1
00:00:00,000 --> 00:00:14,960
Hello, and welcome back to the Paddock Room.

2
00:00:14,960 --> 00:00:15,960
I'm Margo.

3
00:00:15,960 --> 00:00:22,000
I'm here with Wayne, and this is Talking Tech with Wayne, the podcast dedicated to

4
00:00:22,000 --> 00:00:27,860
discussing smartphones, smart homes, and everything in between.

5
00:00:27,860 --> 00:00:35,160
This show is a promise of information freely given to all that seek it, and that is a pack

6
00:00:35,160 --> 00:00:38,200
between us and all of you.

7
00:00:38,200 --> 00:00:49,360
Log into our website, www.talking-tech.org, and click the Join a Discussion button to

8
00:00:49,360 --> 00:00:52,040
join a discussion.

9
00:00:52,040 --> 00:00:58,520
While there, check out TV shows, or click the Schedule a Call button to explore how

10
00:00:58,520 --> 00:01:05,120
to bring a Talking Tech discussion group to your local church or community center.

11
00:01:05,120 --> 00:01:13,600
We also have a helpline where trained technicians are ready to answer your questions 24-7.

12
00:01:13,600 --> 00:01:18,160
And best of all, it's 100% free.

13
00:01:18,160 --> 00:01:22,920
That number is 215-406-HELP.

14
00:01:22,920 --> 00:01:29,920
215-406-4357.

15
00:01:29,920 --> 00:01:39,600
Today and in our next two podcasts, we will discuss online safety for parents and grandparents.

16
00:01:39,600 --> 00:01:43,800
Wayne, what should our listeners know?

17
00:01:43,800 --> 00:01:47,080
Hello, Margo, and hello to all of our listeners.

18
00:01:47,080 --> 00:01:49,360
It's great to be here today.

19
00:01:49,360 --> 00:01:55,760
I'm excited to help shed some light on the importance of online safety for everyone,

20
00:01:55,760 --> 00:01:58,560
especially parents and grandparents.

21
00:01:58,560 --> 00:02:00,160
Wonderful, Wayne.

22
00:02:00,160 --> 00:02:02,760
So let's jump right in.

23
00:02:02,760 --> 00:02:08,280
Why has online safety become so significant for all age groups?

24
00:02:08,280 --> 00:02:12,840
Well, Margo, the world is increasingly becoming digital.

25
00:02:12,840 --> 00:02:18,280
We use the Internet for almost everything, from shopping and banking to socializing and

26
00:02:18,280 --> 00:02:19,560
working.

27
00:02:19,560 --> 00:02:26,880
This widespread use of the Internet makes it vital for anyone, in respect of age, to

28
00:02:26,880 --> 00:02:31,080
understand how to stay safe online.

29
00:02:31,080 --> 00:02:32,720
That's true.

30
00:02:32,720 --> 00:02:38,760
Wayne, our lives are quite entwined with the digital world.

31
00:02:38,760 --> 00:02:40,480
Absolutely, Margo.

32
00:02:40,480 --> 00:02:45,600
And that's why it's not just about knowing how to use the Internet, but it's also about

33
00:02:45,600 --> 00:02:48,600
knowing how to use it safely.

34
00:02:48,600 --> 00:02:54,160
This includes understanding the various risks associated with online activities and how

35
00:02:54,160 --> 00:02:58,080
to protect ourselves and our loved ones.

36
00:02:58,080 --> 00:03:01,680
So it's about being proactive, then.

37
00:03:01,680 --> 00:03:02,960
Exactly, Margo.

38
00:03:02,960 --> 00:03:08,880
Being proactive and informed is our first line of defense regarding online safety.

39
00:03:08,880 --> 00:03:14,200
And that's exactly what we hope to achieve with this podcast series.

40
00:03:14,200 --> 00:03:21,120
Over the next few episodes, we'll dive deeper into what the online world entails.

41
00:03:21,120 --> 00:03:26,880
The potential risks and threats one should be aware of, and most importantly, how to

42
00:03:26,880 --> 00:03:33,320
protect oneself and ensure the online safety of children and grandchildren.

43
00:03:33,320 --> 00:03:35,000
Yes, Margo.

44
00:03:35,000 --> 00:03:39,360
And I think it's important for our listeners to know that online safety isn't something

45
00:03:39,360 --> 00:03:41,040
to be scared of.

46
00:03:41,040 --> 00:03:44,760
It's just about equipping ourselves with the right knowledge.

47
00:03:44,760 --> 00:03:51,240
And once you have that, you'll find the digital world is a wonderful place to explore.

48
00:03:51,240 --> 00:03:57,640
Now that we've established the importance of online safety, let's dive deeper into

49
00:03:57,640 --> 00:04:02,440
what we'll cover in this podcast series.

50
00:04:02,440 --> 00:04:03,600
Absolutely, Margo.

51
00:04:03,600 --> 00:04:08,440
We aim to provide our listeners, especially parents and grandparents, with the knowledge

52
00:04:08,440 --> 00:04:13,280
and tools they need to navigate the digital world safely.

53
00:04:13,280 --> 00:04:19,720
We structured these two podcasts to tackle different aspects of online safety systematically

54
00:04:19,720 --> 00:04:22,560
and easily digestible.

55
00:04:22,560 --> 00:04:29,000
So Wayne, can you walk us through the structure and objectives of our discussions?

56
00:04:29,000 --> 00:04:32,080
What will be our first point of discussion?

57
00:04:32,080 --> 00:04:36,920
Our first major topic will be about understanding the online world.

58
00:04:36,920 --> 00:04:44,000
We'll discuss the various platforms and services we commonly use, like email, social media,

59
00:04:44,000 --> 00:04:48,680
and online banking, and their potential risks.

60
00:04:48,680 --> 00:04:49,680
Right.

61
00:04:49,680 --> 00:04:54,160
It's crucial to know the terrain before we learn how to navigate it.

62
00:04:54,160 --> 00:04:55,880
Exactly, Margo.

63
00:04:55,880 --> 00:05:02,760
After that, we'll discuss common online threats like phishing, scams, and malware.

64
00:05:02,760 --> 00:05:08,480
We'll help our listeners identify these threats and advise them on what to do if they encounter

65
00:05:08,480 --> 00:05:09,480
them.

66
00:05:09,480 --> 00:05:14,680
Scary stuff, but it's better to be informed and prepared.

67
00:05:14,680 --> 00:05:16,480
What's next after that?

68
00:05:16,480 --> 00:05:23,640
We'll move on to proactive measures, covering various ways to ensure our safety and safety

69
00:05:23,640 --> 00:05:26,520
of our loved ones online.

70
00:05:26,520 --> 00:05:34,040
This will include tips on setting strong passwords, using secure networks, and recognizing secure

71
00:05:34,040 --> 00:05:35,640
websites.

72
00:05:35,640 --> 00:05:39,080
That sounds like really valuable information.

73
00:05:39,080 --> 00:05:41,200
And lastly?

74
00:05:41,200 --> 00:05:45,600
Lastly we'll discuss how to educate the younger generation about online safety.

75
00:05:45,600 --> 00:05:51,440
We'll provide advice on how to talk to your kids or grandkids about the Internet and set

76
00:05:51,440 --> 00:05:56,080
boundaries and rules to keep them safe online.

77
00:05:56,080 --> 00:05:58,120
That's fantastic, Wayne.

78
00:05:58,120 --> 00:06:01,960
We have a lot to look forward to in this podcast series.

79
00:06:01,960 --> 00:06:09,360
So dear listeners, join us as we embark on this journey to ensure online safety for ourselves

80
00:06:09,360 --> 00:06:11,160
and our loved ones.

81
00:06:11,160 --> 00:06:16,960
Wayne, could you help us understand what the Internet actually is?

82
00:06:16,960 --> 00:06:18,520
Of course, Margo.

83
00:06:18,520 --> 00:06:24,080
In the simplest terms, the Internet is a global network of computers that are connected and

84
00:06:24,080 --> 00:06:26,440
communicate with each other.

85
00:06:26,440 --> 00:06:32,920
This allows us to access and share information almost instantly, no matter where we are.

86
00:06:32,920 --> 00:06:35,080
That's a great start, Wayne.

87
00:06:35,080 --> 00:06:38,840
Now we often hear the term social media.

88
00:06:38,840 --> 00:06:42,400
Could you explain what that means?

89
00:06:42,400 --> 00:06:43,920
Absolutely Margo.

90
00:06:43,920 --> 00:06:50,600
Social media refers to online platforms where people can create and share content and interact

91
00:06:50,600 --> 00:06:52,240
with each other.

92
00:06:52,240 --> 00:06:59,600
Some popular examples of social media platforms include Facebook, Instagram, Twitter, and even

93
00:06:59,600 --> 00:07:00,600
YouTube.

94
00:07:00,600 --> 00:07:02,560
Thank you, Wayne.

95
00:07:02,560 --> 00:07:09,240
So these platforms are where we can interact with our friends and family online.

96
00:07:09,240 --> 00:07:13,240
What about digital communication tools, Wayne?

97
00:07:13,240 --> 00:07:18,240
Digital communication tools include any kind of technology that allows us to communicate

98
00:07:18,240 --> 00:07:20,880
with others online.

99
00:07:20,880 --> 00:07:26,440
This can range from emails, which allows us to send messages and documents to each other,

100
00:07:26,440 --> 00:07:33,560
to video calling platforms like Skype or Zoom, where we can talk to and see our loved ones,

101
00:07:33,560 --> 00:07:36,640
even if they're on the other side of the world.

102
00:07:36,640 --> 00:07:42,440
It's truly amazing how the online world brings us closer together.

103
00:07:42,440 --> 00:07:47,520
But as we know, with such advantages, there also comes certain risk.

104
00:07:47,520 --> 00:07:54,760
Wayne, can you shed some light on how the digital age has changed our communication?

105
00:07:54,760 --> 00:07:55,960
Certainly Margo.

106
00:07:55,960 --> 00:08:01,240
The digital age has transformed communication significantly.

107
00:08:01,240 --> 00:08:06,960
In the past, we'd have to write letters or make phone calls to connect with people far

108
00:08:06,960 --> 00:08:08,280
away.

109
00:08:08,280 --> 00:08:14,080
Now with the internet, we can send an instant message or even have a video call with anyone,

110
00:08:14,080 --> 00:08:16,440
anywhere, anytime.

111
00:08:16,440 --> 00:08:21,080
This has made communication more efficient and accessible.

112
00:08:21,080 --> 00:08:22,680
That's true.

113
00:08:22,680 --> 00:08:26,680
And what about our social interactions?

114
00:08:26,680 --> 00:08:28,840
Great question, Margo.

115
00:08:28,840 --> 00:08:32,560
Social media has indeed changed how we socialize.

116
00:08:32,560 --> 00:08:37,800
Instead of waiting for a family gathering or a social event, we can now interact with

117
00:08:37,800 --> 00:08:45,320
our friends, family, and even strangers right from our homes in real time.

118
00:08:45,320 --> 00:08:52,120
We share our lives, exchange ideas, and celebrate important memories virtually.

119
00:08:52,120 --> 00:08:58,840
It has also opened opportunities to connect with like-minded communities and individuals

120
00:08:58,840 --> 00:09:02,280
we may never have met otherwise.

121
00:09:02,280 --> 00:09:05,960
How has social media influenced the way we socialize?

122
00:09:05,960 --> 00:09:12,280
There's no denying that the online world has its own charms.

123
00:09:12,280 --> 00:09:17,760
But as we've mentioned before, with these benefits come certain risks.

124
00:09:17,760 --> 00:09:20,840
And that's what we're here to discuss.

125
00:09:20,840 --> 00:09:25,840
So help our listeners navigate this new world's safety.

126
00:09:25,840 --> 00:09:33,320
Wayne, can you explain what phishing, scams, and malicious links are?

127
00:09:33,320 --> 00:09:35,600
Of course, Margo.

128
00:09:35,600 --> 00:09:42,120
Phishing is an online scam where cybercriminals trick you into revealing sensitive information

129
00:09:42,120 --> 00:09:45,480
like your passwords or credit card numbers.

130
00:09:45,480 --> 00:09:51,960
They often do this by pretending to be trustworthy in an email or a text message.

131
00:09:51,960 --> 00:09:57,600
So they kind of fish for your personal details, right?

132
00:09:57,600 --> 00:09:59,080
Exactly.

133
00:09:59,080 --> 00:10:01,160
That's why it's called phishing.

134
00:10:01,160 --> 00:10:09,120
Now scams are deceptive activities aimed at illegally obtaining money or personal information.

135
00:10:09,120 --> 00:10:14,560
Online scams can take many forms, from lottery scams where you're told you won a large sum

136
00:10:14,560 --> 00:10:21,200
of money, to romance scams where a scammer forms a relationship with you to defraud you.

137
00:10:21,200 --> 00:10:23,200
That sounds scary.

138
00:10:23,200 --> 00:10:26,120
What about malicious links?

139
00:10:26,120 --> 00:10:32,440
A malicious link is a hyperlink designed to damage or infect your computer, typically

140
00:10:32,440 --> 00:10:35,160
by installing malware.

141
00:10:35,160 --> 00:10:41,000
These links appear in emails, social media platforms, or websites.

142
00:10:41,000 --> 00:10:46,160
They often look like legitimate links, but clicking on them can compromise your device

143
00:10:46,160 --> 00:10:48,040
and data.

144
00:10:48,040 --> 00:10:50,920
That's definitely something to watch out for.

145
00:10:50,920 --> 00:10:52,640
Thanks for breaking it down.

146
00:10:52,640 --> 00:10:58,280
Now Wayne, let's discuss identity theft and data breaches.

147
00:10:58,280 --> 00:11:03,960
What exactly are they and why should our listeners be concerned?

148
00:11:03,960 --> 00:11:05,880
Good question, Margo.

149
00:11:05,880 --> 00:11:08,080
Let's start with identity theft.

150
00:11:08,080 --> 00:11:13,080
This is when someone unlawfully attains and uses your personal information such as your

151
00:11:13,080 --> 00:11:21,400
name, social security number, or bank account details, typically for financial gain.

152
00:11:21,400 --> 00:11:27,360
This can lead to significant harm such as unauthorized transactions, damaged credit,

153
00:11:27,360 --> 00:11:29,680
or even legal issues.

154
00:11:29,680 --> 00:11:32,280
That's quite concerning.

155
00:11:32,280 --> 00:11:37,400
Often this ties back to data breaches, which is the other term you mentioned.

156
00:11:37,400 --> 00:11:43,360
A data breach occurs when secure or private information is released into an untrusted

157
00:11:43,360 --> 00:11:45,120
environment.

158
00:11:45,120 --> 00:11:50,640
This can happen if an organization that holds your personal data, such as a bank, healthcare

159
00:11:50,640 --> 00:11:55,560
provider, or even a social media platform is hacked.

160
00:11:55,560 --> 00:12:03,480
It sounds very serious, but how does someone get access to such personal information?

161
00:12:03,480 --> 00:12:05,200
Not at all, Margo.

162
00:12:05,200 --> 00:12:10,680
While we can't control the security measures of every organization that holds our data,

163
00:12:10,680 --> 00:12:14,960
we can certainly take steps to protect ourselves online.

164
00:12:14,960 --> 00:12:17,720
Can you elaborate a bit more?

165
00:12:17,720 --> 00:12:21,600
How can oversharing online lead to threats?

166
00:12:21,600 --> 00:12:22,600
Sure.

167
00:12:22,600 --> 00:12:25,440
Let's take a simple example.

168
00:12:25,440 --> 00:12:30,400
Say you posted a picture of your brand new driver's license on social media.

169
00:12:30,400 --> 00:12:35,640
While it might seem harmless, it provides enough information for someone to steal your

170
00:12:35,640 --> 00:12:37,680
identity.

171
00:12:37,680 --> 00:12:40,560
That's quite eye-opening.

172
00:12:40,560 --> 00:12:46,440
So Wayne, what should our listeners keep in mind to avoid oversharing?

173
00:12:46,440 --> 00:12:52,520
It's crucial to be aware of what you're posting and to whom it's visible.

174
00:12:52,520 --> 00:12:58,280
Before sharing anything, think twice about whether it's necessary and who might see

175
00:12:58,280 --> 00:12:59,280
it.

176
00:12:59,280 --> 00:13:04,320
Always double-check your privacy settings on social media platforms to ensure that only

177
00:13:04,320 --> 00:13:11,840
trusted people can view your posts and never share sensitive information like bank details

178
00:13:11,840 --> 00:13:15,000
or social security numbers online.

179
00:13:15,000 --> 00:13:17,320
Absolutely.

180
00:13:17,320 --> 00:13:23,080
As with all of the information we share here, flex your Google search muscles, log into

181
00:13:23,080 --> 00:13:32,920
our website, www.talking-tech.org, all lowercase, or call our helpline.

182
00:13:32,920 --> 00:13:37,440
And that number is 215-406-HELP.

183
00:13:37,440 --> 00:13:41,440
That's 215-406-4357.

184
00:13:41,440 --> 00:13:46,920
Well, I see that's all the time I have for today.

185
00:13:46,920 --> 00:13:52,400
It has been my pleasure to be here and I look forward to the next time we can do it again.

186
00:13:52,400 --> 00:13:56,280
I wish you all a farewell.

187
00:13:56,280 --> 00:14:02,760
Talking Tech with Wayne podcast was produced by Grey Geek Productions, hosted by Margo

188
00:14:02,760 --> 00:14:05,760
Jones and Wayne Hunter.

189
00:14:05,760 --> 00:14:11,800
Tech was Transparser Blue Jazz by Stefan Cartonberg.

