Podcast Summary: The Mel Robbins Podcast
Episode #1: "Cybersecurity Expert Reveals: 5 Ways to Protect Yourself Online (Starting Tonight)"
Guest: Caitlin Sarian (Cybersecurity Girl)
Date: February 19, 2026
Episode Overview
In this actionable and eye-opening episode, Mel Robbins interviews Caitlin Sarian, an award-winning cybersecurity consultant known online as "Cybersecurity Girl." The episode’s main theme is empowering everyday people—parents, kids, and seniors alike—with practical, easy-to-implement strategies to protect themselves from the ever-growing threat of cyber scams and data breaches. Mel and Caitlin break down the realities of digital vulnerabilities, reveal the biggest scams happening right now (including the Venmo scam), and deliver a concrete list of five essential actions listeners should take to shield themselves online—starting immediately.
Key Discussion Points & Insights
1. Why Everyone Needs to Care: The Scale of Cyber Threats
- [07:07] Caitlin Sarian: “The cyber scam economy is the third largest in the world. That’s how much money they’re making.”
- Mel confesses to a lax approach with notifications and updates—mirroring most listeners' habits.
- Cybersecurity isn't just for "tech people and banks" anymore; every internet user is a target.
2. Your Digital Footprint: What’s At Risk
- [10:05] Caitlin defines cybersecurity as "protecting your digital footprint," which encompasses everything you do online: apps, websites, games, and accounts.
- [10:30] She explains how incognito mode still leaves you visible to websites, only hiding activities from other users of your device—not from service providers or the sites themselves.
3. Quickfire Cyber Hygiene Tips
A. Protect Personal Information
- Never give out real birthdays, names, or phone numbers unless necessary. Use alternate personas for non-essential sign-ups.
- [12:34] "Why do they need your name? Why do they need your phone number? My question back to you is, why do they need it?" —Caitlin
- Use a Google Voice number if an app requires a phone number.
B. Limit Online Accounts
- Avoid creating unnecessary online accounts (e.g., for reservations, newsletters) to reduce data exposure.
- Use alternative, throwaway emails and numbers.
C. Don't Broadcast Your Whereabouts
- Never post vacation photos or current travel plans in real time; scammers can use open source intelligence to target you when you're away.
- [15:42] "There's a lot of social engineering...they see you're at a Marriott in the Bahamas—they could call and pretend to be you."
D. Free WiFi Risks
- [17:23] "If any product or app is free, you are the product."
- Open/free WiFi is often unencrypted; avoid entering sensitive info (especially banking) on it.
- Look for "HTTPS"—the "S" means secure—when using websites (especially abroad).
- Prefer tethering or a VPN for security. Hotspot ≠ VPN.
E. Password Management
- Never save passwords/credit cards in unprotected notes or browsers.
- Use password managers (e.g., Lastpass, iPhone’s built-in manager), or at minimum, lock notes with FaceID/password.
F. Security Questions
- Avoid using factually correct answers for security questions (like your mother’s maiden name), since such info is often public.
- Create an alternate persona for these answers.
G. Software Updates
- Always enable automatic software updates.
- Patches usually fix vulnerabilities: "90% of software updates are to fix some type of bug or vulnerability because hackers are getting so much better." —Caitlin ([28:26])
H. Device Charging Risks
- Never use public USB charging stations (e.g., at airports or hotels) due to risk of "juice jacking".
I. Stop Thinking “Hackers Don’t Want Me”
- [30:30] "It doesn't matter who you are. They just want money. If you are an easy target, you're an easy target." —Caitlin
4. How Cybercrime Happens and Recognizing Scams
A. Password Reuse & Account Leaks
- Hackers use leaked passwords (and all their common variations) to break into multiple accounts rapidly.
B. Phone and Phishing Scams
- Law enforcement/phishing scams: scammers call pretending to be the FBI or police, using public info to intimidate victims into sending money (often crypto).
- [37:54] "If anyone needs you to send crypto, let's just be red flag."
- Never respond to calls from unknown numbers or set a personalized voicemail; scammers record your voice for future scams.
C. Voice Cloning and Safe Words
- Voice cloning can mimic family members, tricking relatives into sending money. Set a family "safe word" for verification.
- [42:49] “If my mom gets on a phone with someone that says that they're me...she's gonna be like, okay, can you tell me your family safe word?”
D. Venmo Scam
- [43:58] Scammers send money from stolen cards, then ask you to send it back. When the original transaction is reversed as fraud, you lose your own legitimate funds.
5. Responding to Data Breaches and Identity Protection
A. What To Do After a Breach
- Immediately change your passwords and enable multifactor authentication.
- If it’s a credit/financial breach, take advantage of free credit monitoring and freeze your credit to prevent identity theft.
- “You’ll never know if someone is using your parents' information until it’s too late.” —Caitlin ([47:29])
B. Protecting Seniors & Kids
- Freeze elderly parents’ credit, set strong passwords, enable multifactor authentication.
- Open communication about scams is crucial—avoid making kids ashamed to report potential issues.
- Kids’ phones: use children’s/child accounts, block messaging, set to private, regularly review permissions.
6. App and Privacy Settings
- Routinely review and lock down app permissions. Only enable camera, microphone, or location access when strictly necessary.
- [65:05] "Does it have access to your camera, to your microphone, to your location? If it doesn't need it, turn it off."
- Social, delivery, and shopping apps: set permissions to “only while using the app” or even restrict to specific photos when sharing.
- Social media apps are scanning your photo roll to build content suggestions—limit their access.
7. Facial Recognition, Wearables, and IoT Concerns
- Wearables and IoT devices (e.g., smart rings, sleep pads) collect vast biometric data. Always review privacy policies.
- Tip: Paste privacy policies into AI tools (e.g., ChatGPT, Copilot) for layman summaries and red flags.
- [67:16] Facial recognition/biometrics are everywhere (TSA, cameras, etc.)—not always avoidable. Consider blue light/infrared-blocking sunglasses to shield from some forms of surveillance.
- Cover laptop cameras. Use password-protected (or strong unique) passwords on ALL connected cameras (doorbell, baby monitor, etc.). Never reuse the same password on multiple devices.
8. Spotting Sophisticated Scams & Phishing
- Don’t trust purported Mel Robbins communications unless from verified accounts.
- [76:41] "Do not click on any links. That is like a blanket statement rule I have."
The Five Cybersecurity Essentials (Caitlin’s List)
[77:17]
-
Strong, Unique Passwords:
- List your key accounts (banks, social, email); each must have its own strong, unique password.
- Prefer a secure password manager or locked notes.
-
Automatic Software Updates:
- Set all devices and apps to auto-update.
-
Freeze Your Credit:
- Takes 5-10 minutes per bureau; essential for you and your parents/grandparents.
- Prevents identity theft by stopping new accounts from being opened in your name ([79:12]).
-
Pause 9 Seconds Before Clicking Links:
- This deliberate pause disrupts impulsive clicking, allows checking email senders/URLs, and shrinks scam risk.
-
Limit the Data You Provide Online:
- Don’t overshare; provide only what’s necessary.
- Consider using services like Incogni to automate removal of personal data from data brokers/websites.
- For DIY: Manually remove info from databases like Whitepages, True People Search, People Finder.
Bonus: Audit app permissions. Review camera, microphone, and location access—turn off what’s unnecessary.
Notable Quotes & Memorable Moments
- "If any product or app is free, you are the product." —Caitlin Sarian [17:31]
- "The S in HTTPS stands for 'secure.' If it's just HTTP, it's not secure." —Caitlin [19:33]
- "I personally use a password manager. I love it. I swear by it." —Caitlin [23:32]
- "It doesn’t matter who you are — they [hackers] just want money." —Caitlin [30:30]
- "Family safe words have saved people’s life savings." —Mel Robbins [42:46]
- "The scam now is people send you money on Venmo, and then ask for it back. And you’re the one left out the money." —Mel & Caitlin [44:02-44:55]
- "You can scrub your data. Services like Incogni scan and send out opt-out requests for you." —Caitlin [80:29]
- "Cybersecurity is not just for experts. It’s for everyone." —Caitlin [83:07]
Timestamps for Important Segments
- 06:19 — Caitlin’s introduction; why most people feel behind on cybersecurity
- 07:07 — The massive global economy behind cyber scams
- 10:05 — The real extent of your digital footprint
- 15:42 — The dangers of posting live vacation images
- 17:31 — Free product/app = you are the product
- 19:22 — The meaning of "HTTPS"; secure sites vs. non-secure
- 23:32 — Password managers; why not to store passwords in notes
- 28:27 — Software updates patch hacker vulnerabilities
- 30:30 — “Hackers don’t care who you are” myth
- 37:18 — The psychology and tactics of today’s phone scams
- 42:49 — Family safe words and voice cloning scam defenses
- 43:58 — Current Venmo scam explained
- 47:29 — Why and how to freeze your (and your parents’) credit
- 49:56 — Non-negotiable child safety phone/app settings for parents
- 65:05 — How to audit and lock down app permissions
- 72:33 — Why you should cover cameras on all devices
- 77:17 — Caitlin’s “top 5” things everyone must do to secure themselves, detailed
Final Takeaways and Tone
Mel and Caitlin keep the conversation lively, relatable, empowering, and at times humorous—even as they break down complex threats. Rather than inducing fear, the episode focuses on practical steps, doable routines, and the message that everyone can improve their security with just a few small changes. Mel openly acknowledges making every “wrong” move, making it easy for listeners to feel comfortable and motivated to act.
What To Do Next (Tonight!)
- Audit your passwords; use unique, strong ones for every major account.
- Turn on automatic updates for all your devices.
- Freeze your credit (if not applying for loans/credit soon).
- Pause before clicking any suspicious link or giving up personal info.
- Scrub your online information via DIY or use services like Incogni.
- Review all app permissions, especially camera, microphone, and location.
Share this episode with everyone you care about. As Mel says: “This conversation might be just the thing that protects them from making a mistake they can’t undo.” [30:57]
For more, follow Mel (@melrobbins) and Caitlin (@cybersecuritygirl) for practical security tips and updates.
