Super Simple Security Principles

Super Simple Security Principles

Learn how to think not what to think.

Episodes

June 27, 2025 36 mins
Helpful episodes to listen to first

What is a Security Stack

Questions we answer in this episode

What are the 6 layers in the Bulletproof Stack Formula?

How are they grouped?

What are the most neglected layers?

Episode summary

There are 6 types of layers we can review to help us build a Security Stack. They help us build redundancy into our Security Stack. Yes, that's a good thing! We want as many layers of defense as we can to keep the b...

Mark as Played
Helpful episodes to listen to first

Seven Critical Router Security Settings

How DDoS Attacks Affect You

Questions we answer in this episode

What are the 5 questions in the Bulletproof Stack Formula?

How do they help us?

Episode summary

There are 5 questions we can ask to help us build a Security Stack. These questions help to ensure that our Security Stack is relevant.

This means there is a legitimate threat that I care about, and I'm will...

Mark as Played
June 13, 2025 29 mins
Helpful episodes to listen to first

Our Super Chatty Devices

Questions we answer in this episode

What are the 4 phases in a Security Stack?

How do they help us?

Which one is the most important?

Episode summary

The 4 phases of a Security Stack are: Learn, Prevent, Detect, and Repair. This parallels how an attack affects us over time.

We want to Learn about an attack before it hits us, and ideally Prevent it from succeeding. But just in case...

Mark as Played
June 6, 2025 22 mins
Helpful episodes to listen to first

4 Strategies for Picking Your Priorities

Questions we answer in this episode

What does Makani love building?

What is a Security Stack?

How do you build one?

What is the twist on our usual Call-to-Actions for this series?

Episode summary

A Security Stack is a piece of your Personal Security Plan focused on a specific area. It is comprised of layers of protection that work together to keep you safe.

You bui...

Mark as Played
Questions we answer in this episode

What is the 4P formula?

What are 4 strategies for picking your priorities?

What is the theme of our new series of episodes?

How many episodes do you think it will take Makani to finish it?

Episode summary

There's a lot of ways you can improve your online security. But where should you begin? It can be a daunting question to answer.

Picking your priorities goes a long way. There are 4 simple strategies y...

Mark as Played
May 23, 2025 31 mins
Helpful episodes to listen to first

Unique Email Addresses

Troy Hunt Phished

Troy Hunt Part 2

Questions we answer in this episode

Why is Makani sharing his story?

What is a domain name registrar?

What is whois data?

How can it help me stay safe online?

Episode summary

A domain name is what we think of as a website - facebook.com or makanimason.com. In order to have your own domain, you need to pay some money and share some personal informati...

Mark as Played
Helpful episodes to listen to first

Episode 62, Even a Security Expert Can Get Phished (Troy Hunt, Part 1)

Episode 17, Eliminating Email Exhaustion - Part 2 - Unique Emails

Episode 42, Website and Email Filtering, Part 3: Email Friends

Questions we answer in this episode

Who is to blame for Troy getting phished?

How can you reliably tell who sent you an email?

How can you cut down your email spam?

What are two major flaws in our email syst...

Mark as Played
Questions we answer in this episode

Who is Troy Hunt?

How did he get phished?

What are some lessons we can learn from his story?

Who will we be inviting as a guest to the podcast?

Episode summary

Troy Hunt, a security expert, got phished. He clicked a link in an email, and entered his password into a fake website.

The hackers logged into his Mailchimp account that he uses to send his email newsletter. They stole the email addresses of all...

Mark as Played
Questions we answer in this episode

What is the website, ID.me used for?

What are the two PIN numbers used in filing your taxes?

How can I get an identity protection (IP) PIN?

What does it mean (in online security) to plant your flag?

Episode summary

When filing your taxes, there are 2 different PINs you might use. The first is called your self-select PIN. It's 5 digits long, and pointless.

The second is called an Identity Protection (IP)...

Mark as Played
April 25, 2025 31 mins
Questions we answer in this episode

What is a DDoS attack?

What social media platform was recently the target of a DDoS attack?

How can your home network be impacted by one?

What can you do to protect your home network?

Episode summary

DDoS attacks are growing faster than the squash in my garden - seriously, it's wild!

The slaves in the army? Devices quietly hijacked by hackers.

There are millions of them scattered around the globe...

And y...

Mark as Played
Helpful episodes to listen to first

Episode 40 - Website and Email Filtering

Episode 56 - Home Network Attacks From Within

Episode 57 - How Firewalls Protect You And What You Might Be Missing

Questions we answer in this episode

What is a trojan horse?

What are two ways an outbound firewall protects you?

What is an outbound firewall's greatest frustration and greatest strength?

What is an allow list?

Episode summary

If you want to protect you...

Mark as Played
Helpful episodes to listen to first

How to Access Your Router

Home Network Attacks From Within

Questions we answer in this episode

What is a guest network?

How can it protect my home network?

Does everyone need to use it?

What are the 3 categories of Internet of Things (IoT) devices?

Episode summary

A guest network is a second wifi network you can set up at home.

It lets visitors use your internet without touching your main network.

That mean...

Mark as Played
Helpful episodes to listen to first

Don't Answer the Phone

Bulletproof My Home

Home Network Attacks From Within

Questions we answer in this episode

What is a firewall?

Why do I need more than one firewall?

Which device already has a firewall enabled?

What kinds of devices have an increased need for a firewall?

Episode summary

Firewalls in buildings stop fire from spreading.

Firewalls on computers do something similar: they stop malware f...

Mark as Played
March 28, 2025 32 mins
Helpful episodes to listen to first

Don't Answer the Phone

Questions we answer in this episode

What is a computer virus?

How does a computer virus spread?

How does patient (device) zero get infected?

What protection do we NOT have against these attacks?

Episode summary

What happens if a device in your home gets infected with a computer virus?

Just like a human virus, it wants to spread.

But how does that first device get infected?

There are p...

Mark as Played
Questions we answer in this episode

What are the seven most critical router security settings?

What is WPS and when is it okay to use?

What is a brute force password attack?

Which unexpected setting helps against this attack?

Episode summary

Default passwords and settings make a hacker's job easy.

It's time to take just a few minutes and strengthen your router's security.

If you don't know how to access your router, please listen to Episod...

Mark as Played
March 14, 2025 29 mins
Questions we answer in this episode

Why do I need the manual for my router?

What's the first step in accessing my router?

How many passwords are there for my home network?

What are the two methods for connecting to a router?

Episode summary

If you can install an app, and visit a website, you can learn to access your router.

Reading the section in the router's manual should help.

Yes, I realize many of us don't read manuals anymore, but tha...

Mark as Played
March 7, 2025 22 mins
Questions we answer in this episode

What is the awesome new tool we're building?

How can you get free lifetime access to it?

What problem does it solve?

What is a computer network port?

Episode summary

Computer network ports are like phone extensions in a corporate office building.

But instead of using an extension to reach a specific person, computer use ports to access specific services.

Services like visting a webpage, sending an email,...

Mark as Played
February 28, 2025 29 mins
Questions we answer in this episode

What is the simple rule to keep your home network safe?

Why is breaking that rule so common?

How do I know if MY router is following the rule?

What new tool are we building?

Episode summary

Your home network's guardian from internet based attacks is your router.

To keep your home safe from these attacks, your router needs to follow one simple rule:

Don't answer the phone!

Unfortunately, convenience often ...

Mark as Played
February 21, 2025 26 mins
Questions we answer in this episode 

What is a router? 

How many episodes will be in this series? 

Is Makani trying to turn me into a network engineer? 

What is the metaphor we will use for this series? 

Episode summary 

Every internet connected device is under constant threat of attack. 

Especially the router on your home network. 

In order to protect your devices, you don't need to become a network engineer. 

But you need to understand 3 ...

Mark as Played
February 14, 2025 28 mins

What are the phone protections the FCC mandated in 2024? 

What is a sim swap attack? 

What is a port-out attack? 

What is your second most important online account? 

How to lock your phone number

FCC Adds Rules for Cell Service Providers

FCC Explains Cell Phone Fraud

Mark as Played

Popular Podcasts

    United States of Kennedy is a podcast about our cultural fascination with the Kennedy dynasty. Every week, hosts Lyra Smith and George Civeris go into one aspect of the Kennedy story.

    Dateline NBC

    Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

    Bookmarked by Reese's Book Club

    Welcome to Bookmarked by Reese’s Book Club — the podcast where great stories, bold women, and irresistible conversations collide! Hosted by award-winning journalist Danielle Robay, each week new episodes balance thoughtful literary insight with the fervor of buzzy book trends, pop culture and more. Bookmarked brings together celebrities, tastemakers, influencers and authors from Reese's Book Club and beyond to share stories that transcend the page. Pull up a chair. You’re not just listening — you’re part of the conversation.

    The Breakfast Club

    The World's Most Dangerous Morning Show, The Breakfast Club, With DJ Envy And Charlamagne Tha God!

    24/7 News: The Latest

    The latest news in 4 minutes updated every hour, every day.

Advertise With Us
Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.