Episodes

  • Your Social Security Number Has a Lock—Are You Using It?
    Apr 1 2026

    You already know to watch out for IRS scams—but do you know how to lock down your Social Security number before someone uses it? In this episode of SipCyber, Jen Lotze visits Clouded Coffee on 7th St. in St. Paul, MN, sipping a bright caramel salty dog latte, to unpack a quiet but powerful identity protection tool most people have never heard of: E-Verify Self Lock.

    The connection between tax season scams and this free SSN protection tool is closer than you think. Scammers don't need to break in—they just need you to move too fast. Jen walks through exactly how that gap gets exploited, and what a simple 10-minute setup can do to close it.

    Key Topics Covered:

    • What E-Verify Self Lock is and how it works
    • Why your Social Security number is the #1 target in identity theft
    • How urgency and polished design are weaponized to earn digital trust
    • The difference between trust in the physical world vs. the digital world
    • Step-by-step: how to set up SSN protection directly and safely

    Trust builds slowly in real life—but online, it shows up instantly. A clean graphic, a confident voice, a sense of urgency. Scammers know this. Now you do too.

    ☕ Featured Coffee Shop: Claddagh Coffee, 7th St., St. Paul, MN

    🥤 Jen's Order: Caramel Salty Dog Latte

    Ten minutes is all it takes. Subscribe for weekly cybersecurity tips delivered from coffee shops across the country—and share this with someone who thinks identity theft won't happen to them.

    #IdentityTheft #SocialSecurityNumber #EVerify #CyberSecurity #ScamAwareness #IdentityProtection #DataBreach #SipCyber #InfoSec #CyberSafety #TaxScams #DigitalSafety #OnlineSecurity

    Show more Show less
    3 mins
  • The "Accidental" Venmo Payment That Drains Your Account
    Mar 25 2026

    The moment money shows up unexpectedly, most of us want to do the right thing—send it back, fix the mistake, move on. That's exactly what scammers are counting on. In this episode of SipCyber, Jen Lotze visits Hamlin Bread inside Oxford's historic Covered Market to unpack one of the most deceptively simple scams circulating right now: the Venmo overpayment fraud.

    From accidental transfers to online selling setups and fake "upgrade" emails, these scams share one common ingredient—urgency. And the antidote is surprisingly simple: a pause.

    Key Topics Covered:

    • How the "accidental payment" scam works—and why it's so effective
    • The overpayment trap targeting people selling items online
    • Why Venmo's refund system can be weaponized against you
    • The fake Venmo business account upgrade scam
    • The one rule that protects you: never send money back yourself

    The same trust that makes peer-to-peer payment apps feel friendly is what makes them a prime target. A single pause between notification and action can be the difference between keeping your money and losing it.

    ☕ Featured Spot: Hamblin Bread, Oxford Covered Market, Oxford, UK

    Don't let a scammer turn your good instincts against you. Subscribe for weekly cybersecurity insights from coffee shops and bakeries across the globe—and share this with anyone who uses Venmo, Zelle, or Cash App.

    #VenmoScam #CyberSecurity #ScamAwareness #DigitalSafety #SipCyber #OnlineFraud #PaymentScams #Phishing #InfoSec #PeerToPeerPayments #FinancialFraud #CyberAware #SocialEngineering

    Show more Show less
    4 mins
  • Tax Season Is Scammer Season: What You Need to Know
    Mar 18 2026

    Trust is the thing scammers exploit most—and tax season hands it to them on a silver platter. In this episode of SipCyber, Jen Lotze visits The Mixing Jug, a hidden courtyard gem in Marlow, England, and draws a powerful parallel between the quiet trust of a neighborhood coffee shop and the misplaced trust that costs people thousands every April.

    When your inbox is already flooded with W2s, refund notices, and filing deadlines, a convincing phishing email doesn't feel like a threat—it feels expected. That's exactly how scammers want it. From fake IRS emails demanding identity verification to fraudulent tax documents loaded with malware, these attacks are timed precisely for the moment your guard is down.

    Key Topics Covered:

    • The three most common tax season scams hitting inboxes right now
    • Why the IRS will never email, text, or DM you—ever
    • How to spot a spoofed sender address before it's too late
    • What to do if you receive a suspicious "IRS" message
    • Simple verification habits that stop tax phishing cold

    The IRS doesn't do urgency. Scammers do. If a message is pressuring you to act fast, that's your first red flag.

    ☕ Featured Spot: The Mixing Jug, Marlow, England

    Before you click anything this tax season—pause. Subscribe for weekly cybersecurity tips delivered from coffee shops across the country, and share this with someone who could use a reminder before April.

    #CyberSecurity #TaxScams #IRSScam #Phishing #IdentityTheft #TaxSeason #ScamAwareness #CyberSafety #InfoSec #SipCyber #DigitalSafety #PhishingAlert #CyberAwareness

    Show more Show less
    5 mins
  • Stop Being Tracked: Phone Privacy Tips That Actually Work
    Mar 11 2026

    Your phone isn't eavesdropping—it's doing something far more calculated. In this episode of SipCyber, Jen Lotze visits Meta Coffee and Bookstore in Anoka, MN, where the warmth of an old-school wooden bar and a quiet cup of herbal tea set the stage for one of the most common digital mysteries people experience: why does an ad show up seconds after you mention something out loud?

    The answer isn't magic—and it isn't your microphone. It's math. Advertising systems build behavioral profiles using what you search, click, buy, and browse. Cross-app tracking stitches those signals together across every platform you use, creating a picture of you that's more precise than most people realize.

    Key Topics Covered:

    • How pattern recognition—not microphone access—powers eerily accurate ads What cross-app tracking is and why it follows you everywhere
    • Step-by-step: disabling ad tracking on iPhone (Settings → Privacy → Tracking)
    • Step-by-step: resetting your Advertising ID on Android
    • Why reducing your digital "resolution" is a realistic, empowering goal

    This isn't about paranoia—it's about understanding the system so you can make informed choices about your privacy.

    ☕ Featured Spot: Meta Coffee and Bookstore, Anoka, MN

    #PhonePrivacy #CrossAppTracking #DataPrivacy #AdTracking #Cybersecurity #DigitalPrivacy #iPhonePrivacy #AndroidPrivacy #SipCyber #InfoSec #CyberSafety #OnlineSafety #PrivacyTips

    Show more Show less
    3 mins
  • The Quiet Data Collector in Your Pocket
    Mar 4 2026

    Your phone is never fully asleep—and most people have no idea what's running quietly in the background. In this episode of SipCyber, Jen Lotze visits Compassion Coffee in Anoka, MN—a nonprofit built on second chances—and draws a powerful parallel: just like the unseen systems keeping a coffee shop running smoothly, your devices are constantly working behind the scenes, tracking locations, scanning for wake phrases, and logging your habits.

    Jen breaks down exactly what's happening on your iPhone and Android right now, and gives you a clear, 10-minute action plan to take back control without turning off everything you love about your device.

    Key Topics Covered:

    • Why your phone is always "listening"—even when you're not using it
    • What that orange or green dot actually means (hint: it's not protection)
    • How to audit location permissions on iPhone and Android
    • The "Significant Locations" feature most iPhone users don't know exists
    • Simple permission changes that dramatically reduce background tracking

    This isn't about fear—it's about intention. Your digital life deserves the same care as anything else you value.

    ☕ Featured Coffee Shop: Compassion Coffee, Anoka, MN

    Take 10 minutes this week and review your app permissions. Subscribe for weekly cybersecurity tips from the best coffee shops across the country—and share this with someone who's never checked their location settings.

    #PhonePrivacy #DataPrivacy #Cybersecurity #LocationTracking #iPhonePrivacy #AndroidSecurity #SipCyber #DigitalSafety #InfoSec #CyberAwareness #AppPermissions #PrivacyTips

    Show more Show less
    4 mins
  • AI Is Already Inside Your Kids' World—Are They Ready?
    Feb 25 2026

    A third-grader mishearing a Paul Simon song just delivered the most important cybersecurity lesson of the year. In this episode of SipCyber, Jen Lotze stops into Conscious Cup Coffee in Crystal Lake, IL—home of the salted hazelnut latte that turned her into a coffee lover—to talk about what it really means to raise a generation that's growing up inside AI, not just alongside it.

    This isn't a panic piece. It's a practical, grounded conversation about why kids interact with AI fundamentally differently than adults do—and what that means for families, educators, and anyone responsible for the next generation's digital safety.

    Key Topics Covered:

    • Why kids born into AI see it as invisible infrastructure, not a tool
    • The critical difference between AI predicting vs. AI knowing
    • How to start age-appropriate AI literacy conversations at home
    • What should never be typed into a chatbot, search bar, or image generator
    • Treating AI like a public space—not a private conversation

    The cybersecurity threat isn't just hackers. It's misplaced trust. And when a friendly, helpful AI voice feels like a confidant, that's where risk quietly walks in the door.

    ☕ Featured Spot: Conscious Cup Coffee, Crystal Lake, IL

    // Learn More About IT Audit Labs //

    AI can be a great assistant—it just shouldn't be your confidant. Subscribe for weekly cybersecurity tips from the best local spots across the country, and share this with every parent and educator in your life.

    #AILiteracy #KidsAndAI #CyberSecurity #DigitalSafety #AIAwareness #ParentingInTheDigitalAge #SipCyber #ChatGPT #ArtificialIntelligence #CyberEducation #InfoSec #OnlineSafety #AIRisks #DigitalParenting #TechForKids

    Show more Show less
    6 mins
  • What Flying a Plane Taught Me About Cybersecurity
    Feb 18 2026

    What does flying a small airplane have to do with cybersecurity? More than you'd think. In this episode of SipCyber, host Jen Lotze visits Grounds Coffee Bar in Crystal Lake, IL, and draws a powerful connection between the calm of flight preparation and the peace of mind that comes from digital preparedness. After the loss of her father, Jen shares how navigating the digital side of grief revealed a hard truth: preparation isn't just smart—it's a gift to the people you love.

    This isn't about firewalls or threat feeds. It's about the human side of security—knowing where your passwords are, who has access, and what happens when you can't be the one to log in.

    Key Takeaways:

    • Why preparation eliminates panic—in the cockpit and in your digital life
    • The questions everyone should answer before an emergency hits • How personal loss revealed the real cost of digital unpreparedness
    • Why cybersecurity should feel like calm, not complexity
    • A heartfelt look at Grounds Coffee Bar and the moments that shape our perspective

    📍 Featured Coffee Shop: Grounds Coffee Bar — Crystal Lake, IL (right by the Metra station)

    If today's episode made you think about your own digital preparedness—even just a little—then this conversation mattered. Like, subscribe, and share it with someone who needs to hear it.

    #SipCyber #cybersecurity #digitalpreparedness #passwordmanagement #cybersecuritypodcast #digitalestate #onlinesafety #preparedness #crystallake #coffeeshop

    Show more Show less
    4 mins
  • Identity Theft 2.0: Ghost Students & Financial Aid Fraud
    Feb 11 2026

    You don't have to be in college to become a victim. In this episode of SipCyber, Jen Lotze visits Sunshine Coffee in Lake Elmo, MN, to break down the "ghost student scam"—a sophisticated identity theft operation targeting anyone with a Social Security number, including children.

    Scammers are using stolen identities to enroll in online college programs, drain financial aid funds, and vanish—leaving real people to discover fraudulent student loans and destroyed credit years later. This isn't a distant threat. It's happening now, and your name (or your child's) could already be enrolled somewhere without your knowledge.

    • Key Topics Covered:
    • How ghost student scams work and why they're so hard to detect
    • Why children's identities are prime targets for financial aid fraud
    • The single most effective defense: freezing your credit (and your kids')
    • How to check if your identity has already been compromised
    • Practical steps to protect financial aid and education accounts

    This isn't about fear—it's about action. Credit freezes work. Monitoring works. And awareness is the first line of defense against identity thieves who count on you doing nothing.

    Featured Coffee Shop: Sunshine Coffee, Lake Elmo, MN

    🍯 Jen's Drink: The Miel (espresso with honey and spice)

    Action Step: Freeze your credit at all four bureaus—Equifax, Experian, TransUnion, and Innovis. Do it for your kids too. Subscribe for weekly cybersecurity insights from coffee shops across the country, and share this with parents, educators, and anyone who needs to hear it.

    #GhostStudent #IdentityTheft #CreditFreeze #FinancialAidFraud #CyberSecurity #ParentingTips #InfoSec #StudentLoans #DataProtection #SipCyber #DigitalSafety #CreditProtection

    Show more Show less
    4 mins