Trading Secrets - 190. More Than Money: Decoding online safety from personal data to shopping with former TikTok cybersecurity lead, Caitlin Sarian aka Cybersecurity Girl

Episode Date: August 8, 2024

This week, Jason is joined by former TikTok cybersecurity lead and tech influencer Caitlin Sarian aka Cybersecurity Girl! Caitlin dives into ways to protect your data online, her journey working at T...ikTok and how it started with them asking her to speak, debunking conspiracy theories, what she believes the biggest cybersecurity threat in social media is, and the essentials to strong passwords PLUS,  how to check if your accounts have been breached, how to get your personal information removed from the internet, what the pay range is, how to shop safely online, her insider perspective on cracking the algorithm and so much more!  It’s an episode you can’t afford to miss!  Host: Jason Tartick Co-Host: David Arduin Audio: John Gurney Guest: Cybersecurity Girl  Stay connected with the Trading Secrets Podcast!  Instagram: @tradingsecretspodcast  Youtube: Trading Secrets Facebook: Join the Group All Access: Free 30-Day Trial 

Transcript
Discussion (0)
Starting point is 00:00:00 Welcome back to another episode of Trading Secrets, More Than Money Edition. Caitlin Sirian, she is an ex-Tick-Tac cybersecurity lead. So she's a tech influencer, and she wants to help you guys protect and secure your data online and break into the tech industry. So anything as it relates to engineering, cybersecurity, she has built an amazing, amazing community, and she's here to support any of us in any way, help us build our network and help us flourish in tech. So if you have questions on, I mean, anything, right?
Starting point is 00:00:39 I mean, just the inner workings of TikTok and the algorithm of TikTok. And I mean, cybersecurity now more than ever is so important. If this stuff gets hacked, it's at jeopardy. It's like your bank account being hacked. So Caitlin's going to help us through that as we have questions. If you have questions and you want to come on and ask Caitlin a question, put it in the chat, or I will unmute guys and make sure you can come on. But with that being said, Caitlin, thank you so much for joining us.
Starting point is 00:01:05 Caitlin, first question I got for you. I mean, TikTok, the growth has been absolutely insanity. You have left TikTok, but you started with them. When did you start with them? And how did just the inner workings of that company change over just this crazy material growth we've seen in the last three years? Yeah. So I always wanted to, I'll give you a little bit of background.
Starting point is 00:01:25 I always wanted to start my TikTok right after they move from their China. to the US. So I actually specifically specialize in data privacy and data protection. So I was living in the UK for a few years. I'm helping with GDPR, but I was recommending my clients to not use TikTok until they moved over to the U.S. And obviously their massive growth allowed them to partner with Oracle and move their servers over to the U.S. So they all sit in the U.S. And once they started doing that, I was like, you know, TikTok is the most incredible platform. You can reach so many people with it. And I started my journey with TikTok and my cybersecurity channel. And ironically, TikTok reached out to me to actually speak for them at a conference. And it was crazy. I was like,
Starting point is 00:02:07 I actually couldn't end up not being able to do it. I had some conflicts with work. But we stayed connected and this amazing opportunity to work for them came up. And I'm going to be completely honest, I was expecting it to be kind of a cluster when I got in just because of the news. I was like, I have my work cut out for me, and I got into the company, and I was so pleasantly surprised with, at least with their cybersecurity practices and the employees that work there, like ex-FBI agents, CIA agents, they are extremely organized. And there's a lot of conspiracy theories as to why I think they continue to hit the news. But I used to be a consultant for eight years before I started TikTok. And I did consulting for many of the other
Starting point is 00:02:53 competitors and it was it was crazy what I saw happening so I was expecting that when I got to TikTok and I was so pleasantly surprised that it wasn't actually like that so all right so I am I'm not a huge believer in conspiracy theories but I am one that's very entertained by conspiracy theories like I love to just hear them all was entertaining what are some of that you mentioned conspiracy theories like what are some of those that are out there for us that don't know just about like what could be happening in TikTok or what's like your favorite one or one that like always caught your eye on that people would say. I guess it's not what can be happening in TikTok, but the reasons why everyone's so out against them is probably because they're the one platform that
Starting point is 00:03:33 the U.S. doesn't have full control over. Their algorithm is like top secret. And I mean, I think the other competitors are very much controlled by U.S. and big companies within the U.S. And so they can use them how they will, but they can't do that with TikTok. And I think that's why it's a big, scary thing for most politicians here. And it's not actually, I mean, it might be because of the China thing, but I can tell you that I feel extremely, I've seen the inner workings and everything that is said is just completely blown out of proportion.
Starting point is 00:04:08 So I honestly think it's because the U.S. can control it. And not in like a bad way of controlling, but they just have no way of like force feeding us specific information. And yeah, the news usually force feeds us some information that, Yeah. It's all. That's my conspiracy theory. No, I think I think that's like so fascinating and I actually agree with really everything you're saying here. I'll just one more reminder to everyone. You have questions. Throw me in the chat. You want to come on and ask a question. Please come on in. Caitlin was an ex-Tick-Ticot cybersecurity leads. So that is out there. All right. So Caitlin, we talked a little bit about the conspiracy theories. Let's talk about the fact you got hired by them. That is a that is a very unconventional way to get hired by. employer and what I find intriguing and hopefully some of our All Access members do. You said TikTok hired you for speaking. So first and foremost, how did that come about? Did they reach out to you? What was that process like? Just tell us a little bit how they even found you. And if someone
Starting point is 00:05:07 wanted to like get a hold of the TikTok world gods, like where do you even start? Yeah. So their head of all of global cybersecurity reached out to me to come to a conference and like, you know, talk to their employee just about cybersecurity best practices. So what we, what people don't realize is there's really two forms of cybersecurity, right? There's like training your employees because honestly your employees are your biggest link and you're only as strong as your weakest link. So it was more to just make cybersecurity more available and educational to their employees just to make sure because just because we work at TikTok, not everyone, you know, there's marketing, there's sales, just like every other
Starting point is 00:05:47 business. And so not everyone is really focused on cybersecurity. So it was, it was really asking me to speak about and bring cybersecurity into a more positive light and more fun and educational view rather than it just being like, we all know those typical trainings that in corporate where you kind of just check the box and it's not really helpful. But yeah, that's kind of how it started. And then we continue just to talk. I love their leadership team. It's amazing. And And yeah, I was very intrigued and this role came up. And I was like, yeah, I would love, I would love to be part of the team. And I'm a huge advocate of the platform. I mean, obviously every social media platform, there's, you know, blessings and curses, I guess. But I think
Starting point is 00:06:31 there's so much good that can be had with social media that outweigh the bad. So I'm, I'm very passionate about all social media platforms, not just TikTok. But yeah, that's kind of how it came about of how I got asked. And it was, it was pretty cool. Cool. I'm going to let you think about it because I'm going to ask you the golden question. If I gave you $100,000 right now and you had to bet will TikTok be banned in five years from now in the United States, will it be? Don't answer it yet. Think about it. Before we get to that, let me ask you this. The biggest cybersecurity threat, all of us here on this All Access Group and anybody that sees trading secrets on our Instagram page or as a listener, what is the biggest cybersecurity threat
Starting point is 00:07:10 we are facing right now with our social media and what can we do about it? I immediately it's like human risk. It's I think we're our own worst enemy when it comes to this and it's because we're never been educated. We've been given technology literally since we're children and no one actually knows how to use it. No one knows really how it works and we're not told how to keep it safe. And so I think just human risks and it's not because we're like maliciously trying to do it, but it's because we just don't know any better, which is why I really started this this journey and education. Obviously there's going to be badass. actors everywhere all over the world. But if you, if us as humans know how to protect ourselves, it won't be that bad. Okay. What is one thing that you like the basic most 101 sitting, a big on takeaways that all of us here can walk away doing today to put our social medias or online presence in a better or more secure manner? What is one thing we could all do? Oh man. There's so many things. And they're, they're pretty easy. Give us like three. Give us your top three. So the first one is passwords. And I, and I,
Starting point is 00:08:15 hate saying that it sounds so annoying and I understand that it sounds annoying but passwords are a big thing um make them secure make them long make them complex there's a lot of different theories around like okay should you have different passwords for everyone there's also companies like that have their password managers that you can use at store the like secure passwords and then yeah there's just passwords are really really important so i would really focus on that the next one is multi-factor authentication, which really is like authenticating yourself in two ways, right? Just today, I got an email saying someone tried to reset my Instagram password, and I'm like, wasn't me, but because I have multi-factor authentication and they texted me, these people aren't
Starting point is 00:08:56 getting in. And it's not that hard to turn on. It's a very simple step. So at least those two for sure are like basic standard things that you guys should do. Yeah, that's probably the easiest takeaway, those two. What's interesting is there's someone actually that's going to be on the finale The Bachelor Tonight that I managed. And ironically, right before this, he had someone try and go into his Instagram account and hack it. He sent me the screenshot of it. And the first thing I said to it was like double authentication, double authentication, double authentication. So that's a big one.
Starting point is 00:09:29 When you say password, like I, my passwords are the most basic bullshit in the world. Your dog name? So like, but like who is actually explained to me from a text? standpoint, who's actually going in there and trying to guess your password? Or is it actually like AI and computers that are just running thousands of passwords at a time? Like, how does it actually work? So there's a standard set of like most common passwords that are run against most of these, most users accounts. Then whenever your name is involved in a data breach, those passwords are leaked. And so then those passwords are now affiliated with that specific email or login or
Starting point is 00:10:09 username name. And so it's really easy for people to find and run those password. And then there's a really easy algorithm what you can do, like, changes. Let's say like your password was, you know, your dog's name. So then they obviously knew that it used to be your dog's name, but then there's a script that allows them to generate 10,000 different variations of like your dog's name one, your dog's name exclamation point, your dog's name one, two, three. So like even changing it by like one letter, it like doesn't do anything. And it's because it's out there. So, and data breaches happen all the time. Like not purposely a lot of times it's ransomware other threat
Starting point is 00:10:43 actors, but once there's a data breach and there's actually a website that you can go on to see which accounts that you have that have been breached. And it's that have I been appone.com, but I can give it to your followers in a second or I can write it in the chat. But it literally lists every single account when it was breached and the credentials and everything that they got. And if any of those credentials are still being used on any of your other accounts, it's very easy for someone to just go in and or if you haven't changed those passwords or, like, updated it by like one. It's not that hard to get for people to get it if they want to get in. Obviously, there's not like crazy, malicious people that want
Starting point is 00:11:24 to try everyone's, but everyone can be a target. And I mean, my mom was targeted and I'm like, I don't know why she's targeted, but maybe because they were trying to get to me. I don't know. But like, you just never know. So it's just better to be safe than sorry. Okay. The questions are starting to pile in. I think that's a great. piece of advice. If you could, we're going to have one person come on and ask a question. If you could just take a minute and put it in the chat, that website, that would be really, really good for us all to walk away with. While you're doing that, Caitlin, let's get a question from the chat. And let's start with Hillary. Caitlin put it in there. Have I been password?
Starting point is 00:11:59 Pond. Pond. Okay. They're missing the A. It's actually poed, but I say pawned. And actually my first viral video, I said pawned and people like exploded on me. They're like, you can't be in cybersecurity. if you don't know how to say poned. And I'm like, it's the weirdest phrase. Just leave it alone. It's true. All right. Hillary, come on. What do you got? Yeah. So I put this in the chat, but I use a password manager. I know there's a couple out there and I use one password. And I feel like it took me a while to set it up. But now when I set up new accounts or need to change my password, it just uses like the auto-generated. But I also know that those kinds of companies have also been hacked. So I was curious about your
Starting point is 00:12:35 thoughts. Yeah. No, that's a great question. I actually use one password too. so amazing. There are some that get hacked, and it's the way that they're storing credentials. And so LastPassword is an example of the password manager that you don't want to use because they store credentials in an old school way. It's kind of complicated on how everything's stored. But I trust one password. LastPass is I would definitely not do. I think they've had six breaches in the last like 10 years or something ridiculous. But yeah, that's a great question. It just depends on how that company, another really good one is Keeper Security. It's about how that company is storing passwords and, like, if they're storing it locally on, you know, servers and then it's easy for people to get in, or if it's just communicating between two of their servers and it's harder because it's not actually being stored.
Starting point is 00:13:22 It's being stored somewhere in between your device and their servers. Cool. Thank you. That's a great question, Hillary. Awesome. Kaley, I saw you had a question. He says there are a program that you would recommend that checks for any breaches your accounts could have. I think you said that though before have I been pawn.com. So that would answer that question, right? Just using have I been pond.com, Caitlin. Yeah, I would definitely use that because that shows all literally all the breaches.
Starting point is 00:13:49 And it was made by like an I think it's the FBI or CIA agent. So it's a very, it's been around for a while too. The other thing is a lot of people ask me how can they tell someone like in their account or like if they've been hacked? And there's, I mean, obviously my social media has a lot of tips on how to look and check, but there's a lot of ways to tell who's been logged into accounts at this point. So, like, Google, you can tell who's, like, what devices are logged in and where they're logged in from, WhatsApp, your Apple account. Like, there's a lot of accounts that you can kind of just double check to make sure that
Starting point is 00:14:22 people aren't, like, logged in and, like, looking through your stuff. Perfect. Okay, that's, that's great. And great question, Kaylee. All right, Julie has a few questions. So, Julie, I'm going to let you come on and fire away. All right. Hey, Caitlin.
Starting point is 00:14:34 I have a question for you. How do you stay safe? and private when you're growing your company as a personal brand. Yeah, that's a really good question. I guess my question back to you is, what's your definition of safe and private? I'm very paranoid, so I don't want anyone to know where I live or come after me for money because I'm in the make money online space. So before you advertise how much you make online, you get more customers, but then you're
Starting point is 00:15:01 putting a target on your back. So you don't want to come on trading secrets and talk about how much you made this past year? I might have already done that actually I was a listener calling I remember that but I've been thinking more about that and it's one of the reasons it kind of stops me from wanting to put myself out there
Starting point is 00:15:17 yeah no I feel you I mean as a cybersecurity person on TikTok I'm like I have her biggest target on my back because people just want to try to hack the cybersecurity girl I use a lot of different platforms one of them is delete me it helps literally it scans and delete your information off of the
Starting point is 00:15:34 yeah the main data servers. So I would definitely start with that. I started doing it manually a long time ago, and actually some of my bio videos are like how you can go about doing it manually. But honestly, I don't know how much it is, maybe like $100 a year or something. It's worth it because they find it all. I think they scan like 1,200 websites. And most of them are like the main data broker websites. And they remove your information. And you give them like all all sorts of combinations of like where you've previously lived and all that stuff. And then they scan every single website. So I've lived in like 12 different states, honestly, in the last like six years. And so
Starting point is 00:16:10 even different states have records of you different ways. So I honestly kind of swear by delete me because I don't have the time to go about finding my first and last name in every state that I've ever lived in or done anything in. And they go every couple months and recheck to make sure that your stuff's not there. The other thing is don't give out your real information. Like if you have a Google Voice number, start using that. There's also a new company called Cloaked, which I think is still in beta. I think it's launching in September. But they allow you to generate real working phone numbers, emails, and passwords and assign it to, like, if you want to do a rewards program at Starbucks, like you can do it on your app. And it's similar to Google Voice where everything
Starting point is 00:16:51 will go through your app. Emails will go through your app. Text messages will go through your app. And you can have it forwarded to your real phone, but at least it's not your real stuff. So I've just started giving out, like, not like fake numbers, but like not my real stuff. And I would just try to avoid like whenever they ask to track cookies, I like make sure I usually set that to do not track cookies. Anytime you try to like buy something new on a website, I just try to avoid my digital footprint. And if I have to do it, I kind of like span it out to like random ones that I generate from
Starting point is 00:17:23 this app. So I'm trying to avoid. I mean, obviously I'm kind of all out there. but with my personal information, there's a lot of ways that now that you can, like, kind of manage who you're sharing that with. Like, even people I meet at, like, bars
Starting point is 00:17:38 or I don't even know, like, conferences, like, I don't give out my real information to anyone anymore because you can get so much information even off of a phone number. Like, I can look up the reverse phone number, search you, and probably find your first and last name,
Starting point is 00:17:53 like your home address, your parents' home address, like so many things. How do you do that? A lot of brand calls these days. Yeah, I think it's called like reversed phone search or reverse phone lookup. There's a lot of things that you can do because your phone, like for every single data broker website, phone number is attached to it.
Starting point is 00:18:10 So this software really allows them to just like re-engineer that and pull the information from that. Usually you have to pay. But even with like pictures of people, like you can literally, there's there's software that you can input a picture and it will show all the similar pictures like Google image search. and like some people like find me on like LinkedIn so that was like an issue when I started working at TikTok they were like okay well they can reverse Google Amazon search you and realize that you work at TikTok and I'm like okay cool but yeah so it's just it's just making sure that you kind of reduce your digital footprint and then make sure when you are giving information it's try to not give your real one or give a like Google voice or something else if you had
Starting point is 00:18:53 multiple people sharing one social account for a company would you use the Google voice for the company like email address or would you do something else because we lock each other out if it's someone's personal cell phone. Yeah. So I'm trying to understand the question. You're saying like there's like three of you that are all on the same Instagram like business account and then every time you kind of kick each other out. Do you do it on purpose? Are you asking if it's like on purpose or? I mean, anytime we try to set up two factor off. I mean, it could be for anything like bank account, whatever. If it's to one of our email or phones. then we're kind of like locking the group out.
Starting point is 00:19:29 So we thought, oh, let's use Google Voice. But now I'm like, is that a bad idea? It sounds like it's not, but is it bad if it's like the company Google Voice, if it's like the same thing because it could go to the email and someone could get in that way? Yeah, if it's a company Google Voice that goes to the same email authentication, I wouldn't do it. But if the Google Voice is attached to like a different company email, like I would just generate like a different company email like one off and have it go to that Google Voice.
Starting point is 00:19:54 because every Google email, you can generate a Google voice number. Also, I just found out a couple of months ago. Google's been cracking down on Google Voice. So if you're not using it frequently, they are kicking people off the platform because there's just so many people using Google and they don't have the space. So just be very if you're using Google Voice and you only use it like once every like six months and it's like your password for something, try to use it a little bit more often because I don't want you guys to get kicked out.
Starting point is 00:20:23 and then the number reassigned and then you're going to not be able to log in. So thank you. Yeah, of course. Okay. Can you post the link to delete me? Worried fake ones would show, Hillary, show up in a Google search. Tell me more about that. I didn't get talking about what the program was called.
Starting point is 00:20:43 It was an app called Delete Me or is it a website? It's kind of both. I go through the website because at the beginning you do have to give a lot, I had to give a lot of information just because I want them to delete. like everything. I even gave like my brother's name, my sister's name, because I'm like, if I'm attached to them on theirs, then I need theirs to be deleted too because I don't want any tie. I don't want them to get hacked either. But yeah, it's an, it's a website and an app. I think it's an app. I just do the website. Well, thank you. Yeah, of course. Okay. Question about just
Starting point is 00:21:11 the industry, you know, training secrets. It sounds very technical. It sounds like this is like extremely, you know, forward thinking and well ahead of the curve. I mean, you're trying to outthink and outperform and create solutions against some of the smartest hackers in the world. From like a salary range perspective, entry level to like high level, just give us a high understanding of cybersecurity. What does it look like? Yeah, so it's funny that you say technical because I truly believe that technical is more of like the coding hacking side, but there's so many other side.
Starting point is 00:21:40 So in my head, cybersecurity is like a science, right? There's so many types of sciences, chemistry, there's biology. But there's, and because of that, there's so many areas where like, yes, there are areas that are technical that you're going to have to like, you know, outthink the hacker and like try to code them and whatever. But there's also so many areas that aren't, which is like, you know, training and awareness, governance, risk and compliance, data privacy, data protection. And honestly, like you said, you have to outthink the hacker. So there's a lot of people that have like psychology degrees and stuff like that because we need literally every type
Starting point is 00:22:10 of person in cyber security. It's so broad. So I like to think there's like non-technical buckets of cyber and technical buckets of cyber. I don't think I'm technical at all. I do not know how to code anymore. I did mechanical engineering in college. So I did two classes of coding and they were my worst. I think I barely passed. I think it got C minuses in both. So I'm not good at coding, but I am good at understanding how things work. I'm good at communicating and like data protection privacy. There's lawyers involved in that. So from a salary range, it really depends on like what area you want to get into too, but I would say in general in the U.S. probably starting 70K, 80K, 80K, maybe if you're doing remote. And then it goes,
Starting point is 00:22:51 honestly a little nut. So, like, it's kind of low at the first three years, but after three or four years of being in cyber, you're in the 150 to 250 range as a base. Okay. Amazing. Very interesting. All right. I'm going to come back. We're going to go to Alyssa's question a second before we do. I'm going to go back to that $100,000 question, $100,000. You double your money if you're right. Is TikTok ban in the United States in five years from now? What do you think? I'm going to say, I hope not, but also given this, state of the U.S. I don't have a lot of faith. So I don't know. I'm going to say I hope not. Okay. I hope not. So we're going to say no. We'll say we're going to put that in follow back up
Starting point is 00:23:31 in five years and see what happened. We walked over some things that you could do to protect yourself. We went over the salary range. Talked a little bit about the inner workings of TikTok. The last thing I got to end with is just, oh, shopping question here. Okay. I'll get to that in a second. I got to get to like anything. You're in the influencing space. And then also you work for TikTok, are there anythings behind the scenes as it relates to like the algorithm or social media or just, just anything that you've had in like the think tank of TikTok conversations that just us typical average consumers would never be able to understand no or here. Could you give us like a trading secret? Yeah. So I actually, I can give you a trading secret from my personal
Starting point is 00:24:10 experience, but not I couldn't even get verified when I worked at TikTok. Like I like reached out to people and they were like, no. And I'm like, this is actually an issue because if someone says they're me and I work for you guys like you need to verify me I actually didn't get verified until after I left so people always ask me how can you like set me up with verification I'm like I can't help you with that but I can say it's in my opinion it's a numbers game I think hooks are really really important for for and like the way that it's set up but I honestly think it's the consistency of it and I think that's how every platform is now because they want as much content as possible yeah that's pretty I there's not there's really no
Starting point is 00:24:48 trading secrets. The algorithm is based on user preference. So that's the easiest and simplest way to say it. And people like, oh, what about? I'm like, no, I mean, it's literally based, it's SEO now. So I will say like TikTok is trying to compete with Google. And so you want to make long caption. You want to make it SEO friendly because if you think about it, TikTok is what, you know, the Gen Zers are using as Google. Everyone's searching for response, like, you know, searching questions. And it's easier honestly to follow like I broke a light and I couldn't get figure out how to get the light bulb out and I literally searched on TikTok more than Google because I actually have a one minute video that will teach me immediately rather than reading a blog. So to me it's like you make it SEO friendly because
Starting point is 00:25:32 TikTok is trying to be, I think it's trying to be the next Google and and be like the best search engine for it and educational platform as well. And then just post as often as possible. I think that's the best thing to do. Yeah, I use TikTok all that. Like if I'm traveling somewhere, best restaurants in the area. And then you get to actually see the food, see the restaurants way better than YouTube or Google. So that's a really, really good piece of advice. Okay, we have a shopping question here. So is there a lot of issues with just online shopping as far as security goes when you're inputting all this information? Your credit card information, sometimes in Google, you just click the button. It fills it all in. And is there any takeaway we should be aware of when to online shopping and putting in all this information? Yeah, that's a great question. I think one is verifying that the online shopping platform is like legit. Obviously, like Amazon, that makes sense. But there's so many random websites that pop up from like Instagram or whatever that are not based in the U.S., which is totally fine if it's not based in the U.S., but they might be based
Starting point is 00:26:33 in a little bit sketchier countries. And they're, you know, ripping off photos from other places. And it just, I would just, one, make sure that the website is legit. And there is actually a few websites that you can check where it's scanned and it will tell you like how long the website's been up running, where it's based, and if there's like any red flags. Also, the easiest way to tell is if it's an HTTP S, but S is secure. If it's an HTTP, I probably wouldn't buy anything off of it. And I probably would never buy anything off of an HTTP WWW site. So the S means secure. You're good, usually. But there's a few things that you can check to make sure that those websites are secure before you buy. And then the next thing, again, like I said,
Starting point is 00:27:14 said is try not to give all of your information out, like all of your personal details. Like if it's not required, don't do it. And if it, if they force you to do it, like, I don't even have the time I like say cat Sarah or like Kate something else. Like even when you, even when you're like making a reservation online, I don't even give my real name. Not that it could go like that far off, but I just don't want continuing records of like where I've been. So I would just be weary of, like, again, what data that you're giving to these random websites, because surprisingly, these smaller websites are worse, because the bigger websites are very much governed and sanctioned by laws and regulations, and they're constantly getting checked
Starting point is 00:27:55 and sued, et cetera. But it's the smaller websites that really don't have the bandwidth or the capacity or the knowledge to realize that they have to abide by certain laws. And so I actually think the smaller websites are the ones that you should be more weary about, like this sounds bad, but like the mom and pop websites that, like, really just have no idea. idea, restore your data, probably on their local computer and, like, if they get breached and all this data's gone. So I would just, one, be wary of the website. There's a few websites that you can use to check if a website's legit, and then don't give out your information if you don't need to. Okay. I think that's brilliant and brilliant advice. Actually, tying that to the
Starting point is 00:28:33 talent agency we run, when we're working with other public figures and we're doing deals with them. Obviously, there's just so much PR risk when someone is putting their stamp of approval and a lot of people have fallen victim to approving and endorsing companies and deals that are just garbage or like complete fraud. So we actually have to go through a vetting system, similar to the things you're referring to to make sure that all companies are 100% safe, secure and just everything is that completely cleaned up just because the risk is so high out there. So it's interesting. Some of those tips you gave us are tips. that we have when we go to the process of vetting.
Starting point is 00:29:10 And like you said, the small mom-pop shops are usually the ones we have to turn away from just because of potential liability risks. So that's interesting. All right, we actually have someone in here, Tanya said that she is just starting her cybersecurity degree. So this info is timely and very helpful to her. If you have one piece of advice for Tanya, she's starting it. What would you say, Kailin?
Starting point is 00:29:30 I say there's two. One is continue your passion. You're never going to know everything and you have to keep learning. and two is to network like, network like crazy. I think everyone's like, oh, I need to focus on certifications. And I always say, obviously, you need to learn if you're going to coding, you need to learn out of code. But for non-technical roles, it's really your network is your net worth.
Starting point is 00:29:50 And I strongly believe that if you're spending 10 hours a day studying for certification versus if you spend 10 hours a day networking with people on LinkedIn, I think you'd have a way better chance of getting a job right now in this job environment. So I think just continue to have a passion for learning and explore. and never stop that. But if you're going a non-technical route in cyber, I would definitely say try to network as much as possible on LinkedIn and other platforms. One built relationship, one message on LinkedIn, one handshake, one cup of coffee, one drink, and shortcut, literally 10 years of work. So I couldn't agree more with that. Okay, we had a,
Starting point is 00:30:25 this is a great question from Lizzie. What about personal information as far as job applications go? Many of them ask for everything, phone number, addresses. Are there security laws, of regulations protecting against these types of platforms? Any thoughts and advice on that? There are laws. I think legally they're allowed to keep it for at least five years if you didn't get the job. And I think it's like 10 years if you did get the job. You can always go back and ask them to remove their data, but I guarantee you the legal team will probably say no. That is one you're probably going to have to bite the bullet and give your real information. I don't give my phone number out. My real phone number, like I said, I do the Google voice
Starting point is 00:30:59 or a cloaked number. But yeah, I think that unfortunately you have to give you a real name, because if you do get hired, they're going to do background checks, and then they're going to wonder what a year? So I plan for a job. They can have my information for 10 years? I think legally, it also depends on the country. If I remember correctly when I was working into the law firm a couple of years ago, I think if you didn't get the job, they have to keep it for five years just for them. They say they need it just to make sure that you're not going to continue to reapply and then get turned down and then finally get accepted. But I think 10 years if you actually work for a company. Because I think that's like this kind of a statute
Starting point is 00:31:35 of limitation type of thing for suit. I'm not a lawyer, so don't take my advice. But that's what I remember explaining to people. It lasted pretty long time. So I've gotten just in this conversation, I've gotten several texts that have come through from people that are here on Trade Secrets team or just even the chat. And I just got one from someone that works at Trane Secrets. I just got a notification from McAfee that my Twitter was breached on the dark web this weekend. So the timing is great. Then between the bachelor's guy, getting hacked out, I feel like every person in some level or degree is feeling this, at least in the last 12 months. It's just so prevalent. So extremely, extremely timely. And I think the work you're doing, the education you're putting
Starting point is 00:32:14 is just so helpful for all of us out there. I want to, we'll do one more here. If you have any questions, guys, get them in tomorrow. I'm a little confused on your question. Can you come on ask you asked about the difference between Canada and U.S. social media influencing? Can you just tell us a little bit more about that. If Blake, you can unmute Tamara, Tamara. Tamara, thank you. Yes, we could do. My question is, is there a difference with social media influence between
Starting point is 00:32:42 and US? Because most social influences based in the U.S., U.S. marketing, U.S. influence. And in Canada, it's not as widely thought as, because even with doing Amazon and doing anything with TikTok, we don't have to give any compensation for influence. So that's my question. Yeah, so what I could speak to from that is we work with some Canadian influencers and they actually, like you said, they have some type of limitations as to websites they can access content they can see. As a result of that, there are two things. There are restrictions on the total impressions they can make that are different than the
Starting point is 00:33:27 United States. So their total impressions are limited based on certain restrictions. As a result of that, usually the rates will be lower if they're in Canada. But that varies. It's not always the true in every case. The second one is there are a lot of Canadian companies that we work with. And the first thing they say, they have money to spend. It has to be a Canadian-based influencer because that's where they're specifically trying to target the individuals they're marketing to and or their long. and regulations. So in that case, when they tell us that, we know we can get a premium because they have to fit within that confine. So it goes both ways as far as reach, but also selectability based on where the company's headquartered. Does that answer the question a little bit?
Starting point is 00:34:13 Yes, it does. Thanks. Thank you for the question. Well, those are all the questions that came in. You know, Kalin, this is absolutely amazing to just hear more about this. It's also kind of terrifying. So I know, I know tight buy stuff up, take ramen and Pino right off all my password. So hopefully you're knowing here, it gives that a shot. But Caitlin, where can people find everything that you have going on? Where can we learn more from you and, you know, this code that you have coming out in a month that your manager just put on the chat? Where can we go find that? My manager's referencing, I'm doing a free like cybersecurity, online security guide that's coming
Starting point is 00:34:51 out in the next month. And it's literally all the companies that I use. And I was like, I should just recommend these because I get asked these questions all the time. So that can all be found on cybersecurity girl.net. It's still a little buggy. I'm working there. I mean, it's there, but I'm working through finishing that app. And then the other thing is just on my platforms, like all this information can be found on my platforms. I have so many short form videos. And I've kind of grouped them all. So it's pretty easy to find like what you need. And my social media handles are cybersecurity girl for TikTok and then cybersecurity, underscore girl for Instagram. Same with YouTube, et cetera. If you want to find me on LinkedIn, too,
Starting point is 00:35:26 I forgot, was it Tanya that she was going into cybersecurity? So we had like a LinkedIn group and a Discord group for people that want to go and get into cybersecurity as well. There's a lot coming in the space. Book deal, hopefully to help people to say and set up everything that they need to be secure, not just online, but in their home for internet connected devices, et cetera. So all that's coming. But if you probably just watch and follow either my social media or cybersecurity goal. That's not up to date. Amazing. We really, really appreciate all this information. Hopefully you save at least one of us. Some trouble is the hackers are on the rise. So thank you. Thank you for being here. We appreciate it. Yeah. I just want to try to help everyone get
Starting point is 00:36:10 stay protected and get protected as much as possible. So thank you so much. Amazing. Yeah. I love the consumer protection angle. Like the trading secrets you have behind this space is huge. So thank you for coming out. We appreciate it. And we will see you soon. Thank you again.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.