<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:podcast="https://podcastindex.org/namespace/1.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"
    xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"
    xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:spotify="http://www.spotify.com/ns/rss">
    <channel>
        <title>Cybersecurity Made Personal</title>
        <generator>Castos</generator>
        <atom:link href="https://feeds.castos.com/npdq" rel="self" type="application/rss+xml" />
        <link>https://www.cybersecuritymadepersonal.com</link>
        <description>In a world filled with data breaches and malware, it is easy to wonder if there is any way to keep your personal information safe. We cut through the hype and sensationalism to give you the information you need to know to keep your personal information private and secure.</description>
        <lastBuildDate>Tue, 14 Mar 2023 11:00:00 +0000</lastBuildDate>
        <language>en</language>
        <copyright>© 2021 Personal Cybersecurity LLC</copyright>
        
        <spotify:limit recentCount="100" />
        
        <spotify:countryOfOrigin>
            US  
        </spotify:countryOfOrigin>
                    <image>
                <url>https://episodes.castos.com/5f73fab2b5a771-62662091/images/Podcast-Artwork.png</url>
                <title>Cybersecurity Made Personal</title>
                <link>https://www.cybersecuritymadepersonal.com</link>
            </image>
                <itunes:subtitle>In a world filled with data breaches and malware, it is easy to wonder if there is any way to keep your personal information safe. We cut through the hype and sensationalism to give you the information you need to know to keep your personal information private and secure.</itunes:subtitle>
        <itunes:author>James Herman</itunes:author>
        <itunes:type>episodic</itunes:type>
        <itunes:summary>In a world filled with data breaches and malware, it is easy to wonder if there is any way to keep your personal information safe. We cut through the hype and sensationalism to give you the information you need to know to keep your personal information private and secure.</itunes:summary>
        <itunes:owner>
            <itunes:name>James Herman</itunes:name>
            <itunes:email>jim@cybersecuritymadepersonal.com</itunes:email>
        </itunes:owner>
        <itunes:explicit>false</itunes:explicit>
                    <itunes:image href="https://episodes.castos.com/5f73fab2b5a771-62662091/images/Podcast-Artwork.png"></itunes:image>
        
                                    <itunes:category text="Technology" />
                                                <itunes:category text="Education">
                                            <itunes:category text="How To" />
                                    </itunes:category>
                                                <itunes:category text="News">
                                            <itunes:category text="Tech News" />
                                    </itunes:category>
                    
                    <itunes:new-feed-url>https://feeds.castos.com/npdq</itunes:new-feed-url>
                
        
        <podcast:locked>no</podcast:locked>
                                    <item>
                <title>
                    <![CDATA[Seven Tips to Help Seniors Avoid Scams (Episode 88)]]>
                </title>
                <pubDate>Tue, 14 Mar 2023 11:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/13478/episode/1443310</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/seven-tips-to-help-seniors-avoid-scams-episode-88</link>
                                <description>
                                            <![CDATA[<p>Scammers know exactly how to exploit trust, and for many older adults, that trust can come at a devastating cost. A simple phone call, a friendly message, or even a new “friend” can quickly turn into financial loss if the warning signs aren’t clear. Learn seven practical ways to protect the people you care about without taking away their independence. From spotting subtle red flags to putting smart safeguards in place, these strategies can make all the difference.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Scammers know exactly how to exploit trust, and for many older adults, that trust can come at a devastating cost. A simple phone call, a friendly message, or even a new “friend” can quickly turn into financial loss if the warning signs aren’t clear. Learn seven practical ways to protect the people you care about without taking away their independence. From spotting subtle red flags to putting smart safeguards in place, these strategies can make all the difference.]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Seven Tips to Help Seniors Avoid Scams (Episode 88)]]>
                </itunes:title>
                                    <itunes:episode>88</itunes:episode>
                                                    <itunes:season>4</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Scammers know exactly how to exploit trust, and for many older adults, that trust can come at a devastating cost. A simple phone call, a friendly message, or even a new “friend” can quickly turn into financial loss if the warning signs aren’t clear. Learn seven practical ways to protect the people you care about without taking away their independence. From spotting subtle red flags to putting smart safeguards in place, these strategies can make all the difference.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/1443310/Episode-88-Scams-Targeting-Seniors.mp3" length="22576192"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Scammers know exactly how to exploit trust, and for many older adults, that trust can come at a devastating cost. A simple phone call, a friendly message, or even a new “friend” can quickly turn into financial loss if the warning signs aren’t clear. Learn seven practical ways to protect the people you care about without taking away their independence. From spotting subtle red flags to putting smart safeguards in place, these strategies can make all the difference.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:15:26</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Six Strategies to Stay Safe During Tax Season (Episode 87)]]>
                </title>
                <pubDate>Tue, 28 Feb 2023 12:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/13478/episode/1426202</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/six-strategies-to-stay-safe-during-tax-season-episode-87</link>
                                <description>
                                            <![CDATA[]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Six Strategies to Stay Safe During Tax Season (Episode 87)]]>
                </itunes:title>
                                    <itunes:episode>87</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/1426202/Episode-87-Tax-Safety.mp3" length="26374464"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[]]>
                </itunes:summary>
                                                                            <itunes:duration>00:18:05</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[An Update on the Show]]>
                </title>
                <pubDate>Mon, 27 Feb 2023 10:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/13478/episode/1426019</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/an-update-on-the-show</link>
                                <description>
                                            <![CDATA[]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[]]>
                </itunes:subtitle>
                                    <itunes:episodeType>bonus</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[An Update on the Show]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/1426019/Episode-86b-CSMP-Is-Back.mp3" length="2226240"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[]]>
                </itunes:summary>
                                                                            <itunes:duration>00:01:32</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Five Strategies to Protect Your Privacy While Streaming Video (Episode 86)]]>
                </title>
                <pubDate>Mon, 07 Feb 2022 13:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/five-strategies-to-protect-your-privacy-while-streaming-video-episode-86</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/five-strategies-to-protect-your-privacy-while-streaming-video-episode-86</link>
                                <description>
                                            <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode86">https://www.cybersecuritymadepersonal.com/episode86</a></p>
<p>You have to sign in to use streaming services, but that means they can connect everything you watch (and practically every program you consider watching) back to your identity.  And since most streaming services share data with third-party advertisers, it can feel like you have to sacrifice your privacy in order to use them.  This episode will give you five strategies you can employ to reduce the data collected by streaming services.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode86
You have to sign in to use streaming services, but that means they can connect everything you watch (and practically every program you consider watching) back to your identity.  And since most streaming services share data with third-party advertisers, it can feel like you have to sacrifice your privacy in order to use them.  This episode will give you five strategies you can employ to reduce the data collected by streaming services.]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Five Strategies to Protect Your Privacy While Streaming Video (Episode 86)]]>
                </itunes:title>
                                    <itunes:episode>86</itunes:episode>
                                                    <itunes:season>4</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode86">https://www.cybersecuritymadepersonal.com/episode86</a></p>
<p>You have to sign in to use streaming services, but that means they can connect everything you watch (and practically every program you consider watching) back to your identity.  And since most streaming services share data with third-party advertisers, it can feel like you have to sacrifice your privacy in order to use them.  This episode will give you five strategies you can employ to reduce the data collected by streaming services.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/13478/79836b6a-054f-477d-b3af-6b82bb2644e3/Episode-86-Streaming-Privacy.mp3" length="25580736"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode86
You have to sign in to use streaming services, but that means they can connect everything you watch (and practically every program you consider watching) back to your identity.  And since most streaming services share data with third-party advertisers, it can feel like you have to sacrifice your privacy in order to use them.  This episode will give you five strategies you can employ to reduce the data collected by streaming services.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:17:45</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Six Creative Ways Companies Track You (Episode 85)]]>
                </title>
                <pubDate>Mon, 24 Jan 2022 13:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/six-creative-ways-companies-track-you-episode-85</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/six-creative-ways-companies-track-you-episode-85</link>
                                <description>
                                            <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode85">https://www.cybersecuritymadepersonal.com/episode85</a></p>
<p>Tracking happens everywhere, and data has become a currency of the internet age.  Meanwhile, companies are searching for more creative ways to track you.  Here are six creative ways that companies are gathering data about you.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode85
Tracking happens everywhere, and data has become a currency of the internet age.  Meanwhile, companies are searching for more creative ways to track you.  Here are six creative ways that companies are gathering data about you.]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Six Creative Ways Companies Track You (Episode 85)]]>
                </itunes:title>
                                    <itunes:episode>85</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode85">https://www.cybersecuritymadepersonal.com/episode85</a></p>
<p>Tracking happens everywhere, and data has become a currency of the internet age.  Meanwhile, companies are searching for more creative ways to track you.  Here are six creative ways that companies are gathering data about you.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/13478/75078096-d52d-4b8d-bd32-c42969b7189a/Episode-85-Sneaky-Tracking.mp3" length="26436096"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode85
Tracking happens everywhere, and data has become a currency of the internet age.  Meanwhile, companies are searching for more creative ways to track you.  Here are six creative ways that companies are gathering data about you.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:18:21</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Six Steps for Work from Home Safety (Episode 84)]]>
                </title>
                <pubDate>Mon, 10 Jan 2022 13:01:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/six-steps-for-work-from-home-safety-episode-84</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/six-steps-for-work-from-home-safety-episode-84</link>
                                <description>
                                            <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode84">https://www.cybersecuritymadepersonal.com/episode84</a>.</p>
<p>Working from home comes with many amazing benefits, but if you're not careful, it can also harm your personal security and your employer's security.  This episode will give you six steps you can take to keep your home office safe. </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode84.
Working from home comes with many amazing benefits, but if you're not careful, it can also harm your personal security and your employer's security.  This episode will give you six steps you can take to keep your home office safe. ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Six Steps for Work from Home Safety (Episode 84)]]>
                </itunes:title>
                                    <itunes:episode>84</itunes:episode>
                                                    <itunes:season>4</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode84">https://www.cybersecuritymadepersonal.com/episode84</a>.</p>
<p>Working from home comes with many amazing benefits, but if you're not careful, it can also harm your personal security and your employer's security.  This episode will give you six steps you can take to keep your home office safe. </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/13478/8868c94c-0b88-4d0c-80a0-b897da7ca91c/Episode-84-Work-from-Home-Safety.mp3" length="24226283"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode84.
Working from home comes with many amazing benefits, but if you're not careful, it can also harm your personal security and your employer's security.  This episode will give you six steps you can take to keep your home office safe. ]]>
                </itunes:summary>
                                                                            <itunes:duration>00:25:36</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Bonus:  Two Episodes of Two Minute Tech]]>
                </title>
                <pubDate>Sun, 09 Jan 2022 01:28:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/bonus-two-episodes-of-two-minute-tech</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/bonus-two-episodes-of-two-minute-tech</link>
                                <description>
                                            <![CDATA[<p>Subscribe to Two Minute Tech at <a href="https://plnk.to/two-minute-tech?to=page">https://plnk.to/two-minute-tech?to=page</a></p>
<p> </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Subscribe to Two Minute Tech at https://plnk.to/two-minute-tech?to=page
 ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>bonus</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Bonus:  Two Episodes of Two Minute Tech]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Subscribe to Two Minute Tech at <a href="https://plnk.to/two-minute-tech?to=page">https://plnk.to/two-minute-tech?to=page</a></p>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/13478/828b5491-72d0-4069-8d72-aab1a284f840/Episode-83b-TMT-Promo.mp3" length="8084928"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Subscribe to Two Minute Tech at https://plnk.to/two-minute-tech?to=page
 ]]>
                </itunes:summary>
                                                                            <itunes:duration>00:05:52</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Five Questions to Ask About Your Presents (Episode 83)]]>
                </title>
                <pubDate>Mon, 20 Dec 2021 13:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/five-questions-to-ask-about-your-presents-episode-83</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/five-questions-to-ask-about-your-presents-episode-83</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode83.</p>



<p>Later this week, millions of people will tear open packages and start enjoying their new presents.  However, in a world where practically everything is now connected, you need to check whether that new device actually cares about your privacy and security.  Learn five questions to ask as you evaluate your new presents.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode83.



Later this week, millions of people will tear open packages and start enjoying their new presents.  However, in a world where practically everything is now connected, you need to check whether that new device actually cares about your privacy and security.  Learn five questions to ask as you evaluate your new presents.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Five Questions to Ask About Your Presents (Episode 83)]]>
                </itunes:title>
                                    <itunes:episode>83</itunes:episode>
                                                    <itunes:season>4</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode83.</p>



<p>Later this week, millions of people will tear open packages and start enjoying their new presents.  However, in a world where practically everything is now connected, you need to check whether that new device actually cares about your privacy and security.  Learn five questions to ask as you evaluate your new presents.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/7aeb305e-a904-4dba-886c-5575267bc8dc-Episode-83-Questions-About-Presents.mp3" length="20493720"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode83.



Later this week, millions of people will tear open packages and start enjoying their new presents.  However, in a world where practically everything is now connected, you need to check whether that new device actually cares about your privacy and security.  Learn five questions to ask as you evaluate your new presents.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:16:53</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Six Steps to Protect Your Printer (Episode 82)]]>
                </title>
                <pubDate>Mon, 06 Dec 2021 13:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/six-steps-to-protect-your-printer-episode-82</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/six-steps-to-protect-your-printer-episode-82</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode82.</p>



<p>Printers are probably best known for not doing what you want them to do, but printers can also be compromised to print what someone else sends to them or to provide access to your devices.  In this episode, you’ll learn six steps you can take to protect your printer.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode82.



Printers are probably best known for not doing what you want them to do, but printers can also be compromised to print what someone else sends to them or to provide access to your devices.  In this episode, you’ll learn six steps you can take to protect your printer.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Six Steps to Protect Your Printer (Episode 82)]]>
                </itunes:title>
                                    <itunes:episode>82</itunes:episode>
                                                    <itunes:season>4</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode82.</p>



<p>Printers are probably best known for not doing what you want them to do, but printers can also be compromised to print what someone else sends to them or to provide access to your devices.  In this episode, you’ll learn six steps you can take to protect your printer.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/0037762f-cf9d-4886-b898-fe1360ec86e4-Episode-82-Protect-Printer.mp3" length="19715531"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode82.



Printers are probably best known for not doing what you want them to do, but printers can also be compromised to print what someone else sends to them or to provide access to your devices.  In this episode, you’ll learn six steps you can take to protect your printer.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:15:13</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Six Strategies to Protect Your Online Purchases (Episode 81)]]>
                </title>
                <pubDate>Mon, 22 Nov 2021 13:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/six-strategies-to-protect-your-online-purchases-episode-81</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/six-strategies-to-protect-your-online-purchases-episode-81</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode81</p>



<p>Shopping safely online does you no good if your packages end up stolen off of your front porch.  Since millions of packages go missing across America each day, this episode will give you six strategies you can employ to keep your deliveries safe.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode81



Shopping safely online does you no good if your packages end up stolen off of your front porch.  Since millions of packages go missing across America each day, this episode will give you six strategies you can employ to keep your deliveries safe.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Six Strategies to Protect Your Online Purchases (Episode 81)]]>
                </itunes:title>
                                    <itunes:episode>81</itunes:episode>
                                                    <itunes:season>4</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode81</p>



<p>Shopping safely online does you no good if your packages end up stolen off of your front porch.  Since millions of packages go missing across America each day, this episode will give you six strategies you can employ to keep your deliveries safe.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/1dec05b6-945e-48e3-a4d0-6852a733cf87-Episode-81-Protect-Packages.mp3" length="23991253"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode81



Shopping safely online does you no good if your packages end up stolen off of your front porch.  Since millions of packages go missing across America each day, this episode will give you six strategies you can employ to keep your deliveries safe.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:18:25</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Ten Tips for Safe Online Shopping (Episode 80)]]>
                </title>
                <pubDate>Mon, 08 Nov 2021 13:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/ten-tips-for-safe-online-shopping-episode-80</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/ten-tips-for-safe-online-shopping-episode-80</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode80.</p>



<p>Over the next two months, most people will go online to purchase at least some of their gifts.  While online shopping can be filled with threats and scams, it can also be a great place to find the gifts you want.  Come learn ten ways to protect yourself as you shop online this holiday.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode80.



Over the next two months, most people will go online to purchase at least some of their gifts.  While online shopping can be filled with threats and scams, it can also be a great place to find the gifts you want.  Come learn ten ways to protect yourself as you shop online this holiday.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Ten Tips for Safe Online Shopping (Episode 80)]]>
                </itunes:title>
                                    <itunes:episode>80</itunes:episode>
                                                    <itunes:season>4</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode80.</p>



<p>Over the next two months, most people will go online to purchase at least some of their gifts.  While online shopping can be filled with threats and scams, it can also be a great place to find the gifts you want.  Come learn ten ways to protect yourself as you shop online this holiday.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/fbedb418-7b12-4c46-9db5-58072a58349e-Episode-80-Shop-Safely.mp3" length="27061957"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode80.



Over the next two months, most people will go online to purchase at least some of their gifts.  While online shopping can be filled with threats and scams, it can also be a great place to find the gifts you want.  Come learn ten ways to protect yourself as you shop online this holiday.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:21:41</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Eight Strategies to Protect Your Privacy on Amazon (Episode 79)]]>
                </title>
                <pubDate>Mon, 25 Oct 2021 12:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/eight-strategies-to-protect-your-privacy-on-amazon-episode-79</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/eight-strategies-to-protect-your-privacy-on-amazon-episode-79</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode79.</p>



<p>As a merchant and a big tech company, Amazon has even more incentive to use your data for their own marketing.  However, you don’t have to give up your privacy to shop on Amazon or use its other products.  This episode will give you eight strategies you can employ to reduce the data Amazon collects.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode79.



As a merchant and a big tech company, Amazon has even more incentive to use your data for their own marketing.  However, you don’t have to give up your privacy to shop on Amazon or use its other products.  This episode will give you eight strategies you can employ to reduce the data Amazon collects.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Eight Strategies to Protect Your Privacy on Amazon (Episode 79)]]>
                </itunes:title>
                                    <itunes:episode>79</itunes:episode>
                                                    <itunes:season>4</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode79.</p>



<p>As a merchant and a big tech company, Amazon has even more incentive to use your data for their own marketing.  However, you don’t have to give up your privacy to shop on Amazon or use its other products.  This episode will give you eight strategies you can employ to reduce the data Amazon collects.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/0cfd93f4-c9b6-491a-b86c-ef6a8499c67f-Episode-79-Amazon-Privacy.mp3" length="24240179"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode79.



As a merchant and a big tech company, Amazon has even more incentive to use your data for their own marketing.  However, you don’t have to give up your privacy to shop on Amazon or use its other products.  This episode will give you eight strategies you can employ to reduce the data Amazon collects.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:18:37</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Five Ways Your Car Is Tracking You (Episode 78)]]>
                </title>
                <pubDate>Mon, 18 Oct 2021 12:50:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/five-ways-your-car-is-tracking-you-episode-78</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/five-ways-your-car-is-tracking-you-episode-78</link>
                                <description>
                                            <![CDATA[<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode78.</p>
<p>Your car goes practically everywhere you do, and it knows a lot about you. It might even collect data from your phone if you sync it with your car’s entertainment system. But of course, anything that has information about you will be a popular target for advertisers looking to turn that data into a quick dollar. Come learn about five ways your car could be tracking you, and how you can stop it.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode78.
Your car goes practically everywhere you do, and it knows a lot about you. It might even collect data from your phone if you sync it with your car’s entertainment system. But of course, anything that has information about you will be a popular target for advertisers looking to turn that data into a quick dollar. Come learn about five ways your car could be tracking you, and how you can stop it.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Five Ways Your Car Is Tracking You (Episode 78)]]>
                </itunes:title>
                                    <itunes:episode>78</itunes:episode>
                                                    <itunes:season>4</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode78.</p>
<p>Your car goes practically everywhere you do, and it knows a lot about you. It might even collect data from your phone if you sync it with your car’s entertainment system. But of course, anything that has information about you will be a popular target for advertisers looking to turn that data into a quick dollar. Come learn about five ways your car could be tracking you, and how you can stop it.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/7c5c16f9-2d9e-481f-ad99-8b65cbba230d-Episode-78-Car-Tracking-You.mp3" length="20820443"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode78.
Your car goes practically everywhere you do, and it knows a lot about you. It might even collect data from your phone if you sync it with your car’s entertainment system. But of course, anything that has information about you will be a popular target for advertisers looking to turn that data into a quick dollar. Come learn about five ways your car could be tracking you, and how you can stop it.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:16:36</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Five Ways to Search the Internet Privately (Episode 77)]]>
                </title>
                <pubDate>Mon, 11 Oct 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/five-ways-to-search-the-internet-privately-episode-77</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/five-ways-to-search-the-internet-privately-episode-77</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode77.</p>



<p>Google may not charge you to search the internet, but you have to pay with your personal information.  However, you don’t have to give up your personal data just to find information online.  This episode will give you five strategies for keeping big tech’s prying eyes away from every question you ask.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode77.



Google may not charge you to search the internet, but you have to pay with your personal information.  However, you don’t have to give up your personal data just to find information online.  This episode will give you five strategies for keeping big tech’s prying eyes away from every question you ask.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Five Ways to Search the Internet Privately (Episode 77)]]>
                </itunes:title>
                                    <itunes:episode>77</itunes:episode>
                                                    <itunes:season>4</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode77.</p>



<p>Google may not charge you to search the internet, but you have to pay with your personal information.  However, you don’t have to give up your personal data just to find information online.  This episode will give you five strategies for keeping big tech’s prying eyes away from every question you ask.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/457b2e7f-39d7-48bc-ac95-a48cebfc2b46-Episode-77-Keep-Searches-Private.mp3" length="26475504"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode77.



Google may not charge you to search the internet, but you have to pay with your personal information.  However, you don’t have to give up your personal data just to find information online.  This episode will give you five strategies for keeping big tech’s prying eyes away from every question you ask.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:21:21</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Six Dangerous Downloads You Should Avoid (Episode 76)]]>
                </title>
                <pubDate>Mon, 04 Oct 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/six-dangerous-downloads-you-should-avoid-episode-76</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/six-dangerous-downloads-you-should-avoid-episode-76</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode76.</p>



<p>Free software is wonderful, but not every free program available online is safe.  While any type of download could be dangerous, some types of software are more prone to malware and scams.  This episode will show you the common dangers with six types of software.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode76.



Free software is wonderful, but not every free program available online is safe.  While any type of download could be dangerous, some types of software are more prone to malware and scams.  This episode will show you the common dangers with six types of software.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Six Dangerous Downloads You Should Avoid (Episode 76)]]>
                </itunes:title>
                                    <itunes:episode>76</itunes:episode>
                                                    <itunes:season>4</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode76.</p>



<p>Free software is wonderful, but not every free program available online is safe.  While any type of download could be dangerous, some types of software are more prone to malware and scams.  This episode will show you the common dangers with six types of software.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/f9527706-fc32-4718-a0d5-d664cc7e270f-Episode-76-Dangerous-Downloads.mp3" length="23954064"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode76.



Free software is wonderful, but not every free program available online is safe.  While any type of download could be dangerous, some types of software are more prone to malware and scams.  This episode will show you the common dangers with six types of software.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:18:15</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[An Update on Cybersecurity Made Personal]]>
                </title>
                <pubDate>Sun, 03 Oct 2021 08:50:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/an-update-on-cybersecurity-made-personal</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/an-update-on-cybersecurity-made-personal</link>
                                <description>
                                            <![CDATA[<p>Some changes coming to the format and schedule of the podcast.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Some changes coming to the format and schedule of the podcast.]]>
                </itunes:subtitle>
                                    <itunes:episodeType>bonus</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[An Update on Cybersecurity Made Personal]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Some changes coming to the format and schedule of the podcast.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/6e9a4fca-2a2c-48ed-983b-65cdcc2b087e-Episode-75b-Season-Four-Update.mp3" length="3470976"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Some changes coming to the format and schedule of the podcast.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:02:44</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What to Do If You Fall for a Scam (Episode 75)]]>
                </title>
                <pubDate>Mon, 06 Sep 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/what-to-do-if-you-fall-for-a-scam-episode-75</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/what-to-do-if-you-fall-for-a-scam-episode-75</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode75.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode75.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What to Do If You Fall for a Scam (Episode 75)]]>
                </itunes:title>
                                    <itunes:episode>75</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode75.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/e2b2edf1-b8f6-406f-a9a5-8830a3d30540-Episode-75-You-Fell-for-a-Scam.mp3" length="29807520"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode75.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:26:23</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Four Methods to Protect Your Privacy on Google Maps (Episode 74)]]>
                </title>
                <pubDate>Mon, 30 Aug 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/four-methods-to-protect-your-privacy-on-google-maps-episode-74</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/four-methods-to-protect-your-privacy-on-google-maps-episode-74</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode74.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode74.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Four Methods to Protect Your Privacy on Google Maps (Episode 74)]]>
                </itunes:title>
                                    <itunes:episode>74</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode74.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/c6323a12-d9d7-41a7-9349-bde360985a69-Episode-74-Google-Maps-Privacy.mp3" length="26841792"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode74.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:23:08</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Ten Password Myths You Might Believe (Episode 73)]]>
                </title>
                <pubDate>Thu, 26 Aug 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/ten-password-myths-you-might-believe-episode-73</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/ten-password-myths-you-might-believe-episode-73</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode73.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode73.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Ten Password Myths You Might Believe (Episode 73)]]>
                </itunes:title>
                                    <itunes:episode>73</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode73.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/84a14783-e150-4d0c-96ec-f569d2ad54cd-Episode-73-Password-Myths.mp3" length="24331872"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode73.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:21:10</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Check Your Devices for Stalkerware (Episode 72)]]>
                </title>
                <pubDate>Mon, 23 Aug 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/how-to-check-your-devices-for-stalkerware-episode-72</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/how-to-check-your-devices-for-stalkerware-episode-72</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode72.</p>



<p>Social media has led to an increase in cyberstalking, tracking someone’s activity with the intent of harassing them.  And there are a number of apps that have made this process easier.  Learn how to identify the signs that your electronic devices may have been infected with stalkerware.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode72.



Social media has led to an increase in cyberstalking, tracking someone’s activity with the intent of harassing them.  And there are a number of apps that have made this process easier.  Learn how to identify the signs that your electronic devices may have been infected with stalkerware.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[How to Check Your Devices for Stalkerware (Episode 72)]]>
                </itunes:title>
                                    <itunes:episode>72</itunes:episode>
                                                    <itunes:season>4</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode72.</p>



<p>Social media has led to an increase in cyberstalking, tracking someone’s activity with the intent of harassing them.  And there are a number of apps that have made this process easier.  Learn how to identify the signs that your electronic devices may have been infected with stalkerware.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-72-Check-for-Stalkerware.mp3" length="32425547"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode72.



Social media has led to an increase in cyberstalking, tracking someone’s activity with the intent of harassing them.  And there are a number of apps that have made this process easier.  Learn how to identify the signs that your electronic devices may have been infected with stalkerware.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:26:49</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Seven Steps to Stay Safe on Campus (Episode 71)]]>
                </title>
                <pubDate>Mon, 16 Aug 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/seven-steps-to-stay-safe-on-campus-episode-71</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/seven-steps-to-stay-safe-on-campus-episode-71</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode71.</p>



<p>It’s back-to-school time, and that means many students are packing up heading off for college.  While keeping their online information safe may not be the top concern for many of these students, it is something that all college students should think about.  Learn seven tips for protecting yourself online while you’re on campus.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode71.



It’s back-to-school time, and that means many students are packing up heading off for college.  While keeping their online information safe may not be the top concern for many of these students, it is something that all college students should think about.  Learn seven tips for protecting yourself online while you’re on campus.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Seven Steps to Stay Safe on Campus (Episode 71)]]>
                </itunes:title>
                                    <itunes:episode>71</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode71.</p>



<p>It’s back-to-school time, and that means many students are packing up heading off for college.  While keeping their online information safe may not be the top concern for many of these students, it is something that all college students should think about.  Learn seven tips for protecting yourself online while you’re on campus.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-71-Back-to-School-Safety.mp3" length="28124051"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode71.



It’s back-to-school time, and that means many students are packing up heading off for college.  While keeping their online information safe may not be the top concern for many of these students, it is something that all college students should think about.  Learn seven tips for protecting yourself online while you’re on campus.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:22:36</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Six Benefits of Using a VPN (Episode 70)]]>
                </title>
                <pubDate>Mon, 09 Aug 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/six-benefits-of-using-a-vpn-episode-70</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/six-benefits-of-using-a-vpn-episode-70</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode70.</p>



<p>Most people think of VPNs as business tools that allow you to work from home.  However, a VPN is much more than just a business tool.  Using one personally can bring a number of privacy and security benefits. </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode70.



Most people think of VPNs as business tools that allow you to work from home.  However, a VPN is much more than just a business tool.  Using one personally can bring a number of privacy and security benefits. 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Six Benefits of Using a VPN (Episode 70)]]>
                </itunes:title>
                                    <itunes:episode>70</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode70.</p>



<p>Most people think of VPNs as business tools that allow you to work from home.  However, a VPN is much more than just a business tool.  Using one personally can bring a number of privacy and security benefits. </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-70-VPN-Use.mp3" length="29874803"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode70.



Most people think of VPNs as business tools that allow you to work from home.  However, a VPN is much more than just a business tool.  Using one personally can bring a number of privacy and security benefits. 
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:26:46</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Eight Ways to Protect Your Child's School Data (Episode 69)]]>
                </title>
                <pubDate>Mon, 02 Aug 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/eight-ways-to-protect-your-childs-school-data-episode-69</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/eight-ways-to-protect-your-childs-school-data-episode-69</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode69.</p>



<p>Your child’s privacy is probably just as important (if not more important) to you than your own privacy.  When it comes to protecting the privacy of your child’s educational data, many things may feel out of your control.  However, you don’t have to feel helpless.  Learn eight ways you can take control of your child’s educational privacy.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode69.



Your child’s privacy is probably just as important (if not more important) to you than your own privacy.  When it comes to protecting the privacy of your child’s educational data, many things may feel out of your control.  However, you don’t have to feel helpless.  Learn eight ways you can take control of your child’s educational privacy.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Eight Ways to Protect Your Child's School Data (Episode 69)]]>
                </itunes:title>
                                    <itunes:episode>69</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode69.</p>



<p>Your child’s privacy is probably just as important (if not more important) to you than your own privacy.  When it comes to protecting the privacy of your child’s educational data, many things may feel out of your control.  However, you don’t have to feel helpless.  Learn eight ways you can take control of your child’s educational privacy.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-69-Protect-School-Records.mp3" length="33784499"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode69.



Your child’s privacy is probably just as important (if not more important) to you than your own privacy.  When it comes to protecting the privacy of your child’s educational data, many things may feel out of your control.  However, you don’t have to feel helpless.  Learn eight ways you can take control of your child’s educational privacy.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:27:07</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Six Signs a Privacy Policy is a Bad Deal (Episode 68)]]>
                </title>
                <pubDate>Mon, 26 Jul 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/six-signs-a-privacy-policy-is-a-bad-deal-episode-68</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/six-signs-a-privacy-policy-is-a-bad-deal-episode-68</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode68.</p>



<p>Privacy policies aren’t something that you can ignore.  You need to check them out if you want to make sure that the company will actually protect your privacy.  But what do you look for?  Here are six ways you can tell a privacy policy is a bad deal for you.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode68.



Privacy policies aren’t something that you can ignore.  You need to check them out if you want to make sure that the company will actually protect your privacy.  But what do you look for?  Here are six ways you can tell a privacy policy is a bad deal for you.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Six Signs a Privacy Policy is a Bad Deal (Episode 68)]]>
                </itunes:title>
                                    <itunes:episode>68</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode68.</p>



<p>Privacy policies aren’t something that you can ignore.  You need to check them out if you want to make sure that the company will actually protect your privacy.  But what do you look for?  Here are six ways you can tell a privacy policy is a bad deal for you.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-68-Bad-Privacy-Policy.mp3" length="32044667"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode68.



Privacy policies aren’t something that you can ignore.  You need to check them out if you want to make sure that the company will actually protect your privacy.  But what do you look for?  Here are six ways you can tell a privacy policy is a bad deal for you.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:27:07</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Evaluate a Link for Safety (Episode 67)]]>
                </title>
                <pubDate>Mon, 19 Jul 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/how-to-evaluate-a-link-for-safety-episode-67</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/how-to-evaluate-a-link-for-safety-episode-67</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode67.</p>



<p>You received a link in your email.  The message came from someone you know, so you think the link might be safe, but you’re not sure.  How can you evaluate it to determine whether or not it is safe?  This episode will teach you how to break down a link to determine whether it is safe or not.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode67.



You received a link in your email.  The message came from someone you know, so you think the link might be safe, but you’re not sure.  How can you evaluate it to determine whether or not it is safe?  This episode will teach you how to break down a link to determine whether it is safe or not.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[How to Evaluate a Link for Safety (Episode 67)]]>
                </itunes:title>
                                    <itunes:episode>67</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode67.</p>



<p>You received a link in your email.  The message came from someone you know, so you think the link might be safe, but you’re not sure.  How can you evaluate it to determine whether or not it is safe?  This episode will teach you how to break down a link to determine whether it is safe or not.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-67-Safe-Links.mp3" length="29013011"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode67.



You received a link in your email.  The message came from someone you know, so you think the link might be safe, but you’re not sure.  How can you evaluate it to determine whether or not it is safe?  This episode will teach you how to break down a link to determine whether it is safe or not.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:24:26</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Five Strategies to Stop Spam (Episode 66)]]>
                </title>
                <pubDate>Mon, 12 Jul 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/five-strategies-to-stop-spam-episode-66</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/five-strategies-to-stop-spam-episode-66</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode66.</p>



<p>Spam is usually just annoying marketing emails from unscrupulous sellers.  But in some cases, spam can be much more malicious.  Whether it’s annoying or malicious, this episode will give you five strategies you can employ to deal with spam emails.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode66.



Spam is usually just annoying marketing emails from unscrupulous sellers.  But in some cases, spam can be much more malicious.  Whether it’s annoying or malicious, this episode will give you five strategies you can employ to deal with spam emails.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Five Strategies to Stop Spam (Episode 66)]]>
                </itunes:title>
                                    <itunes:episode>66</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode66.</p>



<p>Spam is usually just annoying marketing emails from unscrupulous sellers.  But in some cases, spam can be much more malicious.  Whether it’s annoying or malicious, this episode will give you five strategies you can employ to deal with spam emails.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-66-Stop-Spam.mp3" length="27577499"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode66.



Spam is usually just annoying marketing emails from unscrupulous sellers.  But in some cases, spam can be much more malicious.  Whether it’s annoying or malicious, this episode will give you five strategies you can employ to deal with spam emails.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:22:28</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Prepare for a Power Outage (Episode 65)]]>
                </title>
                <pubDate>Mon, 05 Jul 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/how-to-prepare-for-a-power-outage-episode-65</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/how-to-prepare-for-a-power-outage-episode-65</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode65.</p>



<p>Power outages are an inconvenience, but in some extreme cases, they can be serious or even life threatening.  This episode will cover how you can prepare to keep power running to your critical systems when the power is off.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode65.



Power outages are an inconvenience, but in some extreme cases, they can be serious or even life threatening.  This episode will cover how you can prepare to keep power running to your critical systems when the power is off.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[How to Prepare for a Power Outage (Episode 65)]]>
                </itunes:title>
                                    <itunes:episode>65</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode65.</p>



<p>Power outages are an inconvenience, but in some extreme cases, they can be serious or even life threatening.  This episode will cover how you can prepare to keep power running to your critical systems when the power is off.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-65-Power-Outage.mp3" length="28692491"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode65.



Power outages are an inconvenience, but in some extreme cases, they can be serious or even life threatening.  This episode will cover how you can prepare to keep power running to your critical systems when the power is off.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:23:20</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Five Steps to Protect Your Video Doorbell (Episode 64)]]>
                </title>
                <pubDate>Mon, 28 Jun 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/five-steps-to-protect-your-video-doorbell-episode-64</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/five-steps-to-protect-your-video-doorbell-episode-64</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode64.</p>



<p>Video doorbells are incredibly useful devices.  They let you know when someone comes by your house and they also help keep your packages safe when you’re not home.  However, if you’re not careful, your doorbell could be a way for someone to get into your life.  This episode will cover five steps you can take to protect your video doorbell.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode64.



Video doorbells are incredibly useful devices.  They let you know when someone comes by your house and they also help keep your packages safe when you’re not home.  However, if you’re not careful, your doorbell could be a way for someone to get into your life.  This episode will cover five steps you can take to protect your video doorbell.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Five Steps to Protect Your Video Doorbell (Episode 64)]]>
                </itunes:title>
                                    <itunes:episode>64</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode64.</p>



<p>Video doorbells are incredibly useful devices.  They let you know when someone comes by your house and they also help keep your packages safe when you’re not home.  However, if you’re not careful, your doorbell could be a way for someone to get into your life.  This episode will cover five steps you can take to protect your video doorbell.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-64-Protect-Video-Doorbell.mp3" length="25988099"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode64.



Video doorbells are incredibly useful devices.  They let you know when someone comes by your house and they also help keep your packages safe when you’re not home.  However, if you’re not careful, your doorbell could be a way for someone to get into your life.  This episode will cover five steps you can take to protect your video doorbell.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:21:10</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Deal with Cookies (Episode 63)]]>
                </title>
                <pubDate>Mon, 21 Jun 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/how-to-deal-with-cookies-episode-63</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/how-to-deal-with-cookies-episode-63</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https;//www.cybersecuritymadepersonal.com/episode63.</p>



<p></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https;//www.cybersecuritymadepersonal.com/episode63.




]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[How to Deal with Cookies (Episode 63)]]>
                </itunes:title>
                                    <itunes:episode>63</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https;//www.cybersecuritymadepersonal.com/episode63.</p>



<p></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-63-Fight-Back-Against-Cookies.mp3" length="33675443"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https;//www.cybersecuritymadepersonal.com/episode63.




]]>
                </itunes:summary>
                                                                            <itunes:duration>00:25:40</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Get Away from Big Tech (Episode 62)]]>
                </title>
                <pubDate>Mon, 14 Jun 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/how-to-get-away-from-big-tech-episode-62</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/how-to-get-away-from-big-tech-episode-62</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode62.</p>



<p>The Big Tech companies have created wonderful (and in many cases, free) products, but they come at a cost:  your privacy.  Some people are fine with giving up a bit of privacy for the benefits their services provide.  However, others may want to reduce their reliance on the big tech companies.  If you fall in the latter group, this episode will give you alternatives that will protect your privacy.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode62.



The Big Tech companies have created wonderful (and in many cases, free) products, but they come at a cost:  your privacy.  Some people are fine with giving up a bit of privacy for the benefits their services provide.  However, others may want to reduce their reliance on the big tech companies.  If you fall in the latter group, this episode will give you alternatives that will protect your privacy.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[How to Get Away from Big Tech (Episode 62)]]>
                </itunes:title>
                                    <itunes:episode>62</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode62.</p>



<p>The Big Tech companies have created wonderful (and in many cases, free) products, but they come at a cost:  your privacy.  Some people are fine with giving up a bit of privacy for the benefits their services provide.  However, others may want to reduce their reliance on the big tech companies.  If you fall in the latter group, this episode will give you alternatives that will protect your privacy.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-62-Get-Away-from-Big-Tech.mp3" length="35465544"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode62.



The Big Tech companies have created wonderful (and in many cases, free) products, but they come at a cost:  your privacy.  Some people are fine with giving up a bit of privacy for the benefits their services provide.  However, others may want to reduce their reliance on the big tech companies.  If you fall in the latter group, this episode will give you alternatives that will protect your privacy.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:28:42</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Protecting the Data on your Broken Phone (Episode 61)]]>
                </title>
                <pubDate>Mon, 07 Jun 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/protecting-the-data-on-your-broken-phone-episode-61</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/protecting-the-data-on-your-broken-phone-episode-61</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode61.</p>



<p>In episode 20, we discussed what to do to protect the data on devices before you get rid of them.  However, those steps assume that you have a device that is working.  However, don’t worry.  If your phone or tablet is broken, there’s still steps you can take to protect your data.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode61.



In episode 20, we discussed what to do to protect the data on devices before you get rid of them.  However, those steps assume that you have a device that is working.  However, don’t worry.  If your phone or tablet is broken, there’s still steps you can take to protect your data.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Protecting the Data on your Broken Phone (Episode 61)]]>
                </itunes:title>
                                    <itunes:episode>61</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode61.</p>



<p>In episode 20, we discussed what to do to protect the data on devices before you get rid of them.  However, those steps assume that you have a device that is working.  However, don’t worry.  If your phone or tablet is broken, there’s still steps you can take to protect your data.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-61-Protect-Broken-Phone.mp3" length="27333576"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode61.



In episode 20, we discussed what to do to protect the data on devices before you get rid of them.  However, those steps assume that you have a device that is working.  However, don’t worry.  If your phone or tablet is broken, there’s still steps you can take to protect your data.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:22:17</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Six Steps to Stay Safe While Travelling (Episode 60)]]>
                </title>
                <pubDate>Tue, 01 Jun 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/six-steps-to-stay-safe-while-travelling-episode-60</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/six-steps-to-stay-safe-while-travelling-episode-60</link>
                                <description>
                                            <![CDATA[<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode60.</p>
<p>This year, many people will spend some of their summer travelling. And given that many people weren’t able to travel last summer due to the pandemic, it seems that we could be set for record summer travel. However, when making your travel plans, don’t forget to plan for safety. This episode will cover six steps you can take to make sure you stay safe when you travel.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode60.
This year, many people will spend some of their summer travelling. And given that many people weren’t able to travel last summer due to the pandemic, it seems that we could be set for record summer travel. However, when making your travel plans, don’t forget to plan for safety. This episode will cover six steps you can take to make sure you stay safe when you travel.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Six Steps to Stay Safe While Travelling (Episode 60)]]>
                </itunes:title>
                                    <itunes:episode>60</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode60.</p>
<p>This year, many people will spend some of their summer travelling. And given that many people weren’t able to travel last summer due to the pandemic, it seems that we could be set for record summer travel. However, when making your travel plans, don’t forget to plan for safety. This episode will cover six steps you can take to make sure you stay safe when you travel.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-60-Travel-Safety.mp3" length="29823683"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode60.
This year, many people will spend some of their summer travelling. And given that many people weren’t able to travel last summer due to the pandemic, it seems that we could be set for record summer travel. However, when making your travel plans, don’t forget to plan for safety. This episode will cover six steps you can take to make sure you stay safe when you travel.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:24:29</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Seven Steps to Spring Clean Your Devices (Episode 59)]]>
                </title>
                <pubDate>Mon, 24 May 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/seven-steps-to-spring-clean-your-devices-episode-59</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/seven-steps-to-spring-clean-your-devices-episode-59</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode59.</p>



<p>Spring is a great time to get some cleaning done.  And as you’re busy cleaning, don’t forget to clean your tech!  This episode will cover seven ways you can give your devices a spring cleaning, both physically and virtually.  It’s good for your devices and it’s good for your security.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode59.



Spring is a great time to get some cleaning done.  And as you’re busy cleaning, don’t forget to clean your tech!  This episode will cover seven ways you can give your devices a spring cleaning, both physically and virtually.  It’s good for your devices and it’s good for your security.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Seven Steps to Spring Clean Your Devices (Episode 59)]]>
                </itunes:title>
                                    <itunes:episode>59</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode59.</p>



<p>Spring is a great time to get some cleaning done.  And as you’re busy cleaning, don’t forget to clean your tech!  This episode will cover seven ways you can give your devices a spring cleaning, both physically and virtually.  It’s good for your devices and it’s good for your security.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-59-Spring-Clean-Devices.mp3" length="28756440"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode59.



Spring is a great time to get some cleaning done.  And as you’re busy cleaning, don’t forget to clean your tech!  This episode will cover seven ways you can give your devices a spring cleaning, both physically and virtually.  It’s good for your devices and it’s good for your security.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:24:25</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[What Happened at the Pipeline?  (Episode 58)]]>
                </title>
                <pubDate>Mon, 17 May 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/what-happened-at-the-pipeline-episode-58</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/what-happened-at-the-pipeline-episode-58</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode58.</p>



<p>In this episode, we step away from our traditional format to examine what happened with the Colonial Pipeline ransomware attack, how we should respond, and what implications that holds for preventing future attacks against our critical infrastructure.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode58.



In this episode, we step away from our traditional format to examine what happened with the Colonial Pipeline ransomware attack, how we should respond, and what implications that holds for preventing future attacks against our critical infrastructure.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[What Happened at the Pipeline?  (Episode 58)]]>
                </itunes:title>
                                    <itunes:episode>58</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode58.</p>



<p>In this episode, we step away from our traditional format to examine what happened with the Colonial Pipeline ransomware attack, how we should respond, and what implications that holds for preventing future attacks against our critical infrastructure.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-58-Pipeline-Attack.mp3" length="15879803"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode58.



In this episode, we step away from our traditional format to examine what happened with the Colonial Pipeline ransomware attack, how we should respond, and what implications that holds for preventing future attacks against our critical infrastructure.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:16:43</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Seven Steps to Protect Your Smartwatch (Episode 57)]]>
                </title>
                <pubDate>Mon, 10 May 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/seven-steps-to-protect-your-smartwatch-episode-57</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/seven-steps-to-protect-your-smartwatch-episode-57</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode57.</p>



<p>Your smartwatch collects a lot of private data, including information about your health.  That means you must make sure you protect the data on it.  This episode will show you seven steps you can take to keep the information on your watch safe. </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode57.



Your smartwatch collects a lot of private data, including information about your health.  That means you must make sure you protect the data on it.  This episode will show you seven steps you can take to keep the information on your watch safe. 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Seven Steps to Protect Your Smartwatch (Episode 57)]]>
                </itunes:title>
                                    <itunes:episode>57</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode57.</p>



<p>Your smartwatch collects a lot of private data, including information about your health.  That means you must make sure you protect the data on it.  This episode will show you seven steps you can take to keep the information on your watch safe. </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-57-Protect-Smartwatch.mp3" length="21360299"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode57.



Your smartwatch collects a lot of private data, including information about your health.  That means you must make sure you protect the data on it.  This episode will show you seven steps you can take to keep the information on your watch safe. 
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:24:59</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Protect Your Privacy at the Public Library (Episode 56)]]>
                </title>
                <pubDate>Mon, 03 May 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/how-to-protect-your-privacy-at-the-public-library-episode-56</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/how-to-protect-your-privacy-at-the-public-library-episode-56</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode56.</p>



<p>The library has many amazing resources, but when you take advantage of those resources, you need to also make sure you take the right steps to stay safe.  This episode will teach you three different steps you can take to stay safe at your public library.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode56.



The library has many amazing resources, but when you take advantage of those resources, you need to also make sure you take the right steps to stay safe.  This episode will teach you three different steps you can take to stay safe at your public library.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[How to Protect Your Privacy at the Public Library (Episode 56)]]>
                </itunes:title>
                                    <itunes:episode>56</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode56.</p>



<p>The library has many amazing resources, but when you take advantage of those resources, you need to also make sure you take the right steps to stay safe.  This episode will teach you three different steps you can take to stay safe at your public library.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-56-Stay-Safe-at-Library.mp3" length="20448275"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode56.



The library has many amazing resources, but when you take advantage of those resources, you need to also make sure you take the right steps to stay safe.  This episode will teach you three different steps you can take to stay safe at your public library.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:23:30</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Five Mistakes That Could Compromise Your Phone (Episode 55)]]>
                </title>
                <pubDate>Mon, 26 Apr 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/five-mistakes-that-could-compromise-your-phone-episode-55</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/five-mistakes-that-could-compromise-your-phone-episode-55</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode55.</p>



<p>Everyone wants their data to stay private, but there are mistakes that you could be making that could compromise the security and privacy of everything on your phone.  This episode covers five of the most common mistakes you could be making that help give your information over to others.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode55.



Everyone wants their data to stay private, but there are mistakes that you could be making that could compromise the security and privacy of everything on your phone.  This episode covers five of the most common mistakes you could be making that help give your information over to others.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Five Mistakes That Could Compromise Your Phone (Episode 55)]]>
                </itunes:title>
                                    <itunes:episode>55</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode55.</p>



<p>Everyone wants their data to stay private, but there are mistakes that you could be making that could compromise the security and privacy of everything on your phone.  This episode covers five of the most common mistakes you could be making that help give your information over to others.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-55-Mistakes-that-Compromise-Phone.mp3" length="20276387"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode55.



Everyone wants their data to stay private, but there are mistakes that you could be making that could compromise the security and privacy of everything on your phone.  This episode covers five of the most common mistakes you could be making that help give your information over to others.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:24:04</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Six Tricks Used to Steal Your Money (Episode 54)]]>
                </title>
                <pubDate>Mon, 19 Apr 2021 22:37:58 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/six-tricks-used-to-steal-your-money-episode-54</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/six-tricks-used-to-steal-your-money-episode-54</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode54.</p>



<p>It would be nice if every scam phone call or email came with a warning, but unfortunately, that will never happen.  However, there are some common signs you can use that will help you detect the majority of scams.  This episode will teach you six of the most common signs of a scam.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode54.



It would be nice if every scam phone call or email came with a warning, but unfortunately, that will never happen.  However, there are some common signs you can use that will help you detect the majority of scams.  This episode will teach you six of the most common signs of a scam.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Six Tricks Used to Steal Your Money (Episode 54)]]>
                </itunes:title>
                                    <itunes:episode>54</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode54.</p>



<p>It would be nice if every scam phone call or email came with a warning, but unfortunately, that will never happen.  However, there are some common signs you can use that will help you detect the majority of scams.  This episode will teach you six of the most common signs of a scam.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-54-Scams-to-Steal-Money.mp3" length="23979888"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode54.



It would be nice if every scam phone call or email came with a warning, but unfortunately, that will never happen.  However, there are some common signs you can use that will help you detect the majority of scams.  This episode will teach you six of the most common signs of a scam.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:25:58</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Six Steps to Stay Safe on TikTok (Episode 53)]]>
                </title>
                <pubDate>Fri, 16 Apr 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/six-steps-to-stay-safe-on-tiktok-episode-53</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/six-steps-to-stay-safe-on-tiktok-episode-53</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode53.</p>



<p>TikTok is the hottest new social media site, but it’s also been very controversial.  If you choose to use TikTok, you need to take steps to remain safe.  This episode will cover six steps you should take to stay safe.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode53.



TikTok is the hottest new social media site, but it’s also been very controversial.  If you choose to use TikTok, you need to take steps to remain safe.  This episode will cover six steps you should take to stay safe.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Six Steps to Stay Safe on TikTok (Episode 53)]]>
                </itunes:title>
                                    <itunes:episode>53</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode53.</p>



<p>TikTok is the hottest new social media site, but it’s also been very controversial.  If you choose to use TikTok, you need to take steps to remain safe.  This episode will cover six steps you should take to stay safe.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-53-TikTok-Safety.mp3" length="19117056"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode53.



TikTok is the hottest new social media site, but it’s also been very controversial.  If you choose to use TikTok, you need to take steps to remain safe.  This episode will cover six steps you should take to stay safe.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:22:30</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Five Browser Extensions That Can Boost Your Security (Episode 52)]]>
                </title>
                <pubDate>Tue, 13 Apr 2021 23:26:06 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/five-browser-extensions-that-can-boost-your-security-episode-52</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/five-browser-extensions-that-can-boost-your-security-episode-52</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode52.</p>



<p>Browser extensions are one of the best innovations to come to web browsing, but did you know there are extensions you can use to improve your security?  This episode will teach you about five types of browser extensions you can use to improve your security.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode52.



Browser extensions are one of the best innovations to come to web browsing, but did you know there are extensions you can use to improve your security?  This episode will teach you about five types of browser extensions you can use to improve your security.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Five Browser Extensions That Can Boost Your Security (Episode 52)]]>
                </itunes:title>
                                    <itunes:episode>52</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode52.</p>



<p>Browser extensions are one of the best innovations to come to web browsing, but did you know there are extensions you can use to improve your security?  This episode will teach you about five types of browser extensions you can use to improve your security.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-52-Browser-Extensions-for-Security.mp3" length="23794883"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode52.



Browser extensions are one of the best innovations to come to web browsing, but did you know there are extensions you can use to improve your security?  This episode will teach you about five types of browser extensions you can use to improve your security.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:28:11</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Seven Reasons to Back Up Your Computer (Episode 51)]]>
                </title>
                <pubDate>Wed, 31 Mar 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/seven-reasons-to-back-up-your-computer-episode-51</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/seven-reasons-to-back-up-your-computer-episode-51</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode51.</p>



<p>Backing up your computer is usually one of those things you know you should do, but you just never get around to doing.  On World Backup Day, it’s a great time to put some thought into why you should back up your personal information.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode51.



Backing up your computer is usually one of those things you know you should do, but you just never get around to doing.  On World Backup Day, it’s a great time to put some thought into why you should back up your personal information.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Seven Reasons to Back Up Your Computer (Episode 51)]]>
                </itunes:title>
                                    <itunes:episode>51</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode51.</p>



<p>Backing up your computer is usually one of those things you know you should do, but you just never get around to doing.  On World Backup Day, it’s a great time to put some thought into why you should back up your personal information.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-51-Seven-Reasons-to-Back-Up.mp3" length="22751531"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode51.



Backing up your computer is usually one of those things you know you should do, but you just never get around to doing.  On World Backup Day, it’s a great time to put some thought into why you should back up your personal information.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:26:15</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Five Web Browser Privacy Settings to Check (Episode 50)]]>
                </title>
                <pubDate>Mon, 22 Feb 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/five-web-browser-privacy-settings-to-check-episode-50</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/five-web-browser-privacy-settings-to-check-episode-50</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode50</p>



<p>The fight for privacy online begins in your browser.  If you don’t configure your browser to protect your privacy, other changes you might make may not do much.  This episode will cover five privacy settings in your browser you need to check in order to ensure you keep your privacy protected.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode50



The fight for privacy online begins in your browser.  If you don’t configure your browser to protect your privacy, other changes you might make may not do much.  This episode will cover five privacy settings in your browser you need to check in order to ensure you keep your privacy protected.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Five Web Browser Privacy Settings to Check (Episode 50)]]>
                </itunes:title>
                                    <itunes:episode>50</itunes:episode>
                                                    <itunes:season>2</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode50</p>



<p>The fight for privacy online begins in your browser.  If you don’t configure your browser to protect your privacy, other changes you might make may not do much.  This episode will cover five privacy settings in your browser you need to check in order to ensure you keep your privacy protected.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-50-Browser-Privacy-Settings.mp3" length="21121355"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode50



The fight for privacy online begins in your browser.  If you don’t configure your browser to protect your privacy, other changes you might make may not do much.  This episode will cover five privacy settings in your browser you need to check in order to ensure you keep your privacy protected.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:24:43</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Protect Yourself from Tax Scams (Episode 49)]]>
                </title>
                <pubDate>Mon, 15 Feb 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/how-to-protect-yourself-from-tax-scams-episode-49</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/how-to-protect-yourself-from-tax-scams-episode-49</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode49</p>



<p>Tax season officially opened last week, when the IRS began accepting 2020 returns.  However, the IRS is not the only one interested in your tax and financial data.  There are scammers out there that want to steal your money or your private data.  This episode will cover four scams you need to be aware of.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode49



Tax season officially opened last week, when the IRS began accepting 2020 returns.  However, the IRS is not the only one interested in your tax and financial data.  There are scammers out there that want to steal your money or your private data.  This episode will cover four scams you need to be aware of.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[How to Protect Yourself from Tax Scams (Episode 49)]]>
                </itunes:title>
                                    <itunes:episode>49</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode49</p>



<p>Tax season officially opened last week, when the IRS began accepting 2020 returns.  However, the IRS is not the only one interested in your tax and financial data.  There are scammers out there that want to steal your money or your private data.  This episode will cover four scams you need to be aware of.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-49-Tax-Scams.mp3" length="21145104"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode49



Tax season officially opened last week, when the IRS began accepting 2020 returns.  However, the IRS is not the only one interested in your tax and financial data.  There are scammers out there that want to steal your money or your private data.  This episode will cover four scams you need to be aware of.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:24:33</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Five Ways a USB Flash Drive Can Be a Threat (Episode 48)]]>
                </title>
                <pubDate>Mon, 08 Feb 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/five-ways-a-usb-flash-drive-can-be-a-threat-episode-48</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/five-ways-a-usb-flash-drive-can-be-a-threat-episode-48</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode48.</p>



<p>USB flash drives are a convenient way to move data, and they’ve become extremely popular.  In fact, it’s likely that you probably have one or more flash drives sitting in your home.  However, your data could be threatened if you’re not careful with how you handle a flash drive.  This episode will show you five ways that a USB flash drive could be a threat to your data’s security.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode48.



USB flash drives are a convenient way to move data, and they’ve become extremely popular.  In fact, it’s likely that you probably have one or more flash drives sitting in your home.  However, your data could be threatened if you’re not careful with how you handle a flash drive.  This episode will show you five ways that a USB flash drive could be a threat to your data’s security.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Five Ways a USB Flash Drive Can Be a Threat (Episode 48)]]>
                </itunes:title>
                                    <itunes:episode>48</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode48.</p>



<p>USB flash drives are a convenient way to move data, and they’ve become extremely popular.  In fact, it’s likely that you probably have one or more flash drives sitting in your home.  However, your data could be threatened if you’re not careful with how you handle a flash drive.  This episode will show you five ways that a USB flash drive could be a threat to your data’s security.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-48-USB-Flash-Drive-Threats.mp3" length="20784720"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode48.



USB flash drives are a convenient way to move data, and they’ve become extremely popular.  In fact, it’s likely that you probably have one or more flash drives sitting in your home.  However, your data could be threatened if you’re not careful with how you handle a flash drive.  This episode will show you five ways that a USB flash drive could be a threat to your data’s security.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:24:57</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Hide Your Activity from your ISP (Episode 47)]]>
                </title>
                <pubDate>Mon, 01 Feb 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/how-to-hide-your-activity-from-your-isp-episode-47</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/how-to-hide-your-activity-from-your-isp-episode-47</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode47.</p>



<p>Your internet provider gets to handle all of your internet traffic, which means that one company sees everything you do online.  Since your ISP is now permitted to collect data about your internet activity and sell it, protecting your privacy demands that you take steps to keep your ISP from seeing your activity.  This episode will teach you three strategies to keep your ISP from seeing what you do.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode47.



Your internet provider gets to handle all of your internet traffic, which means that one company sees everything you do online.  Since your ISP is now permitted to collect data about your internet activity and sell it, protecting your privacy demands that you take steps to keep your ISP from seeing your activity.  This episode will teach you three strategies to keep your ISP from seeing what you do.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[How to Hide Your Activity from your ISP (Episode 47)]]>
                </itunes:title>
                                    <itunes:episode>47</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode47.</p>



<p>Your internet provider gets to handle all of your internet traffic, which means that one company sees everything you do online.  Since your ISP is now permitted to collect data about your internet activity and sell it, protecting your privacy demands that you take steps to keep your ISP from seeing your activity.  This episode will teach you three strategies to keep your ISP from seeing what you do.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-47-Hide-from-ISP.mp3" length="23740763"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode47.



Your internet provider gets to handle all of your internet traffic, which means that one company sees everything you do online.  Since your ISP is now permitted to collect data about your internet activity and sell it, protecting your privacy demands that you take steps to keep your ISP from seeing your activity.  This episode will teach you three strategies to keep your ISP from seeing what you do.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:27:36</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Three Threats That Can Come Through Text Messages (Episode 46)]]>
                </title>
                <pubDate>Mon, 25 Jan 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/three-threats-that-can-come-through-text-messages-episode-46</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/three-threats-that-can-come-through-text-messages-episode-46</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode46.</p>



<p>Text messaging was the second capability to come to our mobile phones (coming right after the old-fashioned phone call!), but that doesn’t mean that it’s free from it’s share of security problems.  This episode covers three threats that can come to you through text messaging.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode46.



Text messaging was the second capability to come to our mobile phones (coming right after the old-fashioned phone call!), but that doesn’t mean that it’s free from it’s share of security problems.  This episode covers three threats that can come to you through text messaging.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Three Threats That Can Come Through Text Messages (Episode 46)]]>
                </itunes:title>
                                    <itunes:episode>46</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode46.</p>



<p>Text messaging was the second capability to come to our mobile phones (coming right after the old-fashioned phone call!), but that doesn’t mean that it’s free from it’s share of security problems.  This episode covers three threats that can come to you through text messaging.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-46-Threats-by-Text.mp3" length="22378272"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode46.



Text messaging was the second capability to come to our mobile phones (coming right after the old-fashioned phone call!), but that doesn’t mean that it’s free from it’s share of security problems.  This episode covers three threats that can come to you through text messaging.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:26:11</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Six Steps to Protect Your Cloud Storage (Episode 45)]]>
                </title>
                <pubDate>Mon, 18 Jan 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/six-steps-to-protect-your-cloud-storage-episode-45</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/six-steps-to-protect-your-cloud-storage-episode-45</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode45.</p>



<p>Cloud storage is a convenient way to back up your files or share and collaborate with others.  However, you must be careful to set up your cloud storage correctly, and you need to know what you should store in the cloud and what is best left on your own devices.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode45.



Cloud storage is a convenient way to back up your files or share and collaborate with others.  However, you must be careful to set up your cloud storage correctly, and you need to know what you should store in the cloud and what is best left on your own devices.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Six Steps to Protect Your Cloud Storage (Episode 45)]]>
                </itunes:title>
                                    <itunes:episode>45</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode45.</p>



<p>Cloud storage is a convenient way to back up your files or share and collaborate with others.  However, you must be careful to set up your cloud storage correctly, and you need to know what you should store in the cloud and what is best left on your own devices.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-45-Protect-Cloud-Storage.mp3" length="20359907"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode45.



Cloud storage is a convenient way to back up your files or share and collaborate with others.  However, you must be careful to set up your cloud storage correctly, and you need to know what you should store in the cloud and what is best left on your own devices.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:23:50</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Six Methods for Staying Anonymous Online (Episode 44)]]>
                </title>
                <pubDate>Mon, 11 Jan 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/six-methods-for-staying-anonymous-online-episode-44</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/six-methods-for-staying-anonymous-online-episode-44</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode44.</p>



<p>There are many reasons why you might want to stay anonymous online.  You could want to hide your location or mask your data from the many data brokers.  Regardless of your reason, there are steps you can take to protect what other people and companies can find out about you.  This episode will cover six methods you can use to protect your anonymity.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode44.



There are many reasons why you might want to stay anonymous online.  You could want to hide your location or mask your data from the many data brokers.  Regardless of your reason, there are steps you can take to protect what other people and companies can find out about you.  This episode will cover six methods you can use to protect your anonymity.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Six Methods for Staying Anonymous Online (Episode 44)]]>
                </itunes:title>
                                    <itunes:episode>44</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode44.</p>



<p>There are many reasons why you might want to stay anonymous online.  You could want to hide your location or mask your data from the many data brokers.  Regardless of your reason, there are steps you can take to protect what other people and companies can find out about you.  This episode will cover six methods you can use to protect your anonymity.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-44-Stay-Private-Online.mp3" length="19007051"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode44.



There are many reasons why you might want to stay anonymous online.  You could want to hide your location or mask your data from the many data brokers.  Regardless of your reason, there are steps you can take to protect what other people and companies can find out about you.  This episode will cover six methods you can use to protect your anonymity.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:22:12</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Select the Best Home Security System (Episode 43)]]>
                </title>
                <pubDate>Mon, 04 Jan 2021 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/how-to-select-the-best-home-security-system-episode-43</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/how-to-select-the-best-home-security-system-episode-43</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode43.</p>



<p>A security system is a great asset to protect you and your home.  However, if you are purchasing it on your own, you must take the time to make sure you are purchasing the right system for your needs.  This episode will cover five steps to help you make sure that the system you purchase is actually what you need.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode43.



A security system is a great asset to protect you and your home.  However, if you are purchasing it on your own, you must take the time to make sure you are purchasing the right system for your needs.  This episode will cover five steps to help you make sure that the system you purchase is actually what you need.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[How to Select the Best Home Security System (Episode 43)]]>
                </itunes:title>
                                    <itunes:episode>43</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode43.</p>



<p>A security system is a great asset to protect you and your home.  However, if you are purchasing it on your own, you must take the time to make sure you are purchasing the right system for your needs.  This episode will cover five steps to help you make sure that the system you purchase is actually what you need.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-43-Select-Security-System.mp3" length="16569731"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode43.



A security system is a great asset to protect you and your home.  However, if you are purchasing it on your own, you must take the time to make sure you are purchasing the right system for your needs.  This episode will cover five steps to help you make sure that the system you purchase is actually what you need.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:19:05</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Stop Location Tracking (Episode 42)]]>
                </title>
                <pubDate>Mon, 21 Dec 2020 08:00:24 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/how-to-stop-location-tracking-episode-42</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/how-to-stop-location-tracking-episode-42</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode42.</p>



<p>It seems that every app on your phone wants to collect data about you.  One of the most sensitive forms of data that is commonly collected is your real-time location.  Using this data, advertising networks can get an idea of what stores you frequent and even send you ads for businesses you’re near.  You may not be able to completely eliminate location tracking, but If you don’t want data brokers collecting your location data, you can greatly limit the amount of data being collected.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode42.



It seems that every app on your phone wants to collect data about you.  One of the most sensitive forms of data that is commonly collected is your real-time location.  Using this data, advertising networks can get an idea of what stores you frequent and even send you ads for businesses you’re near.  You may not be able to completely eliminate location tracking, but If you don’t want data brokers collecting your location data, you can greatly limit the amount of data being collected.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[How to Stop Location Tracking (Episode 42)]]>
                </itunes:title>
                                    <itunes:episode>42</itunes:episode>
                                                    <itunes:season>3</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode42.</p>



<p>It seems that every app on your phone wants to collect data about you.  One of the most sensitive forms of data that is commonly collected is your real-time location.  Using this data, advertising networks can get an idea of what stores you frequent and even send you ads for businesses you’re near.  You may not be able to completely eliminate location tracking, but If you don’t want data brokers collecting your location data, you can greatly limit the amount of data being collected.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-42-Stop-Location-Tracking.mp3" length="18451328"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode42.



It seems that every app on your phone wants to collect data about you.  One of the most sensitive forms of data that is commonly collected is your real-time location.  Using this data, advertising networks can get an idea of what stores you frequent and even send you ads for businesses you’re near.  You may not be able to completely eliminate location tracking, but If you don’t want data brokers collecting your location data, you can greatly limit the amount of data being collected.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:19:13</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Remove Yourself from People Search Sites (Episode 41)]]>
                </title>
                <pubDate>Mon, 14 Dec 2020 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/how-to-remove-yourself-from-people-search-sites-episode-41</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/how-to-remove-yourself-from-people-search-sites-episode-41</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode41.</p>



<p>People search sites are run by data brokers, companies who aggregate large amounts of data about everyone.  However, those companies then make it available for anyone to search.  While much of this data is relatively benign, some of the information could be incorrect or misleading.  Today's episode shows you how you can remove your information from some of the most common people search sites.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode41.



People search sites are run by data brokers, companies who aggregate large amounts of data about everyone.  However, those companies then make it available for anyone to search.  While much of this data is relatively benign, some of the information could be incorrect or misleading.  Today's episode shows you how you can remove your information from some of the most common people search sites.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[How to Remove Yourself from People Search Sites (Episode 41)]]>
                </itunes:title>
                                    <itunes:episode>41</itunes:episode>
                                                    <itunes:season>2</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode41.</p>



<p>People search sites are run by data brokers, companies who aggregate large amounts of data about everyone.  However, those companies then make it available for anyone to search.  While much of this data is relatively benign, some of the information could be incorrect or misleading.  Today's episode shows you how you can remove your information from some of the most common people search sites.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-41-Remove-from-People-Search.mp3" length="22873088"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode41.



People search sites are run by data brokers, companies who aggregate large amounts of data about everyone.  However, those companies then make it available for anyone to search.  While much of this data is relatively benign, some of the information could be incorrect or misleading.  Today's episode shows you how you can remove your information from some of the most common people search sites.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:23:49</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Seven Steps to Protect Your Email Account (Episode 40)]]>
                </title>
                <pubDate>Mon, 07 Dec 2020 08:58:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/seven-steps-to-protect-your-email-account-episode-40</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/seven-steps-to-protect-your-email-account-episode-40</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode40.</p>

<p> </p>

<p>Your email account holds the keys to your digital kingdom. If your email account is compromised, an attacker could access almost every other account you own by requesting password reset links. Plus, many of the free email services scan your emails in order to sell you relevant advertising. This episode will give you seven steps to protect the security and privacy of your email account.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode40.

 

Your email account holds the keys to your digital kingdom. If your email account is compromised, an attacker could access almost every other account you own by requesting password reset links. Plus, many of the free email services scan your emails in order to sell you relevant advertising. This episode will give you seven steps to protect the security and privacy of your email account.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Seven Steps to Protect Your Email Account (Episode 40)]]>
                </itunes:title>
                                    <itunes:episode>40</itunes:episode>
                                                    <itunes:season>2</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode40.</p>

<p> </p>

<p>Your email account holds the keys to your digital kingdom. If your email account is compromised, an attacker could access almost every other account you own by requesting password reset links. Plus, many of the free email services scan your emails in order to sell you relevant advertising. This episode will give you seven steps to protect the security and privacy of your email account.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-40-Protect-Email.mp3" length="24881408"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode40.

 

Your email account holds the keys to your digital kingdom. If your email account is compromised, an attacker could access almost every other account you own by requesting password reset links. Plus, many of the free email services scan your emails in order to sell you relevant advertising. This episode will give you seven steps to protect the security and privacy of your email account.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:25:55</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Find Devices Using Your Wifi (Episode 39)]]>
                </title>
                <pubDate>Mon, 30 Nov 2020 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/how-to-find-devices-using-your-wifi-episode-39</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/how-to-find-devices-using-your-wifi-episode-39</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode39.</p>



<p>A person using your wifi could show down your network speed or conduct illegal activity that could be traced back to you.  If someone was using your internet connection, would you know how to stop that device's connection?  Would you even know how to find out if that device was on your network?  This episode will discuss how you can figure out if there are any extra devices using your wifi.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode39.



A person using your wifi could show down your network speed or conduct illegal activity that could be traced back to you.  If someone was using your internet connection, would you know how to stop that device's connection?  Would you even know how to find out if that device was on your network?  This episode will discuss how you can figure out if there are any extra devices using your wifi.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[How to Find Devices Using Your Wifi (Episode 39)]]>
                </itunes:title>
                                    <itunes:episode>39</itunes:episode>
                                                    <itunes:season>2</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode39.</p>



<p>A person using your wifi could show down your network speed or conduct illegal activity that could be traced back to you.  If someone was using your internet connection, would you know how to stop that device's connection?  Would you even know how to find out if that device was on your network?  This episode will discuss how you can figure out if there are any extra devices using your wifi.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-39-Find-Devices-on-Wifi.mp3" length="22083299"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode39.



A person using your wifi could show down your network speed or conduct illegal activity that could be traced back to you.  If someone was using your internet connection, would you know how to stop that device's connection?  Would you even know how to find out if that device was on your network?  This episode will discuss how you can figure out if there are any extra devices using your wifi.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:23:59</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Detect Hidden Cameras in Your Rentals (Episode 38)]]>
                </title>
                <pubDate>Mon, 23 Nov 2020 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/how-to-detect-hidden-cameras-in-your-rentals-episode-38</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/how-to-detect-hidden-cameras-in-your-rentals-episode-38</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode38.</p>



<p>While cameras hidden in hotel rooms or Airbnb rentals are rare, they aren't a problem you can completely ignore.  This episode will teach you how to detect hidden cameras when you arrive at your rentals.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode38.



While cameras hidden in hotel rooms or Airbnb rentals are rare, they aren't a problem you can completely ignore.  This episode will teach you how to detect hidden cameras when you arrive at your rentals.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[How to Detect Hidden Cameras in Your Rentals (Episode 38)]]>
                </itunes:title>
                                    <itunes:episode>38</itunes:episode>
                                                    <itunes:season>2</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode38.</p>



<p>While cameras hidden in hotel rooms or Airbnb rentals are rare, they aren't a problem you can completely ignore.  This episode will teach you how to detect hidden cameras when you arrive at your rentals.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-38-Find-Hidden-Cameras.mp3" length="19275776"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode38.



While cameras hidden in hotel rooms or Airbnb rentals are rare, they aren't a problem you can completely ignore.  This episode will teach you how to detect hidden cameras when you arrive at your rentals.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:20:04</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Five Steps to Protect Your Credit Report (Episode 37)]]>
                </title>
                <pubDate>Mon, 16 Nov 2020 08:00:14 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/five-steps-to-protect-your-credit-report-episode-37</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/five-steps-to-protect-your-credit-report-episode-37</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode37.</p>



<p>Your credit report is used for many purposes.  It helps banks decide whether to loan you money and how much to charge you for it.  But it can also affect many other areas of your life.  In this episode, you will learn five steps you can take to make sure that you protect your credit report and credit score from both identity fraud and inadvertent mistakes.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode37.



Your credit report is used for many purposes.  It helps banks decide whether to loan you money and how much to charge you for it.  But it can also affect many other areas of your life.  In this episode, you will learn five steps you can take to make sure that you protect your credit report and credit score from both identity fraud and inadvertent mistakes.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Five Steps to Protect Your Credit Report (Episode 37)]]>
                </itunes:title>
                                    <itunes:episode>37</itunes:episode>
                                                    <itunes:season>2</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode37.</p>



<p>Your credit report is used for many purposes.  It helps banks decide whether to loan you money and how much to charge you for it.  But it can also affect many other areas of your life.  In this episode, you will learn five steps you can take to make sure that you protect your credit report and credit score from both identity fraud and inadvertent mistakes.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-37-Protect-Credit.mp3" length="23092352"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode37.



Your credit report is used for many purposes.  It helps banks decide whether to loan you money and how much to charge you for it.  But it can also affect many other areas of your life.  In this episode, you will learn five steps you can take to make sure that you protect your credit report and credit score from both identity fraud and inadvertent mistakes.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:24:03</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Eight Things You Should Never Post Online (Episode 36)]]>
                </title>
                <pubDate>Mon, 09 Nov 2020 22:44:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/eight-things-you-should-never-post-online-episode-36</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/eight-things-you-should-never-post-online-episode-36</link>
                                <description>
                                            <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode36">https://www.cybersecuritymadepersonal.com/episode36</a>.</p>
<p> </p>
<p>Oversharing. You probably know people who have done it, and you might have even done it yourself. In an age of social media, it's easy to do. However, there are some things you should never share online. This episode will give you eight things that you should never share on social media.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode36.
 
Oversharing. You probably know people who have done it, and you might have even done it yourself. In an age of social media, it's easy to do. However, there are some things you should never share online. This episode will give you eight things that you should never share on social media.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Eight Things You Should Never Post Online (Episode 36)]]>
                </itunes:title>
                                    <itunes:episode>36</itunes:episode>
                                                    <itunes:season>2</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode36">https://www.cybersecuritymadepersonal.com/episode36</a>.</p>
<p> </p>
<p>Oversharing. You probably know people who have done it, and you might have even done it yourself. In an age of social media, it's easy to do. However, there are some things you should never share online. This episode will give you eight things that you should never share on social media.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-36-Never-Post-Online.mp3" length="19883771"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode36.
 
Oversharing. You probably know people who have done it, and you might have even done it yourself. In an age of social media, it's easy to do. However, there are some things you should never share online. This episode will give you eight things that you should never share on social media.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:21:53</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Secure Your Camera and Microphone (Episode 35)]]>
                </title>
                <pubDate>Mon, 02 Nov 2020 08:18:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/how-to-secure-your-camera-and-microphone-episode-35</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/how-to-secure-your-camera-and-microphone-episode-35</link>
                                <description>
                                            <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode35">https://www.cybersecuritymadepersonal.com/episode35</a>.</p>
<p> </p>
<p>Access to your camera and microphone give someone intimate access to your life. It is important that you take steps to keep others from accessing a video and audio stream of your life. This episode will give you four steps to take to protect your camera and microphone.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode35.
 
Access to your camera and microphone give someone intimate access to your life. It is important that you take steps to keep others from accessing a video and audio stream of your life. This episode will give you four steps to take to protect your camera and microphone.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[How to Secure Your Camera and Microphone (Episode 35)]]>
                </itunes:title>
                                    <itunes:episode>35</itunes:episode>
                                                    <itunes:season>2</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode35">https://www.cybersecuritymadepersonal.com/episode35</a>.</p>
<p> </p>
<p>Access to your camera and microphone give someone intimate access to your life. It is important that you take steps to keep others from accessing a video and audio stream of your life. This episode will give you four steps to take to protect your camera and microphone.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-35-Camera-and-Mic-Security.mp3" length="17827787"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode35.
 
Access to your camera and microphone give someone intimate access to your life. It is important that you take steps to keep others from accessing a video and audio stream of your life. This episode will give you four steps to take to protect your camera and microphone.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:20:23</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Five Things That Should Scare You Online (Episode 34)]]>
                </title>
                <pubDate>Thu, 29 Oct 2020 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/five-things-that-should-scare-you-online-episode-34</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/five-things-that-should-scare-you-online-episode-34</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode34.</p>

<p> </p>

<p>The internet is a wonderful place, but there are certain things that should concern you. For our last episode before Halloween, we discuss five things that should scare you online.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode34.

 

The internet is a wonderful place, but there are certain things that should concern you. For our last episode before Halloween, we discuss five things that should scare you online.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Five Things That Should Scare You Online (Episode 34)]]>
                </itunes:title>
                                    <itunes:episode>34</itunes:episode>
                                                    <itunes:season>2</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode34.</p>

<p> </p>

<p>The internet is a wonderful place, but there are certain things that should concern you. For our last episode before Halloween, we discuss five things that should scare you online.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-34-Final-Cut.mp3" length="23981664"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode34.

 

The internet is a wonderful place, but there are certain things that should concern you. For our last episode before Halloween, we discuss five things that should scare you online.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:25:36</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Eight Checks to Maximize Your Online Security (Episode 33)]]>
                </title>
                <pubDate>Mon, 26 Oct 2020 11:17:27 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/eight-checks-to-maximize-your-online-security-episode-33</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/eight-checks-to-maximize-your-online-security-episode-33</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode33.</p>



<p>Have you ever wondered if there were a few simple checks you could perform to maximize your online security and privacy?  In this episode, we give you eight quick security checks that you can perform in under an hour.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode33.



Have you ever wondered if there were a few simple checks you could perform to maximize your online security and privacy?  In this episode, we give you eight quick security checks that you can perform in under an hour.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Eight Checks to Maximize Your Online Security (Episode 33)]]>
                </itunes:title>
                                    <itunes:episode>33</itunes:episode>
                                                    <itunes:season>2</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode33.</p>



<p>Have you ever wondered if there were a few simple checks you could perform to maximize your online security and privacy?  In this episode, we give you eight quick security checks that you can perform in under an hour.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-33-Security-Checks.mp3" length="26287616"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode33.



Have you ever wondered if there were a few simple checks you could perform to maximize your online security and privacy?  In this episode, we give you eight quick security checks that you can perform in under an hour.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:27:22</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Six Steps for Protecting Your Car (Episode 32)]]>
                </title>
                <pubDate>Thu, 22 Oct 2020 11:29:09 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/six-steps-for-protecting-your-car-episode-32</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/six-steps-for-protecting-your-car-episode-32</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode32.</p>



<p>The ability to connect your phone to your car has opened up a new world for safety and convenience.  However, it has also opened the possibility to compromise of your data through your car.  But have you given any thought to the possibility that someone could hack your car, or even access your phone through its connection to your car?  This episode will teach you how to protect your car's entertainment system and the data it has about you.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode32.



The ability to connect your phone to your car has opened up a new world for safety and convenience.  However, it has also opened the possibility to compromise of your data through your car.  But have you given any thought to the possibility that someone could hack your car, or even access your phone through its connection to your car?  This episode will teach you how to protect your car's entertainment system and the data it has about you.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Six Steps for Protecting Your Car (Episode 32)]]>
                </itunes:title>
                                    <itunes:episode>32</itunes:episode>
                                                    <itunes:season>2</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode32.</p>



<p>The ability to connect your phone to your car has opened up a new world for safety and convenience.  However, it has also opened the possibility to compromise of your data through your car.  But have you given any thought to the possibility that someone could hack your car, or even access your phone through its connection to your car?  This episode will teach you how to protect your car's entertainment system and the data it has about you.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-32-Car-Security.mp3" length="22603904"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode32.



The ability to connect your phone to your car has opened up a new world for safety and convenience.  However, it has also opened the possibility to compromise of your data through your car.  But have you given any thought to the possibility that someone could hack your car, or even access your phone through its connection to your car?  This episode will teach you how to protect your car's entertainment system and the data it has about you.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:23:32</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Ten Steps for a Safe Device for Your Kids (Episode 31)]]>
                </title>
                <pubDate>Mon, 19 Oct 2020 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/ten-steps-for-a-safe-device-for-your-kids-episode-31</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/ten-steps-for-a-safe-device-for-your-kids-episode-31</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode31.</p>



<p>Your kids are just as vulnerable (if not more vulnerable) as you are online.  When you make the decision that it's time to give your kids their own device, it's important that you configure that device for their own security.  This episode will cover ten steps to safely configure a phone or tablet for your kids.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode31.



Your kids are just as vulnerable (if not more vulnerable) as you are online.  When you make the decision that it's time to give your kids their own device, it's important that you configure that device for their own security.  This episode will cover ten steps to safely configure a phone or tablet for your kids.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Ten Steps for a Safe Device for Your Kids (Episode 31)]]>
                </itunes:title>
                                    <itunes:episode>31</itunes:episode>
                                                    <itunes:season>2</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode31.</p>



<p>Your kids are just as vulnerable (if not more vulnerable) as you are online.  When you make the decision that it's time to give your kids their own device, it's important that you configure that device for their own security.  This episode will cover ten steps to safely configure a phone or tablet for your kids.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-31-Kids-Device-Setup.mp3" length="22585088"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode31.



Your kids are just as vulnerable (if not more vulnerable) as you are online.  When you make the decision that it's time to give your kids their own device, it's important that you configure that device for their own security.  This episode will cover ten steps to safely configure a phone or tablet for your kids.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:23:31</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Six Steps to Facebook Privacy (Episode 30)]]>
                </title>
                <pubDate>Thu, 15 Oct 2020 08:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/six-steps-to-facebook-privacy-episode-30</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/six-steps-to-facebook-privacy-episode-30</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode30.</p>

<p> </p>

<p>Almost everyone has a Facebook account, but most people have no idea how to keep that account safe. In this episode, you will learn six Facebook privacy settings to check so that you can ensure the information you post on Facebook remains private.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode30.

 

Almost everyone has a Facebook account, but most people have no idea how to keep that account safe. In this episode, you will learn six Facebook privacy settings to check so that you can ensure the information you post on Facebook remains private.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Six Steps to Facebook Privacy (Episode 30)]]>
                </itunes:title>
                                    <itunes:episode>30</itunes:episode>
                                                    <itunes:season>2</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode30.</p>

<p> </p>

<p>Almost everyone has a Facebook account, but most people have no idea how to keep that account safe. In this episode, you will learn six Facebook privacy settings to check so that you can ensure the information you post on Facebook remains private.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-30-Facebook-Privacy.mp3" length="20883200"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode30.

 

Almost everyone has a Facebook account, but most people have no idea how to keep that account safe. In this episode, you will learn six Facebook privacy settings to check so that you can ensure the information you post on Facebook remains private.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:21:45</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Six Steps to Protect Your IoT Devices (Episode 29)]]>
                </title>
                <pubDate>Mon, 12 Oct 2020 23:50:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/six-steps-to-protect-your-iot-devices-episode-29</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/six-steps-to-protect-your-iot-devices-episode-29</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode29.</p>

<p> </p>

<p>The proliferation of smart devices can bring amazing benefits, but it can also introduce new security risks into your network and devices. Many people have made mistakes in purchasing devices with poor security or configuring them incorrectly. This episode will give you six steps you can take to protect these devices.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode29.

 

The proliferation of smart devices can bring amazing benefits, but it can also introduce new security risks into your network and devices. Many people have made mistakes in purchasing devices with poor security or configuring them incorrectly. This episode will give you six steps you can take to protect these devices.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Six Steps to Protect Your IoT Devices (Episode 29)]]>
                </itunes:title>
                                    <itunes:episode>29</itunes:episode>
                                                    <itunes:season>2</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode29.</p>

<p> </p>

<p>The proliferation of smart devices can bring amazing benefits, but it can also introduce new security risks into your network and devices. Many people have made mistakes in purchasing devices with poor security or configuring them incorrectly. This episode will give you six steps you can take to protect these devices.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-29-IoT-Security.mp3" length="21133348"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode29.

 

The proliferation of smart devices can bring amazing benefits, but it can also introduce new security risks into your network and devices. Many people have made mistakes in purchasing devices with poor security or configuring them incorrectly. This episode will give you six steps you can take to protect these devices.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:21:53</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Eight Tips to Protect Your Privacy on Windows 10 (Episode 28)]]>
                </title>
                <pubDate>Thu, 08 Oct 2020 23:57:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/eight-tips-to-protect-your-privacy-on-windows-10-episode-28</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/eight-tips-to-protect-your-privacy-on-windows-10-episode-28</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode28.</p>

<p> </p>

<p>Microsoft used Windows 10 as the opportunity to advance further into data collection. While it is not possible to completely shut off this data collection, there are ways that you can minimize the data that Microsoft is collecting about you. This episode will cover eight settings you can change to reduce the data Microsoft collects about you.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode28.

 

Microsoft used Windows 10 as the opportunity to advance further into data collection. While it is not possible to completely shut off this data collection, there are ways that you can minimize the data that Microsoft is collecting about you. This episode will cover eight settings you can change to reduce the data Microsoft collects about you.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Eight Tips to Protect Your Privacy on Windows 10 (Episode 28)]]>
                </itunes:title>
                                    <itunes:episode>28</itunes:episode>
                                                    <itunes:season>2</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode28.</p>

<p> </p>

<p>Microsoft used Windows 10 as the opportunity to advance further into data collection. While it is not possible to completely shut off this data collection, there are ways that you can minimize the data that Microsoft is collecting about you. This episode will cover eight settings you can change to reduce the data Microsoft collects about you.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-28-Windows-10-Privacy.mp3" length="25472850"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode28.

 

Microsoft used Windows 10 as the opportunity to advance further into data collection. While it is not possible to completely shut off this data collection, there are ways that you can minimize the data that Microsoft is collecting about you. This episode will cover eight settings you can change to reduce the data Microsoft collects about you.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:26:24</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Six Steps to Protect Your Home Router (Episode 27)]]>
                </title>
                <pubDate>Mon, 05 Oct 2020 08:58:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/six-steps-to-protect-your-home-router-episode-27</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/six-steps-to-protect-your-home-router-episode-27</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode27.</p>

<p> </p>

<p>You probably don't think too much about your router. In fact, you might not even know if you have one. (Spoiler alert: if you have internet in your home, you do!) That little box manages all of your internet traffic, whether it's Baby Shark videos or credit card information. In this episode, you'll learn six steps to keep your router safe.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode27.

 

You probably don't think too much about your router. In fact, you might not even know if you have one. (Spoiler alert: if you have internet in your home, you do!) That little box manages all of your internet traffic, whether it's Baby Shark videos or credit card information. In this episode, you'll learn six steps to keep your router safe.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Six Steps to Protect Your Home Router (Episode 27)]]>
                </itunes:title>
                                    <itunes:episode>27</itunes:episode>
                                                    <itunes:season>2</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode27.</p>

<p> </p>

<p>You probably don't think too much about your router. In fact, you might not even know if you have one. (Spoiler alert: if you have internet in your home, you do!) That little box manages all of your internet traffic, whether it's Baby Shark videos or credit card information. In this episode, you'll learn six steps to keep your router safe.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-27-Protect-Home-Router.mp3" length="23071541"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode27.

 

You probably don't think too much about your router. In fact, you might not even know if you have one. (Spoiler alert: if you have internet in your home, you do!) That little box manages all of your internet traffic, whether it's Baby Shark videos or credit card information. In this episode, you'll learn six steps to keep your router safe.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:23:54</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Five Signs of Social Engineering (Episode 26)]]>
                </title>
                <pubDate>Thu, 01 Oct 2020 08:36:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/five-signs-of-social-engineering-episode-26</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/five-signs-of-social-engineering-episode-26</link>
                                <description>
                                            <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode26.</p>

<p> </p>

<p>Social engineering is one of the biggest threats you face online. When attackers can't find software problems, they will often turn to attacking human tendencies. This episode will make you aware of five common tactics that social engineers use to convince people to unwittingly hand over their personal information.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode26.

 

Social engineering is one of the biggest threats you face online. When attackers can't find software problems, they will often turn to attacking human tendencies. This episode will make you aware of five common tactics that social engineers use to convince people to unwittingly hand over their personal information.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Five Signs of Social Engineering (Episode 26)]]>
                </itunes:title>
                                    <itunes:episode>26</itunes:episode>
                                                    <itunes:season>2</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[
<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode26.</p>

<p> </p>

<p>Social engineering is one of the biggest threats you face online. When attackers can't find software problems, they will often turn to attacking human tendencies. This episode will make you aware of five common tactics that social engineers use to convince people to unwittingly hand over their personal information.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode-26-Signs-of-Social-Engineering.mp3" length="22084027"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Show notes available at https://www.cybersecuritymadepersonal.com/episode26.

 

Social engineering is one of the biggest threats you face online. When attackers can't find software problems, they will often turn to attacking human tendencies. This episode will make you aware of five common tactics that social engineers use to convince people to unwittingly hand over their personal information.
]]>
                </itunes:summary>
                                                                            <itunes:duration>00:22:55</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Ten Tips to Protect Your Mobile Devices (Episode 25)]]>
                </title>
                <pubDate>Mon, 24 Aug 2020 12:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/ten-tips-to-protect-your-mobile-devices-episode-25</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/ten-tips-to-protect-your-mobile-devices-episode-25</link>
                                <description>
                                            <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode25">https://www.cybersecuritymadepersonal.com/episode25</a>.</p>
<p>Our phones have become a central part of our lives, to the point where we’ve treat them like the slogan American Express popularized, “Don’t leave home without it!”  However, the immense amount of data we put into these devices means we must take extra precautions to protect the data.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode25.
Our phones have become a central part of our lives, to the point where we’ve treat them like the slogan American Express popularized, “Don’t leave home without it!”  However, the immense amount of data we put into these devices means we must take extra precautions to protect the data.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Ten Tips to Protect Your Mobile Devices (Episode 25)]]>
                </itunes:title>
                                    <itunes:episode>25</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode25">https://www.cybersecuritymadepersonal.com/episode25</a>.</p>
<p>Our phones have become a central part of our lives, to the point where we’ve treat them like the slogan American Express popularized, “Don’t leave home without it!”  However, the immense amount of data we put into these devices means we must take extra precautions to protect the data.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode_25_-_Protect_Mobile_Devices.mp3" length=""
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode25.
Our phones have become a central part of our lives, to the point where we’ve treat them like the slogan American Express popularized, “Don’t leave home without it!”  However, the immense amount of data we put into these devices means we must take extra precautions to protect the data.
]]>
                </itunes:summary>
                                                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Stay Safe when Dating Online (Episode 24)]]>
                </title>
                <pubDate>Mon, 17 Aug 2020 12:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/how-to-stay-safe-when-dating-online-episode-24</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/how-to-stay-safe-when-dating-online-episode-24</link>
                                <description>
                                            <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode24">https://www.cybersecuritymadepersonal.com/episode24</a>.</p>
<p>Online dating can bring great rewards, but also greater risk.  When you begin meeting new people both online and in person, you must take steps to protect yourself.  This episode will cover eight steps you can take to protect yourself in the world of online dating.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode24.
Online dating can bring great rewards, but also greater risk.  When you begin meeting new people both online and in person, you must take steps to protect yourself.  This episode will cover eight steps you can take to protect yourself in the world of online dating.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[How to Stay Safe when Dating Online (Episode 24)]]>
                </itunes:title>
                                    <itunes:episode>24</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode24">https://www.cybersecuritymadepersonal.com/episode24</a>.</p>
<p>Online dating can bring great rewards, but also greater risk.  When you begin meeting new people both online and in person, you must take steps to protect yourself.  This episode will cover eight steps you can take to protect yourself in the world of online dating.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode_24_-_Safely_Date_Online.mp3" length=""
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode24.
Online dating can bring great rewards, but also greater risk.  When you begin meeting new people both online and in person, you must take steps to protect yourself.  This episode will cover eight steps you can take to protect yourself in the world of online dating.
]]>
                </itunes:summary>
                                                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Effectively Backup Your Devices (Episode 23)]]>
                </title>
                <pubDate>Mon, 10 Aug 2020 12:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/how-to-effectively-backup-your-devices-episode-23</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/how-to-effectively-backup-your-devices-episode-23</link>
                                <description>
                                            <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode23">https://www.cybersecuritymadepersonal.com/episode23</a>.</p>
<p> </p>
<p>Keeping your data away from others does you no good if you can’t access the data yourself.  If you don’t know how to maintain backups of your data, you could find yourself without it when you need it most.  Learn how to effectively backup your data so that it can survive any possible loss.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode23.
 
Keeping your data away from others does you no good if you can’t access the data yourself.  If you don’t know how to maintain backups of your data, you could find yourself without it when you need it most.  Learn how to effectively backup your data so that it can survive any possible loss.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[How to Effectively Backup Your Devices (Episode 23)]]>
                </itunes:title>
                                    <itunes:episode>23</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode23">https://www.cybersecuritymadepersonal.com/episode23</a>.</p>
<p> </p>
<p>Keeping your data away from others does you no good if you can’t access the data yourself.  If you don’t know how to maintain backups of your data, you could find yourself without it when you need it most.  Learn how to effectively backup your data so that it can survive any possible loss.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode_23_-_Backup_Your_Devices.mp3" length=""
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode23.
 
Keeping your data away from others does you no good if you can’t access the data yourself.  If you don’t know how to maintain backups of your data, you could find yourself without it when you need it most.  Learn how to effectively backup your data so that it can survive any possible loss.
]]>
                </itunes:summary>
                                                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Spot Online Fakes – Part 2 (Episode 22)]]>
                </title>
                <pubDate>Mon, 03 Aug 2020 12:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/how-to-spot-online-fakes-part-2-episode-22</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/how-to-spot-online-fakes-part-2-episode-22</link>
                                <description>
                                            <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode22">https://www.cybersecuritymadepersonal.com/episode22</a>.</p>
<p> </p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode22.
 
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[How to Spot Online Fakes – Part 2 (Episode 22)]]>
                </itunes:title>
                                    <itunes:episode>22</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode22">https://www.cybersecuritymadepersonal.com/episode22</a>.</p>
<p> </p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode_22_-_How_to_Spot_Fakes_2.mp3" length=""
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode22.
 
 
]]>
                </itunes:summary>
                                                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Spot Online Fakes – Part 1 (Episode 21)]]>
                </title>
                <pubDate>Mon, 27 Jul 2020 12:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/how-to-spot-online-fakes-part-1-episode-21</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/how-to-spot-online-fakes-part-1-episode-21</link>
                                <description>
                                            <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode21">https://www.cybersecuritymadepersonal.com/episode21</a></p>
<p> </p>
<p>Fakes are everywhere online.  You can find fake products, fake reviews, fake emails, fake websites, fake apps, and even fake people (on social media).  Knowing how to spot fakes is an important part of remaining safe from the multitude of scams.  In part one, we cover the common signs of fake products, fake reviews, and fake emails.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode21
 
Fakes are everywhere online.  You can find fake products, fake reviews, fake emails, fake websites, fake apps, and even fake people (on social media).  Knowing how to spot fakes is an important part of remaining safe from the multitude of scams.  In part one, we cover the common signs of fake products, fake reviews, and fake emails.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[How to Spot Online Fakes – Part 1 (Episode 21)]]>
                </itunes:title>
                                    <itunes:episode>21</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode21">https://www.cybersecuritymadepersonal.com/episode21</a></p>
<p> </p>
<p>Fakes are everywhere online.  You can find fake products, fake reviews, fake emails, fake websites, fake apps, and even fake people (on social media).  Knowing how to spot fakes is an important part of remaining safe from the multitude of scams.  In part one, we cover the common signs of fake products, fake reviews, and fake emails.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode_21_-_How_to_Spot_Fakes_1.mp3" length=""
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode21
 
Fakes are everywhere online.  You can find fake products, fake reviews, fake emails, fake websites, fake apps, and even fake people (on social media).  Knowing how to spot fakes is an important part of remaining safe from the multitude of scams.  In part one, we cover the common signs of fake products, fake reviews, and fake emails.
]]>
                </itunes:summary>
                                                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Safely Dispose of an Old Device (Episode 20)]]>
                </title>
                <pubDate>Mon, 20 Jul 2020 12:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/how-to-safely-dispose-of-an-old-device-episode-20</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/how-to-safely-dispose-of-an-old-device-episode-20</link>
                                <description>
                                            <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode20">https://www.cybersecuritymadepersonal.com/episode20</a>.</p>
<p>When the time comes to retire an old device, you need to take steps to ensure your personal information does not fall into the wrong hands.  Simply deleting your data from the device is not enough because it does not actually remove your data right away.  Learn how to protect your data and ensure it cannot be recovered by whoever gets your device.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode20.
When the time comes to retire an old device, you need to take steps to ensure your personal information does not fall into the wrong hands.  Simply deleting your data from the device is not enough because it does not actually remove your data right away.  Learn how to protect your data and ensure it cannot be recovered by whoever gets your device.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[How to Safely Dispose of an Old Device (Episode 20)]]>
                </itunes:title>
                                    <itunes:episode>20</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode20">https://www.cybersecuritymadepersonal.com/episode20</a>.</p>
<p>When the time comes to retire an old device, you need to take steps to ensure your personal information does not fall into the wrong hands.  Simply deleting your data from the device is not enough because it does not actually remove your data right away.  Learn how to protect your data and ensure it cannot be recovered by whoever gets your device.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode_20_-_Stay_Safe_when_Discarding_Device.mp3" length=""
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode20.
When the time comes to retire an old device, you need to take steps to ensure your personal information does not fall into the wrong hands.  Simply deleting your data from the device is not enough because it does not actually remove your data right away.  Learn how to protect your data and ensure it cannot be recovered by whoever gets your device.
]]>
                </itunes:summary>
                                                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Eight Tips to Stay Safe when Shopping Online (Episode 19)]]>
                </title>
                <pubDate>Mon, 13 Jul 2020 12:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/eight-tips-to-stay-safe-when-shopping-online-episode-19</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/eight-tips-to-stay-safe-when-shopping-online-episode-19</link>
                                <description>
                                            <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode19">https://www.cybersecuritymadepersonal.com/episode19</a>.</p>
<p>Shopping online is convenient, but with reports of data breaches at major stores on an almost weekly basis, it can feel more like gambling with your personal information every time you buy online.  While you can’t control if a site gets compromised, you can limit the information a store collects on you.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode19.
Shopping online is convenient, but with reports of data breaches at major stores on an almost weekly basis, it can feel more like gambling with your personal information every time you buy online.  While you can’t control if a site gets compromised, you can limit the information a store collects on you.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Eight Tips to Stay Safe when Shopping Online (Episode 19)]]>
                </itunes:title>
                                    <itunes:episode>19</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode19">https://www.cybersecuritymadepersonal.com/episode19</a>.</p>
<p>Shopping online is convenient, but with reports of data breaches at major stores on an almost weekly basis, it can feel more like gambling with your personal information every time you buy online.  While you can’t control if a site gets compromised, you can limit the information a store collects on you.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode_19_-_Stay_Safe_when_Shopping_Online.mp3" length=""
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode19.
Shopping online is convenient, but with reports of data breaches at major stores on an almost weekly basis, it can feel more like gambling with your personal information every time you buy online.  While you can’t control if a site gets compromised, you can limit the information a store collects on you.
]]>
                </itunes:summary>
                                                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Protect Your Privacy with a Digital Assistant (Episode 18)]]>
                </title>
                <pubDate>Mon, 06 Jul 2020 12:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/how-to-protect-your-privacy-with-a-digital-assistant-episode-18</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/how-to-protect-your-privacy-with-a-digital-assistant-episode-18</link>
                                <description>
                                            <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode18">https://www.cybersecuritymadepersonal.com/episode18</a></p>
<p>Digital assistants can be extremely useful devices, but they also come with the potential to collect vast amounts of data on you.  You don’t have to make a choice between usefulness and privacy.  Learn how you can protect your privacy while still taking advantage of the benefits these devices have to offer.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode18
Digital assistants can be extremely useful devices, but they also come with the potential to collect vast amounts of data on you.  You don’t have to make a choice between usefulness and privacy.  Learn how you can protect your privacy while still taking advantage of the benefits these devices have to offer.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[How to Protect Your Privacy with a Digital Assistant (Episode 18)]]>
                </itunes:title>
                                    <itunes:episode>18</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode18">https://www.cybersecuritymadepersonal.com/episode18</a></p>
<p>Digital assistants can be extremely useful devices, but they also come with the potential to collect vast amounts of data on you.  You don’t have to make a choice between usefulness and privacy.  Learn how you can protect your privacy while still taking advantage of the benefits these devices have to offer.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode_18_-_Stay_Safe_with_Digital_Assistants.mp3" length=""
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode18
Digital assistants can be extremely useful devices, but they also come with the potential to collect vast amounts of data on you.  You don’t have to make a choice between usefulness and privacy.  Learn how you can protect your privacy while still taking advantage of the benefits these devices have to offer.
]]>
                </itunes:summary>
                                                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Protecting Your Accounts with Two-Factor Authentication (Episode 17)]]>
                </title>
                <pubDate>Mon, 29 Jun 2020 12:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/protecting-your-accounts-with-two-factor-authentication-episode-17</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/protecting-your-accounts-with-two-factor-authentication-episode-17</link>
                                <description>
                                            <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode17">https://www.cybersecuritymadepersonal.com/episode17</a>.</p>
<p> No matter how strong you make your password, there is always the possibility it could be compromised.  (But that still doesn’t give you an excuse to use bad passwords.)  However, two-factor authentication can help keep your account secure, even if your password is compromised.  </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode17.
 No matter how strong you make your password, there is always the possibility it could be compromised.  (But that still doesn’t give you an excuse to use bad passwords.)  However, two-factor authentication can help keep your account secure, even if your password is compromised.  
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Protecting Your Accounts with Two-Factor Authentication (Episode 17)]]>
                </itunes:title>
                                    <itunes:episode>17</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode17">https://www.cybersecuritymadepersonal.com/episode17</a>.</p>
<p> No matter how strong you make your password, there is always the possibility it could be compromised.  (But that still doesn’t give you an excuse to use bad passwords.)  However, two-factor authentication can help keep your account secure, even if your password is compromised.  </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode_17_-_Two_Factor_Authentication.mp3" length=""
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode17.
 No matter how strong you make your password, there is always the possibility it could be compromised.  (But that still doesn’t give you an excuse to use bad passwords.)  However, two-factor authentication can help keep your account secure, even if your password is compromised.  
]]>
                </itunes:summary>
                                                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Keep Your Kids Safe Online (Episode 16)]]>
                </title>
                <pubDate>Mon, 22 Jun 2020 12:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/how-to-keep-your-kids-safe-online-episode-16</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/how-to-keep-your-kids-safe-online-episode-16</link>
                                <description>
                                            <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode16">https://www.cybersecuritymadepersonal.com/episode16</a>.</p>
<p>When you have kids, it isn’t enough to just protect yourself online.  You also need to keep your children safe.  Between cyberbullies, human traffickers, and a host of illicit websites, there are many dangers that your kids face.  However, with a little work, you can help your kids stay safe.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode16.
When you have kids, it isn’t enough to just protect yourself online.  You also need to keep your children safe.  Between cyberbullies, human traffickers, and a host of illicit websites, there are many dangers that your kids face.  However, with a little work, you can help your kids stay safe.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[How to Keep Your Kids Safe Online (Episode 16)]]>
                </itunes:title>
                                    <itunes:episode>16</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode16">https://www.cybersecuritymadepersonal.com/episode16</a>.</p>
<p>When you have kids, it isn’t enough to just protect yourself online.  You also need to keep your children safe.  Between cyberbullies, human traffickers, and a host of illicit websites, there are many dangers that your kids face.  However, with a little work, you can help your kids stay safe.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode_16_-_Protecting_Your_Kids.mp3" length=""
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode16.
When you have kids, it isn’t enough to just protect yourself online.  You also need to keep your children safe.  Between cyberbullies, human traffickers, and a host of illicit websites, there are many dangers that your kids face.  However, with a little work, you can help your kids stay safe.
]]>
                </itunes:summary>
                                                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Four Reasons You Should Never Use Your Debit Card (Episode 15)]]>
                </title>
                <pubDate>Mon, 15 Jun 2020 12:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/four-reasons-you-should-never-use-your-debit-card-episode-15</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/four-reasons-you-should-never-use-your-debit-card-episode-15</link>
                                <description>
                                            <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode15">https://www.cybersecuritymadepersonal.com/episode15</a>.</p>
<p>Debit or credit?  It’s the question you’re often asked when you swipe a card to make a purchase.  Does it make a difference which one you choose?  It turns out that there are some substantial differences between the protections you get with your debit card and your credit card.  It does matter which one you choose, and for the best security, your credit card is the best option.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode15.
Debit or credit?  It’s the question you’re often asked when you swipe a card to make a purchase.  Does it make a difference which one you choose?  It turns out that there are some substantial differences between the protections you get with your debit card and your credit card.  It does matter which one you choose, and for the best security, your credit card is the best option.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Four Reasons You Should Never Use Your Debit Card (Episode 15)]]>
                </itunes:title>
                                    <itunes:episode>15</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode15">https://www.cybersecuritymadepersonal.com/episode15</a>.</p>
<p>Debit or credit?  It’s the question you’re often asked when you swipe a card to make a purchase.  Does it make a difference which one you choose?  It turns out that there are some substantial differences between the protections you get with your debit card and your credit card.  It does matter which one you choose, and for the best security, your credit card is the best option.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode_15_-_Debit_or_Credit.mp3" length=""
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode15.
Debit or credit?  It’s the question you’re often asked when you swipe a card to make a purchase.  Does it make a difference which one you choose?  It turns out that there are some substantial differences between the protections you get with your debit card and your credit card.  It does matter which one you choose, and for the best security, your credit card is the best option.
]]>
                </itunes:summary>
                                                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Ten Steps to Safe Online Banking (Episode 14)]]>
                </title>
                <pubDate>Mon, 08 Jun 2020 12:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/ten-steps-to-safe-online-banking-episode-14</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/ten-steps-to-safe-online-banking-episode-14</link>
                                <description>
                                            <![CDATA[<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode14.</p>
<p>Your online banking account holds the key to your financial security and privacy.  If you don’t take steps to make sure that you are the only person who can access your accounts, you could find that someone has seen all your financial dealings or even managed to steal your life savings.  This show gives you ten steps to keep your online banking information out of the wrong hands.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode14.
Your online banking account holds the key to your financial security and privacy.  If you don’t take steps to make sure that you are the only person who can access your accounts, you could find that someone has seen all your financial dealings or even managed to steal your life savings.  This show gives you ten steps to keep your online banking information out of the wrong hands.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Ten Steps to Safe Online Banking (Episode 14)]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at https://www.cybersecuritymadepersonal.com/episode14.</p>
<p>Your online banking account holds the key to your financial security and privacy.  If you don’t take steps to make sure that you are the only person who can access your accounts, you could find that someone has seen all your financial dealings or even managed to steal your life savings.  This show gives you ten steps to keep your online banking information out of the wrong hands.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode_14_-_Protect_Online_Banking.mp3" length=""
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode14.
Your online banking account holds the key to your financial security and privacy.  If you don’t take steps to make sure that you are the only person who can access your accounts, you could find that someone has seen all your financial dealings or even managed to steal your life savings.  This show gives you ten steps to keep your online banking information out of the wrong hands.
]]>
                </itunes:summary>
                                                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Five Ways to Protect Yourself on Public Wifi (Episode 13)]]>
                </title>
                <pubDate>Mon, 01 Jun 2020 12:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/five-ways-to-protect-yourself-on-public-wifi-episode-13</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/five-ways-to-protect-yourself-on-public-wifi-episode-13</link>
                                <description>
                                            <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode13">https://www.cybersecuritymadepersonal.com/episode13</a>.</p>
<p>We use public WiFi regularly, whether at a coffee shop down the street or at a hotel during a vacation halfway around the world.  However, when you connect to a network with other devices, you introduce additional security risks.  This episode will teach you how you can protect your data and devices when you are connected to public WiFi.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode13.
We use public WiFi regularly, whether at a coffee shop down the street or at a hotel during a vacation halfway around the world.  However, when you connect to a network with other devices, you introduce additional security risks.  This episode will teach you how you can protect your data and devices when you are connected to public WiFi.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Five Ways to Protect Yourself on Public Wifi (Episode 13)]]>
                </itunes:title>
                                    <itunes:episode>13</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode13">https://www.cybersecuritymadepersonal.com/episode13</a>.</p>
<p>We use public WiFi regularly, whether at a coffee shop down the street or at a hotel during a vacation halfway around the world.  However, when you connect to a network with other devices, you introduce additional security risks.  This episode will teach you how you can protect your data and devices when you are connected to public WiFi.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode_13_-_Stay_Safe_on_Public_Wifi.mp3" length=""
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode13.
We use public WiFi regularly, whether at a coffee shop down the street or at a hotel during a vacation halfway around the world.  However, when you connect to a network with other devices, you introduce additional security risks.  This episode will teach you how you can protect your data and devices when you are connected to public WiFi.
]]>
                </itunes:summary>
                                                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Ten Tips for Staying Safe While Travelling (Episode 12)]]>
                </title>
                <pubDate>Tue, 26 May 2020 12:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/ten-tips-for-staying-safe-while-travelling-episode-12</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/ten-tips-for-staying-safe-while-travelling-episode-12</link>
                                <description>
                                            <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode12">https://www.cybersecuritymadepersonal.com/episode12</a>.</p>
<p>Memorial Day weekend normally begins the summer travel period, although summer travel won’t be picking up quite as much as it will in typical years.  However, when travelling, it is important that you take steps to protect yourself, your devices, and your data.  This episode gives you ten ways to protect your data when you travel.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode12.
Memorial Day weekend normally begins the summer travel period, although summer travel won’t be picking up quite as much as it will in typical years.  However, when travelling, it is important that you take steps to protect yourself, your devices, and your data.  This episode gives you ten ways to protect your data when you travel.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Ten Tips for Staying Safe While Travelling (Episode 12)]]>
                </itunes:title>
                                    <itunes:episode>12</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode12">https://www.cybersecuritymadepersonal.com/episode12</a>.</p>
<p>Memorial Day weekend normally begins the summer travel period, although summer travel won’t be picking up quite as much as it will in typical years.  However, when travelling, it is important that you take steps to protect yourself, your devices, and your data.  This episode gives you ten ways to protect your data when you travel.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode_12_-_Stay_Safe_When_Travelling.mp3" length=""
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode12.
Memorial Day weekend normally begins the summer travel period, although summer travel won’t be picking up quite as much as it will in typical years.  However, when travelling, it is important that you take steps to protect yourself, your devices, and your data.  This episode gives you ten ways to protect your data when you travel.
]]>
                </itunes:summary>
                                                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Four Ways to Spot a Phishing Scam (Episode 11)]]>
                </title>
                <pubDate>Mon, 18 May 2020 12:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/four-ways-to-spot-a-phishing-scam-episode-11</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/four-ways-to-spot-a-phishing-scam-episode-11</link>
                                <description>
                                            <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode">https://www.cybersecuritymadepersonal.com/episode11</a></p>
<p>Phishing scams are one of the most common ways that your identity could be compromised, but they are completely preventable if you know what to look for.  This episode will take you through four steps to help you recognize a phishing scam so you won’t hand over your private data to someone else.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode11
Phishing scams are one of the most common ways that your identity could be compromised, but they are completely preventable if you know what to look for.  This episode will take you through four steps to help you recognize a phishing scam so you won’t hand over your private data to someone else.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Four Ways to Spot a Phishing Scam (Episode 11)]]>
                </itunes:title>
                                    <itunes:episode>11</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode">https://www.cybersecuritymadepersonal.com/episode11</a></p>
<p>Phishing scams are one of the most common ways that your identity could be compromised, but they are completely preventable if you know what to look for.  This episode will take you through four steps to help you recognize a phishing scam so you won’t hand over your private data to someone else.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode_11_-_Protect_from_Phishing.mp3" length=""
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode11
Phishing scams are one of the most common ways that your identity could be compromised, but they are completely preventable if you know what to look for.  This episode will take you through four steps to help you recognize a phishing scam so you won’t hand over your private data to someone else.
]]>
                </itunes:summary>
                                                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Protect Yourself from Ransomware (Episode 10)]]>
                </title>
                <pubDate>Mon, 11 May 2020 12:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/how-to-protect-yourself-from-ransomware-episode-10</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/how-to-protect-yourself-from-ransomware-episode-10</link>
                                <description>
                                            <![CDATA[<p>Show notes available <a href="https://www.cybersecuritymadepersonal.com/episode10">https://www.cybersecuritymadepersonal.com/episode10</a></p>
<p>Ransomware is one of the biggest online threats today.  It has become one of the most popular and profitable scams used by criminals.  You must take appropriate steps to protect your system, and you need to back up your data so you won’t be forced to make a difficult choice between paying the ransom or losing all your files.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available https://www.cybersecuritymadepersonal.com/episode10
Ransomware is one of the biggest online threats today.  It has become one of the most popular and profitable scams used by criminals.  You must take appropriate steps to protect your system, and you need to back up your data so you won’t be forced to make a difficult choice between paying the ransom or losing all your files.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[How to Protect Yourself from Ransomware (Episode 10)]]>
                </itunes:title>
                                    <itunes:episode>10</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available <a href="https://www.cybersecuritymadepersonal.com/episode10">https://www.cybersecuritymadepersonal.com/episode10</a></p>
<p>Ransomware is one of the biggest online threats today.  It has become one of the most popular and profitable scams used by criminals.  You must take appropriate steps to protect your system, and you need to back up your data so you won’t be forced to make a difficult choice between paying the ransom or losing all your files.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode_10_-_Protect_from_Ransomware.mp3" length=""
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available https://www.cybersecuritymadepersonal.com/episode10
Ransomware is one of the biggest online threats today.  It has become one of the most popular and profitable scams used by criminals.  You must take appropriate steps to protect your system, and you need to back up your data so you won’t be forced to make a difficult choice between paying the ransom or losing all your files.
]]>
                </itunes:summary>
                                                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Eight Steps to Protect Your Remote Meetings (Episode 9)]]>
                </title>
                <pubDate>Mon, 04 May 2020 12:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/eight-steps-to-protect-your-remote-meetings-episode-9</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/eight-steps-to-protect-your-remote-meetings-episode-9</link>
                                <description>
                                            <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode9">https://www.cybersecuritymadepersonal.com/episode9</a>.</p>
<p>Remote meetings have become much more common recently, but so have stories of problems in remote meeting applications.  This episode shows you how to configure your remote meetings so that you can keep the contents of your meetings private and secure.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode9.
Remote meetings have become much more common recently, but so have stories of problems in remote meeting applications.  This episode shows you how to configure your remote meetings so that you can keep the contents of your meetings private and secure.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Eight Steps to Protect Your Remote Meetings (Episode 9)]]>
                </itunes:title>
                                    <itunes:episode>9</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode9">https://www.cybersecuritymadepersonal.com/episode9</a>.</p>
<p>Remote meetings have become much more common recently, but so have stories of problems in remote meeting applications.  This episode shows you how to configure your remote meetings so that you can keep the contents of your meetings private and secure.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode_9_-_Safe_Remote_Meetings.mp3" length=""
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode9.
Remote meetings have become much more common recently, but so have stories of problems in remote meeting applications.  This episode shows you how to configure your remote meetings so that you can keep the contents of your meetings private and secure.
]]>
                </itunes:summary>
                                                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Protecting Your Accounts Beyond the Password (Episode 8)]]>
                </title>
                <pubDate>Mon, 27 Apr 2020 12:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/protecting-your-accounts-beyond-the-password-episode-8</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/protecting-your-accounts-beyond-the-password-episode-8</link>
                                <description>
                                            <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode">https://www.cybersecuritymadepersonal.com/episode8.</a></p>
<p>While it is still important to create strong passwords, there are times when the password could fail to keep a malicious person out of your accounts.  Therefore, it is important to take additional steps to protect your sensitive data, even if your password is guessed, phished, or compromised.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode8.
While it is still important to create strong passwords, there are times when the password could fail to keep a malicious person out of your accounts.  Therefore, it is important to take additional steps to protect your sensitive data, even if your password is guessed, phished, or compromised.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Protecting Your Accounts Beyond the Password (Episode 8)]]>
                </itunes:title>
                                    <itunes:episode>8</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at <a href="https://www.cybersecuritymadepersonal.com/episode">https://www.cybersecuritymadepersonal.com/episode8.</a></p>
<p>While it is still important to create strong passwords, there are times when the password could fail to keep a malicious person out of your accounts.  Therefore, it is important to take additional steps to protect your sensitive data, even if your password is guessed, phished, or compromised.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode_8_-_Protect_Accounts_Beyond_the_Password.mp3" length=""
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at https://www.cybersecuritymadepersonal.com/episode8.
While it is still important to create strong passwords, there are times when the password could fail to keep a malicious person out of your accounts.  Therefore, it is important to take additional steps to protect your sensitive data, even if your password is guessed, phished, or compromised.
]]>
                </itunes:summary>
                                                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Benefits of a Password Manager (Episode 7)]]>
                </title>
                <pubDate>Mon, 20 Apr 2020 12:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/benefits-of-a-password-manager-episode-7</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/benefits-of-a-password-manager-episode-7</link>
                                <description>
                                            <![CDATA[<p>Show notes available at www.cybersecuritymadepersonal.com/episode7.</p>
<p>A password manager does much more than just save all your passwords.  It can provide additional benefits that can improve your security and help you share your passwords safely with others.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at www.cybersecuritymadepersonal.com/episode7.
A password manager does much more than just save all your passwords.  It can provide additional benefits that can improve your security and help you share your passwords safely with others.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Benefits of a Password Manager (Episode 7)]]>
                </itunes:title>
                                    <itunes:episode>7</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at www.cybersecuritymadepersonal.com/episode7.</p>
<p>A password manager does much more than just save all your passwords.  It can provide additional benefits that can improve your security and help you share your passwords safely with others.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode_7_-_Benefits_of_a_Password_Manager.mp3" length=""
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at www.cybersecuritymadepersonal.com/episode7.
A password manager does much more than just save all your passwords.  It can provide additional benefits that can improve your security and help you share your passwords safely with others.
]]>
                </itunes:summary>
                                                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Four Principles for a Secure Password (Episode 6)]]>
                </title>
                <pubDate>Mon, 13 Apr 2020 13:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/four-principles-for-a-secure-password-episode-6</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/four-principles-for-a-secure-password-episode-6</link>
                                <description>
                                            <![CDATA[<p>Show notes available at <a href="https://cybersecuritymadepersonal.com/episode6">https://cybersecuritymadepersonal.com/episode6</a>.</p>
<p>Everyone has probably heard about the importance of creating secure passwords, yet as a whole, we still choose awful passwords.  This episode discusses four principles for creating a secure password that will protect your accounts.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at https://cybersecuritymadepersonal.com/episode6.
Everyone has probably heard about the importance of creating secure passwords, yet as a whole, we still choose awful passwords.  This episode discusses four principles for creating a secure password that will protect your accounts.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Four Principles for a Secure Password (Episode 6)]]>
                </itunes:title>
                                    <itunes:episode>6</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at <a href="https://cybersecuritymadepersonal.com/episode6">https://cybersecuritymadepersonal.com/episode6</a>.</p>
<p>Everyone has probably heard about the importance of creating secure passwords, yet as a whole, we still choose awful passwords.  This episode discusses four principles for creating a secure password that will protect your accounts.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode_6_-_Four_Principles_for_a_Secure_Password.mp3" length=""
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at https://cybersecuritymadepersonal.com/episode6.
Everyone has probably heard about the importance of creating secure passwords, yet as a whole, we still choose awful passwords.  This episode discusses four principles for creating a secure password that will protect your accounts.
]]>
                </itunes:summary>
                                                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Ten Coronavirus Scams to Avoid (Episode 5)]]>
                </title>
                <pubDate>Mon, 06 Apr 2020 12:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/ten-coronavirus-scams-to-avoid-episode-5</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/ten-coronavirus-scams-to-avoid-episode-5</link>
                                <description>
                                            <![CDATA[<p>Show notes available at cybesecuritymadepersonal.com/episode5.</p>
<p> </p>
<p>The Coronavirus has brought out the best in many people, but it has also brought out the worst from scammers.  This episode covers ten Coronavirus-related scams that you need to avoid.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at cybesecuritymadepersonal.com/episode5.
 
The Coronavirus has brought out the best in many people, but it has also brought out the worst from scammers.  This episode covers ten Coronavirus-related scams that you need to avoid.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Ten Coronavirus Scams to Avoid (Episode 5)]]>
                </itunes:title>
                                    <itunes:episode>5</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at cybesecuritymadepersonal.com/episode5.</p>
<p> </p>
<p>The Coronavirus has brought out the best in many people, but it has also brought out the worst from scammers.  This episode covers ten Coronavirus-related scams that you need to avoid.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode_5_-_Ten_Coronavirus_Scams.mp3" length=""
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at cybesecuritymadepersonal.com/episode5.
 
The Coronavirus has brought out the best in many people, but it has also brought out the worst from scammers.  This episode covers ten Coronavirus-related scams that you need to avoid.
]]>
                </itunes:summary>
                                                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Protect the Contents of Your Wallet (Episode 4)]]>
                </title>
                <pubDate>Fri, 03 Apr 2020 12:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/how-to-protect-the-contents-of-your-wallet-episode-4</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/how-to-protect-the-contents-of-your-wallet-episode-4</link>
                                <description>
                                            <![CDATA[<p>Show notes available at cybersecuritymadepersonal.com/episode4.</p>
<p>The contents of your wallet could be key for someone to steal your identity, so it is important to protect the data you have in it.  This episode will cover three tips for keeping the contents of your wallet safe and for shutting everything down in the event your wallet is stolen.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at cybersecuritymadepersonal.com/episode4.
The contents of your wallet could be key for someone to steal your identity, so it is important to protect the data you have in it.  This episode will cover three tips for keeping the contents of your wallet safe and for shutting everything down in the event your wallet is stolen.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[How to Protect the Contents of Your Wallet (Episode 4)]]>
                </itunes:title>
                                    <itunes:episode>4</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at cybersecuritymadepersonal.com/episode4.</p>
<p>The contents of your wallet could be key for someone to steal your identity, so it is important to protect the data you have in it.  This episode will cover three tips for keeping the contents of your wallet safe and for shutting everything down in the event your wallet is stolen.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode_4_-_How_to_Protect_the_Contents_of_Your_Wallet.mp3" length=""
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at cybersecuritymadepersonal.com/episode4.
The contents of your wallet could be key for someone to steal your identity, so it is important to protect the data you have in it.  This episode will cover three tips for keeping the contents of your wallet safe and for shutting everything down in the event your wallet is stolen.
]]>
                </itunes:summary>
                                                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Delete Yourself from Google (Episode 3)]]>
                </title>
                <pubDate>Thu, 02 Apr 2020 12:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/how-to-delete-yourself-from-google-episode-3</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/how-to-delete-yourself-from-google-episode-3</link>
                                <description>
                                            <![CDATA[<p>Show notes available at cybersecuritymadepersonal.com/episode3</p>
<p>Google has a habit of developing excellent products that work well and produce amazing results.  However, it has also developed a reputation for being extremely lax when it comes to privacy.  This episode will cover how to protect your privacy on Google’s products, covering everything from a quick privacy checkup to completely deleting all of your data.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at cybersecuritymadepersonal.com/episode3
Google has a habit of developing excellent products that work well and produce amazing results.  However, it has also developed a reputation for being extremely lax when it comes to privacy.  This episode will cover how to protect your privacy on Google’s products, covering everything from a quick privacy checkup to completely deleting all of your data.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[How to Delete Yourself from Google (Episode 3)]]>
                </itunes:title>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at cybersecuritymadepersonal.com/episode3</p>
<p>Google has a habit of developing excellent products that work well and produce amazing results.  However, it has also developed a reputation for being extremely lax when it comes to privacy.  This episode will cover how to protect your privacy on Google’s products, covering everything from a quick privacy checkup to completely deleting all of your data.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode_3_-_How_to_Delete_Yourself_from_Google.mp3" length=""
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at cybersecuritymadepersonal.com/episode3
Google has a habit of developing excellent products that work well and produce amazing results.  However, it has also developed a reputation for being extremely lax when it comes to privacy.  This episode will cover how to protect your privacy on Google’s products, covering everything from a quick privacy checkup to completely deleting all of your data.
]]>
                </itunes:summary>
                                                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[How to Stay Safe While Working from Home (Episode 2)]]>
                </title>
                <pubDate>Wed, 01 Apr 2020 12:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/how-to-stay-safe-while-working-from-home-episode-2</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/how-to-stay-safe-while-working-from-home-episode-2</link>
                                <description>
                                            <![CDATA[<p>Show notes available at cybersecuritymadepersonal.com/episode2.</p>
<p>Working from home has become necessary for many people, even those who have worked in places that have resisted work from home previously.  However, it is important to make sure you take the steps to protect your company’s data when you work from home.  This episode shows you how to protect yourself when you work from home.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at cybersecuritymadepersonal.com/episode2.
Working from home has become necessary for many people, even those who have worked in places that have resisted work from home previously.  However, it is important to make sure you take the steps to protect your company’s data when you work from home.  This episode shows you how to protect yourself when you work from home.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[How to Stay Safe While Working from Home (Episode 2)]]>
                </itunes:title>
                                    <itunes:episode>2</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at cybersecuritymadepersonal.com/episode2.</p>
<p>Working from home has become necessary for many people, even those who have worked in places that have resisted work from home previously.  However, it is important to make sure you take the steps to protect your company’s data when you work from home.  This episode shows you how to protect yourself when you work from home.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode_2_-_Stay_Safe_While_Working_from_Home.mp3" length=""
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at cybersecuritymadepersonal.com/episode2.
Working from home has become necessary for many people, even those who have worked in places that have resisted work from home previously.  However, it is important to make sure you take the steps to protect your company’s data when you work from home.  This episode shows you how to protect yourself when you work from home.
]]>
                </itunes:summary>
                                                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Five Ways to Secure Your Wifi (Episode 1)]]>
                </title>
                <pubDate>Tue, 31 Mar 2020 12:00:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/five-ways-to-secure-your-wifi-episode-1</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/five-ways-to-secure-your-wifi-episode-1</link>
                                <description>
                                            <![CDATA[<p>Show notes available at cybersecuritymadepersonal.com/episode1.</p>
<p>A password is necessary for any Wifi network in order to encrypt data and keep criminals out.  However, keeping your Wifi safe requires much more than just adding a password.  This episode of the Cybersecurity Made Personal podcast will cover five important steps for keeping your Wifi network safe.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Show notes available at cybersecuritymadepersonal.com/episode1.
A password is necessary for any Wifi network in order to encrypt data and keep criminals out.  However, keeping your Wifi safe requires much more than just adding a password.  This episode of the Cybersecurity Made Personal podcast will cover five important steps for keeping your Wifi network safe.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Five Ways to Secure Your Wifi (Episode 1)]]>
                </itunes:title>
                                    <itunes:episode>1</itunes:episode>
                                                    <itunes:season>1</itunes:season>
                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Show notes available at cybersecuritymadepersonal.com/episode1.</p>
<p>A password is necessary for any Wifi network in order to encrypt data and keep criminals out.  However, keeping your Wifi safe requires much more than just adding a password.  This episode of the Cybersecurity Made Personal podcast will cover five important steps for keeping your Wifi network safe.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Episode_1.mp3" length=""
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Show notes available at cybersecuritymadepersonal.com/episode1.
A password is necessary for any Wifi network in order to encrypt data and keep criminals out.  However, keeping your Wifi safe requires much more than just adding a password.  This episode of the Cybersecurity Made Personal podcast will cover five important steps for keeping your Wifi network safe.
]]>
                </itunes:summary>
                                                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Cybersecurity Made Personal Is Coming]]>
                </title>
                <pubDate>Fri, 20 Mar 2020 20:20:00 +0000</pubDate>
                <dc:creator>James Herman</dc:creator>
                <guid isPermaLink="true">
                    https://cybersecurity-made-personal.castos.com/podcasts/13478/episodes/cybersecurity-made-personal-is-coming</guid>
                                    <link>https://cybersecurity-made-personal.castos.com/episodes/cybersecurity-made-personal-is-coming</link>
                                <description>
                                            <![CDATA[<p>The Cybersecurity Made Personal podcast is launching on March 30, 2020.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[The Cybersecurity Made Personal podcast is launching on March 30, 2020.]]>
                </itunes:subtitle>
                                    <itunes:episodeType>trailer</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Cybersecurity Made Personal Is Coming]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>The Cybersecurity Made Personal podcast is launching on March 30, 2020.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5f73fab2b5a771-62662091/Podcast_Trailer.mp3" length=""
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[The Cybersecurity Made Personal podcast is launching on March 30, 2020.]]>
                </itunes:summary>
                                                                                    <itunes:author>
                    <![CDATA[James Herman]]>
                </itunes:author>
                            </item>
            </channel>
</rss>
