Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124


Here are some of the security thoughts Jim and I had on WSVA this morning, August 20, 2025. Continue reading from this point for all the details. Or, click HERE to get the short version. There is a lot more here than what we had time to discuss. Here is the actual podcast show with Jim and me.
Here are two other links you may be interested in. These will both open in another tab in your browser:
1) Podcast Created by AI of this entire article that was written by me.
2) Video Class Created by AI, also of this entire article and found below if you would like to watch it here.
Both were done by NotebookLM.Google.com, if you care to check it out. You will need a Google Account to login and try it out.
Briefing: Navigating the Digital Landscape: Protecting Yourself from Fraud and Scams
This briefing synthesizes key information from Kiplinger, Gray Haired Tech (Ron Doyle), and the FTC Consumer Advice, outlining prevalent online scams and offering actionable strategies for protection. The overarching theme is that scams are constantly evolving, leveraging trust, urgency, and new technologies (like AI) to exploit vulnerabilities, making continuous vigilance and skepticism paramount.
Scammers are sophisticated and adaptable, constantly refining their methods to ensnare victims.
◦ Government/Business Impersonators: They might demand immediate payment, threaten legal action, or claim account issues. “A bank will never ask to validate you when they call you first,” states Paul Benda of the American Bankers Association. (Kiplinger)
◦ Tech Support Scams: These exploit a lack of technical knowledge, using scare tactics (fake virus alerts, pop-ups) to convince victims their device is compromised. They then pressure individuals to call a fake support number and grant remote access, ultimately stealing data or demanding payment for bogus services. “no legitimate company will ever contact you unsolicited for tech support,” emphasizes Ron Doyle. (Gray Haired Tech – What About Scams)
◦ Email Phishing: Emails are crafted to look legitimate, with accurate logos and even personal details, to trick recipients into clicking malicious links or downloading harmful attachments. (Gray Haired Tech – Scam What Am)
◦ Spear Phishing & Whaling: These are highly personalized attacks targeting specific individuals or “big fish” (CEOs, executives) with access to sensitive information. Scammers do “their homework on the specific person(s) they are going to scam.” (Gray Haired Tech – Scam What Am)
◦ Smishing (SMS/Text Phishing) & Vishing (Voice Phishing): Scammers extend their reach to text messages and phone calls, mimicking delivery companies or tech support. (Gray Haired Tech – Scam What Am)
◦ Quishing (QR Code Phishing): Malicious QR codes are placed in public areas, directing users to fake sites designed to steal information. (Gray Haired Tech – What About Scams)
Protecting oneself requires a proactive and skeptical mindset.
◦ Question Unexpected Contact: Be wary of unsolicited communication from businesses or government agencies. “If you didn’t initiate contact… hang up and go directly to the source.” (Kiplinger)
◦ Verify Sender Identity: Always double-check who is sending messages. If an email from a company asks you to log in, “DO NOT click a link. Go to your browser and type in the address (URL) for the company and log in yourself.” (Gray Haired Tech – Email Essentials)
◦ “If something feels off, it probably is.” (Kiplinger, Gray Haired Tech – Stay Safe and Secure Online) “Be Suspicious all the time!” (Gray Haired Tech – What About Scams)
◦ Research Suspect Emails: Copy and paste sentences from suspicious emails into a search engine to verify their authenticity. Reputable sites like Snopes.com or About.com can help verify urban legends and hoaxes. (Gray Haired Tech – Email Scams)
◦ Unique, Complex Passwords: Use “strong and unique” passwords, at least 12-16 characters, mixing uppercase, lowercase, numbers, and symbols. “Avoid using anything personal like your birthday.” Crucially, “consider using different passwords for different accounts.” (Gray Haired Tech – Email Essentials, Kiplinger)
◦ Password Managers: Use tools like Dashlane, Keeper, or the one I recommend, BitWarden to generate and store strong, unique passwords. (Kiplinger, Gray Haired Tech – Stay Safe and Secure Online)
◦ Multifactor Authentication (MFA/2FA): Enable this extra layer of security on all accounts. This requires a second step (e.g., a code sent to your phone, facial scan) to access your account, making it harder for unauthorized access even if a password is stolen. (Kiplinger, Gray Haired Tech – Stay Safe and Secure Online)
◦ Passkeys: Familiarize yourself with passkeys, an emerging passwordless authentication method using biometric verification or device PINs, offering enhanced security against phishing. (Gray Haired Tech – Stay Safe and Secure Online)
◦ Regular Account Review: Check financial account activity “at least every few days; don’t wait for your monthly statement.” Question even small suspicious charges. (Kiplinger)
◦ Text Alerts: Set up text message alerts for financial transactions, customizing notifications for suspicious activity or transactions above a certain size. (Kiplinger)
◦ Credit Report Review: Regularly review credit reports for unrecognized credit cards or loans, indicating potential identity theft. Free weekly reports are available from Experian, Equifax, and TransUnion at AnnualCreditReport.com. (Kiplinger)
◦ Credit Freeze: Consider freezing your credit to prevent lenders from accessing your reports for new credit applications, thwarting identity thieves. This is free and reversible. (Kiplinger)
◦ Electronic Payments: Use automatic or electronic payments over checks, as “Check fraud has increased significantly.” (Kiplinger)
◦ Public Wi-Fi Caution: Avoid accessing sensitive information on public Wi-Fi. If necessary, use a Virtual Private Network (VPN) to encrypt your internet traffic. (Gray Haired Tech – Stay Safe and Secure Online)
◦ Software Updates: Keep all device software up-to-date, including operating systems (e.g., migrating from Windows 10 to 11 before support ends). (Gray Haired Tech – Stay Safe and Secure Online)
◦ Social Media Privacy: Be mindful of personal information shared on social media (addresses, vacation plans, children’s details), as it can be used for identity theft or targeted scams. “Review your privacy settings regularly.” (Gray Haired Tech – Stay Safe and Secure Online)
◦ Avoid Sharing Sensitive Information: Do not send highly sensitive information like credit card or Social Security numbers via regular email. Consider encryption for private communications. (Gray Haired Tech – Email Essentials)
III. Reporting and Staying Informed
By understanding scammer tactics and consistently implementing robust protective measures, individuals can significantly mitigate their risk and contribute to a safer online environment.
Online scams and fraud are always changing, and scammers use tricky methods to get your money or information. If you want to go back to the beginning of this article, click TOP.