• Parenting in the Digital Jungle: Keeping Kids Safe Online
    2025/12/19

    How can parents keep kids safe online without fear or constant conflict? 📱👨‍👩‍👧‍👦

    In this episode of Smarter Online Safety, host Jocelyn King sits down with internationally recognized parenting expert Sue Atkins to talk about raising confident, safe kids in today’s digital world.

    They cover age-appropriate screen time, how to spot early signs of cyberbullying and online harm, and simple ways to have ongoing conversations with kids about online safety—without scaring them or shutting them down.

    You’ll learn:

    1. Online safety tips for kids at different ages 2. What warning signs parents should watch for 3. How to talk to kids about online risks calmly 4. Why connection matters more than control 5. This episode is a must-watch for parents, caregivers, and anyone supporting children online.

    👉 Watch now, subscribe, and share with a parent who needs this.

    #SmarterOnlineSafety #DigitalParenting #OnlineSafety #CyberSafety #ParentingTips #SueAtkins

    Connect with Sue Atkins: Website: https://sueatkinsparentingcoach.com/ Linkedin: https://uk.linkedin.com/in/sueatkins

    続きを読む 一部表示
    29 分
  • Protect Kids from Grooming & AI Abuse
    2025/12/12

    In this powerful episode of Smarter Online Safety, Jocelyn King talks with Roger Canaff — former New York City special victims prosecutor, survivor advocate, and legal thriller author — about how predators operate online, the rise of AI “nudify” tools, and concrete steps parents and caregivers can take to protect kids and support survivors. What you’ll hear in this episode: 1. Roger’s path into special-victims work and what motivates him. 2. How grooming typically happens online (gaming, Discord, Snapchat, etc.). 3. Top warning signs parents should watch for and how to start the conversation with kids. 4. The frightening reality of generative-AI “nudify” tools and their impact on young people and adults. 5. Practical advice for intervention, recovery-focused goals, and when to involve law enforcement. Key takeaways: 1. Prevention starts with openness: keep communication and boundaries clear from an early age. 2. Most online grooming begins as friendship — teach kids to spot secrecy, emotional manipulation, and “lover grooming.” 3. Generative-AI tools make exploitation faster and easier; anonymity and peer perpetrators complicate response. 4. Healing and survivor empowerment are as important (often more important) than conviction statistics. 👉 Watch the full episode on our channel and subscribe for weekly practical, non-technical online safety guidance. Connect with Roger Canaff: Website: https://www.rogercanaff.com/ LinkedIn: https://www.linkedin.com/in/roger-canaff-9b8689a Books: https://www.rogercanaff.com/books If someone is in immediate danger, contact local emergency services. To report child sexual exploitation or receive guidance, contact your country’s Internet Crimes Against Children (ICAC) task force or the National Center for Missing & Exploited Children. Support the show If this episode helped you, please: 👍 Like this video 🔔 Subscribe and hit the bell for new episodes 💬 Comment below: what topic would you like us to cover next? 🔁 Share this episode with parents, educators, and caregivers #SmarterOnlineSafety #OnlineSafety #ChildProtection #CyberSafety #AIandSafety

    続きを読む 一部表示
    44 分
  • Understanding risk, behavior & smart online practices with David Cruz
    2025/12/05

    Protect what matters — not everything. In this episode David Cruz (El Maestro) breaks cybersecurity down into a simple, practical model: Risk → Behavior → Practice. Perfect for CEOs, small business owners, parents — anyone who wants real protection without the tech overwhelm.

    Episode highlights

    1. A simple framework to decide what to protect and how much to spend. 2. Why metadata & “oversharing” are bigger risks than most people realize. 3. Practical tips: backups, two-factor authentication, email = postcard, and how to limit collection of PII. 4. Real-world examples: social account takeovers, IoT risks (fish tank/casino story), and small business vulnerabilities.

    Key takeaways • Start by asking: What are you most afraid of? (align protection to the real risk) • Don’t collect data you don’t need — fewer data = less risk. • Treat email like a postcard — encrypt sensitive files. • Use 2-factor authentication and secure default configs on cameras/IoT. • Focus on protecting the systems that support your highest revenue/value.

    Connect with David Cruz Website: [INSERT] LinkedIn: [INSERT] Course (free access for small business CEOs): [INSERT] Podcast / Book / Other: [INSERT]

    Subscribe & share If this helped, please: 👍 Like the video 🔔 Subscribe & hit the bell for future episodes 💬 Comment below: What single account or device would you protect first? 📢 Share this with a small business owner who needs simple security.

    #Cybersecurity #SmallBusiness #OnlineSafety #DataPrivacy #InfoSec

    続きを読む 一部表示
    38 分
  • Deepfakes: Don’t Trust the Screen
    2025/11/28

    Smarter Online Safety — Jocelyn King with Daphne Ng A frank, non-technical conversation about how AI (voice cloning & deepfakes) is changing scams — including a $25M corporate fraud case — and what everyday people and teams can do right now to protect themselves.

    🔔 Subscribe for weekly, simple online-safety tips 🎧 Listen on Apple/Spotify/Google

    Key takeaways:

    1. Scams scale faster today by layering social engineering with mass tech channels (WhatsApp, Telegram, social). 2. Attackers specifically target distracted people during life changes — success rates rise dramatically. 3. Deepfakes and voice cloning are now good enough to fake meetings and trick finance teams (real $25M loss example). 4. New rule: “I’ll believe it when I verify it.” Implement offline passphrases, SOPs, and a culture of pausing/second-opinion. 5. Never transfer money or buy gift cards based on unsolicited DMs or urgent requests — that’s almost always a scam.

    Practical actions you can take today

    1. Agree on an offline passphrase with family & key colleagues (don’t store it digitally). 2. Build a “pause & verify” SOP: stop, ask a colleague, confirm by a separate channel. 3. Treat requests for gift cards as a red flag. 4. Limit or avoid voice-only authentication where possible. Use multi-factor and vetted biometric systems. 5. Educate new hires on SOPs and social-engineering red flags.

    Connect with the guest: Daphne Ng — Head of International Business (LinkedIn): https://sg.linkedin.com/in/daphne-ng-cyber

    About Smarter Online Safety Smarter Online Safety breaks complex cyber topics into clear, actionable steps for everyday people. Hosted by Jocelyn King — practical tips, real stories, and things you can implement today.

    💬 Got a question for Daphne or a story about a scam? Drop it in the comments — we read them. 👍 Like this video if you learned something practical. 🔁 Share with your team, family, or elderly loved ones — the more people who know, the safer we all are.

    #OnlineSafety #Deepfakes #CyberSecurity #VoiceCloning #SmarterOnlineSafety

    続きを読む 一部表示
    34 分
  • The Truth About Bug Bounties & Cyber Risks
    2025/11/21

    Grant McCracken joins Jocelyn King on this episode of Smarter Online Safety to demystify bug bounties, penetration testing, AI security and the human mistakes that fuel most breaches. If you want practical, non-technical advice for protecting your business (or the businesses you rely on), this is the episode to watch.

    What we cover:

    1. What a bug bounty is and why it works (even for small teams) 2. How bug bounties compare to pen tests and why crowdsourced testing scales better 3. Why over 60% of breaches start with human error — and what to do about it 4. Credential stuffing, MFA, phishing and the human layer of risk 5. Risks and realities of AI-generated code (and “vibe coding”) 6. Practical steps small businesses can take today

    Key takeaways:

    1. Invite ethical hackers — it’s often cheaper and more effective than you think. 2. Protect the human layer: phishing training + MFA = huge risk reduction. 3. AI helps speed development — but don’t skip security checks. Prompting alone isn’t a silver bullet. 4.Small businesses should adopt basic frameworks, vendor controls, and vulnerability disclosure practices.

    👉 Subscribe to Smarter Online Safety for short, practical episodes about protecting yourself and those you care about online. 🔔 Like, comment your biggest cybersecurity question, and share this with a small business owner you care about.

    Connect with Grant McCracken: https://www.linkedin.com/in/grantmccracken

    Visit: smarteronlinesafety.com for show notes and resources.

    #Cybersecurity #BugBounty #AIsecurity #CyberAwareness #Infosec

    続きを読む 一部表示
    43 分
  • How to Use AI Safely at Work | Kevin Carlson on Smarter Online Safety
    2025/11/14

    AI is an amazing tool — but without guardrails it can cause real harm. In this episode Jocelyn King chats with Kevin Carlson (Tech CXO) about practical, non-technical ways individuals and leaders can adopt AI safely, protect sensitive data, and rethink jobs to work with — not against — AI. What you’ll learn • Kevin’s plain-spoken view on AI: hype vs. reality • Why “AI-positive” leadership matters (not “who can I replace”) • Simple guardrails to protect company and personal data when using LLMs • Practical tips for workers (developers and non-developers) to use AI productively • How AI helps — and how attackers use AI to scale social engineering Connect with Kevin Carlson • Kevin Carlson — Tech CXO • Website - https://www.techcxo.com/ Subscribe & help spread smarter online safety If this helped you, please: 👍 Like • 💬 Comment your biggest AI question• 🔔 Subscribe for new episodes every week • 🔁 Share with a friend or team

    続きを読む 一部表示
    38 分
  • How to Protect Your Life & Work: Jack Canfield on Outcomes, AI & Cyber Safety
    2025/11/07

    Welcome to the Smarter Online Safety Podcast with your host, Jocelyn King — the queen of online safety. In this episode legendary author and trainer Jack Canfield walks us through his foundational formula E + R = O (Event + Response = Outcome) and shows how taking responsibility for your response is the fastest path from fear to better outcomes — especially in an era of AI-driven cyberthreats.

    Jack Canfield co-author of Chicken Soup for the Soul and The Success Principles, founder of the Canfield Training Group, and a long-time peak-performance trainer.

    What you’ll hear in this episode:

    1. Why E + R = O matters for your security, success and mindset. 2. Practical “digital hygiene” steps you can add to your morning routine (password managers, backups, 2FA). 3. How AI voice tools and automation change the threat landscape — and what to do about it. 4. Morning routines and mental practices that move you out of fear (amygdala) into creative problem-solving (prefrontal cortex).

    Key takeaways:

    1. Outcomes follow your responses — choose the response that produces the life you want. 2. Small, consistent security habits (password manager, backups, 2FA) massively reduce risk. 3. Reframe cybersecurity from “fear” to “preserving what matters” so you can keep taking smart risks.

    More on Jack Canfield: https://jackcanfield.com/

    #OnlineSafety #Cybersecurity #JackCanfield #DigitalHygiene #smarteronlinesafety

    続きを読む 一部表示
    42 分
  • MFA Isn’t Enough: Cybersecurity Secrets Hackers Don’t Want You to Know
    2025/11/05

    Stay safe online in the age of AI-driven cybercrime! 🚨 In this powerful episode of Smarter Online Safety, host Jocelyn King sits down with Eddie Clark, CEO of Solve IT, to reveal the must-know cybersecurity secrets every business owner, professional, and everyday internet user needs.

    💻 Discover why multi-factor authentication (MFA) isn’t enough anymore, how hackers exploit public Wi-Fi, and the hidden dangers of Shadow IT and smart devices at home. Eddie breaks down complex threats into simple, practical steps anyone can take to secure their data, identity, and business systems.

    🔥 What you’ll learn in this episode:

    Why MFA can still be hacked & what to do instead

    The #1 mistake people make with software updates

    How hackers steal your info at coffee shops & hotels

    Shadow IT & IoT: why your smart TV might expose your network

    The truth about cyber liability insurance for businesses

    Easy, affordable tools to protect your devices right now

    👉 Don’t wait until it’s too late—take action today to protect yourself, your family, and your business.

    ✅ Free Protection Tools Mentioned in this Episode:

    Sophos iOS Security App: https://www.sophos.com/en-us/free-tools/ios-security-app

    Sophos Android Security App: https://www.sophos.com/en-us/free-tools/android-security-app

    Sophos Home for Computers: https://home.sophos.com/en-us

    🌐 Learn more about Eddie Clark and Solve IT: solveit.rocks

    Episode Topics & Chapters

    00:00 Introduction & Guest Welcome 00:38 Eddie Clark's Background & Approach 01:44 Cybersecurity Challenges for Individuals 02:26 The Fast-Changing Threat Landscape 03:04 Why People Don’t Act on Security 03:32 The Role of Awareness in Online Safety 04:04 How Easy Hacking Has Become 04:40 Myths About Security Coverage 05:15 2FA/MFA Limitations Explained 05:54 The Importance of Passphrases & Password Managers 06:33 Layering Security Measures 07:16 Protecting Personal Devices & Mobile Safety 07:57 The Critical Role of Software Updates 08:38 Timely Updates & Security Vulnerabilities 09:01 Antivirus and Malware Protection 10:12 Free & Affordable Security Tools 10:44 Risks of Using Open Wi-Fi 11:33 How Hackers Exploit Public Networks 12:12 Real-Life Examples of Wi-Fi Attacks 13:00 Anyone Can Become a Hacker 13:23 Shadow IT: Unmanaged Devices Risks 14:41 Internet of Things (IoT) & Home Risks 15:43 Setting Up Separate Networks at Home 16:46 Keeping Home Devices Isolated 17:36 Layered Security and Doorways for Hackers 18:33 Honeypots: Catching Hackers Early 19:40 Cutting ‘Dwell Time’ and Preventing Identity Theft 20:22 How to Find Reputable IT Support 21:02 Avoiding Unethical IT Providers 22:32 Checking Liability & Insurance 23:52 How to Compare IT Service Providers 24:51 Final Tips & Resources 25:52 Closing & Safety Challenge Announcement

    #Cybersecurity #OnlineSafety #Hacking #DataProtection #CyberCrime #ITsecurity #AIthreats

    Thanks for watching! 🎥💡 Make sure to subscribe to our channel and hit the bell icon 🔔 to stay connected!

    続きを読む 一部表示
    26 分