Episodes

  • What Flying a Plane Taught Me About Cybersecurity
    Feb 18 2026

    What does flying a small airplane have to do with cybersecurity? More than you'd think. In this episode of SipCyber, host Jen Lotze visits Grounds Coffee Bar in Crystal Lake, IL, and draws a powerful connection between the calm of flight preparation and the peace of mind that comes from digital preparedness. After the loss of her father, Jen shares how navigating the digital side of grief revealed a hard truth: preparation isn't just smart—it's a gift to the people you love.

    This isn't about firewalls or threat feeds. It's about the human side of security—knowing where your passwords are, who has access, and what happens when you can't be the one to log in.

    Key Takeaways:

    • Why preparation eliminates panic—in the cockpit and in your digital life
    • The questions everyone should answer before an emergency hits • How personal loss revealed the real cost of digital unpreparedness
    • Why cybersecurity should feel like calm, not complexity
    • A heartfelt look at Grounds Coffee Bar and the moments that shape our perspective

    📍 Featured Coffee Shop: Grounds Coffee Bar — Crystal Lake, IL (right by the Metra station)

    If today's episode made you think about your own digital preparedness—even just a little—then this conversation mattered. Like, subscribe, and share it with someone who needs to hear it.

    #SipCyber #cybersecurity #digitalpreparedness #passwordmanagement #cybersecuritypodcast #digitalestate #onlinesafety #preparedness #crystallake #coffeeshop

    Show More Show Less
    4 mins
  • Identity Theft 2.0: Ghost Students & Financial Aid Fraud
    Feb 11 2026

    You don't have to be in college to become a victim. In this episode of SipCyber, Jen Lotze visits Sunshine Coffee in Lake Elmo, MN, to break down the "ghost student scam"—a sophisticated identity theft operation targeting anyone with a Social Security number, including children.

    Scammers are using stolen identities to enroll in online college programs, drain financial aid funds, and vanish—leaving real people to discover fraudulent student loans and destroyed credit years later. This isn't a distant threat. It's happening now, and your name (or your child's) could already be enrolled somewhere without your knowledge.

    • Key Topics Covered:
    • How ghost student scams work and why they're so hard to detect
    • Why children's identities are prime targets for financial aid fraud
    • The single most effective defense: freezing your credit (and your kids')
    • How to check if your identity has already been compromised
    • Practical steps to protect financial aid and education accounts

    This isn't about fear—it's about action. Credit freezes work. Monitoring works. And awareness is the first line of defense against identity thieves who count on you doing nothing.

    Featured Coffee Shop: Sunshine Coffee, Lake Elmo, MN

    🍯 Jen's Drink: The Miel (espresso with honey and spice)

    Action Step: Freeze your credit at all four bureaus—Equifax, Experian, TransUnion, and Innovis. Do it for your kids too. Subscribe for weekly cybersecurity insights from coffee shops across the country, and share this with parents, educators, and anyone who needs to hear it.

    #GhostStudent #IdentityTheft #CreditFreeze #FinancialAidFraud #CyberSecurity #ParentingTips #InfoSec #StudentLoans #DataProtection #SipCyber #DigitalSafety #CreditProtection

    Show More Show Less
    4 mins
  • TikTok's New Terms - What You Need to Know
    Feb 4 2026

    The agreement you clicked through without reading just changed the rules. In this episode of SipCyber, Jen Lotze visits Raw Deal in Menominee, Wisconsin, and breaks down TikTok's recent U.S. Terms and Privacy Policy update—the one most people accepted without a second thought while scrolling between videos.

    Recorded fresh off a middle school basketball tournament, Jen reflects on watching kids toggle between the game and their screens, building digital footprints they don't yet understand. The new policy isn't just another legal update—it's a meaningful expansion of what TikTok collects, how precisely it tracks location, how it uses AI interactions, and how that data follows users long after the moment it was captured.

    This isn't about banning apps or blaming parents. It's about awareness. Because the systems collecting data on all of us—adults and kids alike—are sophisticated, persistent, and not designed with our best interests in mind.

    • Key Topics Covered:
    • What actually changed in TikTok's updated U.S. privacy policy
    • How precise location tracking works—and why it matters
    • AI feature data collection you might not realize you're participating in
    • Why data patterns are more dangerous than individual data points
    • How digital footprints follow kids into adulthood
    • Practical steps to review app permissions and protect your household

    Don't let the fine print decide for you. Subscribe for weekly cybersecurity insights delivered from local coffee shops across the country—and share this with any parent who needs to hear it.

    #TikTok #Privacy #DataTracking #ParentalControls #Cybersecurity #DigitalFootprint #OnlineSafety #AppPermissions #SocialMedia #InfoSec #KidsOnline #SipCyber #PrivacyPolicy #TechForParents

    Show More Show Less
    6 mins
  • OSINT Secrets: Control Your Digital Reputation Before It's Too Late
    Jan 28 2026

    In this episode, Jen breaks down how to "rabbit hole yourself" before someone else does. She walks through practical steps to audit your digital footprint, delete dormant accounts, and intentionally curate the top results that show up when someone searches your name. This isn't about scrubbing the truth—it's about making sure the best version of you shows up first.

    Whether you're a high school senior applying to colleges, a professional navigating career moves, or a parent helping your kids understand digital responsibility, this episode gives you actionable steps to protect your reputation in a world where everything is public—and permanent.

    🔑 KEY TOPICS COVERED:

    • What OSINT (Open Source Intelligence) is and how employers use it
    • AI-powered background check tools like Fama and Ferretly
    • How to audit your own digital footprint using Incognito mode
    • Why deleting old accounts matters (yes, even that MySpace profile)
    • The power of intentionally planting positive content online
    • How to shape your digital reputation before someone else does

    Take control of your digital reputation today. Like, share, and subscribe for more coffee shop cybersecurity wisdom that keeps you and your family safe online.

    #OSINT #DigitalReputation #Cybersecurity #JobSearch #SocialMediaSafety #OpenSourceIntelligence #OnlinePrivacy #SipCyber #CuriosityCoffe #EaganMN

    Show More Show Less
    3 mins
  • What a Hurricane Taught Me About Cyber Recovery
    Jan 21 2026

    What do a North Carolina brewery destroyed by Hurricane Helene and a cybersecurity victim have in common? More than you think. This isn't just another "how to prevent hacks" episode—it's about what happens when the levee breaks.

    Host Jen Lotze shares a powerful story from Zillicoah Beer Company in North Carolina, where 10 years of hard work was washed away in an afternoon. With zero insurance payout, the owners went back to brewing basics—working day jobs and scrubbing kegs by night. Their recovery story reveals what most cybersecurity content won't tell you: 90% of bouncing back is emotional, not technical.

    If you've ever been scammed, felt that soul-crushing shame, or wondered what to do when prevention fails, this episode is your roadmap back to solid ground.

    What You'll Learn:

    • The 3-step cyber crisis recovery checklist (report to IC3.gov, freeze credit, talk to a human)
    • Why shame keeps victims isolated—and how community breaks that cycle
    • How freezing your credit protects you while you clean up the mess
    • The unexpected parallels between natural disaster recovery and cyber incident response
    • Why you're not stupid for getting scammed—you're just human

    Subscribe for more no-BS cybersecurity advice that treats you like a human, not a firewall.

    #cybersecurity #cyberrecovery #databreach #onlinescam

    Show More Show Less
    4 mins
  • White Papers Decoded: Your Secret Weapon Against Cyber Risk
    Jan 14 2026

    Think white papers are just boring documents for IT teams? Think again. Understanding these authoritative guides is your secret weapon for spotting massive risks before they become disasters—whether you work in HR, marketing, finance, or any department handling sensitive data.

    In this episode of SipCyber, Jen Lotze breaks down exactly why white papers matter for everyone in your organization, filmed at the perfect spot for detailed work: Cadence Coffee and Records in St. Paul, MN. From compliance frameworks to emerging ransomware trends, these documents define your risk landscape, guide strategic investments, and help you speak the language of cybersecurity credibility.

    What You'll Learn:

    • Why white papers are critical for non-technical roles (HR, marketing, finance teams need this)
    • The three essential components every white paper contains: problem, solution, and call to action
    • How to read strategically—skip the fluff and extract actionable intelligence fast
    • Spotting vendor bias while still leveraging valuable research and data
    • Using AI agents to translate complex technical documents into practical business strategy

    Don't let dense technical documents intimidate you—understanding white papers is how you protect your organization before threats become headlines. Subscribe for more practical cybersecurity education that makes complex topics accessible for everyone.

    #Cybersecurity #WhitePapers #BusinessStrategy #RiskManagement #InfoSec #CyberAwareness #SmallBusiness #DigitalSafety

    Show More Show Less
    6 mins
  • The Hidden Dangers of App Permissions & Single Sign-On
    Jan 7 2026

    Ever clicked "Sign in with Google" without thinking twice? You're not alone—but that convenience might be your biggest security risk. In this episode of SipCyber, Jen Lotze breaks down the invisible web of permissions connecting your entire digital life, filmed at Black Sheep Coffee in St. Paul, MN.

    This is Part 1 of a two-part series on managing your digital risk profile. We're exposing how single sign-on creates a domino effect that can topple your entire online presence if one account falls. Plus, we reveal what apps like TikTok are really accessing on your phone—and why you should care.

    Your Action Items:

    • Deny unnecessary permissions on new app downloads
    • Audit your Google/Facebook connected apps today
    • Use unique passwords for critical accounts (banking, email, retirement)

    This isn't about fear—it's about informed decisions. Does a video app really need your contacts and GPS location? Probably not. Learn to spot the red flags before you hit "Accept All."

    Don't let convenience compromise your security. Hit subscribe for Part 2, where we dive into the global threat landscape and how businesses use white papers to define risk. Your digital safety starts with one simple audit—let's get started.

    #AppPermissions #SingleSignOn #CyberSecurityTips #DigitalPrivacy #PasswordManager #DataProtection #CyberAwareness #StaySafeOnline

    Show More Show Less
    5 mins
  • Best Cyber Defense Tips for 2025 in One Coffee Break
    Dec 17 2025

    Looking back at the cybersecurity lessons that made the biggest difference this year? Jen breaks down the 9 most powerful, actionable steps you've learned through SipCyber - the security moves that drastically reduce your risk without requiring a tech degree. From credit freezes to SIM swap protection, these aren't theoretical tips - they're the defenses that actually stop criminals in their tracks.

    This year-end recap is your cybersecurity checklist for 2024, covering everything from shopping safely during the holidays to protecting your property deed from fraud. Whether you implemented these strategies already or need a refresher before the new year, this episode delivers practical protection for your family, your finances, and your digital life.

    What You'll Learn:

    • Why freezing your credit (including Innovis) is the #1 defense against identity theft
    • The ironclad rule for public Wi-Fi that protects your banking and email
    • The 3-second phishing scan that stops scams before you click
    • How to lock down social media privacy settings for yourself and your kids
    • Why credit cards beat debit cards for holiday shopping protection
    • The simple PIN that prevents devastating SIM swap attacks
    • How to set up free property fraud alerts before criminals target your home
    • Smart AI safety rules: when to verify facts and when to walk away
    • Red flags for online romance scams and financial manipulation

    Don't let 2024 end without securing what matters most. Hit subscribe for more coffee-break cybersecurity that protects your family without the tech overwhelm!

    #CyberSecurity #IdentityTheft #CreditFreeze #Phishing #OnlineSafety #DigitalPrivacy #FamilySafety #HolidayShopping #SIMSwap

    Show More Show Less
    5 mins