All Episodes

May 30, 2025 • 29 mins
Questions we answer in this episode

What is the 4P formula?

What are 4 strategies for picking your priorities?

What is the theme of our new series of episodes?

How many episodes do you think it will take Makani to finish it?

Episode summary

There's a lot of ways you can improve your online security. But where should you begin? It can be a daunting question to answer.

Picking your priorities goes a long way. There are 4 simple strategies you can use to get started: activity, threat, value, and speed.

You could prioritize by activity: something you spend a lot of time doing or that makes you nervous.

You could prioritize by threat: a common threat like phishing, or a less common threat relevant to your situation.

You could prioritize by value: maybe your highest priority is keeping your retirement fund safe.

You could prioritize by speed: you want protection, but you are super busy and need to be able to do so quickly and efficiently.

Call to action

Pick the strategy you want to use to kick off your personal security plan. Then come share your pick on the forum.

Get the FREE Bulletproof My Identity Starter Kit

Get help from Makani

Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
(00:00):
Welcome to Super Simple Security Principles. I'm Nick Jackson, and I want to love computers.

(00:07):
They don't love me back. I'm learning how to stay safe online from my good buddy
and master guardian, Makani Mason. He wrote his first computer program at the age of six,
sealing his fate as a computer geek. That's it. He knows his stuff, folks. Now he spends his time

(00:34):
teaching people like me and you how to stay ahead of the digital threats we face and those bad guys.
He keeps it simple, and we love it. Learn along with me each week. I'll ask the questions
and make sure he keeps it super relevant and super simple for us. If I can do it, you can do it too.

(01:01):
All right, this is episode 65, Four Strategies to Picking Your Priorities.
Okay, so here are the questions we're going to be answering in today's episode, but before
we ask them, I want to tell our listeners a little bit of information. I want to give them the

(01:21):
backstory, okay? I literally have been waiting for this episode. I honestly thought our master
guardian would make this episode number one of our podcast. I thought this was going to be our
very, very first episode. I've had to wait 64 episodes, 64 episodes for you to finally ask

(01:50):
these questions, so it's with great enthusiasm that I'm going to announce today's questions.
We're going to talk about today's questions. These were super valuable to me. This is one
of the first things that our master guardian sat down and taught me. I still remember
our phone call, you telling me about this project, and you teaching me what this was about, and it

(02:21):
was very, very meaningful. It opened up my eyes to a lot of things, so I am incredibly excited for
our listeners to hear this because, as you'll know, this is the foundation of who we are,
our formulas, and our strategies for success. So, with no further introduction needed,

(02:45):
our questions for today are, what is the 4P formula? This is our master guardian's formula.
What is the 4P formula? What are the four strategies for picking your priorities, okay?
Four strategies you could implement for prioritizing your security.

(03:10):
What is the theme for our new series of episodes? I'm excited. And then, how many
episodes do you think it will take Makani to finish it? Years. That's my guess. My guess is
this is going to be a series that goes on for a long time. Let's see. We've had a 10

(03:34):
episode series already, so I'm going to say 20. Sounds good. All right, buddy. Where do we get
started today, man? I'm pumped for this one. Like I said, you've held me in waiting for years.
Well, that's funny because I hadn't ever heard that from you before. I mean, I know you were
super excited when we first talked about the 4P formula. So, I'll tell you this in terms of

(04:01):
why it's taken this long is because when we started this, when we first really officially
talked about this, what, in April 2023? Yeah. And I've been building and experimenting and doing
things ever since then. And the thing is, I knew how to stay safe, right? I've been practicing

(04:23):
myself, but turning that into a system that is accessible to just everyday people, first of all,
but not only that, not just accessible, but efficient and speedy because people aren't
going to do it if it's going to take them a lifetime or even years. It's got to be fast.

(04:47):
Yeah. Right? I mean, at the end of the day, if this is going to get adopted,
if it's going to get widely used and actually help a lot of people, we've really got to
streamline it. We've got to build all the right tools, all the right pieces.
And we've been kind of practicing, exploring, learning how to teach all the right pieces.
And I've been in between working on all these pieces the last two years, two plus years now.

(05:12):
And as you know, in some ways long before that, when I first did a class, anyway, years before
that, but really in earnest, these last two years. And so I just learned it. I mean, it just
takes a while. And I'm still got a lot of pieces to really figure out exactly, but it's coming
together. I've got every week and a clear vision of what it's going to be like. So anyway, sorry

(05:38):
to make you wait so long, but it's coming along. So yeah. Look, we're excited. I've known for a
couple of years. So the good news is, is we didn't string our listeners along that long. This is
going to be the first time they hear about it. So yeah. Yeah. Yeah. Well, and so here's how I'd

(05:59):
kind of characterize where we stand now at Episode 65. Okay. We've issued a lot of calls to action.
We've talked about a lot of layers of protection and it's all really good stuff, but it also
definitely creates a problem for our listeners as well. A good problem, right? But still one that we
want to help them solve. And that is answering the question, where to begin, or obviously a lot of

(06:24):
them have already done things. So what to do next? Yep. Yep. And as you know, kind of the overall
vision and one of the pieces that helps us answer that is what we talked about, and we haven't
talked about in the podcast for a while, but is the 4P formula. And I probably need to do a
whole episode just on that, but just really quick recap. The 4Ps are principles, priorities,

(06:51):
plan, and protect. And obviously we named the podcast after that first P, principles,
right? And for anyone who's been with us for a while, they've learned a lot of good principles
here. Yeah. And just like with you, you didn't know about the domain registrar like we talked

(07:11):
about in last week. Sometimes just some basic knowledge, awareness, principles,
that's a good first step. Yeah. And so today we want to kind of introduce a little bit more about
the second P, priorities, because once you have some basic knowledge, then one of the next steps

(07:33):
is really picking where you want to focus your time and attention. Yeah. And obviously my role
as master guardian is to help you in this process, but in the end, the priorities is really up to you.
What you feel like is worth spending time on, because you're the one who's going to be putting

(07:56):
in that time and effort, money, obviously, in some cases, energy, and it's got to be in
alignment with whatever is really important to you, not me. Yeah. So, but there's a lot of ways.
So one of the ways I'm going to help guide through this process is to give you four strategies for
picking your priorities. And then after we go through those four, then we'll, there's a little

(08:22):
bit different, but we're going to take a few extra minutes. Normally you give them a little
teaser of the next episode, but after we cover these, I want to spend just a couple minutes
introducing the rest of this series of series, how that's going to work. That sounds great.
Because in case it's unclear, this episode is, you know, the very first episode of this series

(08:46):
of series. Yep. So, okay. So strategy number one is to pick your priorities based on activity.
Okay. This could be just anything you spend a lot of time doing, because obviously the more you do
it, the more opportunities there are for something to go wrong, for you to be hacked, whatever.

(09:09):
So for example, here's a, oh yeah, go ahead. Here's an example. I spend a lot of time on my phone
completely different than how my wife does. Right. My wife has social media accounts as you know,

(09:30):
I don't have them, you know? And so that's why this is important because we're identifying
where we spend our time, right? Yeah. Okay. This is one option, right? So like you could choose to
what you want to work on first, what you want to work on next is just based on what you do a lot

(09:55):
of or another. And I put this under the same umbrella of activity. That's my one word description is
it's something that you might avoid doing. I've had this as well, because you're too afraid to do it,
that you'll get hacked or you'll mess something up. I've had people who there's something they
want to do, but they just, they don't know. They don't feel like they know how to do it safely or

(10:17):
privately or whatever. Yeah. Yeah. Yeah. And this is actually one of my favorites because it
really opened, like this is not only keeping you safer, but kind of opening up your world a little
bit by helping you conquer that fear. Cause you know that you'll be able to do it safely, you know?
Okay. Yeah. That's a great way to start too. Something you're not doing cause you're scared.

(10:39):
I like it. Yeah. Yeah. Yeah. Another one I got from some people is that, you know,
might be something you do, but you're a bit anxious or nervous doing. Yeah. And the most
common way I get on this one is shopping online or even sometimes just browsing the web,

(11:00):
checking your email, clicking the wrong thing in your email, you know? Yep. So any activity
that, you know, kind of weighs on your mind is also a great place to start. Yeah. So anyway,
that's one, one place you could start with is activity. Okay. The second one, number two,

(11:25):
thank you. I was waiting for the finger, is by threat. Ah, okay. So this could be, you've heard
of, you know, fishing and you know, this is a super common one. And maybe you don't know exactly
what it is, or maybe even do know exactly what it is, but you're not really sure how well protected

(11:45):
you are from it. Now, obviously you'd get some input from someone like me, um, uh, about this
as well, because, or you could, excuse me, like you could say, well, what threats do you think
are most relevant for me in my life situation? Because for example, you know, and we've talked

(12:08):
about this one a number of times, some are job specific like realtors. Yeah. You know, there's
some very specific scams that get pulled on, you know, realtors and their customers, you know,
during the mortgage process. So there may be specific threats that either you aren't aware of
at all that I might know about, or you know of, but you're not sure all the best ways you want to

(12:31):
be absolutely sure, like most realtors these days probably know about these scams, but they, they
want to be sure that they have all the best protection they can get. Right. Yeah. So, um,
I know, and of course, anyone who works from home has some extra threats that they face.
Yeah. Um, you know, uh, you've heard of, you know, computer viruses, ransomware, data breaches. I get

(12:57):
a lot of questions about, okay, well, if my data is found in a data breach, what do I do about,
you know, and how do I protect it, protect myself against about it. And so, you know, again,
any threat that you're worried about and motivated to take action to protect yourself against
is a great place to start as well. Okay. I like it. That's a great place to start.

(13:28):
Yeah. Right. Well, you know, so a lot of these, this is a choose your own adventure because
there's going to be a lot of overlap between a lot of these things. And so, you know, obviously
I can weigh in and consult with you and give you my input, but you know, sometimes it's just like,
there's so many things just, you know, what calls to you the most. Right. And these are just a few

(13:48):
ways to think about it and consider, okay, oh yeah, maybe that's what I want to do. So anyway,
we've got two more though. Number three, value. Yeah. This is looking at what you care most about
protecting. Yeah. This could be your phone. You want to make sure it stays safe and private. This

(14:08):
could be the money in your bank account or your retirement funds, or maybe you're an author like
my sister and you're writing a book and you want to make sure nobody steals it. Yeah. You know,
it could be more, a little more broad. It could just be keeping your information and your
communications from being spied on. Yeah. Or I know some of our listeners, this one, you know,

(14:30):
keeping your kids safe on your home network. That's really big to some of our listeners. Really
big. Yep, exactly. Yeah. That's all I have to say about value. So, okay. Then number four
is speed, speed slash efficiency. Right? Like you want to keep all your stuff safe, but especially

(14:57):
your most important stuff. You want to kind of protect against all the threats. Right. But what
you really care most about is doing it quickly. Right? Like if you prioritize, if you choose this
option, speed, this is what you're prioritizing. Like life's already too busy. Yeah, I want to do
all that stuff, but I want the low hanging fruit. I want the biggest bang for my buck. I want the

(15:22):
80-20 kind of approach. You know, these kinds of ideas. Right? Right. Right. And this is obviously
a common one, right? I know there are gonna be a lot of people that are like, yes, that's me.
Right. I've talked to a lot of people and that's exactly their boat and they don't even really know
they haven't. Anyway, so that's a valid one, but I've had a lot of people in some of the other

(15:46):
categories as well. They've had a problem being hacked with a particular thing in the past. I
didn't even think about mentioning that or they know someone who did. And so that's really near
and dear to their heart. You know, that's obviously under the threat category. So anyway, there's a
lot of ways to go. It just depends on what, whatever is going to get you to take action.

(16:08):
That's what you want to, how you want to think about it, you know. Right. Well, I'm going to
interrupt here because. Please. Because as I look at it right now, we just wrapped up our second
question. We just wrapped up. What are the four strategies for picking your priorities? Okay.
Yep. And this is what I wanted to highlight. And this is why this resonated with me years ago.

(16:32):
As you know, my background a little bit is in the financial world, right? I work in the financial
world. I've spent a lot of time there. Anyways, what I would do is I would completely do some
customizations for my clientele. Completely tailor it to their needs, their wants,

(16:58):
what their priorities were, et cetera. Right. I dealt with a different clientele base. I still do
or did. And so when you shared this with me, what this really captivated my mind was,
is this is a way to tailor your security to you. It is going to be tailored to work for you because

(17:27):
we are identifying your needs, your wants, and what are priorities. Not only that, what are you
afraid of? What do you need? What do you want to do? This is a way to truly safeguard yourselves
on a very personal level. Not a blanketed recommendation. This isn't,

(17:50):
go get this and you'll be safe because we know that doesn't work. But a tailored plan does.
Tailored approach works. Clothes that are tailored for you fit you better. It's that simple.
So enough said for me. Let's move on, man. You ready for the theme of our new series?

(18:16):
Almost. Right. Almost. Sorry, my bad. I'm stealing your thunder. No, I just want to build on it
because I really loved your thoughts there. And because it's definitely one of the things that
I've kind of struggled with is this notion of, so we want to have things as pre-built as possible
so people can kind of sync their, like see what it's about and what it's going to do.

(18:38):
Right. But balance that with this tailoring, this personalization. Right.
Right. And so this is one of the pieces of the strategy of balancing those in all the right ways.
Right. And we'll be exploring this more in the series. So we'll definitely be coming back to
this topic. But definitely one of the themes is not only speed and efficiency, but customization

(19:06):
and flexibility, having... Anyway, there's interesting ways you can combine that,
but definitely picking your priorities and think these things as a way that we can kind of take
almost at least somewhat off the shelf. And what we'll talk about security stacks,
we're going to be talking about, spoiler alert, next episode, and then combine different security

(19:28):
stacks based on your needs that then we can reuse these smaller pieces to put them together in a way
to make it quick and easy, so to speak, but still tailored for you, if that makes sense.
Right. Oh, absolutely. It makes total sense. Total sense.
So there will still be... Yeah, sorry. Go ahead.

(19:49):
In that financial world, there were certain things that I would recommend or certain stocks,
whatever, that I would recommend to one person, one person only. Right.
And then there were other times to where there were stocks that I really liked that I would
recommend to multiple people to be able to use in a variety of ways. And so that's what these stacks

(20:14):
do is they help you grab some of those things. Yep. Yeah. Love it. Exactly. Okay. Now I'm ready
to talk about the series of series. Let's go, man. Let's go.
I was really expecting I was going to get more harassment from you on this,

(20:35):
like talking about a series of series. Dude, you've been dangling me for two years on this.
I'm ready to dive in, man. I've been waiting to get at this.
Yeah. Well, maybe that's right. That was where your brain was. I was thinking you were going
to harass me out calling it a series of series, because we've got a series. Just thinking,

(20:55):
because it's a series of series. That doesn't surprise me. That just fits into Makani,
our master guardian, man. Fair enough. You just know me too well already. So that's fair.
So the focus of the series of series really boils down to answering the question that we talked

(21:17):
about of what to do next. Yeah. And of course, answering that question over and over all along
or put another way, building your personal security plan. And I think that's how kind of the
official unofficial title I think of it as. Yeah. And here's kind of the current vision. Now,

(21:42):
obviously, as all my series go, and this one even more just because it's even bigger scope,
some of this is going to change. So don't take this as written in stone or anything,
but just to give you kind of where my vision is on it right now. Probably five, well,
probably six actually, I think, but five at least. And anyway, six series within the overall series.

(22:10):
Okay. And the first series is introducing the basic components of a security plan.
Right. Nice. The security plan and the basic components.
Yep. And we started today with the priorities. And next week we're going to be talking about,
sorry to steal your thunder just slightly, but it kind of fits in here, is security stacks.

(22:37):
And then the second series and series two through five will each be a series where we build a basic
security plan based on each of the four strategies that we discussed today.
Nice. Does that make sense?
That makes total sense. So really give just examples of how that works. And I suspect all

(23:02):
of them will be ones that will, maybe not all of our listeners, obviously for each one, but
just potentially the interest of ones that'll be very directly applicable for some subset of
our listeners anyway. And then I suspect anyway, as we work through that, that I'll probably end

(23:23):
up wanting like a wrap up series to tie some things together. Anyway, we'll see how it plays
out, but... Sounds good.
So then if we do a little math about how many, and again, this is way more guesswork, but
I'm guessing each of the strategy, the priority strategy series two through five will be around,

(23:47):
I don't know, four to eight episodes long. So yeah. Although we're looking at somewhere 25
to 35 episodes. So that's the rest of 2025. Man, I was way off. I said 20. I want to change
my guess. I'm going to say 40. Right. Okay. Now that you get a little more context of what it's

(24:11):
looking like, that's fair. You can change your guess. Yeah. Right. So I mean, easily the rest
of 2025, right? Yeah. Yeah. That one I think is a safe bet by anybody's measure, but yeah. Anyway,
that's it. I mean, like I told you before we recorded, I'm more excited about this episode

(24:35):
than any, because I feel like it's just a culmination of, or at least the beginning
of the culmination, so to speak, whatever, of a lot of things coming together. And I couldn't
build all this two years ago, but made a lot of progress, learned a lot of things, figured a lot
of things out and still have some more things to figure out, but we've made it a long way. And

(25:00):
it's just, it's going to be awesome, man. So awesome. Really give people a lot of good tools
and it's all going to be. Yeah. Anyway, this is going to be totally awesome because
for our listeners, you know, we, we have a wide variety of listeners first shout out to,

(25:20):
we have had multiple people as to come on our show. Most multiple experts shout out to those
experts that are listening to us. That means a lot that you'd be willing to listen to us,
but also for, this is who I'm going to speak to real quickly. The listeners like me, the listeners
that really don't understand the security blocks and the security tools and all that's available to

(25:46):
us. And this is a way that what our master guardian has done for you is he has created a
way to create a tailored, customized security plan for you and implement it. And to be able to ask
yourself, okay, what's going to be next? How do I do this? And, and very simple, simple steps and

(26:11):
simple principles. And again, it's completely customized to you. So this is why I'm super
excited because for those of us that really don't get it, this is going to be what you've been
waiting for. So please, please tune in, especially the rest of this year where we're going to be,

(26:31):
you know, giving you some great stuff. You know, that said, I also want you checking out our
website because we've got some things coming in the pipeline that are going to be really,
really cool as well. So yeah. Yeah. Anything else you want to add? I don't think so.

(26:55):
All right. Do I need to tease them too much? Like we've already teased of a lot,
like our next episode, we're going to be talking about the major building blocks
of your personal security plans, security stacks.
And we'll explain that. We'll keep it super simple. But this is going to be bread and butter.

(27:19):
And this is going to be your meat and potatoes. Like this is it. Come prepared. It's going to
be super easy, but you're going to love it. And it's really going to be built for you.
Yeah. And I do have a call to action though. You skipped that section.
Holy crap. What was I doing, man? I was surprised. I know, right? Like I just,

(27:44):
I know I got all my notes. So I get, you know, it's easier for me to make sure I don't ever forget
anything because I got all my notes. Keep in mind, you've been making me wait for this for
a long time. So that's why I'm so anxious to get into these episodes. So, okay. For our listeners,
especially for that faithful listener. Hey, Justin, shout out to you, buddy.

(28:06):
I know you love our call to action. So here you go. What's our call to action, Connie?
So pick one of the four strategies. Those are activity, threat, value, and speed.
And, you know, then come share your pick on the forum. I haven't heard from Justin on the forum

(28:27):
yet. So I'd especially love to hear from him. And, you know, as always, of course, if you have
questions about the strategy or your pick or want some input, whatever, come to the forum too.
Be happy to discuss it with anyone listening. So there you go.
Awesome. Awesome. Love it, dude.

(28:52):
Here we go. It's about time. Amen. That was a good episode. You ready?
Yeah. Are you ready to take action and wondering where to start? Get my Bulletproof My Identity
Starter Kit for free. The seven most vital layers of protection everyone needs. I'll send you one

(29:14):
step at a time and help you if you get stuck. Just go to bulletproofmyid.com and enter your
name and email and I will send you the first step. Again, that's bulletproofmyid.com.
Advertise With Us

Popular Podcasts

United States of Kennedy
Stuff You Should Know

Stuff You Should Know

If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

Dateline NBC

Dateline NBC

Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.