{"id":1736,"date":"2021-12-06T19:45:44","date_gmt":"2021-12-06T19:45:44","guid":{"rendered":"https:\/\/helpusdefend.com\/?page_id=1736"},"modified":"2022-04-11T23:55:03","modified_gmt":"2022-04-11T23:55:03","slug":"podcast-episode-6-companion","status":"publish","type":"page","link":"https:\/\/helpusdefend.com\/?page_id=1736","title":{"rendered":"Podcast &#8211; Episode 6 Companion"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1736\" class=\"elementor elementor-1736\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1f3c41d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1f3c41d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e3719c5\" data-id=\"e3719c5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5be9148 elementor-widget elementor-widget-wp-widget-media_audio\" data-id=\"5be9148\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-media_audio.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5>Listen to this page! Narrated by Nicole A.<\/h5><audio class=\"wp-audio-shortcode\" id=\"audio-1736-1\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"https:\/\/helpusdefend.com\/wp-content\/uploads\/2022\/04\/Podcast_Episode-6_Companion_rerecorded.mp3?_=1\" \/><source type=\"audio\/mpeg\" src=\"https:\/\/helpusdefend.com\/wp-content\/uploads\/2022\/04\/Podcast_Episode-6_Companion_rerecorded.mp3?_=1\" \/><a href=\"https:\/\/helpusdefend.com\/wp-content\/uploads\/2022\/04\/Podcast_Episode-6_Companion_rerecorded.mp3\">https:\/\/helpusdefend.com\/wp-content\/uploads\/2022\/04\/Podcast_Episode-6_Companion_rerecorded.mp3<\/a><\/audio>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9258a3c elementor-widget elementor-widget-text-editor\" data-id=\"9258a3c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"ltr\" style=\"line-height: 1.2; margin-top: 0pt; margin-bottom: 0pt;\">\n<\/p>\n<p><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Updated: December 6, 2021<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.44; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">&nbsp;<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.44; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Episode Background:<\/span><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> In the episode \u201c<\/span><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Foreign Prince<\/span><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">\u201d, a child gets his first taste of scammers through a commonly known email scam. When mom finds out that the eight-year-old child has been duped out of $300 in gift cards, she puts the brakes on him using email ever again.&nbsp;<\/span><\/p>\n<p><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.44; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Scams<\/span><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> &#8211; Scams come in all shapes and sizes. Common electronic or online scams typically involve two common elements: The need to send something and to do it urgently. The \u2018something\u2019 could be money, gift cards or information. A scammer knows that getting a person to do something quickly could prevent them from doing their research or asking questions that could prevent a successful scam. There are hundreds of variations of scams and recently scammers are developing their tactics. Sometimes a text message may seem like it\u2019s from a bank, it may get you to click on a link to check your balance but what you may simply be doing is just inputting your data into a very elaborate spoof of a bank\u2019s website. Sometimes the goal is to get access to a person\u2019s data and clicking that link may install surreptitiously dangerous software (viruses) that can\u2019t be uninstalled. They could roam around your devices or even pass to other computers on your same home wifi. While it\u2019s obvious that an elderly person and a child are the victims of scams in this episode, ANYONE can become a target.&nbsp;<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.44; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">&nbsp;<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.44; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Grooming<\/span><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> &#8211; While this episode doesn\u2019t specifically go into this kind of risk, allowing a child to access ANY form of communication (even email) on a device that a parent isn\u2019t monitoring 24 hours a day, can lead to worse things happening, not just financial loss.&nbsp; While a child may think they are communicating with trusted sources like family or friends, or someone that may want to give them things, this may just be opening the door to other motives.&nbsp;<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.44; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">&nbsp;<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.44; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Viruses <\/span><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">&#8211; As described above, the child in this story opened an email from a scammer. Sometimes the email is looking for the user to click on a link which could install harmful software or viruses onto that device and others. This may lead to a total replacement of that device which could be very costly. Repairs to remove viruses or malware could start in the $200 range and go upwards. Further, that person working to remove the virus, should be a trusted individual as that could be a source of further harm. <\/span><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"><\/span><\/p>\n<p><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.44; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: underline; -webkit-text-decoration-skip: none; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;\">Safety Tips<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.44; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">&nbsp;<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.44; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Spelling and Grammar<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.44; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Checking and being conscious of spelling and grammar errors can help pick out bad apples. This is a common occurrence when scammers on the opposite side of the world are trying to believe they are near you.&nbsp;<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.44; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">&nbsp;<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.44; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Access Sites Manually<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.44; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">If you even suspect a text, message or email is not from a reputable source, go directly to that site without using a link sent to you. Make a habit of doing this always.&nbsp;<\/span><\/p>\n<p><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.44; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Always be Scanning for Scammers<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.44; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Be suspicious of emails, texts and calls from people you don\u2019t know. Verify phone numbers, addresses and names of people that contact you, before giving out any information about yourself. Keep in mind that most reputable companies do not rely on unsolicited messages or calls to get information about you. Watch website links and address bars for misspelled or similar spelled brand names. Be cautious of people saying they are long lost friends, relatives or people looking for any information from you. Lastly, educate yourself about the evolving risks. Go on Youtube and search for Jim Browning, Kitboga or Scammer Payback so you can know what to look for with new or emerging risks.&nbsp;<\/span><\/p>\n<p><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.44; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Don\u2019t open links or attachments!<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.44; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">If you don\u2019t know someone, don\u2019t open a link or attachment. Attachments like pictures or videos may seem fine at first but they could be installing malware. Even if you do know someone, if you receive a message from someone you may know, understand that it may NOT be them sending you the message. They could have been hacked with a virus and to infect other computers, the virus could be sending out spam-like emails or messages to pretend to be someone you know. Call someone you know if you get a suspicious email or text from them. Confirm they sent it. This could save you thousands of dollars and lots of heartache.&nbsp;<\/span><\/p>\n<p><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.44; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Protect your details!<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.44; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">If you\u2019re being asked about any information from anyone you don\u2019t know online or in a message of some kind, suspect the worst. Try and verify as much as possible before giving out any personal details. Call someone back if they have called you. Send an email directly from a company\u2019s website when looking to verify if a legitimate request has been made of you. The least amount of information you give people online, the better.&nbsp;<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.44; margin-top: 0pt; margin-bottom: 0pt;\">\n<\/p><p dir=\"ltr\" style=\"line-height: 1.44; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">&nbsp;<\/span><\/p>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aeefb89 elementor-widget elementor-widget-heading\" data-id=\"aeefb89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-medium\">Watch episode 6 of Dark Side of the Web NOW!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-09a3570 elementor-widget elementor-widget-video\" data-id=\"09a3570\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=t14j6t9WwB4&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Updated: December 6, 2021 &nbsp; Episode Background: In the episode \u201cForeign Prince\u201d, a child gets his first taste of scammers through a commonly known email scam.<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"wp_social_preview_title":"","wp_social_preview_description":"","wp_social_preview_image":0,"footnotes":""},"class_list":["post-1736","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/helpusdefend.com\/index.php?rest_route=\/wp\/v2\/pages\/1736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/helpusdefend.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/helpusdefend.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/helpusdefend.com\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/helpusdefend.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1736"}],"version-history":[{"count":15,"href":"https:\/\/helpusdefend.com\/index.php?rest_route=\/wp\/v2\/pages\/1736\/revisions"}],"predecessor-version":[{"id":2367,"href":"https:\/\/helpusdefend.com\/index.php?rest_route=\/wp\/v2\/pages\/1736\/revisions\/2367"}],"wp:attachment":[{"href":"https:\/\/helpusdefend.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}