The Audit - Cybersecurity Podcast

Personal Information Security Protection in a Modern Era, Part II

IT Audit Labs Season 1 Episode 3
Audio Player
00:00
00:00 | 28:26

Digital security goes far beyond just having a strong password. What happens after you hit "send" on that email or text message could expose your most sensitive information to prying eyes, marketers, and even hackers. In this eye-opening episode, we dive deep into the hidden truths about personal communication security.<br><br>Most people are shocked to learn that free email services like Gmail, Yahoo, and Outlook actively scan and analyze everything from message content to sending patterns, building detailed advertising profiles from your private conversations. As security expert Kyle explains, "when a service is free, you're not the customer – you're the product." The team shares practical alternatives like ProtonMail that offer true end-to-end encryption, keeping your sensitive conversations private even from the service provider itself.<br><br>The discussion takes an unexpected turn when Kyle reveals how a mortgage company's IT professional blocked his encrypted emails, claiming "only terrorists use encryption" – despite handling the most sensitive financial information consumers regularly share. This highlights dangerous misconceptions about security practices that persist even in industries handling vast amounts of personal data.<br><br>Text messaging proves equally vulnerable, with standard SMS/MMS messages traveling unencrypted across networks. The team recommends Signal as a user-friendly alternative providing true encryption for both messages and calls. We also explore Have I Been Pwned, a valuable tool for discovering if your accounts have been compromised in past data breaches, and share clever tricks for managing email privacy like using separate addresses for different purposes.<br><br>Whether you're a security professional or simply someone who values privacy, this episode offers practical, actionable steps to secure your personal communications in an increasingly invasive digital landscape. Join us for part three of our personal information security series, with internet browsing security coming next week!