<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/the-safety-plan/" rel="self" type="application/rss+xml"/><title><![CDATA[The Safety Plan]]></title><podcast:guid>58d87aa9-092e-58ec-a299-899c03ae5bbe</podcast:guid><lastBuildDate>Tue, 31 Mar 2026 18:28:08 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[Copyright 2026 LCC Connect]]></copyright><managingEditor>LCC Connect</managingEditor><itunes:summary><![CDATA[An inside look at the ways we keep people safe on LCC's campuses, virtually and in-person, and what "security" and "privacy" mean today.]]></itunes:summary><image><url>https://artwork.captivate.fm/c4428387-a3af-4e95-a061-4c238fe7f63d/OGb4WWOlwo1wfjq_DpG4xzi2.png</url><title>The Safety Plan</title><link><![CDATA[https://the-safety-plan.captivate.fm]]></link></image><itunes:image href="https://artwork.captivate.fm/c4428387-a3af-4e95-a061-4c238fe7f63d/OGb4WWOlwo1wfjq_DpG4xzi2.png"/><itunes:owner><itunes:name>LCC Connect</itunes:name></itunes:owner><itunes:author>LCC Connect</itunes:author><description>An inside look at the ways we keep people safe on LCC&apos;s campuses, virtually and in-person, and what &quot;security&quot; and &quot;privacy&quot; mean today.</description><link>https://the-safety-plan.captivate.fm</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:explicit>false</itunes:explicit><itunes:type>episodic</itunes:type><itunes:category text="Education"></itunes:category><itunes:category text="Education"><itunes:category text="Self-Improvement"/></itunes:category><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><item><title>How to Read a Uniform Resource Locator (URL), Otherwise Known as a Web Site Address</title><itunes:title>How to Read a Uniform Resource Locator (URL), Otherwise Known as a Web Site Address</itunes:title><description><![CDATA[<p>LCC Connect host and Director of Information Security, Paul Schwartz describes how to identify a legitimate web site address by dissecting the URL (Uniform Resource Locator) for the root domain name.</p><p><a href="https://www.lcc.edu/academics/areas-of-study/computers-engineering-technology/cit.html" rel="noopener noreferrer" target="_blank">Website: LCC Computer Information Technologies</a></p>]]></description><content:encoded><![CDATA[<p>LCC Connect host and Director of Information Security, Paul Schwartz describes how to identify a legitimate web site address by dissecting the URL (Uniform Resource Locator) for the root domain name.</p><p><a href="https://www.lcc.edu/academics/areas-of-study/computers-engineering-technology/cit.html" rel="noopener noreferrer" target="_blank">Website: LCC Computer Information Technologies</a></p>]]></content:encoded><link><![CDATA[https://the-safety-plan.captivate.fm]]></link><guid isPermaLink="false">d8906809-f99a-4b00-82c2-4626567bd83b</guid><itunes:image href="https://artwork.captivate.fm/c4428387-a3af-4e95-a061-4c238fe7f63d/OGb4WWOlwo1wfjq_DpG4xzi2.png"/><pubDate>Sat, 21 May 2022 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/417abf8d-4662-4c77-978f-6cf6124d8e0f/The-20Safety-20Plan-20Ep-20012.mp3" length="9451437" type="audio/mpeg"/><itunes:duration>09:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>12</itunes:episode><podcast:episode>12</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/32ae75f7-71a4-4a9a-8e6f-a2cc178877eb/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/32ae75f7-71a4-4a9a-8e6f-a2cc178877eb/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/32ae75f7-71a4-4a9a-8e6f-a2cc178877eb/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-417abf8d-4662-4c77-978f-6cf6124d8e0f.json" type="application/json+chapters"/></item><item><title>Sextortion</title><itunes:title>Sextortion</itunes:title><description><![CDATA[<p>LCC Connect host and Director of Information Security Paul Schwartz describes the sextortion scam and how to respond when attacked. Sextortion is a type of fraud where the criminals threaten the release of fake sexual images or false information about the victim in order to coerce them into paying a Bitcoin demand.</p><p><a href="https://www.lcc.edu/academics/areas-of-study/computers-engineering-technology/cit.html" rel="noopener noreferrer" target="_blank">Website: LCC Computer Information Technologies</a></p>]]></description><content:encoded><![CDATA[<p>LCC Connect host and Director of Information Security Paul Schwartz describes the sextortion scam and how to respond when attacked. Sextortion is a type of fraud where the criminals threaten the release of fake sexual images or false information about the victim in order to coerce them into paying a Bitcoin demand.</p><p><a href="https://www.lcc.edu/academics/areas-of-study/computers-engineering-technology/cit.html" rel="noopener noreferrer" target="_blank">Website: LCC Computer Information Technologies</a></p>]]></content:encoded><link><![CDATA[https://the-safety-plan.captivate.fm]]></link><guid isPermaLink="false">6683b1fd-8af8-470d-a619-655ae6629f93</guid><itunes:image href="https://artwork.captivate.fm/c4428387-a3af-4e95-a061-4c238fe7f63d/OGb4WWOlwo1wfjq_DpG4xzi2.png"/><pubDate>Sat, 07 May 2022 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/63428541-b8fb-44fc-a454-bd3aa2ef14ef/The-20Safety-20Plan-20Ep-20011.mp3" length="15554723" type="audio/mpeg"/><itunes:duration>16:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>11</itunes:episode><podcast:episode>11</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/58c8de50-5c80-4c08-969e-4b68771b7be6/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/58c8de50-5c80-4c08-969e-4b68771b7be6/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/58c8de50-5c80-4c08-969e-4b68771b7be6/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-63428541-b8fb-44fc-a454-bd3aa2ef14ef.json" type="application/json+chapters"/></item><item><title>Basic Cyber Hygiene</title><itunes:title>Basic Cyber Hygiene</itunes:title><description><![CDATA[<p>LCC Connect host and Director of Information Security Paul Schwartz describes what basic Cyber Hygiene entails, including safe computing concepts of phish recognition, sending confidential information safely, eliminating password reuse, physical security, using public Wi-Fi, and social networking tips.</p><p><a href="https://www.lcc.edu/academics/areas-of-study/computers-engineering-technology/cit.html" rel="noopener noreferrer" target="_blank">Website: LCC Computer Information Technologies</a></p>]]></description><content:encoded><![CDATA[<p>LCC Connect host and Director of Information Security Paul Schwartz describes what basic Cyber Hygiene entails, including safe computing concepts of phish recognition, sending confidential information safely, eliminating password reuse, physical security, using public Wi-Fi, and social networking tips.</p><p><a href="https://www.lcc.edu/academics/areas-of-study/computers-engineering-technology/cit.html" rel="noopener noreferrer" target="_blank">Website: LCC Computer Information Technologies</a></p>]]></content:encoded><link><![CDATA[https://the-safety-plan.captivate.fm]]></link><guid isPermaLink="false">80329cab-0b61-44cc-93a8-a1243225a137</guid><itunes:image href="https://artwork.captivate.fm/c4428387-a3af-4e95-a061-4c238fe7f63d/OGb4WWOlwo1wfjq_DpG4xzi2.png"/><pubDate>Sat, 09 Apr 2022 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/59d3cd5d-64e2-49ea-af51-3ae65b8b4195/The-20Safety-20Plan-20Ep-20010.mp3" length="25055254" type="audio/mpeg"/><itunes:duration>26:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>10</itunes:episode><podcast:episode>10</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/d5e4db24-17d4-42d1-a506-d356e793c687/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/d5e4db24-17d4-42d1-a506-d356e793c687/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/d5e4db24-17d4-42d1-a506-d356e793c687/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-59d3cd5d-64e2-49ea-af51-3ae65b8b4195.json" type="application/json+chapters"/></item><item><title>I Can’t Remember This Many Passwords!</title><itunes:title>I Can’t Remember This Many Passwords!</itunes:title><description><![CDATA[<p><em>The Safety Plan </em>host and LCC Director of Information Security, Paul Schwartz describes the problems with passwords, what you should and should not do with passwords, how to create a strong password, using a password manager, and using multi-factor authentication.</p><p><a href="https://www.lcc.edu/academics/areas-of-study/computers-engineering-technology/cit.html" rel="noopener noreferrer" target="_blank">LCC Computer Information Technologies Website</a></p>]]></description><content:encoded><![CDATA[<p><em>The Safety Plan </em>host and LCC Director of Information Security, Paul Schwartz describes the problems with passwords, what you should and should not do with passwords, how to create a strong password, using a password manager, and using multi-factor authentication.</p><p><a href="https://www.lcc.edu/academics/areas-of-study/computers-engineering-technology/cit.html" rel="noopener noreferrer" target="_blank">LCC Computer Information Technologies Website</a></p>]]></content:encoded><link><![CDATA[https://the-safety-plan.captivate.fm]]></link><guid isPermaLink="false">e18e865e-128b-427b-8f17-a508c84aec68</guid><itunes:image href="https://artwork.captivate.fm/c4428387-a3af-4e95-a061-4c238fe7f63d/OGb4WWOlwo1wfjq_DpG4xzi2.png"/><pubDate>Sat, 26 Mar 2022 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/7b298a5d-5fc6-4ef6-b39e-3496c3681751/The-Safety-Plan-Ep-009.mp3" length="22127318" type="audio/mpeg"/><itunes:duration>23:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>9</itunes:episode><podcast:episode>9</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/001a8cb8-b0ab-43e3-adae-610376899733/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/001a8cb8-b0ab-43e3-adae-610376899733/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/001a8cb8-b0ab-43e3-adae-610376899733/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-7b298a5d-5fc6-4ef6-b39e-3496c3681751.json" type="application/json+chapters"/></item><item><title>Fake Job Scams Part 2</title><itunes:title>Fake Job Scams Part 2</itunes:title><description><![CDATA[<p>In this second episode of a two part series, LCC Connect host and Director of Information Security Paul Schwartz describes 15 common job search scams, how to protect yourself, and what to do if you are a victim of an employment scam.</p><p><a href="https://www.lcc.edu/academics/areas-of-study/computers-engineering-technology/cit.html" rel="noopener noreferrer" target="_blank">LCC Computer Information Technologies Website</a></p>]]></description><content:encoded><![CDATA[<p>In this second episode of a two part series, LCC Connect host and Director of Information Security Paul Schwartz describes 15 common job search scams, how to protect yourself, and what to do if you are a victim of an employment scam.</p><p><a href="https://www.lcc.edu/academics/areas-of-study/computers-engineering-technology/cit.html" rel="noopener noreferrer" target="_blank">LCC Computer Information Technologies Website</a></p>]]></content:encoded><link><![CDATA[https://the-safety-plan.captivate.fm]]></link><guid isPermaLink="false">33a1e019-e5a9-4548-aaec-8f98bd75d3c7</guid><itunes:image href="https://artwork.captivate.fm/c4428387-a3af-4e95-a061-4c238fe7f63d/OGb4WWOlwo1wfjq_DpG4xzi2.png"/><pubDate>Sat, 19 Mar 2022 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/4b5a79cc-45ce-4c73-8eae-a661a43672ae/the-safety-plan-ep-008.mp3" length="18087185" type="audio/mpeg"/><itunes:duration>18:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>8</itunes:episode><podcast:episode>8</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/68d5d322-ae1c-49f3-8e4a-c775a9dc4290/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/68d5d322-ae1c-49f3-8e4a-c775a9dc4290/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/68d5d322-ae1c-49f3-8e4a-c775a9dc4290/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-4b5a79cc-45ce-4c73-8eae-a661a43672ae.json" type="application/json+chapters"/></item><item><title>Fake Job Scams Part 1</title><itunes:title>Fake Job Scams Part 1</itunes:title><description><![CDATA[<p>In this first episode of a two part series, LCC Connect host and Director of Information Security Paul Schwartz describes the many, many indicators of fake job scams, such as unrealistic expectations, paying up front for a job, and conducting the interview over text message.</p><p><a href="https://www.lcc.edu/academics/areas-of-study/computers-engineering-technology/cit.html" rel="noopener noreferrer" target="_blank">LCC Computer Information Technologies Website</a></p>]]></description><content:encoded><![CDATA[<p>In this first episode of a two part series, LCC Connect host and Director of Information Security Paul Schwartz describes the many, many indicators of fake job scams, such as unrealistic expectations, paying up front for a job, and conducting the interview over text message.</p><p><a href="https://www.lcc.edu/academics/areas-of-study/computers-engineering-technology/cit.html" rel="noopener noreferrer" target="_blank">LCC Computer Information Technologies Website</a></p>]]></content:encoded><link><![CDATA[https://the-safety-plan.captivate.fm]]></link><guid isPermaLink="false">deee99ca-8ec3-4bce-8197-cfd121345057</guid><itunes:image href="https://artwork.captivate.fm/c4428387-a3af-4e95-a061-4c238fe7f63d/OGb4WWOlwo1wfjq_DpG4xzi2.png"/><pubDate>Sat, 12 Mar 2022 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/a5edb670-cea0-4e35-aa56-3f99058ef35b/The-Safety-Plan-Ep-007.mp3" length="15261953" type="audio/mpeg"/><itunes:duration>15:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>7</itunes:episode><podcast:episode>7</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/a2e4c336-6550-4917-9f3f-6ec1ca72d7ed/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/a2e4c336-6550-4917-9f3f-6ec1ca72d7ed/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/a2e4c336-6550-4917-9f3f-6ec1ca72d7ed/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-a5edb670-cea0-4e35-aa56-3f99058ef35b.json" type="application/json+chapters"/></item><item><title>The Skinny on Gas Pump Skimming</title><itunes:title>The Skinny on Gas Pump Skimming</itunes:title><description><![CDATA[<p>LCC&nbsp;Connect&nbsp;host&nbsp;and&nbsp;Director&nbsp;of&nbsp;Information&nbsp;Security&nbsp;Paul&nbsp;Schwartz&nbsp;describes&nbsp;gas&nbsp;pump&nbsp;skimming&nbsp;scams,&nbsp;what&nbsp;gas&nbsp;stations&nbsp;and&nbsp;criminals&nbsp;are&nbsp;doing&nbsp;about&nbsp;it,&nbsp;and&nbsp;how&nbsp;to&nbsp;avoid&nbsp;being&nbsp;scammed.</p><p><a href="https://www.lcc.edu/academics/areas-of-study/computers-engineering-technology/cit.html" rel="noopener noreferrer" target="_blank">LCC&nbsp;Computer&nbsp;Information&nbsp;Technologies&nbsp;Website</a></p>]]></description><content:encoded><![CDATA[<p>LCC&nbsp;Connect&nbsp;host&nbsp;and&nbsp;Director&nbsp;of&nbsp;Information&nbsp;Security&nbsp;Paul&nbsp;Schwartz&nbsp;describes&nbsp;gas&nbsp;pump&nbsp;skimming&nbsp;scams,&nbsp;what&nbsp;gas&nbsp;stations&nbsp;and&nbsp;criminals&nbsp;are&nbsp;doing&nbsp;about&nbsp;it,&nbsp;and&nbsp;how&nbsp;to&nbsp;avoid&nbsp;being&nbsp;scammed.</p><p><a href="https://www.lcc.edu/academics/areas-of-study/computers-engineering-technology/cit.html" rel="noopener noreferrer" target="_blank">LCC&nbsp;Computer&nbsp;Information&nbsp;Technologies&nbsp;Website</a></p>]]></content:encoded><link><![CDATA[https://the-safety-plan.captivate.fm]]></link><guid isPermaLink="false">04dbb071-8eab-4a0d-8ca9-05121249c907</guid><itunes:image href="https://artwork.captivate.fm/c4428387-a3af-4e95-a061-4c238fe7f63d/OGb4WWOlwo1wfjq_DpG4xzi2.png"/><pubDate>Sat, 26 Feb 2022 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/a6d7ad8d-22d9-4cdf-a179-4c00593105fc/the-safety-plan-ep-006.mp3" length="10545700" type="audio/mpeg"/><itunes:duration>10:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>6</itunes:episode><podcast:episode>6</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/3c9619e0-3d50-42c9-b40d-4668bf793e28/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/3c9619e0-3d50-42c9-b40d-4668bf793e28/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/3c9619e0-3d50-42c9-b40d-4668bf793e28/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-a6d7ad8d-22d9-4cdf-a179-4c00593105fc.json" type="application/json+chapters"/></item><item><title>Code Red on QR Codes and Romance Fraud</title><itunes:title>Code Red on QR Codes and Romance Fraud</itunes:title><description><![CDATA[<p>LCC&nbsp;Connect&nbsp;host&nbsp;and&nbsp;Director&nbsp;of&nbsp;Information&nbsp;Security&nbsp;Paul&nbsp;Schwartz&nbsp;describes&nbsp;QR&nbsp;Code&nbsp;fraud&nbsp;and&nbsp;what&nbsp;you&nbsp;can&nbsp;do&nbsp;to&nbsp;avoid&nbsp;getting&nbsp;scammed.&nbsp;Paul&nbsp;then&nbsp;describes&nbsp;romance&nbsp;scams,&nbsp;how&nbsp;to&nbsp;identify&nbsp;the&nbsp;scam,&nbsp;how&nbsp;to&nbsp;avoid&nbsp;the&nbsp;scam,&nbsp;and&nbsp;what&nbsp;to&nbsp;do&nbsp;if&nbsp;you&nbsp;are&nbsp;a&nbsp;victim&nbsp;of&nbsp;a&nbsp;romance&nbsp;scam.</p><p><a href="https://www.lcc.edu/academics/areas-of-study/computers-engineering-technology/cit.html" rel="noopener noreferrer" target="_blank">LCC&nbsp;Computer&nbsp;Information&nbsp;Technologies&nbsp;Website</a></p>]]></description><content:encoded><![CDATA[<p>LCC&nbsp;Connect&nbsp;host&nbsp;and&nbsp;Director&nbsp;of&nbsp;Information&nbsp;Security&nbsp;Paul&nbsp;Schwartz&nbsp;describes&nbsp;QR&nbsp;Code&nbsp;fraud&nbsp;and&nbsp;what&nbsp;you&nbsp;can&nbsp;do&nbsp;to&nbsp;avoid&nbsp;getting&nbsp;scammed.&nbsp;Paul&nbsp;then&nbsp;describes&nbsp;romance&nbsp;scams,&nbsp;how&nbsp;to&nbsp;identify&nbsp;the&nbsp;scam,&nbsp;how&nbsp;to&nbsp;avoid&nbsp;the&nbsp;scam,&nbsp;and&nbsp;what&nbsp;to&nbsp;do&nbsp;if&nbsp;you&nbsp;are&nbsp;a&nbsp;victim&nbsp;of&nbsp;a&nbsp;romance&nbsp;scam.</p><p><a href="https://www.lcc.edu/academics/areas-of-study/computers-engineering-technology/cit.html" rel="noopener noreferrer" target="_blank">LCC&nbsp;Computer&nbsp;Information&nbsp;Technologies&nbsp;Website</a></p>]]></content:encoded><link><![CDATA[https://the-safety-plan.captivate.fm]]></link><guid isPermaLink="false">c7ef9e39-257e-4e8f-ba1e-eb75c35b287e</guid><itunes:image href="https://artwork.captivate.fm/c4428387-a3af-4e95-a061-4c238fe7f63d/OGb4WWOlwo1wfjq_DpG4xzi2.png"/><pubDate>Sat, 19 Feb 2022 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/9124ed76-15ec-4210-bcbc-dea6ee340879/the-safety-plan-ep-005.mp3" length="16189244" type="audio/mpeg"/><itunes:duration>16:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>5</itunes:episode><podcast:episode>5</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/82c67bcf-d671-437c-b99e-09e4f764dac9/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/82c67bcf-d671-437c-b99e-09e4f764dac9/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/82c67bcf-d671-437c-b99e-09e4f764dac9/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-9124ed76-15ec-4210-bcbc-dea6ee340879.json" type="application/json+chapters"/></item><item><title>File Under Tax Return Fraud</title><itunes:title>File Under Tax Return Fraud</itunes:title><description><![CDATA[<p><em>The&nbsp;Safety&nbsp;Plan</em>&nbsp;host&nbsp;and&nbsp;Director&nbsp;of&nbsp;Information&nbsp;Security&nbsp;Paul&nbsp;Schwartz&nbsp;describes&nbsp;income&nbsp;tax&nbsp;return&nbsp;fraud,&nbsp;what&nbsp;you&nbsp;can&nbsp;do&nbsp;to&nbsp;prevent&nbsp;fraud&nbsp;before&nbsp;you&nbsp;file&nbsp;your&nbsp;tax&nbsp;return,&nbsp;things&nbsp;you&nbsp;can&nbsp;do&nbsp;once&nbsp;you&nbsp;are&nbsp;ready&nbsp;to&nbsp;file,&nbsp;how&nbsp;to&nbsp;tell&nbsp;if&nbsp;you&nbsp;are&nbsp;a&nbsp;victim&nbsp;of&nbsp;income&nbsp;tax&nbsp;fraud,&nbsp;and&nbsp;what&nbsp;to&nbsp;do&nbsp;once&nbsp;you&nbsp;know&nbsp;you&nbsp;are&nbsp;a&nbsp;victim&nbsp;of&nbsp;income&nbsp;tax&nbsp;fraud.</p><p><a href="https://www.lcc.edu/academics/areas-of-study/computers-engineering-technology/cit.html" rel="noopener noreferrer" target="_blank">LCC&nbsp;Computer&nbsp;Information&nbsp;Technologies</a></p>]]></description><content:encoded><![CDATA[<p><em>The&nbsp;Safety&nbsp;Plan</em>&nbsp;host&nbsp;and&nbsp;Director&nbsp;of&nbsp;Information&nbsp;Security&nbsp;Paul&nbsp;Schwartz&nbsp;describes&nbsp;income&nbsp;tax&nbsp;return&nbsp;fraud,&nbsp;what&nbsp;you&nbsp;can&nbsp;do&nbsp;to&nbsp;prevent&nbsp;fraud&nbsp;before&nbsp;you&nbsp;file&nbsp;your&nbsp;tax&nbsp;return,&nbsp;things&nbsp;you&nbsp;can&nbsp;do&nbsp;once&nbsp;you&nbsp;are&nbsp;ready&nbsp;to&nbsp;file,&nbsp;how&nbsp;to&nbsp;tell&nbsp;if&nbsp;you&nbsp;are&nbsp;a&nbsp;victim&nbsp;of&nbsp;income&nbsp;tax&nbsp;fraud,&nbsp;and&nbsp;what&nbsp;to&nbsp;do&nbsp;once&nbsp;you&nbsp;know&nbsp;you&nbsp;are&nbsp;a&nbsp;victim&nbsp;of&nbsp;income&nbsp;tax&nbsp;fraud.</p><p><a href="https://www.lcc.edu/academics/areas-of-study/computers-engineering-technology/cit.html" rel="noopener noreferrer" target="_blank">LCC&nbsp;Computer&nbsp;Information&nbsp;Technologies</a></p>]]></content:encoded><link><![CDATA[https://the-safety-plan.captivate.fm]]></link><guid isPermaLink="false">af111141-b65b-40c7-a57b-9fbbdea27701</guid><itunes:image href="https://artwork.captivate.fm/c4428387-a3af-4e95-a061-4c238fe7f63d/OGb4WWOlwo1wfjq_DpG4xzi2.png"/><pubDate>Sat, 12 Feb 2022 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/acda565f-b597-4cff-bd8e-6f0c207b0621/safety-plan-ep-004.mp3" length="10879183" type="audio/mpeg"/><itunes:duration>11:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>4</itunes:episode><podcast:episode>4</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/c724d01e-e707-49cd-a58f-bfbf8602e247/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/c724d01e-e707-49cd-a58f-bfbf8602e247/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/c724d01e-e707-49cd-a58f-bfbf8602e247/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-acda565f-b597-4cff-bd8e-6f0c207b0621.json" type="application/json+chapters"/></item><item><title>Gift Card or a GRIFT Card?</title><itunes:title>Gift Card or a GRIFT Card?</itunes:title><description><![CDATA[<p>LCC&nbsp;Connect&nbsp;host&nbsp;and&nbsp;Director&nbsp;of&nbsp;Information&nbsp;Security&nbsp;Paul&nbsp;Schwartz&nbsp;describes&nbsp;nine&nbsp;gift&nbsp;card&nbsp;scams&nbsp;(IRS&nbsp;imposter,&nbsp;Gift&nbsp;Card&nbsp;Bots,&nbsp;shady&nbsp;cashier,&nbsp;Stealing&nbsp;the&nbsp;numbers,&nbsp;online&nbsp;auction&nbsp;scam,&nbsp;fake&nbsp;prize,&nbsp;power&nbsp;company&nbsp;calls,&nbsp;Fake&nbsp;Web&nbsp;site,&nbsp;and&nbsp;Friend&nbsp;in&nbsp;Need)&nbsp;and&nbsp;how&nbsp;to&nbsp;avoid&nbsp;them.&nbsp;&nbsp;</p><p><a href="https://www.lcc.edu/academics/areas-of-study/computers-engineering-technology/cit.html" rel="noopener noreferrer" target="_blank">LCC&nbsp;Computer&nbsp;Information&nbsp;Technologies</a></p>]]></description><content:encoded><![CDATA[<p>LCC&nbsp;Connect&nbsp;host&nbsp;and&nbsp;Director&nbsp;of&nbsp;Information&nbsp;Security&nbsp;Paul&nbsp;Schwartz&nbsp;describes&nbsp;nine&nbsp;gift&nbsp;card&nbsp;scams&nbsp;(IRS&nbsp;imposter,&nbsp;Gift&nbsp;Card&nbsp;Bots,&nbsp;shady&nbsp;cashier,&nbsp;Stealing&nbsp;the&nbsp;numbers,&nbsp;online&nbsp;auction&nbsp;scam,&nbsp;fake&nbsp;prize,&nbsp;power&nbsp;company&nbsp;calls,&nbsp;Fake&nbsp;Web&nbsp;site,&nbsp;and&nbsp;Friend&nbsp;in&nbsp;Need)&nbsp;and&nbsp;how&nbsp;to&nbsp;avoid&nbsp;them.&nbsp;&nbsp;</p><p><a href="https://www.lcc.edu/academics/areas-of-study/computers-engineering-technology/cit.html" rel="noopener noreferrer" target="_blank">LCC&nbsp;Computer&nbsp;Information&nbsp;Technologies</a></p>]]></content:encoded><link><![CDATA[https://the-safety-plan.captivate.fm]]></link><guid isPermaLink="false">b8e971c6-c73f-484f-8c29-60f183cf3444</guid><itunes:image href="https://artwork.captivate.fm/c4428387-a3af-4e95-a061-4c238fe7f63d/OGb4WWOlwo1wfjq_DpG4xzi2.png"/><pubDate>Sat, 29 Jan 2022 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/325bf8ac-c811-431d-8c72-0e09d0ffa451/safety-plan-ep-003.mp3" length="15603823" type="audio/mpeg"/><itunes:duration>16:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>3</itunes:episode><podcast:episode>3</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/b0f9f8af-cce7-4493-ac0c-171c231bd9a4/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/b0f9f8af-cce7-4493-ac0c-171c231bd9a4/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/b0f9f8af-cce7-4493-ac0c-171c231bd9a4/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-325bf8ac-c811-431d-8c72-0e09d0ffa451.json" type="application/json+chapters"/></item><item><title>Malicious Malware Meanies!</title><itunes:title>Malicious Malware Meanies!</itunes:title><description><![CDATA[<p>LCC&nbsp;Connect&nbsp;host&nbsp;and&nbsp;Director&nbsp;of&nbsp;Information&nbsp;Security&nbsp;Paul&nbsp;Schwartz&nbsp;describes&nbsp;malware&nbsp;(malicious&nbsp;software)&nbsp;scams,&nbsp;why&nbsp;criminals&nbsp;develop&nbsp;malware&nbsp;(think&nbsp;$$),&nbsp;the&nbsp;different&nbsp;types&nbsp;of&nbsp;malware,&nbsp;how&nbsp;malware&nbsp;infections&nbsp;occur,&nbsp;what&nbsp;to&nbsp;do&nbsp;if&nbsp;you&nbsp;have&nbsp;malware&nbsp;on&nbsp;your&nbsp;computer,&nbsp;how&nbsp;to&nbsp;prevent&nbsp;malware&nbsp;infections,&nbsp;and&nbsp;finally,&nbsp;how&nbsp;to&nbsp;remove&nbsp;malware&nbsp;from&nbsp;your&nbsp;computer.</p><p><a href="https://www.lcc.edu/academics/areas-of-study/computers-engineering-technology/cit.html" rel="noopener noreferrer" target="_blank">LCC&nbsp;Computer&nbsp;Information&nbsp;Technologies</a></p>]]></description><content:encoded><![CDATA[<p>LCC&nbsp;Connect&nbsp;host&nbsp;and&nbsp;Director&nbsp;of&nbsp;Information&nbsp;Security&nbsp;Paul&nbsp;Schwartz&nbsp;describes&nbsp;malware&nbsp;(malicious&nbsp;software)&nbsp;scams,&nbsp;why&nbsp;criminals&nbsp;develop&nbsp;malware&nbsp;(think&nbsp;$$),&nbsp;the&nbsp;different&nbsp;types&nbsp;of&nbsp;malware,&nbsp;how&nbsp;malware&nbsp;infections&nbsp;occur,&nbsp;what&nbsp;to&nbsp;do&nbsp;if&nbsp;you&nbsp;have&nbsp;malware&nbsp;on&nbsp;your&nbsp;computer,&nbsp;how&nbsp;to&nbsp;prevent&nbsp;malware&nbsp;infections,&nbsp;and&nbsp;finally,&nbsp;how&nbsp;to&nbsp;remove&nbsp;malware&nbsp;from&nbsp;your&nbsp;computer.</p><p><a href="https://www.lcc.edu/academics/areas-of-study/computers-engineering-technology/cit.html" rel="noopener noreferrer" target="_blank">LCC&nbsp;Computer&nbsp;Information&nbsp;Technologies</a></p>]]></content:encoded><link><![CDATA[https://the-safety-plan.captivate.fm]]></link><guid isPermaLink="false">9b469e6e-68da-4bb8-adcd-1c717a7924bc</guid><itunes:image href="https://artwork.captivate.fm/c4428387-a3af-4e95-a061-4c238fe7f63d/OGb4WWOlwo1wfjq_DpG4xzi2.png"/><pubDate>Sat, 15 Jan 2022 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/886efec5-629f-4fc7-88b8-18bd0e91d554/safety-plan-ep-002.mp3" length="15486700" type="audio/mpeg"/><itunes:duration>16:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>2</itunes:episode><podcast:episode>2</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/51acb37e-7c4a-46d9-b2c7-2219bf887af5/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/51acb37e-7c4a-46d9-b2c7-2219bf887af5/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/51acb37e-7c4a-46d9-b2c7-2219bf887af5/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-886efec5-629f-4fc7-88b8-18bd0e91d554.json" type="application/json+chapters"/></item><item><title>Don&apos;t Let Phishing Give You the Hook!</title><itunes:title>Don&apos;t Let Phishing Give You the Hook!</itunes:title><description><![CDATA[<p>LCC&nbsp;Connect&nbsp;host&nbsp;and&nbsp;Director&nbsp;of&nbsp;Information&nbsp;Security&nbsp;Paul&nbsp;Schwartz&nbsp;describes&nbsp;real&nbsp;world&nbsp;phishing&nbsp;scams,&nbsp;why&nbsp;phishing&nbsp;could&nbsp;happen&nbsp;to&nbsp;you,&nbsp;and&nbsp;how&nbsp;to&nbsp;protect&nbsp;yourself&nbsp;from&nbsp;phishing.&nbsp;Paul&nbsp;details&nbsp;the&nbsp;7&nbsp;red&nbsp;flags&nbsp;of&nbsp;phishing&nbsp;email&nbsp;identification:&nbsp;display&nbsp;name&nbsp;matching,&nbsp;link/attachment,&nbsp;language,&nbsp;familiarity,&nbsp;content,&nbsp;urgency,&nbsp;and&nbsp;expectations.</p><p><a href="https://www.lcc.edu/academics/areas-of-study/computers-engineering-technology/cit.html" rel="noopener noreferrer" target="_blank">LCC&nbsp;Computer&nbsp;Information&nbsp;Technologies</a></p>]]></description><content:encoded><![CDATA[<p>LCC&nbsp;Connect&nbsp;host&nbsp;and&nbsp;Director&nbsp;of&nbsp;Information&nbsp;Security&nbsp;Paul&nbsp;Schwartz&nbsp;describes&nbsp;real&nbsp;world&nbsp;phishing&nbsp;scams,&nbsp;why&nbsp;phishing&nbsp;could&nbsp;happen&nbsp;to&nbsp;you,&nbsp;and&nbsp;how&nbsp;to&nbsp;protect&nbsp;yourself&nbsp;from&nbsp;phishing.&nbsp;Paul&nbsp;details&nbsp;the&nbsp;7&nbsp;red&nbsp;flags&nbsp;of&nbsp;phishing&nbsp;email&nbsp;identification:&nbsp;display&nbsp;name&nbsp;matching,&nbsp;link/attachment,&nbsp;language,&nbsp;familiarity,&nbsp;content,&nbsp;urgency,&nbsp;and&nbsp;expectations.</p><p><a href="https://www.lcc.edu/academics/areas-of-study/computers-engineering-technology/cit.html" rel="noopener noreferrer" target="_blank">LCC&nbsp;Computer&nbsp;Information&nbsp;Technologies</a></p>]]></content:encoded><link><![CDATA[https://the-safety-plan.captivate.fm]]></link><guid isPermaLink="false">89e47001-0b20-4b64-abdd-f4c88cadb0b7</guid><itunes:image href="https://artwork.captivate.fm/c4428387-a3af-4e95-a061-4c238fe7f63d/OGb4WWOlwo1wfjq_DpG4xzi2.png"/><pubDate>Sat, 08 Jan 2022 12:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/37080c87-4fd0-4279-b774-c63d81392e2b/safety-plan-ep-001.mp3" length="15175079" type="audio/mpeg"/><itunes:duration>15:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1</itunes:episode><podcast:episode>1</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/5592f523-b9f7-436e-ba50-d24fe8da14bd/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/5592f523-b9f7-436e-ba50-d24fe8da14bd/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/5592f523-b9f7-436e-ba50-d24fe8da14bd/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-37080c87-4fd0-4279-b774-c63d81392e2b.json" type="application/json+chapters"/></item></channel></rss>