel </p><p>https://learnonlinesecurity.com/heroes/superheroes</p><p>🏢 Learn more about Learn Online Security's social engineering training </p><p>for employees &amp; business certification courses </p><p>https://learnonlinesecurity.com/business-training</p><p><br></p><p><strong>Follow Learn Online Security:</strong></p><p>Facebook: https://www.facebook.com/LearnOnlineSec</p><p>Instagram: https://www.instagram.com/learnonlinesecurity</p><p>Rumble: https://www.rumble.com/learnonlinesecurity</p><p>Website: https://www.learnonlinesecurity.com</p><p><br></p><p>Here's a video from <a href="https://studio.youtube.com/channel/UCC9EjyMN_hx5NdctLBx5X7w" rel="noopener noreferrer" target="_blank">&nbsp;@ScammerPayback&nbsp;</a> that we think you should watch!  <a href="https://www.youtube.com/watch?v=xEdZwLRJttQ" rel="noopener noreferrer" target="_blank">Social Engineer: YOU are Easier to Hack than your Computer</a>  (It is a long video and if you don't have time to watch it all at least catch timestamp 31:39)</p><p><br></p><p>⌚<strong>Time Stamps</strong> ⌚</p><p>0:00 – Introduction to AI as a Tool</p><p>1:18 – AI Supercharging Data Scraping</p><p>2:57 – Forgotten Accounts &amp; Digital Footprints</p><p>5:01 – Digital Deep Dives &amp; Data Cleanup</p><p>7:37 – Misinformation &amp; Deepfakes</p><p>10:40 – Smarter AI-Driven Scams</p><p>13:14 – Real-World Case: Corporate Phishing</p><p>15:40 – Internal AI Risks &amp; Employee Training</p><p>17:15 – Emotional Exploitation Risks</p><p>22:55 – Key Takeaways &amp; Closing</p><p><br></p><p>Who this video is for: Small business owners, IT managers, and data-handling professionals: learn how AI, deepfakes, and phishing scams  put your company at risk—and practical steps to protect employees, sensitive data, and digital hygiene.</p><p><br></p><p>#AI #OnlineSafety #DataPrivacy</p>]]></content:encoded><link><![CDATA[https://learnonlinesecurity.com/]]></link><guid isPermaLink="false">b0a1d4c1-74ac-461f-9081-ae521d1552d4</guid><itunes:image href="https://artwork.captivate.fm/1285e579-164d-4daa-be01-3591e1763d1e/-vblWYASnAR0UDgG1JPrbFqE.jpg"/><pubDate>Wed, 27 Aug 2025 14:15:00 -0600</pubDate><enclosure url="https://episodes.captivate.fm/episode/b0a1d4c1-74ac-461f-9081-ae521d1552d4.mp3" length="46923751" type="audio/mpeg"/><itunes:duration>24:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>17</itunes:episode><podcast:episode>17</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/eddeedeb-79cc-404e-a28c-330cb078bf1d/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/eddeedeb-79cc-404e-a28c-330cb078bf1d/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/eddeedeb-79cc-404e-a28c-330cb078bf1d/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-a3ec1e20-6d33-410b-80ba-6bc351b41a28.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Can You REALLY Trust AI? | Cybersecurity Risks Explained"><podcast:source uri="https://youtu.be/e-oteIKInts"/></podcast:alternateEnclosure></item><item><title>How Attackers Are Bypassing Your Security With AUTHORITY</title><itunes:title>How Attackers Are Bypassing Your Security With AUTHORITY</itunes:title><description><![CDATA[<p><strong>You’re not alone in underestimating how easily authority can be faked!</strong> </p><p>In this episode of the <em>Learn Online Security Podcast</em>, Richard Bankert </p><p>and Chris Howells expose the hidden world of authority-based social </p><p>engineering attacks — a psychological tactic hackers use to bypass </p><p>security by posing as trusted figures.</p><p>🔍 <strong>What You’ll Learn</strong>:</p><p>     📌What social engineering really is and why authority plays a key role </p><p>     📌Real-life stories of penetration tests where attackers walked out </p><p>undetected </p><p>     📌The psychology behind why employees hesitate to question </p><p>authority </p><p>     📌How scammers use urgency and fake credibility (Boss Gift Card </p><p>Scam) to trick staff </p><p>     📌Practical security awareness tips to protect your business, team,</p><p> and yourself from attacks</p><p>💡 <strong>Key Takeaways</strong>:</p><p>✔ Always verify authority before granting access</p><p>✔ Train employees to recognize urgent manipulation tactics</p><p>✔ Reduce attacker “time to operate” by questioning credentials</p><p>✔ Build a security-conscious workplace culture</p><p>🎯 <strong>Perfect for</strong>:</p><p>Small business owners • IT professionals • Corporate security teams • </p><p>Anyone wanting to protect themselves from cybercrime &amp; social </p><p>engineering scams</p><p><strong>What are my next steps?</strong> </p><p>📖 Start <strong>learning </strong>for <a href="https://learnonlinesecurity.com/start-here" rel="noopener noreferrer" target="_blank">free</a>!</p><p>🔐 Become a <strong>superhero </strong>and <a href="https://learnonlinesecurity.com/heroes/superheroes" rel="noopener noreferrer" target="_blank">support the channel</a>!</p><p>🏢 Learn more about our <a href="https://learnonlinesecurity.com/business-training" rel="noopener noreferrer" target="_blank">business certification courses</a> </p><p><strong>Follow Learn Online Security</strong>:</p><p><a href="https://www.facebook.com/LearnOnlineSec" rel="noopener noreferrer" target="_blank">Facebook</a>, <a href="https://www.instagram.com/learnonlinesecurity" rel="noopener noreferrer" target="_blank">Instagram</a>, <a href="https://www.rumble.com/c/c-7699801" rel="noopener noreferrer" target="_blank">Rumble </a></p><p><a href="https://www.learnonlinesecurity.com" rel="noopener noreferrer" target="_blank">Learn Online Security Website</a></p><br><p>Links referenced in this episode:</p><ul><li><a href="https://learnonlinesecurity.com" rel="noopener noreferrer" target="_blank">learnonlinesecurity.com</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><strong>You’re not alone in underestimating how easily authority can be faked!</strong> </p><p>In this episode of the <em>Learn Online Security Podcast</em>, Richard Bankert </p><p>and Chris Howells expose the hidden world of authority-based social </p><p>engineering attacks — a psychological tactic hackers use to bypass </p><p>security by posing as trusted figures.</p><p>🔍 <strong>What You’ll Learn</strong>:</p><p>     📌What social engineering really is and why authority plays a key role </p><p>     📌Real-life stories of penetration tests where attackers walked out </p><p>undetected </p><p>     📌The psychology behind why employees hesitate to question </p><p>authority </p><p>     📌How scammers use urgency and fake credibility (Boss Gift Card </p><p>Scam) to trick staff </p><p>     📌Practical security awareness tips to protect your business, team,</p><p> and yourself from attacks</p><p>💡 <strong>Key Takeaways</strong>:</p><p>✔ Always verify authority before granting access</p><p>✔ Train employees to recognize urgent manipulation tactics</p><p>✔ Reduce attacker “time to operate” by questioning credentials</p><p>✔ Build a security-conscious workplace culture</p><p>🎯 <strong>Perfect for</strong>:</p><p>Small business owners • IT professionals • Corporate security teams • </p><p>Anyone wanting to protect themselves from cybercrime &amp; social </p><p>engineering scams</p><p><strong>What are my next steps?</strong> </p><p>📖 Start <strong>learning </strong>for <a href="https://learnonlinesecurity.com/start-here" rel="noopener noreferrer" target="_blank">free</a>!</p><p>🔐 Become a <strong>superhero </strong>and <a href="https://learnonlinesecurity.com/heroes/superheroes" rel="noopener noreferrer" target="_blank">support the channel</a>!</p><p>🏢 Learn more about our <a href="https://learnonlinesecurity.com/business-training" rel="noopener noreferrer" target="_blank">business certification courses</a> </p><p><strong>Follow Learn Online Security</strong>:</p><p><a href="https://www.facebook.com/LearnOnlineSec" rel="noopener noreferrer" target="_blank">Facebook</a>, <a href="https://www.instagram.com/learnonlinesecurity" rel="noopener noreferrer" target="_blank">Instagram</a>, <a href="https://www.rumble.com/c/c-7699801" rel="noopener noreferrer" target="_blank">Rumble </a></p><p><a href="https://www.learnonlinesecurity.com" rel="noopener noreferrer" target="_blank">Learn Online Security Website</a></p><br><p>Links referenced in this episode:</p><ul><li><a href="https://learnonlinesecurity.com" rel="noopener noreferrer" target="_blank">learnonlinesecurity.com</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://learnonlinesecurity.com/]]></link><guid isPermaLink="false">3cc11064-da10-4929-9f8d-9cb8d0c68017</guid><itunes:image href="https://artwork.captivate.fm/1285e579-164d-4daa-be01-3591e1763d1e/-vblWYASnAR0UDgG1JPrbFqE.jpg"/><pubDate>Tue, 12 Aug 2025 13:30:00 -0600</pubDate><enclosure url="https://episodes.captivate.fm/episode/3cc11064-da10-4929-9f8d-9cb8d0c68017.mp3" length="40375901" type="audio/mpeg"/><itunes:duration>20:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>16</itunes:episode><podcast:episode>16</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/0c462944-81ee-4043-b89d-b2803c53d65c/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/0c462944-81ee-4043-b89d-b2803c53d65c/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/0c462944-81ee-4043-b89d-b2803c53d65c/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-414124c3-fe81-4b8d-b1d9-37583ae24776.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="How Attackers Are Bypassing Your Security With AUTHORITY"><podcast:source uri="https://youtu.be/sTTTIuefvQU"/></podcast:alternateEnclosure></item><item><title>Are you studying scams like athletes study game film?</title><itunes:title>Are you studying scams like athletes study game film?</itunes:title><description><![CDATA[<p><strong>Just like athletes review game film to win, you need to recognize the </strong></p><p><strong>plays scammers run against you.</strong> In this perspective-changing episode </p><p>of the Learn Online Security Podcast, we compare cybersecurity threats to </p><p>professional sports strategy. </p><p>🎙️ Hosted by Tamara Michèle with experts Richard Bankert and Chris </p><p>Howells, we uncover how most people are reacting too late—only seeing </p><p>the scam, not the entire attack strategy.</p><p>🔎 Learn how to:</p><p>   📌 Read the "plays" behind scams and cyberattacks</p><p>   📌 Understand social engineering in real life</p><p>   📌 Spot red flags before the damage is done</p><p>   📌 Protect yourself using awareness, not just tools</p><p>   📌 Recognize pressure, authority, and trust-based manipulation</p><p>🚨 Whether you're an individual, parent or business, you're already in </p><p>the game. This episode shows you how to stop being a passive target and </p><p>start playing smarter, not scared.</p><p>Podcast Host <a href="https://www.youtube.com/@UCNW7n6n7q9GzulfZ8fIW0cg" rel="noopener noreferrer" target="_blank">Tamara Michéle</a></p><p>This is not a paid endorsement. Guest opinions are their own.</p><p><strong>What are my next steps?</strong> </p><p>📖 Start <strong>learning </strong>for <a href="https://learnonlinesecurity.com/start-here" rel="noopener noreferrer" target="_blank">free</a>!</p><p>🔐 Become a <strong>superhero </strong>and <a href="https://learnonlinesecurity.com/heroes/superheroes" rel="noopener noreferrer" target="_blank">support the channel</a>!</p><p>🏢 Learn more about our <a href="https://learnonlinesecurity.com/business-training" rel="noopener noreferrer" target="_blank">business certification courses</a> </p><p><strong>Follow Learn Online Security</strong>:</p><p><a href="https://www.facebook.com/LearnOnlineSec" rel="noopener noreferrer" target="_blank">Facebook</a>, <a href="https://www.instagram.com/learnonlinesecurity" rel="noopener noreferrer" target="_blank">Instagram</a>, <a href="https://www.rumble.com/c/c-7699801" rel="noopener noreferrer" target="_blank">Rumble </a></p><p><a href="https://www.learnonlinesecurity.com" rel="noopener noreferrer" target="_blank">Learn Online Security Website</a></p>]]></description><content:encoded><![CDATA[<p><strong>Just like athletes review game film to win, you need to recognize the </strong></p><p><strong>plays scammers run against you.</strong> In this perspective-changing episode </p><p>of the Learn Online Security Podcast, we compare cybersecurity threats to </p><p>professional sports strategy. </p><p>🎙️ Hosted by Tamara Michèle with experts Richard Bankert and Chris </p><p>Howells, we uncover how most people are reacting too late—only seeing </p><p>the scam, not the entire attack strategy.</p><p>🔎 Learn how to:</p><p>   📌 Read the "plays" behind scams and cyberattacks</p><p>   📌 Understand social engineering in real life</p><p>   📌 Spot red flags before the damage is done</p><p>   📌 Protect yourself using awareness, not just tools</p><p>   📌 Recognize pressure, authority, and trust-based manipulation</p><p>🚨 Whether you're an individual, parent or business, you're already in </p><p>the game. This episode shows you how to stop being a passive target and </p><p>start playing smarter, not scared.</p><p>Podcast Host <a href="https://www.youtube.com/@UCNW7n6n7q9GzulfZ8fIW0cg" rel="noopener noreferrer" target="_blank">Tamara Michéle</a></p><p>This is not a paid endorsement. Guest opinions are their own.</p><p><strong>What are my next steps?</strong> </p><p>📖 Start <strong>learning </strong>for <a href="https://learnonlinesecurity.com/start-here" rel="noopener noreferrer" target="_blank">free</a>!</p><p>🔐 Become a <strong>superhero </strong>and <a href="https://learnonlinesecurity.com/heroes/superheroes" rel="noopener noreferrer" target="_blank">support the channel</a>!</p><p>🏢 Learn more about our <a href="https://learnonlinesecurity.com/business-training" rel="noopener noreferrer" target="_blank">business certification courses</a> </p><p><strong>Follow Learn Online Security</strong>:</p><p><a href="https://www.facebook.com/LearnOnlineSec" rel="noopener noreferrer" target="_blank">Facebook</a>, <a href="https://www.instagram.com/learnonlinesecurity" rel="noopener noreferrer" target="_blank">Instagram</a>, <a href="https://www.rumble.com/c/c-7699801" rel="noopener noreferrer" target="_blank">Rumble </a></p><p><a href="https://www.learnonlinesecurity.com" rel="noopener noreferrer" target="_blank">Learn Online Security Website</a></p>]]></content:encoded><link><![CDATA[https://learnonlinesecurity.com/]]></link><guid isPermaLink="false">5025034d-2d70-4938-854a-984deaed7c83</guid><itunes:image href="https://artwork.captivate.fm/1285e579-164d-4daa-be01-3591e1763d1e/-vblWYASnAR0UDgG1JPrbFqE.jpg"/><pubDate>Wed, 23 Jul 2025 13:30:00 -0600</pubDate><enclosure url="https://episodes.captivate.fm/episode/5025034d-2d70-4938-854a-984deaed7c83.mp3" length="48130210" type="audio/mpeg"/><itunes:duration>24:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>15</itunes:episode><podcast:episode>15</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/342993ee-15b6-4ff6-9f0c-12c748f8309e/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/342993ee-15b6-4ff6-9f0c-12c748f8309e/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/342993ee-15b6-4ff6-9f0c-12c748f8309e/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-1ad326a7-7be4-4699-9966-6cdecfd7d92d.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Are you studying scams like athletes study game film?"><podcast:source uri="https://youtu.be/eHbIvq6yjAM"/></podcast:alternateEnclosure></item><item><title>Dumpster Disasters: How Medical Records End Up on the Streets</title><itunes:title>Dumpster Disasters: How Medical Records End Up on the Streets</itunes:title><description><![CDATA[<p><strong>When private medical records are dumped in an alley, who really pays the price?</strong> In this episode of the Learn Online Security Podcast, Tamara</p><p> Michèle and Chris Howells unpack a disturbing privacy breach involving </p><p>discarded psychiatric files and the fallout that followed. They explore </p><p>the real-life consequences of identity theft, how sensitive data can be </p><p>exploited, and the harsh truth that once your information is out, you </p><p>may never know where it went—or who has it.</p><p>From fake IDs to stolen medical identities, Chris shares how easy it is </p><p>for someone to assume your identity with just a few pieces of personal </p><p>information. Tamara opens up about her own experience trying to change </p><p>her Social Insurance Number after a workplace data breach. </p><p><strong>This episode covers:</strong></p><p>    ✅Why medical data is a goldmine for criminals</p><p>    ✅What companies are supposed to do after a breach</p><p>    ✅Why the blame often falls on the wrong people</p><p>    ✅What steps you can take when you get that letter</p><p>    ✅The role of street smarts and teaching kids how to protect </p><p>themselves</p><p>Whether you're dealing with a breach or want to prevent one, this </p><p>episode offers a practical look at what really happens when your </p><p>personal data leaks—and what you can do about it.</p><br><p><strong>Independent Fact Check: </strong></p><p><em>Health records found in alley prompt privacy commissioner report</em></p><p>https://www.sasktoday.ca/regina-today/regina-news/health-records-found-in-alley-prompt-privacy-commissioner-report-10485380</p><p><em>INVESTIGATION REPORT 251-2024, 004-2025 Dr. Chukwuemeka Odenigbo and Dr. Nebeolisa Ezeasor (Elphinstone Medical Clinic)</em></p><p>https://oipc.sk.ca/assets/hipa-investigation_251-2024-004-2025.pdf</p><p><em>Decades Later, Patient Records Still Blowing in the Wind</em></p><p>https://www.rosensunshine.com/blog/decades-later-patient-records-still-blowing-in-the-wind</p><br><p>Anyone who handles or relies on sensitive medical data—from doctors and </p><p>clinic managers to cleaners and everyday patients—should watch this </p><p>video. It reveals how easily private information can fall into the wrong</p><p> hands and what happens when no one takes proper responsibility.</p><p>Podcast Host <a href="https://www.youtube.com/@UCNW7n6n7q9GzulfZ8fIW0cg" rel="noopener noreferrer" target="_blank">Tamara Michéle</a></p><p>This is not a paid endorsement. Guest opinions are their own.</p><p><strong>What are my next steps?</strong> </p><p>📖 Start <strong>learning </strong>for <a href="https://learnonlinesecurity.com/start-here" rel="noopener noreferrer" target="_blank">free</a>!</p><p>🔐 Become a <strong>superhero </strong>and <a href="https://learnonlinesecurity.com/heroes/superheroes" rel="noopener noreferrer" target="_blank">support the channel</a>!</p><p>🏢 Learn more about our <a href="https://learnonlinesecurity.com/business-training" rel="noopener noreferrer" target="_blank">business certification courses</a> </p><p><strong>Follow Learn Online Security</strong>:</p><p><a href="https://www.facebook.com/LearnOnlineSec" rel="noopener noreferrer" target="_blank">Facebook</a>, <a href="https://www.instagram.com/learnonlinesecurity" rel="noopener noreferrer" target="_blank">Instagram</a>, <a href="https://www.rumble.com/c/c-7699801" rel="noopener noreferrer" target="_blank">Rumble </a></p><p><a href="https://www.learnonlinesecurity.com" rel="noopener noreferrer" target="_blank">Learn Online Security Website</a></p>]]></description><content:encoded><![CDATA[<p><strong>When private medical records are dumped in an alley, who really pays the price?</strong> In this episode of the Learn Online Security Podcast, Tamara</p><p> Michèle and Chris Howells unpack a disturbing privacy breach involving </p><p>discarded psychiatric files and the fallout that followed. They explore </p><p>the real-life consequences of identity theft, how sensitive data can be </p><p>exploited, and the harsh truth that once your information is out, you </p><p>may never know where it went—or who has it.</p><p>From fake IDs to stolen medical identities, Chris shares how easy it is </p><p>for someone to assume your identity with just a few pieces of personal </p><p>information. Tamara opens up about her own experience trying to change </p><p>her Social Insurance Number after a workplace data breach. </p><p><strong>This episode covers:</strong></p><p>    ✅Why medical data is a goldmine for criminals</p><p>    ✅What companies are supposed to do after a breach</p><p>    ✅Why the blame often falls on the wrong people</p><p>    ✅What steps you can take when you get that letter</p><p>    ✅The role of street smarts and teaching kids how to protect </p><p>themselves</p><p>Whether you're dealing with a breach or want to prevent one, this </p><p>episode offers a practical look at what really happens when your </p><p>personal data leaks—and what you can do about it.</p><br><p><strong>Independent Fact Check: </strong></p><p><em>Health records found in alley prompt privacy commissioner report</em></p><p>https://www.sasktoday.ca/regina-today/regina-news/health-records-found-in-alley-prompt-privacy-commissioner-report-10485380</p><p><em>INVESTIGATION REPORT 251-2024, 004-2025 Dr. Chukwuemeka Odenigbo and Dr. Nebeolisa Ezeasor (Elphinstone Medical Clinic)</em></p><p>https://oipc.sk.ca/assets/hipa-investigation_251-2024-004-2025.pdf</p><p><em>Decades Later, Patient Records Still Blowing in the Wind</em></p><p>https://www.rosensunshine.com/blog/decades-later-patient-records-still-blowing-in-the-wind</p><br><p>Anyone who handles or relies on sensitive medical data—from doctors and </p><p>clinic managers to cleaners and everyday patients—should watch this </p><p>video. It reveals how easily private information can fall into the wrong</p><p> hands and what happens when no one takes proper responsibility.</p><p>Podcast Host <a href="https://www.youtube.com/@UCNW7n6n7q9GzulfZ8fIW0cg" rel="noopener noreferrer" target="_blank">Tamara Michéle</a></p><p>This is not a paid endorsement. Guest opinions are their own.</p><p><strong>What are my next steps?</strong> </p><p>📖 Start <strong>learning </strong>for <a href="https://learnonlinesecurity.com/start-here" rel="noopener noreferrer" target="_blank">free</a>!</p><p>🔐 Become a <strong>superhero </strong>and <a href="https://learnonlinesecurity.com/heroes/superheroes" rel="noopener noreferrer" target="_blank">support the channel</a>!</p><p>🏢 Learn more about our <a href="https://learnonlinesecurity.com/business-training" rel="noopener noreferrer" target="_blank">business certification courses</a> </p><p><strong>Follow Learn Online Security</strong>:</p><p><a href="https://www.facebook.com/LearnOnlineSec" rel="noopener noreferrer" target="_blank">Facebook</a>, <a href="https://www.instagram.com/learnonlinesecurity" rel="noopener noreferrer" target="_blank">Instagram</a>, <a href="https://www.rumble.com/c/c-7699801" rel="noopener noreferrer" target="_blank">Rumble </a></p><p><a href="https://www.learnonlinesecurity.com" rel="noopener noreferrer" target="_blank">Learn Online Security Website</a></p>]]></content:encoded><link><![CDATA[https://learnonlinesecurity.com/]]></link><guid isPermaLink="false">c07d9387-e34c-4fe0-9795-380be032793b</guid><itunes:image href="https://artwork.captivate.fm/1285e579-164d-4daa-be01-3591e1763d1e/-vblWYASnAR0UDgG1JPrbFqE.jpg"/><pubDate>Wed, 09 Jul 2025 13:30:00 -0600</pubDate><enclosure url="https://episodes.captivate.fm/episode/c07d9387-e34c-4fe0-9795-380be032793b.mp3" length="42661830" type="audio/mpeg"/><itunes:duration>22:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>14</itunes:episode><podcast:episode>14</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/48b5ca5e-f585-4d75-869e-712e824c0325/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/48b5ca5e-f585-4d75-869e-712e824c0325/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/48b5ca5e-f585-4d75-869e-712e824c0325/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-9ea5e967-9999-4390-b48b-af503e7955a0.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Dumpster Disasters: How Medical Records End Up on the Streets"><podcast:source uri="https://youtu.be/VY5kltVHdgE"/></podcast:alternateEnclosure></item><item><title>Passion Could Save Your Business From Cyber Theft</title><itunes:title>Passion Could Save Your Business From Cyber Theft</itunes:title><description><![CDATA[<p><strong>What if your biggest cybersecurity strength isn’t your tech—but your </strong></p><p><strong>team?</strong> In this episode, Tamara Michèle talks with Kolbe Certified </p><p>Consultant Blair Andrew about how fulfilled, valued employees are more </p><p>than just productive—they’re protective.</p><p>Blair shares how the Kolbe Index and OPgig platform help organizations </p><p>align people with the roles that match how they naturally take action. </p><p>When employees feel seen, supported, and successful, trust deepens—</p><p>and that trust strengthens everything from communication to crisis </p><p>response.</p><p> Good culture isn’t just good business—it’s built-in security.</p><p><strong>Learn How:</strong></p><p>	✅ Conative strengths reduce burnout and improve team alignment</p><p>	✅ Engaged employees are more alert to risks and scams</p><p>	✅ OPgig reveals overlooked roles where people can thrive</p><p>	✅ Strong internal culture is a key pillar of cyber resilience</p><p>Whether you’re building a startup or leading a legacy brand, this </p><p>episode offers a fresh lens on why investing in your people is the </p><p>smartest security upgrade you’ll ever make.</p><br><p><strong>References:  </strong></p><p>🧠 Altruistic Coach 📊 https://altruisticcoach.com/</p><p>🏡 Living Skies Lodge 🛏️ https://livingskieslodge.com/</p><p>🐶 Second Family Dog Lodge 🐾 https://secondfamilydoglodge.com/</p><p>Simon Sinek https://simonsinek.com/</p><br><p><strong>Ready to Lead with Integrity?</strong></p><p>Discover the six pillars 🏛️ that build stronger teams, safer </p><p>organizations, and greater trust.</p><p>🎓 Enroll in Bill Pipke’s <em>Integrity: The Foundation of Leadership</em> course</p><p> today.</p><p>👉 Start the course now </p><p>https://learnonlinesecurity.com/training/online-training</p><br><p><strong>Tamara Michèle Podcast Host</strong>: </p><p>https://www.youtube.com/@UCNW7n6n7q9GzulfZ8fIW0cg </p><br><p>This is not a paid endorsement. Guest opinions are their own.</p><br><p>Podcast Host <a href="https://www.youtube.com/@UCNW7n6n7q9GzulfZ8fIW0cg" rel="noopener noreferrer" target="_blank">Tamara Michéle</a></p><p>This is not a paid endorsement. Guest opinions are their own.</p><p><strong>What are my next steps?</strong> </p><p>📖 Start <strong>learning </strong>for <a href="https://learnonlinesecurity.com/start-here" rel="noopener noreferrer" target="_blank">free</a>!</p><p>🔐 Become a <strong>superhero </strong>and <a href="https://learnonlinesecurity.com/heroes/superheroes" rel="noopener noreferrer" target="_blank">support the channel</a>!</p><p>🏢 Learn more about our <a href="https://learnonlinesecurity.com/business-training" rel="noopener noreferrer" target="_blank">business certification courses</a> </p><p><strong>Follow Learn Online Security</strong>:</p><p><a href="https://www.facebook.com/LearnOnlineSec" rel="noopener noreferrer" target="_blank">Facebook</a>, <a href="https://www.instagram.com/learnonlinesecurity" rel="noopener noreferrer" target="_blank">Instagram</a>, <a href="https://www.rumble.com/c/c-7699801" rel="noopener noreferrer" target="_blank">Rumble </a></p><p><a href="https://www.learnonlinesecurity.com" rel="noopener noreferrer" target="_blank">Learn Online Security Website</a></p>]]></description><content:encoded><![CDATA[<p><strong>What if your biggest cybersecurity strength isn’t your tech—but your </strong></p><p><strong>team?</strong> In this episode, Tamara Michèle talks with Kolbe Certified </p><p>Consultant Blair Andrew about how fulfilled, valued employees are more </p><p>than just productive—they’re protective.</p><p>Blair shares how the Kolbe Index and OPgig platform help organizations </p><p>align people with the roles that match how they naturally take action. </p><p>When employees feel seen, supported, and successful, trust deepens—</p><p>and that trust strengthens everything from communication to crisis </p><p>response.</p><p> Good culture isn’t just good business—it’s built-in security.</p><p><strong>Learn How:</strong></p><p>	✅ Conative strengths reduce burnout and improve team alignment</p><p>	✅ Engaged employees are more alert to risks and scams</p><p>	✅ OPgig reveals overlooked roles where people can thrive</p><p>	✅ Strong internal culture is a key pillar of cyber resilience</p><p>Whether you’re building a startup or leading a legacy brand, this </p><p>episode offers a fresh lens on why investing in your people is the </p><p>smartest security upgrade you’ll ever make.</p><br><p><strong>References:  </strong></p><p>🧠 Altruistic Coach 📊 https://altruisticcoach.com/</p><p>🏡 Living Skies Lodge 🛏️ https://livingskieslodge.com/</p><p>🐶 Second Family Dog Lodge 🐾 https://secondfamilydoglodge.com/</p><p>Simon Sinek https://simonsinek.com/</p><br><p><strong>Ready to Lead with Integrity?</strong></p><p>Discover the six pillars 🏛️ that build stronger teams, safer </p><p>organizations, and greater trust.</p><p>🎓 Enroll in Bill Pipke’s <em>Integrity: The Foundation of Leadership</em> course</p><p> today.</p><p>👉 Start the course now </p><p>https://learnonlinesecurity.com/training/online-training</p><br><p><strong>Tamara Michèle Podcast Host</strong>: </p><p>https://www.youtube.com/@UCNW7n6n7q9GzulfZ8fIW0cg </p><br><p>This is not a paid endorsement. Guest opinions are their own.</p><br><p>Podcast Host <a href="https://www.youtube.com/@UCNW7n6n7q9GzulfZ8fIW0cg" rel="noopener noreferrer" target="_blank">Tamara Michéle</a></p><p>This is not a paid endorsement. Guest opinions are their own.</p><p><strong>What are my next steps?</strong> </p><p>📖 Start <strong>learning </strong>for <a href="https://learnonlinesecurity.com/start-here" rel="noopener noreferrer" target="_blank">free</a>!</p><p>🔐 Become a <strong>superhero </strong>and <a href="https://learnonlinesecurity.com/heroes/superheroes" rel="noopener noreferrer" target="_blank">support the channel</a>!</p><p>🏢 Learn more about our <a href="https://learnonlinesecurity.com/business-training" rel="noopener noreferrer" target="_blank">business certification courses</a> </p><p><strong>Follow Learn Online Security</strong>:</p><p><a href="https://www.facebook.com/LearnOnlineSec" rel="noopener noreferrer" target="_blank">Facebook</a>, <a href="https://www.instagram.com/learnonlinesecurity" rel="noopener noreferrer" target="_blank">Instagram</a>, <a href="https://www.rumble.com/c/c-7699801" rel="noopener noreferrer" target="_blank">Rumble </a></p><p><a href="https://www.learnonlinesecurity.com" rel="noopener noreferrer" target="_blank">Learn Online Security Website</a></p>]]></content:encoded><link><![CDATA[https://learnonlinesecurity.com/]]></link><guid isPermaLink="false">dbdabc2b-a20a-4cf6-8e8b-e6d98702c29f</guid><itunes:image href="https://artwork.captivate.fm/1285e579-164d-4daa-be01-3591e1763d1e/-vblWYASnAR0UDgG1JPrbFqE.jpg"/><pubDate>Wed, 25 Jun 2025 13:30:00 -0600</pubDate><enclosure url="https://episodes.captivate.fm/episode/dbdabc2b-a20a-4cf6-8e8b-e6d98702c29f.mp3" length="31890434" type="audio/mpeg"/><itunes:duration>16:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>13</itunes:episode><podcast:episode>13</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/8e68be9c-0fc4-42d4-a584-593e86fad4dc/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/8e68be9c-0fc4-42d4-a584-593e86fad4dc/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/8e68be9c-0fc4-42d4-a584-593e86fad4dc/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-0dcd8c8d-3ae6-4946-9fda-6b2cf600422e.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Passion Could Save Your Business From Cyber Theft"><podcast:source uri="https://youtu.be/0MWEHKBRMvY"/></podcast:alternateEnclosure></item><item><title>Why We Get Fooled: Shifting Our View on Scams and Scammers</title><itunes:title>Why We Get Fooled: Shifting Our View on Scams and Scammers</itunes:title><description><![CDATA[<p><strong>Why is it important to separate your identity from your experience </strong></p><p><strong>after you’ve been scammed?</strong> In this episode, Tamara Michèle sits down </p><p>with Deb Andrew a <strong>Life and Wellness Coach</strong> and co-founder of <em>Altruistic</em></p><p><em> Coach</em>.  They explore how emotional recovery, mindset shifts, and </p><p>self-compassion are essential tools in rebuilding confidence and staying</p><p> resilient against future scams.</p><p>They unpack how scammers exploit not just your trust but your </p><p>identity—using urgency, fear, and hope to break down your defenses. Deb </p><p>explains why separating your self-worth from your experience is crucial </p><p>after being scammed, and how re-framing failure can protect you from </p><p>repeat victimization.</p><p>This episode isn’t just for scam victims—it’s for anyone who wants to </p><p>become more emotionally resilient in an ever-changing world. You’ll </p><p>learn how to spot emotional manipulation, rebuild confidence, and </p><p>support loved ones who may be too ashamed to speak up.</p><br><p>Learn How:</p><p>   ✅ Scammers exploit emotional vulnerability, not intelligence</p><p>   ✅ Mental fitness helps you respond, not just react, after being </p><p>scammed</p><p>   ✅ Shame can keep victims silent—and how to break that silence</p><p>   ✅ Re-framing your experience helps protect your identity and </p><p>self-worth</p><p>   ✅ Empathy builds resilience and helps others heal too</p><p>   ✅ Talking openly about scams reduces stigma and increases awareness</p><br><p>References:</p><p>🧠 Altruistic Coach 📊 https://altruisticcoach.com/</p><p>🏡 Living Skies Lodge 🛏️ https://livingskieslodge.com/</p><p>🐶 Second Family Dog Lodge 🐾 https://secondfamilydoglodge.com/</p><p>Warren Barry Instinctive Solutions  </p><p>https://www.youtube.com/@UCCRvyDP9c5RuZtbvY04fWig </p><p>Brené Brown https://brenebrown.com/</p><br><p>Podcast Host <a href="https://www.youtube.com/@UCNW7n6n7q9GzulfZ8fIW0cg" rel="noopener noreferrer" target="_blank">Tamara Michéle</a></p><p>This is not a paid endorsement. Guest opinions are their own.</p><p><strong>What are my next steps?</strong> </p><p>📖 Start <strong>learning </strong>for <a href="https://learnonlinesecurity.com/start-here" rel="noopener noreferrer" target="_blank">free</a>!</p><p>🔐 Become a <strong>superhero </strong>and <a href="https://learnonlinesecurity.com/heroes/superheroes" rel="noopener noreferrer" target="_blank">support the channel</a>!</p><p>🏢 Learn more about our <a href="https://learnonlinesecurity.com/business-training" rel="noopener noreferrer" target="_blank">business certification courses</a> </p><p><strong>Follow Learn Online Security</strong>:</p><p><a href="https://www.facebook.com/LearnOnlineSec" rel="noopener noreferrer" target="_blank">Facebook</a>, <a href="https://www.instagram.com/learnonlinesecurity" rel="noopener noreferrer" target="_blank">Instagram</a>, <a href="https://www.rumble.com/c/c-7699801" rel="noopener noreferrer" target="_blank">Rumble </a></p><p><a href="https://www.learnonlinesecurity.com" rel="noopener noreferrer" target="_blank">Learn Online Security Website</a></p>]]></description><content:encoded><![CDATA[<p><strong>Why is it important to separate your identity from your experience </strong></p><p><strong>after you’ve been scammed?</strong> In this episode, Tamara Michèle sits down </p><p>with Deb Andrew a <strong>Life and Wellness Coach</strong> and co-founder of <em>Altruistic</em></p><p><em> Coach</em>.  They explore how emotional recovery, mindset shifts, and </p><p>self-compassion are essential tools in rebuilding confidence and staying</p><p> resilient against future scams.</p><p>They unpack how scammers exploit not just your trust but your </p><p>identity—using urgency, fear, and hope to break down your defenses. Deb </p><p>explains why separating your self-worth from your experience is crucial </p><p>after being scammed, and how re-framing failure can protect you from </p><p>repeat victimization.</p><p>This episode isn’t just for scam victims—it’s for anyone who wants to </p><p>become more emotionally resilient in an ever-changing world. You’ll </p><p>learn how to spot emotional manipulation, rebuild confidence, and </p><p>support loved ones who may be too ashamed to speak up.</p><br><p>Learn How:</p><p>   ✅ Scammers exploit emotional vulnerability, not intelligence</p><p>   ✅ Mental fitness helps you respond, not just react, after being </p><p>scammed</p><p>   ✅ Shame can keep victims silent—and how to break that silence</p><p>   ✅ Re-framing your experience helps protect your identity and </p><p>self-worth</p><p>   ✅ Empathy builds resilience and helps others heal too</p><p>   ✅ Talking openly about scams reduces stigma and increases awareness</p><br><p>References:</p><p>🧠 Altruistic Coach 📊 https://altruisticcoach.com/</p><p>🏡 Living Skies Lodge 🛏️ https://livingskieslodge.com/</p><p>🐶 Second Family Dog Lodge 🐾 https://secondfamilydoglodge.com/</p><p>Warren Barry Instinctive Solutions  </p><p>https://www.youtube.com/@UCCRvyDP9c5RuZtbvY04fWig </p><p>Brené Brown https://brenebrown.com/</p><br><p>Podcast Host <a href="https://www.youtube.com/@UCNW7n6n7q9GzulfZ8fIW0cg" rel="noopener noreferrer" target="_blank">Tamara Michéle</a></p><p>This is not a paid endorsement. Guest opinions are their own.</p><p><strong>What are my next steps?</strong> </p><p>📖 Start <strong>learning </strong>for <a href="https://learnonlinesecurity.com/start-here" rel="noopener noreferrer" target="_blank">free</a>!</p><p>🔐 Become a <strong>superhero </strong>and <a href="https://learnonlinesecurity.com/heroes/superheroes" rel="noopener noreferrer" target="_blank">support the channel</a>!</p><p>🏢 Learn more about our <a href="https://learnonlinesecurity.com/business-training" rel="noopener noreferrer" target="_blank">business certification courses</a> </p><p><strong>Follow Learn Online Security</strong>:</p><p><a href="https://www.facebook.com/LearnOnlineSec" rel="noopener noreferrer" target="_blank">Facebook</a>, <a href="https://www.instagram.com/learnonlinesecurity" rel="noopener noreferrer" target="_blank">Instagram</a>, <a href="https://www.rumble.com/c/c-7699801" rel="noopener noreferrer" target="_blank">Rumble </a></p><p><a href="https://www.learnonlinesecurity.com" rel="noopener noreferrer" target="_blank">Learn Online Security Website</a></p>]]></content:encoded><link><![CDATA[https://learnonlinesecurity.com/]]></link><guid isPermaLink="false">3e8b64e4-fb07-408d-b2c7-8d6df466c55e</guid><itunes:image href="https://artwork.captivate.fm/1285e579-164d-4daa-be01-3591e1763d1e/-vblWYASnAR0UDgG1JPrbFqE.jpg"/><pubDate>Wed, 11 Jun 2025 13:30:00 -0600</pubDate><enclosure url="https://episodes.captivate.fm/episode/3e8b64e4-fb07-408d-b2c7-8d6df466c55e.mp3" length="47379869" type="audio/mpeg"/><itunes:duration>24:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>12</itunes:episode><podcast:episode>12</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/1e9668d1-03e2-47c0-9d25-f90d2ee155f9/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/1e9668d1-03e2-47c0-9d25-f90d2ee155f9/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/1e9668d1-03e2-47c0-9d25-f90d2ee155f9/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-661d4862-29ff-4b26-a244-a909f0af0e3e.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Why We Get Fooled: Shifting Our View on Scams and Scammers"><podcast:source uri="https://youtu.be/nRanjd3yBXE"/></podcast:alternateEnclosure></item><item><title>Altruistic Coach on Leading Secure, Smart Teams</title><itunes:title>Altruistic Coach on Leading Secure, Smart Teams</itunes:title><description><![CDATA[<p><strong>Ever wonder why you second-guess yourself online—then regret it?</strong> In </p><p>this episode, Tamara Michèle sits down with Deb and Blair </p><p>Andrew—co-founders of Altruistic Coach—to explore how self-awareness </p><p>can be a secret weapon for online security.</p><p>The couple introduces the Kolbe A. Index, a strengths-based assessment </p><p>that reveals how you're hardwired to solve problems. From reducing risky</p><p> behaviour to resolving conflict and making smarter digital decisions, </p><p>Deb and Blair explain how understanding your natural instincts can </p><p>transform your relationships, your business—and your cybersecurity </p><p>habits.</p><p>Learn How:</p><p>    ✅The Kolbe A. Index differs from personality tests</p><p>    ✅Your instinctive problem-solving style can predict your risk </p><p>tolerance</p><p>    ✅Understanding your "M.O." can improve workplace dynamics and </p><p>digital safety</p><p>    ✅Trusting your gut is more than just a saying—it's science</p><p>Whether you're a business owner, parent, or lifelong learner, this </p><p>conversation is filled with insights that shift perspectives and spark </p><p>meaningful change.</p><p><strong>References</strong>:   </p><p>🧠 Altruistic Coach 📊 https://altruisticcoach.com/</p><p>🏡 Living Skies Lodge 🛏️ https://livingskieslodge.com/</p><p>🐶 Second Family Dog Lodge 🐾 https://secondfamilydoglodge.com/</p><p>Warren Barry Instinctive Solutions <a href="https://studio.youtube.com/channel/UCCRvyDP9c5RuZtbvY04fWig" rel="noopener noreferrer" target="_blank">&nbsp;@warrenbarry4250&nbsp;</a></p><p>This is not a paid endorsement. Guest opinions are their own.</p><br><p>Podcast Host <a href="https://www.youtube.com/@UCNW7n6n7q9GzulfZ8fIW0cg" rel="noopener noreferrer" target="_blank">Tamara Michéle</a></p><p>This is not a paid endorsement. Guest opinions are their own.</p><p><strong>What are my next steps?</strong> </p><p>📖 Start <strong>learning </strong>for <a href="https://learnonlinesecurity.com/start-here" rel="noopener noreferrer" target="_blank">free</a>!</p><p>🔐 Become a <strong>superhero </strong>and <a href="https://learnonlinesecurity.com/heroes/superheroes" rel="noopener noreferrer" target="_blank">support the channel</a>!</p><p>🏢 Learn more about our <a href="https://learnonlinesecurity.com/business-training" rel="noopener noreferrer" target="_blank">business certification courses</a> </p><p><strong>Follow Learn Online Security</strong>:</p><p><a href="https://www.facebook.com/LearnOnlineSec" rel="noopener noreferrer" target="_blank">Facebook</a>, <a href="https://www.instagram.com/learnonlinesecurity" rel="noopener noreferrer" target="_blank">Instagram</a>, <a href="https://www.rumble.com/c/c-7699801" rel="noopener noreferrer" target="_blank">Rumble </a></p><p><a href="https://www.learnonlinesecurity.com" rel="noopener noreferrer" target="_blank">Learn Online Security Website</a></p>]]></description><content:encoded><![CDATA[<p><strong>Ever wonder why you second-guess yourself online—then regret it?</strong> In </p><p>this episode, Tamara Michèle sits down with Deb and Blair </p><p>Andrew—co-founders of Altruistic Coach—to explore how self-awareness </p><p>can be a secret weapon for online security.</p><p>The couple introduces the Kolbe A. Index, a strengths-based assessment </p><p>that reveals how you're hardwired to solve problems. From reducing risky</p><p> behaviour to resolving conflict and making smarter digital decisions, </p><p>Deb and Blair explain how understanding your natural instincts can </p><p>transform your relationships, your business—and your cybersecurity </p><p>habits.</p><p>Learn How:</p><p>    ✅The Kolbe A. Index differs from personality tests</p><p>    ✅Your instinctive problem-solving style can predict your risk </p><p>tolerance</p><p>    ✅Understanding your "M.O." can improve workplace dynamics and </p><p>digital safety</p><p>    ✅Trusting your gut is more than just a saying—it's science</p><p>Whether you're a business owner, parent, or lifelong learner, this </p><p>conversation is filled with insights that shift perspectives and spark </p><p>meaningful change.</p><p><strong>References</strong>:   </p><p>🧠 Altruistic Coach 📊 https://altruisticcoach.com/</p><p>🏡 Living Skies Lodge 🛏️ https://livingskieslodge.com/</p><p>🐶 Second Family Dog Lodge 🐾 https://secondfamilydoglodge.com/</p><p>Warren Barry Instinctive Solutions <a href="https://studio.youtube.com/channel/UCCRvyDP9c5RuZtbvY04fWig" rel="noopener noreferrer" target="_blank">&nbsp;@warrenbarry4250&nbsp;</a></p><p>This is not a paid endorsement. Guest opinions are their own.</p><br><p>Podcast Host <a href="https://www.youtube.com/@UCNW7n6n7q9GzulfZ8fIW0cg" rel="noopener noreferrer" target="_blank">Tamara Michéle</a></p><p>This is not a paid endorsement. Guest opinions are their own.</p><p><strong>What are my next steps?</strong> </p><p>📖 Start <strong>learning </strong>for <a href="https://learnonlinesecurity.com/start-here" rel="noopener noreferrer" target="_blank">free</a>!</p><p>🔐 Become a <strong>superhero </strong>and <a href="https://learnonlinesecurity.com/heroes/superheroes" rel="noopener noreferrer" target="_blank">support the channel</a>!</p><p>🏢 Learn more about our <a href="https://learnonlinesecurity.com/business-training" rel="noopener noreferrer" target="_blank">business certification courses</a> </p><p><strong>Follow Learn Online Security</strong>:</p><p><a href="https://www.facebook.com/LearnOnlineSec" rel="noopener noreferrer" target="_blank">Facebook</a>, <a href="https://www.instagram.com/learnonlinesecurity" rel="noopener noreferrer" target="_blank">Instagram</a>, <a href="https://www.rumble.com/c/c-7699801" rel="noopener noreferrer" target="_blank">Rumble </a></p><p><a href="https://www.learnonlinesecurity.com" rel="noopener noreferrer" target="_blank">Learn Online Security Website</a></p>]]></content:encoded><link><![CDATA[https://learnonlinesecurity.com/]]></link><guid isPermaLink="false">56ded7f2-11d2-4937-87e3-371d318726ca</guid><itunes:image href="https://artwork.captivate.fm/1285e579-164d-4daa-be01-3591e1763d1e/-vblWYASnAR0UDgG1JPrbFqE.jpg"/><pubDate>Wed, 28 May 2025 13:30:00 -0600</pubDate><enclosure url="https://episodes.captivate.fm/episode/56ded7f2-11d2-4937-87e3-371d318726ca.mp3" length="44884714" type="audio/mpeg"/><itunes:duration>23:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>11</itunes:episode><podcast:episode>11</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/57e3c66e-2a4a-4830-9ad9-f4ee5f406d44/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/57e3c66e-2a4a-4830-9ad9-f4ee5f406d44/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/57e3c66e-2a4a-4830-9ad9-f4ee5f406d44/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-d6f42c85-5e5b-4bb5-a84d-73b375835373.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Altruistic Coach on Leading Secure, Smart Teams"><podcast:source uri="https://youtu.be/VcvhAGI0wr0"/></podcast:alternateEnclosure></item><item><title>Your Adventure Awaits… BUT so do the scammers</title><itunes:title>Your Adventure Awaits… BUT so do the scammers</itunes:title><description><![CDATA[<p><strong>When you're planning the trip of a lifetime, how do you really know if </strong></p><p><strong>that guide is legit?</strong></p><p>In this episode of the Learn Online Security podcast, host Tamara </p><p>Michèle sits down with Melanie MacCarthy—co-owner of North Mountain </p><p>Adventures and president of the Manitoba Lodges and Outfitters </p><p>Association. From luxury cruises to remote cabins, Melanie breaks down </p><p>how to protect yourself from fake listings, online scams, and dishonest </p><p>hosts—before your money’s gone.</p><p><strong>They cover</strong>:</p><p>✔️ Red flags to watch for in travel listings and online bookings</p><p>✔️ How to vet hosts, rentals, tours, and experiences before you pay</p><p>✔️ Why picking up the phone can save your trip</p><p>✔️ How real relationships protect travelers from getting scammed</p><p>✔️ The surprising ways the travel industry is evolving in a digital </p><p>world</p><p>Whether you're planning an international outdoor experience or just </p><p>curious about how cybersecurity intersects with tourism, this episode is</p><p> packed with real talk and practical advice from someone who lives and </p><p>breathes the outdoor adventure lifestyle.</p><p>This is not a paid endorsement. Guest opinions are their own.</p><br><p>Podcast Host <a href="https://www.youtube.com/@UCNW7n6n7q9GzulfZ8fIW0cg" rel="noopener noreferrer" target="_blank">Tamara Michéle</a></p><p>This is not a paid endorsement. Guest opinions are their own.</p><p><strong>What are my next steps?</strong> </p><p>📖 Start <strong>learning </strong>for <a href="https://learnonlinesecurity.com/start-here" rel="noopener noreferrer" target="_blank">free</a>!</p><p>🔐 Become a <strong>superhero </strong>and <a href="https://learnonlinesecurity.com/heroes/superheroes" rel="noopener noreferrer" target="_blank">support the channel</a>!</p><p>🏢 Learn more about our <a href="https://learnonlinesecurity.com/business-training" rel="noopener noreferrer" target="_blank">business certification courses</a> </p><p><strong>Follow Learn Online Security</strong>:</p><p><a href="https://www.facebook.com/LearnOnlineSec" rel="noopener noreferrer" target="_blank">Facebook</a>, <a href="https://www.instagram.com/learnonlinesecurity" rel="noopener noreferrer" target="_blank">Instagram</a>, <a href="https://www.rumble.com/c/c-7699801" rel="noopener noreferrer" target="_blank">Rumble </a></p><p><a href="https://www.learnonlinesecurity.com" rel="noopener noreferrer" target="_blank">Learn Online Security Website</a></p>]]></description><content:encoded><![CDATA[<p><strong>When you're planning the trip of a lifetime, how do you really know if </strong></p><p><strong>that guide is legit?</strong></p><p>In this episode of the Learn Online Security podcast, host Tamara </p><p>Michèle sits down with Melanie MacCarthy—co-owner of North Mountain </p><p>Adventures and president of the Manitoba Lodges and Outfitters </p><p>Association. From luxury cruises to remote cabins, Melanie breaks down </p><p>how to protect yourself from fake listings, online scams, and dishonest </p><p>hosts—before your money’s gone.</p><p><strong>They cover</strong>:</p><p>✔️ Red flags to watch for in travel listings and online bookings</p><p>✔️ How to vet hosts, rentals, tours, and experiences before you pay</p><p>✔️ Why picking up the phone can save your trip</p><p>✔️ How real relationships protect travelers from getting scammed</p><p>✔️ The surprising ways the travel industry is evolving in a digital </p><p>world</p><p>Whether you're planning an international outdoor experience or just </p><p>curious about how cybersecurity intersects with tourism, this episode is</p><p> packed with real talk and practical advice from someone who lives and </p><p>breathes the outdoor adventure lifestyle.</p><p>This is not a paid endorsement. Guest opinions are their own.</p><br><p>Podcast Host <a href="https://www.youtube.com/@UCNW7n6n7q9GzulfZ8fIW0cg" rel="noopener noreferrer" target="_blank">Tamara Michéle</a></p><p>This is not a paid endorsement. Guest opinions are their own.</p><p><strong>What are my next steps?</strong> </p><p>📖 Start <strong>learning </strong>for <a href="https://learnonlinesecurity.com/start-here" rel="noopener noreferrer" target="_blank">free</a>!</p><p>🔐 Become a <strong>superhero </strong>and <a href="https://learnonlinesecurity.com/heroes/superheroes" rel="noopener noreferrer" target="_blank">support the channel</a>!</p><p>🏢 Learn more about our <a href="https://learnonlinesecurity.com/business-training" rel="noopener noreferrer" target="_blank">business certification courses</a> </p><p><strong>Follow Learn Online Security</strong>:</p><p><a href="https://www.facebook.com/LearnOnlineSec" rel="noopener noreferrer" target="_blank">Facebook</a>, <a href="https://www.instagram.com/learnonlinesecurity" rel="noopener noreferrer" target="_blank">Instagram</a>, <a href="https://www.rumble.com/c/c-7699801" rel="noopener noreferrer" target="_blank">Rumble </a></p><p><a href="https://www.learnonlinesecurity.com" rel="noopener noreferrer" target="_blank">Learn Online Security Website</a></p>]]></content:encoded><link><![CDATA[https://learnonlinesecurity.com/]]></link><guid isPermaLink="false">fed94121-a478-4cc6-b1c5-1f43366f7aed</guid><itunes:image href="https://artwork.captivate.fm/1285e579-164d-4daa-be01-3591e1763d1e/-vblWYASnAR0UDgG1JPrbFqE.jpg"/><pubDate>Wed, 14 May 2025 13:30:00 -0600</pubDate><enclosure url="https://episodes.captivate.fm/episode/fed94121-a478-4cc6-b1c5-1f43366f7aed.mp3" length="38036854" type="audio/mpeg"/><itunes:duration>19:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>10</itunes:episode><podcast:episode>10</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/8a3642e5-53cc-4b11-9ebd-41cfdcef1497/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/8a3642e5-53cc-4b11-9ebd-41cfdcef1497/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/8a3642e5-53cc-4b11-9ebd-41cfdcef1497/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-64cadb45-90bc-41b7-b3d9-40a71d5af47c.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Your Adventure Awaits… BUT so do the scammers"><podcast:source uri="https://youtu.be/OlPNulG6t1A"/></podcast:alternateEnclosure></item><item><title>Your Phone at the Border: Rights, Risks, and Essential Tips!</title><itunes:title>Your Phone at the Border: Rights, Risks, and Essential Tips!</itunes:title><description><![CDATA[<p><strong>When you cross a border, do your digital rights come with you?</strong></p><p>In this eye-opening episode of the Learn Online Security </p><p>Podcast, host Tamara Michèle is joined by IT expert and founding member </p><p>Chris Howells to unpack the reality of border security and personal </p><p>privacy when travelling internationally—especially for Canadians heading</p><p> to the U.S. </p><p>💡 Can border agents search your phone?</p><p>🔐 Are you legally required to unlock apps?</p><p>📱 What happens if you refuse?</p><p>🧳 Should you travel with a burner phone or encrypted storage?</p><p>☁️ Is cloud storage really safer?</p><p>This episode dives into the Canadian government travel advisory </p><p>and explains how laws change the moment you leave your home country. </p><p>Whether you're a digital minimalist or a tech-heavy traveller, this is a</p><p> must-watch conversation about privacy, legality, and personal choice in</p><p> the age of border surveillance. </p><p>🎙️ Featuring real insights from a 2021 Homeland Security presentation </p><p>for IT professionals. </p><p>The federal government has updated its online travel advice in 2025 to </p><p>remind Canadians to 'expect scrutiny' from border patrol officers if </p><p>they travel to the United States.</p><p>Podcast Host <a href="https://www.youtube.com/@UCNW7n6n7q9GzulfZ8fIW0cg" rel="noopener noreferrer" target="_blank">Tamara Michéle</a></p><p>This is not a paid endorsement. Guest opinions are their own.</p><p><strong>What are my next steps?</strong> </p><p>📖 Start <strong>learning </strong>for <a href="https://learnonlinesecurity.com/start-here" rel="noopener noreferrer" target="_blank">free</a>!</p><p>🔐 Become a <strong>superhero </strong>and <a href="https://learnonlinesecurity.com/heroes/superheroes" rel="noopener noreferrer" target="_blank">support the channel</a>!</p><p>🏢 Learn more about our <a href="https://learnonlinesecurity.com/business-training" rel="noopener noreferrer" target="_blank">business certification courses</a> </p><p><strong>Follow Learn Online Security</strong>:</p><p><a href="https://www.facebook.com/LearnOnlineSec" rel="noopener noreferrer" target="_blank">Facebook</a>, <a href="https://www.instagram.com/learnonlinesecurity" rel="noopener noreferrer" target="_blank">Instagram</a>, <a href="https://www.rumble.com/c/c-7699801" rel="noopener noreferrer" target="_blank">Rumble </a></p><p><a href="https://www.learnonlinesecurity.com" rel="noopener noreferrer" target="_blank">Learn Online Security Website</a></p><br><p><em class="ql-size-small">Disclaimer: This advice is meant to inform and help you make better decisions about your digital security while crossing borders. However, we cannot be held liable for any consequences, including missed flights, confiscated devices, or any other issues you may encounter while applying these recommendations. Always check local regulations and policies before travelling to ensure full compliance with border control and law enforcement practices.</em></p>]]></description><content:encoded><![CDATA[<p><strong>When you cross a border, do your digital rights come with you?</strong></p><p>In this eye-opening episode of the Learn Online Security </p><p>Podcast, host Tamara Michèle is joined by IT expert and founding member </p><p>Chris Howells to unpack the reality of border security and personal </p><p>privacy when travelling internationally—especially for Canadians heading</p><p> to the U.S. </p><p>💡 Can border agents search your phone?</p><p>🔐 Are you legally required to unlock apps?</p><p>📱 What happens if you refuse?</p><p>🧳 Should you travel with a burner phone or encrypted storage?</p><p>☁️ Is cloud storage really safer?</p><p>This episode dives into the Canadian government travel advisory </p><p>and explains how laws change the moment you leave your home country. </p><p>Whether you're a digital minimalist or a tech-heavy traveller, this is a</p><p> must-watch conversation about privacy, legality, and personal choice in</p><p> the age of border surveillance. </p><p>🎙️ Featuring real insights from a 2021 Homeland Security presentation </p><p>for IT professionals. </p><p>The federal government has updated its online travel advice in 2025 to </p><p>remind Canadians to 'expect scrutiny' from border patrol officers if </p><p>they travel to the United States.</p><p>Podcast Host <a href="https://www.youtube.com/@UCNW7n6n7q9GzulfZ8fIW0cg" rel="noopener noreferrer" target="_blank">Tamara Michéle</a></p><p>This is not a paid endorsement. Guest opinions are their own.</p><p><strong>What are my next steps?</strong> </p><p>📖 Start <strong>learning </strong>for <a href="https://learnonlinesecurity.com/start-here" rel="noopener noreferrer" target="_blank">free</a>!</p><p>🔐 Become a <strong>superhero </strong>and <a href="https://learnonlinesecurity.com/heroes/superheroes" rel="noopener noreferrer" target="_blank">support the channel</a>!</p><p>🏢 Learn more about our <a href="https://learnonlinesecurity.com/business-training" rel="noopener noreferrer" target="_blank">business certification courses</a> </p><p><strong>Follow Learn Online Security</strong>:</p><p><a href="https://www.facebook.com/LearnOnlineSec" rel="noopener noreferrer" target="_blank">Facebook</a>, <a href="https://www.instagram.com/learnonlinesecurity" rel="noopener noreferrer" target="_blank">Instagram</a>, <a href="https://www.rumble.com/c/c-7699801" rel="noopener noreferrer" target="_blank">Rumble </a></p><p><a href="https://www.learnonlinesecurity.com" rel="noopener noreferrer" target="_blank">Learn Online Security Website</a></p><br><p><em class="ql-size-small">Disclaimer: This advice is meant to inform and help you make better decisions about your digital security while crossing borders. However, we cannot be held liable for any consequences, including missed flights, confiscated devices, or any other issues you may encounter while applying these recommendations. Always check local regulations and policies before travelling to ensure full compliance with border control and law enforcement practices.</em></p>]]></content:encoded><link><![CDATA[https://learnonlinesecurity.com/]]></link><guid isPermaLink="false">a33ca50a-c2fa-431c-8378-ad876edcdf01</guid><itunes:image href="https://artwork.captivate.fm/1285e579-164d-4daa-be01-3591e1763d1e/-vblWYASnAR0UDgG1JPrbFqE.jpg"/><pubDate>Wed, 30 Apr 2025 14:15:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/a2029c5d-d749-46db-9db5-185bdd87465e/009-POD-CHRIS-FINAL.mp3" length="36889285" type="audio/mpeg"/><itunes:duration>19:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>9</itunes:episode><podcast:episode>9</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/a44e5744-493d-4aad-92fe-ac461bd24c64/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/a44e5744-493d-4aad-92fe-ac461bd24c64/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/a44e5744-493d-4aad-92fe-ac461bd24c64/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-a2029c5d-d749-46db-9db5-185bdd87465e.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Your Phone at the Border: Rights, Risks, and Essential Tips!"><podcast:source uri="https://youtu.be/kcwkkThUiPM"/></podcast:alternateEnclosure></item><item><title>Your Company’s Downfall Could Start With Its Culture!</title><itunes:title>Your Company’s Downfall Could Start With Its Culture!</itunes:title><description><![CDATA[<p><strong>What happens when a good employee makes a bad click?</strong> 💻💥</p><p>With an emphasis on preventing cyberattacks and ensuring team members feel valued even after a mistake, <strong>LEADERSHIP EXPERTS</strong>, David and Valerie McInnes share insights on how businesses can safeguard themselves in the ever-changing world of technology. From phishing attacks to ransomware, they discuss how businesses can be proactive instead of reactive when it comes to cybersecurity and social engineering awareness training.</p><p> In this episode of the Learn Online Security Podcast, host Tamara Michéle sits down with power couple David and Valerie McInnes—multi-business entrepreneurs and nonprofit leaders—who share their real-world insights on building cyber resilience in remote teams &amp; beyond.</p><p>From 🧭Rare Leadership to 🌸The The Bloom'n Bean café☕, a pet boarding biz called 🐾Barkland in the Parkland🌄, and their animal rescue nonprofit 🐶 Barkland Bridges🏠—David and Valerie McInnes are no strangers to the chaos of managing multiple ventures while staying cyber-safe.</p><p>They dive into how remote staff can unintentionally put businesses at risk, and why compassion, communication, and ongoing training are key to preventing burnout, breaches, and business losses. </p><p>Don't miss this important conversation that could save your business from a cybersecurity disaster such as a data breach. Watch now to learn how you can implement these strategies and keep your team and data safe!</p><p><strong>What are my next steps?</strong> </p><p>📖 Start learning for <a href="https://learnonlinesecurity.com/start-here" rel="noopener noreferrer" target="_blank">free</a>!</p><p>🔐 Become a superhero and <a href="https://learnonlinesecurity.com/heroes/superheroes" rel="noopener noreferrer" target="_blank">support the channel</a>!</p><p>🏢 Learn more about our <a href="https://learnonlinesecurity.com/business-training" rel="noopener noreferrer" target="_blank">business certification courses</a> </p><p><strong>References</strong>:   </p><p>Podcast Host <a href="https://www.youtube.com/@UCNW7n6n7q9GzulfZ8fIW0cg" rel="noopener noreferrer" target="_blank">Tamara Michéle</a></p><p>🧭 <a href="https://rareleadership.ca/" rel="noopener noreferrer" target="_blank">Rare Leadership</a> </p><p>🐶 <a href="https://barklandbridges.pet/" rel="noopener noreferrer" target="_blank">Barkland Bridges</a>🏠 </p><p>🐾<a href="https://barkland.pet/" rel="noopener noreferrer" target="_blank">Barkland in the Parkland</a>🌄 </p><p>🌸<a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbUphLW9INW1tMVJhWW1taXRWN2RDUFVkUktjQXxBQ3Jtc0ttTFZ5dkFxY25hdE82SGF1TWVwRDdrRmpJMUFkejFpSDFxNG5YRGctTXFxcTJDZE1WZ2pRd0dSQnhYVEFTNnNpall4NS1RY3c0MGR6UHdJQWNlcWVFN094WmVBMW41ODhuVHdrei1hSDBPS1FyTFFtVQ&amp;q=https%3A%2F%2Fwww.bloomnbean.com%2F&amp;v=XIAOfeZDo5Q" rel="noopener noreferrer" target="_blank">The Bloom'n Bean</a> ☕ </p><p>✨ <strong>Top 5 Takeaways</strong>:</p><p>    🔑 <u>Human Error Happens</u> – Mistakes in cybersecurity are common, but </p><p>how you respond determines if employees feel safe or shamed.</p><p>    👩‍💻 <u>Remote Work = Unique Risks</u> – Many team members use personal </p><p>devices, which can expose sensitive data if not properly secured.</p><p>    🛠️ <u>Training is Empowering</u> – Equip your staff with tools and </p><p>knowledge so they feel confident, not clueless, about cybersecurity.</p><p>    🚨 <u>Prevention Beats Reaction</u> – Being proactive can save your </p><p>business from irreversible damage. Don’t wait for disaster to strike.</p><p>    🤝 <u>Build a Trust Team</u> – Partnering with experts like Learn Online </p><p>Security ensures you have someone to call before clicking that sketchy </p><p>email.</p><p><strong>Follow Learn Online Security</strong>:</p><p><a href="https://www.facebook.com/LearnOnlineSec" rel="noopener noreferrer" target="_blank">Facebook</a>, <a...]]></description><content:encoded><![CDATA[<p><strong>What happens when a good employee makes a bad click?</strong> 💻💥</p><p>With an emphasis on preventing cyberattacks and ensuring team members feel valued even after a mistake, <strong>LEADERSHIP EXPERTS</strong>, David and Valerie McInnes share insights on how businesses can safeguard themselves in the ever-changing world of technology. From phishing attacks to ransomware, they discuss how businesses can be proactive instead of reactive when it comes to cybersecurity and social engineering awareness training.</p><p> In this episode of the Learn Online Security Podcast, host Tamara Michéle sits down with power couple David and Valerie McInnes—multi-business entrepreneurs and nonprofit leaders—who share their real-world insights on building cyber resilience in remote teams &amp; beyond.</p><p>From 🧭Rare Leadership to 🌸The The Bloom'n Bean café☕, a pet boarding biz called 🐾Barkland in the Parkland🌄, and their animal rescue nonprofit 🐶 Barkland Bridges🏠—David and Valerie McInnes are no strangers to the chaos of managing multiple ventures while staying cyber-safe.</p><p>They dive into how remote staff can unintentionally put businesses at risk, and why compassion, communication, and ongoing training are key to preventing burnout, breaches, and business losses. </p><p>Don't miss this important conversation that could save your business from a cybersecurity disaster such as a data breach. Watch now to learn how you can implement these strategies and keep your team and data safe!</p><p><strong>What are my next steps?</strong> </p><p>📖 Start learning for <a href="https://learnonlinesecurity.com/start-here" rel="noopener noreferrer" target="_blank">free</a>!</p><p>🔐 Become a superhero and <a href="https://learnonlinesecurity.com/heroes/superheroes" rel="noopener noreferrer" target="_blank">support the channel</a>!</p><p>🏢 Learn more about our <a href="https://learnonlinesecurity.com/business-training" rel="noopener noreferrer" target="_blank">business certification courses</a> </p><p><strong>References</strong>:   </p><p>Podcast Host <a href="https://www.youtube.com/@UCNW7n6n7q9GzulfZ8fIW0cg" rel="noopener noreferrer" target="_blank">Tamara Michéle</a></p><p>🧭 <a href="https://rareleadership.ca/" rel="noopener noreferrer" target="_blank">Rare Leadership</a> </p><p>🐶 <a href="https://barklandbridges.pet/" rel="noopener noreferrer" target="_blank">Barkland Bridges</a>🏠 </p><p>🐾<a href="https://barkland.pet/" rel="noopener noreferrer" target="_blank">Barkland in the Parkland</a>🌄 </p><p>🌸<a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbUphLW9INW1tMVJhWW1taXRWN2RDUFVkUktjQXxBQ3Jtc0ttTFZ5dkFxY25hdE82SGF1TWVwRDdrRmpJMUFkejFpSDFxNG5YRGctTXFxcTJDZE1WZ2pRd0dSQnhYVEFTNnNpall4NS1RY3c0MGR6UHdJQWNlcWVFN094WmVBMW41ODhuVHdrei1hSDBPS1FyTFFtVQ&amp;q=https%3A%2F%2Fwww.bloomnbean.com%2F&amp;v=XIAOfeZDo5Q" rel="noopener noreferrer" target="_blank">The Bloom'n Bean</a> ☕ </p><p>✨ <strong>Top 5 Takeaways</strong>:</p><p>    🔑 <u>Human Error Happens</u> – Mistakes in cybersecurity are common, but </p><p>how you respond determines if employees feel safe or shamed.</p><p>    👩‍💻 <u>Remote Work = Unique Risks</u> – Many team members use personal </p><p>devices, which can expose sensitive data if not properly secured.</p><p>    🛠️ <u>Training is Empowering</u> – Equip your staff with tools and </p><p>knowledge so they feel confident, not clueless, about cybersecurity.</p><p>    🚨 <u>Prevention Beats Reaction</u> – Being proactive can save your </p><p>business from irreversible damage. Don’t wait for disaster to strike.</p><p>    🤝 <u>Build a Trust Team</u> – Partnering with experts like Learn Online </p><p>Security ensures you have someone to call before clicking that sketchy </p><p>email.</p><p><strong>Follow Learn Online Security</strong>:</p><p><a href="https://www.facebook.com/LearnOnlineSec" rel="noopener noreferrer" target="_blank">Facebook</a>, <a href="https://www.instagram.com/learnonlinesecurity" rel="noopener noreferrer" target="_blank">Instagram</a>, </p><p><a href="https://www.learnonlinesecurity.com" rel="noopener noreferrer" target="_blank">Learn Online Security Website</a></p><p>🔁 Whether you’re a small business owner, entrepreneur, or nonprofit leader, this episode will help you rethink your approach to digital safety—with empathy at its core.</p><p>This is not a paid endorsement. Guest opinions are their own.</p>]]></content:encoded><link><![CDATA[https://learnonlinesecurity.com/]]></link><guid isPermaLink="false">339caf2e-08be-4903-9a22-2852ed734db0</guid><itunes:image href="https://artwork.captivate.fm/1285e579-164d-4daa-be01-3591e1763d1e/-vblWYASnAR0UDgG1JPrbFqE.jpg"/><pubDate>Wed, 16 Apr 2025 14:04:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/1e9f17f2-0133-46a2-85af-76f24802aa80/008-POD-David-and-Valarie-FINAL.mp3" length="27663018" type="audio/mpeg"/><itunes:duration>19:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>8</itunes:episode><podcast:episode>8</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/44f3654a-02ea-4ad0-9361-df7414d68016/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/44f3654a-02ea-4ad0-9361-df7414d68016/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/44f3654a-02ea-4ad0-9361-df7414d68016/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-1e9f17f2-0133-46a2-85af-76f24802aa80.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Your Company’s Downfall Could Start With Its Culture!"><podcast:source uri="https://youtu.be/XIAOfeZDo5Q"/></podcast:alternateEnclosure></item><item><title>One Thread Can Unravel Your Digital Footprint—Ask an Expert for Help</title><itunes:title>One Thread Can Unravel Your Digital Footprint—Ask an Expert for Help</itunes:title><description><![CDATA[<p>Are you aware of the trail of breadcrumbs you're leaving behind? From </p><p>social media profiles to online search history, every click, like, and </p><p>share contributes to your digital footprint. Print media can even be </p><p>used to build a profile about you, your family or your company.  <strong>These </strong></p><p><strong>loose threads can unravel more about you than you’d like.</strong></p><p>In this episode of the <strong><em>Learn Online Security Podcast</em></strong>, Chris Howells and </p><p>Tamara Michèle explain how to check your digital footprint and clean up </p><p>sensitive information. Learn why a professional digital footprint check,</p><p> <strong><u>done by real people</u></strong>, is essential for protecting your privacy.</p><p>How can I check my digital footprint? Want to know how to uncover what </p><p>people can find about you online? Can someone track your digital </p><p>footprint? Can digital footprint be deleted?</p><p>Are you curious about how to clean up your digital footprint? </p><p>Our <a href="https://learnonlinesecurity.com/training/digital-footprint" rel="noopener noreferrer" target="_blank">digital footprint product</a> is a professional service done by real </p><p>experts who analyze and help you secure your online presence.🔍 </p><p>In the member-only portion, we cover how Social engineering isn’t just a</p><p> digital threat—OLD SCHOOL tactics like planning, deception, and </p><p>exploiting trust are STILL used today.   Continue watching subscriber </p><p>only content in our Heroes membership area - Jailbreaks &amp; Heists: </p><p>The Blueprint Behind Modern Cyber Attacks! </p><p>https://www.learnonlinesecurity.com/membership</p><p>References:   </p><p><br></p><p>https://www.youtube.com/@tamaramichele1884</p><p><br></p><p><br></p><p>What are my next steps? </p><p>📖 Start learning for free at https://learnonlinesecurity.com/start-here</p><p>🔐 Become a member and support the channel </p><p>https://learnonlinesecurity.com/membership</p><p>🏢 Learn more about our business certification courses </p><p>https://learnonlinesecurity.com/business-training</p><p><br></p><p>Follow Learn Online Security </p><p>Facebook: https://www.facebook.com/LearnOnlineSec</p><p>Instagram: https://www.instagram.com/learnonlinesecurity</p><p>Website: https://www.learnonlinesecurity.com</p><p><br></p><p>📌 5 Key Points from the Video:</p><p>1. Social Engineering Goes Beyond Online Threats – Scammers use small </p><p>details from your life, both online and offline, to manipulate and </p><p>exploit you.</p><p>2. Checking Your Digital Footprint is Critical – Regularly reviewing </p><p>what information is available about you online helps prevent misuse and </p><p>identity theft.</p><p>3. Details Shared on Social Media Create Vulnerabilities – Posting </p><p>names, locations, or family information can create a trail that </p><p>predators follow to target you.</p><p>4. Professional Digital Footprint Checks Offer Better Security – Our </p><p>service uses real experts to analyze and clean up your online presence, </p><p>ensuring your information is secure.</p><p>5. False Sense of Security at Home – Even when you think you're safe on </p><p>your couch, using your phone or computer exposes personal information </p><p>that can be exploited by criminals.</p><p><br></p><p>#SocialEngineering #DigitalFootprint #CleanUpOnline</p>]]></description><content:encoded><![CDATA[<p>Are you aware of the trail of breadcrumbs you're leaving behind? From </p><p>social media profiles to online search history, every click, like, and </p><p>share contributes to your digital footprint. Print media can even be </p><p>used to build a profile about you, your family or your company.  <strong>These </strong></p><p><strong>loose threads can unravel more about you than you’d like.</strong></p><p>In this episode of the <strong><em>Learn Online Security Podcast</em></strong>, Chris Howells and </p><p>Tamara Michèle explain how to check your digital footprint and clean up </p><p>sensitive information. Learn why a professional digital footprint check,</p><p> <strong><u>done by real people</u></strong>, is essential for protecting your privacy.</p><p>How can I check my digital footprint? Want to know how to uncover what </p><p>people can find about you online? Can someone track your digital </p><p>footprint? Can digital footprint be deleted?</p><p>Are you curious about how to clean up your digital footprint? </p><p>Our <a href="https://learnonlinesecurity.com/training/digital-footprint" rel="noopener noreferrer" target="_blank">digital footprint product</a> is a professional service done by real </p><p>experts who analyze and help you secure your online presence.🔍 </p><p>In the member-only portion, we cover how Social engineering isn’t just a</p><p> digital threat—OLD SCHOOL tactics like planning, deception, and </p><p>exploiting trust are STILL used today.   Continue watching subscriber </p><p>only content in our Heroes membership area - Jailbreaks &amp; Heists: </p><p>The Blueprint Behind Modern Cyber Attacks! </p><p>https://www.learnonlinesecurity.com/membership</p><p>References:   </p><p><br></p><p>https://www.youtube.com/@tamaramichele1884</p><p><br></p><p><br></p><p>What are my next steps? </p><p>📖 Start learning for free at https://learnonlinesecurity.com/start-here</p><p>🔐 Become a member and support the channel </p><p>https://learnonlinesecurity.com/membership</p><p>🏢 Learn more about our business certification courses </p><p>https://learnonlinesecurity.com/business-training</p><p><br></p><p>Follow Learn Online Security </p><p>Facebook: https://www.facebook.com/LearnOnlineSec</p><p>Instagram: https://www.instagram.com/learnonlinesecurity</p><p>Website: https://www.learnonlinesecurity.com</p><p><br></p><p>📌 5 Key Points from the Video:</p><p>1. Social Engineering Goes Beyond Online Threats – Scammers use small </p><p>details from your life, both online and offline, to manipulate and </p><p>exploit you.</p><p>2. Checking Your Digital Footprint is Critical – Regularly reviewing </p><p>what information is available about you online helps prevent misuse and </p><p>identity theft.</p><p>3. Details Shared on Social Media Create Vulnerabilities – Posting </p><p>names, locations, or family information can create a trail that </p><p>predators follow to target you.</p><p>4. Professional Digital Footprint Checks Offer Better Security – Our </p><p>service uses real experts to analyze and clean up your online presence, </p><p>ensuring your information is secure.</p><p>5. False Sense of Security at Home – Even when you think you're safe on </p><p>your couch, using your phone or computer exposes personal information </p><p>that can be exploited by criminals.</p><p><br></p><p>#SocialEngineering #DigitalFootprint #CleanUpOnline</p>]]></content:encoded><link><![CDATA[https://learnonlinesecurity.com/]]></link><guid isPermaLink="false">31a04b90-c1c5-498c-91d5-8361e8f81777</guid><itunes:image href="https://artwork.captivate.fm/1285e579-164d-4daa-be01-3591e1763d1e/-vblWYASnAR0UDgG1JPrbFqE.jpg"/><pubDate>Wed, 02 Apr 2025 13:30:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/43553b9c-fe5c-4516-af1b-c44a8db063d0/007-POD-REVISION-FINAL-FIX.mp3" length="26677678" type="audio/mpeg"/><itunes:duration>18:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>7</itunes:episode><podcast:episode>7</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="One Thread Can Unravel Your Digital Footprint—Ask an Expert for Help"><podcast:source uri="https://youtu.be/BZ8iOMRAmoY"/></podcast:alternateEnclosure></item><item><title>Enchanted by Lies | True Stories of How Scams Can Lead to Exploitation</title><itunes:title>Enchanted by Lies | True Stories of How Scams Can Lead to Exploitation</itunes:title><description><![CDATA[<p>Sarah Howells shares <strong>EYE-OPENING TRUE STORIES</strong> that reveal how misplaced trust can lead to danger and why recognizing the warning signs of grooming is vital to protecting our loved ones. We discuss online safety tips and the value of staying aware even in our physical communities.  </p><p>In this episode of Learn Online Security Podcast we learn why it’s so important to go with your gut. Join us as Sarah Howells and Tamara Michèle talk about the importance of street smarts and making smart decisions—both online and offline. </p><p>In the member-only portion, we’ll explore how predators gain trust and practical steps you can take to safeguard yourself and your family. Continue watching subscriber only content in our <a href="https://www.learnonlinesecurity.com/membership" rel="noopener noreferrer" target="_blank">Heroes</a> portion of the show. </p><p>The Sound of Freedom 🎥 <a href="https://amzn.to/4ks1wZj" rel="noopener noreferrer" target="_blank">https://amzn.to/4ks1wZj</a></p><p><strong>What are my next steps? </strong></p><p>📖 Start learning for free at <a href="https://learnonlinesecurity.com/start-here" rel="noopener noreferrer" target="_blank">https://learnonlinesecurity.com/start-here</a></p><p>🏢 Learn more about our business certification courses </p><p><a href="https://learnonlinesecurity.com/business-training" rel="noopener noreferrer" target="_blank">https://learnonlinesecurity.com/business-training</a></p><p><strong>Follow Learn Online Security </strong></p><p>Facebook: <a href="https://www.facebook.com/LearnOnlineSec" rel="noopener noreferrer" target="_blank">https://www.facebook.com/LearnOnlineSec</a></p><p>Instagram: <a href="https://www.instagram.com/learnonlinesecurity" rel="noopener noreferrer" target="_blank">https://www.instagram.com/learnonlinesecurity</a></p><p>Website: <a href="https://www.learnonlinesecurity.com" rel="noopener noreferrer" target="_blank">https://www.learnonlinesecurity.com</a></p><p><strong>Key Points</strong> </p><p> 📌 Warning signs you or someone you love is being groomed and be oblivious</p><p>📌 True stories of how scams lead to exploitation, smuggling and human trafficking</p><p>📌 We discuss online safety tips and online predators</p><p>*Disclaimer: This video or video description contains affiliate links. </p><p>That means that I am awarded a small commission for purchases made </p><p>through them, at no added cost for you.</p>]]></description><content:encoded><![CDATA[<p>Sarah Howells shares <strong>EYE-OPENING TRUE STORIES</strong> that reveal how misplaced trust can lead to danger and why recognizing the warning signs of grooming is vital to protecting our loved ones. We discuss online safety tips and the value of staying aware even in our physical communities.  </p><p>In this episode of Learn Online Security Podcast we learn why it’s so important to go with your gut. Join us as Sarah Howells and Tamara Michèle talk about the importance of street smarts and making smart decisions—both online and offline. </p><p>In the member-only portion, we’ll explore how predators gain trust and practical steps you can take to safeguard yourself and your family. Continue watching subscriber only content in our <a href="https://www.learnonlinesecurity.com/membership" rel="noopener noreferrer" target="_blank">Heroes</a> portion of the show. </p><p>The Sound of Freedom 🎥 <a href="https://amzn.to/4ks1wZj" rel="noopener noreferrer" target="_blank">https://amzn.to/4ks1wZj</a></p><p><strong>What are my next steps? </strong></p><p>📖 Start learning for free at <a href="https://learnonlinesecurity.com/start-here" rel="noopener noreferrer" target="_blank">https://learnonlinesecurity.com/start-here</a></p><p>🏢 Learn more about our business certification courses </p><p><a href="https://learnonlinesecurity.com/business-training" rel="noopener noreferrer" target="_blank">https://learnonlinesecurity.com/business-training</a></p><p><strong>Follow Learn Online Security </strong></p><p>Facebook: <a href="https://www.facebook.com/LearnOnlineSec" rel="noopener noreferrer" target="_blank">https://www.facebook.com/LearnOnlineSec</a></p><p>Instagram: <a href="https://www.instagram.com/learnonlinesecurity" rel="noopener noreferrer" target="_blank">https://www.instagram.com/learnonlinesecurity</a></p><p>Website: <a href="https://www.learnonlinesecurity.com" rel="noopener noreferrer" target="_blank">https://www.learnonlinesecurity.com</a></p><p><strong>Key Points</strong> </p><p> 📌 Warning signs you or someone you love is being groomed and be oblivious</p><p>📌 True stories of how scams lead to exploitation, smuggling and human trafficking</p><p>📌 We discuss online safety tips and online predators</p><p>*Disclaimer: This video or video description contains affiliate links. </p><p>That means that I am awarded a small commission for purchases made </p><p>through them, at no added cost for you.</p>]]></content:encoded><link><![CDATA[https://learnonlinesecurity.com/]]></link><guid isPermaLink="false">4e41fc06-443d-4978-b7d0-b699fac2ad29</guid><itunes:image href="https://artwork.captivate.fm/1285e579-164d-4daa-be01-3591e1763d1e/-vblWYASnAR0UDgG1JPrbFqE.jpg"/><pubDate>Wed, 19 Mar 2025 13:30:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/1717d772-188f-4286-81e1-eadb0c839f27/006-POD-SARAH-FINAL.mp3" length="12331392" type="audio/mpeg"/><itunes:duration>06:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>6</itunes:episode><podcast:episode>6</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Enchanted by Lies | True Stories of How Scams Can Lead to Exploitation"><podcast:source uri="https://youtu.be/9K7Rl0JEaU4"/></podcast:alternateEnclosure></item><item><title>Integrity | Influence vrs. Ego</title><itunes:title>Integrity | Influence vrs. Ego</itunes:title><description><![CDATA[<p>In this Learn Online Security Podcast, we’re diving deep into the </p><p>connection between influence and integrity with Bill Pipke, deep-thinker</p><p> and author of <em>Integrity: The Best Foundation</em>. <strong>We explore how true </strong></p><p><strong>influence isn’t just about charisma or followers—it’s about character.</strong> </p><p>Bill shares his experiences, offering practical advice on how integrity </p><p>can serve as the foundation for success in any endeavour. From </p><p>leadership to trust, learn how to build a culture of integrity that will</p><p> transform your personal and professional life. Are we building </p><p>trustworthy influence or just chasing clout? Let’s talk about it.</p><p>🌟 Key Takeaways:</p><p>✔️ The hidden dangers of influence without integrity</p><p>✔️ How to spot authentic leaders vs. self-serving influencers</p><p>✔️ Why moral influence is the highest form of leadership</p><p>Continue watching subscriber only content in our <a href="https://www.learnonlinesecurity.com/membership" rel="noopener noreferrer" target="_blank">Heroes membership area</a> </p><p> </p><p>🔗 Watch Bill's previous interview: https://youtu.be/1VWUEIfNjaw</p><p>🎓 Enrol in Bill Pipke’s online course, <em>Integrity: The Best Foundation</em>: </p><p>https://www.learnonlinesecurity.com/store</p><p> </p><p>📖 Get your copy of Bill Pipke's book, <em>Integrity: The Best Foundation</em>: </p><p>https://cli.international/resources/book </p><p>References: https://www.youtube.com/@tamaramichele1884</p><p><br></p><p>What are my next steps? </p><p>📖 Start learning for free at https://learnonlinesecurity.com/start-here</p><p>🔐 Become a member and support the channel https://learnonlinesecurity.com/membership</p><p>🏢 Learn more about our business certification courses https://learnonlinesecurity.com/business-training</p><p><br></p><p>*Follow Learn Online Security:* </p><p>Facebook: https://www.facebook.com/LearnOnlineSec</p><p>Instagram: https://www.instagram.com/learnonlinesecurity</p><p>Website: https://www.learnonlinesecurity.com</p>]]></description><content:encoded><![CDATA[<p>In this Learn Online Security Podcast, we’re diving deep into the </p><p>connection between influence and integrity with Bill Pipke, deep-thinker</p><p> and author of <em>Integrity: The Best Foundation</em>. <strong>We explore how true </strong></p><p><strong>influence isn’t just about charisma or followers—it’s about character.</strong> </p><p>Bill shares his experiences, offering practical advice on how integrity </p><p>can serve as the foundation for success in any endeavour. From </p><p>leadership to trust, learn how to build a culture of integrity that will</p><p> transform your personal and professional life. Are we building </p><p>trustworthy influence or just chasing clout? Let’s talk about it.</p><p>🌟 Key Takeaways:</p><p>✔️ The hidden dangers of influence without integrity</p><p>✔️ How to spot authentic leaders vs. self-serving influencers</p><p>✔️ Why moral influence is the highest form of leadership</p><p>Continue watching subscriber only content in our <a href="https://www.learnonlinesecurity.com/membership" rel="noopener noreferrer" target="_blank">Heroes membership area</a> </p><p> </p><p>🔗 Watch Bill's previous interview: https://youtu.be/1VWUEIfNjaw</p><p>🎓 Enrol in Bill Pipke’s online course, <em>Integrity: The Best Foundation</em>: </p><p>https://www.learnonlinesecurity.com/store</p><p> </p><p>📖 Get your copy of Bill Pipke's book, <em>Integrity: The Best Foundation</em>: </p><p>https://cli.international/resources/book </p><p>References: https://www.youtube.com/@tamaramichele1884</p><p><br></p><p>What are my next steps? </p><p>📖 Start learning for free at https://learnonlinesecurity.com/start-here</p><p>🔐 Become a member and support the channel https://learnonlinesecurity.com/membership</p><p>🏢 Learn more about our business certification courses https://learnonlinesecurity.com/business-training</p><p><br></p><p>*Follow Learn Online Security:* </p><p>Facebook: https://www.facebook.com/LearnOnlineSec</p><p>Instagram: https://www.instagram.com/learnonlinesecurity</p><p>Website: https://www.learnonlinesecurity.com</p>]]></content:encoded><link><![CDATA[https://learnonlinesecurity.com/]]></link><guid isPermaLink="false">3c396799-1d12-4140-86d5-6a0d0b6b93da</guid><itunes:image href="https://artwork.captivate.fm/1285e579-164d-4daa-be01-3591e1763d1e/-vblWYASnAR0UDgG1JPrbFqE.jpg"/><pubDate>Fri, 07 Mar 2025 14:45:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/6aeaa2f5-90eb-4c59-9714-eebb1b186545/005-POD-BILL.mp3" length="28124727" type="audio/mpeg"/><itunes:duration>14:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>5</itunes:episode><podcast:episode>5</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Integrity | Influence vrs. Ego"><podcast:source uri="https://youtu.be/SDhNKrzyHHI"/></podcast:alternateEnclosure></item><item><title>Integrity: The Key to Business and Life and Security</title><itunes:title>Integrity: The Key to Business and Life and Security</itunes:title><description><![CDATA[<p><strong>Integrity isn't just a value—it’s the cornerstone of success in every aspect of life!</strong></p><p>In this episode, <strong>we explore the powerful role integrity plays in </strong></p><p><strong>business, relationships, and life</strong>. Join us for an insightful </p><p>conversation with author and integrity expert Bill Pipke on the Learn </p><p>Online Security Podcast. Bill shares his experiences, offering practical</p><p> advice on how integrity can serve as the foundation for success in any </p><p>endeavor. From leadership to trust, learn how to build a culture of </p><p>integrity that will transform your personal and professional life. </p><p>Continue watching subscriber only content in our <a href="https://www.learnonlinesecurity.com/membership" rel="noopener noreferrer" target="_blank">Heroes membership</a> area!</p><p><strong>Want to dive deeper into the six pillars of integrity?</strong> </p><p>Head to our <a href="https://www.learnonlinesecurity.com/store" rel="noopener noreferrer" target="_blank">website </a>where you'll find </p><p>Bill Pipke’s <strong>online course</strong>: <em>Integrity the Best Foundation</em>.  </p><p>OR</p><p>Pick up a copy of Bill Pipke’s <strong>book</strong>, <em>Integrity: The Best Foundation</em>, </p><p>and start your journey toward building trust and lasting success today. </p><p>https://cli.international/resources/book </p><p>References:   https://www.youtube.com/@tamaramichele1884</p><p>*What are my next steps?* </p><p>📖 Start learning for free at https://learnonlinesecurity.com/start-here</p><p>🔐 Become a member and support the channel https://learnonlinesecurity.com/membership</p><p>🏢 Learn more about our business certification courses https://learnonlinesecurity.com/business-training</p><p><br></p><p>*Follow Learn Online Security:* </p><p>Facebook: https://www.facebook.com/LearnOnlineSec</p><p>Instagram: https://www.instagram.com/learnonlinesecurity</p><p>Website: https://www.learnonlinesecurity.com</p><p><br></p><p>#IntegrityInBusiness #TrustAndSuccess #IntegrityMatters</p>]]></description><content:encoded><![CDATA[<p><strong>Integrity isn't just a value—it’s the cornerstone of success in every aspect of life!</strong></p><p>In this episode, <strong>we explore the powerful role integrity plays in </strong></p><p><strong>business, relationships, and life</strong>. Join us for an insightful </p><p>conversation with author and integrity expert Bill Pipke on the Learn </p><p>Online Security Podcast. Bill shares his experiences, offering practical</p><p> advice on how integrity can serve as the foundation for success in any </p><p>endeavor. From leadership to trust, learn how to build a culture of </p><p>integrity that will transform your personal and professional life. </p><p>Continue watching subscriber only content in our <a href="https://www.learnonlinesecurity.com/membership" rel="noopener noreferrer" target="_blank">Heroes membership</a> area!</p><p><strong>Want to dive deeper into the six pillars of integrity?</strong> </p><p>Head to our <a href="https://www.learnonlinesecurity.com/store" rel="noopener noreferrer" target="_blank">website </a>where you'll find </p><p>Bill Pipke’s <strong>online course</strong>: <em>Integrity the Best Foundation</em>.  </p><p>OR</p><p>Pick up a copy of Bill Pipke’s <strong>book</strong>, <em>Integrity: The Best Foundation</em>, </p><p>and start your journey toward building trust and lasting success today. </p><p>https://cli.international/resources/book </p><p>References:   https://www.youtube.com/@tamaramichele1884</p><p>*What are my next steps?* </p><p>📖 Start learning for free at https://learnonlinesecurity.com/start-here</p><p>🔐 Become a member and support the channel https://learnonlinesecurity.com/membership</p><p>🏢 Learn more about our business certification courses https://learnonlinesecurity.com/business-training</p><p><br></p><p>*Follow Learn Online Security:* </p><p>Facebook: https://www.facebook.com/LearnOnlineSec</p><p>Instagram: https://www.instagram.com/learnonlinesecurity</p><p>Website: https://www.learnonlinesecurity.com</p><p><br></p><p>#IntegrityInBusiness #TrustAndSuccess #IntegrityMatters</p>]]></content:encoded><link><![CDATA[https://youtu.be/1VWUEIfNjaw]]></link><guid isPermaLink="false">29ecd68f-69e3-4e17-a55e-4dcc591bdb8e</guid><itunes:image href="https://artwork.captivate.fm/1285e579-164d-4daa-be01-3591e1763d1e/-vblWYASnAR0UDgG1JPrbFqE.jpg"/><pubDate>Thu, 20 Feb 2025 10:00:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/7708d6d6-8403-426d-b6f9-2f73fff91de0/004-POD-BILL-FINAL.mp3" length="39326652" type="audio/mpeg"/><itunes:duration>20:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>4</itunes:episode><podcast:episode>4</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Integrity: The Key to Business and Life and Security"><podcast:source uri="https://youtu.be/1VWUEIfNjaw"/></podcast:alternateEnclosure></item><item><title>Why Parental Controls Aren’t Enough Anymore</title><itunes:title>Why Parental Controls Aren’t Enough Anymore</itunes:title><description><![CDATA[<p>If you're a <u>parent</u>, <strong>ANXIOUS </strong>about online threats, this video is a </p><p>must-watch for valuable advice!</p><p>In this podcast, we focus on keeping kids safe online. We discuss the </p><p>risks they face in gaming apps, where they might unknowingly interact </p><p>with strangers, and offer simple tips for parents to protect them. From </p><p>setting up parental controls to monitoring screen time and teaching kids</p><p> about the dangers of sharing personal information, we cover the steps </p><p>you can take to ensure your child's safety in today's world. </p><p>Join us on the Learn Online Security Podcast as Sarah and Tamara </p><p>Michèle share essential tips to keep both kids and seniors safe online. They </p><p>discuss the growing threat of human trafficking, how to protect kids in </p><p>the digital world, and the need for setting up parental controls. Plus, </p><p>learn how to guard seniors against scams and online fraud. This episode </p><p>is packed with practical advice to help you safeguard your family </p><p>online!</p><p>Continue listening to subscriber only content in our Heroes membership area - https://www.learnonlinesecurity.com/membership</p>]]></description><content:encoded><![CDATA[<p>If you're a <u>parent</u>, <strong>ANXIOUS </strong>about online threats, this video is a </p><p>must-watch for valuable advice!</p><p>In this podcast, we focus on keeping kids safe online. We discuss the </p><p>risks they face in gaming apps, where they might unknowingly interact </p><p>with strangers, and offer simple tips for parents to protect them. From </p><p>setting up parental controls to monitoring screen time and teaching kids</p><p> about the dangers of sharing personal information, we cover the steps </p><p>you can take to ensure your child's safety in today's world. </p><p>Join us on the Learn Online Security Podcast as Sarah and Tamara </p><p>Michèle share essential tips to keep both kids and seniors safe online. They </p><p>discuss the growing threat of human trafficking, how to protect kids in </p><p>the digital world, and the need for setting up parental controls. Plus, </p><p>learn how to guard seniors against scams and online fraud. This episode </p><p>is packed with practical advice to help you safeguard your family </p><p>online!</p><p>Continue listening to subscriber only content in our Heroes membership area - https://www.learnonlinesecurity.com/membership</p>]]></content:encoded><link><![CDATA[https://learnonlinesecurity.com/]]></link><guid isPermaLink="false">9bd6ca73-1880-41f9-a626-68dd311ed232</guid><itunes:image href="https://artwork.captivate.fm/1285e579-164d-4daa-be01-3591e1763d1e/-vblWYASnAR0UDgG1JPrbFqE.jpg"/><pubDate>Wed, 05 Feb 2025 10:00:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/192d844b-e6c6-426d-8601-9112de8f155b/003-POD-SARAH-FINAL-AUDIO.mp3" length="34018214" type="audio/mpeg"/><itunes:duration>17:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>3</itunes:episode><podcast:episode>3</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/e734b45b-3b90-41c1-961d-615874b4aeab/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/e734b45b-3b90-41c1-961d-615874b4aeab/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/e734b45b-3b90-41c1-961d-615874b4aeab/index.html" type="text/html"/><podcast:alternateEnclosure type="video/youtube" title="How Safe Are Our Kids Online?"><podcast:source uri="https://youtu.be/AzTH4CA5GSA"/></podcast:alternateEnclosure></item><item><title>The Human Factor: How Social Engineering Threatens Our Digital Lives</title><itunes:title>The Human Factor: How Social Engineering Threatens Our Digital Lives</itunes:title><description><![CDATA[<p>Don't make yourself a target! In this episode, we discuss the EYE-OPENING realities of social engineering in cyber attacks and internet fraud. </p><p>Chris Howells shares how a data breach at a former employer led to his identity theft, motivating him to help others protect themselves. He explains that most cyber attacks are organized and often involve individuals with prior connections to their victims, with social engineering playing a key role.</p><p>Join us at the Learn Online Security Podcast as Chris and podcast host, Tamara Michèle explore the biggest cybersecurity threats today and how Learn Online Security is helping individuals and companies stay safe from cyber threats. This is more than business—it’s about making the community stronger and safer.</p><p>Continue watching subscriber only content in our Heroes membership area - https://www.learnonlinesecurity.com/membership</p>]]></description><content:encoded><![CDATA[<p>Don't make yourself a target! In this episode, we discuss the EYE-OPENING realities of social engineering in cyber attacks and internet fraud. </p><p>Chris Howells shares how a data breach at a former employer led to his identity theft, motivating him to help others protect themselves. He explains that most cyber attacks are organized and often involve individuals with prior connections to their victims, with social engineering playing a key role.</p><p>Join us at the Learn Online Security Podcast as Chris and podcast host, Tamara Michèle explore the biggest cybersecurity threats today and how Learn Online Security is helping individuals and companies stay safe from cyber threats. This is more than business—it’s about making the community stronger and safer.</p><p>Continue watching subscriber only content in our Heroes membership area - https://www.learnonlinesecurity.com/membership</p>]]></content:encoded><link><![CDATA[https://www.learnonlinesecurity.com/blog/the-human-factor-how-social-engineering-threatens-our-digital-lives]]></link><guid isPermaLink="false">46f70f7c-bf83-4f12-8e3b-683e343b8b0f</guid><itunes:image href="https://artwork.captivate.fm/1285e579-164d-4daa-be01-3591e1763d1e/-vblWYASnAR0UDgG1JPrbFqE.jpg"/><pubDate>Wed, 22 Jan 2025 13:00:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/175a5105-0e9f-4833-b05c-f87f41d9d6aa/002-POD-CHRIS-FINAL-AUDIO.mp3" length="34024723" type="audio/mpeg"/><itunes:duration>17:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>2</itunes:episode><podcast:episode>2</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="The Human Factor: How Social Engineering Threatens Our Digital Lives"><podcast:source uri="https://youtu.be/Sl9arU6Ioa4"/></podcast:alternateEnclosure></item><item><title>The SHOCKING Truth About Cyber Security in 2025</title><itunes:title>The SHOCKING Truth About Cyber Security in 2025</itunes:title><description><![CDATA[<p>Sometimes we live in a fairytale. We need to discuss the SHOCKING truth about cyber security in 2025 and how social engineering will play a part. </p><p>In this Learn Online Security Podcast episode, we'll answer the following questions: What is the biggest threat to cybersecurity today? We'll empower people with knowledge and real-life facts about how social engineering works so they can identify red flags. We also introduce our new podcast host, Tamara Michéle, learn how Learn Online Security is helping companies, and a little about why we do what we do. </p><p>Continue listening to subscriber only content in our Heroes membership area - https://www.learnonlinesecurity.com/membership</p>]]></description><content:encoded><![CDATA[<p>Sometimes we live in a fairytale. We need to discuss the SHOCKING truth about cyber security in 2025 and how social engineering will play a part. </p><p>In this Learn Online Security Podcast episode, we'll answer the following questions: What is the biggest threat to cybersecurity today? We'll empower people with knowledge and real-life facts about how social engineering works so they can identify red flags. We also introduce our new podcast host, Tamara Michéle, learn how Learn Online Security is helping companies, and a little about why we do what we do. </p><p>Continue listening to subscriber only content in our Heroes membership area - https://www.learnonlinesecurity.com/membership</p>]]></content:encoded><link><![CDATA[https://learnonlinesecurity.com/]]></link><guid isPermaLink="false">fbc75e60-2d26-4806-9894-2f92daf42bb8</guid><itunes:image href="https://artwork.captivate.fm/1285e579-164d-4daa-be01-3591e1763d1e/-vblWYASnAR0UDgG1JPrbFqE.jpg"/><pubDate>Wed, 08 Jan 2025 09:30:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/8e6e08a0-221e-41bc-aa32-e2cedadd2996/001-PODCAST-RICHARD-FINAL.mp3" length="31036301" type="audio/mpeg"/><itunes:duration>15:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>1</itunes:episode><podcast:episode>1</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="The SHOCKING Truth About Cyber Security in 2025"><podcast:source uri="https://youtu.be/JymERh-WqEc"/></podcast:alternateEnclosure></item></channel></rss>